Back to Search Begin New Search Save Search Auto-Notify
AI-Powered Automation for Bridging Skil...
Regardless of where you are in your IT modernization journey, adopting an enterprise-wide automation strategy can streamline not IT processes, but also enhance your technologies, teams and overall organization. Red Hat hosted a webinar on a technical overview of Ansible Automation Platform where they explained:Integrated developer tools and generative AI (Gen AI) capabilities Enterprise-wide orchestration toolsGetting started with Ansible Auto...
Add Favorite
Leveraging Splunk SOAR to Increase Prod...
This webinar helped familiarize participants with how to respond to incidents, manage cases and artifacts, automate their incident response, and standard operating procedures. Participants walked through a real-world scenario and see first-hand how Splunk SOAR can be used to create a notable event to enrich alerts by automatically gathering data, all the way to managing and resolving the incident. During this webinar, they:Gained a better unde...
Add Favorite
ISV Bay Day Summit
Amazon Web Services (AWS), Feenix.ai, Second Front Systems, Exostellar, and Carahsoft partnered together for the first-ever ISV Bay Day Summit on November 12!Sessions included:AWS Marketplace Listing WorkshopAWS Accelerated Partner DevelopmentAWS ISV Offered ProgramsCompliance PanelTechnology Specific Vertical Breakout Sessions
Add Favorite
Maximizing Efficiency: Strategies for E...
This webinar was designed for Tableau Site administrators seeking to optimize their platform's performance and streamline operations for all users. From efficient resource management to user access control and performance tuning, we will cover a range of topics to empower you in maintaining a roubust and responsive Tableau environment. During this webinar, attendees:Dove into Tableau strategiesLearned best practices for Tableau online deployme...
Add Favorite
Physical Security & the Cloud: Allowing...
Many IT departments are now forced to manage numerous disparate systems through different applications or multiple web portals, often frustrated by the tedious task of integrating devices from various manufacturers onto their networks. Verkada has led the way in simplifying these solutions through its novel hybrid-cloud solution that allows for ease in deployment, maintenance and upgrades of a complete physical security portfolio that can be o...
Add Favorite
Tenable & CyberArk Exposure Management...
View this on-demand webinar where attendees learned how Tenable and CyberArk integrate to:Provide details on what you don't know about your environment, giving you a complete view of your exposure.Ensure the best possible control of your credentials when scanning.Automate your processes to reduce complexity and errors, while improving efficiency.
Add Favorite
Embracing O365 Security: Better Togethe...
Watch now to view Splunk and Everfox (Formerly Forcepoint Federal) recent webinar, 'Embracing Office 365 Security: Better Together with Splunk & Everfox.' During the webinar, speakers highlighted the integration between Splunk and Everfox to support your Office 365 environment. Registrants learned how the integration can increase cybersecurity in your industry.With the Everfox CDR solution, agencies can expect fully secure inbound and outb...
Add Favorite
Secure & Scalable Data Lifecycles with...
Red Hat and Cloudera partnered for a webinar on November 14th aimed at helping your agency take advantage of the technology needed to run and manage applications across different hybrid cloud environments. Cloudera Data Platform Private Cloud offers robust analytics, transactional processing and machine learning in a hybrid data platform powered by Kubernetes. It runs on Red Hat OpenShift, leveraging the enhanced features and capabilities that...
Add Favorite
A Whole of State Approach to Cyber Resilience
As cyber threats are becoming increasingly sophisticated, state and local governments are fighting for their survival against nation-states and cybercriminals looking to disrupt critical systems and exfiltrate sensitive citizen data. With constraints such as workforce shortages to limited funding, SLG organizations need a collaborative strategy to bolster cybersecurity and enhance cyber resilience. Join Rubrik, Okta, Crowdstrike, Zscaler, and...
Add Favorite
The Skinny: Ransomware Defense & Incide...
View this on-demand webinar where attendees heard Juniper's Mark Harman and Ben Caruso discuss:An introduction to ransomware and its impact on SLED organizationsBest practices for defenseHow to create an effective incident response planHow to address the ransom payment decisionBuilding an incident response playbook aligned with frameworks like StateRAMP and NIST
Add Favorite
Back to Search Begin New Search