Back to Search Begin New Search Save Search Auto-Notify
Unlocking Data Potential with Pentaho -...
Are you curious about the Pentaho+ DataOps platform? Don't miss out on our next webinar!During this webinar, attendees learned about:How Pentaho supports DISA’s data modernization and interoperability goalsReal-world use cases for secure, scalable data integration across defense domainsDemonstration of Pentaho’s powerful features for data preparation, orchestration, and governance
Add Favorite
Are You Protecting Your M365?
Did you know that most public sector organizations overlook one of their most important assets in Microsoft 365 (M365)? Tenant configurations are critical to your agency's M365 infrastructure, and backing them up often goes unnoticed until an audit or issue reveals the risk.Watch the on-demand webinar to learn how leveraging CoreView's Configuration Manager unlocks a new level of governance and compliance for your organization.Specifically, yo...
Add Favorite
Beyond Points and Badges: Gamification...
Today’s learning initiatives require more than just modules and checklists. To truly capture attention and keep today’s learners engaged, organizations need immersive, motivating experiences built around human psychology. Whether you're facilitating employee training, customer education, or partner enablement, it’s time to move beyond static learning and explore what’s possible with gamification.Watch this on-demand web...
Add Favorite
Unlocking Tough Data with Altair Monarch
State and local agencies often manage data across multiple platforms – making reconciliation time-consuming and prone to error. Watch the on-demand recording to learn how teams are simplifying these processes by automating data validation, identifying discrepancies earlier, and improving overall financial reporting accuracy.Watch the on-demand webinar to see real-world examples of how public sector organizations are using modern data too...
Add Favorite
Securing the Blind Spots of On-Prem Ser...
During this webinar, attendees learned about:Understand the hidden risks of Non-Human Identities (NHIs): Explore the security challenges NHIs pose in hybrid environments and why traditional identity tools fall short.Gain visibility and control: Learn how to discover, classify and monitor NHIs across on-prem and cloud systems using Silverfort’s Identity Security Platform.Strengthen your identity security posture: See how real-time risk as...
Add Favorite
Unlock Predictable IT: Dell Technologie...
Thank you for joining Dell Technologies and Carahsoft for our Unlock Predictable IT: Dell Technologies APEX Infrastructure webinar.Attendees learned:How to avoid costly import tariffs using Dell APEX Infrastructure's domestic IaaS model.Why government agencies are shifting to hybrid and on-prem solutions—and how Dell supports the transition.What “cloud consumption” truly means, and how Dell APEX delivers flexibility with on-p...
Add Favorite
Defending the DON: Validating Cyber Rea...
In this session, attendees:Gain quantifiable insights into your security posture by seeing how Mandiant Security Validation (MSV) continuously tests your network, endpoint, cloud, and email security controls against real-world threat actor tactics.Optimize existing security investments and configurations while justifying security spend with empirical performance data and clear reporting on identified gaps and cyber readiness.Learn to align you...
Add Favorite
Google Public Sector Workshop: Foundati...
Attendees joined us for a day of hands-on workshops that offered a comprehensive introduction to Google Cloud Networking. We delved into essential networking capabilities, practical design guidance, best practices, and recent updates, empowering you with foundational knowledge. This interactive session was designed to provide IT professionals and cloud engineers with a comprehensive understanding of core networking components within Google Clo...
Add Favorite
Hybrid Identity Security & Recovery Cra...
In today's hybrid IT environments, Active Directory (AD) and Entra ID remain the foundation of access and security but are also a primary target for modern identity-based attacks. Additionally, aligning your recovery capabilities with attacker behavior is crucial to restore trust, permission, roles, and control.Watch the on-demand webinar featuring Cayosoft's Tech Evangelist Craig Birch, where you will gain the tools to combine attack-path cla...
Add Favorite
Workforce Disruption to Strategic Advan...
Federal agencies and public sector organizations face mounting workforce challenges, and the pressure is on to navigate complex policy mandates, streamline fragmented processes, and overcome aging system constraints—all while maintaining efficient operations. And it continues to change—but with disruption comes the opportunity to reimagine and realign for impact.In this practical, insight-packed session, our experts discussed how t...
Add Favorite
Back to Search Begin New Search