Back to Search Begin New Search Save Search Auto-Notify
Fortify Security and Compliance With Se...
Tackling security and compliance risks is an enabler to successful cloud adoption. In this session, we explored how public sector organizations can incorporate ServiceNow Vault into their overall security and compliance posture to bolster advanced data security and privacy controls. The session was designed for the CISO—and those who support the CISO—covering key topics such as platform encryption, zero trust, data privacy, and mal...
Add Favorite
Strengthening Information Assurance in...
In this webinar, attendees learned how to:Integrate Risk and Compliance: Learn how to implement an integrated approach to information assurance that aligns with FISMA and OMB requirements, reducing complexity and improving oversight.Maximize Infrastructure Investments: Discover how to build on your current systems to create a more secure, cost-effective, and efficient risk management framework.Adapt to an Evolving Threat Landscape: Explore str...
Add Favorite
Transforming Enterprise IT: Real-Time D...
In this webinar, attendees learned:What multi-cloud enterprise IT management looks like today and the challenges of operating across multiple cloud environmentsWhere the disconnect lies between enterprise needs and the services offered by Cloud Service Providers (CSPs)How database management automation is evolving with SentientDBHow to prepare for the future of IT management with AI, automation, and new applications
Add Favorite
More Than Endpoints: How Symantec Prote...
In our exclusive webinar, we explored how Symantec Protection Engine (SPE) brought enterprise-grade security to data infrastructures through advanced, scalable file scanning. Participants discovered how organizations leveraged SPE’s powerful API-based service to protect data at rest and in motion across hybrid environments, including NAS systems, web and proxy servers, and cloud storage platforms like AWS S3, Azure Blob, and Google Cloud...
Add Favorite
Proactive Data Governance for the Publi...
Are you still grappling with data silos and legacy systems? In this short video, Immuta experts discuss how their technology tackles these very challenges, empowering your agency to accelerate data access and make better-informed decisions while maintaining strong governance and security. Watch now to dive deeper into how Immuta:Breaks down data silos and facilitates sharing: Immuta enables seamless cross-agency data sharing to eliminate data...
Add Favorite
AI Without the Chaos: Cut the Waste. Po...
Attendees joined Broadcom, Google Cloud, stackArmor and Carahsoft for a mission-driven briefing on how federal agencies can accelerate software delivery and improve cross-team transparency—while maintaining deadlines and staying within budget. Whether you're delivering digital tools to the warfighter or ensuring compliance with FITARA, CMMC, or EO mandates, this webinar recording will be beneficial to you. Attendees discovered how to:Del...
Add Favorite
Achieving Consistency and Control Acros...
Manual network configurations can't keep pace with modern technical demands. IT automation offers an accelerated, consistent approach across complex environments.This virtual event explored how Red Hat Ansible helps network teams increase agility, reduce human error and improve compliance with end-to-end automation.Attendees learned: Core use cases for network automationHow to automate tasks across routers, switches and firewallsReal-world exa...
Add Favorite
F5 Red Hat Tech on Tap
F5, Red Hat, and Peraton hosted an interactive session highlighting how F5 ADC 3.0, F5 AI Gateway, and Red Hat technologies provide the tools you need to maintain resilience across an increasingly complex and expanding threat landscape. Attendees learned how our solutions can:Combat Emerging AI Threats: Discover the F5 AI Gateway, a cutting-edge solution providing real-time resilience against emerging cyber risks.Simplify and Automate Operatio...
Add Favorite
Digital Shadows: Tracking Meth-Traffick...
Meth Trafficking Networks Are Evolving. So Should Your Intelligence Skills. This hands-on session explored how to track meth trafficking across encrypted messaging platforms—now the preferred communication channels for drug-trafficking groups and extremist actors. During this webinar, attendees learned how to:Identify digital footprints and patterns of meth-dealer cellsMap communication networks and identify key actors involved in illici...
Add Favorite
Transforming Transit: Leveraging Custom...
In this webinar, Salesforce and CapTech shared how transit agencies are transforming customer service and operational efficiency with custom CRM solutions. Experts discussed real-world applications, strategies for optimizing customer interactions, and how data-driven insights enhance service delivery. Watch the recording to explore the future of transit technology and learn how your agency can leverage these solutions.
Add Favorite
Back to Search Begin New Search