4,269 webcasts found
+ 63252 past events found
Back to Search Begin New Search Save Search Auto-Notify
Unlock Predictable IT: Dell Technologie...
Thank you for joining Dell Technologies and Carahsoft for our Unlock Predictable IT: Dell Technologies APEX Infrastructure webinar.Attendees learned:How to avoid costly import tariffs using Dell APEX Infrastructure's domestic IaaS model.Why government agencies are shifting to hybrid and on-prem solutions—and how Dell supports the transition.What “cloud consumption” truly means, and how Dell APEX delivers flexibility with on-p...
Add Favorite
Defending the DON: Validating Cyber Rea...
In this session, attendees:Gain quantifiable insights into your security posture by seeing how Mandiant Security Validation (MSV) continuously tests your network, endpoint, cloud, and email security controls against real-world threat actor tactics.Optimize existing security investments and configurations while justifying security spend with empirical performance data and clear reporting on identified gaps and cyber readiness.Learn to align you...
Add Favorite
Google Public Sector Workshop: Foundati...
Attendees joined us for a day of hands-on workshops that offered a comprehensive introduction to Google Cloud Networking. We delved into essential networking capabilities, practical design guidance, best practices, and recent updates, empowering you with foundational knowledge. This interactive session was designed to provide IT professionals and cloud engineers with a comprehensive understanding of core networking components within Google Clo...
Add Favorite
Hybrid Identity Security & Recovery Cra...
In today's hybrid IT environments, Active Directory (AD) and Entra ID remain the foundation of access and security but are also a primary target for modern identity-based attacks. Additionally, aligning your recovery capabilities with attacker behavior is crucial to restore trust, permission, roles, and control.Watch the on-demand webinar featuring Cayosoft's Tech Evangelist Craig Birch, where you will gain the tools to combine attack-path cla...
Add Favorite
Workforce Disruption to Strategic Advan...
Federal agencies and public sector organizations face mounting workforce challenges, and the pressure is on to navigate complex policy mandates, streamline fragmented processes, and overcome aging system constraints—all while maintaining efficient operations. And it continues to change—but with disruption comes the opportunity to reimagine and realign for impact.In this practical, insight-packed session, our experts discussed how t...
Add Favorite
Elevate Your Enterprise PMO: Driving Op...
This webinar was tailor-made for enterprise PMO leaders, Engineering team leaders, IT directors, and program managers who need a tool to streamline processes, manage resources effectively, and bring predictability to costs, risks, schedule, and performance management. We delved into real-world applications of Smartsheet's Project and Resource Management capabilities and showcased how these powerful features help companies improve their cost an...
Add Favorite
Accelerate Government IT Modernization...
During this webinar, attendees explored how the Layer7 API Gateway and its new Cloud Migration Tool automate and simplify the move from traditional gateways to cloud-native, Kubernetes-based deployments, while preserving security, governance, and performance.Attendees learned:Layer7 API Gateway strategic overviewWhy APIs matter in government modernization (AI included)How the Layer7 Cloud Migration Tool worksBest practices for cloud-native API...
Add Favorite
Identifying Hidden Cracks: Strengthenin...
Gartner presented the SOC Visibility Triad of capabilities (EDR, NDR and SIEM) as foundational capabilities for a SOC team to acquire to be as effective as possible; however, there are hidden assumptions baked into the SOC Visibility Triad that resulted in deployments being vulnerable and sitting on cracked foundations. Additionally, as technology has evolved, asset management solutions need to be capable of helping teams not only identify ass...
Add Favorite
AI-Powered Log Management
Attendees joined our webinar to discover how Dynatrace is revolutionizing log management with an AI-powered approach. With features like the Log Distribution Dashboard, Dynatrace OneAgent and Dynatrace Query Language (DQL), you gain unprecedented visibility and control over your log data.During the webinar, attendees learned how to:Eliminate data silos and gain a comprehensive view of your IT environmentAutomate log analysis and troubleshootin...
Add Favorite
AI Auto-Remediation: Department of Ener...
AI-enabled software automation significantly improves operations and management of critical systems that are integral to research and development, like those within the Department of Energy complex. The integration between Dynatrace and Red Hat Ansible enables the collection and analysis of data and metrics in real-time, yielding deep insights into system performance, areas for experience enhancement and auto-remediation of problems identified...
Add Favorite
Back to Search Begin New Search