1,842 webcasts found
+ 6214 past events found
Back to Search Begin New Search Save Search Auto-Notify
Unlock Efficiency and Safety for Utilit...
Attendees who joined us learned how to overcome the challenges of managing a fleet of utility vehicles! This on-demand webinar covered the following learning objectives: Unleashing the power of data-driven decision-making for improved fleet visibility Implementing cutting-edge safety protocols that minimize accidents and maximize driver well-being Leveraging innovative technologies to deliver exceptional customer service and loyalty
Add Favorite
Navigating Tomorrow's Defense Supply Chain
For defense agencies to prepare for and mitigate high-impact supply chain disruptions, decision-makers must first have clear visibility into their operations and where vulnerabilities exist. As a result, more organizations rely on digital logistics, a transformative approach using data analytics to monitor, anticipate and respond to supply chain disruptions. Given the complexities of global supply chains and the ever-present potential for disr...
Add Favorite
LLMs On-Prem: Deriving Knowledge from a...
This webinar explored the deployment of large language models on premises for analyzing a private corpus of documents, emphasizing heightened data security and privacy. It delved into the technical aspects, benefits, and challenges of implementing state-of-the-art language models in a local environment, taking into account the difficulties associated with developing such models when handling sensitive information that cannot be exposed to the...
Add Favorite
Google Workspace Okta Webinar
During this on-demand webinar, we discussed: How to empower your security team: Equip your team with seamless access to essential tools, all while safeguarding sensitive data. Enterprise Shield: Navigate compliance demands and combat cyber threats, ensuring you’re prepared for the challenges of today’s digital ecosystem. Streamlined Identity: Centralize management for streamlined IT operations and consistent user experience.
Add Favorite
F5 SLED Lab Series: Go for Gold in F5 S...
F5 SLED Lab Series Introduction Webinar Attendees in this on-demand session learned how F5 Distributed Cloud and BIG-IP Next can help them overcome their IT curveballs and achieve their modernization goals.
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and c...
Add Favorite
Empowering the Employee - Diving Deep I...
In this on-demand webinar, attendees learned: What CX and UX means to federal IT decision makers Perceptions of the progress federal agencies have made in modernizing end user experiences How agencies measure success in their CX/UX strategies How to understand points for employees in working with their agency’s technology The role Chief Experience Officers play in improving CX/UX at federal agencies Thank you for joining us!q1
Add Favorite
Empowering the DOD Secure Workforce wit...
Palo Alto Networks Prisma Access DOD protects hybrid workforces with the superior security of ZTNA 2.0, while providing exceptional user experiences from a simple, unified security product. Purpose-built for cloud-enabled DOD agencies, Prisma Access DOD consolidates multiple point products into a single integrated service, reducing complexity while increasing organizational agility. With a common policy framework, consistent visibility, single...
Add Favorite
Streamlining Identity Hygiene & Access...
During this on-demand webinar, attendees learned how RSA Governance & Lifecycle enables agencies to: Reduce identity risk by providing centralized visibility and control of all user accounts and access. Maximize time and dollar investments with existing providers while enhancing the organization’s security posture. Streamline compliance by identifying Segregation of Duties violations, auditing all identities and access permissions,...
Add Favorite
Zero Trust at Scale: Securing Federal Data
Ensuring the security of sensitive data is critical for all federal agencies. The EO on Improving the Nation's Cybersecurity and OMB memorandum outline the value of a Zero Trust Architecture, where data is protected at every level of access. Accenture Federal Services built Zero Trust at Scale with Immuta on the Databricks Data Intelligence Platform to ensure federal teams can safely, and securely protect their most sensitive data seamlessly a...
Add Favorite
Back to Search Begin New Search