2,644 past events found
Back to Search Begin New Search Save Search Auto-Notify
Informatix' Seamless Child Support Paym...
In this webinar, Daniel King, Director of Business Development at Inforatix, Inc., and Ethan McKinney, Child Support Enforcement Leader at AWS, discussed the transformative power of iPayOnline™, an innovative payment portal built on AWS cloud infrastructure. Designed specifically for Employers and Individual child support obligors, iPayOnline™ offers a secure and convenient platform to schedule one-time and recurring payments using...
Add Favorite
Meeting the NSM-8 MFA Mandate With RSA
Explore our on-premises authentication offering, designed to cater to customers seeking a lightweight, self-contained MFA solution across various environments. In this on-demand webinar, we covered: A wide range of identity solutions, from air-gapped on-premises to Cloud. Security implications for different deployment scenarios. In-depth insights into the NSM-8 MFA mandate, ensuring your organization's compliance.
Add Favorite
Accelerating Data Integration in HHS
In our increasingly data-rich world, government agencies are grappling with the challenge of quickly and effectively integrating complex data sets to improve operations and citizen experiences. Digital government services across various programs, from health and human services to housing and food security, are often limited by complicated, siloed data. Legacy architectures and time-consuming integration processes can impede progress, ultimatel...
Add Favorite
Speed Up Housing Eligibility Determinat...
Background checks for housing assistance programs can be time-consuming, complex processes that delay the application process. This in turn, sets back housing assistance to those in need and result in increased costs to housing authorities, property managers and tenants. What if there was a way to run an instant check to help simplify and reduce additional research often necessary during the tenant screening process? View this complimentary on...
Add Favorite
Predictive Clinical Decision Support So...
Cutting-edge analytics capabilities play a pivotal role in the preoperative prediction of high-risk patients, enabling surgical teams to proactively prepare for complex cases. This exemplifies the power of data-informed insights in facilitating well-informed decisions and optimizing patient outcomes. By leveraging the Dss Healthcare Analytical Solution and Cloudera Data Platform (CDP), healthcare organizations gain the necessary tools to effe...
Add Favorite
Hybrid/Multi-Cloud Data Managment and S...
Attendees joined this Cohesity webinar to learn about how Cohesity can define multi-cloud data management platform for their data and apps. Cohesity natively integrates with AWS, Azure and GCP along with other cloud service providers to extend on-premises data management solution to proven public cloud services. All through a single UI, users can now scale their data center into the Cloud with the flexibility, security, and control from Cohesi...
Add Favorite
Identity: Powering Enterprise Cybersecu...
Attacks on privilege, identities and access are relentless and the stakes are higher than ever. Identity is the new perimeter— and privileged access management (PAM) is a cornerstone of modern identity and access security. Identity and access security talks to the tools, processes, and policies that determine the right individual can access the right resource, at the right time, for the right reason, to complete their objective. To achie...
Add Favorite
Safeguarding Your Identity: The Power o...
CrowdStrike’s Identity Threat Protection is a comprehensive solution designed to defend against identity-based attacks and protect agencies and organizations from the ever-increasing risks of identity theft & fraud. Attendees discovered how CrowdStrike, a global leader in cloud-delivered endpoint and workload protection, has extended its expertise to address the critical need for identity protection in today’s digital landscape...
Add Favorite
Identity Security for the Public Sector...
Ransomware and other cyber threats targeting the public sector are on the rise. Today's attackers often have a common focus: infiltrating your identity systems, typically Active Directory (AD) or Azure (now Entra ID) for most organizations. An identity breach can lead to data theft, malware insertion, and ransomware attacks that can shut down the entire network — and your operations. Protecting the identity perimeter requires an understa...
Add Favorite
Achieving CMMC - Tangible Lessons from...
Attendees of this webinar heard directly from CMMC Subject Matter Experts with diverse perspectives on achieving CMMC compliance, including Redspin, a C3PAO that has conducted live joint surveillance assessments; PreVeil, an encrypted email and file sharing platform provider; Cyturus Technologies, a compliance and risk management platform provider; and Carahsoft, a Master Aggregator supporting the Defense Industrial Base. Attendees learned:Com...
Add Favorite
Back to Search Begin New Search