Back to Search Begin New Search Save Search Auto-Notify
Embracing Zero Trust: Strengthening Sec...
Attendees of this on-demand webinar experienced a comprehensive panel discussion on Zero Trust architecture, where we will delve into the key principles, components, and implementation strategies of this security model.
Add Favorite
Mind the Gap: The Importance of Persona...
As public sector teams incorporate the use of container-based technologies to solve technical challenges, the urgency to close skills gaps related to these solutions becomes apparent. How do our operations teams support this new technology? Why should our developers adopt it? How should they work together?Red Hat OpenShift, an enterprise-ready Kubernetes platform, provides teams with a consistent solution for managing hybrid cloud, MultiCloud...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Meeting the NSM-8 MFA Mandate With RSA
Explore our on-premises authentication offering, designed to cater to customers seeking a lightweight, self-contained MFA solution across various environments. In this on-demand webinar, we covered: A wide range of identity solutions, from air-gapped on-premises to Cloud. Security implications for different deployment scenarios. In-depth insights into the NSM-8 MFA mandate, ensuring your organization's compliance.
Add Favorite
Accelerating Data Integration in HHS
In our increasingly data-rich world, government agencies are grappling with the challenge of quickly and effectively integrating complex data sets to improve operations and citizen experiences. Digital government services across various programs, from health and human services to housing and food security, are often limited by complicated, siloed data. Legacy architectures and time-consuming integration processes can impede progress, ultimatel...
Add Favorite
Speed Up Housing Eligibility Determinat...
Background checks for housing assistance programs can be time-consuming, complex processes that delay the application process. This in turn, sets back housing assistance to those in need and result in increased costs to housing authorities, property managers and tenants. What if there was a way to run an instant check to help simplify and reduce additional research often necessary during the tenant screening process? View this complimentary on...
Add Favorite
FedRAMP Rev. 5 Baseline in OSCAL is Here
FedRAMP recently released Revision 5, setting the new standard for secure cloud services in government operations. Want to know more about the transition from Rev. 4 to Rev. 5? In this educational on-demand session, our FedRAMP experts gave unique perspectives on the transition. In this webinar, attendees learned: Important changes introduced in Revision 5 and why. How Cloud Service Providers (CSPs) can complete the transition to FedRAMP Rev 5...
Add Favorite
CMMC and Commoditizing Compliance Management
Alchemy Global Networks, Armis, and Carahsoft held a complimentary webinar to discuss how they had partnered as leaders in the government space to provide a holistic solution to compliance management by leveraging multiple vendors, including Splunk and others, to provide an unprecedented level of visibility into networks. Understanding Technical Debt & Point-in-Time Operations: Defined technical debt and its impact on IT environments, incl...
Add Favorite
Unleash Creative Superpowers with Adobe...
The demand for engaging content has never been greater. Government teams publishing public-facing messages, internal communications, documents, and reports often incorporate graphics and videos to strengthen their material. Agencies need simple tools that enable anyone to publish digital content on the go, no matter the level of design expertise. That’s where the transformative power of generative AI, combined with Adobe’s world-c...
Add Favorite
Optimize Security Operations On Your Ne...
At this demo desk, we discussed the following key capabilities of Forescout XDR in-depth: Reducing cyber and business risk by quickly detecting, rapidly investigating, and more intelligently responding to advanced threats. Full-spectrum Response automate responses via Forescout solutions to touch all managed & un-managed devices. Optimizing your security operations, eliminating alert fatigue by simplifying and accelerating the detection, i...
Add Favorite
Back to Search Begin New Search