Back to Search Begin New Search Save Search Auto-Notify
FortiGate and SD-WAN
Discover the power of FortiOS and how it is leveraged to create secure and efficient network architecture. Firewalls, the backbone of any network’s cybersecurity architecture, need to level-up in order to support the demands of the modern world. Especially as SD-WAN (Software-Defined Wide Area Networks) becomes more prevalent across the nation as networks expand to cover more edges, the need for tools that are both powerful and easy to u...
Add Favorite
Introduction to F5 BIG-IP Next
F5 hosted a virtual lab about the Next generation of BIG-IP software. During the lab, experts Ryan Johnson, Ammar Jaghlit, and John Vernetti provided live demonstrations as well as answered any questions about BIG-IP Next. In this hands-on lab, attendees learned:How to manage BIG-IP Next data plane nodes using the Central Manager GUIHow to deploy and operate applicationsWhat a classic BIG-IP migration to Next entailsHow to protect applications...
Add Favorite
Empowering Virtual Training in Governme...
In today's digital landscape, government agencies are increasingly turning to virtual platforms for training, education, and seminars. This transition requires sophisticated tools and strategies to ensure seamless and effective experiences. As technology reshapes how government agencies like the Department of Commerce (DOC) and its sub-agencies approach these initiatives, it's crucial to stay updated with best practices and emerging trends. Wa...
Add Favorite
Modernizing Government ERP Systems to I...
Enterprise resource planning (ERP) systems are integral to streamlining operations and centralizing data. But rigid architecture can make it difficult to adapt to modern technologies or tailor to evolving mission requirements. And upgrading ERP systems can be lengthy, disruptive, and costly. Attend this webinar to explore a proven approach to ERP modernization: a low-code agility layer to unlock adaptability and empower business users to drive...
Add Favorite
Splunk Attack Analyzer Webinar
Participants joined us for a webinar with Splunk to learn how Splunk Attack Analyzer can help them. Splunk Attack Analyzer automates the analysis of suspected malware and credential phishing threats. Unlike other analysis tools that require cumbersome manual workflows, the solution automatically follows and analyzes each step in complex attack chains to get to the final payload. Splunk Attack Analyzer renders a verdict and extracts forensics t...
Add Favorite
Babel Street GEOINT Webinar
Learn how to ensure your geolocation data is up-to-snuff and empowers, not hinders, your analysis! Geolocation analysis offers a powerful tool for understanding spatial trends and patterns. However, the accuracy and reliability of derived insights fundamentally depend on the data quality. Rarely does the required data come off the shelf and ready for analysis without additional cleansing, enriching, and standardizing. Attendees of this webinar...
Add Favorite
Rethink Your Contact Center with CloudHesive
On Thursday, June 6, CloudHesive, Amazon Web Services (AWS) and Carahsoft hosted an engaging webinar on the dynamic world of contact centers. Navigating attendees through the latest transformations in contact center operations and learning strategies to thrive in this ever-evolving industry. Attendees of the webinar left with a deeper understanding of:The contact center spaceThe ConnectPath CX solution and its benefitsCurrent trends in contact...
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Add Favorite
Gemini for Google Workspace: Developing...
Gemini for Google Workspace is a powerful collaborative partner that can act as an effective prompt, thought partner, source of accuracy and productivity booster—all while ensuring every user and organization has control over their data. In this session, attendees learned about:Leveraging generative AI for enhanced efficiencyPrioritizing public sector use cases for maximum impactPractical examples and best practices tailored to governmen...
Add Favorite
Lunch Bytes Webinar Series
Instead of settling for a regular break, participants joined Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Participants upgraded their lunch time with Public Sector Solutions Engineer, Matt Gardner, as he shared tactical insights and practical use cases on the following topics across four 30-minute sessions.
Add Favorite
Back to Search Begin New Search