387 webcasts found
+ 49 past events found
Back to Search Begin New Search Save Search Auto-Notify
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Call Center to Action: Splunking Your G...
Join us as we discuss how to build an integrated view of your contact center operations that will provide real time insights into what your customers are experiencing and how your applications, processes, and agents are performing. Genesys offers a best in-breed contact center as a service solution that integrates with Splunk, collecting data around conversations, missed opportunities, workforce management, and system performance. Splunk ties...
Add Favorite
AvePoint Webinar: Modernizing Governmen...
Government agencies have significantly accelerated their digital transformations in the wake of the pandemic. With AvePoint's portfolio of SaaS solutions recently receiving FedRAMP Authorization, they can continue to accelerate this transformation while ensuring their collaboration is compliant and secure. This includes an automated workspace management system to increase security and data protection across all Microsoft 365 workspaces that wi...
Add Favorite
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Add Favorite
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
Add Favorite
Securing Hybrid Learning in an Evolving...
K-12 education institutions are vulnerable to cyber-attacks and ransomware. With an increase in hybrid learning environments, education institutions have been forced to rethink their cybersecurity approach. Determining the right security solution can become quite complex for K-12 institutions given the amount of vendors in the market and the limited staff and funding. Fortunately, an intrinsic security approach simplifies your security strateg...
Add Favorite
DocuSign Demo Desk
As government agencies continue to face unprecedented challenges, human resource teams are adapting to find what works now and for the future. Modern human resources and procurement teams rely on DocuSign to manage the never ending workforce expansion and contraction more efficiently. Employees now represent only 58% of workforce spend, with the other 42% going to external resources. Our team here at Carahsoft will help your agency learn how y...
Add Favorite
Four Ways the Pandemic Has Forced Gover...
The urgency of the pandemic has forced state and local governments to react when it comes to budgeting– making short-term reporting on an annual basis the focus rather than proactively assembling long-term strategic budget plans. This reactive approach creates redundancies, cost inefficiencies, and fails to set governments up for any potential future crises; and is especially detrimental when budget transparency and community impact are...
Add Favorite
Roadmap to Modernization: Funding the Future
As offices across the federal government continue to adopt new technologies and modernize their systems, it’s essential that when doing so, they consider how best to budget and finance their increasingly complex projects. From capital funds to congressional approval, the means and methods by which organizations procure and profit from these advancements are as plentiful as they are complex.In this next installment of our IT Modernization...
Add Favorite
Simplifying IT Security for the Classro...
Back to business as usual: Ensuring your WAN is secured with GCOM, Fortinet SD-WAN and Carahsoft Network engineering and operations leaders have struggled to incorporate digital innovation initiatives at branch and remote locations due to the limits of traditional WAN infrastructure. SD-WAN is increasingly seen as the solution for addressing these problems. Join Fortinet, GCOM and Carahsoft as we explore a true secure SD-WAN solution to help g...
Add Favorite
Back to Search Begin New Search