Back to Search Begin New Search Save Search Auto-Notify
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Add Favorite
How to Maximize Revenue Through Cost Al...
Traditionally, cost allocation and indirect cost planning seem like an ancillary matter in the scheme of all that leaders in state, local, and tribal governments have to do. However, reporting the true cost of services agency-wide is hard to capture, especially in the wake of COVID-19 bringing revenue shortages, and several grants and funding streams to navigate.The challenges that are compounded when individual departments complete their fina...
Add Favorite
Being Data Driven Through Crisis: How O...
Digital transformation is on the roadmap of every company. What happens when transformative change is driven by disruption and crisis? Hear inspirational stories from government customers who found creative data and analytics solutions during COVID-19 pandemic that were critical to their organization. Join us for the second webinar on Healthcare: Transformation & Readiness in response to COVID-19, and discover how Tableau can help you to r...
Add Favorite
Navigating the Security Maze of the Rem...
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures. The new remote work and remote learner environments provide attackers with a new entry point which they can exploit more easily than the well-defended network used in the past. Leveraging malware po...
Add Favorite
Why Mezzanine Helps Achieve the Best Si...
With teams distributed around the country, federal agencies need to collaborate effectively. Remote meetings are the new standard, and they require participants to share and view content in real-time. With current collaboration solutions, only one person can share content at a time, resulting in poor engagement and making situational awareness difficult. Oblong's Mezzanine solution allows you to share 10 live streams of information simultaneou...
Add Favorite
Transform Windows 10 with VMware Modern...
Windows 10 opens the door for you to transform siloed desktops, mobile device and application management, and adopt a unified approach across your organization with its new cloud-based management framework known as Modern Management. Modern Management represents a shift in the Windows management process to support the delivery of policies, updates, patches, and applications from the cloud. Windows 10 enables cloud-based delivery of security po...
Add Favorite
Remote Work with NVIDIA: GPU Accelerate...
As the public sector is called upon to address society's most pressing challenges, teleworking has become a crucial way for employees and contractors to maintain continuity and responsiveness. With NVIDIA Quadro RTX-powered laptops, virtual workstations, and cloud computing, you can tackle critical day-to-day tasks and compute-heavy workloads--from home or wherever you need to work. By attending this live CPE webinar, you'll learn: How the pow...
Add Favorite
Dragon Speech Recognition: Increased Pr...
Join us for this webinar and see how Dragon Speech Recognition Solutions enables you to keep up with documentation productivity and generate reports with higher detail and accuracy while accelerating professional documentation. From transcribing committee meetings and correspondence to drafting hearing notes and reports, Dragon Speech Recognition Solutions let you do it all—faster and more efficiently. You can increase your productivity...
Add Favorite
Splunk: Driving Patient Privacy
Patient privacy is an ever-growing concern within our medical community. Join Splunk, True Zero Technologies, and Carahsoft to learn how Splunk uses data from all data sources to identify breach or leak incidents concerning ePHI.During this webinar, we will discuss how:Proactive measures and real time response to security breaches or unauthorized access attempts help ensure privacy of patient informationImplementing these protective measures h...
Add Favorite
News Flash: Splunk's Real-Time Monitori...
Monitoring is evolving into observability to find the "unknown, unknowns" that impact DOE's business, SLAs, and critical applications. Join Splunk for a DOE-focused webinar on detecting, investigating, and diagnosing problems easily with end-to-end observability leveraging Splunk's SignalFx. During this webinar, attendees will go over the following topics: Modernize Legacy Services and Applications:Correlate applications and infrastructure reg...
Add Favorite
Back to Search Begin New Search