Back to Search Begin New Search Save Search Auto-Notify
Achieving Zero Trust with Kiteworks ...
In this webinar, attendees explored:How to leverage Kiteworks & Proofpoint to consolidate and control third-party communications across email, file sharing, MFT, SFTP, web forms, chat, collaboration spaces, or via APIs.Strategies for achieving content-defined zero trust to comply with federal and central government mandates like Executive Order (EO) 14028.Methods for demonstrating compliance with industry regulations and international stan...
Add Favorite
Nuxeo Deployment - Hyland Webinar for the EPA
Hyland's Nuxeo Platform revolutionizes enterprise content management with its cloud-native, low-code approach. Built on a scalable, modular architecture, Nuxeo ensures high performance even under the heaviest workloads, offering flexibility in deployment across various environments. Individuals from the EPA joined Hyland and AWS experts on August 16th for a webinar that demonstrated how the EPA can leverage Nuxeo for:Migration off Legacy Syste...
Add Favorite
Maximize Productivity with Enhanced Dig...
Adobe is empowering agencies to transform their manual document processes into efficient digital ones with Adobe Document Cloud – featuring the world’s leading PDF and e-signature solutions. Adobe Acrobat solutions can help address the hurdles that are often encountered in sending out documents for signature, creating forms, and digitizing older content. Additionally, Adobe Acrobat Sign is empowering users to deliver fast, legal, a...
Add Favorite
Anatomy of a Ransomware Attack: Protect...
Ransomware attacks are becoming alarmingly frequent and sophisticated. They pose severe risks to healthcare providers by compromising patient data, disrupting critical services, and imposing substantial financial burdens. According to data from the Zscaler ThreatLabz 2024 Ransomware Report, healthcare was a prime target of ransomware attacks throughout 2023 and into 2024, seeing a 126% increase year-over-year in the number of attacks.Understan...
Add Favorite
Using the Tableau Catalog + Lineage
During this webinar, attendees:Explored how Tableau Catalog provides a comprehensive view of data lineage, tracing data from its origin to its consumption, helping organizations ensure data quality and compliance.Learned how to effectively navigate Tableau Catalog to explore and understand the relationships between data assets, workbooks, and dashboards. Explored the role of Tableau Catalog in enhancing data governance practices within organiz...
Add Favorite
Salesforce Los Angeles Innovation Day
Those who attended Salesforce's LA Innovation Day gained insight on key topics surrounding: Digital Transformation in LA: Insights and strategies from Ted Ross, CIO of LA.Salesforce Solutions: Including C360 for Citizen Services and other demos.Transportation Planning for LA28: Panels on preparations for the 2028 Olympics.Educational Innovations: Learn more about K12 and Higher Ed solutions.
Add Favorite
From the Frontlines: Lessons learned fr...
Deploying Zero Trust for an Operational Technology network differs from deploying it on an IT network. Dragos and BlastWave have learned hard lessons with customers on the best practices for deploying OT Zero Trust in the real world and shared these lessons with attendees. They also explored how the pillars of the multiple OT cybersecurity frameworks (NIST, DoD, NIS2, etc.) are combined to provide a deployable solution for critical OT networks...
Add Favorite
Enhancing Homeland Security Operations...
In today's fast-paced digital environment, the Department of Homeland Security (DHS) faces complex challenges in maintaining robust IT operations and ensuring the security of critical infrastructure. This webinar included the transformative potential of Splunk IT Service Intelligence (ITSI) to streamline and enhance IT operations within DHS. Participants joined us as we explored how Splunk ITSI’s advanced analytics, machine learning capa...
Add Favorite
Transform Your Printing Operations - Tu...
Participants joined the Tungsten Automation webinar to learn more about how Printix could transform their printing operations and unlock new possibilities for their business. Printix was introduced as a cloud-based print management solution that offered a comprehensive print infrastructure and secure printing environment. It was designed to enhance efficiency, productivity, and cost savings for businesses of all sizes. By eliminating the need...
Add Favorite
Using PPKs for Post-Quantum Security in...
Accelerating advancements in quantum computing are making the prospect of breaking classical cryptography more real with every passing today. Organizations rely on firewall site-to-site IPSec VPN security to protect their critical data. However, threat actors are already storing encrypted communications today to decrypt in the future, using quantum computing or other advanced capabilities (aka “Harvest Now, Decrypt Later”). IPSec V...
Add Favorite
Back to Search Begin New Search