Discover and Create with Helpful Tools...
Adobe Premiere Pro is the industry-leading standard for video editing, giving users all the tools they need to successfully create a project and edit it from start to finish. From animations, caption creation, titles, transitions, and more, there's always something to discover within Adobe Premiere Pro, making it easy to find what you need to build your skills step-by-step. Watch our on-demand webinar to discover how Adobe Premiere Pro allows...
Engage Your Citizens in New Ways with M...
Discover how to harness the power of Salesforce Marketing Cloud to modernize digital government service delivery for government agencies. Download this webinar to learn how Marketing Cloud works with your existing Salesforce install to create seamless, unified experiences for your citizens and employees, allowing you to drive maximum value across your organization. During this webinar, we covered: How marketing cloud works with your existing S...
How U.S. Federal Agencies Can Apply TIC...
In this webinar speakers reviewed how US Federal agencies can apply Trusted Internet Connection (TIC) 3.0 to AWS workloads, as well as the AWS Year-End Savings (YES) Promotion for select AWS Services, available from June 8, 2023 to September 30, 2023. AWS subject matter experts discussed: What is the TIC initiative TIC 2.0 vs. TIC 3.0 differences TIC 3.0 controls How TIC 3.0 aligns with Zero Trust Applying TIC 3.0 framework to AWS workloads by...
Carahsoft and SuccessKPI Modernize the...
Learn how Carahsoft technologies and SuccessKPI work with government agencies to transform and modernize the physical and digital contact center. Hear first-hand from Maximus and SuccessKPI on how to support this transformation while managing the changing workforce with AI-powered, advanced data analytics to improve the citizen and employee experience. Watch this on-demand webinar and take away the following learning objectives: Best practices...
Tenable Active Directory Security Solut...
Discover and prioritize Active Directory vulnerabilities and misconfigurations to disrupt attack paths before attackers exploit them. Tenable Active Directory security prevents and detects sophisticated attacks such as Brute Force, DCShadow, DCSync, password spraying, and more without agents and privileges. Agencies can deploy Tenable Active Directory security anywhere, on-prem, or leverage the cloud. Demo highlights included: Discovering und...
Enhancing Recovery from Natural ...
Attendees of this webinar listened as VMware's Senior Staff Solutions Engineer, Matthew Place, discussed: What is a disaster? Disaster Recovery vs. Ransomware Recovery – how are they different? A review of VMware disaster recovery capabilities A demo of a recovery scenario Register to view this on-demand recording.
3 Ways to Improve Amazon RDS Scale 20x...
In this webinar, Roland Lee, Vice President of Product at Heimdall Data immersed attendees in a discussion about how one can improve Amazon Relational Database Services (RDS) scale 20x without any application changes. Heimdall Data Proxy modernizes applications by improving the performance of your current database. In this webinar, attendees learned how Database Proxies: Free up operations by automating Active Directory authentication and auth...
The Journey To Unified Observability
During this webinar, attendees learned: The different levels of IT maturity along the IT Management Journey The difference between reactive, manual approaches, and automated solutions How agencies can identify where they are in the journey and how to progress towards Unified Observability How Unified Observability cuts costs, reduces risk, while simultaneously improves productivity and increase mission success Register to view this on-demand...
The New National Cybersecurity Strategy...
Attendees of this webinar joined OPSWAT for a discussion around the new National Cybersecurity Strategy, that builds upon previous efforts, such as Zero Trust, to bolster protections to secure America’s cyberspace and its digital ecosystem. The reliance on critical infrastructure makes those who manage it big targets for nation-state and ransomware attacks, as well as any members of the Defense Industrial Base that are managing the criti...
M-21-31: Achieve Compliance through Com...
Attendees of this Axonius, Splunk & Carahsoft webinar learned: How to gain true visibility of your entire attack surface How to meet recent federal regulations mandating regular and comprehensive logging management How to optimize your internal logging management to aid in addressing increasingly sophisticated threats How asset visibility and logging can shore up resiliency across progressively complex IT, security and operations cyber env...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.