Back to Search Begin New Search Save Search Auto-Notify
Microsoft Speed Data-ing Series
Microsoft Federal’s Speed Data-ing efforts emphasize their compliance with stringent security and data protection standards required by the DoD. We discuss topics like multi-factor authentication, encryption, and advanced threat protection to assure DoD customers of the safety and integrity of their sensitive information. Additionally, we leverage partnerships and certifications, such as our Azure Government offering, which is specifical...
Add Favorite
Gain Inspiration from Relatable Tales o...
Calling all graphic designers, videographers, and storytellers interested in learning how Adobe Substance can jump-start creative workflows. Adobe Substance 3D allows for users to expand their knowledge of 3D creation while also enabling 2D artists to start their journey into the 3D space. Watch our on-demand webinar to hear possibly true stories of customers using Adobe Substance 3D plus Creative Cloud to tackle projects with fun and ease. Sp...
Add Favorite
The Next Era of Financial Controls
Deep process understanding is the path to a clean audit. Leveraging process mining can help to unlock financial data and drive faster remediations. In this on-demand webinar, attendees discovered how their agency can alleviate financial audit pressure by leveraging a data-driven approach, regardless of your priorities. Celonis views the Annual Financial Report as a reflection of the financial process complexity aiding government in: Meeting fi...
Add Favorite
Simplified Government Experiences Your...
Government services must be accessible, inclusive, and user-focused as public services become increasingly digitized. The delivery of equitable, integrated customer and employee experiences requires flexible and secure technology that connects the government with people and allows the exchange of information and expertise across agencies. Watch this four-part webinar series on-demand to hear Adobe experts as they explore best practices and sh...
Add Favorite
Predictive Clinical Decision Support So...
Cutting-edge analytics capabilities play a pivotal role in the preoperative prediction of high-risk patients, enabling surgical teams to proactively prepare for complex cases. This exemplifies the power of data-informed insights in facilitating well-informed decisions and optimizing patient outcomes. By leveraging the Dss Healthcare Analytical Solution and Cloudera Data Platform (CDP), healthcare organizations gain the necessary tools to effe...
Add Favorite
Hybrid/Multi-Cloud Data Managment and S...
Attendees joined this Cohesity webinar to learn about how Cohesity can define multi-cloud data management platform for their data and apps. Cohesity natively integrates with AWS, Azure and GCP along with other cloud service providers to extend on-premises data management solution to proven public cloud services. All through a single UI, users can now scale their data center into the Cloud with the flexibility, security, and control from Cohesi...
Add Favorite
Identity: Powering Enterprise Cybersecu...
Attacks on privilege, identities and access are relentless and the stakes are higher than ever. Identity is the new perimeter— and privileged access management (PAM) is a cornerstone of modern identity and access security. Identity and access security talks to the tools, processes, and policies that determine the right individual can access the right resource, at the right time, for the right reason, to complete their objective. To achie...
Add Favorite
Safeguarding Your Identity: The Power o...
CrowdStrike’s Identity Threat Protection is a comprehensive solution designed to defend against identity-based attacks and protect agencies and organizations from the ever-increasing risks of identity theft & fraud. Attendees discovered how CrowdStrike, a global leader in cloud-delivered endpoint and workload protection, has extended its expertise to address the critical need for identity protection in today’s digital landscape...
Add Favorite
Identity Security for the Public Sector...
Ransomware and other cyber threats targeting the public sector are on the rise. Today's attackers often have a common focus: infiltrating your identity systems, typically Active Directory (AD) or Azure (now Entra ID) for most organizations. An identity breach can lead to data theft, malware insertion, and ransomware attacks that can shut down the entire network — and your operations. Protecting the identity perimeter requires an understa...
Add Favorite
Achieving CMMC - Tangible Lessons from...
Attendees of this webinar heard directly from CMMC Subject Matter Experts with diverse perspectives on achieving CMMC compliance, including Redspin, a C3PAO that has conducted live joint surveillance assessments; PreVeil, an encrypted email and file sharing platform provider; Cyturus Technologies, a compliance and risk management platform provider; and Carahsoft, a Master Aggregator supporting the Defense Industrial Base. Attendees learned:Com...
Add Favorite
Back to Search Begin New Search