Back to Search Begin New Search Save Search Auto-Notify
Veritas & Everfox: Secure Cross Domain...
Data is the lifeblood of your organization. If something were to happen to it, especially when it is vulnerable during large transfers, the damage could be disastrous. To minimize this risk, Veritas and Everfox have come together to offer a joint-solution: Cross Domain data backup that meets Raise The Bar guidelines. Attendees joined our Carahsoft demo team for a display of this interaction, learned how their organization can incorporate these...
Add Favorite
Accessibility Solutions for Partners: C...
As part of our commitment to driving innovation and inclusivity, we presented a session focused on the importance of accessible Salesforce implementations, ensuring that people with disabilities can perform their work independently and effectively. This session focused on helping customers meet their compliance objectives and align with best practices in inclusivity and accessibility.Attendees gained valuable insights into creating more inclus...
Add Favorite
Can Mobile Security & Privacy Coexist?
State and Local Governments face heightened cybersecurity risks due to their critical role and resource constraints. Attendees joined Quokka experts on July 30th as they explore common security weaknesses found in mobile apps. Hear strategies that can strengthen your mobile security and mobile app development. Attendees registered to:Identify common mobile app security weaknesses and how they can be leveraged to extract valuable dataNavigate t...
Add Favorite
Bridge Conditions & Economic Inequity m...
The $9.6 billion in grants provided for the Bridge Invest Program funded by the Infrastructure Investment and Jobs Act allows us to target high value opportunities for improving the quality of our bridges. The National Bridge Inventory database includes helpful information such as the Average Annual Daily Travel for each bridge, but it does not include the trip types, the origins/destinations of those trips, or user demographics/characteristic...
Add Favorite
ServiceNow Federal Creator Studio Virtu...
This half-day, hands-on, no-code Creator Studio Innovation Workshop showed how organizations can re-imagine their approach to automation and app development with ServiceNow's Creator Workflows. Attendees learned how to boost productivity at scale by building high-value, no-code mission apps with Creator Studio. Whether you're a pro developer of any level looking to streamline repetitive tasks, a business process owner looking for ways to solve...
Add Favorite
CTO Sessions: Best Practices for Data i...
High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. So, what is the best way to protect network traffic? Encrypt ev...
Add Favorite
2024: FAR Part 52, Solicitation Provisi...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
Transform Public Sector Pay with Earned...
Curious about transforming public sector pay? Attend the next DailyPay event or webinar hosted by Carahsoft.Attendees learned about:The benefits of changing how you pay your employees.Boosting recruitment and retention by adding new benefits like earned wage access (EWA).Implementing EWA without changing your payroll systems.Empowering employees with control and peace of mind.
Add Favorite
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some...
Add Favorite
5G for the Tactical Edge
Participants in this webinar discovered how the US Department of Defense collaborated with technology providers to enhance 5G capabilities for mission-critical applications in tactical edge networks.
Add Favorite
Back to Search Begin New Search