Back to Search Begin New Search Save Search Auto-Notify
Transform Reporting Experience for Tabl...
Tired of spending hours formatting Tableau reports? Join us for a live webinar and discover how Pixel Perfect can help you generate print-ready, contextualized and sharable reports in seconds. Experts from USEReady will share key insights into the tool's features, its enterprise value and real-world success stories. During this webinar, attendees will learn: Contextualized Report Formatting: How Pixel Perfect simplifies formatting to create pr...
December 5, 2024
Organizer: USEReady Government Technology Team at Carahsoft
Location: Webcast
Add Favorite
AI and Analytics: Answering Healthcare'...
Unlock the power of advanced analytics with IPC Global and Qlik by joining our upcoming Healthcare Webinar Series. This carefully curated set of sessions focuses on key areas transforming your healthcare systems, from healthcare research and population health to grants management, supply chain optimization, and AI-powered operations. Whether you're looking to enhance decision-making, streamline operational processes, or modernize your work...
December 5, 2024
Organizer: Qlik Government Team at Carahsoft
Location: Webcast
Add Favorite
Unlock the Power of Your CMDB with Ivan...
You're invited to join Ivanti, Network Consulting Services, inc. (NCSi), and Carahsoft for a webinar on December 5th, 2024! Discover how Ivanti Neurons for IT Asset Management (ITAM) can add more functionality to your Configuration Management Database (CMDB). In this webinar, you will learn:The full lifecycle of your devices from acquisition to disposalHow to monitor software licenses and usageHow to prevent over-licensing and ensuring complia...
December 5, 2024
Organizer: Ivanti Government Team at Carahsoft
Location: Webcast
Add Favorite
Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
December 5, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Build an Elastic Supply Chain for Busin...
Business growth is a CEO’s top priority, but increasing geopolitical instability presents a significant challenge to companies’ growth prospects. To support their company’s growth targets, chief supply chain officers (CSCOs) are tasked with designing a geopolitically elastic supply chain that can effectively adapt and drive growth amid geopolitical tension. An elastic supply chain is the strategic practice of building a chang...
December 5, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
FAS and Buy.GSA.Gov Overview
GSA Events offers a wide variety of training opportunities for your agency. The training is free, and you can earn Continuous Learning Points (CLPs) for attending all classes. With these recurring training opportunities, GSA provides overviews of acquisition support that is available to our federal customers and Military! All developed to make your acquisition work easier and more efficient while achieving cost savings! Mark your calendar righ...
December 5, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way. Join CyberArk and Optiv + ClearShark's leaders on December 5th as they share insights and "confessions" into implementing Zero Trust security principles, emphasizing that it...
December 5, 2024
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
Meeting Network Analysis & PCAP Requirements
Trellix Network Security won the NAVWAR Cybersecurity Challenge at identifying never-seen-before (“signature-less”) attacks by observing network activity. It also received the Gold Globe Cyber Security Global Excellence Award for Network Detection & Response (NDR). Think of “NDR” as a sibling to “Endpoint Detection & Response (EDR)” working together to detect threats and optimize the response to inci...
December 5, 2024
Organizer: Trellix Government Team at Carahsoft
Location: Webcast
Add Favorite
Reimagining Digital Efficiency: A Bluep...
Balancing increasing workloads with limited resources and tight deadlines is a constant challenge for state and local agencies. Learn how Atlassian's System of Work and agency implementation can streamline agency operations, improve efficiency and enhance services. In Part 1 on Thursday, December 5th, learn about the core principles of the System of Work, real-world examples and how to apply Atlassian solutions to your specific agency chal...
December 5, 2024
Organizer: Atlassian Government Team at Carahsoft
Location: Webcast
Add Favorite
The Low-Down: Network & Cloud Security...
Join Juniper Networks & Carahsoft for an informative webinar where we will explore the critical aspects of network and cloud security for SLED organizations. Learn how to design and implement robust security measures to safeguard your sensitive data and systems. In this webinar, attendees will hear Juniper SME's discuss:Introduction to Network and Cloud Security: Gain an understanding of the importance of a well-designed security architect...
December 5, 2024
Organizer: Juniper Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search