3,162 past events found
Back to Search Begin New Search Save Search Auto-Notify
Cyber Threats & Lessons Learned from 20...
View this on-demand webinar to review some of the most impactful hacks from 2021 and the key takeaways for protecting critical data and infrastructure as we enter into the new year of 2022. Topics discussed include: A review of some of the most effective hacks of 2021 such as the Colonial Pipeline ransomware incident, SolarWinds supply chain attack, Microsoft Exchange hack, NSO Group Apple iOS hack with Pegasus, and more. Why an understanding...
Add Favorite
Protect Your Agency's Data with Rubrik...
View this on-demand webinar discover how Rubrik and Clearshark can defend your agency's data against cyber attacks. Experts from Rubrik and Clearshark discuss how Rubrik's unique immutability and zero trust architecture, integrated with Clearshark's innovative solutions, instills confidence that your organization's data can be quickly and accurately recovered. Our featured speakers dive into the industry- changing Rubrik and Clearshark integr...
Add Favorite
Delivering Secure and Personalized Stud...
Today's academic institutions are under increasing pressure to use the latest technologies to attract and retain students. Online learning is a way of life now and for the next generation. Meanwhile, faculty and staff also need to work safely and securely from any location. Across the board, users have higher expectations about their consumer technology experiences. Watch this on-demand webcast to learn how your institution can: Deliver excep...
Add Favorite
F5 & NGINX Kubernetes Ingress Controller
As government and education organizations continue to embrace modern application development processes, we are seeing an increased demand for NGINX expertise and experience in new job openings. View this on-demand recording focused on helping organizations leverage NGINX solutions to position and effectively support the industry shift towards modern application development processes (containers, Kubernetes, micro-services, DevOps, and DevSecO...
Add Favorite
Implementing a Digital Mailroom
Technology advancements, like Artificial Intelligence (AI), are enabling state agencies to automate like never before. Challenges such as augmenting human review of incoming documents, handling the transition to REAL ID, and preventing fraud must be considered when deciding which technologies to utilize. This on-demand webinar series ensures that you are aware of the latest options to tackle your agency's document demand. View this on-demand w...
Add Favorite
DNS Security Data Exfiltration Workshop
View our on-demand recording enablement security workshop. In June 2020, the NSA Cybersecurity Director said that securing DNS can stop 92% of malware attacks on a network. Next-gen firewalls and endpoint tools have left behind DNS-based security blind spots. This workshop will walk system engineers through the conceptual abstracts of DNS security and bring a hands-on demonstration to enable attendees to test a network for DNS security gaps....
Add Favorite
HPE GreenLake Managed Hybrid Cloud Solu...
HPE understands that the traditional mode of purchasing IT infrastructure often results in provisioning capacity that's too high or too low for your IT needs. GreenLake can help agencies minimize initial investments, align cash flow to actual capacity usage, and allow for quick provisioning of additional IT capacity when needed. The infrastructure platform provided under GreenLake provides the fundamental benefits of an economic, agile, and s...
Add Favorite
AWS Spotlight Series: Modernizing Your...
View this on-demand webinar to hear Steve Bartolo, Vice President of Architecture Services at mLogica, where he discussed innovative new tools and technologies that enable secure and automated migration of your applications and data to the cloud, even for the most complex systems, with minimal disruption to daily business operations.
Add Favorite
Strong Security Starts with Strong IT O...
Splunk ITSI is a premium analytics solution that correlates and applies machine learning to infrastructure, application, and business data for 360° service monitoring, predictive analytics, and streamlined incident management. Unlike point event management or IT monitoring solutions, ITSI correlates and applies machine learning to metric, log, and trace data for end-to-end intelligence across your entire environment. ITSI also combines vie...
Add Favorite
Google Cloud CCAI Webinar
Watch this on-demand webinar to learn more about: Google’s partnership with IVR vendors and native integrations with your existing vendors today Real customer use cases and TCO/Benefits Dialogflow CX overview and demo
Add Favorite
Back to Search Begin New Search