Back to Search Begin New Search Save Search Auto-Notify
How to Thrive in a Secure Multi-Cloud World
During this workshop, attendees listened as VMware subject-matter experts discussed: Benefits of VMware Cloud on premise and public cloud (Azure, AWS, and Google) Hardening your environment against ransomware and other data breaches Recovering from a ransomware attack or data breach
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
New Student Enrollment: Data Informed I...
Historically higher ed institutions have struggled to capture, access, understand, and report on their data to achieve performance goals such as enrollment, retention, and student success. Attendees learned how Tableau makes it simple to visualize key performance metrics, such as enrollment data to understand trends, patterns, and potential challenges that impact student success. During this on-demand webinar, attendees: Heard use cases from r...
Add Favorite
An Introduction to Advanced Analytics
Watch this Alteryx hands-on-lab for an interactive session on conducting end-to-end analysis. Two Alteryx Sales Engineers, unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, attendees get hands-on and learn how to apply the techniques for themselves. Attendees learned...
Add Favorite
Locked and Loaded: Navigating Ransomwar...
Arete is transforming the way organizations prepare for, respond to, and prevent cybercrime. Their team responds to thousands of ransomware incidents and helps organizations get back up and running after attacks. By collecting data from these incidents, they create unparalleled insights into the ransomware landscape. They focus on security so you can focus on serving your customers and communities. Ransomware is a threat to businesses, governm...
Add Favorite
Using Data and Analytics to Increase Pu...
Law enforcement agencies are under pressure to adhere to consent decree agreements, but this can be a time-consuming, resource-intense, and expensive process that can have measurable impact on the ability to improve public safety. Being able to access, analyze, and report on consent decree data can help law enforcement leaders enable more informed decision-making and move them from paperwork to public safety. This on-demand webinar discussed...
Add Favorite
AI in Action: Explore Best Practices on...
Amidst external threats and changing technologies, today’s federal IT leader’s face numerous challenges of security and operations when it comes to developing and preparing for the next generation of AI and data security solutions. Though no shortage of uses for so-called “AIOps” exist, and myriad tools for deployment are available, many leaders remain at a crossroads on what’s next- everything from proper researc...
Add Favorite
Achieving an Uninterrupted Business wit...
As cyber-attacks continue to grow in frequency, severity, and sophistication, the solutions used to combat them also need to adapt and improve to meet the needs of organizations. Zerto, a Hewlett Packard Enterprise company, helps state and local entities protect, recover, and move their data and applications for continuous availability across on-premises, hybrid, and multi-cloud environments. During this on-demand webinar, attendees can expect...
Add Favorite
Microsoft Speed Data-ing Series
Microsoft Federal’s Speed Data-ing efforts emphasize their compliance with stringent security and data protection standards required by the DoD. We discuss topics like multi-factor authentication, encryption, and advanced threat protection to assure DoD customers of the safety and integrity of their sensitive information. Additionally, we leverage partnerships and certifications, such as our Azure Government offering, which is specifical...
Add Favorite
The Next Era of Financial Controls
Deep process understanding is the path to a clean audit. Leveraging process mining can help to unlock financial data and drive faster remediations. In this on-demand webinar, attendees discovered how their agency can alleviate financial audit pressure by leveraging a data-driven approach, regardless of your priorities. Celonis views the Annual Financial Report as a reflection of the financial process complexity aiding government in: Meeting fi...
Add Favorite
Back to Search Begin New Search