Back to Search Begin New Search Save Search Auto-Notify
AvePoint #WFHready Webinar
As government employees and contractors are all adjusting to the new normal of working from home, Microsoft Teams has become a critical component to ensuring remote worker productivity and mission continuity. How do employees maximize their time working from home with Microsoft Teams? How can IT fight content sprawl and still protect key mission data? What type of information is being stored in these teams (and is it backed up) and what polici...
Add Favorite
Understanding SASE: Why the Future of N...
Please join NetFoundry and Carahsoft to learn the key principles of SASE (Secure Access Service Edge) networks and how your agency can benefit from adopting this model. The digital transformation of businesses to an app-centric world reverses network and security service design conventions. This shift has caused individuals and/or teams responsible for security and risk management to look to a converged, cloud-native SASE to protect critical s...
Add Favorite
Splunk High-Performance Computing
Since the 1960s, supercomputers have played a critical role in countless scientific advancements. Traditionally, High-Performance Computing (HPC) was limited to exclusive groups such as university and government research. The commoditization of computer hardware experienced over the last decade has made HPC ubiquitous in its adoption. HPC is now mainstream and rapidly spreading across enterprises including academia, R1 institutions, banking, f...
Add Favorite
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Add Favorite
Transform Windows 10 with VMware Modern...
Windows 10 opens the door for you to transform siloed desktops, mobile device and application management, and adopt a unified approach across your organization with its new cloud-based management framework known as Modern Management. Modern Management represents a shift in the Windows management process to support the delivery of policies, updates, patches, and applications from the cloud. Windows 10 enables cloud-based delivery of security po...
Add Favorite
Remote Work with NVIDIA: GPU Accelerate...
As the public sector is called upon to address society's most pressing challenges, teleworking has become a crucial way for employees and contractors to maintain continuity and responsiveness. With NVIDIA Quadro RTX-powered laptops, virtual workstations, and cloud computing, you can tackle critical day-to-day tasks and compute-heavy workloads--from home or wherever you need to work. By attending this live CPE webinar, you'll learn: How the pow...
Add Favorite
Improving Remote Employee Support
COVID-19 concerns are changing how agencies run their business and IT operations, dramatically expanding demand for teleworking and application access to collaborative systems. This demand is creating significant challenges for IT operations and has increased the need for IT pros to keep applications, services, and infrastructures up and running—and safe. This instructional webinar will focus on Performance monitoring solutions that prov...
Add Favorite
Splunk: Driving Patient Privacy
Patient privacy is an ever-growing concern within our medical community. Join Splunk, True Zero Technologies, and Carahsoft to learn how Splunk uses data from all data sources to identify breach or leak incidents concerning ePHI.During this webinar, we will discuss how:Proactive measures and real time response to security breaches or unauthorized access attempts help ensure privacy of patient informationImplementing these protective measures h...
Add Favorite
How to Implement an Effective Zero Trus...
The rapid adoption of IoT devices, cloud infrastructures, the recent expansion of remote workforces, and the increased execution of service contracts with multi-tier contractors have created massive distributed IT networks placing more emphasis on Zero Trust approaches. These distributed environments display increased attack surface areas, creating multiple entry points for adversarial actors to penetrate and potentially own a technology ecosy...
Add Favorite
5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Add Favorite
Back to Search Begin New Search