Back to Search Begin New Search Save Search Auto-Notify
Showing results for IoT
Search instead for Ito
What is GeoIoT & Why Does It Matter?
Find out what GeoIoT is, why it matters, and how you can benefit from it. On this on-demand webcast, we'll cover: How IoT and GIS join to form GeoIoT How you're already benefiting from IoT Examples of how IoT can impact your business Industries that will benefit from this episode: Education Systems, Defense, Healthcare, Oil and Gas, Private and Public Sectors, Public Works, Utilities, Restaurant, Retail, Safety and Security, Transportation, an...
Add Favorite
Visualize your IoT Data with Google Map...
Google Maps API is the best-in-class mapping platform to display this data. The points of interest available on Google Maps Platform create context for IoT sensor data, taking the data off a spreadsheet and transforming it within the real-world context. Join Google Maps Platform and Carahsoft to learn about how:IoT sensor data is increasing growth in the public sectorIoT sensor data needs to have real-world context to be usefulGoogle Maps API...
Add Favorite
Verve Webinar: Delivering Turnkey Secur...
The explosive growth of IOT and IIOT devices and technology is straining an already challenged OT environment for implementing and maintaining effective cybersecurity and reliability controls in operating environments. Traditional IT tools are ill-fitted and lacking in coverage outside of core IT systems and services, which is why we have built the first Operational Technology Systems Management (OTSM) platform. Our single pane of glass and ou...
Add Favorite
Gain Key Insights From Your Data Flows...
Processing data at high volume and scale with visibility, data provenance, and lineage is not an easy task. When you add on managing streaming sources and edge applications with governance and security, it only adds to the complexity. Cloudera DataFlow (CDF) is a scalable, real-time streaming data platform that collects, curates, and analyzes data so that enterprises can gain key insights for immediate actionable intelligence. CDF addresses so...
Add Favorite
Splunk & Forescout for Smart Transportation
Join Splunk, Forescout, and Carahsoft to see how Forescout provides continuous visibility of connected devices to Splunk to better identify, prioritize, and respond to incidents. The joint integration also enables the getting and storing of Forescout actions in Splunk. Policy-driven actions can be triggered by Splunk and executed through Forescout for immediate incident response. Forescout sends the action results to Splunk to facilitate close...
Add Favorite
How to Implement an Effective Zero Trus...
The rapid adoption of IoT devices, cloud infrastructures, the recent expansion of remote workforces, and the increased execution of service contracts with multi-tier contractors have created massive distributed IT networks placing more emphasis on Zero Trust approaches. These distributed environments display increased attack surface areas, creating multiple entry points for adversarial actors to penetrate and potentially own a technology ecosy...
Add Favorite
Immediately Gain Value From IoT
Enterprises are struggling to see value from IoT implementations. One of the main challenges is just getting real-time data from edge devices. Other challenges faced by government agencies include network availability, latency, cost of round-tripping between the edge and the enterprise, monitoring, and more. A new solution is needed to quickly manage and monitor thousands of edge agents deployed in or near the edge devices to enable edge data...
Add Favorite
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
Threat Hunting Masterclass Session 3: L...
Join CybernetIQ and Carahsoft for their three part on-demand Threat Hunting Masterclass. In this on-demand webinar series, Joe Cummins, CEO, CybernetIQ discusses real-life examples of teams, tradecraft, and technologies that are changing the way we see the cybersecurity situation. Session Description Register How to Make Sense of the Who, Why, and What in the Wire Download session one to hear real-life examples of teams, tradecraft, and techno...
Add Favorite
AI, Machine Learning and Strengthening...
The federal government is dedicated to advancing U.S. leadership in the research, development and use of artificial intelligence (AI), to promote both national security and economic prosperity. Using AI to improve cybersecurity is a logical target for its implementation. It is especially important as the threat landscape continues to evolve. The World Economic Forum (WEF) reports that about 1.7 billion IoT devices have been installed to date i...
Add Favorite
Back to Search Begin New Search