38 webcasts found
+ 26 past events found
Back to Search Begin New Search Save Search Auto-Notify
Create Engaging Digital Communications
Effective communication relies on visuals to make a lasting impression, and including images with information-rich text is proven to capture the attention of your target audience. Local governments and federal agencies are under pressure to create timely, easy-to-understand communications about current events, including COVID-19. Join our complimentary webinar to learn how Adobe Stock delivers engaging experiences to both citizens and employee...
Add Favorite
Remote Automating Mac Services from Ser...
For many organizations, the increased IT demands created by larger remote workforces have exposed a Mac-sized gap in their IT processes. For ServiceNow customers, the stopgap solution is often to use their ServiceNow instance as the front end for a "swivel chair" request/fulfillment model, which can work for a while, but isn't scalable. In this webinar, Jay Wigard from ITS Partners will work through a couple of stories to look at how the ITS J...
Add Favorite
Detect Cellular, Bluetooth, BLE, Wi-Fi...
Carahsoft and Bastille invite you to join us as we learn how to use a device detection and location kit to find unauthorized devices. The Concern:Are wireless and cellular devices coming into, and possibly passing through, the Visiting Room into other areas a concern for your facility? Bastille's Solution: Bastille detects and locates Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. This provides security teams the ability to accurately locat...
Add Favorite
Mobile Device Investigator: Preview and...
97% of American adults own a cellphone, 85% of which own a smartphone.* It is no wonder that more and more crimes now require mobile device evidence collection and analysis. Whether dealing with fraud and economic crime cases, child exploitation cases, counterterrorism, or performing any type of intelligence gathering or mobile investigation, there has become a dire-need in the field to expedite the process with mobile device evidence. Join ou...
Add Favorite
Top 5 Tips for Managing Day-To-Day Digi...
Agencies across the nation have adopted PDFs at a faster pace than ever before, as remote work has become the norm. Adobe is helping the public sector stay connected with simple workflows across desktop, mobile, and web, with Adobe Acrobat Document Cloud (DC), the complete multi-device PDF solution for streamlined document and e-signature processes.Join our complimentary webinar to discover the vast array of PDF capabilities and tools for impr...
Add Favorite
Integrate E-Signature Workflows for Mod...
Recent laws such as the 21st Century Integrated Digital Experience Act (IDEA) are changing the way people interact with government. Now with a hybrid remote workforce, it's critical that workflows and signatures are not only digital, but accessible, inclusive, user-centric, and mobile-friendly. Adobe has defined three stages that help government modernize their digital processes. This phased approach helps agencies easily achieve exceptional c...
Add Favorite
How To Issue Hardware-Based Identity Cr...
Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to ensure the identities of entities within a Public Key Infrastructure (PKI). For human users, multi-factor authentication is easily facilitated by using a secure smart card or USB token. But what about non-person entities (NPEs), like devices or software? These entities still must have hardware-secured credentials to meet secur...
Add Favorite
REAL ID and Proof-of-Identity Automation
Technology advancements, like Artificial Intelligence (AI), are enabling state agencies to automate like never before. Challenges such as augmenting human review of incoming documents, handling the transition to REAL ID, and preventing fraud must be considered when deciding which technologies to utilize. This webinar series will ensure that you are aware of the latest options to tackle your agency's document demand.Join us for this webinar, wh...
Add Favorite
Software Supply Chain Risk Management f...
Mobile application security is a real threat vector. Whether managing existing mobile apps or building your own, the need to test for vulnerabilities on a regular basis is more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd-party created apps, is a diffic...
Add Favorite
Don't Get Blindsided by Mobile Gaps in...
Mobile application security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd party created...
Add Favorite
Back to Search Begin New Search