Back to Search Begin New Search Save Search Auto-Notify
Automating Employee Workflows to Maximi...
As the federal workforce evolves, so do the expectations of its employees. Government agencies continue to invest in digital transformation and new technologies, and it's increasingly critical to unify employee experiences across systems to ensure the workforce remains productive, engaged, and focused on mission. By consolidating cross-departmental employee experiences into a one-stop-shop portal and delivering a single-pane-of-glass view into...
Add Favorite
Unlock the Future of Government Efficie...
Are you ready to take your government services to the next level? Watch this recorded webinar to learn how to discover the top 5 strategies for implementing intelligent automation in the public sector. From streamlining workflows to improving data management and analysis, we showed attendees how to leverage the latest technologies, including robotic process automation (RPA), machine learning (ML), and natural language processing (NLP), to revo...
Add Favorite
EDR is Outdated - Carbon Black XDR Proves It
During this on-demand webcast VMware Carbon Black experts discussed: Extended Detection & Response (XDR): A merger of endpoint and network security allowing for massive threat detection through pattern matching App Control: Automate the pain out of allow-listing files with a positive security model approach that prevents any unauthorized change or execution in your environment Software Asset Inventory Management: See every file and applic...
Add Favorite
Protecting Academia - Securing Students...
Proofpoint and Carahsoft invited individuals and their cybersecurity teams to join them for an informative presentation on how to protect yourself and your organization from phishing attacks. Our expert speaker, James Stroud, Senior Sales Engineering Manager at Proofpoint, will cover the basics of phishing, the consequences of falling for a phishing attack, and best practices for protecting against them. Attendees in this on-demand webinar lea...
Add Favorite
Software Accreditation in the SOF Community
Are you interested in boosting your federal sales strategy by learning more about the latest security standards for Department of Defense (DoD) cloud service acquisitions? TJ Rowe, Vice President at Second Front Systems, presented an executive briefing diving deep into the Federal Risk and Authorization Management Program (FedRAMP), Cloud Computing Security Requirements Guide (CC SRG), Authority to Operate (ATO) & continuous Authority to O...
Add Favorite
Effectively Manage User Access for Priv...
Identity governance solutions help IT teams answer “who has access to what?” The integrated BeyondTrust and SailPoint solution allows organizations to answer “is that access appropriate for privileged users?” and “is that privileged access being used appropriately?” Attendees joined BeyondTrust for a live product demo to understand how BeyondTrust and SailPoint integrated to: Automate Access: Increase produc...
Add Favorite
Top 40 Federal Contractors - PROFILE #1...
Please join Jennifer Schaus & Associates in our COMPLIMENTARY Webinar Series in 2023. ALL WEBINARS ARE COMPLIMENTARY & RECORDED. Please find the recordings on our YOUTUBE Channel, along with 500+ government contracting webinars. In 2023, we will profile the TOP 40 FEDERAL GOVERNMENT CONTRACTORS, including: Company Profile Small Business Liaison Contact Details Company Contract Trends - Defense vs Civilian Subcontracting Opportunities O...
Add Favorite
Google Cloud Canada EDU Apigee Webinar
During this webinar, attendees learned how: Service New South Wales provides an easy one-stop-shop app for all of its services to over 5 Million citizens with 6 Million API interactions per month and 97% citizen approval. Harvard University and UCLA embrace Apigee as their digital platform for cross campus collaboration. Apigee can securely share government or student data and services creating a more efficient organization & partner ecosy...
Add Favorite
Introduction to Advanced Analytics with...
View an interactive Alteryx session on conducting end-to-end analysis. To start off, they unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, they went hands-on and learn how to apply these techniques. You will learn how to bring in and merge different sources of data...
Add Favorite
Design & Implementation of Zero Trust A...
The Castle and Moat doctrine for IT information security is officially dead, and Zero Trust Architecture (ZTA) is the new method for securing information resources. Zero trust provides an approach to identity and access management that assumes no user or software is trusted by default. All users, devices, and applications must prove their identity and level of authentication before accessing resources. Key thoughts on this approach are never t...
Add Favorite
Back to Search Begin New Search