Back to Search Begin New Search Save Search Auto-Notify
Customize Your Atlassian Toolset with Addteq
The pandemic has caused a major shift in government operations, revealing the challenges and opportunities of successful collaboration between teams. Join your colleagues online for a CPE eligible session addressing: Today's urgent need for improved accessibility Tools to amplify existing functionalities within your Atlassian toolset Applications that can help to unify your IT silos Addteq's Unstoppable and Excellentable plug-ins increase the...
Add Favorite
Adobe ColdFusion Workshop
Join our complimentary Adobe ColdFusion Workshop to learn how you and your agency can leverage ColdFusion to create amazing web content. This one-day training will cover all facets of Adobe ColdFusion that developers need to build applications that can run across multiple cloud providers or on premise. Specifically, the workshop will explore: The major features in the latest release of Adobe ColdFusion How to use CFML to develop, test, and dep...
Add Favorite
Cybersecurity Executive Order: 10 Datab...
In today's digital economy, data is the lifeblood of business. Protecting sensitive data has become more challenging for organizations in recent years. It's not simply the increase in the volume of data or the increase in threats - it's also the fact that as organizations have become more digital, they are moving more of their data and IT infrastructure to a mix of private and public clouds. With the additional impact of the recent Presidentia...
Add Favorite
Digitize Service Delivery for Modernize...
The Department of Revenue (DOR) has the unique mission of providing taxpayers with safe, efficient, and convenient access to relevant resources and services while enforcing the law with integrity and fairness to all. Whether constituents need updated information on tax refunds or need to submit a W-9 form, revenue agencies are constantly evolving to bridge the gap between digital and physical worlds despite budge and resource constraints. Adob...
Add Favorite
The Journey to Zero Trust
Zero Trust can be a confusing concept for many organizations, especially for those that are at an early stage of its adoption. Zero Trust solutions protect networks, applications, and data based on the concept of "never trust, always verify." In a Zero Trust environment, identity is the core security control used by security teams that "assume breach" because any user or device is a potential threat actor. Join us on October 14th for a live we...
Add Favorite
Next Generation Cloud Services for Redu...
Advanced cyber security breach techniques by nation states were wildly successful over the past few months. Thus, a new attack surface within the software supply chain has been exposed and is driving new requirements and shifting the focus of cyber protection across industries and software solution providers. In response, software technology companies worldwide are implementing changes and recommending organizations protect their software supp...
Add Favorite
How Defending Against Ransomware Goes B...
Ransomware attacks have been making headlines again and again. Ransomware evolves and new ones are not only encrypting data and damaging business continuity, but they have also lead to public data leaks of confidential information. CyberArk's solution enables to mitigate the risk related to ransomware by implementing the least privilege approach and credential theft protection to prevent the attack on the machines where it lands, combined with...
Add Favorite
Okta Webinar - Q&A with the University...
Higher Education Institutions face a daunting challenge to streamline, automate, and secure a complex IT ecosystem all while balancing user experience. In the quest to modernize infrastructure and services, the actual cost of managing legacy systems, homegrown solutions, and disparate vendors can have a significant impact. Join this interactive conversation with the University of Notre Dame's Identity and Access Management team to learn about...
Add Favorite
Build Digital Momentum for Justice and...
The pandemic has taught us how essential digital capabilities have become, touching nearly every aspect of our lives. Keeping the justice system operational depends on technology that allows employees to work securely and productively in remote, office, and hybrid work environments. Modern solutions leveraging Adobe Document Cloud (DC) solutions can increase productivity by allowing constituents and employees to access digital documents and ag...
Add Favorite
Cybersecurity - Strategy, Policy, and P...
Today's schools face a plethora of challenges when it comes to cybersecurity: they are prime targets for hackers, they lack the resources available to large corporate organizations, and they must secure a widely distributed network of onsite, mobile, and remote users. School districts are now operating more than any time before and are highly dependent on IT resources to perform their functions. These resources have mostly migrated to the clou...
Add Favorite
Back to Search Begin New Search