713 webcasts found
+ 7353 past events found
Back to Search Begin New Search Save Search Auto-Notify
The Power of a Platform Team
Attendees of this webinar heard VMware subject-matter experts discuss the importance of your platform. To provide world-class developer experiences and get applications to production quickly and securely, you need a team of experts devoted to running your platform as a product. For organizations that build and publish software at scale, developing the tech stack on which developers will create applications and push them to production is a crit...
Add Favorite
Help Your Clients & Use Staff Time More...
What if we told you that you could increase client satisfaction, reduce client "run around", and save critical staff time with one cost-effective solution? ConcernCenter asks you to leave the weight of "resource navigation" to them and free up your staff's resources to handle the one-on-one interactions. Join ConcernCenter and Carahsoft in collaboration with AWS for an enlightening webinar to hear from state and local government agencies about...
Add Favorite
How a U.S. County Solves Business Probl...
States, cities and counties across the United States trust Elastic, the industry leader in security, observability and search use cases, to solve their mission-critical problems with data-based insights.Elastic and Collin County took the virtual stage for a conversation exploring a real-world success story involving a single security use case that quickly expanded to other IT departments and personas. During the event, our featured speakers co...
Add Favorite
Improving Government Experiences: 4 Way...
A recent study cites that, “difficulty finding information and clarity of communications are the primary drivers of customer burden". A similar study cites, "39% of SLG leaders grade their department’s ability to deliver excellent, equitable, and secure citizen services an 'A'”. Alleviating customer burden can be challenging. Join Granicus for a complimentary webinar to hear from a government experience expert about how antic...
Add Favorite
Scale Your Production-Grade Kubernetes...
F5 and Red Hat hosted a virtual lab featuring F5 NGINX and Red Hat OpenShift. This hands-on lab session introduced users to the foundational aspects of F5 NGINX running on the Red Hat OpenShift platform. Users gained familiarity with F5 NGINX and its value as a per-application ADC within an OpenShift environment and know the differences between open-source NGINX and F5 NGINX. We also explored how F5 NGINX with Red Hat OpenShift can provide a p...
Add Favorite
Secure Development in U.S. Government A...
You're invited to join Security Compass and Carahsoft for a webinar that will assist in reshaping the landscape of secure development within U.S. Government Agencies. Government agencies have acknowledged the pressing need to bolster their security posture, with 90% embracing a "shift left" mindset. Despite advancements in seure code practices and automation, outdated methods like spreadsheets still persist. During this webinar,...
Add Favorite
Future Proof Your Email Security with A...
Join Valimail and Carahsoft for a live webinar on DMARC. Many organizations and IT teams incorrectly assume that implementing DMARC is a one-time project that can be accomplished quickly and easily. The fact is, doing DMARC yourself requires resources, technical know-how, and can present multiple hurdles for internal teams. In this webinar, Valimail DMARC experts, Kenneth Schwartzman and Hunter Sapp, will lead you through the steps it takes to...
Add Favorite
Splunk SAAS for Higher Education
Learn more about Splunk Cloud in higher education. This webinar will cover the value to the business and bottom line, best practices in moving Splunk to the cloud, increase efficiency and ROI by freeing your team of administrative responsibilities, and you will hear from a cloud customer. Join us for an informative webinar, where attendees will learn: To explore the ROI & business value of Splunk SAAS in higher education Best practices for...
Add Favorite
Operating with Continuous Compliance
Why is it important to move from reactive compliance to always compliant? Traditional approaches to ensuring standards compliance, including federal regulations like FIPS 140-2, FISMA and FedRAMP, involve slow, manual post-build security scanning as part of the authority-to-operate process. With different gates of approval, these processes catch compliance and security defects too late, creating rework and sacrificing operational agility. Prog...
Add Favorite
BeyondTrust Tech Talk: Gain a 360-Degre...
With the increase in sophisticated cyberattacks, it is imperative to revamp cybersecurity processes and re-focus security beyond the perimeter. In their Special Publication, 800-207 Zero Trust Architecture, NIST points to identity as the critical first step to regaining control over the perimeter. Join this interactive session and demo to understand how BeyondTrust Privileged Account and Session Management (PASM) can help you control access an...
Add Favorite
Back to Search Begin New Search