Back to Search Begin New Search Save Search Auto-Notify
Strengthening Your Security with Active...
Even the most robust identity governance solutions miss out on the foundational needs of highly secure directory management tasks. By leveraging intelligence already available in your directory, you can improve the security profile of your organization with easy-to-use practical solutions. Attendees joined Netwrix on Wednesday, July 17th, to learn how to discover areas of weaknesses and strategies to address these hidden dangers proactively. A...
Add Favorite
Revolutionizing Federal Data Management...
During the webinar, attendees:Explored GEN3i Services' expertise in facilitating secure data migrations from legacy systems to modern platforms, enhancing data accessibility and reliability.Understood the significance of Cohesity achieving FedRAMP Moderate Authorization and how this ensured compliance with stringent federal security standards.Learned how to leverage Cohesity’s AI and ML-based ransomware detection and Zero Trust security...
Add Favorite
Defending Against the Quantum Threat: F...
The day a cryptographically-relevant quantum computer (QRQC) with enough power to break modern encryption is coming and world governments are taking action and advising agencies and commercial entities to start taking action now. Although these powerful quantum computers won't exist for another 5 to 15 years, attackers are already taking advantage of the opportunity to steal valuable secrets through harvesting attacks - where a copy of the dat...
Add Favorite
ISV Briefing Series - Austin: A No-Cost...
SMX and Carahsoft in collaboration with Amazon Web Services (AWS) joined in Austin, TX on July 22, 2024 for a Power Happy Hour! This briefing featured SMX's No-Cost Guide highlighting a quick start guide to achieving FedRAMP compliance and an overview of the Carahsoft Amazon Web Services (AWS) ISV Program. Want to see what was covered during this briefing? Check out the slide decks below!
Add Favorite
Better Together: Enhancing Government D...
Watch this on-demand webinar to explore:Government Data Protection Needs: Insight into the unique data security and compliance challenges faced by government agencies.Security Posture: How Veeam and Spectra Logic's integrated solutions create a multi-layer defense against cyber threats, ensuring data integrity and availability.Regulatory Compliance: Strategies to meet and exceed federal compliance requirements, including FISMA, and NIST guidel...
Add Favorite
How AWS RDS Can Help You Simplify Oracl...
Is your agency enjoying Oracle technology but struggling with the licensing? Luckily, TekStream's Oracle Licensing Assessment (DB OLA) can easily streamline the process. With features like a comprehensive review of your current environment, usage of unique-to-AWS cost savings, evaluations of your current Oracle estate, and Amazon Web Services (AWS) mapping, DB OLA makes understanding your Oracle licensing easy. Attendees joined TekStream, AWS...
Add Favorite
Unifying Your Campus Technology Assets
View this on demand webinar from Boomi & Carahsoft to hear all about how Boomi offers an industry-leading integration and automation software that’s utilized by over 200 Higher Ed customers at the highest level. View this webinar to seize your opportunity to build your connected digital campus with cloud integration.
Add Favorite
Digital Detective Work: Enhancing Onlin...
In modern investigations, online research is a pivotal yet challenging component. The vast volume of publicly available information is a formidable task for investigators aiming to connect the dots across expansive digital landscapes. This webinar delves into the evolving role of online investigations, emphasizing the complexities of navigating dispersed information and offering practical strategies to enhance digital detective work. During th...
Add Favorite
Automate Critical IT and Security Tasks...
IT and security teams today must do more with less, all while facing rising security demands and pressures to innovate. Attendees joined on July 24th to learn how Okta Workflows can help teams keep up by automating Identity processes at scale - with pre-built templates that remove the need to write code. Attendees also learned about how implementing Okta Workflows can help your team accelerate time-to-market, improve security posture, and redu...
Add Favorite
Best Defense is a Great Offense: Integr...
Federal agencies face an ever-evolving landscape of cybersecurity threats that require dynamic and robust response mechanisms. To stay ahead of bad actors, agencies need to automate the detection, prioritization, and remediation of vulnerabilities in real-time. Continuous authorization and monitoring is also critical to a proactive approach to cybersecurity that aligns with the Federal Risk and Authorization Management Program (FedRAMP) and ot...
Add Favorite
Back to Search Begin New Search