Back to Search Begin New Search Save Search Auto-Notify
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some...
Add Favorite
Automating the Management of All Databa...
This webinar discussed how to automate data management across multi-cloud and hybrid environments. Specifically, attendees learned about:Cloud convergence management: managing multiple clouds as a single cloudIssues and solutions for managing database operations across various cloud and compute environmentsAI-based automation that produces self-managing data environmentsEnhancing robustness and fault tolerance across all database assetsAchievi...
Add Favorite
Amazon Web Services Year-End-Savings (Y...
Attendees learned about Amazon Web Services Year-End-Savings (YES) Promotion and heard from our featured speaker, Ken Bailey. In this webinar, we covered how to:Utilize the AWS MarketplaceTake advantage of year-end Federal funding availabilityExpedite your agency's cloud migration and modernizationThe YES Promotion for AWS Marketplace is a high-value cloud service package to expedite your agency's cloud migration and modernization. The YES Pr...
Add Favorite
Transform VMware Licensing with Oracle...
The Department of Homeland Security (DHS) faces several challenges when it comes to their cloud environments, including complicated procurement processes, compliance and security, and licensing complexity. Oracle Cloud VMware Solution (OCVS) and Oracle Cloud Infrastructure (OCI) are uniquely built solutions created to extend existing VMware workloads to the cloud without re-architecting or retooling. Watch the on-demand webinar to learn how Or...
Add Favorite
Qualys TotalCloud 2.0: Cloud Native App...
In accordance with White House Executive Order 14028, CISA published the Cloud Security Technical Reference Architecture in June 2022 to provide guidance to Agencies on secure cloud services adoption to enable the adoption of Zero Trust. Attendees joined us on August 15th for an insightful webinar where Qualys executives will discuss CISA’s 2022 guidance, the evolution of cloud security, and where the future of Cloud Security is headed....
Add Favorite
Real Time Business Insights Powered by...
Join Atrium, your go-to Tableau and data strategy partner, in this webinar to discover how Tableau and Salesforce Data Cloud can revolutionize your customer understanding and drive business growth. During this webinar, attendees:Learned how Data Cloud can integrate multiple data sources for a comprehensive 360-degree view of your customersExperienced Tableau and Data Cloud in action as they transform data into actionable insightsGained an unde...
Add Favorite
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some...
Add Favorite
AWS Cloud Practitioner Boot Camp
During this virtual boot camp, subject matter experts reviewed:What the AWS Cloud Platform is and the global infrastructure it providesBasic AWS Cloud architectural principlesThe AWS Cloud value propositionKey services on the AWS platform and their common use casesBasic security and compliance aspects of the AWS platform and the Shared Responsibility ModelThe billing, account management, and pricing modelsSources of documentation or technical...
Add Favorite
The Wiz Playbook: The Government's Guid...
Wiz and Carahsoft hosted a webinar where they explored Wiz's playbook on empowering security, development, and operations teams to work together and remove critical risks. This discussion equiped government agencies with practical strategies to:Conquer common cloud security challenges: Learn how Wiz tackles the specific security hurdles faced by government agencies, including ensuring compliance with NIST, FISMA, and other key regulations.Imp...
Add Favorite
CTO Sessions: Cloud HSM Best Practices
Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust. Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed...
Add Favorite
Back to Search Begin New Search