Back to Search Begin New Search Save Search Auto-Notify
Efficiently Protect, Monitor, and Contr...
Privileged passwords and credentials are the gateways to an organization's most valuable assets. They unlock access to privileged accounts used to manage critical devices, applications, DevOps infrastructure, and other assets across the enterprise. They pose significant risks if not protected, managed, and monitored properly. Today, many government organizations still rely on spreadsheets, manual processes, or a combination of solutions to man...
Add Favorite
VMware Cloud Foundation Tech Day in San...
Attendees explored VMware Cloud Foundation (VCF), a ubiquitous hybrid cloud platform for both traditional enterprise and modern applications. VMware Cloud Foundation provides a complete set of software-defined services for compute, storage, network, container and cloud management. The result is agile, reliable, efficient cloud software defined infrastructure that offers consistent operations from garrison to tactical edge. At our in-person wor...
Add Favorite
Revolutionizing Federal Data Management...
During the webinar, attendees:Explored GEN3i Services' expertise in facilitating secure data migrations from legacy systems to modern platforms, enhancing data accessibility and reliability.Understood the significance of Cohesity achieving FedRAMP Moderate Authorization and how this ensured compliance with stringent federal security standards.Learned how to leverage Cohesity’s AI and ML-based ransomware detection and Zero Trust security...
Add Favorite
Navigating the AI Data Governance Landscape
High use of content creation poses a significant impact on records and compliance obligations. In this webinar, we learned key elements to manage data using AI. We also took into account ethical considerations, addressed how to properly navigate regulatory compliance hurdles, and presented actionable strategies for success.Specifically, we discussed:Balancing AI use against the riskResponsible AI frameworksNIST AI risk management modelReal wor...
Add Favorite
Better Together: Enhancing Government D...
Watch this on-demand webinar to explore:Government Data Protection Needs: Insight into the unique data security and compliance challenges faced by government agencies.Security Posture: How Veeam and Spectra Logic's integrated solutions create a multi-layer defense against cyber threats, ensuring data integrity and availability.Regulatory Compliance: Strategies to meet and exceed federal compliance requirements, including FISMA, and NIST guidel...
Add Favorite
OT/IoT Zero Trust Security for Water an...
Recently, there has been a surge in alerts and warnings concerning cyberattacks from state-sponsored threat actors on U.S. critical infrastructure including water systems and electric distribution systems. EPA, CISA, and the FBI strongly recommend system operators take steps outlined in Top Actions for Securing Water Systems. In addition, DOE has released the Cybersecurity baseline and NERC has nearly finalized the update to CIP-015-1. Both gu...
Add Favorite
Bridge Conditions & Economic Inequity m...
The $9.6 billion in grants provided for the Bridge Invest Program funded by the Infrastructure Investment and Jobs Act allows us to target high value opportunities for improving the quality of our bridges. The National Bridge Inventory database includes helpful information such as the Average Annual Daily Travel for each bridge, but it does not include the trip types, the origins/destinations of those trips, or user demographics/characteristic...
Add Favorite
Transform VMware Licensing with Oracle...
The Department of Homeland Security (DHS) faces several challenges when it comes to their cloud environments, including complicated procurement processes, compliance and security, and licensing complexity. Oracle Cloud VMware Solution (OCVS) and Oracle Cloud Infrastructure (OCI) are uniquely built solutions created to extend existing VMware workloads to the cloud without re-architecting or retooling. Watch the on-demand webinar to learn how Or...
Add Favorite
How to Automate, Orchestrate, and Secur...
Attendees of this webinar explored how BigFix leverages AI to:Improve employee experience using Gen AIAutomate infrastructure managementSecure and manage endpoints across nearly 100 operating systemsEnsure continuous complianceEnhance vulnerability management with award-winning cybersecurity analytics
Add Favorite
TIBCO Messaging Innovations for Digital...
In this webinar, Bobby Liao, Director of Product Management at TIBCO, discussed how TIBCOŽ Platform–Messaging:Creates the infrastructure that facilitates the real-time exchange of data between your systems, applications and componentsEnables real-time data distribution between disparate endpoints wherever they are hosted, while also being a central component of event-driven and streaming data architecturesProvides both open-source and co...
Add Favorite
Back to Search Begin New Search