Back to Search Begin New Search Save Search Auto-Notify
Securing Your Open-Source Software Befo...
Are your developers using GitHub, DockerHub, Jenkins or Bitnami as an Open-Source Code Repository? VMware’s Application Catalog (VAC) provides: Curated/secured/signed images pulled from these and other repositories The creation of secure images that can be placed into your own private repository Images that are continuously updated and secured, thereby removing the possibility of using vulnerable images in your software development Autom...
Add Favorite
Migrating and Monitoring Hybrid Workloa...
Agencies are under increased pressure from the highest levels of government to operate with a cloud-first mentality. But, the reality is that moving every workload to the cloud right now isn't practical. For this reason, many are operating in hybrid environments and leveraging the power of observability to bridge gaps and unify data. Observability has emerged as the key element which allows cross-functional teams to understand what's happening...
Add Favorite
Optimize Your Hybrid Cloud Using NetApp...
NetApp continues to innovate in the evolved cloud. NetApp Cloud Insights (CI) Software-as-a-Service (SaaS) provides the mission-critical intelligence that the US public sector needs to operate successfully. In this webinar, attendees found how NetApp Public Sector customers use CI to: Monitor Troubleshoot Optimize Secure
Add Favorite
Achieving Zero Trust with the Service Mesh
In today’s increasingly interconnected and dynamic digital landscape, traditional perimeter-based security models are no longer sufficient to protect agencies from sophisticated cyber threats. Zero Trust is a more effective approach, emphasizing continuous monitoring and verification of users, devices and transactions within an organization’s network. Attendees joined Tetrate online for insights into how service mesh technology sup...
Add Favorite
Kickstart to Compliance Series: The Jou...
We wrapped up our journey to achieving optimal level of the ZTA data pillar in the third and final session in the Kickstart to Compliance Series. This session focused on three key functions, including: access determination where we introduced dynamic data masking to provide least privilege techniques to data access, visibility and analytics capability to showcase DPM’s user access monitoring and user anomaly detection trending/visualizat...
Add Favorite
The Next Era of Financial Controls
Deep process understanding is the path to a clean audit. Leveraging process mining can help to unlock financial data and drive faster remediations. In this on-demand webinar, attendees discovered how their agency can alleviate financial audit pressure by leveraging a data-driven approach, regardless of your priorities. Celonis views the Annual Financial Report as a reflection of the financial process complexity aiding government in: Meeting fi...
Add Favorite
Identity: Powering Enterprise Cybersecu...
Attacks on privilege, identities and access are relentless and the stakes are higher than ever. Identity is the new perimeter— and privileged access management (PAM) is a cornerstone of modern identity and access security. Identity and access security talks to the tools, processes, and policies that determine the right individual can access the right resource, at the right time, for the right reason, to complete their objective. To achie...
Add Favorite
OpenText Delivers 4 New IT Operations S...
OpenText has expanded FedRAMP® offerings with secure SaaS solutions that include IT service management (ITSM), IT asset management (ITAM), discovery, configuration management (CMDB), and project and portfolio management (PPM). Featured Speakers from the webinar: Keith Nelson Senior Industry Strategist, Public Sector at OpenText Travis Greene Senior Director of ITOM Product Marketing, OpenText In the fast-paced world of instant responses an...
Add Favorite
CMMC and Commoditizing Compliance Management
Alchemy Global Networks, Armis, and Carahsoft held a complimentary webinar to discuss how they had partnered as leaders in the government space to provide a holistic solution to compliance management by leveraging multiple vendors, including Splunk and others, to provide an unprecedented level of visibility into networks. Understanding Technical Debt & Point-in-Time Operations: Defined technical debt and its impact on IT environments, incl...
Add Favorite
Discover New Adobe Connect Features for...
With the ongoing shift to hybrid work, many organizations have turned to Adobe Connect to extract the unique capabilities that this versatile platform has to offer. Adobe Connect has made it even easier to engage with your attendees thanks to some brand-new tools designed to enhance the virtual experience and to allow for richer personalization. Watch this on-demand webinar to acquire knowledge on how these new tools work and how to better int...
Add Favorite
Back to Search Begin New Search