Back to Search Begin New Search Save Search Auto-Notify
Streamline end-to-end document manageme...
More than 1,300 local, State and Federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, automated approval processes, and regulated document management.Join your peers and other leaders in government to see how you can transform your agreement process by eliminating paper, automating complex workflows, and connecting the systems within yo...
Add Favorite
Bottom Up and Top Down: A Layered Appro...
Office 365 makes it easier than ever for your users to collaborate and meet your mission, but creating granular settings to police access to Teams and the sensitive data stored within them can be challenging for IT teams. This is especially true for government agencies with centralized Office 365 deployments where IT must effectively enforce Teams membership and configurations without impacting non-sensitive collaboration. Locking down your wo...
Add Favorite
Cellular & RF Based Threat Detection, L...
Carahsoft and Bastille invite you to an executive briefing on finding phones, wearables, and gadgets through Cellular, Wi-Fi, Bluetooth, and Bluetooth Low Energy device detection. The Problem: Restricted Areas and Cellular Intrusion DetectionGovernment buildings have secure areas where no cell phones or other radio-emitting devices are allowed. Today, detecting and locating radio-enabled devices is largely based on the honor system or one time...
Add Favorite
Go Beyond Monitoring to Observability
Join us and learn how companies including: Yelp, Kayak, Namely, and Hubspot leverage SignalFx Infrastructure Monitoring, SignalFx Microservices APMā„¢, Kubernetes Navigator from Splunk for instant visibility and alerting, AI-assisted troubleshooting, and closed-loop automation for their applications and infrastructure.As an added adventure, you will experience VictorOps, our incident response tool for building a robust workflow that allows you...
Add Favorite
FAR Part 36- Construction and Architect...
This part prescribes the policies and procedures used in construction contracts and architect-engineering services, to include requirements, clauses, and standard forms that apply to contracts for dismantling, demolition, or removal of improvements.
Add Favorite
Learn How to Use Azure Gov to Reduce Co...
With more cloud-based services and solutions built to support agencies with their missions, FedRAMP is offering the opportunity to learn how to transition to the cloud and increase workflow efficiency. Join this complimentary webinar to learn from Microsoft leaders and subject matter experts about the opportunities government organizations can leverage as the industry converts to the cloud. Specifically, you'll hear a panel-style discussion co...
Add Favorite
Dynamic Cloud Webinar
Recent events highlight the critical need for always-on, cloud-delivered access for distributed user communities - distance learning, remote workers, and research to name a few. In such situations, the cost of speeding delivery can lead to concessions or oversights in the security posture. As dynamic cloud environments become more common in government and educational organizations, IT teams must understand their responsibilities in the Shared...
Add Favorite
GSA Schedule - Is It The Right Tool?
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
True Cybercrime Stories
Join Trustwave on Wednesday, September 2nd for a live webinar. Whether you are a twenty-year veteran or have just started your journey into the world of cybersecurity, you will find this remarkable event entertaining and very beneficial. We have assembled a small handful of interesting, real-world cybercrime stories told by actual cyber investigators. Each story a cautionary tale on a grand scale!
Add Favorite
FAR Part 37- Service Contracting
This part prescribes policy and procedures that are specific to the acquisition and management of services by contract. This part applies to all contracts and orders for services regardless of the contract type or kind of service being acquired, including performance-based acquisitions.
Add Favorite
Back to Search Begin New Search