Back to Search Begin New Search Save Search Auto-Notify
Splunk Infrastructure Monitoring for Mu...
View this on-demand webinar with Splunk and SHI to learn how our Observability Suite provides a single, consistent user experience across all metric, trace, and log data. We give users a seamless and streamlined workflow for monitoring, troubleshooting, and investigation -- making it easy to go from problem detection to resolution in minutes. Whether you're a front-end developer who needs to know what end customers are experiencing, a back-end...
Add Favorite
Unleashing Data to Advance the National...
View this on-demand webinar where we go over how Splunk aligns with the overarching vision, focus areas, and guiding principles of the newly released Department of Defense (DoD) Data Strategy. Along with that, we see how Splunk meets or exceeds the essential architecture capabilities, and helps you execute the goals necessary to transform the Department into a data-centric enterprise. A team of Splunk experts walk you through the challenges th...
Add Favorite
Build and Deploy Modern Applications wi...
Join CDW-G, VMware, and Carahsoft for an on-demand webcast to learn more about VMware Tanzu. Kubernetes is the defacto container platform for the future of modern applications. CDWG is here to help you deliver a scalable and portable modern application platform, powered by VMware Tanzu. Tanzu is built on upstream Kubernetes and integrated directly into VMware Cloud Foundation (vCF) and VMware vSphere, which runs on every public cloud provider....
Add Favorite
Enabling User Behavior Analytics
WebinarSummary It's All About the Data Most organizations look to HR for the data that drives their identity governance systems. In reality, that's just the start. Accelerating Access to Applications Learn how to utilize attributes to automatically grant and revoke access to applications and best practices onboarding new ones. Matering Data Quality Identity governance solutions serve as the nerve center for user data. By focusing on data qual...
Add Favorite
Improving K-12 Cybersecurity
Do you know what the number one risk is to a K-12 institution's cybersecurity posture and sensitive data? – Your own users! The sudden shift to remote learning has put an even larger target on the back of K-12 education institutions. When it comes to data breaches, the most prevalent path in is through compromised credentials. For this reason, the traditional perimeter is no longer sufficient and districts must take an identity-centric a...
Add Favorite
The COVID-19 Vaccine and Beyond: Transf...
If there's one thing COVID-19 has taught us, it's that search has never been more critical. Citizens have flooded state and local government websites with questions as they scramble to learn about testing, safety regulations, policy measures, and more. As you prepare for vaccine distribution, how is your organization set up to provide clear, accurate answers to your citizens' questions and meet their expectations? Watch this on-demand webinar...
Add Favorite
How to Catch Advanced Persistent Threat...
View this on-demand webinar to hear Richard White, Cyber Security Architect from Tennessee DOT, and Val Bercovici, CEO and Co-founder of Chainkit, explain how the Department of Transportation's solution architecture and Chainkit's eXtended Integrity Monitoring (XIM) platform overcomes the critical integrity gap, protects all systems and data from a SolarWinds-style attack, and reduces DOT's cyber liability premium by 80%. In this on-demand you...
Add Favorite
OriginAI Solution with OpenShift for AI/ML
Constructing an artificial intelligence (AI) and machine learning (ML) infrastructure to effectively manage workloads and performance, optimize utilization and scale correctly can be challenging and time-consuming. Listen to this On-Demand as they discuss the AI/ML in a box solution combining Penguin Computing FrostByte with Red Hat Ceph Storage to explore how your agency can stay agile as your data center grows and organizational needs change...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Content Discovery in a COVID-19 World
piXserve is an enterprise-class software product that can enhance the productivity of law enforcement professionals. The software automatically indexes the contents of images/videos (archived or live sources) and helps users discover content of specific interest: objects, scenes, text strings, and people. The general use of face-masks due to the pandemic has made it more difficult for law enforcement professionals to generate and investigate l...
Add Favorite
Back to Search Begin New Search