Efficiently Protect, Monitor, and Contr...
Privileged passwords and credentials are the gateways to an organization's most valuable assets. They unlock access to privileged accounts used to manage critical devices, applications, DevOps infrastructure, and other assets across the enterprise. They pose significant risks if not protected, managed, and monitored properly. Today, many government organizations still rely on spreadsheets, manual processes, or a combination of solutions to man...
Leveraging Tableau for Enhanced Student...
The higher education landscape is constantly changing, and institutions face the critical challenge of optimizing student retention and enrollment management strategies to increase student success and institutional growth. By harnessing the power of data and analytics, higher education leaders can address these challenges with a data-driven approach. Attendees of this webinar were able to learn innovative ways to use Tableau for developing com...
VMware Cloud Foundation Tech Day in San...
Attendees explored VMware Cloud Foundation (VCF), a ubiquitous hybrid cloud platform for both traditional enterprise and modern applications. VMware Cloud Foundation provides a complete set of software-defined services for compute, storage, network, container and cloud management. The result is agile, reliable, efficient cloud software defined infrastructure that offers consistent operations from garrison to tactical edge. At our in-person wor...
Enhancing Microsoft Copilot for Securit...
In an era where cyber threats are becoming increasingly sophisticated, community colleges face unique challenges in protecting their sensitive data and maintaining a secure IT environment. Attendees joined our Tanium + Microsoft webinar on July 16th and gained valuable insights into how their institution can effectively manage and secure its IT infrastructure.During this webinar, attendees learned how to:Strengthen your security posture and en...
Supercharge Your SOC Performance
Attendees joined CrowdStrike to explore the capabilities of Falcon LogScale, designed to give DoD and military branches extended visibility to detect and hunt for advanced adversaries. Not only does it meet the NSA’s guidelines for visibility and analytics under the Zero Trust framework, but it is also DoD IL5 authorized. This webinar, featured speakers Jeff Worthington, Rob Reynolds and Evan Emskamp showcasing how SOC analysts can store...
CI/CD Pipelines and RESTful Services
Watch this on-demand webinar to unlock the full potential of Adobe ColdFusion by mastering Continuous Integration/Continuous Deployment (CI/CD) pipelines and RESTful services. This session is carefully designed for developers, IT professionals, and tech enthusiasts eager to streamline their ColdFusion projects, automate deployments, and build efficient, robust RESTful services. Specifically, the webinar will explore:Adobe ColdFusion RESTful fu...
Modernizing Investigative Case Manageme...
Attendees joined ServiceNow for a Federal ServiceNow workshop focused on modernizing investigative case management. This interactive session delved into how ServiceNow Public Sector Digital Services (PSDS), powered by Now Assist AI and Automation, can revolutionize federal investigative case management - enhancing service delivery, streamlining operations, and creating more visibility through data analytics. Attendees learned how ServiceNow he...
Strengthening Your Security with Active...
Even the most robust identity governance solutions miss out on the foundational needs of highly secure directory management tasks. By leveraging intelligence already available in your directory, you can improve the security profile of your organization with easy-to-use practical solutions. Attendees joined Netwrix on Wednesday, July 17th, to learn how to discover areas of weaknesses and strategies to address these hidden dangers proactively. A...
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and Government Acquisitions at the Celeste Hotel on Wednesday, July 17th for a hands-on lab featuring BIG-IP Next.All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use...
Revolutionizing Federal Data Management...
During the webinar, attendees:Explored GEN3i Services' expertise in facilitating secure data migrations from legacy systems to modern platforms, enhancing data accessibility and reliability.Understood the significance of Cohesity achieving FedRAMP Moderate Authorization and how this ensured compliance with stringent federal security standards.Learned how to leverage Cohesity’s AI and ML-based ransomware detection and Zero Trust security...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.