Back to Search Begin New Search Save Search Auto-Notify
Analytics for the Next Stage of Crisis...
Most of our lives have drastically shifted this year. Along with the impact to family and health to consider, many government customers have a workplace that has shifted from face-to-face interactions to a remote environment. In these challenging times, the mission to learn from mass quantities of data and communicate with citizens is more important than ever. That data is nothing if we do not make it actionable and use it to provide improved...
Add Favorite
Streamline end-to-end document manageme...
More than 1,300 local, State and Federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, automated approval processes, and regulated document management.Join your peers and other leaders in government to see how you can transform your agreement process by eliminating paper, automating complex workflows, and connecting the systems within yo...
Add Favorite
Bottom Up and Top Down: A Layered Appro...
Office 365 makes it easier than ever for your users to collaborate and meet your mission, but creating granular settings to police access to Teams and the sensitive data stored within them can be challenging for IT teams. This is especially true for government agencies with centralized Office 365 deployments where IT must effectively enforce Teams membership and configurations without impacting non-sensitive collaboration. Locking down your wo...
Add Favorite
Cellular & RF Based Threat Detection, L...
Carahsoft and Bastille invite you to an executive briefing on finding phones, wearables, and gadgets through Cellular, Wi-Fi, Bluetooth, and Bluetooth Low Energy device detection. The Problem: Restricted Areas and Cellular Intrusion DetectionGovernment buildings have secure areas where no cell phones or other radio-emitting devices are allowed. Today, detecting and locating radio-enabled devices is largely based on the honor system or one time...
Add Favorite
Go Beyond Monitoring to Observability
Join us and learn how companies including: Yelp, Kayak, Namely, and Hubspot leverage SignalFx Infrastructure Monitoring, SignalFx Microservices APMā„¢, Kubernetes Navigator from Splunk for instant visibility and alerting, AI-assisted troubleshooting, and closed-loop automation for their applications and infrastructure.As an added adventure, you will experience VictorOps, our incident response tool for building a robust workflow that allows you...
Add Favorite
Learn How to Use Azure Gov to Reduce Co...
With more cloud-based services and solutions built to support agencies with their missions, FedRAMP is offering the opportunity to learn how to transition to the cloud and increase workflow efficiency. Join this complimentary webinar to learn from Microsoft leaders and subject matter experts about the opportunities government organizations can leverage as the industry converts to the cloud. Specifically, you'll hear a panel-style discussion co...
Add Favorite
Dynamic Cloud Webinar
Recent events highlight the critical need for always-on, cloud-delivered access for distributed user communities - distance learning, remote workers, and research to name a few. In such situations, the cost of speeding delivery can lead to concessions or oversights in the security posture. As dynamic cloud environments become more common in government and educational organizations, IT teams must understand their responsibilities in the Shared...
Add Favorite
True Cybercrime Stories
Join Trustwave on Wednesday, September 2nd for a live webinar. Whether you are a twenty-year veteran or have just started your journey into the world of cybersecurity, you will find this remarkable event entertaining and very beneficial. We have assembled a small handful of interesting, real-world cybercrime stories told by actual cyber investigators. Each story a cautionary tale on a grand scale!
Add Favorite
Standoff Facial Recognition from UAVs,...
Security forces personnel are required to accomplish hundreds of hours of training each year to accomplish the mission of providing integrated defense and military law enforcement for the base, while developing highly-trained security forces Airmen to support deployed contingency operations. Whether this training entails guarding assets, controlling entry to the installation, increasing security for a distinguished visitor, or a construction p...
Add Favorite
Enhance Collaboration Experiences for P...
Adobe Sign enables agencies to cut the cost and hassle of manual, paper-based tasks by reducing the back-and-forth that typically accompanies document review and approval processes – providing users with more control and visibility over all document workflows. As Microsoft’s preferred e-signature solution, Adobe Sign works right from the Microsoft tab interface, so you can quickly and securely sign and send documents, contracts, an...
Add Favorite
Back to Search Begin New Search