Back to Search Begin New Search Save Search Auto-Notify
FCW Pillars of Modernization
You're invited to join MuleSoft for the FCW Workshop: Pillars of Modernization to hear government leaders discuss the strategies that harness essential components, including security, network infrastructure, multi-cloud architectures, data solutions, and the user experience, needed to move IT modernization ahead.
Add Favorite
Achieving Mission Outcomes with Elastic...
The Elastic Search Platform is used across all levels of Department of Defense (DoD) networks and throughout the Army. This includes air-gapped environments for searching and analyzing structured and unstructured data in real-time from disparate sources and geographical locations. Elastic offers a flexible, single pan of glass platform that supports multiple use cases, including network monitoring, SIEM and security, aggregation and real time...
Add Favorite
Boosting Your Zero Trust Security Postu...
Most solutions to security problems take a siloed approach. The problem is ransomware is capable of interacting with all parts of your IT environment, so focusing efforts on just one part of it will have diminishing returns. Dealing with ransomware demands a holistic approach. Zscaler 'Active Defense' and Deception technology helps agencies defend against ransomware by: Sending early warning for pre-breach attacks Creating a fake attack surfac...
Add Favorite
Optimize Your Cloud Technologies with R...
Scalability, flexibility, efficiency, and innovation are more than buzzwords for state and local agencies. They are requirements state and local agencies grapple with in unprecedented technology demands. Join us to discover how to optimize your cloud technologies safer, faster, and simpler. In the pursuit of an efficient path to the cloud and digital modernization, public sector organizations need proven solutions and a trusted guide. Rackspac...
Add Favorite
Federal Government Contracting Trends f...
To develop a winning public sector contract strategy in an increasingly competitive market, you need to have a clear understanding of the market conditions that may impact the space. Our team of veteran market analysts and industry experts have identified five key themes expected to impact the 2022 Federal government contracting market which you will want to leverage in your strategy development: The impact of new funding sources and appropria...
Add Favorite
Strategic Use of Federal Funds Availabl...
Join Fortinet and Carahsoft for an in-depth review of the current state of federal funding for K-12. Educational institutions are often the target of cyberattacks, but have limited resources to deploy in defending against them. The pressure on IT and security experts in educational institutions to do more with less is constantly increasing as well. During this webinar, participants will learn about: Federal funding that is currently available...
Add Favorite
5 Microsoft Teams Sprawl Best Practices
The power of Microsoft Teams has never been clearer, or more frequently stress-tested, than in recent years. Our collective shift to remote and hybrid working has led to an explosion in Microsoft Teams use (with a whopping 250 million monthly users), and that's not the only thing that's skyrocketed. Security concerns, performance issues, and the need to understand user data have also increased. Learn how to fix it! Join us for a webinar to dis...
Add Favorite
Optimizing the Effectiveness of Your Da...
Join insider risk expert Mark Wojtasiak, VP of Research & Strategy at Code42, to explore the value of taking a proactive Insider Risk Management (IRM) approach to data protection and strategizing ways to avoid data leaks and theft without disrupting productivity or collaboration. This webinar will explore: Why DLP strategies require a layered approach What controls are needed to protect sensitive data from exfiltration How to continuously...
Add Favorite
Observability - Keeping Citizen and Stu...
Splunk’s Observability Suite provides a single, consistent user experience across all metric, trace, and log data. This provides a seamless and streamlined workflow for monitoring, troubleshooting, and investigation – ultimately making it easy to go from problem detection to resolution in minutes. Whether you’re a front-end developer who needs to know what end customers are experiencing, a back-end developer building APIs and...
Add Favorite
Zero-Trust Mobile Application Environment
With the pandemic, the DOD has to depend on and leverage mobility even more. This has only increased the demand and desire for more first and third party applications to be deployed. With the rush of demand comes the struggle to deploy without SOP's. NowSecure can optimize your mobile AppSec pipeline to meet that demand.With the push for these new mobile applications, many agencies have discovered there is a need for integrated continuous test...
Add Favorite
Back to Search Begin New Search