Back to Search Begin New Search Save Search Auto-Notify
Centralizing Key Management Strategies
Join us for a complimentary on demand webcast to discuss how Thales CP&L Federal and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solution to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file level access controls, encryption, and key management are s...
Add Favorite
Discover a Better Way to Work with Powe...
More than five million organizations around the world rely on Adobe Acrobat Document Cloud (DC) to create and edit the smartest PDFs, convert PDFs to Microsoft Office formats, and so much more! From working on-the-go to collaborating with colleagues in multiple locations, Acrobat DC can help your agency to streamline document workflows and turn practically anything into a high-quality PDF that looks great on any screen.Join our complimentary w...
Add Favorite
2020 Trends in eLearning
There's a lot of changes coming to eLearning in 2020. Our reliance on artificial intelligence is increasing while our dependence on legacy course design software like Flash dwindles. Whether you teach 10 people or 10,000, you'll benefit from knowing how to incorporate new and trending strategies into your training materials. Join us for a complimentary on demand webcast on the top 6 trends in eLearning in 2020 and how Adobe eLearning tools can...
Add Favorite
Splunk Cloud Meets the FedRAMP Security...
Join Splunk and your DOE peers in this on demand webcast on the recent Splunk FedRAMP authorization and what this means to DOE. During this DOE-focused webinar attendees will gain insight regarding: Overview of Splunk's FedRAMP announcement & Compliance Aspects of Splunk Cloud Benefits of leveraging Splunk in the cloud Splunk apps and premium solutions authorized for use What is and isn't covered when leveraging Splunk's FedRAMP SaaS offer...
Add Favorite
Mobile App Vetting at Scale with Your MDM
With over 4.5 million apps in the Apple AppStore and Google Play Store, how does your agency determine if an app is safe to use? Mobile device management (MDM) enables centralized management of mobile devices but needs accurate app vetting data to protect the enterprise at the mobile app level. NowSecure Experts Andrew Hoog, Founder, and Brain Reed, CMO, will explore the easy, high-impact way to control your mobile app risk with the NowSecure...
Add Favorite
Solving the CDM Puzzle with F5 Webinar
Straight talk on maximizing the value of DHS' Continuous Diagnostics and Mitigation (CDM) Program for your agency. Is the "Gap Fill" still leaving "Gaps" in capability, visibility and perceived value of the program? Did you know that there are specific steps that you can take to make the program work for you? Are you eager to find ways to advance your agency cyber priorities and accelerate investments in capabilities that are directly applicab...
Add Favorite
Getting Started with Splunk Data Manipulation
Join us on January 15th for the Getting Started with Splunk Data Manipulation workshop, a hands-on introduction to the Splunk GUI. Attendees will learn how to upload a .csv to Splunk, perform simple field extractions, and build basic dashboards and reports! During this virtual workshop, attendees will utilize data to: Build several searches to gain more insight on the data set Explore how to set conditional searches Build custom visualizations...
Add Favorite
Detecting Federal Insider Threats: A Ne...
Detecting insider threats in not just about protecting data. What if suspicious activity starts before data is accessed? What if data is not the target? Detecting modern insider threats requires a new approach tailored for Federal agencies. On January 16th, join Michael Davis, Chief Technology Officer of GoSecure and author of "Hacking Exposed", to learn how Federal agencies have a new tool in their arsenal to detect, and respond, the latest i...
Add Favorite
Adopt a People-Centric Approach to Security
Security leaders at government agencies have a complex workforce to protect. Today, agency employees, contractors, partners, and even citizens all need access to applications and resources from a variety of different locations, including at work, at home, or from a local coffee shop. The rise of cloud and mobile devices has catalyzed rethinking modern security, but amidst this complexity, one consistency remains: credential-harvesting is the m...
Add Favorite
The Benefits of Migrating to a Modern T...
Tape Technology continues to dominate as the storage industry's preferred form of removable media. It remains the undeniable leader in affordability and reliability with recent advancements such as faster speeds, greater capacities, increased efficiencies, and quicker retrieval times. Join Spectra Logic during their webinar to hear Matt Ninesling, Hardware Engineering Director, discuss the importance of understanding the best practices, pitfal...
Add Favorite
Back to Search Begin New Search