Identify Nefarious Actors and Prevent D...
You are invited to join SailPoint and Splunk for a live webinar on Tuesday, February 18th to learn about the challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User Management, and User Behavior Analytics are critical in protecting high value assets from nefarious actors. When properly implemented modern identity governance and administration, identity audit, behavior monitoring, and analytics provide vi...
AvePoint Webinar: Debunking Myths: Nati...
Join AvePoint for a free webinar where we will debunk some of the more popular myths to show you how to maximize your coverage using native capabilities. Native Office 365 retention capabilities are often undersold by third-party backup vendors, leading agencies to second guess what level of data protection they actually need. The reality is that native safeguards, when managed correctly, can be the right choice for certain agencies to cover c...
Splunk Enterprise Security for the Army
Splunk Enterprise Security (ES) is the nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, and simplify threat management minimizing risk. Splunk ES helps teams gain organization-wide visibility and security intelligence for continuous monitoring, incident response, SOC operations, and providing executives a window into business risk.Join Splunk and Carahsoft for a pr...
Accelerate Video Content Creation with...
Communicating with citizens in today's government landscape requires creating engaging digital content that can be accessed across every surface and will resonate with all audiences. The industry-leading video editing software, Adobe Premiere Pro, enables creative professionals to bring their agency's story to life with workflows to craft footage into polished films and videos. Additionally, creatives can work seamlessly with other apps and se...
Container Security Webcast
Join Red Hat and Carahsoft and learn more about the role we play in this paradigm and dive into the technology behind container security. Learn how Red Hat Enterprise Linux (RHEL) and OpenShift, Red Hat's container application platform, work as great implementation vehicles for you agency. During this webcast, Mark Shoger, a Red Hat Certified Engineer, will discuss:How containers workThe advantage of running them on RHEL or OpenShiftHow import...
Start Your Zero Trust Journey with NetFoundry
What is your agency's zero trust strategy? Federal agencies are being directed by Federal CIO, Suzette Kent, to explore zero trust as a framework for new application and infrastructure deployments. The move to a zero trust architecture is an incremental journey that agencies need to start implementing immediately. NetFoundry has incorporated the concepts of zero trust, micro-segmentation, software-defined perimeters, and less privileged access...
Delta Lake Webcast
Managing data lakes can be challenging. Although they simplify the storage of data, data lakes are still difficult to manage and access. Databricks can fix this problem with Delta Lake, the open-source storage layer that brings reliability, performance, and lifecycle management to data lakes. Join us for an immersive webinar where you will learn about: Managing data lakes Delta Lake's ACID Compliance Scalable metadata handling Unified streamin...
Adobe Webinar for the USDA: Transform Y...
To address ever-changing policies, programs, and at times crises, government agencies need the ability to create, source, manage, and publish content faster than ever. Adobe Creative Cloud (CC) accelerates creative workflows, providing the technical assets to make designing and sharing your agency's story effective and faster than ever, all while upholding content quality. Join our complimentary webinar for the U.S. Department of Agriculture t...
Achieving Modern ICAM with a Best-in-Cl...
Government agencies require a higher level of security and user experience than ever before. According to the Office of Management and Budget's updated policy around identity, credentials, and access management (ICAM), agencies are being encouraged to use more flexible solutions, supporting pilots for new authenticators, and requiring the creation of a dedicated ICAM team. Join Radiant Logic for an important webinar as we discuss a best-in-cla...
The Future of Encrypting Network Data
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) networks to securely deliver information when and where we need it has increased. Thales Trusted Cyber Technologies, offers a network security solution th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.