Back to Search Begin New Search Save Search Auto-Notify
Power Zero Trust Outcomes with Trellix
With the Zero Trust Maturity Model as our guide, Trellix invites Federal Agencies to learn about what strategic investments can be made today to help reach long term Zero Trust goals. During this on-demand session attendees learned about: How XDR can help with the maturity progress across multiple pillars. How to leverage existing investments to achieve Zero Trust outcomes The importance of contextualizing data from multiple sources to surface...
Add Favorite
Bring Your Video Vision to Life with Ex...
With Adobe After Effects, the possibilities for video editing and animation are endless. Government creatives are constantly searching for the next powerful creation tools, and with integration with applications such as Adobe Photoshop, Adobe Illustrator, and Adobe Premiere Pro, creating and executing ideas has never been simpler. Watch our on-demand webinar to discover how Adobe After Effects can take your video editing to the next level with...
Add Favorite
The Anatomy of a Ransomware Event: Awar...
Arete is transforming the way organizations prepare for, respond to, and prevent cybercrime. Our team responds to thousands of ransomware incidents and helps organizations get back up and running after attacks. By collecting data from these incidents, we create unparalleled insights into the ransomware landscape. We focus on security so you can focus on serving your customers and communities. Ransomware is a threat to businesses, governments,...
Add Favorite
The Business of Ransomware
Did you know there’s an entire underground economy around ransomware? In this webinar, Halcyon explained how Ransomware-as-a-Service (RaaS) groups operate, what an affiliate is, and how Initial Access Brokers (IABs) are the glue that holds them all together. The ransomware economy constantly changes, with groups disbanding or taking market share from competitors from quarter to quarter. Who will be crowned top dog in 2023? What you got o...
Add Favorite
Risk, Issue, and Opportunity Management...
How can ServiceNow help end-users comply with the DoD’s Released Management Guide, “DoD Department of Defense Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs”? During this session, we discussed how customers can both mitigate risk in portfolio management, as well as adhere to the requirements of the Management Guide - all in real-time (as opposed to accessing risk during a project postmortem ass...
Add Favorite
Forescout XDR Demo Desk
At this demo desk, we discussed the following key capabilities of Forescout XDR in-depth: Data Ingestion for more than 170 vendor and EDR-agnostic sources including: security, infrastructure, enrichment, applications and Cloud/SaaS sources. How the Threat Detection Engine applies five detection techniques to automatically generate high-fidelity, high-confidence true threats that warrant investigation while weeding out false positives. Full Spe...
Add Favorite
Automated, Intelligent Data Estate Mode...
During this webinar Impetus Technologies, AWS, Carahsoft covered innovative strategies to modernize data platforms to a modern cloud-native architecture for your agency. LeapLogic, Impetus’ cloud accelerator for extract, transform, and load (ETL), data warehouse, Hadoop, and analytics modernization, makes it possible to take on a sizeable transformational migration journey. Having successfully handled many migrations, LeapLogic’s t...
Add Favorite
Secure Applications and Data to Prevent...
Data security is always of utmost concern; today, we're reimagining security for a hybrid cloud future. Many traditional infrastructure stacks are comprised of products from multiple vendors, each decoupled from the stack, providing a narrow and limited view of security. Validating and maintaining a security baseline through continuous software upgrades is time-consuming and often involves error-prone manual processes that take away from innov...
Add Favorite
Operationalizing Zero Trust with Deep O...
Network blind spots prevent Zero Trust deployment from being successful due to the lack of visibility into network telemetry. As the network grows and evolves, this pain will worsen if not addressed at the foundational level. Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For any effective Zero Trust implementation, full network visibility and eli...
Add Favorite
Deliver Secure Hyper-Converged Infrastr...
With the growing number of digital transformation initiatives, hyper-converged infrastructure (HCI) has emerged as a simple, cost-effective solution. However, as HCIs amass large volumes of data across distributed resources, security compliance becomes a critical factor when protecting data at rest in an HCI. View this 60-minute webcast to learn how you can work with VMware and Thales TCT to deliver secure hyper-converged infrastructure soluti...
Add Favorite
Back to Search Begin New Search