Back to Search Begin New Search Save Search Auto-Notify
Complementing Splunk: Balancing Big Dat...
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real time. For that, agencies need an analytics-driven SIEM platform such as Splunk. However, once data is correlated by SIEM tools, it becomes extremely valuable. By integrating...
Add Favorite
Explore TIC 3.0 Multi-Cloud Networking...
Are you and your agency interested in a Trusted Internet Connection (TIC) 3.0 architecture pattern that delivers high-performance encryption (75Gbps+), as well as intelligent routing, advanced security, and cyber visibility? Join Aviatrix and Carahsoft to explore the approved TIC 3.0 architecture using the Multi-Cloud Networking and Security Platform. This platform is authorized to operate as a cloud-based TIC 3.0 Policy Enforcement Point and...
Add Favorite
Revolutionize Your Agency's Security Ma...
HashiCorp and industry experts came together on November 21st for a zero trust, identity-based hands-on workshop to discover how HashiCorp Vault enables enterprises to centrally store, access and distribute dynamic secrets like tokens, passwords, certificates and encryption keys across and public or private cloud environment. This hands-on on-demand workshop was the gateway to understanding how HashiCorp Vault simplifies the data journey of go...
Add Favorite
CTO Sessions: A Guide to BYOK and HYOK...
Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encr...
Add Favorite
Cortex XDR Coffee Talk: Brewing Up the...
Attendees of this on-demand webinar better understand how Cortex XDR allows for: Full visibility across network, Cortex endpoint, cloud, third party and identity sources, not just endpoint Reduced mean time to detect (MTTD) and mean time to respond (MTTR) Out-of-the-box identity-focused threat detection for initial access tactics, techniques, and procedures (TTPs) and available add-ons for advanced identity-based threat detection analytics, l...
Add Favorite
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. This technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At the same time, Gigam...
Add Favorite
CTO Sessions: Quantum Resistant Security
Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White House’s National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems states that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum com...
Add Favorite
Safeguarding Student Data - Zerto for R...
Zerto is one simple, scalable platform for backup, disaster recovery, and cloud mobility. Zerto helps customers protect, recover, and move their data and applications for continuous availability across on-premises, hybrid, and multi-cloud environments. Zerto’s software only solution is ideal for these use cases: Ransomware Resilience, Disaster Recovery and Multi-Cloud Mobility. Acquired by HPE in 2021, Zerto expands HPE GreenLake and con...
Add Favorite
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. This technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At the same time, Gigam...
Add Favorite
Understanding the Quantum Cybersecurity...
The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and employ to fortify their proactive stance in cybersecurity. During this webinar, attendees learned about quantum computing power and the...
Add Favorite
Back to Search Begin New Search