3,086 webcasts found
+ 55963 past events found
Back to Search Begin New Search Save Search Auto-Notify
Oracle GoldenGate: Real-Time Data Integration
Oracle GoldenGate is an important solution for government agencies that offers real-time data synchronization, high scalability, and performance availability. It ensures seamless integration across diverse platforms and enables real-time access to the most critical information. With cross-platform compatibility and strong security features, Oracle GoldenGate empowers your organization to meet regulatory requirements and efficiently manages dat...
Add Favorite
Identity Based Access for Warfighter Cy...
Zero Trust is a cutting-edge cybersecurity method gaining ground, especially in defense and government agencies like the Defense Information Systems Agency (DISA). Adopting a Zero Trust model revolves around the continuous verification and monitoring of all devices and users trying to access any network, ensuring cyber resiliency and robust security measures for secrets management, encryption, access control and auditing in warfighter operatio...
Add Favorite
2024: FAR Part 4, Administrative Matters
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
Organizational Health Index: Driving Pe...
There is a clear link between organizational health and long-term, sustainable performance. McKinsey research of 20+ years demonstrates that organizations that focus on Organizational Health continue to have higher performance, better talent retention, and more resilience. An investment in good Organizational Health is an investment in great performance. Watch our complimentary Executive-level briefing to learn about the McKinsey Organizationa...
Add Favorite
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. This technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At the same time, Gigam...
Add Favorite
Protect Your Students and Data from Cyb...
Carahsoft and iboss had an informational webinar on the features and benefits of implementing an E-Rate eligible Firewall-As-A-Service (FWaaS). The iboss Zero Trust Edge (ZTE) FWaaS platform can help protect students and data from cyber-attacks. It includes a wide range of advanced features, such as: Advanced Threat Protection (ATP) Cloud App Firewall and Monitoring Intrusion Prevention System (IPS) Advanced Antimalware Defense Domain Name Sys...
Add Favorite
The Future of Cloud and Government: How...
The tech trends of today are foreshadowing three disruptive shifts of tomorrow—ubiquitous computing, AI co-reasoning, and quantum at scale. These forces are collectively shaping the future direction of the cloud and will enable innovation that transforms government and society in the coming years. Watch this on-demand webinar where Microsoft will look more closely at the ground-breaking innovations that will influence the trajectory of g...
Add Favorite
Embrace the Power of NinjaOne
IT leaders in state and local governments face unique challenges in supporting diverse agencies efficiently. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency. NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabili...
Add Favorite
Illuminating the Darknet for Government...
Thank you for your interest in this event. Attendees of this on-demand webinar learned how the darknet can be used to: Track illicit sales of drugs, human trafficking, and cyber weapons Detect potential threats and monitor persons of interest Stay one step ahead of foreign Nation-State adversarial activity and attacks Learn the latest tactics, techniques, and procedures of threat actors to better prevent future cyberattacks on critical infrast...
Add Favorite
JADC2 Intelligent Automation Exoskeleto...
This on-demand webinar explored the innovative integration of UiPath’s cutting-edge automation and AI capabilities to create an 'Automation Exoskeleton' for intelligence analysis. These solutions are designed to augment and enhance the efficiency of intelligence analysts in processing and interpreting vast and complex datasets and reducing the pain of the intelligence-publication process. With this technology, the speed and accuracy of t...
Add Favorite
Back to Search Begin New Search