Deploying and Managing Kubernetes with...
VMware Virtual Power Block Sessions: VMware and Carahsoft would like to offer you the opportunity to attend a variety of sessions on all of the topics you and your agency care about. July 7th Session - Deploying and Managing Kubernetes with Tanzu Mission Control Run your Kubernetes workloads anywhere—with full support for hybrid and multi-cloud. Run Kubernetes in production at scale under consistent management with a strong security pos...
How to Ensure Short-Term Rental Safety...
Short-term vacation rentals are not regulated in the same way as traditional lodging industries. Safety requirements for these properties vary widely across jurisdictions, challenging the well-being of residents and visitors alike.Join Granicus for a complimentary webinar that will discuss the vital safety issues that are often overlooked as well as discussing the resources and technology available to local governments to ensure community safe...
Unified Endpoint Security: Bringing Ord...
Join BlackBerry and Carahsoft for a briefing on how the number of devices, users, applications, and services touching workplace resources is increasing exponentially while attackers only need one vulnerability for success. Allowing employees to access sensitive data with tablets, phones, or other mobile devices also offers attackers new avenues for breaching security. The outcome of the traditional approach to cybersecurity is obvious; motivat...
Building an Incident Response Approach...
Downtime is inevitable. New applications, shifting application usage trends, and remote work not only increase downtime frequency, but the length of downtime. While downtime may be inevitable, you and your team can choose how to respond. An incident response plan bolstered by an on-call system can help your team direct problems to the right people faster, recover from downtime more effectively, and reduce on-call burnout and "alert fatigue." T...
Fortify Series: WebInspect (DAST)
Micro Focus Government Solutions presents a webinar series, Fortify! Join any of the available sessions and learn from industry experts as they demo a Fortify solution and explain how your agency can benefit from these top-of-the line solutions. These Fortify solutions range from reducing manual auditing time in security testing to Fortify's intuitive integrations with Azure, automation, and more! Fortify Integrations Ecosystems Application se...
5-Part Webinar Series: Ensure Agency Re...
Session 4: Create and Update Agency Web Properties in Real Time Seemingly overnight, government agencies must overcome decades of technology debt to modernize their services and capabilities. They need to quickly convert legacy processes and seamlessly transition to online operations. Adobe offers powerful, fast-implemented solutions that help to quickly and easily modernize what you need, without a big overhaul. With digital transformation so...
5-Part Webinar Series: Ensure Agency Re...
Session 5: The Path Forward - Adapting Post-COVID-19 Seemingly overnight, government agencies must overcome decades of technology debt to modernize their services and capabilities. They need to quickly convert legacy processes and seamlessly transition to online operations. Adobe offers powerful, fast-implemented solutions that help to quickly and easily modernize what you need, without a big overhaul. With digital transformation solutions des...
SAP BusinessObjects User Group: Public Sector
We are excited to announce the next SAP BusinessObjects user group for Public Sector (Federal, State and Local) taking place on June 25th at 9:00am - 5:00pm ET. We've decided to bring you an amazing virtual event through interactive sessions and presentations. Join hundreds of your peers from around the globe to expand and refine your knowledge base and exchange ideas around SAP BusinessObjects and Analytics. This is a free learning opportunit...
Best Practices for Strong Authentication
Protecting your Intellectual Property and Online Transactions Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to secure access to agency networks, protect the identities of users, and ensure that a user is who they claim to be. Evolving needs around cloud applications and mobile devices, combined with rising threats, and the need to reduce costs, require entirely new considera...
DHS Enablement on Splunk for IT Operations
Join Splunk, WholePoint Systems, and your DHS peers on Wednesday, June 24th to learn how to improve your IT operations by utilizing Splunk!During this DHS focused webinar, attendees will gain insight into how ITSI and the Splunk App for Infrastructure:Leverages the data and investments DHS has already made with Splunk (fast time to value)Delivers a central, unified view of critical IT services for powerful, data-driven monitoringProvides busin...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.