288 webcasts found
+ 131 past events found
Back to Search Begin New Search Save Search Auto-Notify
Quarkus: The Next Java Framework for Fe...
Quarkus is an open source, Kubernetes-native Java framework tailored for Java virtual machines (JVMs) and native compilation. By re-imagining Java's stack, Quarkus gives Federal Systems Integrators the performance characteristics and developer experience needed to create modern, high-performing applications. Developers and operators can utilize existing Java skills and code in new ways while reducing the technical burden when moving to a Kuber...
Add Favorite
Straight Up Security with Palo Alto Net...
Nutanix took attendees through their hybrid cloud journey and showed how Palo Alto Networks can help secure their hybrid cloud environments. VM Series integrates with Nutanix Flow, augmenting Flow’s ability to control traffic with advanced threat prevention capabilities. View this on-demand webinar, to learn how to: Reduce the attack surface to detect and stop threats trying to penetrate the security perimeter Deliver seamless, consisten...
Add Favorite
Streamline and Simplify Database Manage...
The data landscape is forever evolving and growing exponentially, requiring organizations to find new ways to streamline and simplify their database estate management. Traditional methods of database management are manual, slow, complex, and expensive. As a result, many organizations and agencies are moving to a database as a service (DBaaS) model for managing and operating their databases. Cloud database models are efficient, agile, cost effe...
Add Favorite
Five Steps to SASE
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is drastically different. The iboss Private Access service inverts the VPN model completely. Instead of granting a user access to pr...
Add Favorite
Eliminating Cost & Complexity of Point...
Most organizations have deployed Microsoft 365, however many are still using point solutions, like Dropbox, for their file sharing and content collaboration. With M365 and e-Share, government organizations can retire these point solutions and securely and easily move their users and external file sharing needs to M365. View this on-demand webinar to discover how e-Share allows the modern collaboration and data protection capabilities of M365 (...
Add Favorite
Flexible IT Strategies in a Hybrid Clou...
Cloud smart, the Federal cloud computing strategy, challenges agencies to assess their IT requirements and find the environments and solutions that meet their unique goals. In response, most agencies are using a hybrid cloud approach with some applications and systems running in their data centers and others in public cloud environments. Choosing the proper model for a project depends on several factors and the outcome can have long-term ramif...
Add Favorite
Cloud Security Webinar: Myths and Oppor...
More and more, security is cited as a primary reason organisations around the world are embracing the cloud. Organisations that have moved to the cloud typically claim visibility and control over their data increases, versus what they had on-premises. But others continue to resist moving to the cloud arguing that it’s a security issue. How real are these threats and concerns, and where is the line between fact and myth? Join Tim Rains, t...
Add Favorite
Security & Compliance Basics: Learn the...
Think differently about data security in the cloud – it’s not the same as you’ll find on-premises. This session will walk you through the building blocks of a cloud security model and explain the key security features of Amazon Web Services (AWS). Data protection is the highest priority for any organisation, so we’ll be answering common questions about GDPR, data residency, freedom of information, and privacy. We...
Add Favorite
AWS Security Webinar: The Key to Effect...
It’s essential to protect your private data at all times, especially when you don’t control all the hardware and software components with access to that information. Encryption is a powerful way for organisations to maintain an appropriate level of data confidentiality and integrity. AWS offers many options for using encryption to protect your data in transit and at rest. A variety of features let you determine how much control you...
Add Favorite
Breaking Intrusion Kill Chains with AWS
Many cyber-attacks employ a repeatable process called the ‘intrusion kill chain’ to identify targets, weaknesses, potential exploits, and use them to victimize organizations. It’s how an attacker ultimately gains access to protected data to steal it, encrypt it, and/or destroy it. Pioneered by Lockheed Martin, anti-kill chain strategies are helping Chief Information Security Officers (CISOs) and cybersecurity practitioners ac...
Add Favorite
Back to Search Begin New Search