Back to Search Begin New Search Save Search Auto-Notify
Improving Government Service Delivery:...
Across government, permitting is run with a number of homegrown systems that are still primarily manual and paper-based. This means there is no little to no visibility for both the citizens submitting permit requests and the stakeholders involved in the process. This also brings challenges to the government workforce forcing them to swivel chair between systems resulting in lower productivity. ServiceNow’s Public Sector Digital Services...
Add Favorite
Rebooting IT: Automations Essential Role
Modern IT leaders are facing a critical market demand: automate, or be left behind. Regardless of where you are in your IT modernization journey, creating an enterprise-wide approach to automation can help you optimize your IT processes and teams. Join Red Hat online for real-world use cases and examples of organizations that are leveraging Red Hat Ansible Automation Platform to fulfill their IT automation needs. This webinar, led by the Red...
Add Favorite
Modern Device Management for the Warfighter
Thank you for your interest in our Ivanti webinar: Modern Device Management for the Warfighter Unfortunately, this webinar is now over. We're sorry we missed you! In this webinar, attendees learned about: DMUC and protective security features Endpoint Mobility Modernization for the warfighter The future of mobile endpoints in the DoD DoD personnel with personal mobile devices and adopting a BYOAD program Register to view this on-demand recording.
Add Favorite
Tame Your Agency's Data Chaos
During this webinar SAP NS2 went over how modernizing data platforms is essential for agencies. By providing your agency with up-to-date infrastructure and solutions, you enable it to consistently deliver the comprehensive insights necessary for mission success. Join SAP NS2 as they support you and your agency throughout the modernization process. During this on-demand webinar, our expert speaker covered: Migrating from legacy operating system...
Add Favorite
Setting Sail with DevSecOps: A Blueprin...
Modern workflows are defined by digital collaboration. As projects scale and multiple departments get involved, agile communication is key to pushing projects forward. DevSecOps strategies realign cross-team efforts by giving agencies a complete picture of their projects. With compliant digital tools, teams can achieve agile communication standards that speed delivery, incident response and more. During this webinar, attendees learned how DevS...
Add Favorite
AFCEA WEST 2024 Webinar Series: Ivanti:...
In this WEST 2024 webinar session, you will learn about: Ivanti accreditations and customers The state of the UEM market in 2024 Ivanti's recent development within the UEM space Augmenting the UEM capability and migration capabilities
Add Favorite
Atlassian Team Tour: Government 2024
Atlassian is transforming government teamwork with tailored solutions to meet your agency's security and compliance needs. Enhance service delivery, responsiveness and mission success with insights from this year’s Team Tour: Government which was hosted on March 6, 2024 in Washington, D.C. Access all recordings on-demand, including keynotes and breakout sessions, and discover: Actionable tips to break down silos so your teams can increas...
Add Favorite
F5 SLED Lab Series: Go for Gold in F5 S...
State, Local, and Education organizations and agencies are facing a crossroads and F5 is here to help! Attendees joined us for the next step in our “Go for Gold” series for a hands-on lab and earned a gold medal in F5 Distributed Cloud. On one hand, you're under pressure to modernize your IT infrastructure to meet the demands of today's digital landscape. On the other hand, you're swimming against the tide with the ever-increasing...
Add Favorite
Migrating from a Legacy VPN to a ZTNA S...
Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New security challenges present themselves that traditional remote access solutions weren't designed to solve. To address this new reality, organ...
Add Favorite
How to Leverage AI to Optimize Your SOC...
Security Operations Centers struggle to keep pace with modern cybersecurity threat requirements. The volume and speed of threats (IOCs and IOAs) are well beyond the processing capabilities of even experienced security analysts, and this constraint doesn’t factor in the cost of these systems, which are expensive to buy, integrate and maintain.In this webinar, Tracy Williams from Anomali discussed the application of innovative AI technolog...
Add Favorite
Back to Search Begin New Search