Back to Search Begin New Search Save Search Auto-Notify
Deploy Your Future Tactical Network Now
Defense organizations are now planning to implement an unprecedented array of technologies to ensure they maintain C5ISR overmatch -- integrated into tactical networks from the dismounted soldier all the way to the enterprise. These new technologies enable soldier and command post mobility, autonomy, sensor integration, all-domain situational understanding, cyber defense, cloud access and replication, and resilient communications in disconnect...
September 23, 2020
Organizer: AFCEA International | Signal Webinar Series
Location: Webcast
Add Favorite
The Evolution of Data Protection: From...
Tired of periodic backups that don’t meet the availability demands of your agency? Worried about recovering quickly from an outage or ransomware? Concerned about your ability to prove you can recover during annual compliance audits? It’s time to rethink your backup strategy with continuous data protection. Join this webinar to learn how Zerto can help you execute your day-to-day data protection strategy and streamline the number of...
August 11, 2020
Organizer: Signal
Location: Webcast
Add Favorite
Identity Governance in Multi-Cloud Envi...
These days, more than three out of four agencies use multiple cloud platforms. This gives them the freedom to match the requirements of each use case to the unique strengths of each cloud platform, whether it’s AWS, Azure or Google Cloud Platform. What these agencies lack, however, is a way to effectively and securely govern access across these multi-cloud environments. These challenges leave businesses open to the risks and costs of non...
July 28, 2020
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Why Just-in-Time (JIT) Privileged Acces...
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation....
March 17, 2020
Organizer: SIGNAL Media
Location: Webcast
Add Favorite
Achieving Instant Situational Awareness...
The proliferation of intelligence, surveillance and reconnaissance (ISR) information is radically changing the landscape of the defense and intelligence community. Command centers’ designers and operators current focus is determining how to use available ISR information sources to assess situations immediately and better support the warfighter. A next-generation command and control infrastructure solution simplifies multi-classification...
May 2, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Back to Search Begin New Search