Back to Search Begin New Search Save Search Auto-Notify
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
CX Reimagined: How SMS Fosters Citizen...
Digitizing government services provides a unique opportunity to engage and serve the public. Prioritizing multi-channel outreach strategies has helped agencies to better engage with their vast audiences and underserved communities. Building an inclusive, transparent government starts with strategic communications that reach people where they are most. Governments benefit from creating thoughtful interactions that provide updates to enhance the...
Add Favorite
Brand Protection and Enhanced Email Sec...
Anyone involved in email security today is likely familiar with the Domain-based Message Authentication Reporting and Conformance (DMARC) standard and its role in helping to secure email from threats like spam, phishing and email spoofing. But what is DMARC exactly, and how does it add another layer of security to business email systems? Register now to join Brad Allen, Sales Engineer at Mimecast, to learn: How to gain insight and control ove...
Add Favorite
Who's Minding the Keys to the Kingdom?
Cryptographic keys are some of your organization’s most precious assets, therefore it’s essential to know who is minding them. The value of any key is equivalent to the value of all the data it protects. A single stolen or misallocated key could lead to a huge data breach with the consequential reputational damage, penal regulatory fines, and loss of investor and customer confidence. In this on-demand webinar you will learn how to:...
Add Favorite
Streamline Your Data Management with Cl...
Modernizing your data management environment can be intimidating due to the years involved with moving an on-premise infrastructure to a cloud-based solution, but it doesn’t have to be. Today’s modernization tools and proven methods can be leveraged to expedite the process while reducing risk of errors. Agencies can avoid costly manual rebuilding and reimplementation, enabling them to swiftly harness the benefits of cloud technolog...
Add Favorite
Talk Data to Me: eDiscovery Unraveled
During this webinar featured speakers Jonathan Ferguson, Digital Solutions Lead, Hitachi Vantara Federal, and Dr. Pragyansmita Nayak, Chief Data Scientist, Hitachi Vantara Federal, will provide an overview of the critical components and challenges of eDiscovery to help you better understand and plan for the vast and heterogeneous nature of data sources, differing data formats, privacy concerns, and accurately assessing and categorizing data fo...
Add Favorite
Navigating Government Workforce Develop...
As the government landscape evolves, nurturing internal mobility has become a cornerstone of talent management. Join us for a thought-provoking webinar tailored exclusively for government leaders seeking to transform their workforce development strategies. Discover how LinkedIn Talent Solutions can drive internal mobility, retention, and upskilling within your organization. Specifically, attendees will hear topics such as: The power of interna...
Add Favorite
Dell Technologies Webinar Series
Join Dell Technologies and Carahsoft to learn about: Zero Trust & Data Protection Suite Edge & AI Hybrid Cloud & HCI Dell's Portfolio & Success
Add Favorite
Dell Technologies Webinar Series
Join Dell Technologies and Carahsoft to learn about: Zero Trust & Data Protection Suite Edge & AI Hybrid Cloud & HCI Dell's Portfolio & Success
Add Favorite
Protect Your Government Agency's Data a...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl and tool expenses. Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture that surfaces a level of understanding unattainable beforehand....
Add Favorite
Back to Search Begin New Search