Back to Search Begin New Search Save Search Auto-Notify
Migrate, Optimize, and Modernize with V...
Attendees explored the capabilities of VMC on AWS to facilitate faster and more cost-effective cloud workload migration for their agency. They experienced the transformation of applications and infrastructure services using familiar tools and increased scalability. During our in-person workshop, subject-matter experts will review the following topics: Accelerating datacenter evacuations with VMC on AWS Procurement and certifications Customer...
Add Favorite
Secure And Hunt At Scale With Armis
In today's connected world, unseen threats like compromised vendors, malware and vulnerable devices hide within your supply chain. Managing this vast attack surface feels impossible. Enter the Armis Intelligence Center. Armis Intelligence Center unifies global threat intelligence with real-time data on every device, from IT to OT and IoT. Get deep insights into vendor security, compromised components and ongoing threats. Proactively hunt threa...
Add Favorite
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
Add Favorite
WEST 2024 Webinar Series: Fortifying th...
AFCEA WEST 2024 Webinar Series: Anjuna: Fortifying the Digital Frontlines: Confidential Computing for National Security Anjuna and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Attendees of this webinar learned: The importance of confidential computing Common use cases for customers of Anj...
Add Favorite
Building Strong Foundations for Enhance...
Modern citizens expect electronic services from their government to be on par with private sector offerings, which use data collected through forms to provide an experience that is tailored to them. The challenge of collecting, maintaining, and retrieving data from both clients and staff using outdated form systems can be daunting. Transitioning to advanced digital forms transforms this process, offering a streamlined method for data submissi...
Add Favorite
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Add Favorite
Beyond the Basics: Advanced Strategies...
Atttendees joined HashiCorp and industry experts on March 20th for an in-depth exploration of HashiCorp Vault's advanced capabilities, designed to take your agency's security to new heights. This user group devled deeper into cultivating advanced strategies with HashiCorp Vault. Enable additional key use cases beyond static secrets management to enhance and increase your security posture and secure automated workflows, across any platform, fro...
Add Favorite
Deciphering CMMC 2.0 Timelines & Milestones
During this webinar, we covered the latest CMMC 2.0 timelines, delivered expert insights, and showcased advanced techniques that will empower organizations to achieve CMMC 2.0 while improving their business operations. We helped prepare businesses for a future of security, success, and unparalleled opportunities in defense contracting! In this webinar, we covered: The CMMC 2.0 Overview Navigating the Timeline Risk Management The Proactive Appr...
Add Favorite
Bridge the Gap Between Productivity and...
Remote access use cases have exploded across the government. Unfortunately, security is often not top of mind as these solutions are deployed, whether because they are urgently implemented or stretched for inappropriate use cases. Yet identities and their privileges are at the heart of almost every cyberattack today and remote access software could easily be misused or co-opted. Watch the on-demand recording to understand how BeyondTrust...
Add Favorite
Enhancing Security Across Digital Docum...
PDFs are widely used for storing, sharing, and archiving documents, including highly classified or confidential information. Ensuring the security of these PDF documents is crucial to protect against unauthorized access, data breaches, and information leaks that can have severe consequences for national security, privacy, and the integrity of government operations. Adobe is empowering agencies to transform their manual document processes with...
Add Favorite
Back to Search Begin New Search