450 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify
Zscaler 5G Webinar
View this on-demand webinar to learn more about the evolution of 5G for government, keys to adopting and integrating 5G into your digital transformation, and how Zero Trust solutions play a critical role in keeping users and assets protected. 5G is here to stay and critical for federal agencies and government contractors in driving transformation. Whether or not 5G is part of your current strategy, it is creating a new, ultra-connected environ...
Add Favorite
Straight Up Security with Palo Alto Net...
Nutanix took attendees through their hybrid cloud journey and showed how Palo Alto Networks can help secure their hybrid cloud environments. VM Series integrates with Nutanix Flow, augmenting Flow’s ability to control traffic with advanced threat prevention capabilities. View this on-demand webinar, to learn how to: Reduce the attack surface to detect and stop threats trying to penetrate the security perimeter Deliver seamless, consisten...
Add Favorite
Recovering from a Ransomware Attack wit...
According to the FBI, there is a ransomware attack on the United States Government and its enterprises every 11 seconds. After ransomware enters the system, it encrypts accessible files that are present on the computer and spreads throughout the network. These files have become unusable unless decrypted with a special key owned only by the cybercriminal and released in exchange for payment with an untraceable/pseudonymous method. Kapalya has d...
Add Favorite
Reinvent Your Core Facility Services wi...
Core facilities provide scientific services that are essential to enable high-impact research. However, in most institutions, core facilities still rely on manual processes and basic tools like spreadsheets and shared calendars to manage complex services involving sophisticated technology, high-level expertise, and deep interactions between staff and users to ensure the quality of scientific results. View this on-demand webinar to learn more a...
Add Favorite
Five Steps to SASE
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is drastically different. The iboss Private Access service inverts the VPN model completely. Instead of granting a user access to pr...
Add Favorite
Protect Your Workloads with VMware vSph...
Workload Security for VMware vSphere provides administrators with an integrated and simple approach to protecting your workloads against sophisticated cyberattacks such as ransomware, and comes already native inside vSphere. No need to dedicate memory or central processing units (CPU) for scans, Workload Security is purpose built for protecting servers and virtual machines at the hypervisor host level, increasing performance while eliminating...
Add Favorite
Beyond IT Security, Cyber-Physical Conv...
Well past cyber "wake-up calls", recent security events prove that there is nothing more important for organizations than to be prepared for the unexpected. In this era of digital transformation, the line between cyber and physical worlds has faded. Today's blended threats attack deep within connected industrial control systems and networks, yet most organizations still manage and operate their security in silos. In this on-demand session, lea...
Add Favorite
Build a Modern Identity Infrastructure:...
View this on-demand session, Chad Peterson, Senior Sales Engineer at Okta, as he discussed how to retire costly legacy infrastructure and complex code development by modernizing your agency's IT platform with a modern identity infrastructure.
Add Favorite
Cyber Threats & Lessons Learned from 20...
View this on-demand webinar to review some of the most impactful hacks from 2021 and the key takeaways for protecting critical data and infrastructure as we enter into the new year of 2022. Topics discussed include: A review of some of the most effective hacks of 2021 such as the Colonial Pipeline ransomware incident, SolarWinds supply chain attack, Microsoft Exchange hack, NSO Group Apple iOS hack with Pegasus, and more. Why an understanding...
Add Favorite
Delivering Secure and Personalized Stud...
Today's academic institutions are under increasing pressure to use the latest technologies to attract and retain students. Online learning is a way of life now and for the next generation. Meanwhile, faculty and staff also need to work safely and securely from any location. Across the board, users have higher expectations about their consumer technology experiences. Watch this on-demand webcast to learn how your institution can: Deliver excep...
Add Favorite
Back to Search Begin New Search