57 webcasts found
+ 153 past events found
Back to Search Begin New Search Save Search Auto-Notify
Simplified Government Experiences Your...
Government services must be accessible, inclusive, and user-focused as public services become increasingly digitized. The delivery of equitable, integrated customer and employee experiences requires flexible and secure technology that connects the government with people and allows the exchange of information and expertise across agencies. Watch this four-part webinar series on-demand to hear Adobe experts as they explore best practices and sh...
Add Favorite
Cloud Skills Readiness for the Tech Tal...
87% of executives say they are actively experiencing a skill gap within their workforce, but less than half know how to address it. Hiring, training, and retaining top performing tech employees is a big job, and it can be hard to get right. Only 48% of organizations have hiring and training programs in place that align to bottom line growth. Is your company one of them, or are you falling behind? Access our complimentary webinar to learn abou...
Add Favorite
Georgia: Revolutionizing Customer Experience
In the ever-evolving landscape of information technology, government seeks to redefine the boundaries of innovation and efficiency. As the state moves towards a future where seamless connectivity and unparalleled user experiences are paramount, the strategic partnership with Genesys, a global leader in customer experience solutions, emerges as a powerful catalyst for this transformation. Carahsoft, TTEC Digital, and Genesys had an insightful w...
Add Favorite
Tenable Active Directory Security Demo
In this on-demand webinar Tenable and Carahsoft explored a demo of Tenable’s Active Directory security solution. Attendees learned how this security solution can help their organization: Discover underlying issues affecting Active Directory, identify dangerous trust relationships, and catch every change in your Active Directory.
Add Favorite
Intelligent Document Processing: The Va...
Download this Kofax and InfoCap Networks webinar to see how InfoCap Networks demonstrated to attendees the disciplines and technologies of data and document centric business processes into an Intelligent Business Process Management platform (iBPM) for business process automation, intelligent and omni-channel document capture, and robotic-process automation with Kofax Total Agility (KTA) software. InfoCap’s Intelligent Business Process Ma...
Add Favorite
CloudSynApps and Salesforce Grants Mana...
Join us October 10th to hear from Joy Toliao, an expert with 20+ years of public sector service as she shares her experience on the delivery and administration of grants/subsidy and housing programs. You will also learn how Cloud SynApps has leveraged the Power of Salesforce to transform the Grants Management experience providing streamlined processes, informed decision-making, grants disbursements, and a 360-degree view of constituents.
Add Favorite
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
Brand Protection and Enhanced Email Sec...
Anyone involved in email security today is likely familiar with the Domain-based Message Authentication Reporting and Conformance (DMARC) standard and its role in helping to secure email from threats like spam, phishing and email spoofing. But what is DMARC exactly, and how does it add another layer of security to business email systems? Register now to join Brad Allen, Sales Engineer at Mimecast, to learn: How to gain insight and control ove...
Add Favorite
Who's Minding the Keys to the Kingdom?
Cryptographic keys are some of your organization’s most precious assets, therefore it’s essential to know who is minding them. The value of any key is equivalent to the value of all the data it protects. A single stolen or misallocated key could lead to a huge data breach with the consequential reputational damage, penal regulatory fines, and loss of investor and customer confidence. In this on-demand webinar you will learn how to:...
Add Favorite
Streamline Your Data Management with Cl...
Modernizing your data management environment can be intimidating due to the years involved with moving an on-premise infrastructure to a cloud-based solution, but it doesn’t have to be. Today’s modernization tools and proven methods can be leveraged to expedite the process while reducing risk of errors. Agencies can avoid costly manual rebuilding and reimplementation, enabling them to swiftly harness the benefits of cloud technolog...
Add Favorite
Back to Search Begin New Search