Back to Search Begin New Search Save Search Auto-Notify
Assess Your On-Prem Environment, See Yo...
Your path from On-Prem to the Cloud may have more questions than answers. Google Cloud can help you bridge those gaps with assessment and readiness tools that will give you confidence in your migrations to the Cloud. Join this webinar to learn how other agencies are adopting the Cloud and learn a simple phased approach to start your own journey to the Cloud. Hear from a Google Engineer about how Google Cloud can do a mutual assessment of your...
Add Favorite
Five Ways Government Can Streamline Pro...
Citizens and staff members expect more from government digital services now more than ever before. At the same time, agencies are having to accomplish more with less in a flat budget environment. Digital forms and electronic signatures can help government do more with less while meeting rising expectations from the public staff. Register now to secure your spot! Join DocuSign to learn how the most successful government agencies are streamlinin...
Add Favorite
Right Message, Right Time: How A-List G...
Let’s step inside the minds of government’s top performers and discover how their communication strategies are reaching more people, keeping them engaged, and providing them with the right message at the right time — in the right medium. Join us on September 26th for a free webinar if you’ve ever wondered: Is there a better subject line for this email? What or how much content should I put in this email? Am I sending co...
Add Favorite
Transform your Business with VMware Clo...
VMware Cloud Foundation brings together virtualized compute, storage, and networking into a unified cloud operating model that allows your organization to reduce costs while increasing agility, standardization, and intrinsic security. VMware’s Cloud Operating Model combines consistent infrastructure, operations, and intrinsic security posture across the entire stack. This is the way to deploy, maintain, and update the software-defined da...
Add Favorite
Secure Your Move to Cloud with Zero Tru...
The promise of cloud and mobility is to provide access to key services quickly and comprehensively - any user, any location, any time, any device. Security teams are embracing technologies that ensure productivity while retaining visibility and control, as applications migrate from datacenter to cloud and users are increasingly outside any security perimeter.To clarify this complex topic, NIST has published Draft Special Publication 800-207, d...
Add Favorite
Government To Citizen: Top Digital Cust...
In our evolving digital age, prioritizing the customer experience (CX) has become one of the most important and efficient ways to increase engagement, and new technologies are helping organizations do so. Staying on top of the newest CX and technology trends to meet citizen expectations can be difficult though. Join us online Thursday, March 12 from 2-3 p.m. ET/11 a.m. – noon PT for a panel discussion featuring customer experience expert...
Add Favorite
Investigating SAP in Real-Time with Splunk
Join Rhondos and Carahsoft as they present SAP PowerConnect for Splunk, the only certified solution to bring all data from SAP to Splunk. SAP is an organization's largest, most complex, and most critical financial application and until now real-time monitoring has been extremely limited. By essentially writing a Splunk heavy forwarder as an SAP add-on in SAP's native languages, PowerConnect allows organizations to leverage Splunk for security,...
Add Favorite
HPE Insights and Solutions for Enabling...
The COVID-19 pandemic has triggered enormous challenges for government IT, which must support a growing demand for a remote workforce to continue operations while responding to public health and welfare concerns. HPE and Aruba have mobilized the full weight of our respective resources and eco-system of partners to provide technology, solutions, expertise and support to help our government customers with these challenges. Join this webinar and...
Add Favorite
Putting MITRE ATT&CK Into Action
Utilizing compromised or fraudulent credentials are a disproportionate hot spot in threat reports. So, it makes sense to look for that in your threat hunting. But where do you start? The answer is MITRE ATT&CK. In this session, Exabeam will close the loop between MITRE ATT&CK TTPs and deep analysis of security events to recognize malicious activity that is difficult to distinguish from innocent day-to-day operations. Join us for this o...
Add Favorite
Dragon Speech Recognition: Increased Pr...
Join us for this webinar and see how Dragon Speech Recognition Solutions enables you to keep up with documentation productivity and generate reports with higher detail and accuracy while accelerating professional documentation. From transcribing committee meetings and correspondence to drafting hearing notes and reports, Dragon Speech Recognition Solutions let you do it all—faster and more efficiently. You can increase your productivity...
Add Favorite
Back to Search Begin New Search