Back to Search Begin New Search Save Search Auto-Notify
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Unlock Decision Advantage with Real-Tim...
Through real-world DoD and IC use cases, Oracle examines the most advanced capabilities for capturing and leveraging data at the tactical edge. Oracle Roving Edge infrastructure enables real-time decision-making, even in the most austere environments with intermittent communications. Watch our on-demand webinar to discuss the latest strategies and innovations that enable the warfighter with decision advantage at the tactical edge. Oracle exper...
Add Favorite
Cybersecurity for Industrial Control Sy...
In this on-demand webinar, attendees learned about: Comprehensive threat detection to identify potential risks promptly Proactive attack prevention to physically block cyber attacks before they can compromise your critical infrastructure Enhancing overall operational efficiency while building resilience against cyber threats
Add Favorite
How Salesforce Delivers Precision Sustainment
Unfortunately, we have reached capacity for this event. To defend the nation against increasingly agile and sophisticated threat actors, the US Army must have the right equipment at the right time and right place with the highest readiness possible. Without a way to collect and synergize real time data regarding personnel, equipment, or maintenance in one accessible platform, defense leaders will have to make decisions based upon less-than-opt...
Add Favorite
Accelerating Authorization Capabilities...
Navigating the complexities of Identity, Credential, and Access Management (ICAM) can feel like a maze of acronyms – ABAC, PBAC, CBAC, oh my! Attendees joined for an insightful webinar where Bryan Rosensteel, Ping Identity's US Federal CTO, unravelled the intricacies of ICAM and shed light on fine-grained access control within a modern Zero Trust architecture. During this on-demand webinar, Bryan shared invaluable insights on: Decoding t...
Add Favorite
CMMC: A New Year with New Resolutions
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing updates to the CMMC program and key insights on: Perspectives from CMMC ecosystem experts, including perspectives from Matt Travis, CEO of The Cyber AB who will weigh in on the current status of the CMMC rule. Real-world experiences and challenges faced by organizations in adopting the CMMC fr...
Add Favorite
Modernizing Case Management in the US A...
Case management is ubiquitous in the public sector, but processes can often be arduous to streamline. Appian supports agencies with solutions for popular forms of case management, such as process-to-decision case management and investigative, incident, and service delivery. During this on-demand webinar attendees learned how Appian Case Management can help DoD agencies, like the the U.S. Air Force, with: Strategies for streamlining the impleme...
Add Favorite
Modern Device Management for the Warfighter
Thank you for your interest in our Ivanti webinar: Modern Device Management for the Warfighter Unfortunately, this webinar is now over. We're sorry we missed you! In this webinar, attendees learned about: DMUC and protective security features Endpoint Mobility Modernization for the warfighter The future of mobile endpoints in the DoD DoD personnel with personal mobile devices and adopting a BYOAD program Register to view this on-demand recording.
Add Favorite
Empowering Veterans: Mastering Red Hat...
Red Hat is dedicated to supporting the U.S. Department of Veterans Affairs (VA) in leveraging technology for significant transformation. This commitment involves fostering skills and knowledge through a combination of online trainings, in-person led sessions and personalized learning paths on Linux, automation and Kubernetes. VA colleagues joined Red Hat online and reviewed the Training and Certification offerings that are included in the Red...
Add Favorite
Back to Search Begin New Search