Back to Search Begin New Search Save Search Auto-Notify
Achieving Modern ICAM with a Best-in-Cl...
Government agencies require a higher level of security and user experience than ever before. According to the Office of Management and Budget's updated policy around identity, credentials, and access management (ICAM), agencies are being encouraged to use more flexible solutions, supporting pilots for new authenticators, and requiring the creation of a dedicated ICAM team. Join Radiant Logic for an important webinar as we discuss a best-in-cla...
Add Favorite
The Future of Encrypting Network Data
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) networks to securely deliver information when and where we need it has increased. Thales Trusted Cyber Technologies, offers a network security solution th...
Add Favorite
Gain Key Insights From Your Data Flows...
Processing data at high volume and scale with visibility, data provenance, and lineage is not an easy task. When you add on managing streaming sources and edge applications with governance and security, it only adds to the complexity. Cloudera DataFlow (CDF) is a scalable, real-time streaming data platform that collects, curates, and analyzes data so that enterprises can gain key insights for immediate actionable intelligence. CDF addresses so...
Add Favorite
FedRAMP Webinar
Government agencies strive to secure and modernize critical systems from cybersecurity threats and insider threats. Email is by far the most frequent and prolific source of advanced attacks - more than 90% of advanced attacks start with email. Threat actors continue to adapt tools and techniques across attack types to exploit a range of vulnerabilities, including social engineering to trick people into clicking on malicious attachments or URLs...
Add Favorite
Trend Micro / AWS / 4 Points Joint Webinar
Join Trend Micro, AWS, and 4 Points to hear how they help the Federal Government Agencies:Rapidly deploy new capabilities to enhance the ability to perform their missions and secure their networksAccelerate migration of IT services to commercial cloud-services and infrastructureProvide visibility & control deploy data-level protections and automate cybersecurityLearn how to manage workloads, data, access, and overall governance with securi...
Add Favorite
Deploy Ultra-secure Remote Desktops wti...
Spend 60 minutes with Teradici to learn how you can secure desktops and workloads for a variety of public sector and federal use cases. You'll learn how: Ultra-secure PCoIP software and clients reduce attack risk, addressing government security requirements - hear updates related to TLS 1.2, FIPS 140-2, and DARS To efficiently roll out and manage virtual desktop deployments To leverage hybrid and cloud services for efficient IT To benefit from...
Add Favorite
Google Cloud 2020 Webinar Series: Moder...
Join Google Cloud and Carahsoft to learn how you can modernize your legacy applications into microservices. We will start off by showing you some patterns for breaking a monolith into microservices. We will demonstrate how to use Cloud Run to quickly deploy stateless, serverless workloads. Finally, we will show you how you can use Istio to secure and monitor your deployed microservices. This on-demand webinar will cover: Patterns for creating...
Add Favorite
Google Cloud 2020 Webinar Series: Augme...
Hints of a threat can come from anywhere, including places you weren't expecting. Join Google Cloud and Carahsoft to learn how to protect you and your organization from potential threats. The key to identifying a threat is to gather all of your data, be able to uniformly examine your threat events, and be capable of drilling down and pivoting with direct access to underlying data. Master how to properly apply machine learning and analytics tha...
Add Favorite
Secure Virtual Trainings & Meetings wit...
Security is more than just a meeting password! In the current public health emergency, collaboration and eLearning cloud services bear a lot of responsibility to uphold the highest standards of information security and privacy. Critical organizational data and assets can be at risk, especially for industries like government, financial services, and healthcare who are running mission-critical operations online everyday.Join us as we highlight w...
Add Favorite
Refreshing Your Data Strategy for the N...
The agility and improved mission support associated with the widespread move to cloud computing has made this megatrend one of the most positive forces in government IT. However, optimizing the use of multiple public clouds and on-prem solutions comes with challenges, especially with how data is managed in this environment. Publisher of CTOvision, Bob Gourley, will review key challenges that follow the use of hybrid clouds for data analytics....
Add Favorite
Back to Search Begin New Search