Empower IOT Devices and Programs With APIs
With 50 billion IOT devices connected in 2020 and machine-to-machine communication growing by 25% annually, the impact of IOT devices and the data being generated from them, is tremendous. For defense agencies and the broader public sector, the growing role of IOT devices also means agencies need to prepare today to maximize the impact of these IOT programs in the future. Join us for this virtual session where we will review how APIs can empow...
Zero Trust for Smartphones
On behalf of Lookout and Carahsoft, we would like to invite you to join our webinar on mobile security for U.S. civilian agencies. Attendees of this webinar will hear the following topics: Colonial Pipeline attack BYOD/Unmanaged Smartphone Protection – Complete security is needed Vulnerable entry points into your infrastructure Software-defined perimeter & Continuous / Conditional access controls Smartphones accessing your VPN? Ranso...
Introducing Next Generation SD-WAN with...
As a result of cloud adoption, and high-performance broadband and infrastructure automation, organizations nationwide have inevitably changed. Now, mobile users directly access the cloud for their app and data needs. It is time to start taking control of your apps and data with the software-defined wide area network (SD-WAN), which promises to enable organizations to seamlessly embrace the benefits of network transformation and remove any limi...
Create Your First Custom App for Adobe...
CANCELED
Custom apps in Adobe Connect can add limitless functionality to your virtual room. In this technical session, we'll cover the basics of developing an HTML app for Adobe Connect that is synchronized for all participants. Please note that a basic understanding of HTML, CSS, and Javascript is recommended for this session, but not required.
Appsian PeopleSoft Webinar
Recent events related to Coronavirus have required the development of telecommuting strategies - more specifically enabling PeopleSoft to be accessed in a mobile and secure manner. As a traditional on-premise ERP, PeopleSoft has limited authentication and data security features; as authentication is entirely based on an antiquated username and password security model. In order to not disrupt business processes, organizations must scope how the...
Protect Your Identity When Conducting L...
Operating on the Internet creates a cyber threat to law enforcement entities who might want to conduct discreet research, online surveillance, or establish private communication channels. Those who use the Internet unprotected are vulnerable to adversaries through exposed IP addresses, network identity, and geo-location. NetAbstraction is a cloud-based service that alters your public online identity and disguises your network connectivity. By...
Splunk Webinar Series: To the Basics an...
Curious about how Splunk can help your organization? Join us for this informative on demand webinar series where we will discuss a variety of topics ranging from Splunk 101, machine data, IT operations, security, and more. This series will provide a wide overview of how you can leverage your machine data, gain real-time insights, and make smarter business decisions within your agency. Splunk for IT Operations Don't let your IT management and m...
Live Webinar: Protect Your Agency's Cel...
Join BlackBerry for a live webinar that focuses on the risks and how to better secure your organization with BlackBerry's SecuSUITE, a National Information Assurance Partnership (NIAP) and Commercial Solutions for Classified (CSfC) certified platform.During this webinar attendees will learn:The scope of the current risk to cellular communicationsWhy consumer grade messaging systems are not suitable solutionsTypes of communications you should c...
Live Webinar: Protect Your Agency's Cel...
Join BlackBerry for a live webinar that focuses on the risks and how to better secure your organization with BlackBerry's SecuSUITE, a National Information Assurance Partnership (NIAP) and Commercial Solutions for Classified (CSfC) certified platform. During this on demand webcast attendees will learn: The scope of the current risk to cellular communications Why consumer grade messaging systems are not suitable solutions Types of communicatio...
Live Webinar:Secure Mobile Access to Sa...
In this webinar, attendees will learn how Swyft Mobile for Salesforce enables case workers, agents, and government contractors to:Access confidential information about projects and constituents while mobile, both online and offlineSecurely send emails to Salesforce contacts and access Salesforce web links in a secure browserManage cases, opportunities, submit items for approval, and securely share documents with Salesforce and BlackBerry Dynam...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.