Back to Search Begin New Search Save Search Auto-Notify
Revamp Your Digital Creation Capabiliti...
Adobe provides millions of creative professions within the public sector with the ability to create logos, icons, typography, and intricate drawings with Adobe Illustrator--the industry's top ranked, vector-based software for graphic design and digital illustration. From intricate web icons to unique product packaging, this sophisticated design software can turn simple shapes and drawings into stunning online images and graphics that can be ea...
Add Favorite
Customize Your eLearning Curriculum wit...
Adobe Connect provides a series of web service APIs, also known as XML-APIs, primarily known for their seamless integration capabilities with other systems, however, they can be used for so much more. Join us online to bust the myth that Adobe Connect APIs are solely used by developers and discover everything you can build with them. During this session, we will discuss the Adobe Connect XML-APIs and demonstrate how use them to develop custom...
Add Favorite
McAfee Secure Schools Webinar
Large amounts of personal data, various entry points, and budget constraints all contribute to a lack of strong security systems. Educational networks continue to be a favorite choice for cyber-criminals, with recent studies showing that one in five schools have been victim to cyber-crime. Although educational institutions may not seem as target rich as private business, the fact is a great deal of sensitive personal and financial information...
Add Favorite
Analysis and Data Management for Missio...
Join SAP NS2 and APEX for a webcast where we will discuss managing all types of data at large-scale to support missions at both the headquarters echelon and while deployed.ATLAS Intelligence Platform enables full motion video, images, and text documents to be quickly ingested and integrated into its secure data platform. All of this data is needed to support personnel deployed for military operations, disaster recovery, or border protection. T...
Add Favorite
Verve Webinar: Delivering Turnkey Secur...
The explosive growth of IOT and IIOT devices and technology is straining an already challenged OT environment for implementing and maintaining effective cybersecurity and reliability controls in operating environments. Traditional IT tools are ill-fitted and lacking in coverage outside of core IT systems and services, which is why we have built the first Operational Technology Systems Management (OTSM) platform. Our single pane of glass and ou...
Add Favorite
Transform your Business with VMware Clo...
VMware Cloud Foundation brings together virtualized compute, storage, and networking into a unified cloud operating model that allows your organization to reduce costs while increasing agility, standardization, and intrinsic security. VMware’s Cloud Operating Model combines consistent infrastructure, operations, and intrinsic security posture across the entire stack. This is the way to deploy, maintain, and update the software-defined da...
Add Favorite
Working with Mainframe and IBM i Data i...
Mainframes and IBM i systems continue to run many critical applications in the public sector; however, these systems are often left out of Splunk deployments because their data is complex and difficult to work with. A blind spot in your security and operational intelligence puts your organization at risk of failing an audit, or worse, so it's imperative to close this gap fast. Ironstream for Splunk helps eliminate this blind spot, by collectin...
Add Favorite
Brokering Services to Support IT Modern...
As the government CIO role evolves from IT support to business partner and broker of services, there is a need to have a different governance model and more willingness to standardize than before. So how does this work? What steps can you still take to simplify the IT stack, get better performance, lower costs, and make the service easier to consume-- whether it be case management, AI, identity management, payment systems, or any other common...
Add Favorite
ICAM Modernization: Honoring Your Legac...
You are invited to join Okta, SailPoint, and Radiant Logic on the morning of October 22nd as we gather to learn from and engage with Identity Credentials and Access Management (ICAM) experts. We will discuss their best-in-class identity governance, access management and virtualization solution and how it is proven to facilitate digital transformation, providing agencies and organizations the convenience of unified access and single sign-on wit...
Add Favorite
Tailoring Microsoft Teams & Delegating...
Driven by enterprise-wide adoption of Office 365, IT departments are rolling out Office 365 and providing a single-tenant across entire state entities, leading Federal agencies to embrace a single tenant for all subdivisions. Therefore, the challenge for these scenarios is that previously independent solutions now sit under the same Office 365 tenant: one set of tenant-wide settings. With native Office 365 functionality, when you disable exter...
Add Favorite
Back to Search Begin New Search