Back to Search Begin New Search Save Search Auto-Notify
The Future of Encrypting Network Data
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) networks to securely deliver information when and where we need it has increased. Thales Trusted Cyber Technologies, offers a network security solution th...
Add Favorite
Deploy Ultra-secure Remote Desktops wti...
Spend 60 minutes with Teradici to learn how you can secure desktops and workloads for a variety of public sector and federal use cases. You'll learn how: Ultra-secure PCoIP software and clients reduce attack risk, addressing government security requirements - hear updates related to TLS 1.2, FIPS 140-2, and DARS To efficiently roll out and manage virtual desktop deployments To leverage hybrid and cloud services for efficient IT To benefit from...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Improve Your Compliance Posture with Id...
Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts. Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
Add Favorite
Safeguarding Sensitive and Compliant Da...
Join us for a complimentary webinar on April 23rd to discuss how Thales TCT and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key management are substantia...
Add Favorite
HPE Insights and Solutions for Enabling...
The COVID-19 pandemic has triggered enormous challenges for government IT, which must support a growing demand for a remote workforce to continue operations while responding to public health and welfare concerns. HPE and Aruba have mobilized the full weight of our respective resources and eco-system of partners to provide technology, solutions, expertise and support to help our government customers with these challenges. Join this webinar and...
Add Favorite
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Add Favorite
Securing Your Data: The New Currency of...
Data is now currency for nation states, criminal organizations, and bad actors. They all want your data to sell to the highest bidder and your data could hold personal information, state secrets, or proprietary data. Please join Trustwave Government Solutions and learn more about the securing of crown jewels. During this webinar, you will have the opportunity to learn about: Data Security best practices for securing your databases Toxic Combin...
Add Favorite
Back to Search Begin New Search