263 webcasts found
+ 246 past events found
Back to Search Begin New Search Save Search Auto-Notify
Prioritize Mission Delivery and Constit...
In today's landscape, delivering on promises to your constituents and strengthening their trust in your agency or organization is key to your mission. In this archived webinar, attendees learned how to protect the Salesforce data that drives your mission. Attendees of this on-demand webinar will explore: Mission delivery Continuity Security
Add Favorite
Managing Multi-Cloud Environments in 3 Steps
Multi-cloud application strategies have created unnecessary complexity in managing hybrid environments and services. Government agencies have an added hurdle with strict compliance and security concerns. Greymatter.io services multiple government agencies with improved security, visibility, and control over their application environments. Some of the most sensitive agencies in the U.S. trust Greymatter.io to safeguard their data. Greymatter.io...
Add Favorite
Unlock Decision Advantage with Real-Tim...
Through real-world DoD and IC use cases, Oracle examines the most advanced capabilities for capturing and leveraging data at the tactical edge. Oracle Roving Edge infrastructure enables real-time decision-making, even in the most austere environments with intermittent communications. Watch our on-demand webinar to discuss the latest strategies and innovations that enable the warfighter with decision advantage at the tactical edge. Oracle exper...
Add Favorite
Introduction to Synthetic Data for Comp...
In critical domains such as national security, federal asset management, and economic monitoring, the use of computer vision to extract information for decision-making and analysis is becoming increasingly urgent. The amount of video, photography, and other forms of sensor-based information being collected far outstrips our national capacity to staff and monitor data feeds with human eyes alone. Unfortunately, computer vision accuracy and perf...
Add Favorite
Tetrate DoDIIS Webinar: Simplify Kubern...
Managing applications in Kubernetes can be complex. Tetrate’s Service Mesh makes inter-service communication, traffic control, observability and security easier. During this webinar, Tetrate discussed how the Service Mesh addresses challenges that can occur with Kubernetes, making it scalable and flexible. Tune in to this on-demand webinar for insights on: Empowering your organization with Zero Trust security through the Service Mesh Pra...
Add Favorite
Enhancing Legal Document Management for...
Watch this complimentary on-demand webinar tailored to legal and technology professionals at government agencies as we delve into the world of legal document management. Hosted by industry leaders, NetDocuments and Element Technologies, this webinar is designed to equip you with the essential tools and knowledge to improve your agency’s legal operations. In this webinar, you will learn how you can: Ensure Mobility: Learn how mobility can...
Add Favorite
Demo: Tenable Operational Technology Security
This on-demand demo showcased how Tenable OT Security delivers complete visibility into an organization’s converged IT/OT infrastructure to help maximize the safety and security of your OT environment. Our Tenable OT Demo covered the following: Comprehensive visibility across converged IT/OT operations. Risk reduction through multiple threat detection methodologies. IT and OT asset identification and monitoring with Tenable OT Security....
Add Favorite
Aconex for Defense: Project Collaborati...
Oracle Aconex for Defense is a robust collaboration and information management solution that powers defense programs for successful delivery. Connect your teams and processes across the project lifecycle to drive performance and create a complete project record, all with military-grade security. With Aconex for Defense, your agency will receive workflow automation to maintain project momentum, BIM and mobile access to reduce risk and prevent r...
Add Favorite
Harnessing the Power of E-Signatures: E...
Adobe Acrobat Sign is an electronic signature platform that supports custom workflows and settings for securely sending documents for signatures and tracking their status. The use of such solutions has been trending due to the ease of use, quick turnaround time, and cost-effectiveness. As such, electronic signature adoption within government agencies remains on the rise. Discover how to digitize documents and workflows with Adobe Acrobat Sign...
Add Favorite
CTO SESSIONS: Everything You Need to Kn...
Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch attacks. The Federal Zero Trust Strategy prioritizes defense against sophisticated phishing and directs agencies to consolidate identity systems so that protections and monitoring can be consistently applied. Multi-factor authentication (MFA) plays a critical part of the Government’s strat...
Add Favorite
Back to Search Begin New Search