Back to Search Begin New Search Save Search Auto-Notify
Develop a Dynamic Multicloud Strategy
"If the public cloud is not our least expensive option, what is?" "I'm tired of compromising our resiliency capabilities." "How can we ensure the best performance of my agency's applications?" The above concerns from our customers are based upon the fact that 85% of all stored data is dark (i.e., data that is not completely and/or accurately known, or relevant to the agency mission). What measures can your agency take to fully understand and u...
Add Favorite
VMware Virtual Power Block Sessions
VMware and Carahsoft would like to offer you the opportunity to attend a variety of sessions on all of the topics you and your agency care about. Throughout the month of June, we are providing short sessions on: What's New in VMware vSAN 7 VMware Carbon Black Application Control Disaster Recovery in the Software-Defined Datacenter using vSAN and SRM Rubrik Sizing for Hyperconverged on vSAN VMware Bitfusion VMware vRealize Code Stream VMware vS...
Add Favorite
Implement a Virtual Computer Lab Servic...
Join VMware, GCOM, and Carahsoft as we discuss a strategy to maximize the value and impact of your school's deployment of a virtual computer lab service. Powered by VMware's Digital Workspace technologies and Microsoft Azure Windows Virtual Desktop, this solution enables student lab "as-a-service" through the flexible delivery of applications with a traditional desktop experience, supporting functional security and course-based requirements. H...
Add Favorite
Brand Or Be Branded In Government Contracting
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Add Favorite
How to Maximize Revenue Through Cost Al...
Traditionally, cost allocation and indirect cost planning seem like an ancillary matter in the scheme of all that leaders in state, local, and tribal governments have to do. However, reporting the true cost of services agency-wide is hard to capture, especially in the wake of COVID-19 bringing revenue shortages, and several grants and funding streams to navigate.The challenges that are compounded when individual departments complete their fina...
Add Favorite
Being Data Driven Through Crisis: How O...
Digital transformation is on the roadmap of every company. What happens when transformative change is driven by disruption and crisis? Hear inspirational stories from government customers who found creative data and analytics solutions during COVID-19 pandemic that were critical to their organization. Join us for the second webinar on Healthcare: Transformation & Readiness in response to COVID-19, and discover how Tableau can help you to r...
Add Favorite
Modernizing Back to School for Public K...
More than 1300 government organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, pre-populated agreements, and automated approval processes.Join your peers and other leaders in K-12 School Districts to see how you can transform your agreement process by eliminating paper, automating workflows, and connecting the systems within your organization.T...
Add Favorite
Navigating the Security Maze of the Rem...
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures. The new remote work and remote learner environments provide attackers with a new entry point which they can exploit more easily than the well-defended network used in the past. Leveraging malware po...
Add Favorite
AWS Spotlight Series: State & Local Gov...
View our On-Demand Spotlight Series: State and Local Government & Education to learn about exciting AWS news and updates, and deep dives into different ways AWS solutions can help your organization! AWS Building Resilient Websites and DDOS Protection
Add Favorite
Back to Search Begin New Search