Back to Search Begin New Search Save Search Auto-Notify
Modernizing Army at Work Webinar
Salesforce is supporting the Army in building out a foundation for business execution. This foundation will optimize the most critical processes across the acquisition community such as HR, Facilities, Finance, Operations, Program Management, Foreign Military Sales, Industry Engagement, and more. As part of this effort, David Nava showcased the Salesforce Platform that is used to support the Army with an agile approach to business process re-...
Add Favorite
TDM Transformation: Transforming Missio...
Time Division Multiplexing solutions are slowly being transitioned off. Nokia and TDM experts discussed ways you can transform U.S. Federal mission-critical legacy networks off these infrastructures. Attendees learned about transforming mission-critical communication networks with Time Division Multiplexing (TDM). Transitioning off these legacy TDM solutions can be costly and disruptive for the end-user. Attendees learned that costs could incl...
Add Favorite
Aligning with Key U.S. Army Priorities...
In this on-demand webinar, attendees learned how Joint All Domain Command and Control aims to connect the digital battlespace from the tactical edge back to the enterprise across Unified Network Operations to ensure: Well-informed, rapid decisions in all domains—air, land, maritime, space and cyberspace—in both competition and armed conflict Unmatched capabilities for enabling JADC2, UNO, ZTA and other U.S. Army and DOD modernizati...
Add Favorite
Accelerate DoD Software Delivery with G...
Join us for our upcoming webinar, "Unlocking the Future of DoD Software Delivery: Game Warden and AWS in Focus," presented by Second Front Systems, Carahsoft, and the AWS Global Security and Compliance Acceleration team. Game Warden is an innovative, DoD-compliant DevSecOps Platform-as-a-Service (PaaS) designed to accelerate software delivery onto DoD networks. By offering an accredited and repeatable development and deployment pipeline, alon...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Unlock Decision Advantage with Real-Tim...
Through real-world DoD and IC use cases, Oracle examines the most advanced capabilities for capturing and leveraging data at the tactical edge. Oracle Roving Edge infrastructure enables real-time decision-making, even in the most austere environments with intermittent communications. Watch our on-demand webinar to discuss the latest strategies and innovations that enable the warfighter with decision advantage at the tactical edge. Oracle exper...
Add Favorite
Cybersecurity for Industrial Control Sy...
In this on-demand webinar, attendees learned about: Comprehensive threat detection to identify potential risks promptly Proactive attack prevention to physically block cyber attacks before they can compromise your critical infrastructure Enhancing overall operational efficiency while building resilience against cyber threats
Add Favorite
How Salesforce Delivers Precision Sustainment
Unfortunately, we have reached capacity for this event. To defend the nation against increasingly agile and sophisticated threat actors, the US Army must have the right equipment at the right time and right place with the highest readiness possible. Without a way to collect and synergize real time data regarding personnel, equipment, or maintenance in one accessible platform, defense leaders will have to make decisions based upon less-than-opt...
Add Favorite
Accelerating Authorization Capabilities...
Navigating the complexities of Identity, Credential, and Access Management (ICAM) can feel like a maze of acronyms – ABAC, PBAC, CBAC, oh my! Attendees joined for an insightful webinar where Bryan Rosensteel, Ping Identity's US Federal CTO, unravelled the intricacies of ICAM and shed light on fine-grained access control within a modern Zero Trust architecture. During this on-demand webinar, Bryan shared invaluable insights on: Decoding t...
Add Favorite
CMMC: A New Year with New Resolutions
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing updates to the CMMC program and key insights on: Perspectives from CMMC ecosystem experts, including perspectives from Matt Travis, CEO of The Cyber AB who will weigh in on the current status of the CMMC rule. Real-world experiences and challenges faced by organizations in adopting the CMMC fr...
Add Favorite
Back to Search Begin New Search