Back to Search Begin New Search Save Search Auto-Notify
Showing results for IoT
Search instead for Ito
Fortinet Demo Desk
Organizations face an expanding attack surface with all the people and devices that connect to or exists on their networks. With the rise in IoT devices and work from home trends, the traditional approach of perimeter defense has dissolved. The result is that network owners need help to regain control of their network, devices, and users. To protect this expanded attack surface, Zero Trust Architecture has been the go-to frameworks for many di...
Add Favorite
Vectra & Splunk: Leveraging AI to Detec...
Join our National Security DIB/FSI teams for a webinar on an orchestrated detection and response capability for ransomware, insider threat, and nation-state attacks. While a current hot-button in the cyber community, the relevance and impacts to your organization's mission and support for our federal government are greater than ever. This will be an interactive demonstration and discussion between you and the security architects from Vectra an...
Add Favorite
Best Practices for IoT Security
As organizations and agencies continue to digitally transform, IoT devices are becoming a critical component to enable companies to act quickly on information to increase competitive advantages and operational efficiencies. Their addition to IT environments allows for improved data utilization to manage technology better, increase output, and reduce costs and downtime. Optiv provides solutions to identify, segment, and protect IoT devices and...
Add Favorite
Federal Partner Forum: Creating Value f...
Time is all that matters. Time to value, time to detect a threat, and response time are critical. Attacks bypass prevention tools and move across cloud, data center, IoT, and enterprise networks, evading detection. Vectra solves this problem by seeing these attacks in progress to stop breaches. Join us and hear from Vectra’s President and CEO, Hitesh Sheth, and VP of Product Management, Kevin Kennedy, around all things Vectra. Learn how...
Add Favorite
New AI Insights, Same Familiar Interface
Integrating artificial intelligence (AI) and machine learning into existing analyst tools and applications is a sure way to accelerate adoption and enhance mission-critical decision-making. Learn how the Modzy extension for Tableau provides knowledge workers access to even more analytical insights, powered by a centrally governed library of AI and machine learning models. This session will focus on the importance of integrating model operation...
Add Favorite
More Channels, More Problems: Is Your T...
Students expect their university to provide digital experiences with improved levels of personalization, efficiency and ease-of-use. To meet those demands, school's need to determine which of their current digital solutions are effective and useful, and which are due for a reevaluation. Join Acquia and Mediacurrent experts online as they discuss the higher education technology landscape and the most effective ways to deliver enhanced student e...
Add Favorite
Armis Demo Desk: Detect and Protect
Across various agencies, there is a significant growth in differing types of devices used to connect the network. The new types of devices that are being introduced are not covered by the traditional "agent-based" security development. The visibility and vulnerabilities in these devices are critical for the enterprise security. Join Armis and Carahsoft to learn how Armis, an "agent-less" device security solution, can provide better visibility...
Add Favorite
Securing the Convergence of HPC and AI...
High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and simulation along with high-performance data analytics using HPC systems are prevalent in industries from the design and manufacturing of aircrafts to consumer goods, life sciences, energy, and financial services. The emergence of artificial intelligence (AI) and its symbiotic relationship with HPC has augmented traditional method...
Add Favorite
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Add Favorite
Ask Me Anything: STEM Insights & Opport...
Upcoming opportunities for the next generation of scientists, mathematicians, engineers, and technologist to problem solve. The goal of the AFRL STEM Outreach Program is to foster a new generation of scientists, mathematicians, engineers and technologists who will one day discover, and problem solve in the nation’s defense laboratories and other supporting U.S. companies. In order to achieve this goal, there must be a concerted effort to...
Add Favorite
Back to Search Begin New Search