Back to Search Begin New Search Save Search Auto-Notify
The New Normal for Government Employees
In this on-demand webinar you will learn how your users can access a fast, responsive desktop of their choice anywhere, anytime, from any supported device. Amazon WorkSpaces, a cost-effective, managed Desktop-as-a-Service (DaaS) solution for flexible work styles, can be used to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. During this on-demand w...
Add Favorite
Cloud Security Strategies: Explore the...
Organisations can be compromised and experience data breaches due to an ineffective cybersecurity strategy. In this session, Tim Rains, Amazon Web Services (AWS) EMEA Regional Leader for Security & Compliance, will inspect popular enterprise cybersecurity strategies and explain why sometimes they fail to protect. Learn how to measure the effectiveness of any cybersecurity strategy, how this should influence your IT roadmap, and how the clo...
Add Favorite
Security & Compliance Basics: Learn the...
Think differently about data security in the cloud – it’s not the same as you’ll find on-premises. This session will walk you through the building blocks of a cloud security model and explain the key security features of Amazon Web Services (AWS). Data protection is the highest priority for any organisation, so we’ll be answering common questions about GDPR, data residency, freedom of information, and privacy. We...
Add Favorite
AWS Security Webinar: The Key to Effect...
It’s essential to protect your private data at all times, especially when you don’t control all the hardware and software components with access to that information. Encryption is a powerful way for organisations to maintain an appropriate level of data confidentiality and integrity. AWS offers many options for using encryption to protect your data in transit and at rest. A variety of features let you determine how much control you...
Add Favorite
Breaking Intrusion Kill Chains with AWS
Many cyber-attacks employ a repeatable process called the ‘intrusion kill chain’ to identify targets, weaknesses, potential exploits, and use them to victimize organizations. It’s how an attacker ultimately gains access to protected data to steal it, encrypt it, and/or destroy it. Pioneered by Lockheed Martin, anti-kill chain strategies are helping Chief Information Security Officers (CISOs) and cybersecurity practitioners ac...
Add Favorite
Google Cloud 2020 Webinar Series: Secur...
Google Cloud and Carahsoft invite you to a webinar to learn more about cybersecurity solutions and demonstrate specific use cases. Government agencies continue to modernize by expanding their services and migrating workloads to hybrid and cloud environments. These actions create rapid growth in the volume of log data generated by devices and systems. Security professionals rely on these logs for audit information, forensic evidence, and to det...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. Join Splunk and FCN for an on demand presentation and demo on the broad strokes of Splunk Phantom's automation engine. During th...
Add Favorite
Breaking the Chains of Siloed Data with Boomi
On the journey to digital transformation, agencies generate and manage massive amounts of data. Efficiently leveraging that data is critical to drive the right strategic and operational decision, but connecting and making sense of data cross your agency in a hybrid-cloud or multi-cloud environments is not easy. View our on-demand webinar to discover how Boomi can: Digitize services Improve operational efficiencies Meet your organization and cu...
Add Favorite
Adobe eLearning World 2020
For the first time ever, Adobe is taking its annual eLearning Conference online! View Adobe on-demand for 38 sessions of learning, collaborating, and sharing among all levels of learning and development (L&D) professionals. The virtual conference on-demand contains pre-conference workshops along with a 'What's New' keynote session led by Adobe, followed two consecutive days of informative sessions presented by leaders in the eLearning indu...
Add Favorite
Security, Visibility and Management for...
Government agencies are utilizing Micro-Service Architecture (MSA), the predominant design pattern for application development, but these evolved patterns have introduced new challenges and complexities to understand. James Harmison, a senior solutions architect at Red Hat with over a decade of experience in operationalizing applications for enterprise use, addressed: The concerns that teams have as they try to deploy MSA applications into pro...
Add Favorite
Back to Search Begin New Search