Back to Search Begin New Search Save Search Auto-Notify
Unlock the True Power of Zero Trust thr...
In today’s digital landscape, corrupt content poses unprecedented challenges to cybersecurity. The mass proliferation and fragmentation of content communication systems (file-sharing services) has created threat opportunities that must be addressed urgently. View the on-demand webinar to learn how Kiteworks-enabled Private Content Network (PCN) and Forcepoint’s Zero Trust Content Disarm and Reconstruction (CDR) has combined to cre...
Add Favorite
Evolving from Disjointed Views to Cohes...
Riverbed's Federal CTO, John Pittle, addressed the difficulties confronting federal IT teams, presented customer use cases and explored how Riverbed’s Unified Observability portfolio offers the necessary visibility across contemporary federal networks. In this webinar, attendees discovered the: Importance of prioritizing visibility, security and cost in network solution selection Hidden expenses in network monitoring tools Impact of zero...
Add Favorite
New Zero Trust Endpoint Technology for...
Attendees gained an understanding of the differences between traditional zero clients, thin clients, and the new Trusted Zero Clients and will learn about opportunities to easily begin this exciting new technology in their environments as a way to begin preparing for the coming Zero Trust mandate.
Add Favorite
Automate Your Zero Trust Workflow
During this webinar, Zack and Willie discussed: How PC Matic's innovative technology modernizes traditional Software Bill of Materials (SBOM), Zero Trust, CDM, and Secure by Design initiatives How the solution streamlines Zero Trust policy enforcement points, simplifying governance processes while bolstering compliance efforts. How the solution integrates seamlessly into existing infrastructures, optimizing operations without solution disrupti...
Add Favorite
Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
Add Favorite
CTO Sessions: Thales TCT + Imperva: Tru...
Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protect valuable data. Enter data-centric security, which offers CISOs transformative opportunities to fortify data protection, compliance adherence and operational efficiency. Yet, ensuring robust defense mechanisms remains imperative, given the diverse pathways to data each with its own unique securi...
Add Favorite
Back to Search Begin New Search