Back to Search Begin New Search Save Search Auto-Notify
F5 SLED Lab Series: Go for Gold in F5 S...
State, Local, and Education organizations and agencies are facing a crossroads and F5 is here to help! Attendees joined us for the next step in our “Go for Gold” series for a hands-on lab and earned a gold medal in F5 Distributed Cloud. On one hand, you're under pressure to modernize your IT infrastructure to meet the demands of today's digital landscape. On the other hand, you're swimming against the tide with the ever-increasing...
Add Favorite
Enhancing Security Across Digital Docum...
PDFs are widely used for storing, sharing, and archiving documents, including highly classified or confidential information. Ensuring the security of these PDF documents is crucial to protect against unauthorized access, data breaches, and information leaks that can have severe consequences for national security, privacy, and the integrity of government operations. Adobe is empowering agencies to transform their manual document processes with...
Add Favorite
Unlock Greater Insights: How Corelight...
During this session, participants discovered how Corelight seamlessly integrates with the Splunk portfolio to enhance incident response times, threat-hunting capabilities, and automated response and remediation processes. Attendees joined us to discover: Insights into how rich network telemetry can provide crucial insights into operational and adversarial activities An understanding of how the limitations of visibility across the environment c...
Add Favorite
Exploring the Evolution of VMware's Por...
The Carahsoft and VMware by Broadcom team discussed: The solutions included in VMware Cloud Foundation The benefits of adopting these technologies The additional solutions that can be added to extend or enhance the core offering Changes to the licensing model
Add Favorite
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and WWT at the Scott Technology Center on Wednesday, April 3rd for a hands-on lab discussing BIG-IP Next. All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use cases....
Add Favorite
Empowering Multilingual Access: Transfo...
Many government agencies, at various levels, grapple with the common challenge of enhancing their Language Access Plans to meet Limited English Proficient (LEP) requirements. The obligation to provide equal access to information for LEP individuals has been in place since 2000, marked by Executive Order 13166, signed by President Clinton. The Biden Administration further reinforced and expanded these requirements through Executive Order 13895...
Add Favorite
Designing Performant Tableau Dashboards
This webinar equipped participants with the knowledge and skills to design dashboards that not only visually appeal but also perform optimally. It covered a range of topics including best practices for dashboard design, techniques to optimize performance, and strategies to handle large data sets. Attendees of this on-demand webinar learned: Why dashboard performance matters Factors that affect can affect dashboard performance Design best pract...
Add Favorite
Accelerating Time to Insights for the P...
For scalable analytics in a secure data environment, the public sector is turning to Plotly Dash Enterprise. As a comprehensive platform for building interactive Python data applications, Plotly Dash Enterprise stands out as a trusted solution for real-time decision-making. During this webinar, attendees: Discovered Python-based analytics use cases across the government sector, from advanced visualization to automated reporting Learned how dat...
Add Favorite
Safeguarding the Future: Navigating IoT...
During this on-demand webinar, attendees learned about: The backstory of IoT Why hackers love smart cities, buildings and educational Institutions What can be done now? The unexpected business value
Add Favorite
Navigating OT Security in the DoD
Attendees of this webinar gained insights on: Current threats that result from converged IT/OT operations Recent OT security legislation and impacts on the DoD The unique use cases for OT security in the DoD Tips and mitigation strategies for managing OT security threats
Add Favorite
Back to Search Begin New Search