Back to Search Begin New Search Save Search Auto-Notify
Mitigating Cyber Threats in Government...
In this on-demand session attendees learned about harnessing the cloud brings for both opportunities and vulnerabilities. This session pivoted around: Showcasing iboss Azure Cloud Security Gateways and its prowess in mitigating cyber threats in the government sector by providing robust Azure infrastructure security. Seamless connectivity to Azure resources and inter-vnet connectivity. Attendees dove into Azure's functionalities, learned about...
Add Favorite
DoDIIS Webinar Series:Transforming Geos...
Traditionally, geospatial analytics has been associated with GIS specialists and specialized systems. However, the landscape is evolving rapidly. With the increasing availability of third-party spatial data, such as satellite imagery, organizations are recognizing the importance of harnessing spatial analysis and incorporating it into their descriptive, predictive, and prescriptive workflows. In our modern, multifaceted world, geospatial data...
Add Favorite
Transparency and Accountability: Buildi...
Trust and legitimacy, perceived and real, are as important to the delivery of police service as the ability to clear calls. Modern Evidence-Based Policing (EBP) services have embraced open data and accountable business intelligence systems as critical to these goals. The act of being transparent is important but the ability to invite the community to a conversation supported by a shared understanding of the problem, is the key to democratic po...
Add Favorite
Navigating Tomorrow's Defense Supply Chain
For defense agencies to prepare for and mitigate high-impact supply chain disruptions, decision-makers must first have clear visibility into their operations and where vulnerabilities exist. As a result, more organizations rely on digital logistics, a transformative approach using data analytics to monitor, anticipate and respond to supply chain disruptions. Given the complexities of global supply chains and the ever-present potential for disr...
Add Favorite
F5 SLED Lab Series: Go for Gold in F5 S...
F5 SLED Lab Series Introduction Webinar Attendees in this on-demand session learned how F5 Distributed Cloud and BIG-IP Next can help them overcome their IT curveballs and achieve their modernization goals.
Add Favorite
Shielding SLED - The Power of Protectiv...
As a key player in the state, local, and education sectors, safeguarding your critical infrastructure from evolving cyber threats is of utmost importance. This on-demand webinar detailed how integrating protective DNS into your security stack adds a proactive layer of defense to protect your network. Protective DNS is recommended by both CISA and DHS and is ideally suited for SLED organizations. During this webinar, attendees learned about: DN...
Add Favorite
Forescout Security Insights Webinar
Nikhil Gupta, Sales Engineer Team Lead, Carahsoft presented an informative and interactive discussion on Forescout policies and a review of all the upcoming Forescout changes on the docket for 2024. During this on-demand session, the following was discussed: New Year, New Policies designed to help you properly collect device information and perform incidence response for any detected high-risk vulnerabilities. 2023 Frequently asked questions a...
Add Favorite
F5 SLED Lab Series: Go for Gold in F5 S...
F5 Distributed Cloud - WAF/WAAP Deployment Models & Services Attendees of this on-demand session had the opportunity to learn more about F5 Distributed Cloud WAF/WAAP Deployment Models & Services and participate in a hands-on learning experience.
Add Favorite
Navigating the Future: What's New with...
Attendees of this on-demand webinar learned how you can simplify and accelerate the delivery of infrastructure and applications. With the tsunami of digital initiatives and new apps, today's infrastructure must support current and future business-critical apps and databases wherever they need to be deployed. Nutanix and HPE partnered to empower government and educational organizations to run legacy, modern, and future workloads, wherever it's...
Add Favorite
Illuminating the Darknet for Government...
Thank you for your interest in this event. Attendees of this on-demand webinar learned how the darknet can be used to: Track illicit sales of drugs, human trafficking, and cyber weapons Detect potential threats and monitor persons of interest Stay one step ahead of foreign Nation-State adversarial activity and attacks Learn the latest tactics, techniques, and procedures of threat actors to better prevent future cyberattacks on critical infrast...
Add Favorite
Back to Search Begin New Search