Back to Search Begin New Search Save Search Auto-Notify
Mitigating Risk with Proper Certificate...
Outages due to certificate issues – such as certificate expirations – can have a costly impact to business, including loss of revenue, decreased customer satisfaction, and a negative impact to brand reputation. Watch this on-demand webinar to hear the stories of a large manufacturer and a large bank who have been able to mitigate these risks by using ServiceNow for certificate management. With these customers using Entrust for the...
Add Favorite
Bringing an End-to-End Digital Experien...
When the pandemic hit, law enforcement and courts throughout the country had to quickly find ways to pivot their mostly in-person interactions and paper-based processes to digital ones. After realizing the efficiencies of a more virtual experience, many agencies are taking this opportunity to expand their efforts and prepare for the future. View this on-demand webinar to discuss the latest tools and tactics that help bring and end-to-end digit...
Add Favorite
Overcoming the Top Five Reporting Chall...
Every government agency strives to make more informed decisions using the data captured in the day-to-day operations; The challenge is how to make those decisions if you can't get the data to where the analysis and decisions happen. View this on-demand webinar to hear these following questions addressed: Has the demand for reports and dashboards increased significantly over the last 12 months? Do your users want real-time data for their report...
Add Favorite
Deeper Insights to Help Determine Eligibility
This complimentary webinar discusses how Equifax provides a more complete picture through optional add-on data sources such as IRS Income Verification, Property Verification, and Verification of Education that can be delivered along with The Work Number® database. Watch the on-demand webinar to discover additional data sets that can help your organization find unearned and unreported income, verify property ownership, and gain instant acc...
Add Favorite
Zscaler 5G Webinar
View this on-demand webinar to learn more about the evolution of 5G for government, keys to adopting and integrating 5G into your digital transformation, and how Zero Trust solutions play a critical role in keeping users and assets protected. 5G is here to stay and critical for federal agencies and government contractors in driving transformation. Whether or not 5G is part of your current strategy, it is creating a new, ultra-connected environ...
Add Favorite
Straight Up Security with Palo Alto Net...
Nutanix took attendees through their hybrid cloud journey and showed how Palo Alto Networks can help secure their hybrid cloud environments. VM Series integrates with Nutanix Flow, augmenting Flow’s ability to control traffic with advanced threat prevention capabilities. View this on-demand webinar, to learn how to: Reduce the attack surface to detect and stop threats trying to penetrate the security perimeter Deliver seamless, consisten...
Add Favorite
Recovering from a Ransomware Attack wit...
According to the FBI, there is a ransomware attack on the United States Government and its enterprises every 11 seconds. After ransomware enters the system, it encrypts accessible files that are present on the computer and spreads throughout the network. These files have become unusable unless decrypted with a special key owned only by the cybercriminal and released in exchange for payment with an untraceable/pseudonymous method. Kapalya has d...
Add Favorite
Reinvent Your Core Facility Services wi...
Core facilities provide scientific services that are essential to enable high-impact research. However, in most institutions, core facilities still rely on manual processes and basic tools like spreadsheets and shared calendars to manage complex services involving sophisticated technology, high-level expertise, and deep interactions between staff and users to ensure the quality of scientific results. View this on-demand webinar to learn more a...
Add Favorite
Five Steps to SASE
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is drastically different. The iboss Private Access service inverts the VPN model completely. Instead of granting a user access to pr...
Add Favorite
Edit Event : Episode 3: Technology's Ro...
View the third installment of the Effects of COVID-19 on Early Childhood and Education on-demand Webinar series to learn the important role technology plays for agencies, providers, childcare workers and early educators. Our panel of thought leaders include a member of the U.S. Chamber of Commerce Foundation and childcare providers. Watch to learn more about how cloud technology can help stabilize the childcare industry, enable parents to retu...
Add Favorite
Back to Search Begin New Search