Back to Search Begin New Search Save Search Auto-Notify
Tungsten and 6e Technologies: Financial...
Download this webinar for an insightful session where industry leaders from Kofax and 6E Technologies unraveled the potential of intelligent automation in revolutionizing financial processes across the Federal Government. During this sessions, attendees learned: About Kofax and how Kofax can support Financial Process Automation across the Federal Government. About the platform components used in to support the AP and e-Invoicing needs Common p...
Add Favorite
Event Reporting in Smartsheet Gov
During this session, Smartsheet Senior Security Solutions Engineer, David Lewis, walked participants through what integration can look like with Event Reporting and how to set up the software for the policies being monitored. Participants learned the commands a government IT team can use to monitor for data exfiltration with Event Reporting in Smartsheet Gov and how Smartsheet Gov can help organizations get more awareness and visibility into h...
Add Favorite
Tableau 2024 Kick-off Webinar
This webinar gave attendees the opportunity to grow and enrich their data skills by connecting with their Tableau Team and fellow Tableau Users. Attendees were able to learn what’s new with Tableau and events to look forward to in the coming months. During this on-demand webinar, attendees were able to: Learn & grow - Discover the new features of Tableau 2023.3 and learn how those new features can take reporting to the next level Be...
Add Favorite
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
Add Favorite
Unlocking Efficiency: DocuSign and Docu...
Attendees who joined us on February 29th experienced an insightful webinar on the seamless integration of DocuSign and Documentum, designed to streamline document workflows in federal agencies. They discovered key features, use cases, and benefits, and heard directly from experts in the field. Guests had the opportunity to enhance their document management capabilities, and unlocked the potential of DocuSign and Forefront Documentum! Register...
Add Favorite
Red Hat Brooklyn Tech Day
Experts from Red Hat, Dynatrace and GitLab came together for Brooklyn Tech Day's informative and collaborative sessions on best practices for developing and deploying modern, scalable applications to help agencies achieve digital transformation. Attendees learned: What's happening next in open source and how does it intersect with the needs of enterprise companies with critical workloads in public and private clouds Red Hat’s product off...
Add Favorite
Alteryx and Bronson Analytics: Analytic...
This webinar was be an introduction to the Alteryx platform and shed light on how it can help users reduce risk and time spent in spreadsheets performing data analytics. This session provided a comprehensive overview of Alteryx and how it simplifies the data preparation and analytics process. Martin presented an overview of the Alteryx platform using Human Resources data. Following Martin's presentation, Phil Cormier highlighted a practical Al...
Add Favorite
WEST 2024 Webinar Series: Self-Driving...
During this webinar, Joshua Stageberg, VP of Product Management at SolarWinds discussed: How self-driving ops can imporove many aspects of your company Why observability is so important for self-driving ops What steps agencies can take to prepare their enviornments for AIOPs How to take a Secure by Design approach to observability Register to view this on-demand recording.
Add Favorite
CTO Sessions: Quantum Resistant Security
Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White House’s National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems states that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum com...
Add Favorite
Intro to 10ZiG Technology
Learn more about 10ZiG Technology in this recorded on-demand webinar where you will discover competitively priced hardware with: Hassle-free demo devices Management software with unlimited user licenses Repurposing of software for existing hardware
Add Favorite
Back to Search Begin New Search