Bridging the Gap: Secure & Intuitive Cr...
This webinar focused on the Kiteworks-plus-Everfox solution, which provides:Secure, high-speed content transfers across multiple domainsPolicy-driven security, compliance controls, and comprehensive end-to-end audit loggingInline and dirty word filtering, byte-level deep content inspection, one-way data diodes, and data validationA user-friendly web file-sharing interface with rigorous access controls and flexible authentication options, such...
Shifting to Smarter, More Efficient Sol...
Red Hat hosted an exclusive L3Harris workshop on Thursday, November 7th, both onsite and online, for a dynamic day of engaging presentations and demos on key technologies! Attendees explored the latest advancements from industry leaders as they showcased cutting-edge solutions designed to streamline operations and drive digital transformation. It was a unique opportunity to learn directly from the experts and engage in hands-on demos that show...
Ensuring ICAM Survivability and Tactica...
Digital identities are integral to your infrastructure, managing who has access to what and when. They are embedded in every mission process, so when an outage occurs, it can severely impact all operations. The need for robust, adaptable & resilient identity solutions has never been more critical to keeping your mission on track. The Department of Defense (DOD) has multiple requirements to operate in Disconnected, Denied, Intermittent, and...
Google Public Sector SLG Workforce Webinar
Attendees joined us for an in-depth exploration of how state agencies leveraged the transformative power of artificial intelligence integrated with State Longitudinal Data Systems (SLDS) to streamline and revolutionize workforce development initiatives. In this comprehensive webinar, attendees discovered the capabilities of the Workforce Recommendation Engine, designed to provide job seekers with personalized career pathways tailored to their...
ISV Bay Day Summit
Amazon Web Services (AWS), Feenix.ai, Second Front Systems, Exostellar, and Carahsoft partnered together for the first-ever ISV Bay Day Summit on November 12!Sessions included:AWS Marketplace Listing WorkshopAWS Accelerated Partner DevelopmentAWS ISV Offered ProgramsCompliance PanelTechnology Specific Vertical Breakout Sessions
Improve Network Traffic Visibility: Uti...
In today's complex public sector environments, ensuring network security and compliance is paramount. Application Metadata Insight (AMI) offer a powerful solution to address these challenges. Cribl provides a flexible data management solution, while Gigamon's AMI delivers deep application-level visibility. By integrating these technologies, public sector organizations can:Improve security: Gain granular insights into network traffic, identify...
AI for the Rest of Government Part Thre...
This webinar addressed concerns about adopting AI in government agencies, and explored how agencies can gain confidence and utilize AI.Attendees learned about:How to intelligently search for information across many locations and types.How to safely use Gen AI on business content to power smarter and faster decisions.Elevate productivity by leveraging smart content.
Maximizing Efficiency: Strategies for E...
This webinar was designed for Tableau Site administrators seeking to optimize their platform's performance and streamline operations for all users. From efficient resource management to user access control and performance tuning, we will cover a range of topics to empower you in maintaining a roubust and responsive Tableau environment. During this webinar, attendees:Dove into Tableau strategiesLearned best practices for Tableau online deployme...
Physical Security & the Cloud: Allowing...
Many IT departments are now forced to manage numerous disparate systems through different applications or multiple web portals, often frustrated by the tedious task of integrating devices from various manufacturers onto their networks. Verkada has led the way in simplifying these solutions through its novel hybrid-cloud solution that allows for ease in deployment, maintenance and upgrades of a complete physical security portfolio that can be o...
FIPS 140-3 is (Finally) Here
FIPS 140-3, titled Security Requirements for Cryptographic Modules, is the third update to the FIPS 140 benchmark established by NIST to specify the security requirements for cryptographic modules and a testing methodology for confirming conformance. Companies selling technology with encryption to the public sector often must obtain FIPS 140 certification that their cryptography has been tested and approved for government use. In addition, oth...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.