Back to Search Begin New Search Save Search Auto-Notify
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. Join Splunk and FCN for an on demand presentation and demo on the broad strokes of Splunk Phantom's automation engine. During th...
Add Favorite
F5 Networks Privileged User Authentication
Join F5 Networks for a webinar where we will discuss how SSH and Web management interfaces for routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP interfaces, storage array interfaces, VDI, and more, can be CAC/PIV/Smart Card enabled using F5 Privileged User Authentication (PUA). Attendees of this webinar will learn: How the F5 PUA provides Single Sign On (SSO) to all administration interfaces, infrastructure...
Add Favorite
Application Security from the Cloud wit...
As your agency increasingly engages constituents, employees, and contractors through web and IP-based applications, web application security must be a critical priority. Attackers know that disrupting web applications can result in significant loss of important and sensitive government data. To prepare for the inevitable attacks, you need application security solutions that deliver fast and effective protection in order to safeguard your infra...
Add Favorite
Ransomware: The Cyber Warfare Attack To...
Ransomware attacks are on the rise, with at least 22 reported breaches of public sector networks in 2019 alone. Popular targets are cities, police stations, and schools, and the attacks can tally up millions of dollars in recovery costs. This situation is likely much worse, as many ransomware attacks are unreported. Public sector organizations are typically understaffed and underfunded, making them ripe targets for malicious actors intent on c...
Add Favorite
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
Using G Suite to Cut Costs, Enhance Sec...
Please join Google and Carahsoft for a webinar to understand the value of G Suite and how to innovate by leveraging Cloud-based solutions. Learn how the public sector is improving citizen services & engagement, increasing operation efficiency, and delivering proven innovation with Google's highly secured, powerful technology. During this webinar, you will learn about: Innovative email & collaboration technologyGovernment-specific use c...
Add Favorite
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
Cipher Summit 2019
Save the date for our SafeNet AT 2019 Cipher Summit! Attendees will hear from their peers, industry pundits, and technology experts about the current federal cyber security landscape and learn about the solutions needed to help solve the most pressing security issues.This one-day event will also feature technical sessions designed to help SafeNet AT customers' better leverage their current solutions and provide a forum for interactive discussi...
Add Favorite
Web Application Firewall (WAF) and DDoS...
Join F5 Networks and Carahsoft for a webinar where we will discuss how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5's fully-managed Web Application Firewall (WAF) and DDoS Protection services, you'll be protected against the 10 most common web application attacks, malicious bots that consume valuable resources, and DoS attacks.F5's...
Add Favorite
Back to Search Begin New Search