41 webcasts found
+ 133 past events found
Back to Search Begin New Search Save Search Auto-Notify
Next Level Security with Infoblox
Security teams know painfully well that it takes too long from the time a breach happens to being able to identify what happened and how. Rather than investing in another security tool, what you need is a smarter and more efficient way to manage and secure your entire network. The Infoblox security solution is a platform designed from the ground up to protect enterprise networks, users and devices from becoming victims of today's sophisticated...
Add Favorite
Adobe Digital Learning Seminar in San A...
Every day you undertake the challenge of training your workforce to maintain compliance, work skills, and relevance, and with all the resources you put into training, you want to make sure the message sticks. Join us in San Antonio to discover how understanding the modern adult learner and identifying their style of learning will affect your content mediums and delivery styles. Whether you teach in-person, online, or in a blended learning env...
Add Favorite
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
Add Favorite
Identify Nefarious Actors and Prevent D...
You are invited to join SailPoint and Splunk for a live webinar on Tuesday, February 18th to learn about the challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User Management, and User Behavior Analytics are critical in protecting high value assets from nefarious actors. When properly implemented modern identity governance and administration, identity audit, behavior monitoring, and analytics provide vi...
Add Favorite
SOAR Into Advanced Cyber Defense with S...
Join Splunk and Carahsoft for a presentation and demo where we will discuss how Splunk Phantom can help your team achieve optimum security operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage technology for orchestration and automation as an integral part of their Security Operations Center (SOC) platform to accelerate incident response while addressing the skills shortage. T...
Add Favorite
Adobe Digital Learning Seminar in McLean, VA
Every day departments undertake the challenge of training their workforce and with all the resources put into training, it's important they are leveraged efficiently and effectively. More and more government clients are turning to learning & development of personnel as their force multiplier. Department of Defense is prioritizing funding to programs like Navy Education for Sea Power, Army Talent Management, and Air Force Learning Continuum...
Add Favorite
Investigating SAP in Real-Time with Splunk
Join Rhondos and Carahsoft as they present SAP PowerConnect for Splunk, the only certified solution to bring all data from SAP to Splunk. SAP is an organization's largest, most complex, and most critical financial application and until now real-time monitoring has been extremely limited. By essentially writing a Splunk heavy forwarder as an SAP add-on in SAP's native languages, PowerConnect allows organizations to leverage Splunk for security,...
Add Favorite
Protecting Your Network Infrastructure...
Webinar Series: Protecting Your Network Infrastructure with Automation, Visibility and Continuous Insight Infoblox, in collaboration with Empowered Networks, presents a three-part webinar series covering Infoblox's NetMRI capabilities, compliance, and configuration automation tasks. Register now for one or more of these upcoming sessions! Webinar 1: Thursday, April 9, 2020 | 11:00am ET; 8:00am PT NetMRI Basics: What is Infoblox NetMRI and How...
Add Favorite
How to Maintain CIS Controls in a Remot...
In light of recent events, most of the country is now turning to a remote setup very rapidly. As a result, new devices are now establishing remote connections since many employees are connecting their personal computers to the corporate network, making the attack surface bigger than ever before. Compliance, proper network segmentation, and accurate device network access control are extremely challenging for any IT team right now and the attack...
Add Favorite
Splunk for CMMC Solution: A Deeper Dive
Join Splunk's, Solutions Architect, Michael Sondag and Carahsoft for a deep dive into the Splunk for Cybersecurity Maturity Model Certification (CMMC) solution. As the Data to Everything (D2E) platform, the Splunk for CMMC solution accelerates organizations' journey to actively monitor and measure the performance of data-driven practices defined by CMMC. In this session, we'll dig into the following topics with demonstrations throughout on: Al...
Add Favorite
Back to Search Begin New Search