Back to Search Begin New Search Save Search Auto-Notify
News Flash: Splunk's Real-Time Monitori...
Monitoring is evolving into observability to find the "unknown, unknowns" that impact DOE's business, SLAs, and critical applications. Join Splunk for a DOE-focused webinar on detecting, investigating, and diagnosing problems easily with end-to-end observability leveraging Splunk's SignalFx. During this webinar, attendees will go over the following topics: Modernize Legacy Services and Applications:Correlate applications and infrastructure reg...
Add Favorite
5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Add Favorite
Protecting Your Network Infrastructure...
Webinar Series: Protecting Your Network Infrastructure with Automation, Visibility and Continuous Insight Infoblox, in collaboration with Empowered Networks, presents a three-part webinar series covering Infoblox's NetMRI capabilities, compliance, and configuration automation tasks. Register now for one or more of these upcoming sessions! Webinar 1: Thursday, April 9, 2020 | 11:00am ET; 8:00am PT NetMRI Basics: What is Infoblox NetMRI and How...
Add Favorite
Splunk ESI Contract and DoD
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to DoDHow to leverage the contractDon't miss out. Registe...
Add Favorite
Accelerate Your Time-to-Sight with CDP...
CDP Data Center is the industry's most powerful, comprehensive data management and analytics platform for on-premises IT environments. Powered by a 100% open source distribution that combines the best technologies from Cloudera and Hortonworks, CDP provides the foundation for extending your workloads to private cloud. By attending this live CPE webinar, you will: Learn how CDP Data Center innovates your data analytics core to deliver faster, r...
Add Favorite
Modernize Your On-Prem Datacenter with...
VMware Cloud Foundation brings together virtualized compute, storage, and networking into a unified cloud operating model that allows your organization to reduce costs while increasing agility, standardization, and intrinsic security. By combining consistent infrastructure, operations, and intrinsic security posture across the entire stack, VMware’s Cloud Operating Model serves as the easiest and most efficient way to deploy, update, and...
Add Favorite
Red Hat and Anchore Discuss DevSecOps i...
The United States Department of Defense (DoD) is taking a new approach to building, deploying and operating software. To maintain their competitive edge, they are integrating DevSecOps practices into each stage of the software development process. Join Anchore, Red Hat and Carahsoft to hear from Anchore's Craig Bowman and Red Hat's Michael Epley, to discuss their contributions to the DoD DevSecOps Platform (DSOP) including: Understand the impo...
Add Favorite
Taking the Kinks Out of the Supply Chain

CANCELED

Supply chain management is critically important to running and maintaining an agency's IT systems, however it has not historically drawn much attention from the C-suite. Currently, many federal agencies use a manual process managed on spreadsheets which can lead to increased cost and risk.New directives have mandated that the Department of Defense must begin monitoring the supply chain within the Department's Risk Management Framework. These c...
Add Favorite
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
Leverage Advanced Management and Securi...
With Adobe Document Cloud (DC), agencies across the nation are turning manual document processes into efficient digital ones. Adobe Acrobat DC and Adobe Sign empower agencies large and small to work with confidence, knowing that all PDFs and e-signature workflows are safe and sound through management features and security protocols -- all customizable to your organization's needs.Join our complimentary webinar to discover how your team can tak...
Add Favorite
Back to Search Begin New Search