Back to Search Begin New Search Save Search Auto-Notify
Investigating SAP in Real-Time with Splunk
Join Rhondos and Carahsoft as they present SAP PowerConnect for Splunk, the only certified solution to bring all data from SAP to Splunk. SAP is an organization's largest, most complex, and most critical financial application and until now real-time monitoring has been extremely limited. By essentially writing a Splunk heavy forwarder as an SAP add-on in SAP's native languages, PowerConnect allows organizations to leverage Splunk for security,...
Add Favorite
Dragon Speech Recognition: Increased Pr...
Join us for this webinar and see how Dragon Speech Recognition Solutions enables you to keep up with documentation productivity and generate reports with higher detail and accuracy while accelerating professional documentation. From transcribing committee meetings and correspondence to drafting hearing notes and reports, Dragon Speech Recognition Solutions let you do it all—faster and more efficiently. You can increase your productivity...
Add Favorite
Accelerate Your Time-to-Sight with CDP...
CDP Data Center is the industry's most powerful, comprehensive data management and analytics platform for on-premises IT environments. Powered by a 100% open source distribution that combines the best technologies from Cloudera and Hortonworks, CDP provides the foundation for extending your workloads to private cloud. By attending this live CPE webinar, you will: Learn how CDP Data Center innovates your data analytics core to deliver faster, r...
Add Favorite
Rethink Your Approach to Cybersecurity
Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and ho...
Add Favorite
Achieving Mission Success Using Search-...
Siren and Carahsoft are excited to invite you to join us in our DoDIIS 2022 webinar series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Electronic data sources in national security missions are increasingly more disparate, complex, and dependent on specific platforms. Intelligence analysts are overwhelmed by the number of existing and new data sources. Withou...
Add Favorite
Innovate. Adapt. Collaborate. DoDIIS 20...
Oracle and Carahsoft are excited to invite you to join us in our DoDIIS 2022 Webinar Series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. What makes Oracle Cloud Infrastructure (OCI) different from other cloud services? It starts with Oracle's unique approach to building secure, performant, standards-based, and second-generation cloud services that utilize the...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Outplaying Cybercriminals: Modern Ranso...
In this on-demand webinar, Jeff Adams, National Director, Cloud Sales Public Sector, VMware, and Matt McGarth, Global AWS Sales Synergy Leader, VMware, led an informative discussion on Modern Ransomware Recovery Strategies. Download this webinar now and learn how VMware and Amazon Web Services GovCloud are jointly engineered secure, on-demand cloud service that brings VMware’s rich Software-Defined Data Center software to the AWS GovClou...
Add Favorite
IDS: An Unexpected Key to Accelerating...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, today’s threat landscape is growing more complex and nefarious. As the urgency grows to combat modern advanced threats by adopting a Zero Trust security framework, public sector security teams find that standalone legacy IDS comes up short. Others may not yet...
Add Favorite
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
Back to Search Begin New Search