Back to Search Begin New Search Save Search Auto-Notify
Assess Your On-Prem Environment, See Yo...
Your path from On-Prem to the Cloud may have more questions than answers. Google Cloud can help you bridge those gaps with assessment and readiness tools that will give you confidence in your migrations to the Cloud. Join this webinar to learn how other agencies are adopting the Cloud and learn a simple phased approach to start your own journey to the Cloud. Hear from a Google Engineer about how Google Cloud can do a mutual assessment of your...
Add Favorite
Investigating SAP in Real-Time with Splunk
Join Rhondos and Carahsoft as they present SAP PowerConnect for Splunk, the only certified solution to bring all data from SAP to Splunk. SAP is an organization's largest, most complex, and most critical financial application and until now real-time monitoring has been extremely limited. By essentially writing a Splunk heavy forwarder as an SAP add-on in SAP's native languages, PowerConnect allows organizations to leverage Splunk for security,...
Add Favorite
How to Scale and Modernize Agency Infra...
When migrating legacy, on-premise infrastructure to AWS Cloud, it is imperative for government agencies to implement new monitoring and alerting frameworks to reflect the nature of the new Cloud environment. This informative webinar will showcase how to seamlessly modernize, migrate and scale cloud infrastructure to deliver reliable, secure and user-friendly FedRAMP compliant citizen services. The presentation will include a government case st...
Add Favorite
Achieving Mission Success Using Search-...
Siren and Carahsoft are excited to invite you to join us in our DoDIIS 2022 webinar series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Electronic data sources in national security missions are increasingly more disparate, complex, and dependent on specific platforms. Intelligence analysts are overwhelmed by the number of existing and new data sources. Withou...
Add Favorite
DoDIIS 2022 Webinar Series: SolarWinds...
Participants will learn the following: Creating alerts that are actionable and provide information on what’s happening and how to fix the issue Removing false positives and false negatives from your alerts Correlating data from multiple modules to provide insight and reduce MTTR Tuning alerts that will get you to zero false positives
Add Favorite
Innovate. Adapt. Collaborate. DoDIIS 20...
Oracle and Carahsoft are excited to invite you to join us in our DoDIIS 2022 Webinar Series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. What makes Oracle Cloud Infrastructure (OCI) different from other cloud services? It starts with Oracle's unique approach to building secure, performant, standards-based, and second-generation cloud services that utilize the...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Outplaying Cybercriminals: Modern Ranso...
In this on-demand webinar, Jeff Adams, National Director, Cloud Sales Public Sector, VMware, and Matt McGarth, Global AWS Sales Synergy Leader, VMware, led an informative discussion on Modern Ransomware Recovery Strategies. Download this webinar now and learn how VMware and Amazon Web Services GovCloud are jointly engineered secure, on-demand cloud service that brings VMware’s rich Software-Defined Data Center software to the AWS GovClou...
Add Favorite
IDS: An Unexpected Key to Accelerating...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, today’s threat landscape is growing more complex and nefarious. As the urgency grows to combat modern advanced threats by adopting a Zero Trust security framework, public sector security teams find that standalone legacy IDS comes up short. Others may not yet...
Add Favorite
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
Back to Search Begin New Search