Back to Search Begin New Search Save Search Auto-Notify
ThoughtSpot Webinar Series
Session Three: IT Modernization ThoughtSpot makes it easy for anyone to get answers from their agency data in seconds with search & AI. Simply search using natural language to analyze your data and get automated insights with a single click. We invite you to join us and earn up to 3 CPE credits during this webinar series, where attendees will explore numerous topics. Now more than ever, it is critical for everyone to have rapid access to f...
Add Favorite
Reduce Downtime. Gain Complete Visibili...
Join us on October 15th for a webinar where we will be covering a brief Splunk introduction, eliminating data silos, and server monitoring. Splunk is a log analysis platform that allows you to collect all logs, metrics, configurations, and messages so that you can search, correlate, alert, and report across your server in seconds. Eliminating silos allows for complete operational visibility across heterogeneous environments consisting of Windo...
Add Favorite
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
Splunk's Operational Impact in the DoD...
Join us as we share stories of Splunk's Department of Defense and National Security customers realizing the value of bringing data to every decision. Examples will include:ITSI driving unprecedented Operational IntelligenceEnterprise Security setting the standard for Security Operations Center (SOC) incident response and mean time to resolution (MTTR)Phantom force multiplying front line analysts through orchestration and automationThis will be...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Overcome Portfolio Management Challenge...
Stuck at home and worried how your IT or Program Investments are faring? Federal agencies are experiencing extreme scrutiny on the spending of their budgets. These organizations face the challenge of understanding and integrating data from many portfolios. Strategic Plans and Enterprise Architecture are often rarely consulted and have little impact. This creates a situation where senior and accountable decision-makers do not know how their bud...
Add Favorite
Business Continuity in Uncertain Times:...
If you are experiencing remote work performance or availability problems, than the scale and reliability of a cloud solution may ease your burden. Akamai's Enterprise Application Access (EAA) solution can provide access to critical applications no matter where they are hosted, maintain the continuity of agency's core functions, and leverage a Zero Trust approach to maintain security. Join Akamai and Carahsoft for a discussion on how your busi...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Reducing Teleworking Risks with a Softw...
Secure access is not a new challenge for IT operations, but with the accelerated shift to working from home, the need to rapidly scale secure remote access has skyrocketed. The most promising security approaches in place today, like the Cloud Security Alliance's Software Defined Perimeter (SDP) approach, had their start from government approaches. In SDP environments, government data is being accessed more by unmanaged, risky, and potentially...
Add Favorite
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Back to Search Begin New Search