Back to Search Begin New Search Save Search Auto-Notify
Market Myths on AutoSys & Its Futuristi...
During this webinar, attendees explored the strategic direction of AutoSys and how innovations are designed to empower IT teams with more intelligence, felxibility, and autoamtion at scale. This webinar provided a clear snapshaot of where AutoSys stands today—driving operational efficiency, ensuring reliability, and enabling scalability across hybrid environments. Attendees learned about:The current and future state of AutoSysSubstantial...
Add Favorite
How Agencies Are Saving Big and Serving...
In this webinar, Atlassian and Clovity demonstrated how Jira Service Management could help government agencies achieve immediate results by modernizing IT and business operations with cloud and automation. Public sector teams explored how they could:Automate workflows to quickly improve service for employees and citizensStreamline service delivery to reduce costs and meet the demands of the timeAccelerate modernization with practical steps tha...
Add Favorite
The Four Pillars of Strategic Onboardin...
In today’s competitive talent landscape, first impressions matter more than ever. Organizations that prioritize a thoughtful, structured onboarding experience see measurable results—higher retention, faster ramp-up times, and stronger engagement from day one. But delivering this at scale, across roles and teams, requires both strategic clarity and the right technology. Watch this on-demand webinar to hear from HR and eLearning expe...
Add Favorite
AI & Automation in Action: Modernizing...
Artificial intelligence (AI)-enabled software automation significantly enhances the operations and management of critical systems essential to national security, law enforcement and data analysis within the Department of Homeland Security (DHS) and the Department of Justice (DOJ). Red Hat OpenShift AI and Red Hat Device Edge, combined with Dynatrace’s observability tools, provide robust solutions for and drive automation within these sys...
Add Favorite
Respond Faster, Resolve More with Jira...
Government IT teams are being asked to do more with less while delivering faster, compliant services without disruption. The right ITSM approach can make all the difference. In this session, attendees learned how to:Understand CMDB fundamentals to improve visibilityOptimize incident response for faster resolutionDrive compliance without slowing your teams down
Add Favorite
Escape Rising Virtualization Costs with...
Rising licensing costs and restrictive bundling models have left many government customers paying more than ever for virtualization solutions—often for features they didn’t even use. These unexpected expenses created budget challenges and limited flexibility at a time when agencies were under pressure to modernize efficiently. With HPE VM Essentials (VME), attendees discovered a smarter way forward. This solution delivered the agil...
Add Favorite
Journey to Success: Education Cloud in...
Aleysian and Carahsoft hosted a live webinar demonstrating how Salesforce Education Cloud unifies the entire student lifecycle within a single, integrated platform.The session showcased how institutions’ workflows could be improved with:A Unified Student ProfileThe Learner LifecycleA future-proof solution for scalabilityData and insights for more informed decisionsProactive student engagementAgentforce
Add Favorite
DNS Under Siege: Unmasking the Infrastr...
In today’s threat landscape, DNS is no longer just the phonebook of the internet. It’s a battleground. Threat actors are exploiting DNS with unprecedented speed and sophistication, leveraging ephemeral domains, traffic distribution systems (TDS), domain hijacking and adversarial AI to evade detection and scale attacks. Attendees of this webinar learned about:The rise of one-time-use domains and their role in control evasionHow mali...
Add Favorite
Vulnerability Management 101
During this on-demand webinar attendees learned:The importance of basic cybersecurity hygiene. The intersection of vulnerability management and MITRE ATT&CKHow vulnerability management plays a role with various standards and frameworks
Add Favorite
Learn How to Achieve CMMC Compliance wh...
Ariento was a leading provider of managed, consulting, and advisory services to the defense industrial base related to the Cybersecurity Maturity Model Certification (CMMC). While not required, CMMC Level 2 certification demonstrated their commitment to their managed service clients and assisted in making their certification assessments easier and more cost effective. On Tuesday, October 21 from 1:00 – 1:30 pm, BeyondTrust’s Kevin...
Add Favorite
Back to Search Begin New Search