Back to Search Begin New Search Save Search Auto-Notify
VMware Anywhere Workspace
As work moves to a hybrid model, each remote employee becomes a possible target and threat to your network and data. Providing remote access through VPN's is rapidly becoming obsolete as companies look for more robust alternatives like Zero Trust Network Access (ZTNA). Attendees joined VMware and Carahsoft for a webinar to gain insight on how VMware SASE combines the cloud VMware SD-WAN (Software-Defined Wide Area Network), Gateway, VMware Sec...
Add Favorite
DoDIIS 2022 Webinar Series: Mitigating...
Rubrik and Carahsoft are excited to invite you to join us in the lead up to DoDIIS 2022 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Cyber attacks strike every 11 seconds, leaving federal agencies and their data at risk. It's now a matter of when, not if, your agency will be impacted. Rubrik has introduced a new way of securing your agency's most important as...
Add Favorite
Govern Your MFDs with the Only COTS Sol...
How can mixed hardware, multi-functional device (MFD) enterprises extend the O365 services (including Scan-to-OneDrive for Business) to their employees and devices while meeting the US Government's zero-trust CAC/PIV security protocols? Let Kofax be your solution. Join the on-demand webinar from Kofax and Microsoft to: Discover Kofax ControlSuite's purpose-built integration with Microsoft O365 to maximize O365 services/offerings and multi-func...
Add Favorite
The Role of APIs in Mission Transformation
Attendees joined Google Public Sector & Carahsoft and learned more about how the Apigee API Management Platform helps agencies accelerate and amplify mission outcomes. During this on-demand webinar, attendees learned the benefits of an API-First approach: Represent government services as APIs Accelerate Modernization: Move from many to the right systems Accelerate and de-risk cloud migration Run your workload where it has merit Unlock silo...
Add Favorite
Ensure Cyber Threat Defense with Zero T...
You think you have your Zero Trust framework dialed in, but the unimaginable happens. Bad actors have penetrated your agency’s perimeter, network, and endpoint security solutions, leaving you with your last layer of defense - the data layer itself. Join Rubrik and Carahsoft for an on-demand webinar to fortify your defenses against cyber threats. Built to withstand pervasive cyber threats, Rubrik's Zero Trust data security ensures resilie...
Add Favorite
Taking Advantage of Cloud Mandates to R...
Agencies are continually asked to reduce spending while facing new directives to upgrade their enterprise systems. For instance, M-19-21 directs all federal agencies to digitize their hardcopy records. Meanwhile, Executive Order 14028 requires agencies to move to the cloud and increase their data security capabilities, such as multi-factor authorization, sensitive data encryption, and the conversion of all legacy applications to a zero-trust d...
Add Favorite
How to Improve Your Cybersecurity Readi...
With cyber threats increasing in volume and sophistication, effective and agile privileged access management (PAM) is now crucial for educational institutes. Best-in-class centralized privilege management enables institutes to establish an agile framework for Zero Trust access today and tomorrow, regardless of operating system (OS) or domain. During this on-demand webinar, attendees learned: How to balance productivity and security Why increas...
Add Favorite
OARnet VMware Education Day
Attendees of the OARnet VMware Education Day heard from VMware subject-matter experts as they discussed VMware solutions and how they can help you achieve digital transformation without disruption by enabling a digital foundation that delivers any app on any cloud to any device. Register to view this on-demand recording.
Add Favorite
Zero Trust - Beyond the Buzzword
Thank you for attending our Zero Trust - Beyond the Buzzword webinar! During this webinar, you learned: What is Zero Trust and how it applies to data security How digital transformation can make data vulnerable but also more secure. Tips for putting Zero Trust Architecture into action. How does cloud make implementing Zero Trust faster but more complicated How to develop a long-term strategy to protect data throughout its entire life-cycle Re...
Add Favorite
Kickstart to Compliance Series: Fast Tr...
To meet the federal mandate's requirements of a Zero-Trust architecture and enable to appropriate use of sensitive data, agencies need a consistent, reliable approach that reduces risk and protects data at scale. Join us for the first session of our Kickstart to Compliance webinar series discussing the steps you can take to incorporate modern digital solutions that enable zero trust strategies in your agency. During this kickoff session, a...
Add Favorite
Back to Search Begin New Search