Back to Search Begin New Search Save Search Auto-Notify
Built for Government: How Embedded Endp...
Did you know that Absolute’s endpoint security solution is embedded directly into government-used device firmware, offering unique advantages for enhancing control, resilience and compliance?In this session, we explored how agencies use Absolute to:Enforce robust security policiesDetect and recover from IT disruptionsStrengthen cyber resilience with persistent endpoint monitoring, automated repairs and geofencing for secure operations
Add Favorite
Building Accessible Dashboards
This insightful webinar was on the art of creating accessible data visualizations. Key principles for designing dashboards that cater to a wide range of user needs were taught, ensuring that everyone can see and understand data effectively. In addition to these best practices, we took a tour of the latest and upcoming Tableau features on accessibility, highlighting the enhanced usability experiences.During this webinar, attendees learned:Essen...
Add Favorite
Omnissa Partner Day
Those who joined us at our Omnissa Partner Day were able to attend our various sessions, meet with our representatives, and close the night with a happy hour.By attending our sessions, attendees got the opportunity to hear about topics like:Discovering Omnissa: Our Story, Mission, and VisionUnlocking Growth: How Omnissa Empowers PartnersPartnering with Omnissa: Strategies, Benefits, and Success in the Channel
Add Favorite
How to Enforce Least Privilege Across E...
Endpoint security serves as the frontline defense in protecting your institution’s network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, and more. By securing these endpoints, institutions...
Add Favorite
Maximize Cloud Security with AWS and Wiz
This webinar explored how AWS's built-in security tools and Wiz's Cloud-Native Application Protection Platform (CNAPP) work together to enhance cloud security. AWS services like Config, Security Hub and KMS provide a strong foundation for visibility, compliance and monitoring, helping organizations track resource changes, centralize logging and manage encryption. In this session, we showcased how Wiz extends AWS's capabilities, delivering deep...
Add Favorite
AI on Your Terms: Scalable & Secure Sol...
Your AI journey is only just beginning. Learn how adopting advanced artificial intelligence solutions can drive faster problem-solving, improve decision-making and deliver meaningful results for your organization with Red Hat OpenShift AI. Watch this recording for an in-depth discussion on Red Hat OpenShift AI and how it can help: Reduce AI Infrastructure Management: Enable teams to focus on data exploration and app development with on-demand...
Add Favorite
Community Templates Technology with Clariti
In this on-demand webinar Clariti shares a game-changing new cloning feature that allows you to replicate other organizations’ permit-type configurations to save time. They'll show you how easy it is to clone thousands of best practice permit types, rules, steps, and workflows built by leading cities and counties like Placerville CA, Albany NY, Melissa TX, and more. You'll learn how Community Templates works, and how you can:Increasing i...
Add Favorite
Boomi & Argano Webinar
View this on-demand webinar from Boomi, Argano & Carahsoft for an insightful webinar where we explored how powerful integration solutions can meet complex data and application demands to enhance the state resident experience.
Add Favorite
Building Resilience in Tribal Organizat...
This webinar dove into the dynamic realm of data analytics and its transformative potential for tribal communities with Splunk. Speakers also discussed Splunk’s revamped tribal commitment and new pricing models specifically for tribal organizations. Attendees who joined learned:How Tribes are using Splunk to identify, track and visualize emerging security threatsHow Splunk has revamped our commitment to the Tribal community via unique pr...
Add Favorite
Navigating the DOD SBOM Mandate: How th...
An exclusive webinar with Lineaje and Carahsoft where attendees explored how Lineaje Hub enables the Army and other DoD agencies to centralize SBOM collection and generation, enable secure SBOM exchange, detect foreign contributors in your software, continuously monitor and remediate risks, and enforce compliance and security controls.
Add Favorite
Back to Search Begin New Search