Back to Search Begin New Search Save Search Auto-Notify
Fortra's DCS
During this on-demand webinar attendees learned about: Navigating the unique data landscape: classification, CUI, NATO STANAG and metadata standards Beyond single methods: why a varied approach is essential for Outlook and Office data labeling and tagging Harmonizing end user input AI, and machine learning for labeling in Microsoft environments
Add Favorite
Migrating from a Legacy VPN to a ZTNA S...
Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New security challenges present themselves that traditional remote access solutions weren't designed to solve. To address this new reality, organ...
Add Favorite
(IAM) Advantage Unleashed
Attendees of this on-demand webinar learned: Best practices for efficient integration and delivery of identity and security solutions for Zero Trust Architecture Why a best-in-class approach is required to drive real identity security value How to address audit gaps and meet mandated requirements
Add Favorite
Mapping to DoD Zero Trust Capabilities:...
In this on-demand webinar, attendees learned: How to meet Network, Orchestration/Automation and Visibility/Analytics requirements How to manage encrypted data The importance of Lateral or East-West visibility in Zero Trust
Add Favorite
Better Together: Building a Zero Trust...
Managing data efficiently is becoming more complex and it's crucial to keep up with regulations. Elastic and Cribl work together to make data management easier for public sector organizations. Together the pair are bringing better data integration, analytics and observability to the table, so agencies can make smarter decisions and deliver better services. Attendees tuned in live on April 16 to learn how the Cribl product suite integrates with...
Add Favorite
Strengthening ICAM Solutions with AAL3...
Attendees of this webinar learned how to: Strengthen their Zero Trust identity posture Increase IT productivity and reduce downtime Unify and streamline your user's authentication experience
Add Favorite
Bolster Identity Security with Password Safe
Attacks on identities, especially those with elevated access and privileges, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. In this perimeter-less, remote world, organizations need a higher degree of privileged access protection that eliminates the ability for attackers to gain access and move laterally. A zero tru...
Add Favorite
Unlock the True Power of Zero Trust thr...
In today’s digital landscape, corrupt content poses unprecedented challenges to cybersecurity. The mass proliferation and fragmentation of content communication systems (file-sharing services) has created threat opportunities that must be addressed urgently. View the on-demand webinar to learn how Kiteworks-enabled Private Content Network (PCN) and Forcepoint’s Zero Trust Content Disarm and Reconstruction (CDR) has combined to cre...
Add Favorite
Evolving from Disjointed Views to Cohes...
Riverbed's Federal CTO, John Pittle, addressed the difficulties confronting federal IT teams, presented customer use cases and explored how Riverbed’s Unified Observability portfolio offers the necessary visibility across contemporary federal networks. In this webinar, attendees discovered the: Importance of prioritizing visibility, security and cost in network solution selection Hidden expenses in network monitoring tools Impact of zero...
Add Favorite
Back to Search Begin New Search