Back to Search Begin New Search Save Search Auto-Notify
Recovering from a Ransomware Attack wit...
According to the FBI, there is a ransomware attack on the United States Government and its enterprises every 11 seconds. After ransomware enters the system, it encrypts accessible files that are present on the computer and spreads throughout the network. These files have become unusable unless decrypted with a special key owned only by the cybercriminal and released in exchange for payment with an untraceable/pseudonymous method. Kapalya has d...
Add Favorite
Manageable Zero Trust for OT Networks
Check out our on-demand recording of Waterfall Security Solutions and Carahsoft as we discussed how the modern approach to OT cybersecurity initiatives employs both zero-trust architectures and micro-segmentation and how applying these modern concepts to OT networks can be challenging. Attendees of this webinar also learned that OT security programs focus on: Protecting the safety of personnel Reliability of industrial production Physical pre...
Add Favorite
The New Normal for Government Employees
In this on-demand webinar you will learn how your users can access a fast, responsive desktop of their choice anywhere, anytime, from any supported device. Amazon WorkSpaces, a cost-effective, managed Desktop-as-a-Service (DaaS) solution for flexible work styles, can be used to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. During this on-demand w...
Add Favorite
Five Steps to SASE
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is drastically different. The iboss Private Access service inverts the VPN model completely. Instead of granting a user access to pr...
Add Favorite
Don't Get Hooked: Never Guess on Phishi...
With the recent Executive Order issued on improving the nation's cybersecurity, agencies have made it a top priority to increase their cyber threat and incident response measures. On August 5th, join experts from SAP NS2 and GoSecure as they share insight on GoSecure Inbox Detection and Response (IDR). Designed to layer onto your current email security stack, GoSecure IDR can instantly reduce your risk of successful ransomware, spoofing, busin...
Add Favorite
Eliminating Cost & Complexity of Point...
Most organizations have deployed Microsoft 365, however many are still using point solutions, like Dropbox, for their file sharing and content collaboration. With M365 and e-Share, government organizations can retire these point solutions and securely and easily move their users and external file sharing needs to M365. View this on-demand webinar to discover how e-Share allows the modern collaboration and data protection capabilities of M365 (...
Add Favorite
Google Cloud 2020 Webinar Series: Secur...
Google Cloud and Carahsoft invite you to a webinar to learn more about cybersecurity solutions and demonstrate specific use cases. Government agencies continue to modernize by expanding their services and migrating workloads to hybrid and cloud environments. These actions create rapid growth in the volume of log data generated by devices and systems. Security professionals rely on these logs for audit information, forensic evidence, and to det...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. Join Splunk and FCN for an on demand presentation and demo on the broad strokes of Splunk Phantom's automation engine. During th...
Add Favorite
Breaking the Chains of Siloed Data with Boomi
On the journey to digital transformation, agencies generate and manage massive amounts of data. Efficiently leveraging that data is critical to drive the right strategic and operational decision, but connecting and making sense of data cross your agency in a hybrid-cloud or multi-cloud environments is not easy. View our on-demand webinar to discover how Boomi can: Digitize services Improve operational efficiencies Meet your organization and cu...
Add Favorite
Provide Zero Trust Architecture in a Hy...
State and local governments are highly vulnerable to cyber-attacks. With an increase in telework environments, agencies have been forced to rethink their cybersecurity approach. Determining the right security solution can become quite complex for state governments with the amount of vendors on the market - along with the lack of staff and limited funding. Fortunately, an intrinsic security approach simplifies your security strategy by building...
Add Favorite
Back to Search Begin New Search