Back to Search Begin New Search Save Search Auto-Notify
Enhance Your Security Posture with Info...
Cybercrime is growing in complexity and scale, but security teams cannot respond to incidents fast enough. Improved response times requires multiple stakeholders, better information and processes. Throwing more people at the problem is not possible, nor the correct solution. Implementing and integrating security tools that allow you to simplify, do more with less and build adaptive security architectures to protect your critical infrastructure...
Add Favorite
SOAR Into Advanced Cyber Defense with S...
Join Splunk and Carahsoft for a presentation and demo where we will discuss how Splunk Phantom can help your team achieve optimum security operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage technology for orchestration and automation as an integral part of their Security Operations Center (SOC) platform to accelerate incident response while addressing the skills shortage. T...
Add Favorite
Splunk Enterprise Security for the Army
Splunk Enterprise Security (ES) is the nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, and simplify threat management minimizing risk. Splunk ES helps teams gain organization-wide visibility and security intelligence for continuous monitoring, incident response, SOC operations, and providing executives a window into business risk.Join Splunk and Carahsoft for a pr...
Add Favorite
The Future of Encrypting Network Data
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) networks to securely deliver information when and where we need it has increased. Thales Trusted Cyber Technologies, offers a network security solution th...
Add Favorite
Deploy Ultra-secure Remote Desktops wti...
Spend 60 minutes with Teradici to learn how you can secure desktops and workloads for a variety of public sector and federal use cases. You'll learn how: Ultra-secure PCoIP software and clients reduce attack risk, addressing government security requirements - hear updates related to TLS 1.2, FIPS 140-2, and DARS To efficiently roll out and manage virtual desktop deployments To leverage hybrid and cloud services for efficient IT To benefit from...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Safeguarding Sensitive and Compliant Da...
Join us for a complimentary webinar on April 23rd to discuss how Thales TCT and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key management are substantia...
Add Favorite
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Add Favorite
Securing Your Data: The New Currency of...
Data is now currency for nation states, criminal organizations, and bad actors. They all want your data to sell to the highest bidder and your data could hold personal information, state secrets, or proprietary data. Please join Trustwave Government Solutions and learn more about the securing of crown jewels. During this webinar, you will have the opportunity to learn about: Data Security best practices for securing your databases Toxic Combin...
Add Favorite
Back to Search Begin New Search