Back to Search Begin New Search Save Search Auto-Notify
Strong Security Starts with Strong IT O...
Splunk ITSI is a premium analytics solution that correlates and applies machine learning to infrastructure, application, and business data for 360° service monitoring, predictive analytics, and streamlined incident management. Unlike point event management or IT monitoring solutions, ITSI correlates and applies machine learning to metric, log, and trace data for end-to-end intelligence across your entire environment. ITSI also combines vie...
Add Favorite
Oracle Federal Tech Insights: Hybrid Mu...
Oracle Cloud Infrastructure offers a comprehensive set of multicloud solutions in the form of specialized deployments, database services, extensive monitoring capabilities, and strategic partnerships to fit your organization's needs. Join Oracle experts, Fred Nowicki, Government and Education Cloud Migration Specialists, and Nitin Vengurlekar, Chief Technology Strategist, to learn about OCI's comprehensive set of multicloud solutions. We'll re...
Add Favorite
Security Threats to Consider When Using...
The world spends a lot of time locking down logins. Yet resources are scarce when it comes to rapidly detecting and monitoring compromised credentials and sessions. Plurilock DEFEND offers identity assurance and compromise detection, alerting IT security personnel to potential threats in real-time. The platform runs invisibly, providing continuous identity detection and endpoint visibility in the background as users work. This capability enabl...
Add Favorite
Free Apps for Federal Systems Integrato...
View this on-demand webinar where we go over how members of the Federal Systems Integrator community can leverage FREE Splunk applications to get the most out of your Splunk instance. Our Splunk experts walk you through 3 of our complimentary applications that will allow you to better take advantage of Splunk's ability to ingest, analyze, and alert on metrics and event data to improve operations advantage and increase efficiency. During this o...
Add Favorite
Bridging the Gap for Federal Agencies f...
View this on-demand webinar to learn: Best practices for monitoring on-premises environments and cloud with a unified view How to quickly identify and resolve network and application performance issues wherever they occur How to continually monitor deployments and optimize performance
Add Favorite
Combat RMF & Compliance Challenges with...
Splunk helps defense agencies monitor and assess their systems for RMF compliance by automating the gathering, analysis, and reporting of system data relevant to RMF control families. Attendees joined us for a complimentary virtual workshop where attendees learned specific ways Splunk helps embrace RMF such as: Continuous monitoring of security controls and their effectiveness Audit trail collection and reporting Helping determine the acceptab...
Add Favorite
Breaking Free from the Technical Debt Trap
Technical debt is an accumulation of inefficiencies and vulnerabilities due to the way in which solutions and technologies are assembled to address specific problems in a "good enough" manner. Technical debt is a reality in all IT environments and often requires significant resources to address. It will often create more debt as security gaps are plugged in an acceptable, but suboptimal way. One of the largest sources of technical debt is Poin...
Add Favorite
The Business of Ransomware
Did you know there’s an entire underground economy around ransomware? In this webinar, Halcyon explained how Ransomware-as-a-Service (RaaS) groups operate, what an affiliate is, and how Initial Access Brokers (IABs) are the glue that holds them all together. The ransomware economy constantly changes, with groups disbanding or taking market share from competitors from quarter to quarter. Who will be crowned top dog in 2023? What you got o...
Add Favorite
Kickstart to Compliance Series: Step Tw...
Join us for the next session of our Kickstart to Compliance webinar series covering the second step on your journey toward achieving ZTA data pillar optimal level. To comply with federal mandates and protect sensitive data, agencies must develop an approach to identify and prioritize data protection needs. This includes understanding the different techniques for field and record level protection, such as encryption, persistent data masking, d...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Back to Search Begin New Search