7 webcasts found
+ 44 past events found
Back to Search Begin New Search Save Search Auto-Notify
Transform Windows 10 with VMware Modern...
Windows 10 opens the door for you to transform siloed desktops, mobile device and application management, and adopt a unified approach across your organization with its new cloud-based management framework known as Modern Management. Modern Management represents a shift in the Windows management process to support the delivery of policies, updates, patches, and applications from the cloud. Windows 10 enables cloud-based delivery of security po...
Add Favorite
Collective Defense and the Global Cyber...
Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems.Combined with the current work environment and the emergence of new threat vectors from key adversaries, we are entering a more dangerous cyber threat landscape than ever...
Add Favorite
Modernizing DoD's Approach to Security...
The Department of Defense (DoD) is considering how to best leverage zero trust architecture (ZTA) to move away from the traditional network-centric security model. By shifting to a modern, resource-centric framework, agencies are better able to focus on protecting data and critical resources. During this webcast, we’ll explore how a cloud service provider, such as Zscaler, can help transform the DoD's existing cybersecurity platform with...
Add Favorite
Unlocking Data to Drive Smarter and Saf...
Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn't you have at least the same observability into a $100M weapon system as you do for a $500 laptop? Planes, tanks, and other weapon systems are composed of thousands...
Add Favorite
OpenText Delivers 4 New IT Operations S...
OpenText has expanded FedRAMP® offerings with secure SaaS solutions that include IT service management (ITSM), IT asset management (ITAM), discovery, configuration management (CMDB), and project and portfolio management (PPM). Featured Speakers from the webinar: Keith Nelson Senior Industry Strategist, Public Sector at OpenText Travis Greene Senior Director of ITOM Product Marketing, OpenText In the fast-paced world of instant responses an...
Add Favorite
DoDIIS Worldwide Webinar Series: Securi...
Yubico and Carahsoft hosted this webinar leading up to DoDIIS 2023 and explored how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Zero Trust is vital to maintain robust data security and easy information sharing across the Department of Defense (DoD) and intelligence communities. Previously, DOD professionals relied upon issuance of credentials stored on single-protocol smar...
Add Favorite
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
Add Favorite
Back to Search Begin New Search