Back to Search Begin New Search Save Search Auto-Notify
Navigating the Maze with Salesforce and...
Attendees joined Salesforce and Vivid GovTech our Navigating the Maze webinar on Thursday, January 18th, 2024 at 2:00pm ET as we demystified the complexities of obtaining permits and licenses, guiding you through a seamless journey from start to finish. Our experts shared invaluable insights, best practices, and innovative tools to streamline the permitting and licensing process. Whether you're a business owner, a government official, or a con...
Add Favorite
Zoom Partner Roadshow
During this event, attendees delved into exclusive learning sessions and gained valuable sales guidance from Zoom, Carahsoft Sales, and SE knowledge experts. As the day concluded, participants joined us for a casual networking mixer. Register to view this on-demand recording.
Add Favorite
Embracing the Future of Cybersecurity:...
Recent years have seen a surge in cybersecurity approaches driven by changes in malicious actor behavior, innovation and the complexity of modern IT enterprises. The expansion of cloud environments in defense agencies emphasizes the need to maximize their value, as relying on a single cloud can hinder innovation, increase costs and limit options for federal applications. Red Hat's Chief Architect and Security Strategist, Michael Epley, session...
Add Favorite
Atlassian's Agile Practices to Avoid Tr...
Agile practices help agencies do more with less in a fast-paced, agility-demanding environment. During this webinar, experts explored tips and tools for successful agile transformations. Attendees discovered: How to refocus teams with agile practices Effective approaches to tackle common workflow obstacles Digital solutions for progress and obstacle management Register to view this on-demand recording.
Add Favorite
Email Authentication: Are You Ready For...
This on-demand webinar covered: New Google and Yahoo email authentication requirements Adding-on to existing Proofpoint customers not running Email Fraud Defense or Secure Email Relay
Add Favorite
Navigating Tomorrow's Defense Supply Chain
For defense agencies to prepare for and mitigate high-impact supply chain disruptions, decision-makers must first have clear visibility into their operations and where vulnerabilities exist. As a result, more organizations rely on digital logistics, a transformative approach using data analytics to monitor, anticipate and respond to supply chain disruptions. Given the complexities of global supply chains and the ever-present potential for disr...
Add Favorite
Google Workspace Okta Webinar
During this on-demand webinar, we discussed: How to empower your security team: Equip your team with seamless access to essential tools, all while safeguarding sensitive data. Enterprise Shield: Navigate compliance demands and combat cyber threats, ensuring you’re prepared for the challenges of today’s digital ecosystem. Streamlined Identity: Centralize management for streamlined IT operations and consistent user experience.
Add Favorite
F5 SLED Lab Series: Go for Gold in F5 S...
F5 SLED Lab Series Introduction Webinar Attendees in this on-demand session learned how F5 Distributed Cloud and BIG-IP Next can help them overcome their IT curveballs and achieve their modernization goals.
Add Favorite
Empowering the Employee - Diving Deep I...
In this on-demand webinar, attendees learned: What CX and UX means to federal IT decision makers Perceptions of the progress federal agencies have made in modernizing end user experiences How agencies measure success in their CX/UX strategies How to understand points for employees in working with their agency’s technology The role Chief Experience Officers play in improving CX/UX at federal agencies Thank you for joining us!q1
Add Favorite
Understanding Password and Credential S...
Join Keeper for this on-demand Demo on the pain and risk of password and credential management. All attendees received a FREE 3-Year subscription to Keeper's award-winning consumer password manager. Keeper Security Government Cloud is FedRAMP Authorized to: Enforce the use of strong and unique passwords on every account Securely share credentials, files and other sensitive data among team members and with external partiesAlert users and system...
Add Favorite
Back to Search Begin New Search