Back to Search Begin New Search Save Search Auto-Notify
Simple, Cost-Effective Data Protection...
As Public Sector teams modernize IT, protecting workloads with a simple, cost-effective solution is essential. Red Hat, CloudCasa, and Carahsoft hosted an exclusive virtual event on September 24 to explore how Red Hat OpenShift and CloudCasa work together to deliver secure, scalable and low-cost data protection for virtual machines (VMs), containers and persistent volumes across OpenShift environments.Together, Red Hat and CloudCasa help agenc...
Add Favorite
Optimize Mobile Asset Management with A...
Federal law enforcement agencies operate in fast-moving, complex environments where managing mobile assets — vehicles, field equipment, mobile IT systems — is critical to mission success.In this session, attendees learned how ServiceNow’s AI platform delivers real-time visibility, automates inventory tracking, and predicts maintenance needs to maximize asset readiness and security.Insights on using AI to predict maintenance n...
Add Favorite
Safeguarding Your Data: Meeting CMMC Le...
Participants attended our Google Workspace CMMC webinar to learn how your organization can achieve CMMC Level 2 compliance and safeguard your sensitive data. With the upcoming accreditation requirements from the Department of Defense, it's more critical than ever for the Defense Industrial Base to secure Controlled Unclassified Information (CUI). Attendees joined us to learn about CMMC and why it's important, demonstrate how to leverage Google...
Add Favorite
Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. During this webinar, Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist,...
Add Favorite
Stronger Together: Modernizing Records...
Key topics include: “Why” – Applying lessons learned to state and local government challenges Benefits of adopting more Microsoft 365 tools for data governance Approach to implementing tools – Discover, Design, Migrate, Train, Maintain Tools available in the Microsoft 365 universe for data governance and security, including AvePoint add-on tools to improve functionality
Add Favorite
A Blueprint to Defeat Social Engineerin...
A new social engineering-led threat is targeting IT Help Desks, and new strategies are required to defend against it. Gangs like Scattered Spider are honing their techniques and tools to exploit weaknesses in your security process and target institutions like yours with ransomware and data theft. Visionary CISOs are implementing novel defenses to fight back.During this webinar, attendees learned:What is the new social engineering threat?Which...
Add Favorite
Unified Approach for Continuous Threat...
State and local governments and educational institutions face a growing challenge: securing interconnected IT and OT systems from modern cyber threats. Traditional siloed defenses are no longer enough. This webinar pertained to cybersecurity leaders ready to move beyond fragmented strategies and embrace a cohesive ‘whole-of-state’ approach. Attendees explored how to build a unified cybersecurity framework that leverages shared reso...
Add Favorite
Optimizing AI, Analytics and Databases...
Carahsoft hosted a live session highlighting the latest updates to the HPE Alletra Storage MP B10000 platform, including R5 enhancements and key workload insights. Attendees learned how this innovative storage solution supported a broad ecosystem of enterprise applications and drove success across industries. What was covered:What’s new in the HPE Alletra Storage MP B10000 and R5 updatesHow to optimize performance for AI, SAS Analytics,...
Add Favorite
Beyond Extractions: Rethink How You Sha...
There’s so much more to mobile evidence workflows beyond the device extraction. From the moment a device is submitted to the lab, maintaining the chain of custody is especially critical, and sharing that digital evidence with key stakeholders only adds to the challenge. However, many agencies are still using old habits and risky shortcuts during evidence handoffs that can ultimately delay justice.Cellebrite can solve these issues for you...
Add Favorite
Digital Transformation through Integration
As digital threads and AI become a larger component of enterprise infrastructure, being able to manage data integration at scale is critical for operational efficiency. During this webinar, attendees learned how MuleSoft enables operational efficiency and digital transformation through integration. Download the on-demand recording to:Learn the benefits of a layered integration strategyUnderstand how integration is paramount to enterprise AIRef...
Add Favorite
Back to Search Begin New Search