Back to Search Begin New Search Save Search Auto-Notify
The AI Advantage: Better Data, Faster R...
Artificial intelligence and machine learning are no longer future goals, they're current imperatives for state and local government leaders looking to improve their communities. This virtual event was designed specifically for teams looking to turn AI ambition into action. Red Hat OpenShift AI is a flexible, fully supported platform that helps your team: Accelerate time to value with pre-integrated, open source tools for building and deploying...
Add Favorite
Accelerating Federal Decision-Making wi...
As data volumes surge and AI adoption accelerates across federal agencies, traditional CPU-based analytics systems are hitting their limits—slowing decision-making, increasing costs, and creating bottlenecks in mission-critical operations. By modernizing with GPU-based solutions, federal Chief Data Officers and Data Engineers can position their agencies to scale securely, accelerate insights, and achieve their mission objectives more eff...
Add Favorite
Transforming Federal Financial Reportin...
Attendees joined us on June 12th to explore how Workiva's cutting-edge capabilities can automate and simplify even the most complex Annual Financial Report (AFR) requirements. During this webinar, attendees uncovered actionable strategies to drive transformational efficiencies in their financial reporting processes. Our expert panelists also discussed how your agency can leverage Workiva to enhance report quality, usability, and transparency....
Add Favorite
Securing and Optimizing the Unified Network
CDW/Sirius Federal, Dell, Versa, NetScout and Vcinity took a look into their unique approach at securing and optimizing the unified network. This session focused on DOD initiatives around zero-trust principles and a data-centric posture, aiming for a secure and resilient network within mission-critical environments around the world. We discussed the specific challenges faced during this process including: security vs speed, bandwidth and netwo...
Add Favorite
Palo Alto Networks Prisma Access Browse...
This session highlighted:Defending K-12 against browser-based cyberthreats: Learn about the security gaps that traditional browsers introduce to K-12 and how to address them. Protecting sensitive data on the browser: Leverage the unique capabilities that a secure browser provides to protect sensitive data like PII from being leaked into personal accounts and GenAI applications.Securing the browser-based workspace against cyberthreats: Protect...
Add Favorite
Stop Advanced Threats: Unify Endpoint a...
View this complimentary webinar from Fortinet and CrowdStrike, where we explored how organizations can protect themselves from advanced threats, simplify security and strengthen their network. Advanced threats demand a stronger and smarter defense. Fortinet and CrowdStrike have partnered to deliver a seamless, AI-powered security solution that integrates firewall and endpoint protection—so you can stay ahead of cyber threats with ease. C...
Add Favorite
Beyond VPNs: Identity-First Zero Trust...
In this webinar, attendees:Understand the advantages of Identity-First Zero Trust connectivity over traditional VPNs, IPSec tunnels, SD-WANs, and conventional ZTNA—especially for Non-Human Identity (NHI) and ICAM use casesGain deep insight into Zero Trust principles, identity-centric network overlays, and Secure-by-Design architectureExperience the real-time deployment of Zero Trust Networks-as-a-Service using NetFoundryDiscover key ente...
Add Favorite
Automate and Improve Your Cyber Operati...
The Cyber Operational Readiness Assessment (CORA) program evaluates the cybersecurity posture and resiliency of each Authorization Boundary using a broad set of security, risk, and mission data. The problem for Defense and Intelligence Agencies is that they face limitations when trying to combine this data in meaningful, efficient ways that keep them continuously prepared for inspections.In our recent webinar, our Security and Risk Solution Co...
Add Favorite
Beyond the LMS: Building a Mission-Read...
Government training leaders across defense, public safety, and civilian sectors face a common challenge: meeting evolving mission demands with limited budgets and leaner teams—without compromising readiness. Access this on-demand webinar to discover how relying on disconnected LMS and training platforms, or point solutions, creates silos, inefficiencies, and security gaps. To truly enhance mission readiness, agencies need a unified train...
Add Favorite
How Verkada Can Help Secure K-12
K-12 schools are increasingly adopting Verkada solutions to enhance security, ensure student safety, and reduce vaping incidents. The platform’s simplicity, advanced technology, and focus on privacy make it ideal for addressing the unique challenges of school environments. During this webinar, attendees learned about:Overview of VerkadaCamera capabilitiesVape sensorsGuest accessAccess control
Add Favorite
Back to Search Begin New Search