Archived Events
In this webinar, Global Technology Solutions (GTS) and Amazon Web Services (AWS) discussed how together they can help rejuvenate your contact center with cloud-based ...
Thank you for your interest in Exterro’s webcast! Attendees of the webinar heard from legal professionals on how to overcome PRR challenges, including best practices for effectively managing PRR's at your organization, process improvements that can make an immediate impact on responding quickly to PRR's, and ...
In this webinar, attendees learned how WEKA and Dell come together to provide:
High performance and low ...
Our webinar on June 29th explored how public sector organizations can modernize the way they manage IT spend and capital planning.
During this session, you learned how federal offices can use the powerful NOW platform to:
Reduce compliance ...
Attendees of this webinar joined Eclypsium for a discussion around digital supply chain threats, risks, and the hidden challenges that organizations are facing in safeguarding their device supply chains.
Some key highlights from this discussion were:
The role of ...
At this demo desk, we discussed the following key capabilities of Forescout eyeInspect in-depth:
Providing in-depth device visibility for OT / ICS networks and the enablement of effective, real-time management of operational and cyber risks
Improvement of cyber-resiliency of ...
Attendees who joined us learned about how Slack allows emergency responders to anticipate, monitor, and manage incidents for natural disasters, humanitarian crises, and other emergencies. They also had the opportunity to understand how Slack can speed up emergency response times by creating one centralized connected ...
Network automation is critical to support the increasing application and workload needs of the U.S. Department of Defense (DoD). Red Hat Ansible, a foundation for building and operating IT automation at scale, provides improved control over and visibility into network resources, bringing real-time decision-making ...
Thales TCT’s Luna T-Series Hardware Security Modules (HSMs) can be deployed either in the cloud as-a-service, on-premises or across hybrid environments. With so many options available, how do you choose the right HSM for your needs?
In this installment of our CTO Sessions Webcast Series, we ...
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024.
To get there, they must navigate through the General ...