̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

VMwarebyBroadcomLogo.png
VMware

VMware Cloud Foundation Hands on Workshop


Event Date: January 23, 2023
Hosted By: VMware, Sterling & ̽»¨ÊÓÆµ
Location: Reston, VA
VMware Cloud Foundation (VCF) is the industry-leading software, custom-designed to manage and operate datacenters. Whether it's for Kubernetes, automation, or manageability, VCF is the best way to modernize your infrastructure without the uphill battle of learning an entirely new platform.

Attendees joined VMware, Sterling, and ̽»¨ÊÓÆµ for an in-person, hands on workshop where subject-matter experts discussed:
  • VMware Cloud Foundation (VCF) and how it fits directly into your compliant hardware infrastructure
  • The rise and proliferation of the software defined data center (SDDC), and how SDDC will future proof the data center
  • How VCF, when combined with VMware vSphere, VMware NSX, VMware vSAN, VMware vRealize Suite, and VMware Tanzu can enable enterprise-wide standards and automation
  • How to use our suite of VMware management products through a user-friendly dashboard designed to give you complete visibility of your hardware and software suite

Fill out the form below to view this archived event.


Resources


Elastic Global Threat Report Vol.1 2022
Resources

Elastic Global Threat Report Vol.1 2022

In Elastic Security Labs' inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a broad set of telemetry data.

From this threat report, you'll come away with an understanding of how to prevent cybersecurity threats through visibility, capability, and expertise — all while joining Elastic in its mission to normalize an open approach to security. Key highlights you don’t want to miss:

  • Nearly 41% of credential access alerts attempted to steal application access tokens versus other credentialed materials
  • A combined 72% of all defense evasion techniques consisted of masquerading and system binary proxy execution
  • CobaltStrike was the most popular malicious binary or payload for Windows endpoints with ~35% of all detections

Fill out the form below to view this Resource.