̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Logo-redhat-color-375.png
Red Hat

Network Automation for EUCOM, AFRICOM & OCONUS


Event Date: June 29, 2023
Hosted By: Red Hat & ̽»¨ÊÓÆµ
Network automation is critical to support the increasing application and workload needs of the U.S. Department of Defense (DoD). Red Hat Ansible, a foundation for building and operating IT automation at scale, provides improved control over and visibility into network resources, bringing real-time decision-making capabilities to the warfighter.

EUCOM, AFRICOM & OCONUS colleagues attended a hands-on workshop participating in the application of Red Hat Ansible for managing and automating network operations to secure their IT environments.
 
Those that attended the event:
  • Learned how to use Red Hat Ansible to enable next-generation network operations with enterprise IT automation
  • Understood how to extend the use of enterprise IT automation across your agency's entire environment
  • Practiced and acquire the skills needed to implement Ansible in your agency
Improve your agency's infrastructure availability, staff productivity, network security and configuration compliance.

Fill out the form below to view this archived event.


Resources


Nutanix-Logo-microsite.png
Video

Improve Your Security Posture with Nutanix

2020 was an unforgettable year. A year of hardship, and grief, and of global, economic and social change. We’ve changed how and where we work, and adapted our strategies that drove growth and velocity of consuming cloud technologies. However, for those of us in the business of stopping breaches and protecting I.T. from cyber-attacks, change was seen in the frequency and acceleration of targeted attacks, 2020 being the most active year in recent memory.

Cyber predators have benefitted from the new normal of work from home, spurred on by easier access to sensitive data and networks, and the relative ease at which they can leverage sophisticated models of attack; with Zero Day exploits disseminated via supply chain attacks to deliver ransomware payloads in order to extract a heavy toll on organizations attempting to defend against such threats.

With the Executive Order on Improving the Nation's Cybersecurity, every Federal agency must adopt a Zero Trust Architecture (ZTA). ZTA implementation and compliance can be tricky and is continuous. IT Organizations must embrace a new mindset to how they build and secure systems in a ZTA. Nutanix has architected its OS and solutions with ZTA concepts baked into its fabric and has recommendations for government agencies on how to continue their digital transformation and comply with ZTA.

Join this session to focus on Zero Trust, the purpose behind it, real-world examples that you can leverage, what pitfalls to avoid, and how to accelerate your journey towards ZTA in a hybrid multicloud world.


Fill out the form below to view this Resource.