Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not ...
Event Date: October 07, 2020 Hosted By: Salesforce
The Nevada Department of Health and Human Services (NV DHHS) built a naloxone Virtual Dispensary. This inventory management application on the Salesforce Platform that catalogs the amount of naloxone does available across the State's fire stations, EMT units, public libraries, and more. This platform gives the team the ...
Event Date: October 08, 2020 Hosted By: Google & Carahsoft
During this training, we will cover the following topics:GCP Administration Fundamentals: reviewing various services, reviewing billing and support cases, navigating the UI, IAM, etc.Running VMWare workloads natively on GCPApplication Modernization by deploying containerized apps into ...
More than 1,300 local, state and federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, prepopulated agreements, and automated approval processes.Join your peers and other leaders in ...
Event Date: October 08, 2020 Hosted By: BlackBerry & Carahsoft
Join BlackBerry and Carahsoft to learn how the preparations and choices you make before and during the underwriting process will lead to vastly different outcomes in the cost of your premiums. Stan Gatewood, a former Chief Information Security Officer will address this topic while ...
Event Date: October 08, 2020 Hosted By: CoreView & Carahsoft
Agencies who make the transition to Microsoft 365 need to quickly learn how to effectively manage their platform to keep productivity high and protect against internal and external threats. CoreView helps government organizations optimize their Microsoft 365 environment while ensuring their platform stays ...
Event Date: October 08, 2020 Hosted By: SailPoint & Carahsoft
In many government organizations, contracts are some of the hardest resources to govern. Their onboarding is delayed through suitability or clearance processes. They roll on and off projects daily. In many agencies, they have no single source of the truth for their information and require highly privileged access to ...
Event Date: October 08, 2020 Hosted By: Splunk & Carahsoft
Join Splunk & Carahsoft for a Splunk 101 session hosted by Splunk's SE team. This is a great opportunity for you to discover the value of Splunk. During this presentation we will go over an introduction to Splunk, use cases, and the Splunk Data-to-Everything platform. Attendees will also gain insight ...
Increased cyber threats and complex data compliance regulations are changing the way you
run your business. CyberConverged data security combines data storage, compliance, and
security into an easy to use integrated solution designed to meet these complex challenges
head on. It is the most effici...
Trust you can hold in your hand. Even the most isolated, air-gapped networks provide access to external devices. Any transient device, like a laptop, is a prime target for malicious attacks. MetaDefender Drive inspects devices before they enter a facility or its network—even before they boot up.
BrickStor SP’s CyberConverged™ features let you see exactly what
your data is doing, who is accessing it, and where it is stored. BrickStor SP makes it easy to protect and monitor your data while
ensuring that only those who should be using your data can leverage
The goal of this
checklist is to enable
validate their current
readiness state in the
event of a potential
and determine the
means to manage
efficiently during this
Sponsored by: Palo Alto NetworksOrganizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems,...
Trust at the point of entry. Anytime portable media accesses secure environments, critical infrastructure risks exposure. Software updates, reporting and audits all require external data sources. MetaDefender Kiosk acts as a digital security guard—inspecting all media for malware, vulnerabilities...