Back to Search Begin New Search Save Search Auto-Notify
Campus Tech Leadership Summit: Digital...
Technology, data, innovation, cultural change - all are essential elements in the complex process that is digital transformation in higher education. And they all share a singular focus: furthering the institutional mission of teaching and learning. At this single-day event, education and IT leaders will offer practical insights and resources to help your institution navigate the many facets of DX, tap into funding opportunities to support dig...
Add Favorite
Securing Software Factories for the Dep...
Security remains a major concern for government agencies as they adopt cloud technologies and develop applications. The Department of Homeland Security (DHS) needs a simple approach to solution delivery that incorporates security into the DevOps lifecycle.Join Brandon Cox, Staff Solutions Architect at Red Hat, and learn how security tools can be integrated to release software safely and repeatedly across all phases of the application lifecycle...
Add Favorite
Securing Your Environment with Automation
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn't require a massive acquisition of new technologies.Red Hat has the resources to help you understand current threat environments and why security automation practices are necessar...
Add Favorite
Hardening the Cyber Quiver
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined guidance, we must evolve to meet the demands of cybersecurity while embracing Zero Trust and the enablers of secure infrastructures, continuous monitor...
Add Favorite
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
Add Favorite
What's New in OpenShift 4.10?
Evolving technical demands and resource constraints are spurring public sector teams to embrace innovative solutions that support IT modernization, at scale.Red Hat OpenShift, an enterprise-ready Kubernetes container platform built for an open hybrid cloud strategy, provides your organization with a consistent application platform to manage hybrid cloud, MultiCloud and edge deployments.With each new iteration, OpenShift delivers unparalleled e...
Add Favorite
Accelerating Government Digitation: Upd...
Today, many public sector organizations are using dated applications to run their operations. In many cases, these applications are still critical, but not nearly as performant or cost-effective as they once were. As such, agency leaders are looking for ways to become faster and more agile so that they can continue to enable innovation, control costs, and provide new ways to consume information. How can agencies modernize the applications they...
Add Favorite
Automating Application Release Cycles f...
As the U.S. Air Force looks to streamline and accelerate operations, modernization has become a key initiative for mission critical success. An app-centric approach to application delivery helps to enable intelligent scaling at the point of a bottleneck, eliminating the need to scale infrastructure across the entire app.Join Red Hat and F5 experts and learn how to modernize networks to better meet end-user expectations for speed and scalabilit...
Add Favorite
Advanced Ansible Security and Compliance
Security attacks can be disarming, and manual responses to threats can prove inefficient and ineffective. Organizations that automate extensively are better prepared to prevent security incidents and business disruptions. Join our live virtual session on June 15th to explore innovative ways to automate while leveraging advanced features of Ansible to perform more complex tasks.
Add Favorite
Accelerating Government Digitization: S...
Although IT leaders understand the benefits of cloud computing, there is still apprehension in the transition process due to new, persistent, and evolving thread models and compliance requirements. As such, the Biden administration issued an executive order to help federal agencies establish a zero-trust framework and effectively secure their enterprise. What impact have these measures had on public sector cybersecurity strategies? During this...
Add Favorite
Back to Search Begin New Search