Back to Search Begin New Search Save Search Auto-Notify
Satisfying Privacy Requirements in a So...
To a social engineer intent on extracting data, the modern office reads like an open book. Over-the-shoulder reconnaissance reveals what is available, where it is, and who has access to it – all the ingredients an adversary needs to succeed at a data breach. Organizations that focus exclusively on network security may keep out external attackers, but that’s not enough to prevent insider-driven breaches. Studies of security breaches...
June 21, 2012
Organizer: Oculis Labs Govt at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Make Sense of Social Media with InTTENS...
Over 2.1 billion internet users now have a voice through social media. There are 300-500 million tweets that go through Twitter each day, 800 million active Facebook users, and over 75 million discussion boards and online forums exist. If your organization is struggling to aggregate all this content and handle the immense volume of social media, then it is important for you to learn how to make sense of and better interact with social media us...
June 20, 2012
Organizer: InTTENSITY Govt at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Accelerate Business Services in the Cloud
Providing Agility and Mission Velocity at Light Speed While the primary motivation for cloud computing among government agencies is cost reduction, the larger discussion should be about using this new paradigm to accelerate your mission and provide services at light speed. If you are considering using the cloud, one fundamental question you should ask is how fast your cloud can move. The answer depends on how the cloud is built and whether it...
June 19, 2012
Organizer: Nicira Government at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Combatting Advanced Persistent Threats:...
Years ago, the U.S. Air Force coined the term "Advanced Persistent Threats" (APTs). Today, it is becoming one of the most talked about, inconsistently defined, and abused terms in security. Yet APTs are real threats that federal government and enterprise IT teams must combat because their sophisticated attacks have serious consequences. Please join Daniel Teal, founder and CTO of CoreTrace, and a former information warfare officer at the Air F...
June 19, 2012
Organizer: CoreTrace Government at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Manage Applications with Ease and Mitig...
Session 1:Date: Wednesday, June 13, 2012Time: 2pm Eastern; 11am PacificDuration: 1 HourSession 2:Date: Thursday, June 14, 2012Time: 2pm Eastern; 11am PacificDuration: 1 Hour Session 1: Performance Testing and Monitoring Join this one-hour webinar to learn how to uncover subtle performance issues in your web-based application using HP LoadRunner and SiteScope. The challenges of creating actionable results that show end-user response time correl...
June 14, 2012
Organizer: HP Software Govt at Carahsoft Technology Corp.
Location: Washington, DC
Add Favorite
Securely Connecting Health Communities...
What to know and how to start... A soldier will receive medical attention from many military hospitals and clinics throughout his or her career. Meanwhile, family members back home may be treated for injuries or illnesses by their local physicians. With treatment received by many different healthcare providers over the course of several years, how will each family member’s health records be accurately maintained and protected? Will they...
June 13, 2012
Organizer: Axway Federal at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Manage Applications with Ease and Mitig...
Session 1:Date: Wednesday, June 13, 2012Time: 2pm Eastern; 11am PacificDuration: 1 HourSession 2:Date: Thursday, June 14, 2012Time: 2pm Eastern; 11am PacificDuration: 1 Hour Session 1: Performance Testing and Monitoring Join this one-hour webinar to learn how to uncover subtle performance issues in your web-based application using HP LoadRunner and SiteScope. The challenges of creating actionable results that show end-user response time correl...
June 13, 2012
Organizer: HP Software Govt at Carahsoft Technology Corp.
Location: Washington, DC
Add Favorite
Protect Access to Cloud-Based Applicati...
Multi-factor authentication – whether through the use of one-time password (OTP) tokens, certificates, USB tokens, or smart cards – has grown increasingly critical as organizations look to secure remote users’ access to sensitive data. As enterprises move increasingly strategic services to the cloud, security teams will need to leverage centralized mechanisms that accommodate both traditional remote access scenarios and cloud...
June 13, 2012
Organizer: SafeNet Government at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Second Annual Citizen Engagement Seminar
This year's citizen engagement seminar promises to continue the discussion on the power of citizens' online experience while delivering new and exciting insights into how agencies are overcoming communication challenges.Join us on Tuesday, June 12th from 8am - 2pm at the Grand Hyatt in Washington, DC to learn how Carahsoft's Citizen Engagement Solutions can help your organization: Analyze current websites and how citizens interact with, and ex...
June 12, 2012
Organizer: Carahsoft Technology Corp.
Location: Washington, DC
Add Favorite
Backup and Recovery Solutions Optimized...
EMC Webcast:Backup and Recovery Solutions Optimized for VMware Virtualization gives IT the flexibility to address the unique challenges presented by mission-critical applications and data growth. To harness the benefits of this dynamic computing environment while providing reliable data protection, you need a backup-and-recovery solution that is optimized for VMware. Traditional backup and recovery can't keep up with the increased demands of v...
June 12, 2012
Organizer: EMC Government Team at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Back to Search Begin New Search