VMware Mirage: Managing Mobile Infrastructure
Is your agency looking for the manageability benefits of virtual desktop infrastructure, but for physical desktops and laptops or unmanaged virtual machines? VMware delivers a unique solution to federal agencies for managing laptops and desktops centrally, while providing full local functionality for end users. Mirage installs directly into Windows, and it centralizes a complete virtual copy of that end point to the datacenter to keep it synch...
Collecting, Searching, and Analyzing Ma...
How you manage the access and analysis of your logs, as well as other machine data, can affect the speed you are able to search and analyze this data to troubleshoot issues and investigate security threats.Join us to learn how the Administrative Office of U.S. Courts is addressing these questions and using Splunk software to gain operational insight from all their machine data.Diane Davis, Chief of Judiciary Security Operations Center, will be...
Big Data and the Future State of Hyper-...
Learn about one of the world’s most evolved cyber threat centers and how they address the challenges posed by a staggering and exponentially increasing volume of data flowing from over 200 million customer accounts in 140 countries. Tom Minichillo, Director of Citigroup’s Cyber Intelligence Center, uses advanced techniques and technology, such as entity linking and data visualization, to create actionable intelligence for his Citig...
Intelligent Image and Full Motion Video...
Image and full motion video content are among the fastest growing digital assets for government and commercial enterprises, yet over 95% of this content, particularly full motion video containing critical information, goes unviewed and unexploited. While a range of advanced tools exist to support text and web-based data search and analysis, government and commercial enterprises currently have no viable solution for indexing and searching image...
Connect with Carahsoft and Kofax in Was...
Bringing the latest in mobile capture applications, Kofax Capture Enabled BPMTM and analyst insights, Kofax invites you to a Customer Connect event on December 4th in Washington, D.C. Kofax Connect is for senior executives, IT professionals, and line-of-business managers such as finance, customer service, and sales. We will preview the latest solutions including a mobile mortgage application, show live demonstrations, and share valuable insigh...
FedCyber.com Cyber Security Summit
Confronting the Next Generation of Cyber Security Challenges and Opportunities The Second Annual FedCyber.com Cyber Security Summit provides a venue for our nation's most seasoned cyber security practitioners to come together to work issues of common concern. Join us for this year's summit, which will be held November 15, 2012 at the Ronald Reagan Building in Washington, DC. Matt Devost and Bob Gourley will moderate the event and facilitate di...
Building the Business Case for Private...
Although OMB's Cloud-First mandate requires federal agencies to increase the adoption of cloud computing, building a strong business case for a cloud project is still essential to receiving the investment required for that transformation. If you can't establish quantifiable objectives up front, you may never get the approval required to get your private cloud off the ground and implemented enterprise-wide. Please join us for this live webcast...
Solving Big Data Analytics for the Gove...
Attend this Webinar to Learn About MongoDB-Based Big Data Analytics Solution available to the Federal Government including a Demonstration involving Cyber Event Analysis. Join us to learn about the first complete MongoDB-based big data analytics solution. The solution combines Pentaho’s high-productivity visual interfaces for data integration, reporting, visualization, exploration and predictive analytics with MongoDB, a scalable, high-p...
F5 Gov TechTalk
Operational Security Architectures:Defend Your Agency and Securely Deliver Your Applications In order to combat the threat of hacktivist groups and other malicious actors, targeted organizations need to be able to detect and proactively apply countermeasures that are not only part of their tactical incident response capability, but are also enforced by their operational security architecture. These advanced solutions help defend targeted organ...
Andy Greenberg Breakfast Seminar
Registration has opened for the HP Enterprise Security Breakfast Seminar featuring special guest, Andy Greenberg, author of This Machine Kills Secrets. His 2010 Forbes cover article on Assange—the first of its kind—earned Greenberg further credibility within the hacker community, and the following year, he was entrusted with an invite to the Chaos Communications Camp conference in Berlin to witness the inside politics of the very s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.