What You Need to Know About New Attacks...
For the first time, the Ponemon Institute has quantified the staggering costs of malicious attacks and criminal exploits on failed key and certificate management. Consensus from the RSA Conference 2013 was that PKI (public key infrastructure) is under attack and criminals are threatening our reliance on keys and certificates to establish trust in our infrastructure, data, cloud services, and mobile devices. The first installment in a series of...
SAP Public Sector Partner Exchange West
The time has come for the first-ever SAP Public Sector Partner Exchange West. This years event will be held on Tuesday, April 2nd, 2013. Join us for this unique opportunity for strategic channel partners to learn tips and best practices that will help increase the velocity of your Public Sector sales. This event will include an afternoon of highly relevant sales content, technical information, marketing techniques, and networking all delivered...
Social Networks as Unified Communication
Social Networks as Unified CommunicationEnabling Security and Compliance for the Federal Government The use of social networks is now allowed in the federal agency enterprise for public engagement, interagency collaboration, and federated communication. Hundreds of thousands of users have access to read and write on Facebook, Twitter, Skype, LinkedIn, wikis, blogs, etc. But today there is little to no information assurance, data leakage preven...
Applying Executive Order on Cyber Secur...
The recent Presidential Executive Order brings to light the need to protect critical data that runs our nation. This not only includes military or intelligence data, but also key data that runs and shapes our federal government and affects the lives of our citizens on a daily basis. This critical data has long been sought after by our adversaries and continues to be penetrated through Advanced Persistent Threats (APT). The Presidential Executi...
Good Technology: Transform How Mobile W...
You know what keeps your customers up at night. In many cases, these thoughts are a matter of national security involving data leakage from mobile devices. Join Good Technology and Carahsoft for a complimentary webcast as we address the most important factor in mobile security - data loss prevention. Attend this webcast to learn how you can partner with Good and Carahsoft to offer solutions that allow enterprises and government agencies secure...
Real-Time TV and Radio Monitoring Service
TVEyes is an internet-based tool for managing broadcast TV and radio coverage. The technology actively scans TV stations and radio broadcasts, and creates email alerts based on a predetermined set of keywords mentioned within the broadcast. Users can then view the segments in real-time, and instantly share those results with unlimited recipients. Join us for a complimentary webcast to learn about the advantages of using the TVEyes Media Monito...
VMware Mirage: Managing Mobile Infrastructure
Is your agency looking for the manageability benefits of virtual desktop infrastructure, but for physical desktops and laptops or unmanaged virtual machines? VMware delivers a unique solution to federal agencies for managing laptops and desktops centrally, while providing full local functionality for end users. Mirage installs directly into Windows, and it centralizes a complete virtual copy of that end point to the datacenter to keep it synch...
Streamline Multi-INT Analysis
Thetus Corporation would like you to join us for a webinar highlighting Savanna’s newest capabilities for dealing with dynamic analytical challenges around counter-narcotics, counterterrorism, and homeland security. Attendees of this webcast will learn how Savanna helps users to: Connect and organize disparate systems and processes Contextualize and fuse information to visualize problems Develop, reuse, and share knowledge assets for com...
Managing More with Less: Identity Lifec...
Today, state and local agency IT personnel are set with challenging directives to provide increased resources including Google Apps, Office365, and Educator Collaboration to an ever increasing user population. With the constraint of shrinking budgets without sign of relief, these issues need to be managed and resolved in the most efficient way possible. Identity and access management began primarily as a tool for large corporate enterprises to...
The New Way to Work: Social Intranet
To remain relevant and improve service levels in the face of substantial across-the-board budget and personnel cuts, state agencies require a new way to work. Today’s operational tempo is simply too great for the same old approach with business-as-usual collaboration tools. Many 2.0 social tools have fallen dramatically short and have left most agencies with aFrankenSocial monster to contend with. Now is the time to migrate to a more eff...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.