Combatting Advanced Persistent Threats:...
Years ago, the U.S. Air Force coined the term "Advanced Persistent Threats" (APTs). Today, it is becoming one of the most talked about, inconsistently defined, and abused terms in security. Yet APTs are real threats that federal government and enterprise IT teams must combat because their sophisticated attacks have serious consequences. Please join Daniel Teal, founder and CTO of CoreTrace, and a former information warfare officer at the Air F...
Manage Applications with Ease and Mitig...
Session 1:Date: Wednesday, June 13, 2012Time: 2pm Eastern; 11am PacificDuration: 1 HourSession 2:Date: Thursday, June 14, 2012Time: 2pm Eastern; 11am PacificDuration: 1 Hour Session 1: Performance Testing and Monitoring Join this one-hour webinar to learn how to uncover subtle performance issues in your web-based application using HP LoadRunner and SiteScope. The challenges of creating actionable results that show end-user response time correl...
Securely Connecting Health Communities...
What to know and how to start... A soldier will receive medical attention from many military hospitals and clinics throughout his or her career. Meanwhile, family members back home may be treated for injuries or illnesses by their local physicians. With treatment received by many different healthcare providers over the course of several years, how will each family member’s health records be accurately maintained and protected? Will they...
Manage Applications with Ease and Mitig...
Session 1:Date: Wednesday, June 13, 2012Time: 2pm Eastern; 11am PacificDuration: 1 HourSession 2:Date: Thursday, June 14, 2012Time: 2pm Eastern; 11am PacificDuration: 1 Hour Session 1: Performance Testing and Monitoring Join this one-hour webinar to learn how to uncover subtle performance issues in your web-based application using HP LoadRunner and SiteScope. The challenges of creating actionable results that show end-user response time correl...
Protect Access to Cloud-Based Applicati...
Multi-factor authentication – whether through the use of one-time password (OTP) tokens, certificates, USB tokens, or smart cards – has grown increasingly critical as organizations look to secure remote users’ access to sensitive data. As enterprises move increasingly strategic services to the cloud, security teams will need to leverage centralized mechanisms that accommodate both traditional remote access scenarios and cloud...
Second Annual Citizen Engagement Seminar
This year's citizen engagement seminar promises to continue the discussion on the power of citizens' online experience while delivering new and exciting insights into how agencies are overcoming communication challenges.Join us on Tuesday, June 12th from 8am - 2pm at the Grand Hyatt in Washington, DC to learn how Carahsoft's Citizen Engagement Solutions can help your organization: Analyze current websites and how citizens interact with, and ex...
Backup and Recovery Solutions Optimized...
EMC Webcast:Backup and Recovery Solutions Optimized for VMware Virtualization gives IT the flexibility to address the unique challenges presented by mission-critical applications and data growth. To harness the benefits of this dynamic computing environment while providing reliable data protection, you need a backup-and-recovery solution that is optimized for VMware. Traditional backup and recovery can't keep up with the increased demands of v...
Boeing Twister Data Framework: A Data I...
Whether your organization is moving towards data consolidation or maintaining all data in a federated environment, a data management framework must be put in place to enable information sharing and collaboration. Please join us to learn more about the Boeing Twister Data Framework, a leading data integration platform for rapid ETL processing and multi domain, federated queries on almost any type of data.Customer uses for Twister Data Framework...
Beyond .GOV - Building a Winning Web St...
The web is changing. In fact, what most organizations traditionally viewed as their "web site" has been re-defined to include all the different ways and places audiences find and consume content. From the proliferation of fragmented mobile devices to the massive growth of social media destinations, government agencies now are challenged with reaching a much larger footprint with fewer resources and less time. Join us for an informative webcast...
F5 Government Technology Symposium
The F5 Government Technology Symposium will outline and showcase the steps federal agencies should take to create agile, secure, and scalable IT infrastructures that align with changing missions and constituent needs. While attending you will have the benefit of meeting with your peers and hear technology experts discuss strategies for: Accelerating application delivery and optimization Preventing network attacks Ensuring secure, high-performa...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.