Leveraging Open Source Technologies for FOIA
How Alfresco and Other Open Source Technologies Can Work Together to Solve Government Business Problems Managing the vast quantities of information government entities need has become incredibly challenging. When the Freedom of Information Act was enacted in 1966, no one considered the vast quantity of information that would need to be accessed or the complexity of keeping private data private, while making public data accessible. Legacy conte...
Security and Access Control in the Virt...
Server virtualization promotes flexible utilization of IT resources, reduced capital costs, high-energy efficiency, high-available applications, and improved business continuity. However, virtualization also brings along with it a unique set of challenges around the management and security of the virtual infrastructure: How do you secure VMware across the enterprise? How do you protect your virtual infrastructure? How do you control privileged...
Adobe Day for Local DC Systems Integrators
Moving Towards eLearning & Virtual Collaboration to Satisfy Internal Projects or Federal Client's R&D Join Adobe Systems and Carahsoft Technology for a half-day seminar and learn how the industry’s top-ranked web communication software, Adobe Connect, can reach thousands of users around the world with its powerful functionalities as a virtual training and collaboration tool. Today, many federal agencies and government contractors...
Online: What's Next for Adobe ColdFusio...
You are cordially invited to attend a complimentary eSeminar focusing on the future of Adobe ColdFusion and what's coming next. Join Carahsoft, Fig Leaf Software, and the Adobe ColdFusion team to discuss Zeus and Twister, the next version of ColdFusion. Discover how Zeus will accelerate ColdFusion application development, making your organization more efficient than ever before! While this event is taking place in Arlington, join us live onlin...
Embrace the Latest Mobile Device Platfo...
Leveraging the power of mobile computing platforms can allow government agencies to securely deliver containerized messaging and business applications while meeting current mobile security policies, requirements, and best practices for regulated data. Whether the focus is citizen, public safety, HIPPA-regulated, or other sensitive information, agencies can securely access, interact with, and leverage data on a broad range of modern computing p...
Exposing the Recent Flood of Targeted Attacks
In the last several months we have monitored an apparent surge in targeted attacks against government agencies. Cybercriminals have shifted the way they target agencies, abandoning large-scale, generalized attacks in favor of more targeted, dynamic techniques with bigger payoffs, including spear-phishing and “whaling”. Because targeted cybercrime is so profitable, perpetrators are highly motivated to find new ways to gather sensiti...
How Strategic Sourcing's Enterprise Sof...
Here’s your chance to hear the contract facts from someone in your own agency! Shantelle Coleman Branch Manager, DHS – Office of the CIO, will be discussing how you can quickly plan, procure, and deploy your agency’s virtualization and cloud solutions through the recently established DHS | VMware BPA (contract # HSHQDC-11-A-00041). Join us as we reveal how DHS’ Strategic Sourcing’s Enterprise Software Solutions ca...
Boeing Twister Data Framework: A Data I...
Whether your organization is moving towards data consolidation or maintaining all data in a federated environment, a data management framework must be put in place to enable information sharing and collaboration. Please join us to learn more about the Boeing Twister Data Framework, a leading data integration platform for rapid ETL processing and multi domain, federated queries on almost any type of data.Customer uses for Twister Data Framework...
Local Administrator Accounts- What are...
In every organization there exists a somewhat buried but very dangerous loophole: the presence of local administrator accounts. Local administrator accounts are often times created directly by users and are hidden from the IT manager’s standard tracked list of administrative accounts managed by Active Directory. These accounts can be used by malware to install malicious software on local computers through the administrator account. Furth...
Top Ten Reasons Why Symantec is Your #1...
With the increase in data growth and the trend of virtualization, it is important to ensure your environment has the "best in backup." Symantec has answered the call and modernized backup recovery with NetBackup 7.5. This solution simplifies virtual recovery and increases storage efficiency while you virtualize mission critical applications. Join Symantec and Carahsoft to learn about the Top Ten Reasons to choose Symantec Backup for your VMwar...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.