Capture Enabled Business Process Management
Automate the process of capturing information With the vast amount of incoming information that organizations deal with from many different sources, efficient and automated business processes are critical to managing it and improving productivity. Business Process Management (BPM) and case management can transform how agencies provide services to their constituents through information capture technology and dynamic case management. Join us for...
Securing Your Infrastructure While Secu...
The United States Marine Corps. and Department of Defense are looking for opportunities to carve out costs and "do more without more" while staying vigilant about security and threats to the network. Red Hat Enterprise Open Source products provide a cost effective, security first approach to building IT platforms from garrison to the tactical edge. Please join Carahsoft, August Schell and Red Hat for a complimentary webcast focusing on how Red...
Secure Windows 7 (and 8) Deployments wi...
Research shows that when user accounts run with administrator rights, there are higher costs for IT due to the end users’ ability to modify system settings and install unapproved software. There is also serious security risk when end users have administrative accounts that can result in serious financial and operation risk. Simply removing users from the administrators group incurs the similar costs in supporting end users requests. Ther...
Defense Connect Online is Going Mobile!
Communicate, Collaborate and Demonstrate Anytime, Anywhere Using Your Mobile Device Defense Connect Online, the DoD's preferred collaboration program for meetings, training sessions, and telework, is now available on your mobile device. The ability to effectively collaborate at a moment’s notice is a game changer for DCO Connect. Whether you are teleworking, travelling or supporting a disaster recovery effort, being connected to your tea...
Defending Against External Cyber Attack...
Defending Against External Cyber Attacks and the Insider Threat: How Web Behavior Analysis Is Changing Online Security Silver Tail Systems stops cyber attacks on web sites in real-time using Web Session Intelligence, combating external attacks, insider threats, and stopping fraud.Web behavior analysis has become a key component of defending online properties like banks, benefits, e-commerce, and research sites from attacks. A 2010 study by Pew...
Top Ten Reasons Why Symantec is Your #1...
Wouldn’t it be great if you could get unified physical and virtual backups with one product? How about a product with integrated disaster recovery, data deduplication, and replication technology? With Symantec’s Backup Exec 2012 data protection platform, and integrated V-Ray technology you can. Join Symantec and Carahsoft for a complimentary webcast and we’ll show you how Backup Exec simplifies backups across scattered enviro...
TerraGo v.6 Publisher for ArcGIS Webcas...
TerraGo® Technologies will soon release its much-anticipated v.6 PublisherTM for ArcGIS® software that uniquely allows ESRI users to extend, exchange, and exploit their geospatial assets by producing portable, intelligent and interactive TerraGo GeoPDF® maps and imagery. Is your organization ready to benefit from the unprecedented geospatial collaboration capabilities of Publisher for ArcGIS? On May 15, join Carahsoft and TerraGo f...
Federal Mobile Security Breakfast
Join Imation Mobile Security and Carahsoft for a complimentary Federal Mobile Security Breakfast in Washington, D.C to discuss emerging technology solutions designed to help mitigate the risks facing the federal government in the mobile environment. Discussion topics will include: Current threatscape Secure mobility and telework Emerging user authentication solutions Agenda: 7:30am - 8:15am Registration and Breakfast 8:15am - 9:30am Introducti...
Accelerate Your Desktop Transformation...
Any successful desktop transformation project needs a solid execution plan that factors in key initiatives such as enterprise-wide desktop virtualization, BYOD (bring your own device), Windows 7 migrations, and the shift to telework within government agencies. Strategic-thinking IT teams are approaching desktop transformation with the goals to enhance user experience and productivity, simplify desktop delivery and management, and lower overall...
An Introduction to MotionDSP’s Ikena: A...
Extracting evidence from video is a time-consuming process. Video from security systems is hard to play, and video evidence, whether from a cell phone or surveillance video, is invariably of poor quality, suffering from issues like low resolution, poor lighting, noise, and shake. Current forensic tools are complicated, difficult to learn, and require hours to get results.Ikena, MotionDSP's forensic video enhancement software for Windows, has b...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.