The Evolution of Service Request Manage...
New cloud-based software tools are helping IT managers of public sector agencies do more with less. These tools enable your staff to be more efficient and productive with out-of-the-box ITIL-based best practices and processes - from password resets and network access to new hire processing. They also allow end users the capability to initiate routine service requests via a self-service portal. Join us for a complimentary webcast as Mark Hodge,...
4th Annual Adobe Government Technology Summit
Save the Date!4th Annual Adobe Government Technology SummitAdobe and Carahsoft are pleased to announce the fourth annual Adobe Government Technology Summit on Tuesday, October 29th at the Grand Hyatt in Washington, DC! This year's event will feature sessions built towards enhancing Government's understanding of Adobe solutions towards agency projects and missions by featuring extended, more in-depth training sessions. Come join us to learn how...
How is the Health of Your Systems? Find...
With a myriad of siloed tools monitoring your application and infrastructure components, it's a challenge to find the root cause of issues impacting end-users. This results in increased resolution times, higher operational costs, increased inefficiencies, and lower user satisfaction. Join us for a webinar and live demo to see how Splunk enables your operations teams to troubleshoot, monitor, analyze, and optimize your applications and infrastr...
Proven Secure File Transfer Solutions w...
WEBCAST PREVIOUSLY SCHEDULED FOR 10/10/13 AT 2PM, HAS BEEN RESCHEDULED FOR 10/29/13 AT 11AM EASTERN. Recent events have demonstrated the vulnerability of government information, making it more important than ever to ensure the security of your agency’s data – especially in situations that require the transfer of sensitive files. Join us for this complimentary webcast as Globalscape and their recently acquired technology, TappIn, di...
Earn Significant Margins Making Secure...
BYOD is creating security challenges for all enterprise customers including government agencies, health care, and financial service providers. Providing your customers with a robust mobile file sharing solution is essential for organizations implementing BYOD and cloud computing initiatives. Accellion is an award-winning company that enables organizations to proactively secure, track, and manage their business content as it moves through the o...
See How Your IT System Measures Up with...
With a myriad of siloed tools monitoring your application and infrastructure components, it's a challenge to find the root cause of issues impacting end-users. This results in heightened resolution times, higher operational costs, increased inefficiencies, and lower user satisfaction. Join us for a webinar and live demo to see how Splunk enables your operations teams to troubleshoot, monitor, analyze, and optimize your applications and infrast...
Adobe Green Solutions Webcast Series: S...
Is your agency aware of the environmental impact of your purchases, and what your resulting footprint on the environment looks like? A heightened focus on environmental concerns along with numerous government initiatives are prompting many organizations to examine the green benefits of the technologies they deploy. Learn how to go green with Adobe and Carahsoft at our complimentary four part on-demand webcast series featuring solutions session...
CAUCUS IT Procurement Summit
Understand the Changing Face of Technology Procurement CAUCUS IT Procurement Summit October 24–25, 2013 • Orlando The CAUCUS IT Procurement Summit is a greatly anticipated annual event tailored specifically for the technology acquisition professional. Every year, the conference brings together top subject matter experts in technology procurement, strategic sourcing, and contract and vendor management. This peer-to-peer conference is...
Protecting Your PII from an APT via Dat...
Traditional perimeter security is failing. The risk caused by Advanced Persistent Threats (APTs) shows no sign of easing and every business is in its path. One of the richest data targets is the personally identifiable information that affects government personnel, contractors, and our citizens. One key ingredient of APTs is obtaining access to privileged user accounts. This fundamental flaw in distributed systems enables attackers to compromi...
Essentials to Writing an Effective Mobi...
Does your organization have a mobile device security policy in place? If not, you are putting your organization and data at risk. With over one hundred million smartphones and tablet computers invading the American enterprise, organizations must begin taking steps to protect themselves from legal issues and data loss associated with these devices. Join us for a complimentary webcast on mobile device security policies as we discuss the essentia...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.