Attain Network Security for the Unknown...
Do you know what IT security threats are trying to get into your organization, or even worse, are already inside? Do you need to speed up security investigations from days to seconds? Today's security teams are being strained to the limit, doing more with less while defending against threats that are more numerous, advanced, and difficult to detect.Splunk software captures and monitors security and “non-security” machine data in re...
GovDelivery 2013 Digital Communications Tour
We’re bringing digital communication experts to you in 2013. If you’re interested in communications, digital government, and leveraging technology to serve your citizens and stakeholders, keep an eye out for upcoming events in your area. Events are free for all government employees. Hear from public sector experts, providing insightful perspectives and strategies on government communications, and from your peers in government on th...
F5 USMC TechTalk
F5 USMC TechTalk:Secure Your Applications, Simplify Authentication, and Optimize Critical Systems Whether you have legacy or enterprise applications, authentication, application security, and high performance are a challenge to supporting an agency's enterprise and its customers. F5 improves application performance and simplifies enterprise architecture, while reducing the total cost of ownership of your solution.Join F5, Dell, and Carahsoft t...
Surviving DDoS Attacks
Solutions That Can Help Protect from the Increasing Frequency, Scale, and Sophistication of Web Attacks In the last week the largest publicly announced attack in Internet history occurred when Spamhaus, an organization which identifies and tracks spam senders and services, was hit with a huge wave of digital traffic that took down their website. This event highlights the need for enterprise organizations to protect their DNS infrastructure fro...
Third Annual Government Big Data Forum
Big Data in the Age of Analytics: From Infrastructure to Sensemaking Due to inclement weather forecast for Washington, DC, this event has been postponed until April 4, 2013. The concept of big data has come a long way in the past three years. Our first forum focused on enhancing a growing community, while last year’s focused on sharing initial lessons learned and an exchange of best practices around data. This year's third annual Governm...
Transforming Legacy Applications - Is t...
With the release of the 2013 National Defense Authorization Act, government agencies and departments are tasked with the mission of identifying and updating expensive legacy applications into more efficient and usable technologies. Such transformation may involve transitioning to composite applications, introducing thin clients, VDI and migrating to the cloud or even developing mobile applications. While these upgrades are necessary to keep pa...
GovDelivery 2013 Digital Communications Tour
We’re bringing digital communication experts to you in 2013. If you’re interested in communications, digital government, and leveraging technology to serve your citizens and stakeholders, keep an eye out for upcoming events in your area. Events are free for all government employees. Hear from public sector experts, providing insightful perspectives and strategies on government communications, and from your peers in government on th...
What You Need to Know About New Attacks...
For the first time, the Ponemon Institute has quantified the staggering costs of malicious attacks and criminal exploits on failed key and certificate management. Consensus from the RSA Conference 2013 was that PKI (public key infrastructure) is under attack and criminals are threatening our reliance on keys and certificates to establish trust in our infrastructure, data, cloud services, and mobile devices. The first installment in a series of...
SAP Public Sector Partner Exchange West
The time has come for the first-ever SAP Public Sector Partner Exchange West. This years event will be held on Tuesday, April 2nd, 2013. Join us for this unique opportunity for strategic channel partners to learn tips and best practices that will help increase the velocity of your Public Sector sales. This event will include an afternoon of highly relevant sales content, technical information, marketing techniques, and networking all delivered...
Social Networks as Unified Communication
Social Networks as Unified CommunicationEnabling Security and Compliance for the Federal Government The use of social networks is now allowed in the federal agency enterprise for public engagement, interagency collaboration, and federated communication. Hundreds of thousands of users have access to read and write on Facebook, Twitter, Skype, LinkedIn, wikis, blogs, etc. But today there is little to no information assurance, data leakage preven...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.