Back to Search Begin New Search Save Search Auto-Notify
Optimize, Accelerate, and Secure VDI to...
Explore solutions that enhance the performance of VDI over the WAN, while dramatically simplifying operational complexities. Learn about this approach that eliminates the need for point solutions by providing granular, policy-based, and context-aware access, and support for strong multi-factor authentication. Join F5 Networks and Carahsoft for a complimentary webcast that will cover the following: Building a scalable and extensible VDI Securin...
November 18, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
The Value of Data in Transforming the W...
Big Data is changing the way we see the world around us and improving the quality of and speed at which we can make decisions. What kind of data is available to support real estate and space management decisions? What answers can utilization and occupancy data provide? How is this data being used to change the workplace and related strategy? View this on demand webinar to learn about the specific tools being used today, what they are revealing...
November 18, 2014
Organizer: AgilQuest Corporation
Location: Webcast
Add Favorite
Internet Of Things For Defense & Nation...
By 2020, an estimated 30-50 billion devices will be connected to the internet. Each of these devices will collect and communicate massive amounts of data, and as these devices become more sophisticated they are incorporating the ability to analyze the data and plan, manage and make intelligent decisions autonomously about sharing that information via embedded machine-to-machine communications with other internet-capable devices. DoD, to some e...
November 13-14, 2014
Organizer: Technology Training Corporation
Location: Arlington, VA
Add Favorite
Mining Anomalies to Secure Operational...
Securing networks increasingly requires the ability to collect, process, and understand large, continuous streams of network data. Three of the biggest challenges in securing networks are: (1) mining streams of event logs and network traffic to extract actionable information about the state of the network; (2) adjusting policies and configurations in response to changing conditions and threats;(3) having some assurance that the resulting netwo...
November 13, 2014
Organizer: Skytree Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
F5 for State and Local Government - Cov...
Protecting Web Applications and Sensitive Data in the Face of Evolving Security Threats In today’s complex security environment, the vast majority of attacks are exploiting vulnerabilities within applications at layers 4-7. Interestingly, the vast majority of security capital expenditures are being spent to strengthen the network at layers 2-4. These solutions often have some visibility and signatures at layer 7, but they lack the applic...
November 13, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Mitigating DDoS Attacks in Education, G...
As the magnitude of the distributed denial-of-service (DDoS) threat spectrum continues to evolve, K-12 and higher education IT departments, government, and healthcare continue to search for the best way to protect applications and data from increasingly sophisticated, well-coordinated attacks. The solution is a strategy that focuses on blocking such attacks, while also ensuring valid users have access to network and application resources. Joi...
November 12, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Maintain Control of Your Applications
JIE/JRSS Alignment Secure Your Resources, Simplify Authentication, and Consolidate Infrastructure in a Joint Environment - While Maintaining Command and Control of Your Applications Authentication, application security, remote access, and application portability (IPN, milCLOUD, CDC’s, public cloud) are challenges when preparing an environment to support consolidation, Joint Information Environment efforts, and coalition/mission partner u...
November 12, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Scott Air Force Base, IL
Add Favorite
F5 Air Force TechTalk
JIE/JRSS Alignment Secure Your Resources, Simplify Authentication, and Consolidate Infrastructure in a Joint Environment - While Maintaining Command and Control of Your Applications Authentication, application security, remote access, and application portability (IPN, milCLOUD, CDC’s, public cloud) are challenges when preparing an environment to support consolidation, Joint Information Environment efforts, and coalition/mission partner u...
November 12, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Quantum invites you to opening day of I...
I N T E R S T E L L A R brings science fiction and space travel to the big screen with an all-star cast and a noble goal: to save humanity.Being science fiction fans, the team at Quantum is proud to invite you to this exclusive movie premiere event for IT professionals. Before the movie, you'll hear briefly how we are committed to help our customers change the world, every day.Quantum is a leading expert in scale-out storage, archive and data...
November 7, 2014
Organizer: Quantum Corporation
Location: McLean, VA
Add Favorite
Transform Your Organization with the Sa...
Transform Your Organization with the Salesforce1 Platform Mobile Application The Salesforce1 Platform brings the power of the world's highest rated Cloud Development Platform to your fingertips. Quickly build and deploy mobile apps with clicks. Use our mobile services and SDKs to connect to virtually any back-office system to instantly connect with your employees, partners and data. The Salesforce1 Mobile Application is integrated with the Goo...
November 6, 2014
Organizer: Salesforce Government Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
Back to Search Begin New Search