Back to Search Begin New Search Save Search Auto-Notify
F5 Gov TechTalk
Operational Security Architectures:Defend Your Agency and Securely Deliver Your Applications In order to combat the threat of hacktivist groups and other malicious actors, targeted organizations need to be able to detect and proactively apply countermeasures that are not only part of their tactical incident response capability, but are also enforced by their operational security architecture. These advanced solutions help defend targeted organ...
November 13, 2012
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Annapolis Junction, MD
Add Favorite
Grasping Global Encryption Controls Webinar
Grasping Global Encryption Controls Webinar Webinar Instructor:Felice Laird Wednesday, September 26, 2012 1:00 PM EDT Join us for a discussion of US and foreign export controls on products containing encryption technologies. This webinar will provide an update on US export controls on commercial encryption products, and will also cover controls on import, export and domestic use of products of major trading partners such as China, Russia, Isra...
September 26, 2012
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
USAG Vicenza Technology Expo
In partnership with the 509th Signal Battalion, we are proud to present the USAG Vicenza Military Community with the annual Technology Exposition taking place on Wednesday, 19 September 2012. This is an opportunity for the organizations and units supporting USAG Vicenza missions to see the latest in emerging technologies, network with industry experts, and share ideas and future goals. Attendees can view live demonstrations and presentations f...
September 19, 2012
Organizer: National Conference Services, Inc. (NCSI)
Location: Vicenza, IT
Add Favorite
Defense Systems Summit
Join DOD and senior military leaders for the second annual Defense Systems Summit. This year’s seminar will focus on CYBERDEFENSE: Counter Strategies for Heightened Threat Intensity. Sessions Include: - Military Cloud Computing and Security: Assessing the Risks - The Future of Tactical Communications - Understanding the State of the Art in Data Encryption Technology - Sharing Intel Under the Defense Intelligence Information Enterprise (D...
September 18, 2012
Organizer: 1105 Government Events
Location: Arlington, VA
Add Favorite
Defense Systems Summit
Join hundreds of DOD and senior military leaders for the 2nd Annual Defense Systems Summit to discuss the protection of our country’s critical warfare computing environments and how cyber defense in 2013 and beyond will need to match growing threat level intensity. Sessions Include: Military Cloud Computing and Security: Assessing the Risks Securing Military Smart Phones and Mobile Devices Understanding the State of the Art in Data Encry...
September 18, 2012
Organizer: Defense Systems Magazine
Location: Arlington, VA
Add Favorite
iPhone and iPad Forensics in a BYOD World
Apple’s growing leadership in the smart phone and tablet industry has helped fuel the rapid BYOD (Bring Your Own Device) program adoption among enterprise and government organizations. Program adoption rates continue to outpace the acceptable use policies and incident response tactics needed to safely and securely incorporate these devices into a BYOD environment. Additionally, Apple iOS device operating system architecture and encrypti...
August 23, 2012
Organizer: BlackBag Government at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Enterprise Data Protection for Physical...
Until recently, budgets allowed for physical separation of data for different groups or different classification levels. However, with the slashing of IT spending, running servers at 5-20% utilization is no longer viable.For the first time there are different classification levels of data and separate domains that can reside on the same disk, allowing you to take advantage of significant savings whether it is physical, virtual, or cloud envir...
August 9, 2012
Organizer: Vormetric Government at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
How to Save Money and Improve Performan...
This is a complimentary webinar provided on behalf of CommVault and Blue River. IT organizations today are challenged to better protect, manage, and recover their business-critical data while cutting costs and increasing operational efficiency. The world leader in data management and protection, CommVault Simpana, offers data and information management software that enables agencies to effectively bridge from the expense and frustrations of th...
July 12, 2012
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Secure Cloud Networking
Making public and private clouds safe for sensitive and regulated workloadsOrganizations have recognized that cloud networking provides a compelling case for cost savings, agility and operational efficiency that cannot be ignored. However, concerns about cloud security have been identified as a major concern for most organizations and is a key consideration when it comes to deciding whether or not to use sensitive workloads within a cloud envi...
June 5, 2012
Organizer: Certes Network Government at Carahsoft
Location: Webcast, VA
Add Favorite
Content Collaboration in the Cloud: Sec...
A new type of workplace is emerging. Cloud technologies are changing how federal departments and agencies get work done, and mobile devices are transforming where that work happens. Rather than managing content in silos, smart organizations are cutting costs and replacing NFS, MFT, and FTP with Box for user-friendly cloud content sharing.Box allows users to access, share, and collaborate on content from anywhere, anytime, on any device ...
May 1, 2012
Organizer: Box Government at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search