What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here

Upcoming Webcasts

  • CDM: Getting from Concept to Implementation

    The Continuous Diagnostics and Mitigation program is a significant but complex undertaking for federal agencies – not least because of the complexity of agencies themselves and their IT landscapes. The Department of Homeland Security is an interesting case study, because the department is helping to oversee the CDM initiative as well as implementation for its own benefit. In this webcast, Jeff Gallucci, Director of Authorization, Reviews and Monitoring Ongoing Risk (ARMOR) in the Department of Homeland Security Information Security Office, will share insights and lessons learned from the department’s experience as an early adopter. 09/09/2015

  • Advanced Secure Multilevel Access: Going Beyond Secure KVM

    For many years, Secure KVM switching technology has been one of the best options for providing users with a way to access desktop systems with different security levels from a single keyboard, monitor and mouse. However, as reliable as Secure KVM has been, it has failed to keep pace with important advances in how agencies manage access to systems and data. That’s where virtual desktop infrastructure and simultaneous multilevel access solutions enter the frame. In this webcast, you will learn how VDI makes it possible for agencies to field secure thin clients that improve both the security and flexibility of multilevel access, while also reducing the cost of operations. 07/28/2015


  • Internet Security Threat Report

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 57.6 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Intelligence, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.

  • Securing Data in an Unsecure World

    Individuals and organizations today are generating more sensitive data than ever before. For most, it is not a question of if you suffer a breach, but when. This ebook provides specific information on the state of security today and practical steps you can take to secure your sensitive data.

  • Comparing IBM FlashSystem to Traditional Performance Disk Systems

    Using a detailed, in-depth cost analysis model validated by actual customer interviews, this Economic Value Validation white paper from ESG demonstrates how IBM FlashSystem is less expensive than equivalent disk-based enterprise storage systems. Download this article to find out more!

  • Flash Array Deployment for Dummies

    Download now to learn the history, business values and fundamentals of deploying a flash system at a basic level.

  • IDC Peerscape: Practices for Next-Generation IT Asset Management