What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


On Demand

Flash Storage: The Critical Piece in the Performance Puzzle

Solid-state, flash-based storage promises relief from the ongoing purchase cycle of massive, expensive, low-performance disk. Flash is smaller, denser, more efficient, faster, and easier to manage than disk and is fundamentally changing how government agencies purchase and deploy storage systems. Join this webcast to help better position your organization to take advantages of the cost, performance, and simplicity benefits offered by flash-based storage systems.


Securing the Mobile Workforce: Device Security is Not Enough

For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.


Continuous Monitoring: Elevating Cybersecurity in State and Local Government

State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.


Best Practices in Web-based Application Security

Security experts make it clear: The application is the new network perimeter. Agencies looking to ensure the security of their networks and systems need to ensure the security of the application layer. Fortunately, even as Web applications come under increasing attack, security professionals are developing strategies to address these vulnerabilities. In this webcast, a federal expert will share best practices and lessons learned in devising Web-based application security that is both robust and scalable.