What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Sponsor Webcasts


Upcoming

Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

Date: Dec 02, 2014

Time: 11:00am


Enabling Mission Success with Mobile Technology

Mobility is proving essential for warfighters, intelligence officers and public-sector professionals who spend much of their untethered from their desktops. Enabling a productive and effective mobile workforce requires the ability to access and interact with information using mobile technologies like smartphones and tablets to support their missions. The first wave of protection that has taken hold in the form of encryption, containment and mobile device management (MDM) solutions are ill-equipped to sufficiently protect the wide range of data sensitivity levels that exist across agencies. Learn why and how agencies must shift their focus to protecting the data, as opposed to the device.

Date: Dec 10, 2014

Time: 2:00pm


A Flash Crash Course on Flash-Based Architectures

In this webcast, subject matter expert Bert Scalzo, chief architect at HGST, will shed light on the numerous flash-based architecture alternatives currently available to data center managers and Oracle DBAs—from the most basic non-RAC flash alternatives to truly disruptive technologies.

Date: Dec 11, 2014

Time: 2:00pm


Using Data Sharing to Fight Crime

Human and/or drug smuggling organizations, among other criminal activity groups, use a variety of methodologies to launder billions of dollars each year. To conceptualize the nature and stature of this evolving threat, law enforcement must analyze voluminous transaction records subpoenaed from U.S. financial institutions regarding suspicious activity. This webcast shows how the Arizona Financial Crimes Task Force and TRAC analysts and investigators use an information sharing network to provide a valuable service to federal, state and local law enforcement across the entire nation in their fight against this type of crime.

Date: Dec 17, 2014

Time: 2:00pm


On Demand

Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.


Big Data Marries End User Behavior – Mitigate the Insider Threat

Join us to hear from Vice President and Research Fellow, IT Security and IT GRC, Derek E Brink as he presents his white paper about the insider threat, 3 activities to worry about, 5 ways they’re allowed to happen and what to do about it. He will be joined by Director of Insider Threat Programs, Daniel Velez, who will share over a decade of lessons learned regarding insider threat solutions.


Increase Data Security through Your Print Solution

You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.


Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.


Case Studies in Implementing a Cloud Based Development Environment with DevOps, Agile Processes and ALM

Government agencies and Healthcare Insurers are on a journey to modernize their IT processes and tools in order to respond to rapid change with greater speed, agility and efficiency. This presentation reviews the overall goals, process and design challenges encountered and addressed within IT modernization initiatives.


Deploying and Managing Scalable Applications in the Cloud

During this webcast attendees will get an OpenShift overview covering both the business value, but also the technical benefits of developing with PaaS. You will see a live demo on how to quickly provision, develop, deploy and manage web applications to the cloud using Red Hat's JBoss Middleware and OpenShift software.


IBM i2 National Security and Defense Intelligence Demo

In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.


IBM i2 Intelligent Law Enforcement Demo

Law enforcement software enables agencies to generate actionable insights that can help reduce crime and improve public safety. Learn how your agency can integrate analysis, lead generation and communication technologies to provide a holistic view of data for policing and partner agencies.


'Mocking' Reality: The Power of Service Virtualization

A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.


Investigative Teamwork: The Case for Case Management

Investigations hinge on good teamwork. To collaborate effectively, team members need to be confident that everyone has a complete, shared view of case details. They also need flexibility in managing the content of a case, easily bringing in new evidence and artifacts and securely managing updates to that content. That is why a case management system is so critical. Join this webcast to learn how your organization can leverage case management capabilities.


How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.


Flash Storage: The Critical Piece in the Performance Puzzle

Solid-state, flash-based storage promises relief from the ongoing purchase cycle of massive, expensive, low-performance disk. Flash is smaller, denser, more efficient, faster, and easier to manage than disk and is fundamentally changing how government agencies purchase and deploy storage systems. Join this webcast to help better position your organization to take advantages of the cost, performance, and simplicity benefits offered by flash-based storage systems.


Securing the Mobile Workforce: Device Security is Not Enough

For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.