What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Sponsor Webcasts


Upcoming

Investigative Teamwork: The Case for Case Management

Investigations hinge on good teamwork. To collaborate effectively, team members need to be confident that everyone has a complete, shared view of case details. They also need flexibility in managing the content of a case, easily bringing in new evidence and artifacts and securely managing updates to that content. That is why a case management system is so critical. Join this webcast to learn how your organization can leverage case management capabilities.

Date: Sep 04, 2014

Time: 2:00pm


'Mocking' Reality: The Power of Service Virtualization

A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.

Date: Sep 10, 2014

Time: 2:00pm


Cases Studies in Implementing a Cloud Based Development Environment with DevOps, Agile Processes and ALM

Government agencies and Healthcare Insurers are on a journey to modernize their IT processes and tools in order to respond to rapid change with greater speed, agility and efficiency. This presentation reviews the overall goals, process and design challenges encountered and addressed within IT modernization initiatives.

Date: Sep 25, 2014

Time: 2:00pm


Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

Date: Sep 30, 2014

Time: 2:00pm


Increase Data Security through Your Print Solution

You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

Date: Oct 02, 2014

Time: 2:00pm


Big Data Marries End User Behavior – Mitigate the Insider Threat

Join us to hear from Vice President and Research Fellow, IT Security and IT GRC, Derek E Brink as he presents his white paper about the insider threat, 3 activities to worry about, 5 ways they’re allowed to happen and what to do about it. He will be joined by Raytheon’s Director of Insider Threat Strategies, Michael Crouse, who will share over a decade of lessons learned regarding insider threat solutions.

Date: Oct 09, 2014

Time: 2:00pm


On Demand

Flash Storage: The Next Generation of Storage has Arrived

Today, Government IT organizations are being forced to do more with less due to budget cuts and increased requirements for performance, features and scalability. Storage infrastructure is a key component of overall database, virtual server and VDI environments that has a direct influence on performance. But the complexity and cost of creating the best storage environment to support high performance architecture can be daunting. Join this webcast to learn how to take the complexity out of storage infrastructure and deliver breakthrough performance for your tier-1 applications.


Auditing Your Data for Insider Threats

It’s not easy to discover the malicious insider. In most organizations, employees are credentialed users of an agency’s system and are assumed to be trusted. That’s because the prevalent technology used to help pinpoint security threats — intrusion detection systems, data loss prevention systems, security incident and event management tools, anti-spyware software, and data from firewalls, routers and switches — don’t provide the context required to know what’s normal behavior and what’s not, often the difference between innocent behavior and the actions of a malicious insider.


Navigating Certification and Accreditation (C&A) - A Primer

Whether you are new to the Certification and Accreditation (C&A) process, or need a refresher on the principles and processes, this webcast will help guide you on the C&A path. C&A is essential when deploying products within the US Government; therefore, it is important to understand the basic principles, approaches, and processes involved with successfully navigating the C&A processes.


How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.


Enabling Government to Citizen Engagement through Mobility and Identity Solutions

In today’s digital environment, citizens and employees have high expectations for government services. Whether they are checking employee benefits, access tax records, or conducting a transaction, they assume that information or services will be available whenever they need it and whatever device they are using. But to make this possible, agencies need to understand both the tools and tactics for delivering and securing mobile engagement. This webcast will provide agencies with insights into how to leverage the latest developments in mobile and identity technology.


Flash Storage: Optimizing the Infrastructure for Mission-Critical Operations

Flash technology solutions are imperative in today’s mission-critical IT infrastructure. The requirements for performance, endurance, agility, scalability, security and reliability in the public sector are driving sophisticated flash memory solutions that require a new level of expertise. Join this webcast to learn how high-performance flash solutions can enable the warfighter’s data-focused, mission-critical applications from the core to the tactical edge.


Flash Storage: The Critical Piece in the Performance Puzzle

Solid-state, flash-based storage promises relief from the ongoing purchase cycle of massive, expensive, low-performance disk. Flash is smaller, denser, more efficient, faster, and easier to manage than disk and is fundamentally changing how government agencies purchase and deploy storage systems. Join this webcast to help better position your organization to take advantages of the cost, performance, and simplicity benefits offered by flash-based storage systems.


Securing the Mobile Workforce: Device Security is Not Enough

For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.


Continuous Monitoring: Elevating Cybersecurity in State and Local Government

State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.


Best Practices in Web-based Application Security

Security experts make it clear: The application is the new network perimeter. Agencies looking to ensure the security of their networks and systems need to ensure the security of the application layer. Fortunately, even as Web applications come under increasing attack, security professionals are developing strategies to address these vulnerabilities. In this webcast, a federal expert will share best practices and lessons learned in devising Web-based application security that is both robust and scalable.