What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Upcoming Webcasts

  • Cyber Threat Analysis: Shining a Light on the Dark Web

    Ever wonder what the "Deep and Dark Web" actually is? Hackers and fraudsters have embraced the Dark Web as a source of anonymity to enable their malicious activity. Dark Web sites have created their own economy where actors can buy and sell exploits, trade information, and coordinate attacks with ease. Get beyond the buzz words with this interesting presentation on both the strategic aspects of the Dark Web and some tactical examples of how to exploit it to improve your agency’s ability to identify, defend against and mitigate emerging cyber threats. 03/29/2016

  • Intro to Software-Defined Storage

    Unstructured data is created and consumed at an astounding rate by both consumers and enterprise users. Storage requirements are quickly outpacing storage capacity and budgets, which creates challenges for both government agencies and other public sector organizations. As IT shifts to on-demand consumption models, data content must be available anywhere, at any time, across any device. Red Hat Gluster Storage and Red Hat Ceph Storage are open source, scale-out software-defined storage solutions that provide an ideal platform for next-generation workloads with growing content stores. 02/24/2016

Whitepapers

  • Snapshot: Effective Incident Response

    Preparing an effective incident response plan is no longer a luxury. It’s an essential component of an organization’s security strategy. Ensuring your organization is preparing a comprehensive and truly effective response plan requires a multi-faceted approach, as outlined in this special report.

  • The Evolution of the Best Practice

    Business best practices, like the paperless office, are designed for efficiency and optimization. Yet best practices are constantly evolving, and incorporate the latest enabling technologies to continuously improve optimal procedures and processes. Download this informative report to learn how to stay ahead of the curve.

  • Game Changing Technology to Meet Agency Mission

    State and local government agencies are always looking for ways to improve operational efficiencies to shorten response times and enhance the service they provide to constituents. These efforts span everything from issuing a permit online, to performing more inspections or resolving tickets from citizens in a call center. All these advances have one thing in common they require more agile, scalable, cost-effective data storage. Download this game changer to learn more!

  • Attack on all Fronts: Defend, Detect, Decide and Defeat

    It is time for you to rethink your current security so you can forge your way forward without fear? It is time for a strategy that will help us confidently navigate the various risks new technologies and innovations pose to enterprises and agencies so that you can go about achieving your missions and operational objectives. Built on the successful integration of Websense®, Raytheon Cyber Products and the recently-acquired Stonesoft next-generation firewall (NGFW) business, learn how Forcepoint brings a fresh approach to address the constantly evolving cybersecurity challenges and regulatory requirements facing businesses and government agencies - and how they can help you.

  • The New Mobile Workforce