Upcoming Webcasts

  • New Solutions for Secure Mobility in the Field

    Whether you are new to BlackBerry or an experienced user, you will find this session valuable to learn about our services and best practices to protect your proprietary data. Participants will hear from a BlackBerry Public Sector customer on how to successfully implement a broad data security practice and how to utilize BlackBerry to accomplish their goals. 10/05/2016

  • Supercharging Mission-Critical Application Services

    Monitoring complex applications is a challenge. As government agencies move more applications to the cloud and dynamically provision resources, the task becomes even more difficult. Identifying signs of potential application outages or slowdowns is a critical capability. To ensure consistent performance, agencies must be able to gauge the health of their applications operations in real time. In this webcast, Brian Muolo, Director for Enterprise Server, Storage and Identity Management at the General Services Administration, will discuss strategies for raising the bar on application performance. 09/20/2016

Whitepapers

  • SEWP Keeps Pace with Tech Horizons

    NASA’s Solutions for Enterprise-Wide Procurement (SEWP) contract vehicle has grown in size and currently operates with 145 contract holders, 119 of which are small businesses. Over the years, SEWP has gone from just one of a number of government-wide acquisition contracts (GWACs) to the top of the pile. It’s widely considered as one of best run IT-based contracts and has become a go-to resource for government agencies. Download this special report containing expert viewpoints from SEWP Program Manager, Joanne Woytek and experienced contract holders, as we take a deeper dive into SEWP V.

  • How to Evaluate DDoS Mitigation Providers: Four Critical Criteria

    How can you be sure that the DDoS mitigation services provider you bring on board can deliver on the promise to stop the Internet’s largest and most sophisticated attacks? This white paper explores four critical criteria on which to evaluate DDoS mitigation providers before signing on the dotted line. Akamai has developed key questions related to each to help you evaluate a provider’s threat intelligence, experience, mitigation capabilities and capacity. Our guidance is based on Akamai’s practical experience in proven mitigation approaches for different DDoS attack scenarios, as well as on our keen insight into the minds and strategies of cybercriminals and DDoS attackers.

  • Evolving Threat Landscape Drives New Approaches to Cybersecurity

    Preventing and responding to cyberthreats continues to dominate the conversation. One increasingly popular way to improve security while also saving money is through cloud services. Although the government has put programs in place to simplify cloud adoption, many agencies are still experiencing growing pains. A recent webcast series looked at the primary categories of cyberthreats and how cloud can help agencies deliver digital services in the face of the danger. Download this informative Digital Dialogue to learn how cloud and mobile are driving ways to improve security, IT performance, service delivery, and the user experience.

  • Surveillance Beyond Security

    The role of storage in video surveillance systems has evolved from a means of preserving evidence to an evidence search tool. Soon it will act as the main data repository for predictive analytics. Are you ready?

  • Application Managers: What's keeping you up at night?