What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Vendor Webcast List


Upcoming

Transforming the Data Center for Immediate Cost Savings

Under increasing budget pressures, federal agencies must find ways to improve the efficiency and cost-effectiveness of their data center operations. Consolidating centers and equipment is a good first step, but it is not enough. To achieve the kind of savings they need, agencies must take a new approach to IT management. That approach begins with virtualization. In this webcast, you will learn how to leverage the full capabilities of virtualization by adopting a converged infrastructure that combines the compute (server) tier and the storage tier into a single system.

Date: Apr 23, 2014

Time: 2:00pm


Collaboration in the Cloud

Government employees increasingly find that they cannot work in a vacuum. Instead, they must work with other employees in their agency – or employees in other agencies – to support essential government services. Without a doubt, when it comes to collaboration, the cloud is the underlying platform of choice.

Date: May 06, 2014

Time: 2:00pm


Software-Defined Networking: The Path to a More Cost-effective Infrastructure

Agency infrastructures are under increasing pressure, as mobility, cloud and other trends ratchet up the complexity of IT operations. To keep pace – and to plan for the future – a growing number of agencies are looking to software-defined networking. SDN provides a simple, agile, adaptive network which can deploy applications in minutes rather than months, while delivering significantly lower operational costs.

Date: May 07, 2014

Time: 2:00pm


Digitize to Survive: Using e-Government to Optimize Programs and Performance

To engage and serve their citizens, public sector organizations are looking to e-government strategies and solutions. Join this webcast to learn how e-government is radically transforming and improving governance around the world.

Date: May 12, 2014

Time: 2:00pm


Digital Government: Emerging Best Practices in Developing Digital Services

In this webcast, Gwynne Kostin, Director, of the Digital Services Innovation Center in the Office of Citizen Services and Innovative Technologies at the U.S. General Services Administration, will discuss how agencies can improve their ability to deliver services anytime, anywhere and to any device.

Date: May 30, 2014

Time: 2:00pm


On Demand

Cybersecurity and Cyberwar: What Everyone Needs to Know

This exclusive interview explores how to make the most of technology while defending Federal information and networks from the serious and persistent threats we face as a nation.


Data Center Operations: Filling the Cybersecurity Gap

With agencies making increasing investments in big data, information sharing and other data-driven technologies, government data centers are growing in size and complexity. As might be expected, agencies are responding by also increasing their investment in compute power, storage and other aspects of their IT infrastructure. Ann Barron-DiCamillo, Director of the United States Computer Emergency Readiness Team (US-CERT), will offer insights into how agencies can ensure that they keep pace with their growing cybersecurity requirements.


Portfolio Management: Helping Defense Agencies Meet the Budget Challenge

Mark E. Krzysko, Deputy Director of Enterprise Information within the Office of the Under Secretary of Defense for Acquisition, Technology and Logistics shares his ideas in using big data to develop sound DoD investment strategies. This webcast will show how to develop an information-driven approach to meeting budget challenges head on.


Rethinking Cybersecurity: Five Keys to Developing Systems Resiliency

In this webcast, Ron Ross, a Fellow at the National Institute of Standards and Technology (NIST) and one of the most influential experts on cybersecurity in the federal government, will discuss five keys to building resiliency into systems from the beginning – making security a by-product of good design and development practices not an add-on or afterthought.


Beyond Consolidation: The Future Shape of the Data Center

Over the last several years, government agencies have been working steadily to consolidate their data centers, with the hopes of reducing the cost and improving the efficiency of their operations. But consolidation itself will bring only limited gains. The real benefits of consolidation will be realized only when agencies use it as a springboard to modernize and optimize the enterprise. This webcast will examine the building blocks of the data center of the future – the IT solutions and strategies that will enable agencies to take full advantage of economies of scale and deliver a more robust and secure set of IT services.


An Expert’s Viewpoint on Security Risks

This exclusive interview explores how to make the most of technology while defending Federal information and networks from the serious and persistent threats we face as a nation.


Can Social Collaboration Transform the Way Your Agency Works?

Cloud computing is transforming the way government works. Learn how to use innovative, secure and collaborative cloud solutions to increase efficiency, get immediate access to up-to-date content, and reduce costs while building valuable social networks. Plus, don't miss the live demo!


Empowering the Mobile Workforce: Best Practices and New Solutions

In this webcast, an industry expert will share how these tools can help your agency optimize your business processes and create a mobile strategy that supports individual function areas while furthering the agency’s long-term vision. In addition, the webcast will explore best practices and lessons-learned implementing specific solutions agency-wide.


Continuous Monitoring to Detect Advanced Persistent Threats

For federal agencies, cyber attacks are a fact of life. Since 2006, the number of cyber incidents reported by federal agencies has increased by 782 percent, according to the Government Accountability Office. And with the emergence of a new generation of advanced malware, zero-day exploits, and targeted advanced persistent threats (APTs), these attacks are becoming increasingly sophisticated and successful. Traditional security defenses are no longer effective. Organizations need an advanced, game-changing technology to enable timely detection and protection. In this webinar you will learn why Advanced Persistent Threats (APTs) are successful, the anatomy of actual attack scenarios and their multi-stage approach and how a new model for advanced threat detection can protect your agency.


Getting Beyond the Basics of Mobile Security: A Roundtable Discussion

This webcast will provide a breakdown of the unique challenges of mobile security – and offer insight into how to meet them. This roundtable discussion will feature two experts: William Corrington former chief technology officer with the Department and Interior; and Mike Zirkle, Associate Director of Public Sector Solutions & Marketing, Verizon Enterprise Solutions.


Insights Revealed: Benefits and Best Practices for Effective Collaboration

Numerous government agencies are getting serious about collaboration because each sees opportunities to improve enterprise-wide information sharing and productivity, support real-time communications during crises, or reduce the money spent on large in-person meetings or conferences. Join this exclusive Webcast for an in-depth look at which online tools and techniques are most effective in enhancing greater collaboration.


Big Data: How to Take it to the Next Level

In this webcast, Dr. Mark Luker, Associate Director, NITRD/NCO will present an overview of how the NITRD is working to address emerging challenges of R&D for Big Data. Further, Dr. Luker will reveal how several agencies are currently leveraging Big Data to improve their citizen service and advance their overarching missions.


Empowering Federal Employees to Work the Way they Live

A growing number of Federal agencies have adopted new technologies to empower employees to be more productive and work the way they live, while also reducing the costs and resources needed to maintain their internal systems. It’s a true win-win. Join this informative webinar to hear about the changing face of workplace productivity tools for Federal employees.


What You Don’t Know CAN Hurt You: Eliminating Cyber Security Blind Spots and Optimizing Incident Response

Join Jason Mical, Vice President of Cyber Security at AccessData Group and Dale Beauchamp, Branch Manager in the Information Assurance and Cyber Security division of the TSA, as they describe how the cyber security model is evolving and discuss the capabilities that are required to overcome these detection and response obstacles.


Cloud Migration: Benefits and Challenges

Wolf Tombe, Chief Technology Officer at the US Customs and Border Protection (CBP) has navigated CBP’s migration to the Cloud. In this webcast, you will learn about CBP’s journey to the Cloud, including their security requirements and other adoption challenges. Learn how Tombe and his team were able to not only save money, but also improve the IT resources.


Defending Data ... New Insights on Winning the Cyber War

You can learn more about the role of big data in cyber security in this webinar that provides new insight based on discoveries from just-released research on Big Data Analytics and Cyber Defense from the Ponemon Institute & Teradata. Dr. Larry Ponemon, Chairman & Founder of the Ponemon institute and Sam Harris, Director of Cyber Security and Enterprise Risk Management for Teradata will share results from the study and discuss how to take enterprise-wide security to the next level leveraging big data analytics.


Going Mobile: Ingredients for a Successful Mobility Strategy

The need to improve operational performance and deliver better citizen service is universal across government. To meet this need, federal agencies are embracing mobile tools and solutions that fundamentally change how they operate and interact with citizens. In this webcast, NRC CIO Darren Ash will share how the NRC crafted a forward looking mobile strategy that supports individual function areas while furthering the agency’s long-term vision.


Document and Information Security: Protecting Information in the 3rd Platform

As organizations in the Public Sector increasingly adopt the use of mobile devices, and move more towards electronic document workflows, it is vital to have a security plan that addresses device, document, user, and data security. In this Webcast, you will learn from Industry Analyst Keith Kemetz , VP of IDC’s Hardcopy Peripherals Solutions and Services, and others about current key trends and solutions for ensuring Document and Information Security, addressing topics such as BYOD, Cloud and Mobile Printing.


Continuous Monitoring: How to Get It Right

In this webcast, hear from Dr. Ron Ross, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST) the steps they took in planning, meeting requirements and deploying an effective continuous monitoring program. Hear from his perspective the dos and don’ts to maintain ongoing awareness of information security, vulnerabilities, and threats. Learn how NIST ensured their IT systems are effective and appropriate for the organization’s level of risk tolerance.


Transforming Agency Networks: Modernize to Meet Today’s Demands

Network infrastructure modernization is on the wish list of many agencies due to growing demand for bandwidth and improved IT service delivery. But modernization requires money – which is in short supply these days. Register for this webcast to hear about these issues through survey results sourced by public sector IT leaders and business decision makers.


Business Continuity: The Case for Cloud

This webcast will explore how federal agencies understand how to make the cloud part of their business continuity plans. Captain Shawn Hendricks, Program Manager, Naval Enterprise Networks will lead a discussion on what resources you need to consider, what standards should be in place and how to fully capitalize on faster recovery times by trusting the cloud.


The Power of One – The Cisco Unified Workspace Architectural Approach

The Cisco Unified Workspace enables government organizations to transform how they communicate and collaborate by taking a strategic architectural approach—an approach that provides the flexibility and scalability to adapt as priorities evolve.


Mobilize your Agency’s Workforce with Holistic Mobile Enterprise Management Solutions

Tune in for tips to help you remain focused on your agency’s mission while embracing the expanding presence of mobile applications and devices within your agency’s work environment. Learn how to define your mobility requirements and apply best practices and proven frameworks to address nearly every government mobility challenge.


How to Implement, Secure, and Manage Mobility in Federal Agencies

Attend this webinar to learn how to how to implement access and policy management solutions that address these concerns to connect any user on any device from any location to applications, wherever they reside.


A Closer Look at How FEDRAMP Certification Assures Cloud Security

This webcast will take a closer look at FedRAMP’s security controls and process. In this webcast, Dave McClure, Associate Administrator, Citizen Services and Innovative Technology, General Services Administration, will lead a dynamic discussion about the FedRAMP program as well as what the security standards really mean to agencies cloud investment.


Exclusive Research Webcast: Methods and Insights into Managing Mobile Securely

Mobile devices like smart phones and tablets are increasingly vital to the job success of Federal agency employees.Federal IT and business decision-makers worry about threats to their information security infrastructures that often accompany mobile device use. Join us as we reveal the findings of this recent exclusive research report on mobile security and address the question, “How can Federal agencies properly architect a secure mobile environment that protects both users and the agency network? “


The Building Blocks of Cloud Computing: How to Boost the Efficiency, Availability and ROI of the Enterprise through Virtualization

Join us for this second webcast in a three-part series titled “Three Strategies for Lowering the Cost of Government through IT Innovation”. This webcast will be a round table discussion where federal IT leaders will share their best practices and lessons learned. Participants will get an inside glimpse on how to set the foundation for a cloud ready infrastructure and how to bring a modern mindset to their organization.


How to Increase Regulatory Compliance while Reducing Costs and Resource Requirements

The growth of information is doubling every 18 months. And most of this growth is from unstructured sources. Federal agencies are faced with the challenge of managing this information so that it is readily available to users that need it – while also ensuring that their information systems comply with the increasingly stringent regulatory requirements. Join us on this complimentary webcast to learn how to craft an information management strategy that effectively balances the need for usability, regulatory compliance and cost.


Shared system access with Identity Federation

Identity federation provides a secure foundation for your organization to collaborate with others, leveraging resources and expertise to help better meet your mission and objectives. Managing federated identities has technological and organizational benefits. To achieve these benefits, formal trust mechanisms among participants with different IT systems have to be implemented, along with agreement on who is to be granted access to which specific systems, applications, services, and information. Register now to explore all aspects of Identity Federation.


Building on the Cloud: Paving the Way for a ‘Future Ready’ Workforce

In this webcast, Mr. Bajinder Paul, Deputy Associate Administrator of General Services Administration discusses the policy, security and cultural considerations for agencies looking to integrate tools and technologies to improve the productivity of their employees and the efficiency of their operations.


Rethinking Federal Data Center Consolidation: Achieve Your Goals without Sacrificing Security or Performance

While the promise of lower costs and higher efficiencies are appealing, IT is rightfully cautious about the risks of managing enormous volumes of network traffic flowing into a centralized, virtualized infrastructure. Join us for an informative discussion on strategies that will allow you to achieve the benefits of consolidation while addressing the key concerns.


Unified Communications: Helping Agencies Connect

Connecting people to people, anywhere, anytime, on any device is not just an idea but a reality for today’s government agencies to conduct their daily business requirements.


The Latest Advances in Business Process & Operational Decision Management for Government

Business Process and Operational Decision Management (ODM) platforms have evolved to address the key challenges facing governmental agencies; one of those being the increasing demands of non-technical users for more social and simple on-the-job tools.


Research Webcast on Big Data: From Hype to Reality

Many government agencies have already commenced Big Data initiatives and have discovered that their decision-making is now faster and more fact-based, citizen-facing services are delivered more efficiently, and security risks are more detectable. Join us for this exclusive Research Webcast for an in-depth look on Big Data and the issues that will be at the top of government IT agendas.


Leveraging the Advanced Threat Platform to Stay Ahead of the Threat

Find out about how the Advanced Threat Protection Platform solutions help protect against network-based threats masked in common network traffic and prevents attackers from exploiting vulnerabilities at the network, host and application layers


Joint Task Force - Homeland Defense Builds a Common Operational Picture with Google Earth

The security for the Asia-Pacific Economic Collaboration summit in 2011 in Honolulu, Hawaii involved many federal, state & local agencies. The complex task of coordinating information sharing among agencies was the responsibility of Joint Task Force - Homeland Defense (JTF-HD). JTF-HD turned to Google Earth technology to build a visualization capability that enabled all agencies to share information easily & ensure a safe and secure summit.


The Impact of Big Data: Transcending to Smart Government

Join Iron Mountain for this Webinar entitled, The Impact of Big Data: Transcending to Smart Government. Featuring Adelaide O'Brien, Research Director, Smart Government Strategies, IDC Government Insights, during the webinar she will highlight findings from Government IT decision makers and review relevant federal mandates that impact Government Big Data.


Enhance Federal Workforce Effectiveness with Mobile and Cloud

Federal agencies are challenged with enhancing the services they deliver to their workforce and constituents in a fast paced, information rich, resource constrained environment.


Register Now

Cost Savings and Security Benefits with MPS

The Federal goverment is always looking for ways to cut costs and one area that often gets overlooked is document related activities. Managed Print Services can look at the document infrastructure and find ways to reduce costs, gain productivity, as well as solve security issues around documents.


Register Now

Federal IT: Consolidating Your Data Securely in a Cloud

In an era of mandated consolidation of data centers and migration of agency workloads to the cloud, Federal IT decision makers look for the best practices and guidance. With mounting pressure to comply with a growing number of efficiency mandates, the key areas they’ll need to address are the streamlining of infrastructure in compliance with the Federal Data Center Consolidation Initiative (FDCCI), and identifying and securing their cloud-based workloads.


Register Now

Getting Started: Removing Administrator Rights & Setting up Policies to Elevate Privileges for Standard Users

Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks – yet having free reign on software installation and endpoint based operations often leads to malware and data breaches that are very costly. Moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks.


Register Now

Security and Recovery for Sharepoint

No matter how powerful and effective SharePoint is, the very nature of this power can send SharePoint into unmanaged chaos and expose your organization to content security risks. Protecting your SharePoint content from prying eyes, ensuring its availability to those who need it and auditing all activities and users across your environment are top priorities for compliance driven organizations.


Register Now

Data Management Fundamentals for Effective Government

A webinar examining emerging usage scenarios for government data, then suggest ways to leverage data management processes to enable more effective data use.


Register Now

Proactive FOIA and eDiscovery: Ensuring Transparency

Transparency, content integrity, controlling costs and managing complexity are FOIA and eDiscovery challenges. Data volumes have increased, new data types are emerging, potentially relevant data roams across your agency network, the cloud, and social media outlets and finally quick FOIA response and eDiscovery production are demanded. It is imperative that you proactively prepare for FOIA requests and litigation, simplify your workflow and make eDiscovery costs predictable.


Register Now

First Look at Red Hat Enterprise Virtualization 3.0: There's A New Sheriff in Town

Join this live webinar for a beta preview on how Red Hat delivers more value through open source subscriptions and helps to transform enterprise IT from a costly, inflexible model to greater innovation offered by open source software.