Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks – yet having free reign on software installation and endpoint based operations often leads to malware and data breaches that are very costly. Moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks.
Sponsored By ViewFinity
No matter how powerful and effective SharePoint is, the very nature of this power can send SharePoint into unmanaged chaos and expose your organization to content security risks. Protecting your SharePoint content from prying eyes, ensuring its availability to those who need it and auditing all activities and users across your environment are top priorities for compliance driven organizations.
Sponsored By Quest Software
A webinar examining emerging usage scenarios for government data, then suggest ways to leverage data management processes to enable more effective data use.
Sponsored By Pitney Bowes/MapInfo
Transparency, content integrity, controlling costs and managing complexity are FOIA and eDiscovery challenges. Data volumes have increased, new data types are emerging, potentially relevant data roams across your agency network, the cloud, and social media outlets and finally quick FOIA response and eDiscovery production are demanded. It is imperative that you proactively prepare for FOIA requests and litigation, simplify your workflow and make eDiscovery costs predictable.
Sponsored By HP Autonomy
Join this live webinar for a beta preview on how Red Hat delivers more value through open source subscriptions and helps to transform enterprise IT from a costly, inflexible model to greater innovation offered by open source software.
Sponsored By Red Hat and DLT Solutions
Mapping the alphabet soup of federal cloud security initiatives is a daunting task. Tim Grance from the National Institute of Science and Technology (NIST) and federal security expert Gunnar Peterson join forces to decompose the funded programs and standards initiatives to recommend an adoption path for cloud security.
Sponsored By Intel, McAfee
This webcast highlights an end to end virtualization solution that unifies server and storage in order to help your agency increase the value of virtualization, streamline deployments and recognize cost cutting efficiencies.
Sponsored By DLT
With shrinking IT budgets and looming data center consolidation projects, leading agencies view the Cloud-first mandate as an opportunity to reshape their IT strategy. The Cloud promises to save agencies money and help them to become more efficient. While this is true, it’s not as simple as flipping a couple switches.
Sponsored By ServiceNow and Triad Technology Partners
Spear-phishing, poisoned search results, drive-by downloads -- legitimate sites being hijacked to push malware. All of these threats are the current reality and users are running into these attacks daily. Register now for this free webcast and learn how you can stop these attacks dead in their tracks by arming your users' browsing and PDF reader environments.
Sponsored By Invincea
Today's government data center networks are under tremendous pressure to increase efficiencies, improve agility, and scale – all while budget constraints continue to place great stress on IT organizations. Join Juniper Networks’ Chief Security Architect Christofer Hoff, as he walks through the different cloud environments and describes the necessary steps to create a cloud-ready data center.
Sponsored By Juniper Networks
Join us for this critical webcast to hear what improved solutions are available to government personnel and contractors to restrict unauthorized access to sensitive data and learn about seven commonly overlooked, at-risk areas of vulnerability.
Sponsored By HP
Today's military forces need to be able to rapidly identify the actions and trends of individuals that will remove sensitive/classified information and act before the damage has occurred. Join us for this interactive webcast and discover how your operations can rapidly perform complex threat assessment analysis and more.
Sponsored By Adobe
Government agencies are realizing the true power of an online presence. Attend this free webcast and get a complete picture of an agency’s online presence including an increased constituent satisfaction and a dramatically lower cost of service delivery. You’ll hear about advances in online analytics tools, and the systematic adoption of smart, repeatable best practice techniques.
Sponsored By Adobe
As the industry develops solutions for a wide array of daily agency challenges, the cloud has become more defined. Join us for this complimentary webcast as Ciena’s Jim Morin and Chris Janson provide definitions of the cloud, implications for government networks and advantages offered to government agencies.
Sponsored By Ciena
Join GCN and the leading experts for an insider look at how next generation SIEMs can complement existing security systems, using their high performance and advanced correlation capabilities to quickly view queries, simplify reporting and eliminate the need for database-trained resources.
Sponsored By Nitrosecurity
Though the public sector is ready to embrace cloud technology for the anticipated cost savings and efficiency it promises deliver, many CIOs have valid concerns about the effectiveness of securing highly sensitive data from external and internal cyber threats. Join this online discussion as noted experts debate a number of issues regarding the technological and legal challenges confronting privacy, security and trust posed by cloud computing.
Sponsored By Citrix, Intel
This webcast is now available to view on-demand. Hear Judith Spencer, government agency expert in identity management as she reviews the vision of ICAM; touching on the vulnerabilities it was developed to overcome and the challenges associated with reaching the “end state” required by the Roadmap.
Sponsored By Intel
Whether being used by first responders in a national disaster or by armed forces in a military operation, rugged computing devices must perform in the most challenging scenarios and conditions. For these reasons, rugged laptops need greater processing power, expansion capabilities and durability to ensure mission success. Listen to Christopher Townsend and leading experts to learn about deploying the right mobile products for your environment, real life use-cases for rugged laptops and the cost of ownership.
Sponsored By Dell
In today’s fast-paced world, work no longer happens just in the office. People expect to be able to access their information at any hour of day and collaborate from anywhere with people around the corner or across the globe. The applications employees use at home, that let them share information & communicate easily with friends and family, drive these expectations. How can these new tools help in the workplace? With the right technology, employees can work faster, share ideas, and innovate at speed.
Google Apps is a modern collaboration system for organizations that allows employees to collaborate in real-time, dramatically boosting productivity. Join us for this informative webinar to learn how Google’s innovative collaboration tools meet the needs of today’s government employees.
Sponsored By Google
1105 Government Information Group recognizes the size, scope and complexities of government IT markets and the challenges involved in reaching and engaging these unique markets. To continue to build on its expertise and to help clients understand the public sector market, 1105 Government Information Group consistently takes the lead with innovative research designed to ascertain the needs and trends of the government IT marketplace.
Sponsored By 1105 GIG
With traditional policing practices unable to thwart a rising rate of criminal activity and budgets tight, the Memphis Police Department (MPD) pioneered a way to focus their patrol resources more intelligently. By using a predictive enforcement tool, MPD can recognize crime trends as they are happening, and enable precinct commanders to change their tactics and redirect patrol resources in a way that both thwarts crimes before they happen and catches more criminals in the act.
Through such smart policing approaches, MPD has reduced the overall crime volume in Memphis by 30%, making life safer for their citizens.
Sponsored By IBM
As applications such as virtualization, blade servers, multi-core processor servers, and consolidation increase, it becomes critical to fully understand the drivers to realize your efficiency entitlement and deploy an architecture that can scale with your business. This session will help attendees filter out the hype, understand the science behind efficiency, and set realistic expectations for their own data centers.
Sponsored By Schneider Electric