What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Vendor Webcast List


On Demand

Register Now

Proactive FOIA and eDiscovery: Ensuring Transparency

Transparency, content integrity, controlling costs and managing complexity are FOIA and eDiscovery challenges. Data volumes have increased, new data types are emerging, potentially relevant data roams across your agency network, the cloud, and social media outlets and finally quick FOIA response and eDiscovery production are demanded. It is imperative that you proactively prepare for FOIA requests and litigation, simplify your workflow and make eDiscovery costs predictable.


Register Now

First Look at Red Hat Enterprise Virtualization 3.0: There's A New Sheriff in Town

Join this live webinar for a beta preview on how Red Hat delivers more value through open source subscriptions and helps to transform enterprise IT from a costly, inflexible model to greater innovation offered by open source software.


Register Now

Federal Cloud Security Initiatives Explained - Choosing the Right Standards and Technologies

Mapping the alphabet soup of federal cloud security initiatives is a daunting task. Tim Grance from the National Institute of Science and Technology (NIST) and federal security expert Gunnar Peterson join forces to decompose the funded programs and standards initiatives to recommend an adoption path for cloud security.


Register Now

Maximizing The Value Of Virtualization

This webcast highlights an end to end virtualization solution that unifies server and storage in order to help your agency increase the value of virtualization, streamline deployments and recognize cost cutting efficiencies.


Register Now

Why Your Cloud-First Step Should Be IT Service Management

With shrinking IT budgets and looming data center consolidation projects, leading agencies view the Cloud-first mandate as an opportunity to reshape their IT strategy. The Cloud promises to save agencies money and help them to become more efficient. While this is true, it’s not as simple as flipping a couple switches.


Register Now

Fight Back Against Spear-phishing - Arm the User

Spear-phishing, poisoned search results, drive-by downloads -- legitimate sites being hijacked to push malware. All of these threats are the current reality and users are running into these attacks daily. Register now for this free webcast and learn how you can stop these attacks dead in their tracks by arming your users' browsing and PDF reader environments.


Register Now

Architecting Your Data Center Today for the Cloud Tomorrow

Today's government data center networks are under tremendous pressure to increase efficiencies, improve agility, and scale – all while budget constraints continue to place great stress on IT organizations. Join Juniper Networks’ Chief Security Architect Christofer Hoff, as he walks through the different cloud environments and describes the necessary steps to create a cloud-ready data center.


Register Now

7 Effective Tips for Securing Sensitive Documents from Internal Breaches

Join us for this critical webcast to hear what improved solutions are available to government personnel and contractors to restrict unauthorized access to sensitive data and learn about seven commonly overlooked, at-risk areas of vulnerability.


Register Now

Insider Threats Have No Boundaries, Neither Should Your Analytics Tool

Today's military forces need to be able to rapidly identify the actions and trends of individuals that will remove sensitive/classified information and act before the damage has occurred. Join us for this interactive webcast and discover how your operations can rapidly perform complex threat assessment analysis and more.


Register Now

View from the Cloud: Evolving Networks to Yield Government Efficiency

As the industry develops solutions for a wide array of daily agency challenges, the cloud has become more defined. Join us for this complimentary webcast as Ciena’s Jim Morin and Chris Janson provide definitions of the cloud, implications for government networks and advantages offered to government agencies.


Register Now

Secrets to Success: Best Practices for Increasing Agency Online Performance

Government agencies are realizing the true power of an online presence. Attend this free webcast and get a complete picture of an agency’s online presence including an increased constituent satisfaction and a dramatically lower cost of service delivery. You’ll hear about advances in online analytics tools, and the systematic adoption of smart, repeatable best practice techniques.


Register Now

Actionable Intelligence from Advanced SIEM Systems

Join GCN and the leading experts for an insider look at how next generation SIEMs can complement existing security systems, using their high performance and advanced correlation capabilities to quickly view queries, simplify reporting and eliminate the need for database-trained resources.


Register Now

Now and into the Future: A View of Security, Privacy and Trust for the Cloud Era

Though the public sector is ready to embrace cloud technology for the anticipated cost savings and efficiency it promises deliver, many CIOs have valid concerns about the effectiveness of securing highly sensitive data from external and internal cyber threats. Join this online discussion as noted experts debate a number of issues regarding the technological and legal challenges confronting privacy, security and trust posed by cloud computing.


Register Now

Mapping Identity Credential and Access Management to Meet Inter-Agency and Private Cloud Interoperability Challenges

This webcast is now available to view on-demand. Hear Judith Spencer, government agency expert in identity management as she reviews the vision of ICAM; touching on the vulnerabilities it was developed to overcome and the challenges associated with reaching the “end state” required by the Roadmap.


Register Now

Next Gen Rugged Computing: Best Practices for Choosing the Right Device for Your Mission

Whether being used by first responders in a national disaster or by armed forces in a military operation, rugged computing devices must perform in the most challenging scenarios and conditions. For these reasons, rugged laptops need greater processing power, expansion capabilities and durability to ensure mission success. Listen to Christopher Townsend and leading experts to learn about deploying the right mobile products for your environment, real life use-cases for rugged laptops and the cost of ownership.


Google

Transforming Government: Real-Time Collaboration Boosts Employee Productivity

In today’s fast-paced world, work no longer happens just in the office. People expect to be able to access their information at any hour of day and collaborate from anywhere with people around the corner or across the globe. The applications employees use at home, that let them share information & communicate easily with friends and family, drive these expectations. How can these new tools help in the workplace? With the right technology, employees can work faster, share ideas, and innovate at speed. Google Apps is a modern collaboration system for organizations that allows employees to collaborate in real-time, dramatically boosting productivity. Join us for this informative webinar to learn how Google’s innovative collaboration tools meet the needs of today’s government employees.


Webcast for Marketers: Inside the 2010 Government IT Buying Study - Who’s Buying What, Where, When and How. Special Recorded Encore Presentation

1105 Government Information Group recognizes the size, scope and complexities of government IT markets and the challenges involved in reaching and engaging these unique markets. To continue to build on its expertise and to help clients understand the public sector market, 1105 Government Information Group consistently takes the lead with innovative research designed to ascertain the needs and trends of the government IT marketplace.


IBM

Crush Crime with Predictive Analytics: The Memphis Police Department Story

With traditional policing practices unable to thwart a rising rate of criminal activity and budgets tight, the Memphis Police Department (MPD) pioneered a way to focus their patrol resources more intelligently. By using a predictive enforcement tool, MPD can recognize crime trends as they are happening, and enable precinct commanders to change their tactics and redirect patrol resources in a way that both thwarts crimes before they happen and catches more criminals in the act. Through such smart policing approaches, MPD has reduced the overall crime volume in Memphis by 30%, making life safer for their citizens.


Schneider Electric

Strategies for effectively deploying high efficiency and high availability data centers

As applications such as virtualization, blade servers, multi-core processor servers, and consolidation increase, it becomes critical to fully understand the drivers to realize your efficiency entitlement and deploy an architecture that can scale with your business. This session will help attendees filter out the hype, understand the science behind efficiency, and set realistic expectations for their own data centers.