Within Federal information systems, day-to-day operations are subject to a diverse array of endpoint security threats. Join this webcast sponsored by Dell and Intel® to hear from experts how to address the ever-changing endpoint security burdens within Federal. You will learn how Dell can help Fed address data protection, authentication, and encryption all with centralized management. If maintaining security, productivity, and manageability are key to your success, please attend. Also during this session, you will receive information on Dell tablets and notebooks solutions featuring Intel® Core™ vPro™ processor family . Offering an edge in security, the Intel® Core™ vPro™ processor family is designed to strengthen security across the organization.
Date: Jul 14, 2015
Sponsored By Dell and Intel®
Without a doubt, agencies have discovered that cloud computing is a powerful tool for improving the performance and cost-effectiveness of the enterprise. But increasingly agencies are realizing that it is more than that. They also are realizing that cloud, with its flexibility and scalability, serves as an ideal platform for innovation. In this webcast, Navin Vembar, IT Director, Integrated Award Environment, General Services Administration will offer insights into how to build on cloud to offer innovative services.
Date: Jul 21, 2015
Sponsored By VMware, Carahsoft, Carpathia, A QTS Company
For IT, a lack of visibility means a lack of control. With wire data analytics, you get the situational awareness you need to detect breaches, identify applications and dependencies, optimize IT infrastructure, and gather real-time intelligence.
Date: Jul 29, 2015
Sponsored By ExtraHop Networks
Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services.
Sponsored By DLT, ForeScout, Symantec
Led by Doug Glenn, the Deputy CFO and Director of the Office of Financial Management, the Department of Interior (DOI) has succeeded in improving financial systems through data analysis and identifying where and how exactly budget is being spent.
Sponsored By Tableau Software
Virtualization is changing how agencies manage their data centers. The technology provides increased flexibility when it comes to deploying resources – and increased efficiency in managing them. Security is an essential part of that equation. In this webcast, Frank Konieczny, the Chief Technology Officer in the Office of Information Dominance and Chief Information Officer in the Office of the Secretary of the Air Force, will discuss how agencies can leverage a software-defined approach to the data center to strengthen their security posture.
Sponsored By Force 3 Palo Alto VMware
3D printing, once the stuff of science fiction, has become a reality, with the potential to revolutionize design and manufacturing in many sectors, including government. But while 3D printing is real, it is still new to many agencies. In this webcast, Lt. Commander Ben "Prof" Kohlmann, Chief of Naval Operations Rapid Innovation Cell, will offer best practices and lessons learned in leveraging this technology. Lt. Commander Kohlmann spearheaded an effort that put a 3D printer aboard a warship for the first time.
Sponsored By Stratasys
Configuring applications to accept smart cards is often complex and costly, but smart card-based Single Sign-On (SSO) provides password-free authentication and achieves FISMA ICAM compliance. Join us to learn how you can accelerate compliance and increase security--all while providing a seamless user experience.
Sponsored By ForgeRock
The federal IT enterprise continues to change, as agencies look for new ways to make applications, data, and services more readily available to their workforces. But as the enterprise evolves, the cybersecurity strategy must evolve as well. In this webcast, Mike Echols, Director, Cyber Joint Program Management Office at the Department of Homeland Security, will discuss steps that agencies can take to improve the security of their IT operations.
Sponsored By Force 3 and Cisco
Session 2 - Automated Remediation: Scanning for vulnerabilities and scaling remediation across your agency requires your IT staff to continuously and proactively respond to cyber threats, advisories, patches, updates and more. Responding with manual actions further constrains IT resources and adds to response times. Empower your IT staff to focus on new and emerging threats.
Sponsored By DLT, ForeScout, Symantec
Data center security is getting more complex than ever. Between the evolving cyber threat landscape and the growing complexity of the federal enterprise, IT managers need a cybersecurity strategy that is both focused and flexible. In this webcast, Jeanne Holm, Chief Knowledge Architect at NASA’s Jet Propulsion Laboratory, will share best practices and lessons learned in creating a trusted data center environment.
Sponsored By DLT and BMC
Protecting work data on mobile devices, whether they are GFE or BYOD, is a foremost concern of government CIOs, IT, and security personnel. So how does a government agency strike a balance between protecting government information while at the same time, leveraging the capabilities of mobile devices to maximize productivity of today’s mobile government worker? In this webcast, Rick Walsh, Mobility Lead, U.S. Army G6 CIO, will discuss how the U.S Army is leveraging mobility to enable soldiers to securely use their device in their home station or on deployment.
Sponsored By Samsung