In this session, IBM will provide an overview of its big data platform including software tools that can speed the development and deployment of new capabilities. IBM will also discuss how low-latency grid management software is helping organizations solve cluster sprawl in Hadoop and other distributed cluster environments by enabling diverse analytics applications to share resources dynamically on an agile, cost-efficient, multitenant infrastructure.
Sponsored By IBM
In this webcast, an industry expert will share how these tools can help your agency optimize your business processes and create a mobile strategy that supports individual function areas while furthering the agency’s long-term vision. In addition, the webcast will explore best practices and lessons-learned implementing specific solutions agency-wide.
Sponsored By AT&T
James McClellan, CTO of NASA’s Johnson Space Center has helped NASA move to a Voice Over Internet Protocol (VoIP) system that opened the door for unified communications at the agency. In the webcast he will discuss how this system allows the user greater flexibility and can determine the best means of contact based on their needs.
Sponsored By PCMG, Cisco
In this webcast, Kimberly Hancher, CIO of the U.S. Equal Employment Opportunity Commission, will discuss how to develop and roll out a mobile strategy that addresses both the management concerns of the agency and the performance concerns of end-users. In recent years, EEOC has been in the forefront of federal efforts in mobility. Hancher, who has been with EEOC since 2008, will share best practices and lessons learned from her agency’s pioneering work.
Sponsored By CA Technologies
Federal IT executives worry about threats to their information infrastructures that often accompany mobile device use – concerns abound about data loss or leakage, exposure of sensitive government systems, financial loss, and other issues. Employees in turn complain that inelegant or poorly implemented mobile environments can hamper their work. How can public sector departments properly architect a mobile environment that both enables users and protects agency assets?
Join this exclusive Webcast for an in-depth look at these issues.
Sponsored By CDW-G, Symantec
In this session we will discuss how this vast wealth of ever-changing data from the endpoints and servers scattered across the enterprise can be harnessed as a source for big data security analytics. We will demonstrate how this data can be captured and leveraged for security analytic purposes in order to expose hidden threats lurking underneath the deluge of endpoint activity.
Sponsored By Guidance Software
The cloud is rapidly emerging as an essential component in the federal government’s vision of a mobile workforce. Through the cloud, agencies can make data, applications and services readily available to their employees, regardless of their location. In this webcast, the audience will learn how to develop a strategy that takes full advantage of the cloud while also addressing concerns about security and performance.
Sponsored By Carpathia
Join Mike McCarthy, Director of the Mission Command Complex for the Brigade Modernization Command at Fort Bliss, Texas as he offers insights on how to deploy MDM and MAM solutions that are both robust and flexible enough for the federal enterprise. For the past three years Mr. McCarthy has served as Co-Lead for the US Army's, “Connecting Soldiers to Digital Applications” Army smartphone project, putting the latest smartphone technology into the hands of soldiers on deployment as well as stateside.
Sponsored By PCMG
For federal agencies, cyber attacks are a fact of life. Since 2006, the number of cyber incidents reported by federal agencies has increased by 782 percent, according to the Government Accountability Office. And with the emergence of a new generation of advanced malware, zero-day exploits, and targeted advanced persistent threats (APTs), these attacks are becoming increasingly sophisticated and successful. Traditional security defenses are no longer effective. Organizations need an advanced, game-changing technology to enable timely detection and protection. In this webinar you will learn why Advanced Persistent Threats (APTs) are successful, the anatomy of actual attack scenarios and their multi-stage approach and how a new model for advanced threat detection can protect your agency.
Sponsored By FireEye
This webcast will provide a breakdown of the unique challenges of mobile security – and offer insight into how to meet them. This roundtable discussion will feature two experts: William Corrington former chief technology officer with the Department and Interior; and Mike Zirkle, Associate Director of Public Sector Solutions & Marketing, Verizon Enterprise Solutions.
Sponsored By Verizon Wireless
Numerous government agencies are getting serious about collaboration because each sees opportunities to improve enterprise-wide information sharing and productivity, support real-time communications during crises, or reduce the money spent on large in-person meetings or conferences. Join this exclusive Webcast for an in-depth look at which online tools and techniques are most effective in enhancing greater collaboration.
Sponsored By Adobe
Government IT execs work hard to protect their assets from outsider “cyber” attacks. But increasingly, insider threats are causing their share of headaches. Although often the result of benign and well-intentioned mistakes, agency employees can often be the purveyors of security mayhem in part due to their increased mobility, the avalanche of mobile device use, and the inexorable demand for greater connectivity and more access to data and applications.
Join us for this exclusive Research Webcast for an in-depth look at these issues and the solutions used to solve them.
Sponsored By Vormetric