What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


On Demand

Register Now

Data Management Fundamentals for Effective Government

A webinar examining emerging usage scenarios for government data, then suggest ways to leverage data management processes to enable more effective data use.


Register Now

Proactive FOIA and eDiscovery: Ensuring Transparency

Transparency, content integrity, controlling costs and managing complexity are FOIA and eDiscovery challenges. Data volumes have increased, new data types are emerging, potentially relevant data roams across your agency network, the cloud, and social media outlets and finally quick FOIA response and eDiscovery production are demanded. It is imperative that you proactively prepare for FOIA requests and litigation, simplify your workflow and make eDiscovery costs predictable.


Register Now

First Look at Red Hat Enterprise Virtualization 3.0: There's A New Sheriff in Town

Join this live webinar for a beta preview on how Red Hat delivers more value through open source subscriptions and helps to transform enterprise IT from a costly, inflexible model to greater innovation offered by open source software.


Register Now

Federal Cloud Security Initiatives Explained - Choosing the Right Standards and Technologies

Mapping the alphabet soup of federal cloud security initiatives is a daunting task. Tim Grance from the National Institute of Science and Technology (NIST) and federal security expert Gunnar Peterson join forces to decompose the funded programs and standards initiatives to recommend an adoption path for cloud security.


Register Now

Maximizing The Value Of Virtualization

This webcast highlights an end to end virtualization solution that unifies server and storage in order to help your agency increase the value of virtualization, streamline deployments and recognize cost cutting efficiencies.


Register Now

Why Your Cloud-First Step Should Be IT Service Management

With shrinking IT budgets and looming data center consolidation projects, leading agencies view the Cloud-first mandate as an opportunity to reshape their IT strategy. The Cloud promises to save agencies money and help them to become more efficient. While this is true, it’s not as simple as flipping a couple switches.


Register Now

DOD's 5 Strategic Initiatives for Cyberspace Operations

Join the Defense Systems editors in this webcast to hear leading experts discuss how internal and external cyber threats against DOD systems can be addressed through good cyber hygiene and greater situational awareness.


Register Now

Fight Back Against Spear-phishing - Arm the User

Spear-phishing, poisoned search results, drive-by downloads -- legitimate sites being hijacked to push malware. All of these threats are the current reality and users are running into these attacks daily. Register now for this free webcast and learn how you can stop these attacks dead in their tracks by arming your users' browsing and PDF reader environments.


Register Now

Architecting Your Data Center Today for the Cloud Tomorrow

Today's government data center networks are under tremendous pressure to increase efficiencies, improve agility, and scale – all while budget constraints continue to place great stress on IT organizations. Join Juniper Networks’ Chief Security Architect Christofer Hoff, as he walks through the different cloud environments and describes the necessary steps to create a cloud-ready data center.


Register Now

7 Effective Tips for Securing Sensitive Documents from Internal Breaches

Join us for this critical webcast to hear what improved solutions are available to government personnel and contractors to restrict unauthorized access to sensitive data and learn about seven commonly overlooked, at-risk areas of vulnerability.


Register Now

Transforming Military Logistics with Defense Analytics

Data analytics is the "information transformer" for many military and DoD agencies, bringing relevant data together to improve timeliness, effectiveness, and accuracy of decisions and decision-making. Join this online event and hear leading defense industry experts and 1105 Government Information Group editors discuss how an enterprise-wide logistics system can improve organizations.


Register Now

Insider Threats Have No Boundaries, Neither Should Your Analytics Tool

Today's military forces need to be able to rapidly identify the actions and trends of individuals that will remove sensitive/classified information and act before the damage has occurred. Join us for this interactive webcast and discover how your operations can rapidly perform complex threat assessment analysis and more.