What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts

  • Identity Theft: What Agencies Need to Know about the Threat Landscape

    Every year, identity theft causes untold anguish and millions of dollars lost to stolen goods and services. Identity theft as related to government agencies and government employees takes on a greater urgency considering the data to which government employees have access. And the problem is not going away or mitigating. The Federal Trade Commission (FTC) has ranked identity theft as the number one complaint for 15 years in a row. And identity theft related fraud occurring against government agencies is now the leading complaint, overtaking credit card fraud. How can government agencies best protect their programs from identity fraud? And how can government agencies help protect consumers/individuals against nefarious identity thieves? In this special Webcast, subject matter experts from both the Identity Theft Resource Center (ITRC) and the FTC will offer their perspectives on the current identity theft related fraud "threatscape." 09/17/2015

  • Cloud Computing: Serving the Integrated Enterprise

    Mobility and an array of related technologies have turned agencies into de facto distributed enterprises, with employees expecting to access data and services from wherever they need to work, whether on the road, at home, or even just across campus. Fortunately, cloud makes it possible for agencies to extend the enterprise without compromising on security or manageability. In this webcast, Patrick Stingley, CTO for the Bureau of Land Management at the Department of the Interior, will discuss how this can be done. In particular, he will talk about how to architect the enterprise to take full advantage of cloud capabilities and realize significant cost-savings. 09/15/2015

  • Implementing the DATA Act: The Path to Government Transparency

    The 2014 Digital Accountability and Transparency (DATA) Act is a game-changer. The goal is to publish all federal spending data online in standardized format, providing an unprecedented level of government transparency and accountability for taxpayers. But this will not happen overnight. In this webcast, Christina Ho, Deputy Assistant Secretary for Accounting Policy and Financial Transparency at the Department of Treasury, will offer insights into how agencies can begin transforming their management of data and paving the way to the full implementation of the DATA Act. 08/27/2015

  • Veritas NetBackup 7.7: Transform IT to Business Enabler in a Single Solution for your Entire Enterprise

    Learn how to simplify enterprise data protection and increase visibility to make better decisions. We’ll introduce Veritas NetBackup 7.7 and explain how it can help reduce complexity, scale with growth, and become more agile. We’ll provide strategies and best practices for managing the relentless growth of the data center, implementing efficient storage techniques, and how to obtain fast, easy recovery for any data you need. Start solving the diverse challenges of backup and recovery and find out how you can move faster and take bigger risks trusting that your information is safe! 08/26/2015

  • The Start of Something Big in Data & Design

    Apache Spark™ has made it possible for data scientists to build models quickly and iterate faster so more people can apply deep intelligence into every application, including IoT, machine learning, web, mobile, social, business process, and more. 08/25/2015

Whitepapers

  • Internet Security Threat Report

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 57.6 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Intelligence, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.

  • Mobility and Security: On the Cutting Edge

    Every year, more federal employees use mobile devices to collaborate with coworkers, engage with citizens, collect and transmit data, and remain productive while out of the office. According to Mobile Work Exchange, 90 percent of government employees use mobile devices today, and that number is expected to rise even further over time. With the increased use of mobile devices, agencies need to increase their security measures. Download this article find out how your agency can maintain high mobility while maintaining a high level of security.

  • Guide to Selecting Flash for Virtual Environments

    Performance and user experience concerns have prevented certain enterprise applications from being virtualized. The high performance and low latency of flash can enable these applications to be virtualized. In order to maximize your return on flash investment however the total number of Virtual Machines per physical server must increase dramatically.

  • Cloud Services: Host of Benefits for Federal Agencies

    Cloud services represent a new relationship between enterprises and service providers that may save the enterprise money, reduce contract terms and provide the agility to get new services and resources up and running instantly. Download this article to find out more about factors to consider when selecting a cloud service.

  • Building a Highly Secure Cloud Ecosystem

    This paper discusses how your agency should partner with CSPs to apply a multi-level cybersecurity strategy that spans both agency and CSP IT assets and services, while addressing your security and compliance requirements. By clearly defining security roles and responsibilities, both agencies and CSPs can move forward towards a common goal: protecting citizen and mission-critical data from unauthorized access, disclosure, modification or monitoring.

Resources