What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts

  • Cloud Computing: Platform for Innovation

    Without a doubt, agencies have discovered that cloud computing is a powerful tool for improving the performance and cost-effectiveness of the enterprise. But increasingly agencies are realizing that it is more than that. They also are realizing that cloud, with its flexibility and scalability, serves as an ideal platform for innovation. In this webcast, Navin Vembar, IT Director, Integrated Award Environment, General Services Administration will offer insights into how to build on cloud to offer innovative services. 07/21/2015

  • Improving Security within Federal End User Computing

    Within Federal information systems, day-to-day operations are subject to a diverse array of endpoint security threats. Join this webcast sponsored by Dell and Intel® to hear from experts how to address the ever-changing endpoint security burdens within Federal. You will learn how Dell can help Fed address data protection, authentication, and encryption all with centralized management. If maintaining security, productivity, and manageability are key to your success, please attend. Also during this session, you will receive information on Dell tablets and notebooks solutions featuring Intel® Core™ vPro™ processor family . Offering an edge in security, the Intel® Core™ vPro™ processor family is designed to strengthen security across the organization. 07/14/2015

  • Situational Awareness for Cybersecurity and IT Operations

    For IT, a lack of visibility means a lack of control. With wire data analytics, you get the situational awareness you need to detect breaches, identify applications and dependencies, optimize IT infrastructure, and gather real-time intelligence. 07/01/2015

  • Inside Continuous Monitoring, Insider Threat and Beyond - Session 3

    Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services. 06/17/2015

  • Changing the Talent Game: Find and Keep More High Performers on Your Team with Analytics

    With top performing talent in high demand, HR leaders need to change how they recruit, engage, develop, and retain people in order to optimize business results. Recent advances in the technology and application of talent analytics provide a key strategy that all HR leaders need to add to their HR toolbox. 06/10/2015

Whitepapers

  • Taking an Enterprise-Wide View of Service Delivery

    To modernize their IT services, federal CIOs are moving away from email and spreadsheets to manage their business. They are consolidating disparate and legacy systems onto a common platform, automating manual tasks and standardizing work processes. Download this whitepaper to read more on how to find the right IT service delivery solution for your organization.

  • Essential Guide to Synchronous Learning, Web Conferencing and Real-Time Collaboration

    Are training and employee development programs engaging your employees? Do your online meeting tools meet the needs of your business? Download this guide to learn more about which factors your organization should consider when choosing synchronous learning, web conferencing, and real-time collaboration programs.

  • Executive Insights: Clearing the Compliance Hurdle

    Working with FedRAMP-certified vendors, agencies can leverage pre-approved expertise, facilities and resources to get the most benefit from the cloud. Download this whitepaper to learn more insights on cloud computing, including how to overcome obstacles to compliance.

  • Case Study | Ready, Aim, HP Fortify!

    Download this informative case study to see how the U.S. Army deployed an application security regimen for munititions system to help prevent attacks by identifying and eliminating vulnerabilities in the munitions management software application to ensure training superiority and achieve readiness objectives.

  • Breaking the Cyber Attack Lifecycle

    Find out why the new reality is that old enterprise security methods aren’t working. At this stage, the security industry is overinvested in products and technology, and underinvested in people and processes. The technology and tools that are currently in place often can’t be effectively managed. What’s required is a holistic approach to enterprise security that stops matching weapon for weapon and instead shifts focus to protecting what’s actually important to the business.

Resources