What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Vendor Webcast List


Upcoming

Cloud Solutions: Building in Security from the Ground Up

When it comes to cloud solutions, agencies need options. Although a public cloud offering might make sense in some cases, it is not feasible in cases in which security and privacy are a concern. In this webcast, a panel of cloud security specialists from government and industry will discuss strategies and emerging solutions for developing a sound cloud-based approach to managing their applications and data.

Date: Oct 07, 2014

Time: 2:00pm


Path to Safe Cities

Large urban population brings tremendous economic opportunities together with a myriad of public safety risks. These risks are increasing in diversity and intensity. How can city governments/education establishments protect its citizens/students and facilitate society’s well-being in the face of these existing and emerging threats? The stowaway security breach incident at San Jose Airport earlier this year is just one example of why the traditional labor intensive approach may need to be enhanced. View this webcast to learn the path to safe cities.

Date: Oct 29, 2014

Time: 2:00pm


On Demand

Government Cloud: A New Era in Collaboration

Demand for online collaboration tools and services throughout the public sector is skyrocketing – and for good reason. Enabling government employees to collaborate with their colleagues, coworkers, suppliers and stakeholders both within and outside government promises to boost efficiency and foment the frictionless flow of knowledge. Numerous government agencies are getting serious about collaboration because each sees opportunities to improve information sharing and productivity, support real-time communications during crises and reduce the money spent on large in-person meetings or conferences.


Best Practices for Network and Storage Efficiency

IT executives throughout the public sector are eager to enhance how agency data is captured, processed, analyzed and stored. Faced with skyrocketing demand from government workers, the military and citizens, decision-makers are pondering how best to build out their networking and storage infrastructures to improve application performance and responsiveness while at the same time reduce costs.


The Virtualization Playbook: Impact on Public Sector Data Storage

In order to cope with the day-to-day challenges of IT management many agencies turn to virtualization technologies.


Healthcare and mobility: How mobile solutions are revolutionizing patient care

Healthcare and mobility: How mobile solutions are revolutionizing patient care Increasingly, healthcare organizations are providing medical professionals with mobile technology through which they can access patient information easily from anyplace a patient might be. This webcast will share best practices and lessons learned from one of the largest healthcare delivery systems in the United States.


IBM i2 Intelligent Law Enforcement Demo

Law enforcement software enables agencies to generate actionable insights that can help reduce crime and improve public safety. Learn how your agency can integrate analysis, lead generation and communication technologies to provide a holistic view of data for policing and partner agencies.


IBM i2 National Security and Defense Intelligence Demo

In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.


Cyber Threat Intelligence: How to Leverage Emerging Tools and Tactics

Learn how your enterprise can get ahead of cybersecurity attacks and more effectively defend its core assets by leveraging HP’s worldwide Threat Research community insights.


Health Information Sharing: Evolving strategies for health information exchanges

For years now, the federal government has been working with health IT experts across the country to develop health information exchanges through which healthcare organizations can share information effectively and securely. This webcast will look at how emerging technology is making HIEs more effective and more secure than ever.


Big Data in the Cloud

Big Data potentially is one of the most important technology trends in recent years in the government IT community. Agencies can take advantage of a booming market of commercial tools and techniques for extracting insights from their data to inform decision-making and improve operational efficiencies. This webcast will look at approaches agencies might take to modernize their IT systems and position themselves to leverage the potential of Big Data, cloud, mobility and other key technologies.


A Better Approach to the Cloud: The Case for Hybrid

Too often agencies have rushed into cloud computing by adopting a public commercial service that doesn’t maximize existing investments or offer the customization around security, compliance, and performance that they require. Consequently, they end up with siloed infrastructures that hinder information sharing and reduce cost-effectiveness. But there is an alternative: the hybrid cloud. Hybrid strategies enable agencies to seamlessly manage applications and data across multiple cloud and on-premise platforms, delivering the freedom to tailor computing environments to unique mission needs. Attend this webcast to learn how to leverage the power of hybrid to make the most of your existing infrastructure while pursuing FEDRamp-compliant cloud solutions.


Private and Hybrid Clouds: A More Cost-Effective, Manageable Approach

As federal agencies continue to increase their investments in private and hybrid clouds, the cost and complexity of their environments are increasing as well. But there is a better way. A new generation of cloud software makes it possible to provide common cloud services for compute, network and storage while supporting multiple hypervisors and multi-vendor platforms. This approach enables self-service and bill-back enabling services based IT by allowing line IT managers to deploy systems in minutes with the push of a button. Additionally, it provides ongoing service lifecycle management and the flexible platform to automate assets that most organizations are already using.


The Hybrid Cloud: Insights from the Intelligence Community

From the beginning of the cloud computing trend, agencies have wrestled with which approach to take: A public cloud, in which their applications and data are managed by a commercial cloud provider, or a private cloud, in which they reside on an internal system. As it turns out, it often is not a clear-cut answer. Any given agency is likely to have some applications and data that might be appropriate for a commercial cloud service, while others clearly belong on a private cloud. That is where the hybrid cloud comes in. The hybrid cloud provides agencies with the flexibility and manageability they need to manage a mixed cloud environment. In this webcast, Todd Myers, Lead Global Compute Architect at the National Geospatial-Intelligence Agency, will share insights and lessons learned in hybrid cloud from this ground-breaking project.


Collaboration in the Cloud

Government employees increasingly find that they cannot work in a vacuum. Instead, they must work with other employees in their agency – or employees in other agencies – to support essential government services. Without a doubt, when it comes to collaboration, the cloud is the underlying platform of choice.


Transforming the Data Center for Immediate Cost Savings

Learn how to leverage the full capabilities of virtualization by adopting a converged infrastructure that combines the compute (server) tier and the storage tier into a single system.


Empowering the Mobile Workforce: Best Practices and New Solutions

In this webcast, an industry expert will share how these tools can help your agency optimize your business processes and create a mobile strategy that supports individual function areas while furthering the agency’s long-term vision. In addition, the webcast will explore best practices and lessons-learned implementing specific solutions agency-wide.


Continuous Monitoring to Detect Advanced Persistent Threats

For federal agencies, cyber attacks are a fact of life. Since 2006, the number of cyber incidents reported by federal agencies has increased by 782 percent, according to the Government Accountability Office. And with the emergence of a new generation of advanced malware, zero-day exploits, and targeted advanced persistent threats (APTs), these attacks are becoming increasingly sophisticated and successful. Traditional security defenses are no longer effective. Organizations need an advanced, game-changing technology to enable timely detection and protection. In this webinar you will learn why Advanced Persistent Threats (APTs) are successful, the anatomy of actual attack scenarios and their multi-stage approach and how a new model for advanced threat detection can protect your agency.


Getting Beyond the Basics of Mobile Security: A Roundtable Discussion

This webcast will provide a breakdown of the unique challenges of mobile security – and offer insight into how to meet them. This roundtable discussion will feature two experts: William Corrington former chief technology officer with the Department and Interior; and Mike Zirkle, Associate Director of Public Sector Solutions & Marketing, Verizon Enterprise Solutions.


Insights Revealed: Benefits and Best Practices for Effective Collaboration

Numerous government agencies are getting serious about collaboration because each sees opportunities to improve enterprise-wide information sharing and productivity, support real-time communications during crises, or reduce the money spent on large in-person meetings or conferences. Join this exclusive Webcast for an in-depth look at which online tools and techniques are most effective in enhancing greater collaboration.


Big Data: How to Take it to the Next Level

In this webcast, Dr. Mark Luker, Associate Director, NITRD/NCO will present an overview of how the NITRD is working to address emerging challenges of R&D for Big Data. Further, Dr. Luker will reveal how several agencies are currently leveraging Big Data to improve their citizen service and advance their overarching missions.


Empowering Federal Employees to Work the Way they Live

A growing number of Federal agencies have adopted new technologies to empower employees to be more productive and work the way they live, while also reducing the costs and resources needed to maintain their internal systems. It’s a true win-win. Join this informative webinar to hear about the changing face of workplace productivity tools for Federal employees.


What You Don’t Know CAN Hurt You: Eliminating Cyber Security Blind Spots and Optimizing Incident Response

Join Jason Mical, Vice President of Cyber Security at AccessData Group and Dale Beauchamp, Branch Manager in the Information Assurance and Cyber Security division of the TSA, as they describe how the cyber security model is evolving and discuss the capabilities that are required to overcome these detection and response obstacles.


Cloud Migration: Benefits and Challenges

Wolf Tombe, Chief Technology Officer at the US Customs and Border Protection (CBP) has navigated CBP’s migration to the Cloud. In this webcast, you will learn about CBP’s journey to the Cloud, including their security requirements and other adoption challenges. Learn how Tombe and his team were able to not only save money, but also improve the IT resources.


Defending Data ... New Insights on Winning the Cyber War

You can learn more about the role of big data in cyber security in this webinar that provides new insight based on discoveries from just-released research on Big Data Analytics and Cyber Defense from the Ponemon Institute & Teradata. Dr. Larry Ponemon, Chairman & Founder of the Ponemon institute and Sam Harris, Director of Cyber Security and Enterprise Risk Management for Teradata will share results from the study and discuss how to take enterprise-wide security to the next level leveraging big data analytics.


Going Mobile: Ingredients for a Successful Mobility Strategy

The need to improve operational performance and deliver better citizen service is universal across government. To meet this need, federal agencies are embracing mobile tools and solutions that fundamentally change how they operate and interact with citizens. In this webcast, NRC CIO Darren Ash will share how the NRC crafted a forward looking mobile strategy that supports individual function areas while furthering the agency’s long-term vision.


Document and Information Security: Protecting Information in the 3rd Platform

As organizations in the Public Sector increasingly adopt the use of mobile devices, and move more towards electronic document workflows, it is vital to have a security plan that addresses device, document, user, and data security. In this Webcast, you will learn from Industry Analyst Keith Kemetz , VP of IDC’s Hardcopy Peripherals Solutions and Services, and others about current key trends and solutions for ensuring Document and Information Security, addressing topics such as BYOD, Cloud and Mobile Printing.


Continuous Monitoring: How to Get It Right

In this webcast, hear from Dr. Ron Ross, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST) the steps they took in planning, meeting requirements and deploying an effective continuous monitoring program. Hear from his perspective the dos and don’ts to maintain ongoing awareness of information security, vulnerabilities, and threats. Learn how NIST ensured their IT systems are effective and appropriate for the organization’s level of risk tolerance.


Transforming Agency Networks: Modernize to Meet Today’s Demands

Network infrastructure modernization is on the wish list of many agencies due to growing demand for bandwidth and improved IT service delivery. But modernization requires money – which is in short supply these days. Register for this webcast to hear about these issues through survey results sourced by public sector IT leaders and business decision makers.


Business Continuity: The Case for Cloud

This webcast will explore how federal agencies understand how to make the cloud part of their business continuity plans. Captain Shawn Hendricks, Program Manager, Naval Enterprise Networks will lead a discussion on what resources you need to consider, what standards should be in place and how to fully capitalize on faster recovery times by trusting the cloud.


The Power of One – The Cisco Unified Workspace Architectural Approach

The Cisco Unified Workspace enables government organizations to transform how they communicate and collaborate by taking a strategic architectural approach—an approach that provides the flexibility and scalability to adapt as priorities evolve.


Mobilize your Agency’s Workforce with Holistic Mobile Enterprise Management Solutions

Tune in for tips to help you remain focused on your agency’s mission while embracing the expanding presence of mobile applications and devices within your agency’s work environment. Learn how to define your mobility requirements and apply best practices and proven frameworks to address nearly every government mobility challenge.


How to Implement, Secure, and Manage Mobility in Federal Agencies

Attend this webinar to learn how to how to implement access and policy management solutions that address these concerns to connect any user on any device from any location to applications, wherever they reside.


A Closer Look at How FEDRAMP Certification Assures Cloud Security

This webcast will take a closer look at FedRAMP’s security controls and process. In this webcast, Dave McClure, Associate Administrator, Citizen Services and Innovative Technology, General Services Administration, will lead a dynamic discussion about the FedRAMP program as well as what the security standards really mean to agencies cloud investment.


Exclusive Research Webcast: Methods and Insights into Managing Mobile Securely

Mobile devices like smart phones and tablets are increasingly vital to the job success of Federal agency employees.Federal IT and business decision-makers worry about threats to their information security infrastructures that often accompany mobile device use. Join us as we reveal the findings of this recent exclusive research report on mobile security and address the question, “How can Federal agencies properly architect a secure mobile environment that protects both users and the agency network? “


The Building Blocks of Cloud Computing: How to Boost the Efficiency, Availability and ROI of the Enterprise through Virtualization

Join us for this second webcast in a three-part series titled “Three Strategies for Lowering the Cost of Government through IT Innovation”. This webcast will be a round table discussion where federal IT leaders will share their best practices and lessons learned. Participants will get an inside glimpse on how to set the foundation for a cloud ready infrastructure and how to bring a modern mindset to their organization.


How to Increase Regulatory Compliance while Reducing Costs and Resource Requirements

The growth of information is doubling every 18 months. And most of this growth is from unstructured sources. Federal agencies are faced with the challenge of managing this information so that it is readily available to users that need it – while also ensuring that their information systems comply with the increasingly stringent regulatory requirements. Join us on this complimentary webcast to learn how to craft an information management strategy that effectively balances the need for usability, regulatory compliance and cost.


Shared system access with Identity Federation

Identity federation provides a secure foundation for your organization to collaborate with others, leveraging resources and expertise to help better meet your mission and objectives. Managing federated identities has technological and organizational benefits. To achieve these benefits, formal trust mechanisms among participants with different IT systems have to be implemented, along with agreement on who is to be granted access to which specific systems, applications, services, and information. Register now to explore all aspects of Identity Federation.


Building on the Cloud: Paving the Way for a ‘Future Ready’ Workforce

In this webcast, Mr. Bajinder Paul, Deputy Associate Administrator of General Services Administration discusses the policy, security and cultural considerations for agencies looking to integrate tools and technologies to improve the productivity of their employees and the efficiency of their operations.


Rethinking Federal Data Center Consolidation: Achieve Your Goals without Sacrificing Security or Performance

While the promise of lower costs and higher efficiencies are appealing, IT is rightfully cautious about the risks of managing enormous volumes of network traffic flowing into a centralized, virtualized infrastructure. Join us for an informative discussion on strategies that will allow you to achieve the benefits of consolidation while addressing the key concerns.


Unified Communications: Helping Agencies Connect

Connecting people to people, anywhere, anytime, on any device is not just an idea but a reality for today’s government agencies to conduct their daily business requirements.


The Latest Advances in Business Process & Operational Decision Management for Government

Business Process and Operational Decision Management (ODM) platforms have evolved to address the key challenges facing governmental agencies; one of those being the increasing demands of non-technical users for more social and simple on-the-job tools.


Research Webcast on Big Data: From Hype to Reality

Many government agencies have already commenced Big Data initiatives and have discovered that their decision-making is now faster and more fact-based, citizen-facing services are delivered more efficiently, and security risks are more detectable. Join us for this exclusive Research Webcast for an in-depth look on Big Data and the issues that will be at the top of government IT agendas.


Leveraging the Advanced Threat Platform to Stay Ahead of the Threat

Find out about how the Advanced Threat Protection Platform solutions help protect against network-based threats masked in common network traffic and prevents attackers from exploiting vulnerabilities at the network, host and application layers


Joint Task Force - Homeland Defense Builds a Common Operational Picture with Google Earth

The security for the Asia-Pacific Economic Collaboration summit in 2011 in Honolulu, Hawaii involved many federal, state & local agencies. The complex task of coordinating information sharing among agencies was the responsibility of Joint Task Force - Homeland Defense (JTF-HD). JTF-HD turned to Google Earth technology to build a visualization capability that enabled all agencies to share information easily & ensure a safe and secure summit.


The Impact of Big Data: Transcending to Smart Government

Join Iron Mountain for this Webinar entitled, The Impact of Big Data: Transcending to Smart Government. Featuring Adelaide O'Brien, Research Director, Smart Government Strategies, IDC Government Insights, during the webinar she will highlight findings from Government IT decision makers and review relevant federal mandates that impact Government Big Data.


Enhance Federal Workforce Effectiveness with Mobile and Cloud

Federal agencies are challenged with enhancing the services they deliver to their workforce and constituents in a fast paced, information rich, resource constrained environment.


Register Now

Cost Savings and Security Benefits with MPS

The Federal goverment is always looking for ways to cut costs and one area that often gets overlooked is document related activities. Managed Print Services can look at the document infrastructure and find ways to reduce costs, gain productivity, as well as solve security issues around documents.


Register Now

Federal IT: Consolidating Your Data Securely in a Cloud

In an era of mandated consolidation of data centers and migration of agency workloads to the cloud, Federal IT decision makers look for the best practices and guidance. With mounting pressure to comply with a growing number of efficiency mandates, the key areas they’ll need to address are the streamlining of infrastructure in compliance with the Federal Data Center Consolidation Initiative (FDCCI), and identifying and securing their cloud-based workloads.


Register Now

Getting Started: Removing Administrator Rights & Setting up Policies to Elevate Privileges for Standard Users

Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks – yet having free reign on software installation and endpoint based operations often leads to malware and data breaches that are very costly. Moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks.