What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here

Vendor Webcast List

On Demand

Defending Data ... New Insights on Winning the Cyber War

You can learn more about the role of big data in cyber security in this webinar that provides new insight based on discoveries from just-released research on Big Data Analytics and Cyber Defense from the Ponemon Institute & Teradata. Dr. Larry Ponemon, Chairman & Founder of the Ponemon institute and Sam Harris, Director of Cyber Security and Enterprise Risk Management for Teradata will share results from the study and discuss how to take enterprise-wide security to the next level leveraging big data analytics.

Going Mobile: Ingredients for a Successful Mobility Strategy

The need to improve operational performance and deliver better citizen service is universal across government. To meet this need, federal agencies are embracing mobile tools and solutions that fundamentally change how they operate and interact with citizens. In this webcast, NRC CIO Darren Ash will share how the NRC crafted a forward looking mobile strategy that supports individual function areas while furthering the agency’s long-term vision.

Document and Information Security: Protecting Information in the 3rd Platform

As organizations in the Public Sector increasingly adopt the use of mobile devices, and move more towards electronic document workflows, it is vital to have a security plan that addresses device, document, user, and data security. In this Webcast, you will learn from Industry Analyst Keith Kemetz , VP of IDC’s Hardcopy Peripherals Solutions and Services, and others about current key trends and solutions for ensuring Document and Information Security, addressing topics such as BYOD, Cloud and Mobile Printing.

Continuous Monitoring: How to Get It Right

In this webcast, hear from Dr. Ron Ross, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST) the steps they took in planning, meeting requirements and deploying an effective continuous monitoring program. Hear from his perspective the dos and don’ts to maintain ongoing awareness of information security, vulnerabilities, and threats. Learn how NIST ensured their IT systems are effective and appropriate for the organization’s level of risk tolerance.

Transforming Agency Networks: Modernize to Meet Today’s Demands

Network infrastructure modernization is on the wish list of many agencies due to growing demand for bandwidth and improved IT service delivery. But modernization requires money – which is in short supply these days. Register for this webcast to hear about these issues through survey results sourced by public sector IT leaders and business decision makers.

Business Continuity: The Case for Cloud

This webcast will explore how federal agencies understand how to make the cloud part of their business continuity plans. Captain Shawn Hendricks, Program Manager, Naval Enterprise Networks will lead a discussion on what resources you need to consider, what standards should be in place and how to fully capitalize on faster recovery times by trusting the cloud.

Mobilize your Agency’s Workforce with Holistic Mobile Enterprise Management Solutions

Tune in for tips to help you remain focused on your agency’s mission while embracing the expanding presence of mobile applications and devices within your agency’s work environment. Learn how to define your mobility requirements and apply best practices and proven frameworks to address nearly every government mobility challenge.

The Power of One – The Cisco Unified Workspace Architectural Approach

The Cisco Unified Workspace enables government organizations to transform how they communicate and collaborate by taking a strategic architectural approach—an approach that provides the flexibility and scalability to adapt as priorities evolve.

How to Implement, Secure, and Manage Mobility in Federal Agencies

Attend this webinar to learn how to how to implement access and policy management solutions that address these concerns to connect any user on any device from any location to applications, wherever they reside.

A Closer Look at How FEDRAMP Certification Assures Cloud Security

This webcast will take a closer look at FedRAMP’s security controls and process. In this webcast, Dave McClure, Associate Administrator, Citizen Services and Innovative Technology, General Services Administration, will lead a dynamic discussion about the FedRAMP program as well as what the security standards really mean to agencies cloud investment.

Exclusive Research Webcast: Methods and Insights into Managing Mobile Securely

Mobile devices like smart phones and tablets are increasingly vital to the job success of Federal agency employees.Federal IT and business decision-makers worry about threats to their information security infrastructures that often accompany mobile device use. Join us as we reveal the findings of this recent exclusive research report on mobile security and address the question, “How can Federal agencies properly architect a secure mobile environment that protects both users and the agency network? “

The Building Blocks of Cloud Computing: How to Boost the Efficiency, Availability and ROI of the Enterprise through Virtualization

Join us for this second webcast in a three-part series titled “Three Strategies for Lowering the Cost of Government through IT Innovation”. This webcast will be a round table discussion where federal IT leaders will share their best practices and lessons learned. Participants will get an inside glimpse on how to set the foundation for a cloud ready infrastructure and how to bring a modern mindset to their organization.

How to Increase Regulatory Compliance while Reducing Costs and Resource Requirements

The growth of information is doubling every 18 months. And most of this growth is from unstructured sources. Federal agencies are faced with the challenge of managing this information so that it is readily available to users that need it – while also ensuring that their information systems comply with the increasingly stringent regulatory requirements. Join us on this complimentary webcast to learn how to craft an information management strategy that effectively balances the need for usability, regulatory compliance and cost.

Shared system access with Identity Federation

Identity federation provides a secure foundation for your organization to collaborate with others, leveraging resources and expertise to help better meet your mission and objectives. Managing federated identities has technological and organizational benefits. To achieve these benefits, formal trust mechanisms among participants with different IT systems have to be implemented, along with agreement on who is to be granted access to which specific systems, applications, services, and information. Register now to explore all aspects of Identity Federation.

Building on the Cloud: Paving the Way for a ‘Future Ready’ Workforce

In this webcast, Mr. Bajinder Paul, Deputy Associate Administrator of General Services Administration discusses the policy, security and cultural considerations for agencies looking to integrate tools and technologies to improve the productivity of their employees and the efficiency of their operations.

Rethinking Federal Data Center Consolidation: Achieve Your Goals without Sacrificing Security or Performance

While the promise of lower costs and higher efficiencies are appealing, IT is rightfully cautious about the risks of managing enormous volumes of network traffic flowing into a centralized, virtualized infrastructure. Join us for an informative discussion on strategies that will allow you to achieve the benefits of consolidation while addressing the key concerns.

Unified Communications: Helping Agencies Connect

Connecting people to people, anywhere, anytime, on any device is not just an idea but a reality for today’s government agencies to conduct their daily business requirements.

The Latest Advances in Business Process & Operational Decision Management for Government

Business Process and Operational Decision Management (ODM) platforms have evolved to address the key challenges facing governmental agencies; one of those being the increasing demands of non-technical users for more social and simple on-the-job tools.

Research Webcast on Big Data: From Hype to Reality

Many government agencies have already commenced Big Data initiatives and have discovered that their decision-making is now faster and more fact-based, citizen-facing services are delivered more efficiently, and security risks are more detectable. Join us for this exclusive Research Webcast for an in-depth look on Big Data and the issues that will be at the top of government IT agendas.

Leveraging the Advanced Threat Platform to Stay Ahead of the Threat

Find out about how the Advanced Threat Protection Platform solutions help protect against network-based threats masked in common network traffic and prevents attackers from exploiting vulnerabilities at the network, host and application layers

Joint Task Force - Homeland Defense Builds a Common Operational Picture with Google Earth

The security for the Asia-Pacific Economic Collaboration summit in 2011 in Honolulu, Hawaii involved many federal, state & local agencies. The complex task of coordinating information sharing among agencies was the responsibility of Joint Task Force - Homeland Defense (JTF-HD). JTF-HD turned to Google Earth technology to build a visualization capability that enabled all agencies to share information easily & ensure a safe and secure summit.

The Impact of Big Data: Transcending to Smart Government

Join Iron Mountain for this Webinar entitled, The Impact of Big Data: Transcending to Smart Government. Featuring Adelaide O'Brien, Research Director, Smart Government Strategies, IDC Government Insights, during the webinar she will highlight findings from Government IT decision makers and review relevant federal mandates that impact Government Big Data.

Enhance Federal Workforce Effectiveness with Mobile and Cloud

Federal agencies are challenged with enhancing the services they deliver to their workforce and constituents in a fast paced, information rich, resource constrained environment.

Register Now

Cost Savings and Security Benefits with MPS

The Federal goverment is always looking for ways to cut costs and one area that often gets overlooked is document related activities. Managed Print Services can look at the document infrastructure and find ways to reduce costs, gain productivity, as well as solve security issues around documents.

Register Now

Federal IT: Consolidating Your Data Securely in a Cloud

In an era of mandated consolidation of data centers and migration of agency workloads to the cloud, Federal IT decision makers look for the best practices and guidance. With mounting pressure to comply with a growing number of efficiency mandates, the key areas they’ll need to address are the streamlining of infrastructure in compliance with the Federal Data Center Consolidation Initiative (FDCCI), and identifying and securing their cloud-based workloads.

Register Now

Getting Started: Removing Administrator Rights & Setting up Policies to Elevate Privileges for Standard Users

Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks – yet having free reign on software installation and endpoint based operations often leads to malware and data breaches that are very costly. Moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks.

Register Now

Security and Recovery for Sharepoint

No matter how powerful and effective SharePoint is, the very nature of this power can send SharePoint into unmanaged chaos and expose your organization to content security risks. Protecting your SharePoint content from prying eyes, ensuring its availability to those who need it and auditing all activities and users across your environment are top priorities for compliance driven organizations.

Register Now

Data Management Fundamentals for Effective Government

A webinar examining emerging usage scenarios for government data, then suggest ways to leverage data management processes to enable more effective data use.

Register Now

Proactive FOIA and eDiscovery: Ensuring Transparency

Transparency, content integrity, controlling costs and managing complexity are FOIA and eDiscovery challenges. Data volumes have increased, new data types are emerging, potentially relevant data roams across your agency network, the cloud, and social media outlets and finally quick FOIA response and eDiscovery production are demanded. It is imperative that you proactively prepare for FOIA requests and litigation, simplify your workflow and make eDiscovery costs predictable.

Register Now

First Look at Red Hat Enterprise Virtualization 3.0: There's A New Sheriff in Town

Join this live webinar for a beta preview on how Red Hat delivers more value through open source subscriptions and helps to transform enterprise IT from a costly, inflexible model to greater innovation offered by open source software.

Register Now

Federal Cloud Security Initiatives Explained - Choosing the Right Standards and Technologies

Mapping the alphabet soup of federal cloud security initiatives is a daunting task. Tim Grance from the National Institute of Science and Technology (NIST) and federal security expert Gunnar Peterson join forces to decompose the funded programs and standards initiatives to recommend an adoption path for cloud security.

Register Now

Maximizing The Value Of Virtualization

This webcast highlights an end to end virtualization solution that unifies server and storage in order to help your agency increase the value of virtualization, streamline deployments and recognize cost cutting efficiencies.

Register Now

Why Your Cloud-First Step Should Be IT Service Management

With shrinking IT budgets and looming data center consolidation projects, leading agencies view the Cloud-first mandate as an opportunity to reshape their IT strategy. The Cloud promises to save agencies money and help them to become more efficient. While this is true, it’s not as simple as flipping a couple switches.

Register Now

Fight Back Against Spear-phishing - Arm the User

Spear-phishing, poisoned search results, drive-by downloads -- legitimate sites being hijacked to push malware. All of these threats are the current reality and users are running into these attacks daily. Register now for this free webcast and learn how you can stop these attacks dead in their tracks by arming your users' browsing and PDF reader environments.

Register Now

Architecting Your Data Center Today for the Cloud Tomorrow

Today's government data center networks are under tremendous pressure to increase efficiencies, improve agility, and scale – all while budget constraints continue to place great stress on IT organizations. Join Juniper Networks’ Chief Security Architect Christofer Hoff, as he walks through the different cloud environments and describes the necessary steps to create a cloud-ready data center.

Register Now

7 Effective Tips for Securing Sensitive Documents from Internal Breaches

Join us for this critical webcast to hear what improved solutions are available to government personnel and contractors to restrict unauthorized access to sensitive data and learn about seven commonly overlooked, at-risk areas of vulnerability.

Register Now

Insider Threats Have No Boundaries, Neither Should Your Analytics Tool

Today's military forces need to be able to rapidly identify the actions and trends of individuals that will remove sensitive/classified information and act before the damage has occurred. Join us for this interactive webcast and discover how your operations can rapidly perform complex threat assessment analysis and more.

Register Now

View from the Cloud: Evolving Networks to Yield Government Efficiency

As the industry develops solutions for a wide array of daily agency challenges, the cloud has become more defined. Join us for this complimentary webcast as Ciena’s Jim Morin and Chris Janson provide definitions of the cloud, implications for government networks and advantages offered to government agencies.

Register Now

Secrets to Success: Best Practices for Increasing Agency Online Performance

Government agencies are realizing the true power of an online presence. Attend this free webcast and get a complete picture of an agency’s online presence including an increased constituent satisfaction and a dramatically lower cost of service delivery. You’ll hear about advances in online analytics tools, and the systematic adoption of smart, repeatable best practice techniques.

Register Now

Actionable Intelligence from Advanced SIEM Systems

Join GCN and the leading experts for an insider look at how next generation SIEMs can complement existing security systems, using their high performance and advanced correlation capabilities to quickly view queries, simplify reporting and eliminate the need for database-trained resources.

Register Now

Now and into the Future: A View of Security, Privacy and Trust for the Cloud Era

Though the public sector is ready to embrace cloud technology for the anticipated cost savings and efficiency it promises deliver, many CIOs have valid concerns about the effectiveness of securing highly sensitive data from external and internal cyber threats. Join this online discussion as noted experts debate a number of issues regarding the technological and legal challenges confronting privacy, security and trust posed by cloud computing.

Register Now

Mapping Identity Credential and Access Management to Meet Inter-Agency and Private Cloud Interoperability Challenges

This webcast is now available to view on-demand. Hear Judith Spencer, government agency expert in identity management as she reviews the vision of ICAM; touching on the vulnerabilities it was developed to overcome and the challenges associated with reaching the “end state” required by the Roadmap.

Register Now

Next Gen Rugged Computing: Best Practices for Choosing the Right Device for Your Mission

Whether being used by first responders in a national disaster or by armed forces in a military operation, rugged computing devices must perform in the most challenging scenarios and conditions. For these reasons, rugged laptops need greater processing power, expansion capabilities and durability to ensure mission success. Listen to Christopher Townsend and leading experts to learn about deploying the right mobile products for your environment, real life use-cases for rugged laptops and the cost of ownership.


Transforming Government: Real-Time Collaboration Boosts Employee Productivity

In today’s fast-paced world, work no longer happens just in the office. People expect to be able to access their information at any hour of day and collaborate from anywhere with people around the corner or across the globe. The applications employees use at home, that let them share information & communicate easily with friends and family, drive these expectations. How can these new tools help in the workplace? With the right technology, employees can work faster, share ideas, and innovate at speed. Google Apps is a modern collaboration system for organizations that allows employees to collaborate in real-time, dramatically boosting productivity. Join us for this informative webinar to learn how Google’s innovative collaboration tools meet the needs of today’s government employees.

Webcast for Marketers: Inside the 2010 Government IT Buying Study - Who’s Buying What, Where, When and How. Special Recorded Encore Presentation

1105 Government Information Group recognizes the size, scope and complexities of government IT markets and the challenges involved in reaching and engaging these unique markets. To continue to build on its expertise and to help clients understand the public sector market, 1105 Government Information Group consistently takes the lead with innovative research designed to ascertain the needs and trends of the government IT marketplace.


Crush Crime with Predictive Analytics: The Memphis Police Department Story

With traditional policing practices unable to thwart a rising rate of criminal activity and budgets tight, the Memphis Police Department (MPD) pioneered a way to focus their patrol resources more intelligently. By using a predictive enforcement tool, MPD can recognize crime trends as they are happening, and enable precinct commanders to change their tactics and redirect patrol resources in a way that both thwarts crimes before they happen and catches more criminals in the act. Through such smart policing approaches, MPD has reduced the overall crime volume in Memphis by 30%, making life safer for their citizens.

Schneider Electric

Strategies for effectively deploying high efficiency and high availability data centers

As applications such as virtualization, blade servers, multi-core processor servers, and consolidation increase, it becomes critical to fully understand the drivers to realize your efficiency entitlement and deploy an architecture that can scale with your business. This session will help attendees filter out the hype, understand the science behind efficiency, and set realistic expectations for their own data centers.