Virtualization is changing how agencies manage their data centers. The technology provides increased flexibility when it comes to deploying resources – and increased efficiency in managing them. Security is an essential part of that equation. In this webcast, Frank Konieczny, the Chief Technology Officer in the Office of Information Dominance and Chief Information Officer in the Office of the Secretary of the Air Force, will discuss how agencies can leverage a software-defined approach to the data center to strengthen their security posture.
Force 3 Palo Alto VMware
3D printing, once the stuff of science fiction, has become a reality, with the potential to revolutionize design and manufacturing in many sectors, including government. But while 3D printing is real, it is still new to many agencies. In this webcast, Lt. Commander Ben "Prof" Kohlmann, Chief of Naval Operations Rapid Innovation Cell, will offer best practices and lessons learned in leveraging this technology. Lt. Commander Kohlmann spearheaded an effort that put a 3D printer aboard a warship for the first time.
Configuring applications to accept smart cards is often complex and costly, but smart card-based Single Sign-On (SSO) provides password-free authentication and achieves FISMA ICAM compliance. Join us to learn how you can accelerate compliance and increase security--all while providing a seamless user experience.
Session 2 - Automated Remediation: Scanning for vulnerabilities and scaling remediation across your agency requires your IT staff to continuously and proactively respond to cyber threats, advisories, patches, updates and more. Responding with manual actions further constrains IT resources and adds to response times. Empower your IT staff to focus on new and emerging threats.
DLT, ForeScout, Symantec
Protecting work data on mobile devices, whether they are GFE or BYOD, is a foremost concern of government CIOs, IT, and security personnel. So how does a government agency strike a balance between protecting government information while at the same time, leveraging the capabilities of mobile devices to maximize productivity of today’s mobile government worker? In this webcast, Rick Walsh, Mobility Lead, U.S. Army G6 CIO, will discuss how the U.S Army is leveraging mobility to enable soldiers to securely use their device in their home station or on deployment.
Session 1 - Real-time Network Visibility – You Can’t Protect What You Can’t See: Visibility across your network – in real-time - is a critical necessity for combating today’s increasing cyber attacks and security breaches. Integrating a NAC solution into asset management operations will enable you to detect, prioritize and remediating risk much more effectively and efficiently. Attend this webcast to learn how monitor and mitigate the cyber threats affecting agencies today.
Learn more about the enterprise-class hybrid cloud service that offers federal agencies the freedom to run new and existing applications in the cloud with the assurance of FedRAMP security standards.
Carpathia, VMware, Carahsoft
Organizations and intelligence agencies from a variety of industries and sectors face the same challenges when it comes to big data – the need to uncover actionable insights, with limited resources, with critical speed. But with the right intelligence solution, overwhelming data won’t be a challenge, rather, it becomes your resource to smarter, more effective decision making. Join this webcast to learn how you can quickly unlock the valuable insights hidden in your data.
Today, agencies often make one of two mistakes when considering cloud security. Either they over simplify their requirements because they do not recognize the potential risks associated with the information they are managing, or they over complicate their requirements assuming that their data requires the highest level of protection. Both approaches can lead to problems, but there is a better option.
Discover how automated compliance solutions are helping agencies reduce the time and resources required to achieve and maintain compliance with federal standards such as FISMA, FedRAMP and HIPAA by up to 50%.
When it comes to health data, the more people who can access it the more valuable it is. That is why the cloud is so important. Health organizations are leveraging cloud technology and related tools to give researchers an unprecedented ability to access and mine health data. This webcast will provide government health agencies with new ideas for taking full advantage of the cloud.
Cybersecurity must address the mission needs of the entire organization, from information assurance, network and systems security, and counterintelligence, as well as the oversight functions of inspectors general and legal entities. This webcast will explain how to develop a holistic approach that meets the full spectrum of needs while improving the manageability and cost-effectiveness of cybersecurity operation.