Webcasts

  • Mobile in Mission-Critical Environments: How to Maximize Security and Ease of Use

    With the growing availability of commercial off-the-shelf mobile technology for secure communications, government agencies are charged with cost-effectively equipping their teams while choosing solutions that provide quick deployments with increased standardization and security. Given the amount of sensitive data being accessed from mobile devices these days, there are many factors to consider when purchasing commercial mobility solutions in a classified environment. It’s imperative to think about the organizational needs before evaluating specific solutions. 12/14/2016

  • High Performance Computing: Fueling the Next Great Discovery

    It’s human nature to ask ever bigger questions and strive to solve ever more complex problems. High Performance Computing (HPC) is one more technological tool that can help us in that quest. HPC is pushing innovation of the next amazing achievement in science, engineering, healthcare, and education. 12/08/2016

  • Driving Performance and Efficiency in Healthcare Operations

    As medical technology and techniques have evolved, so too has the technology to support the business of healthcare. Healthcare professionals increasingly expect to have access to the information and services that they need anytime, anywhere, and from any device. In this webcast, Todd Cox, Chief, Unified Communications and Collaboration in the Center for Information Technology at the National Institutes of Health, will share lessons learned in developing networking and collaboration tools for the healthcare environment. 12/06/2016

  • Data Center and High Performance Computing
    Optimization

    Do you have real insight into your data center or HPC operations? If you don’t understand everything going on throughout your entire facility and energy grid, it is very difficult to be truly efficient. How does your power consumption fluctuate? Do you have hot spots? Would you know if your systems were fighting each other or short-cycling? Are you looking across disparate systems to understand your environment? You can’t properly manage power demands, energy consumption, power fluctuations, or operational efficiency without understanding your data but that can be difficult with so much data everywhere. How can you see what is important through multiple systems, multiple screens, and a sea of data? 12/01/2016

  • Conquer Data Chaos to Meet the 2019 Mandate

    It’s no secret that government organizations are faced with greater variety & larger volumes of data than ever before – the Era of Data Chaos. Learn how to achieve the efficiency, security & compliance to harness Data Chaos and make the 2019 Mandate. 11/16/2016

Whitepapers

  • 4 Strategies for Securing Federal Applications at the Speed of DevOps

    Federal agencies want to move faster through the use of DevOps and open source software. Teams developing applications at a furious pace don’t want to be encumbered by bolt-on security procedures. Agencies need security protocols that can keep pace with development practices without holding them back.

  • Keep Pace with DATA

    As federal agency data management programs continue to evolve, agency staff is finding the cultural, organizational and policy issues present the biggest challenges, not the technology. However, technology is really only a small part of the data management and analytics equation, according to government and industry experts speaking at a Nov. 29th event: Big Issues Conference: Federal IT after the Transition. Download this informative article to learn more!

  • Surfacing Critical Cyber Threats Through Security Intelligence

    It’s almost quaint and more than a bit naive to look back on the days when an enterprise felt it could install a few firewalls and some anti-virus software and feel confident that the organization was well defended against cyber threats. Those days weren’t so long ago, but much has changed in a few short years. In a relatively short time span, cyber security has become a major concern for government agencies, military branches, companies across every industry. Download this informative whitepaper to learn how you can protect yourself!

  • The Threat Lifecycle Management Framework

    Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences.These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M. The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizations were compromised in 2015. Against this backdrop, organizations increasingly expect that it’s not if they will be compromised, but rather when will they be compromised.

  • Meet with Anyone, Anywhere — Securely

    Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.