What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


  • Hybrid Networks – The New Government Standard in the Age of the Cloud

    In a time of rapid technological development, it is imperative to ensure our networks can withstand the increased demands we place on them. With cloud and application adoption showing no signs of slowing, the time is now to make sure your network can keep up. 03/01/2016

  • Enterprise Information Management - Data Architecture: Meeting Mandates and Mission Requirements

    So many key initiatives in government depend on information. Agencies are looking to use Big Data analytics to drive decisions. They are facing federal DATA Act deadlines for grants, and OMB mandates for email and electronic records, shared services, and cybersecurity. Too often such initiatives are stymied by an outmoded, siloed information landscape. In this webcast, Manjula Ambur, Associate CIO, Big Data Analytics & Chief Knowledge Officer and Ed McLarney, Associate CIO for Innovation, and Chief Technology Officer for IT – both with NASA Langley Research Center – will discuss a three-pronged approach that can help agencies develop an enterprise-level data and information management architecture and strategy. 02/25/2016

  • Innovation in the Data Center: Advancing Beyond Legacy Infrastructure

    Federal data centers traditionally have proven very resistant to change. But the mandate is clear: Agencies need to improve the cost-effectiveness of their data center operations, and consolidation is only part of the solution. This webcast will discuss strategies for modernizing the infrastructure and raising the bar on IT services delivery. In this webcast, Fred Whiteside, program manager for the data center consolidation initiative at the Department of Labor, will discuss how agencies can achieve the maximum efficiency and performance as part of the consolidation process. 02/24/2016

  • Securing Government Data in a Mobile World

    Smartphones and tablets are already ubiquitous in government buildings—50 percent of federal employees access work email from their personal mobile devices, and another 49 percent use their personal devices for downloading work documents. This makes securing Android and iOS devices critical to preventing the loss of confidential data—and improving employee productivity. Join John Gamble, Director of Products, and Nick Fisher, Director of Product Marketing, at Lookout as they share insights on mobile threat vectors that present serious risks, and how to take actions in mitigating these risks. 02/18/2016

  • Preparing the Public Sector for New Cybersecurity Regulations

    As you prepare your organization’s cybersecurity regulations and strategies for FY2016, we invite you to view our webcast focused on how to best identify threats and protect your network. This webinar discusses how to create a more secure cyber network, with 100% PIV enablement for all employees and contractors’ privileged users, and to tighten privileged user policies, practices, and procedures. 02/04/2016


  • The Comprehensive Guide to E-Signatures for Government Contracting

    Government has achieved impressive examples of savings and efficiencies by going digital with e-contracting processes. However, many procurement processes are still executed on paper. All levels of government need to be able to exchange, negotiate and sign contracts without the costs and inefficiencies of paper. This eBook explains how this is possible.

  • Driving Business Value From Flash Optimized Storage

    Flash technology can be fast, reliable and increasingly affordable but is not necessarily an immediate solution for every problem. The key is to know how to put flash to use to deliver real business value. This whitepaper will debunk some of the common flash myths and show the importance of putting the right storage array into place to support the right application in order to deliver the most business value.

  • Security Strategy Depends on Risk-Management

    Risk framing is an essential aspect of formulating a security strategy. It establishes the boundary and scope of the environment in which risk-based decisions are made. Download this digital dialogue to gain insights from NASA on the best practices for creating a strong information security strategy for your organization.

  • Speed and Security Aren't Mutually Exclusive

    Download this informative Digital Dialogue to learn why federal agencies are under immense pressure to manage the speed, safety and efficiency of their network and determine what steps you can take to ensure all employees are connected 24x7.

  • Information Governance Considerations in the Public Sector

    Discover how the challenge of managing Big Data for the government sector can be handled in today’s world. Good information governance, including traditional backup and data preservation/retention is really about retaining the right data for the right reasons. Learn more about the top ten most important IT priorities in the next 12 months for public-sector organizations.