25 webcasts found
+ 77 past events found
Back to Search Begin New Search Save Search Auto-Notify

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Tagging, Tracking, and Knowing Your Targets
One of the great pains in working with geospatial data is locating and understanding the countless systems and files where that information resides. The time spent searching and managing the data can delay time to action and ultimately hinder making real-time decisions. Enter a technological cure -- MarkLogic has developed a Geo360 solution that alleviates the pain of working with geospatial data. Our solution is a single Enterprise NoSQL dat...
Add Favorite
Transform Your Organization with Hyper-...
VMware Hyper-Converged Infrastructure (HCI) is quickly transforming the way agencies build and manage their datacenter and IT infrastructure. New organizational requirements are encouraging many technology leaders of the future to embrace recent innovations in computing like VMware Hyper-Converged Software (HCS), now tightly integrated with EMC hardware, and available as a single appliance solution, VxRail. Agencies are rapidly investing in H...
Add Favorite
Best Practices for Protecting High Valu...
OMB's Cybersecurity Strategy and Implementation Plan (CISP) underscores the need for agencies to implement a defense in depth strategy to protect their high value information and assets, especially sensitive data, sensitive keys, and identity credentials. Sensitive data-at-rest is generally the most vulnerable once a breach has occurred, because of its volume and relevance. Attackers far too often hijack privileged accounts with full access to...
Add Favorite
FireEye Enterprise Forensics Webcast
Your network is under attack! Can you accurately answer the following? How long have I been under attack? What has been taken or damaged? Has the attack spread within the network, and how far? Did you miss the big game or your favorite TV show? With DVR technology today, you are able to record live TV, store the programs you missed, and go back and watch every moment. Today, with the sheer amount of data that traverses your network, you need...
Add Favorite
FedRAMP-Authorized Online Collaboration...
FedRAMP or the Federal Risk and Authorization Management Program, is a government-wide program creating a standardized approach to security assessment, authorization, and monitoring. Certification is mandatory for federal agency cloud deployments and service models at the low and moderate risk impact levels.Join us for a complimentary webinar to learn about Adobe Connect, the first FedRAMP cloud service provider (CSP) to deliver web conferenci...
Add Favorite
Streamline Your Creative Assets and Workflows
Adobe has once again revolutionized on-the-go creative design with a new and improved family of mobile applications. Government agencies that employ the power of Adobe’s Creative Cloud now have access to these apps on iOS and Android devices. With Adobe Creative Cloud Mobile apps, your creativity goes places. Sketch, draw, paint, create layouts, edit photos and make videos on the go with your handheld devices. Adobe Capture: Seize inspi...
Add Favorite
Splunk for Information Assurance ...
Taking Compliance from a Costly Time Sink to a Security Enabler Regulatory Compliance - a term that engenders a visceral reaction in every agency, customer, and institution. Fines and penalties imposed by regulatory agencies can cripple your operations and cause significant operational impact in responding to audits. Many agencies estimate an average of six week level of effort in responding to audits for every application environment. So, jus...
Add Favorite
Intelligent Insider Threat Detection
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring information, such as system, access, facility, and print logs. The real challenge to uncovering the next insider threat is understanding behaviors and intent that often lay hidden within massive volumes of human communications, such as emails, chats, and open source document...
Add Favorite
The Value of Electronic Signatures in G...
On-Demand Webinar: The value of electronic signatures in government Government organizations are transitioning to digital processes as they look for service improvements and efficiencies. Yet obstacles can arise when going 100% digital.Adobe Sign has reinvented the signature process to help you deliver complete digital experiences to citizens and personnel while achieving greater compliance and saving time and money. This webinar explored: The...
Add Favorite
Take a Coffee Break With Apptio to Lear...
Apptio understands how FITARA affects IT spending and why there is a need for a standard approach. Our TBM Unified Model (ATUM) can help you with your FITARA compliance. View this short 20 minute on-demand webinar and hear how we can help to improve your report card score and gain greater insight to your IT spend. You will hear how to leverage TBM to manage your IT costs and tackle your IT challenges such as: Data Center Consolidations IT Mod...
Add Favorite
Back to Search Begin New Search