Back to Search Begin New Search Save Search Auto-Notify
Advanced Persistent Threat
US Government agencies face constant attacks from outside the organization as well as inside their organization. They must defend a dynamic ecosystem of applications and computer systems from targeted attacks. The only hope an agency has to stay ahead of the threat is the Advanced Threat Protection (ATP) Platform designed to enable government customers to customize their infrastructure security needs. Attend this Webinar and gain insight into...
June 5, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Creating a "Connected Military" Through...
There is a challenge to make sense of all the event data being created by sensors, soldiers, vehicles and equipment. The military needs the ability to apply intelligence across all these billions of events/interactions in real time to respond quicker and be more prepared during critical times. M2M helps make this requirement a reality. M2M Messaging is a new paradigm that allows both wireless and wired systems to communicate with other devices...
May 29, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
U.S. Department of the Navy: Sales Oppo...
For the remainder of FY13 and into FY14, the Department of the Navy will look to employ commercial cloud solutions to achieve efficiencies and leverage the advantages in innovation and cost-savings offered by the private sector. Furthermore, while the Navy remains focused on reducing the number of its data centers , it is giving increasing emphasis on maximizing the existing data centers, reflecting a greater government wide policy priority. J...
May 22, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Application Control Security through Wh...
As the threat landscape continues to changes within our financial industry, it is important that the proper precautions are taken to stop attackers and protect our nation’s most crucial financial information. McAfee’s dynamic whitelisting trust model reduces cost by eliminating expensive manual support requirements associated with other whitelisting technologies, and combining continuous detection of system-level changes being made...
May 16, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Managing Applications from a Top Down P...
APM 360 - Managing Applications from a Top-Down PerspectiveWednesday, May 15, 2013 | 2:00 p.m. - 3:00 pm. EDTThis Webinar will demonstrate how the APM Solution enables IT organizations to: Identify the impact of system and network outages on end users and business services Create consolidated dashboards of mission critical applications, encompassing the network, system, and application performance in a single view Reduce the duration and numbe...
May 15, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Dealing with the Known and Unknown - Wa...
Network battlefields are rapidly facing evolving threat landscapes full of modern applications, exploits, malware, and attack strategies that are capable of avoiding traditional methods of detection. Threats are delivered via applications that dynamically hop ports, use non-standard ports, tunnel within other applications, or hide within proxies, SSL, or other types of encryption.Discover how Palo Alto Networks goes to war through their next-g...
May 15, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Security Controls for Mobile Devices
Mobile devices allow government workers to be more productive and effective; they enable telework and increase employee satisfaction. However, the features that make mobile devices desirable also make them a security challenge. This educational Webinar will examine mobile security challenges faced by government agencies and will reveal how a comprehensive mobile security strategy can help address these challenges.Attend this Webinar and gain i...
May 14, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Alternative Security to HBSS for Fixed...

CANCELED

Embedded devices and appliances are widely deployed in critical infrastructure today. These include point of care medical modalities (XRay, Ultrasound, CT-Scan, MRI devices in hospitals), ATMs in banks, handheld devices in retail stores, kiosks, critical infrastructure for process control systems or SCADA devices, and storage appliances. In addition, McAfee Embedded Security can be utilized to enforce that the control requirements are met for...
May 1, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Lessons Learned in the Quest for the Co...
Cyber-security officials in Washington have delivered a clear message to practitioners at every federal agency: radically advance the use of automation to audit, trend and communicate meaningful data about security infrastructure effectiveness. By providing government agencies with powerful automation to continually assess security infrastructure and trend key metrics about their ability to maintain critical asset protection, RedSeal empowers...
April 17, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Lessons Learned in the Quest for Contin...
Cyber-security officials in Washington have delivered a clear message to practitioners at every federal agency: radically advance the use of automation to audit, trend and communicate meaningful data about security infrastructure effectiveness. By providing government agencies with powerful automation to continually assess security infrastructure and trend key metrics about their ability to maintain critical asset protection, RedSeal empowers...
April 17, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search