Back to Search Begin New Search Save Search Auto-Notify
Tech Talk Tuesdays | Arbor Edge Defense...
One of the biggest threats to maintaining Continuity of Operations is a DDoS attack. Tom will discuss: (1) the evolution of modern DDoS attacks; (2) technical vulnerabilities of on-premise devices such as VPN gateways, firewalls and application servers to DDoS attacks; and (3) demonstrate the technical features of Arbor Edge Defense that enable it to be the first and last line of an automated perimeter defense
August 4, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Enhancing Visibili...
The flexibility and ease of deployment of SD-WAN has accelerated its deployment as new network edges emerge for large enterprise and government entities as MPLS continues to be prevalent within the Federal ecosystem. Tory will discuss: (1) Remote site monitoring solutions for MPLS; (2) Utilizing vSTREAM Family of Virtual Appliances for maintaining visibility in SD-WAN environments; (3) Deployment options for vSTREAM within uCPE of SD-WAN or Pu...
July 28, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Cloud Migration
Cloud migration is a complex endeavor for even the most experienced of IT professionals. Patrick will discuss: (1) The AWS “Well Architected Framework” whitepaper; (2) How Smart Data and NETSCOUT Threat Intelligence Solutions can help improve operational efficiency, lower costs, improve performance, and build Security into any Cloud environment; and (3) technical best practices for monitoring cloud migrations and cloud implementations.
July 21, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Monitoring VDI Env...
The Virtual Desktop Infrastructure continues to evolve its mission critical application status as organizations of all types realize the importance of enhanced user mobility and remote access. Paul will discuss: (1) Common challenges of access; poor user experience; and application issues; (2) How to use network visibility to understand and manage your VDI environment; and (3) Best Practices for Instrumentation.
July 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Increase Agency Productivity in the Rem...
New ways of working have emerged, both for citizens and the government agencies serving them. The old, monolithic approach to work, where most employees are engaged in large agency-wide initiatives, is no longer effective. Now that many are working remotely, how do you continue to manage agency productivity and get it all done? Join this panel of government thought-leaders for a dynamic discussion on the role remote work productivity and colla...
July 1, 2020
Organizer: ATARC
Location: Webcast
Add Favorite
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
May 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Conversations that Convert: Strategies...
Being a government meeting professional comes with a myriad of communication responsibilities. To move any effort along, it is essential for everyone to communicate as clearly as possible – especially with decision-makers. Failure to properly communicate in any setting may frequently end in a failed result. This is where being an effective communicator becomes an essential asset.During this presentation, award-winning branding and commun...
April 28, 2020
Organizer: SGMP
Location: Webcast
Add Favorite
Software Supply Chain: Code-to-Code Combat
Is your agency doing everything it can to protect against foreign interests from hacking the software that it relies on? From third party software libraries to in-house developed applications to PowerShell scripts, code signing is a necessary component to securing your software infrastructure. Code signing is effective at ensuring that the code you execute comes from where it claims to come from and hasn’t been modified by a third party....
April 2, 2020
Organizer: Venafi Government Team at Carahsoft
Location: Webcast
Add Favorite
Records Management University Class 5:...
Records Management University Class 5: Legacy System Data Transactions, Formatting & Public Access March 24, 2020 Although we have record schedules and file plans for traditional content, do they cover what constitutes data transactions (big data) as records. “Big data” as a volume generator far surpasses content-based records. Formatting data generated from different transactional systems (accounting, manufacturing, HR) into a...
March 24, 2020
Organizer: Records Management University
Location: Webcast
Add Favorite
Is Your Park Smart? How GIS Can Revolut...
Parks are key to healthy, thriving communities. However, questions always arise on how state and local governments can manage and maintain these open spaces while improving the overall experience for visitors. Parks require managing assets and infrastructure, monitoring ecosystem health, and ensuring that programs and offerings for the public match demographics and lifestyles. Join us Thursday, March 19 from 2-3 p.m. E.T./11 a.m. – noon...
March 19, 2020
Organizer: GovLoop
Location: Webcast
Add Favorite
Back to Search Begin New Search