Unleash The Power of Microsoft DNS/DHCP...
We would like to extend a personal invitation for you to join one of two 30 minute live demonstration sessions of Infoblox IPAM for Microsoft DNS/DHCP on Thursday May 12th at either 10 AM ET or 4 PM ET. We’ll show you how centralized management of DNS, DHCP and IP Address Management can lead to increase in network uptime, efficiency and cost reduction. We’ll also cover: • Enterprise requirements for IP address management ...
FREE Seminar: "Doing More with Less: Ac...
With budgets up in the air, continuing resolutions continuing, and a call to trim staff but maintain productivity, you need to keep the work moving with less time, less money, and less personnel. That's why Feith Systems is coming to DC to share the secrets of how to do more with less and still deliver results. Hyatt Regency Capitol Hill, Washington DC - Registration and Complimentary Breakfast begin at 830am. Join us on April 27th for a FREE...
FREE Seminar: "Achieve Your Workflow Go...
Join Feith Systems April 27th in DC for free for an exclusive Washington Workflow Workshop! One day only, see the latest applications in maximizing your Business Processes, best practices in streamlining your Workflow, creating lasting efficiency in Operational Control, and so much more. Hyatt Regency Capitol Hill, Washington DC - Registration and Complimentary Breakfast begin at 830am. Feith Workflow Workshop Presents a FREE Event Achieve Yo...
Microsoft Virtualization and Windows Se...
Learn about Microsoft’s Virtualization products and what’s new in Windows Server 2008 R2Join En Pointe and Microsoft to learn more about Microsoft Virtualization technologies in the Public Sector environment. Private clouds allow you to reap many of the same benefits of public clouds within your own environment. Take advantage of the scalability, self-service management, and elasticity of cloud computing with the additional control...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
Midwest Security & Police Conference & Expo
The Midwest Security & Police Conference/Expo is the most dynamic industry trade show in the Midwest showcasing the latest products and services for security and law enforcement professionals. Now in its 10th year, MSPCE brings together an exciting 2-day marketplace featuring state-of-the-art security and law enforcement products, systems and services. ATTEND IN 2010! Your registration includes access to exhibit hall featuring full spectru...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
Government I.T. Made Simple--A Study of...
Government I.T. Made Simple...A Study of the Government Case for Security, Virtualization & Storage Agenda: Keynote VIP Guest Speaker: Warren T. Bamford, Special Agent in-Charge (SAC) FBI’s Boston Field Office. IT Security & its’ ‘Happening Now’ impact on the Public Sector to reduce victimization & build security awareness. McAfee: Dave Marcus, Director, Security Research and Communications McAfee Labs McAf...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.