36 webcasts found
+ 5 past events found
Back to Search Begin New Search Save Search Auto-Notify

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Remove Security Blind Spots with the Sy...
View our on-demand webcast to learn about how the SSL Visibility Appliance, the leading purpose-built appliance for encrypted traffic management, can help your agency: Enable secure SSL/TLS inspection and preserve data integrityImprove the ROI of your entire security infrastructurePreserve privacy and compliance with selective decryption
Add Favorite
Proofpoint Webcast: Emerging Threats In...
View this on-demand webinar to review how to: Keep pace with dynamic threat landscape using continuously updated intelligenceBlock attacks and campaigns before they reached their organizationIncrease the dependability of their existing security infrastructure with simple and easy to consume data setsAdopt a proactive security posture based on real intelligenceVerify their prevention devices were performing as advertised by looking for the...
Add Favorite
Close the App-Data Gap with Nimble's Ne...
View our on-demand webcast for a DOE exclusive On-Demand webcast with Nimble Storage and Leverage to explore the reasons why fast flash alone is not enough and what is required to maximize the performance of your applications.During this webinar, we will discuss how Nimble’s new Predictive All Flash Arrays can close the app-data gap and deliver: Absolute performance Non-stop availability Cloud-like agility Leverage is a trusted Nimble St...
Add Favorite
VMware NSX Webcast: Protect Your Data C...
VMware NSX is the network virtualization platform for the Software Defined Data Center (SDDC). VMware NSX enables organizations to divide the data center into distinct security segments logically, down to the level of the individual workload - irrespective of the workload’s network subnet or VLAN. IT teams can then define security policies and controls for each workload based on dynamic security groups, which ensures immediate responses...
Add Favorite
Nimble Storage: Make It About Apps, Not...
View our on-demand webcast to learn how to utilize the Nimble Storage Predictive Flash Platform to deliver, manage, and consume applications. Attend our webcast and the knowledge of how Nimble enables you to integrate your infrastructure with your applications. During this webcast we will go over: QoS for apps and tenants App-centric monitoring and data-protection Consuming and provisioning storage that mimics the exact needs of an app
Add Favorite
A Trusted Technology Partner for Tribes...
Native American Tribes and casinos rely on their data centers to effectively and efficiently manage diverse digital activities. These include gaming operations, tribal government and administrative programs, video surveillance, law enforcement, and more. But these datacenters are often composed of aging and disparate systems serving conflicting functions. As a result, they can be difficult to manage, inefficient, and ill-prepared for a future...
Add Favorite
Disaster Recovery and Storage Management
Data storage protection and disaster recovery are prime objectives for many organizations today. The Nimble Storage Predictive Flash platform efficiently delivers the benefits of primary storage, backup, and disaster recovery in an all-inclusive package to provide the ideal foundation for comprehensive data protection. TetherView is a proud Nimble replication partner that offers private cloud solutions. TetherView provides Virtual Desktops an...
Add Favorite
Best Practices for Ensuring Successful...
As federal agencies look to evolve their IT infrastructure and explore hybrid cloud initiatives, federal IT teams are increasing their focus on accurately benchmarking the performance of their mission-critical application workloads before migrating to a new architecture, and ensuring performance and availability once the migration is complete. Once your mission-critical apps are migrated, having an accurate and reliable understanding of worklo...
Add Favorite
A Changing World of Machine Identity
Today's cyber security landscape is more complex and dynamic than ever, competing with resources to modernize federal IT infrastructure while keeping federal networks protected from the most advanced nation, state, and insider threats. Security teams are inundated trying to protect the multitude of both human and machine identities on their networks with extensive resources spent on protecting the credentials that authenticate and authorize h...
Add Favorite
Transitioning to the Networks of the Future
Federal agencies face a new era of choices — and some important decisions— ahead on how to build, deploy, manage and maintain a software defined-wide area network (SD-WAN) infrastructure that’s ready for the future. GSA’s new Enterprise Infrastructure Solutions (EIS) contract will give agencies greater flexibility to address ever-growing needs for more bandwidth, availability, security and network capabilities. But dep...
Add Favorite
Back to Search Begin New Search