Back to Search Begin New Search Save Search Auto-Notify

Upcoming Events

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Mission Acceleration By Design: Smart I...
Like many Federal Agencies, GSA was faced with the challenge of strengthening their enterprise IT governance framework without sacrificing speed and agility to accommodate the time-sensitive IT needs of their programs. Megan Schmith, Director of Enterprise Application Development & Platform Strategy joined us for one hour to shed light on the procurement process they went through to procure modern, cloud-based enterprise solutions as well...
Add Favorite
New ways to work with iPad
Watch the latest iOS in Business webinars. Join Apple® business experts for a series of short, on-demand seminars, where you’ll hear how iPad® can transform your business. Learn how a new generation of apps are empowering users to do even more. And find out how you can streamline deployment at any scale and manage Apple devices easily. Click here to access all of the iOS9 in Business on-demand seminars, where you can view the sem...
Add Favorite
Mac in Business
A brand-new day for business. In this series of short, on-demand seminars, you’ll join Apple® business experts to discover why employees in every role and type of business are boosting productivity with Mac®. You’ll also learn best practices for deploying, managing, and securing OS X®. All seminars are 10 minutes or less. Click here to access all of the on-demand seminars and discover why organizations are offering Mac.
Add Favorite
Hive for Processing Big Data
DESCRIPTION Prerequisites: Hive requires knowledge of SQL. The course includes and SQL primer at the end. Please do that first if you don't know SQL. You'll need to know Java if you want to follow the sections on custom functions. Taught by a 4 person team including 2 Stanford-educated, ex-Googlers and 2 ex-Flipkart Lead Analysts. This team has decades of practical experience in working with large-scale data. Hive is like a new friend with an...
Add Favorite
FireEye Webcast Discover the Future of...
Today's skilled attackers bypass the traditional endpoint defenses (firewall, antivirus software) that most security teams have relied on for years. Even when a traditional defense stops a known threat, it can't determine what that threat was trying to do. FireEye Endpoint Security (HX series) can be deployed on premise for endpoints inside and outside the corporate network. It helps your security team detect, contain, and understand the natur...
Add Favorite
Gigamon - Improve Your Network Visibility
Security and monitoring tools are a huge investment. Organizations typically use 6-12 highly specialized security and monitoring tools in their environments. To operate most effectively, these tools should only inspect relevant network traffic. However, they often inspect all network traffic, dramatically reducing their efficiency and speed. Gigamon's products filter out traffic that is irrelevant to a specific tool and delivers only traffic r...
Add Favorite
Symantec Web Isolation: Prevent Malware...
View our complimentary on-demand webcast to hear Chad Knupp, Sr. Federal Systems Engineer - Symantec, discuss some of the key benefits of Symantec Web Isolation, including: The highest level of isolationSuperior user experienceCloud, on-prem, and hybrid offeringsGranular control over user activitiesTight integration with Symantec products
Add Favorite
Remove Security Blind Spots with the Sy...
View our on-demand webcast to learn about how the SSL Visibility Appliance, the leading purpose-built appliance for encrypted traffic management, can help your agency: Enable secure SSL/TLS inspection and preserve data integrityImprove the ROI of your entire security infrastructurePreserve privacy and compliance with selective decryption
Add Favorite
The Cybersecurity Landscape for Higher...
View our on-demand webinar to hear from Palo Alto Networks' Chief Technology Officer, Rick Howard, about the evolution of network defense for higher education. Rick discusses the cybersecurity shortage and how higher education could capitalize on filling this gap in the cybersecurity landscape.
Add Favorite
What's Wrong with Cybersecurity and How...
View our on-demand webinar to hear from Palo Alto Network’s Vice President and Federal Chief Security Officer, Retired U.S. Army Major General John Davis. During this time, General Davis speaks on the current issues in technology and cybersecurity and how trends are progressing in opposite directions regarding simplicity, convenience, people, integration, automation, and proactive problem solving. With his vast experience, General Davis...
Add Favorite
Back to Search Begin New Search