Introduction to Distributed Denial of S...
A Denial of Service (DoS) attack is when an attacker attempts to prevent legitimate users from accessing information or services. And a Distributed Denial of Service (DDoS) attack is when an attacker takes control of your computer to attack another computer. Register today for this free GovLoop Academy course that includes six lessons to learn more about what DDoS attacks are, what an attack could mean for your agency, how to prepare for an at...
New ways to work with iPad
Watch the latest iOS in Business webinars. Join Apple® business experts for a series of short, on-demand seminars, where you’ll hear how iPad® can transform your business. Learn how a new generation of apps are empowering users to do even more. And find out how you can streamline deployment at any scale and manage Apple devices easily. Click here to access all of the iOS9 in Business on-demand seminars, where you can view the sem...
Mac in Business
A brand-new day for business. In this series of short, on-demand seminars, you’ll join Apple® business experts to discover why employees in every role and type of business are boosting productivity with Mac®. You’ll also learn best practices for deploying, managing, and securing OS X®. All seminars are 10 minutes or less. Click here to access all of the on-demand seminars and discover why organizations are offering Mac.
Gigamon - Improve Your Network Visibility
Security and monitoring tools are a huge investment. Organizations typically use 6-12 highly specialized security and monitoring tools in their environments. To operate most effectively, these tools should only inspect relevant network traffic. However, they often inspect all network traffic, dramatically reducing their efficiency and speed. Gigamon's products filter out traffic that is irrelevant to a specific tool and delivers only traffic r...
What's Wrong with Cybersecurity and How...
View our on-demand webinar to hear from Palo Alto Network’s Vice President and Federal Chief Security Officer, Retired U.S. Army Major General John Davis. During this time, General Davis speaks on the current issues in technology and cybersecurity and how trends are progressing in opposite directions regarding simplicity, convenience, people, integration, automation, and proactive problem solving. With his vast experience, General Davis...
At Your Service (Customer Service)
Customer service excellence will give you the competitive advantage you need to survive in a tough and increasingly uncertain business climate. In today’s customer-oriented business environment, "people skills" are critical for personal and organizational success. How you handle your customers can directly affect your individual goals as well as your team’s and company’s performance. This customer service webinar will provide...
Implementing Enterprise Asset Managemen...
Your organization's infrastructure spans buildings, roadways, utilities, public safety and public transit agencies. It is worth millions if not billions of dollars and the operations, inspections and maintenance programs required to keep it running are costly but critical. How can you keep this complex system running at peak efficiency? A strategic enterprise asset management solution will enable your organization to provide more efficient and...
Enhancing VMware Horizon View with F5 S...
Desktop and endpoint device management has long been a challenge for IT organizations. End users demand flexibility, multiple access options, and desktop customization, while business units often require multiple desktop types based on their business and technical requirements: Windows 7 for sales and staff in the field, Windows XP for accounting, Mac for creative design, and Linux for technical staff. This kind of multi-level matrix can be a...
APTs, Viruses, and Zero-Days Seen as Bi...
Cyber attacks have changed dramatically over just a few years. Broad, scattershot attacks designed for mischief have been replaced by attacks that are advanced, targeted, stealthy, and persistent. A compelling new survey reveals the growing concern of the advanced persistent threat (APT) against government organizations. Join FireEye and Carahsoft for a live webcast to gain insight and useful information from your government colleagues across...
Government Cloud Computing: The Latest...
As Cloud Computing approaches maturity it is transforming the face of enterprise IT. In the public sector, government organizations are aggressively moving to capitalize on the cloud’s myriad benefits to increase operational efficiency and reduce cost of ownership. These benefits apply to crucial areas such as IT consolidation, shared services and public-facing citizen services.Even though cloud solutions are becoming commonplace, there...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.