Back to Search Begin New Search Save Search Auto-Notify

Upcoming Events

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Introduction to Distributed Denial of S...
A Denial of Service (DoS) attack is when an attacker attempts to prevent legitimate users from accessing information or services. And a Distributed Denial of Service (DDoS) attack is when an attacker takes control of your computer to attack another computer. Register today for this free GovLoop Academy course that includes six lessons to learn more about what DDoS attacks are, what an attack could mean for your agency, how to prepare for an at...
Add Favorite
New ways to work with iPad
Watch the latest iOS in Business webinars. Join Apple® business experts for a series of short, on-demand seminars, where you’ll hear how iPad® can transform your business. Learn how a new generation of apps are empowering users to do even more. And find out how you can streamline deployment at any scale and manage Apple devices easily. Click here to access all of the iOS9 in Business on-demand seminars, where you can view the sem...
Add Favorite
Mac in Business
A brand-new day for business. In this series of short, on-demand seminars, you’ll join Apple® business experts to discover why employees in every role and type of business are boosting productivity with Mac®. You’ll also learn best practices for deploying, managing, and securing OS X®. All seminars are 10 minutes or less. Click here to access all of the on-demand seminars and discover why organizations are offering Mac.
Add Favorite
Gigamon - Improve Your Network Visibility
Security and monitoring tools are a huge investment. Organizations typically use 6-12 highly specialized security and monitoring tools in their environments. To operate most effectively, these tools should only inspect relevant network traffic. However, they often inspect all network traffic, dramatically reducing their efficiency and speed. Gigamon's products filter out traffic that is irrelevant to a specific tool and delivers only traffic r...
Add Favorite
What's Wrong with Cybersecurity and How...
View our on-demand webinar to hear from Palo Alto Network’s Vice President and Federal Chief Security Officer, Retired U.S. Army Major General John Davis. During this time, General Davis speaks on the current issues in technology and cybersecurity and how trends are progressing in opposite directions regarding simplicity, convenience, people, integration, automation, and proactive problem solving. With his vast experience, General Davis...
Add Favorite
At Your Service (Customer Service)
Customer service excellence will give you the competitive advantage you need to survive in a tough and increasingly uncertain business climate. In today’s customer-oriented business environment, "people skills" are critical for personal and organizational success. How you handle your customers can directly affect your individual goals as well as your team’s and company’s performance. This customer service webinar will provide...
Add Favorite
Implementing Enterprise Asset Managemen...
Your organization's infrastructure spans buildings, roadways, utilities, public safety and public transit agencies. It is worth millions if not billions of dollars and the operations, inspections and maintenance programs required to keep it running are costly but critical. How can you keep this complex system running at peak efficiency? A strategic enterprise asset management solution will enable your organization to provide more efficient and...
Add Favorite
Enhancing VMware Horizon View with F5 S...
Desktop and endpoint device management has long been a challenge for IT organizations. End users demand flexibility, multiple access options, and desktop customization, while business units often require multiple desktop types based on their business and technical requirements: Windows 7 for sales and staff in the field, Windows XP for accounting, Mac for creative design, and Linux for technical staff. This kind of multi-level matrix can be a...
Add Favorite
APTs, Viruses, and Zero-Days Seen as Bi...
Cyber attacks have changed dramatically over just a few years. Broad, scattershot attacks designed for mischief have been replaced by attacks that are advanced, targeted, stealthy, and persistent. A compelling new survey reveals the growing concern of the advanced persistent threat (APT) against government organizations. Join FireEye and Carahsoft for a live webcast to gain insight and useful information from your government colleagues across...
Add Favorite
Government Cloud Computing: The Latest...
As Cloud Computing approaches maturity it is transforming the face of enterprise IT. In the public sector, government organizations are aggressively moving to capitalize on the cloud’s myriad benefits to increase operational efficiency and reduce cost of ownership. These benefits apply to crucial areas such as IT consolidation, shared services and public-facing citizen services.Even though cloud solutions are becoming commonplace, there...
Add Favorite
Back to Search Begin New Search