23 past events found
Back to Search Begin New Search Save Search Auto-Notify
How Cloud-Driven Databases Improve Secu...
The most important asset government agencies have – besides their people – is their data. To modernize their IT systems and address compliance, many agencies have focused on increasing database performance and integration, while strengthening their security posture. The good news is that technological breakthroughs in Advanced Analytics, AI, and IoT are further expected to help agencies better secure and control the flow of informa...
November 13, 2018
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Accelerating Agency IT Modernization
Accelerating Agency IT Modernization The White House’s American Technology Council and Office of American Innovation on modernizing federal technology published specific recommendations to jumpstart a new wave of modernization efforts by accelerating cloud adoption, consolidating networks and prioritizing key applications for needed upgrades. Now the daunting task of implementing these recommendations sits within agencies, and it is not...
February 28, 2018
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Breaking Down the Walls in Government D...
Agencies are quickly embracing modern technologies and methodologies to increase time to market and decrease their costs of mission critical applications. Among the leading technologies being adopted is microservices with DevOps being the contending new methodology to support it. This webinar will explore the basics and benefits of implementing a DevOps culture within your agency as well as some tools that support this methodology. Whether you...
September 6, 2017
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Government Endpoint Security: Current I...
Governments are among the most highly targeted networks in the world. From political campaigns to government personnel to intelligence and troop planning, government data is of great interest to nation-states and others for a variety of reasons. Accessing sensitive government data means accessing the assets that can connect to it or house that data. Servers, workstations, virtual desktops and other devices can all suffer from vulnerable operat...
July 26, 2017
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Integrating your Existing Systems into...
As many agencies race to buildout their application backlog with their new microservices architectures, many are grappling with the decision of whether to integrate those services with their legacy systems. Whether or not to reuse a legacy system(s), at the expense of duplicating integration logic across services or rewriting the legacy system is a common dilemma. Join us for this complimentary webinar to explore how agencies can leverage a mi...
April 19, 2017
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Federal Data Center Optimization: Do’s...
As federal agencies embrace the U.S. CIO’s new Data Center Optimization Initiative and keep pace with growing demand for new services and applications, best practices will help guide them around potential pitfalls. In this i360Gov webinar, leading DoD and civilian IT experts will provide insights on optimization and how agencies can achieve a mandated 25% annual reduction in federal data center expenses by the end of fiscal 2018. Agency...
September 28, 2016
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Overcome Obstacles to Agile Application...
Federal government agencies face intense pressure to build next-generation applications, despite resource constraints and growing requirements to incorporate security, accessibility and analytic capabilities. Rising complexity and overburdened IT systems only contribute a lack of agility – which is something government agencies desperately need to support the demand for new apps and services. Add the backlog of application change request...
February 17, 2016
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Derived Security Credentials for Govern...
As government organizations increasingly move towards mobile devices, they are asking how they can provide their workers with access to their applications and data with a secure digital certificate. Common Access Cards (CAC) and Personal Identity Verification (PIV) smart cards are used to manage access to both online and physical resources through controlled access to networks, systems, building and spaces. However, this standard way of doing...
December 9, 2015
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Safeguarding The Enterprise with Secure...
With data breaches continuing to make headlines on a weekly basis, public sector organizations are seeking solutions to protect sensitive data, including health, financial, and identity information. Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data security approaches fail. With Delphix, application and IT teams get fu...
June 25, 2015
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Smart Cities On the Horizon
Learn how states and localities can remain relevant, despite continual budgetary challenges, by optimizing facilities and asset management. The advent of small, inexpensive sensors, large-scale storage and high performance networks is helping states and localities leverage smart, adaptive technologies that can drive transformation in healthcare, transportation services, energy conservation and education. Gain tips and advice from our panel of...
November 19, 2014
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Back to Search Begin New Search