IT Agents  >   Government Agencies (U.S.)  >  

Defense Department

RSS Feed    Add to Google    Add to My Yahoo!
Defense Department Multimedia (View All Report Types)
 
Optimize Performance and Efficiency in the Cloud: Cost-Effective Tips for Government Agencies
sponsored by DLT Solutions
WEBCAST: In this webcast, experts address the issue of government migration to the cloud, divulging cost-effective methods for getting to the cloud without compromising quality and performance.
Posted: 07 Apr 2015 | Premiered: Oct 30, 2014

DLT Solutions

Moving Agency Applications to the Cloud with PaaS
sponsored by DLT Solutions
WEBCAST: Using examples from the public sector, a panel of government and industry leaders discusses how platform-as-a-service (PaaS) fits into government's open source and application modernization strategy.
Posted: 07 Apr 2015 | Premiered: Oct 23, 2014

DLT Solutions

Flash Storage The Critical Piece in the Performance Puzzle
sponsored by Pure Storage
WEBCAST: Access this webcast to learn about how flash storage can be successfully utilized within government organizations.
Posted: 25 Jun 2015 | Premiered: Jun 12, 2014

Pure Storage

DevOps and the Business of Government: Removing the Barriers between Development and Delivery
sponsored by DLT Solutions
WEBCAST: This webinar discusses the principles of DevOps and the ways in which it can enable the government to bring greater value to agencies and the citizens they serve.
Posted: 08 Apr 2015 | Premiered: Jan 28, 2015

DLT Solutions

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

How Australia's Department of Defense Increased Efficiency with Flash
sponsored by Violin Memory
VIDEO: In this video, you'll learn how the Australian Department of Defense used the Windows Flash Array to achieve high-performing storage and greater virtualization.
Posted: 04 Mar 2015 | Premiered: 06 Jul 2014

Violin Memory

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

Information Governance - Information is a Strategic Asset (Telkom SA)
sponsored by IBM
VIDEOCAST: Hear Komalin Chetty describe how Telkom SA transformed information into a strategic asset through information governance in this video created for the 2010 Virtual IOD event.  Media library link includes a downloadable file and transcript to facilitate translation.
Posted: 17 Mar 2011 | Premiered: Mar 17, 2011

IBM

Virtual Desktop Solutions in the Federal Government
sponsored by VMware, Inc.
WEBCAST: This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.
Posted: 07 Feb 2012 | Premiered: Feb 7, 2012

VMware, Inc.

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Cisco Secure Remote Access Solution
sponsored by Cisco Systems, Inc.
SOFTWARE DEMO: This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.
Posted: 08 Jul 2008 | Premiered: 01 Jul 2008

Cisco Systems, Inc.

Content Analytics Dialoginar
sponsored by IBM
WEBCAST: Learn about identifying hidden trends, creating cost savings, and differentiating yourself from your competitors.
Posted: 23 May 2011 | Premiered: May 23, 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement