Government Agencies (non-U.S.) Multimedia

(View All Report Types)
How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009


How One Solution Handled Federal Government Security Demands
sponsored by Riverbed Technology, Inc.
WEBCAST: The U.S. government has big IT needs in security and performance. Discover a single solution that met all expectations.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

Virtual Desktop Solutions in the Federal Government
sponsored by VMware, Inc.
WEBCAST: This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.
Posted: 07 Feb 2012 | Premiered: Feb 7, 2012

VMware, Inc.

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009


Endace Video 11
sponsored by Endace
WEBCAST: In discussion with Endace’s Michael Morris, Cisco Systems’ Senior National Security and Government Strategist provides his thoughts on cybersecurity standards and the risks in today’s landscape. The two consider how government agencies could promote bolstered security resiliency. Watch now to unlock their conversation in full.
Posted: 16 Mar 2023 | Premiered: Mar 16, 2023


SAIC Shares Military-Grade Kubernetes Best Practices for Digital Transformation
sponsored by D2IQ, Inc.
WEBCAST: With Kubernetes becoming more prevalent in military and government agencies, SAIC needed a better way to deploy Kubernetes for their clients in the defense and intelligence communities. This webinar details how D2iQ helped SAIC simplify its Kubernetes and advanced cloud-native deployments. Tune into the conversation here.
Posted: 28 Jul 2022 | Premiered: Jul 28, 2022

D2IQ, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Achieving Zero Trust for Corporate Networks
sponsored by Perimeter 81
WEBCAST: Between the rise in social-engineering attacks and the Biden Administration’s executive order for mandating zero-trust initiatives, demand for zero trust is at an all-time high. Tune in to this webcast to learn more about zero trust initiatives and see how partnering with Perimeter 81 could accelerate your zero-trust journey.
Posted: 08 Sep 2022 | Premiered: Sep 8, 2022

Perimeter 81

How a Multisector Social Health Information Exchange Supports Whole-Person Care
sponsored by UpHealth
WEBCAST: In this fireside chat, panelists will discuss the critical must-haves for successful SHIEs including creating cross-sector partnerships and collaboration, developing shared data governance, implementing data integration and interoperability, and addressing security and privacy.
Posted: 12 Dec 2022 | Premiered: Nov 8, 2022


Custom Express Do and Don't
sponsored by TechTarget
WEBCAST: Custom Express Do and Don't
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

TOPICS:  White Papers