Keep up with the latest technologies being used by your peers in government to achieve mission success. immixGroup's free Technology Spotlight Webinars and Podcasts are available on-demand for viewing at your convenience.
Creating a Better Government with Better Training
Dec 14, 2016
Though civilians and soldiers today require continuous and flexible training to accelerate success, many agencies' learning programs fall short and cost too much. Learn how Blackboard is helping the Government solve this problem with our innovative, integrated suite of teaching and learning solutions. In this webinar you'll find out how Blackboard can help you solve your agencies learning challenges, maximize results, and reduce costs.
HPE/Aruba Federal (Partner Ready for Networking Program) Review
Nov 30, 2016 Cybersecurity
Watch this webinar to hear more about the new HPE FEDERAL Partner Ready for Networking Program and how you can benefit from an enhanced go-to-market model with greater margin opportunities for new business and mobile competencies. This review is specific to the FEDERAL market and is a separate program from the commercial model.
Windows 10: Managing Native Encryption with McAfee
Nov 29, 2016 Cybersecurity
McAfee MNE (Management of Native Encryption) offers Windows 10 users the ability to reduce complexity by leveraging their current infrastructure to manage Native Encrytion (Bitlocker). Moreover, this reduces TCO, increases automation and streamlines processes for cyber professionals in the DoD.
Solving Data Privacy and Compliance Challenges with EnForce Risk Manager
Oct 18, 2016 Cybersecurity
Every organization or agency has some form of
sensitive information. Whether that
information is in the form of trade secrets or classified data, there is a
strong need to manage and protect sensitive information at every stage of its
lifecycle, especially in light of data breaches, data loss, and increasingly
complex privacy regulations. Learn how
to proactively identify, categorize, and remediate sensitive and private
information with Guidance Software’s newest product – EnForce Risk Manager.
Disruption Ahead: Applying Machine Learning for High Speed Network Security
Aug 23, 2016 Cybersecurity
Traditional security tools are struggling to keep pace with the speed and volume of advanced, never-before-seen cyber threats hitting the network. Most compromises are detected first by third-parties, often months after an initial breach. Learn how a machine-learning solution can scan all network traffic at wire speed to detect, investigate and remediate advanced, “unknown” malware before damage is done.
Compliance with the Managing Government Records Directive - Part 2
Aug 10, 2016
This short webinar will review critical capabilities that will help you consolidate infrastructure, prune non-essential data and expand visibility into both production and archived data. It’s not just about managing records. It’s about alleviating IT burden and managing risk more effectively while reducing total cost of ownership.
A Practical Roadmap: Part 1
Jul 19, 2016
CIOs and records management stakeholders must keep their eyes on the ball as they race to comply with M-12-18. It’s not just about managing email. It’s about consolidating infrastructure, alleviating IT burden, and managing risk more effectively while reducing total cost of ownership.
Securing Hybrid Infrastructures
Jun 28, 2016 Cybersecurity
Do you lack full security visibility across hybrid infrastructures? Do you lack the capability to sufficiently protect the data center and the cloud? Do you have challenges identifying and blocking today’s advanced threats? In this webinar, you will learn how Intel Security provides customers security and visibility of workloads on- and off-premises through security solutions that 1.) Protect physical, virtual, and cloud infrastructures 2.) Detect advanced targeted attacks, and 3.) Correct infected servers, storage, and networks. With centralized management, our customers improve visibility into their IT security posture for faster remediation and reporting to reduce risk and cost.
How to Mitigate Lateral Movement of Malicious Activity
Jun 23, 2016 Cybersecurity
Despite record setting spending in the security space, data breach numbers are exploding. Today's cyber security landscape demands that we look beyond breach prevention, focusing more of our efforts on mitigating access, early detection, and quick response times.
Mapping Enterprise Networks
May 17, 2016
In today's enterprise environments, IT administrators only know what they implemented themselves. Due to distributed responsibilities among non-network administrators, often network maps are incomplete or non-existent. Join SwishData and ImmixGroup as they host Wayne Lloyd from RedSeal to talk about techniques and methods to not only map out networks completely, but also find important security details about the network, even if it is not under Network Administrator control.
Agencies Beware: Mobile Apps are Spying on You
May 10, 2016 Cybersecurity
Mind the Gaps: Understanding the NCPS
Apr 26, 2016 Cybersecurity
Join this live Webinar to learn about the National Cyber Protection System (NCPS), current compliance issues, and what security issues remain after NCPS deployment.
Securing Hadoop: How to Secure PII, PCI and Sensitive Data Fields in Hortonworks
Apr 21, 2016
Learn about the nature of Hadoop and how Dataguise and Hortonworks can provide a complete solution to your Hadoop security requirements.
Cloud Computing Strategies with Plexxi
Apr 15, 2016 Cloud Computing
Watch this webcast to discover why and how IT is moving to a cloud based services consumption model and more.
Puppet: Security and Compliance
Apr 12, 2016 Cybersecurity
Security breaches and the demand of regulatory policies make compliance and quickly addressing security vulnerabilities harder than ever before. Watch this webinar to learn to define and deploy policies across all systems, continuously monitor drift, gain visibility to prove compliance, and more.
Control Cloud Applications with Exinda
Mar 22, 2016 Cloud Computing
When critical cloud applications don’t perform as expected, customers are left with poor Quality of Experience. Over 80% of negative UC experiences are due to poor network conditions. Exinda prioritizes critical cloud apps to ensure users receive the optimal performance needed to be productive and drive business success.
Sharing Information Seamlessly Through APIs
Mar 8, 2016 Big Data and Analytics
Learn how you can position your agency for digital success, implement an API action plan, unlock the value of your digital assets, and more.
Optimizing End Point Protection with Intel Security
Feb 24, 2016 Cybersecurity
Watch this webcast and come away with details on how you can speed detection and remediation response times with McAfee End Point Security, use Intel Security’s connected architecture to strengthen and accelerate the threat defense lifecycle, and more.
Enabling Digital Transformation with MySQL
Feb 18, 2016 Cloud Computing
Watch this webcast and you will learn how to improve database security, how to enhance the performance of open source web applications, and more.
Securely Archive Data in Today’s Federal Organization
Jan 28, 2016 Cybersecurity
Learn how your organization can easily and securely archive data, maintain regulatory compliance, and meet eDiscovery requirements. In under one hour get details on benefits with archiving in the cloud, eDiscovery, and more.
Understanding the File Analysis Market — Get Ready for Growth
Nov 4, 2015 Big Data and Analytics
Watch this webcast and learn the importance of File Analysis in the future of IT, government client examples, and Acaveo's DEAL registration program.
How to Get the Most Out of Your Cyber Security Professionals’ Time
Oct 22, 2015 Cybersecurity
How much of a high value cyber security professional’s time is spent on activities that are not improving the security posture of the enterprise? How do federal agencies make sure the most important vulnerabilities, patches and remediations are focused on first?
Simple, Easy & Flexible – Streamline Your Licensing and Permitting Process
Oct 14, 2015 Cloud Computing
Watch this webcast and find out how Sofbang's solution can reduce lines, phone calls, and enhance constituent satisfaction.
Securing the Cloud
Aug 26, 2015
Join Aaron Faulkner, Chief Strategy Officer with InfoReliance Corporation and Bill Eckman Senior Account Representative, Defense Health Agency as they discuss the pitfalls to avoid and the key to securing your data as you transition to the cloud.
Debunking 4 Myths of Vulnerability Management
Aug 20, 2015
Join immixGroup and Secunia, Inc. for this interactive Webinar to to learn interesting data points that will help you make better informed decisions on your mitigation strategies.
Slashing Storage Costs in Half: 5 Essential Tips for Modern Data Storage
Jun 23, 2015
Significantly Increase Your FPDS-NG Productivity and Spend Analysis Intelligence
May 7, 2015 Big Data and Analytics
As recognized global experts in government spend analysis and strategic sourcing, BravoSolution has found that many government agencies are faced with the challenging task of consolidating, cleansing and normalizing their spend data across many disparate source data systems. Learn more with this on-demand Webinar.
Breaking the Cyber Attack Kill Chain
Apr 30, 2015 Cybersecurity
With a constantly changing threat landscape how can we prevent, detect, and mitigate these advanced attacks? This on-demand Webinar lets gives you an understanding of how to address these advanced targeted attacks.
Managing the Risks of the Insider Threat
Apr 28, 2015 Cybersecurity
In order to properly manage an organization’s information security program, the threat landscape must be assessed and understood. This on-demand Webinar focuses on internal threats and how an organization can identify and manage the risks resulting from these internal threats.
Got Big Data? Uncovering hidden insights within Big Content
Apr 8, 2015 Big Data and Analytics
Join immixGroup and TIBCO in this on-demand Webinar to find out how Spotfire can help you derive contextual value and dig deeper beyond the norm to understand your data – all without having to leave your desk.
Cyber Range: Better Defense, Better Training, Better Cybersecurity
Mar 31, 2015 Cybersecurity
Results show that testing new cyber technologies takes 10 to 20 times longer without a Cyber Range, yet the value of using a Cyber Range has not been fully realized by many Defense agencies due to slow adoption. Learn about how the value in training, technology utilization and maturing of process and procedures in a Cyber Range can increase efficiency and effectiveness of your resources.
Why You Need Cybersecurity Visibility, Automation, and Centralization
Mar 26, 2015 Cybersecurity
Let’s face it, there are better ways to close the security gaps that exist throughout our environments. CSG Invotas identifies three methods: radically altering our perception of our existing environments, getting a better view of your enterprise by rigorously monitoring interaction data for suspicious activity beyond known threats, and lastly segmenting your Security Visibility by zones based on predictable patterns to help fully utilize your new perspective while securing based on your business needs.
ABAC - The Convergence of API Security and Identity Management
Mar 19, 2015 Cybersecurity
As agencies and organizations increase access to services and applications, the need for access control and enforcement has become critical. This can be a challenging and complex task. In this webinar, you will learn how API gateway technology simplifies Role Based, Content Based, and Attribute Based Access Control to provide a secure, centralized point of enforcement.
Why Modernizing Siebel Is More Cost Effective than Replacing It
Feb 26, 2015
Siebel CRM still offers unmatched depth and breadth of enterprise process support, however Siebel functionality does not include modern innovations such as omnichannel support and self-service customer portals. While competitors are aggressively selling the wholesale replacement of Siebel software, Siebel customers now have a new option.
Operation Archangel: Live Report on Research into Hacker Network in Asia-Pacific Region
Feb 25, 2015 Cybersecurity
For twelve months Intel Security labs observed and analyzed Archangel, a live hacking network in Asia Pacific. This network was able to access information on ally embassies, ally military, and US military contractors in the Asia Pacific Theatre. After studying this threat's techniques, Intel Security demonstrated how this research was conducted & what preventive measures needed to be taken in order to mitigate an advanced threat such as this.
Gain Visibility and Control Over Your Cloud Infrastructure
Feb 24, 2015 Cloud Computing, Cybersecurity
Virtual private cloud (VPC) offerings, like those from Amazon Web Services, give organizations great flexibility not only for computing, but also to deploy new network infrastructure quickly. However, the nature and speed of these deployments can leave you wondering who has access to your data and are your security policies in compliance.
Advanced Threat Hunting: Identify and Track Zero-Day Attacks Infiltrating Your Agencies
Feb 11, 2015 Cybersecurity
Attacks are highly sophisticated, well-funded and persistently targeting enterprise environments. Perimeter security is no longer effective at preventing these types of threats, as attackers easily and efficiently land on company endpoints. Because of this, there are really two types of companies: those that have been breached and know it, and those that have been breached and don’t know it yet. With this in mind, agencies need a variety of capabilities at their disposal to identify a potential compromise—one being the ability to hunt threats in their environment.
An Actionable Federal Response to PII Data Security
Jan 14, 2015 Cybersecurity
In FY13 alone, there were over 25,500 breaches to Personally Identifiable Information (PII) in the Federal Public Sector, according to a recent GAO report, with nearly all agencies surveyed failing to comply with data control laws. Government apps and online support organizations handle vast amounts of PII, such as tax payer data or SSNs, and adoption of digital services is only making security more complex.
Who’s On Your Network? Understanding Cloud Security
Jan 12, 2015 Cloud Computing, Cybersecurity
Data center consolidation initiatives require several layers of security and hypervisor-level protection is critical for context awareness. These software-based solutions can enable rapid and secure workload deployments when properly configured for NIST.
Delivering Choice, Flexibility, and Lower Costs to the Public Sector
Dec 11, 2014 IT Infrastructure
With budget constraints and growing demand for services, Open Source continues to be the "go to" approach for government. Oracle offers agencies industry-leading open source solutions as a viable choice to incorporate into their mission-critical environments. As a result, government customers can benefit with lower costs, easier manageability, higher availability, and improved reliability – along with increased performance and scalability advantages.
A Geospatial Approach to Cyber Situational Awareness
Nov 13, 2014 Cybersecurity
For cybersecurity to become truly effective, organizations need a mechanism to integrate all available data to quickly discover and prioritize cyber threats against their most critical processes and devices. The goal is to increase agility when responding to complex intrusions.
Vulnerability Management & Insider Threats from a Government Hacker’s Perspective with Marc Maiffret
Aug 26, 2014 Cybersecurity
Government agencies are confronting a threat landscape which is increasing in complexity and sophistication. Vulnerability assessment tools play a critical role in protecting the network from internal and external threats. Leverage expertise, and learn about advanced vulnerability management capabilities to combat insider threats during this on-demand Webinar.
Are You JIE Ready?
Aug 21, 2014 Cybersecurity
Join RedSeal’s Webinar to explore best practices in network analysis and visualization to prepare for JIE.
Advanced Persistent Threat: The Real Story of an Agency Breach
Jul 24, 2014 Cybersecurity
Getting hacked isn’t a hypothetical nightmare – it’s an everyday reality that today's agencies are facing. It can take the form of highly complicated, and well-funded, state-sponsored attacks – many of which pose a significant threat to our economy and national security.
Please join Intel Security and SwishData for an in-depth look at the anatomy of a real-life hack and how it could have been prevented along the way.
Intel Security Network Defenses for the Department of Energy
Jul 16, 2014 Cybersecurity
As the cyber security landscape changes and advanced malware continues to evolve, more of the focus today is on network vulnerability. Learn more about these network vulnerabilities and discover how this solution can enable your agency today.
Advanced Threat Defense: Finding and Mitigating Malware
Jun 17, 2014 Cybersecurity
Join Intel Security's Engineer, Mac Sheehan, for an interactive Webinar addressing the three key requirements to solving today's advanced malware problem: find, fix, and freeze.
Ethernet Fabrics: Networks for Virtualized Government Environments
May 28, 2014 Cloud Computing, IT Infrastructure
This Webinar covers the challenges of networking in highly virtualized data centers, systems, and clouds, and the advantages of fabric technology.
Dramatically Simplify Your Oracle Database Operations
May 21, 2014 Business and Operations, IT Infrastructure
Virtualizing Oracle databases enables provisioning databases faster, to deliver better availability and lower costs. But the complexity and cost of creating the best storage environment to support this architecture has been daunting—until now. This Webinar demonstrates how databases run better on Pure Storage.
Enterprise Mobility Management: Delivering Government’s Mission on the Go
May 6, 2014
The government is transitioning from a legacy mobile environment to one that captures the emergence of smart phone and tablet technologies to support agency missions. This new mobile ecosystem includes the wireless carriers, the devices, security/monitoring tools, and the management of the lifecycle and expenses associated with the components of this mobile ecosystem. FedInsider has brought to the table government stakeholders to discuss agency plans for implementing new ways to achieve cost savings and innovation through mobility.
End-to-end process improvement changes the game in your favor
May 1, 2014 Business and Operations
Government agencies are driven by sometimes opposing goals. In a resource-constrained environment how can you improve productivity and enhance the quality of data-dependent decisions? Is your documentation up to date? Is it a reliable, single source of truth for process management? View this recording to find out how government agencies are now able to implement standardized, streamlined IT systems.
Improving Cybersecurity and Resilience Through CDM
Apr 8, 2014
Join FedInsider in this quarterly emerging technologies series to hear from
government leaders about their view of 2014 and beyond.
Take back control – make the network work for you
Apr 3, 2014 Cybersecurity
This on-demand Webinar by Palo Alto Networks and NetScout Systems will show you how to ensure you have the protection and control you need against the latest threats.
The Future of Federal Networks is Software-based
Mar 26, 2014 Cloud Computing, IT Infrastructure
View this on-demand Webinar focused on Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies.
Continuous Diagnostics & Mitigation: Getting Started
Mar 20, 2014 Cybersecurity
In any comprehensive cyber security program, Continuous Diagnostics and Mitigation (CDM) is the fundamental building block and core practice for satisfying FISMA requirements by agencies and government contractors. CDM facilitates, in real-time or near real-time, insights into the organization’s network health and security situation.
Federal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service
Mar 19, 2014
Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become increasingly sophisticated, aggressive, and persistent.
Navigate the CDM Process and Preview Upcoming Program Phases
Mar 18, 2014 Cybersecurity
DHS' Continuous Diagnostics and Mitigation (CDM) program is an unprecedented opportunity for agencies to fortify federal computer networks and systems cybersecurity. Recently, John Streufert, DHS Director of Federal Network Resilience and leading voice of the CDM movement, participated in a Webinar with McAfee, a premier government CDM and cyber security solution supplier.
Increasing Your Success with RightNow CX
Mar 13, 2014
As with other SaaS CRM applications, RightNow CX customers often underestimate the need for post-implementation support resources. Overcoming this issue is key to achieving your business objectives and avoiding the risk of a failed deployment.
Unusual Suspects: Fighting the Invisible Enemy Part II
Mar 12, 2014 Big Data and Analytics, Business and Operations, Cybersecurity
This invaluable Webinar series reveals new ways to combat cybercrime using TIBCO StreamBase LiveView®. Utilize a real-time analytics platform with live, streaming data to visualize information in motion and expose cyber criminals. Transform your ability to identify and combat fraudulent activity.
Encryption for the Next Generation Endpoint: Webinar for DOD
Feb 20, 2014 Cybersecurity
Join McAfee’s DOD Senior Security Engineer, Nicholas Clark, for an interactive Webinar to review DAR solutions and how they should work in the DOD environment.
Enter your email address
Certified to ISO 9001:2008 without design.©2017 immixGroup, Inc. All rights reserved worldwide.