• Keep up with the latest technologies being used by your peers in government to achieve mission success. immixGroup's free Technology Spotlight Webinars and Podcasts are available on-demand for viewing at your convenience.

    • Analyzing the Modernizing Government Technology (MGT) Act and its Impact on Federal Cybersecurity Programs

      Jul 11, 2017
      Big Data and Analytics, Cybersecurity

      Dell has a very large modernization effort going on with the Federal Government, I see value in allowing Dell to explain what that means, why it is important and their take on security.  We then have James Respond with his expertise on IT Modernization and what they means to TLM/UEBA/SIEM/Cyber Security in general.

    • Defensive Cyber Operations – What Do You Need to Think About?

      Jun 29, 2017
      Cybersecurity

      2017 brings major changes to the way the DOD conducts Defensive Cyber Operations, both tactically and strategically. Watch this webinar to learn how you can adapt to the changes and be prepared.

    • President Trump’s Cybersecurity Executive Order and what agencies need to do to respond

      Jun 27, 2017
      Cybersecurity

      On May 11th, 2017, the President issued his Executive Order on strengthening cybersecurity and protecting the country’s digital infrastructure. Join RedSeal and GuidePoint Security as they review the EO and advise on how to effectively address the highest cybersecurity risks.

    • Optimizing Hyperconverged Infrastructure with Plexxi

      Jun 20, 2017
      Cloud Computing

      Is your network ready for 10x traffic growth? Watch this webinar to learn how Plexxi can deliver a simply better network for CI and storage.

    • Gain visibility and secure network access to prevent emerging threats

      May 25, 2017
      Cybersecurity

      Join Pulse Secure in this webinar to learn strategies for tackling growing challenges government agencies face with connected internet of things devices and emerging cybersecurity threats, while also trying to provide easy access to data.

    • Innovate with the New MySQL Cloud Service

      May 23, 2017
      Cloud Computing

      MySQL is now available as a service in the Oracle Cloud! Learn how it provides a simple, automated, integrated and enterprise-ready cloud service.

    • Threat Spelunking: Combining data-centric and endpoint hunt models for more effective threat hunting in Splunk

      May 2, 2017
      Cybersecurity

      Infocyte and Splunk have partnered to offer Splunk users a fully comprehensive threat hunting solution that combines the best of data-centric hunting provided by Splunk and agentless endpoint hunt capabilities offered by Infocyte. By combining the two solutions, Splunk users benefit from a proven and defined hunt workflow that reduces time-to-detection and eases hunter skillset requirements.

    • HPE Data Security webinar

      May 1, 2017
      Cybersecurity

      The challenge all organizations face with encryption solutions today is that you must decrypt your data before you use it.

    • Mitigating Windows 10 migration risk

      Mar 16, 2017

      Join Riverbed for this interactive webinar to find out how major initiatives in the DOD space are being addressed.

    • Technology matters: Taking your procurement certification/training program to the next level

      Mar 14, 2017
      Business and Operations

      Join this webinar to find out details on Blackboard's innovative, integrated suite of learning solutions and view demonstrations of  the latest technology available to help you solve your learning challenges, maximize results, and reduce costs. 

    • Creating a Better Government with Better Training

      Dec 14, 2016

      Though civilians and soldiers today require continuous and flexible training to accelerate success, many agencies' learning programs fall short and cost too much. Learn how Blackboard is helping the Government solve this problem with our innovative, integrated suite of teaching and learning solutions. In this webinar you'll find out how Blackboard can help you solve your agencies learning challenges, maximize results, and reduce costs.

    • HPE/Aruba Federal (Partner Ready for Networking Program) Review

      Nov 30, 2016
      Cybersecurity

      Watch this webinar to hear more about the new HPE FEDERAL Partner Ready for Networking Program and how you can benefit from an enhanced go-to-market model with greater margin opportunities for new business and mobile competencies. This review is specific to the FEDERAL market and is a separate program from the commercial model.

    • Windows 10: Managing Native Encryption with McAfee

      Nov 29, 2016
      Cybersecurity

      McAfee MNE (Management of Native Encryption) offers Windows 10 users the ability to reduce complexity by leveraging their current infrastructure to manage Native Encrytion (Bitlocker). Moreover, this reduces TCO, increases automation and streamlines processes for cyber professionals in the DoD.

    • Solving Data Privacy and Compliance Challenges with EnForce Risk Manager

      Oct 18, 2016
      Cybersecurity

      Every organization or agency has some form of sensitive information.  Whether that information is in the form of trade secrets or classified data, there is a strong need to manage and protect sensitive information at every stage of its lifecycle, especially in light of data breaches, data loss, and increasingly complex privacy regulations.  Learn how to proactively identify, categorize, and remediate sensitive and private information with Guidance Software’s newest product – EnForce Risk Manager.

    • Disruption Ahead: Applying Machine Learning for High Speed Network Security

      Aug 23, 2016
      Cybersecurity

      Traditional security tools are struggling to keep pace with the speed and volume of advanced, never-before-seen cyber threats hitting the network. Most compromises are detected first by third-parties, often months after an initial breach. Learn how a machine-learning solution can scan all network traffic at wire speed to detect, investigate and remediate advanced, “unknown” malware before damage is done.

    • Compliance with the Managing Government Records Directive - Part 2

      Aug 10, 2016

      This short webinar will review critical capabilities that will help you consolidate infrastructure, prune non-essential data and expand visibility into both production and archived data. It’s not just about managing records. It’s about alleviating IT burden and managing risk more effectively while reducing total cost of ownership.

    • A Practical Roadmap: Part 1

      Jul 19, 2016

      CIOs and records management stakeholders must keep their eyes on the ball as they race to comply with M-12-18. It’s not just about managing email. It’s about consolidating infrastructure, alleviating IT burden, and managing risk more effectively while reducing total cost of ownership.

    • Securing Hybrid Infrastructures

      Jun 28, 2016
      Cybersecurity

      Do you lack full security visibility across hybrid infrastructures? Do you lack the capability to sufficiently protect the data center and the cloud? Do you have challenges identifying and blocking today’s advanced threats? In this webinar, you will learn how Intel Security provides customers security and visibility of workloads on- and off-premises through security solutions that 1.) Protect physical, virtual, and cloud infrastructures 2.) Detect advanced targeted attacks, and 3.) Correct infected servers, storage, and networks. With centralized management, our customers improve visibility into their IT security posture for faster remediation and reporting to reduce risk and cost.

    • How to Mitigate Lateral Movement of Malicious Activity

      Jun 23, 2016
      Cybersecurity

      Despite record setting spending in the security space, data breach numbers are exploding. Today's cyber security landscape demands that we look beyond breach prevention, focusing more of our efforts on mitigating access, early detection, and quick response times.

       

    • Mapping Enterprise Networks

      May 17, 2016

      In today's enterprise environments, IT administrators only know what they implemented themselves.  Due to distributed responsibilities among non-network administrators, often network maps are incomplete or non-existent.  Join SwishData and ImmixGroup as they host Wayne Lloyd from RedSeal to talk about techniques and methods to not only map out networks completely, but also find important security details about the network, even if it is not under Network Administrator control.

    • Mind the Gaps: Understanding the NCPS

      Apr 26, 2016
      Cybersecurity

      Join this live Webinar to learn about the National Cyber Protection System (NCPS), current compliance issues, and what security issues remain after NCPS deployment.

    • Securing Hadoop: How to Secure PII, PCI and Sensitive Data Fields in Hortonworks

      Apr 21, 2016

      Learn about the nature of Hadoop and how Dataguise and Hortonworks can provide a complete solution to your Hadoop security requirements.

    • Cloud Computing Strategies with Plexxi

      Apr 15, 2016
      Cloud Computing

      Watch this webcast to discover why and how IT is moving to a cloud based services consumption model and more.

    • Puppet: Security and Compliance

      Apr 12, 2016
      Cybersecurity

      Security breaches and the demand of regulatory policies make compliance and quickly addressing security vulnerabilities harder than ever before. Watch this webinar to learn to define and deploy policies across all systems, continuously monitor drift, gain visibility to prove compliance, and more.

    • Control Cloud Applications with Exinda

      Mar 22, 2016
      Cloud Computing

      When critical cloud applications don’t perform as expected, customers are left with poor Quality of Experience. Over 80% of negative UC experiences are due to poor network conditions. Exinda prioritizes critical cloud apps to ensure users receive the optimal performance needed to be productive and drive business success.

    • Sharing Information Seamlessly Through APIs

      Mar 8, 2016
      Big Data and Analytics

      Learn how you can position your agency for digital success, implement an API action plan, unlock the value of your digital assets, and more. 

    • Optimizing End Point Protection with Intel Security

      Feb 24, 2016
      Cybersecurity

      Watch this webcast and come away with details on how you can speed detection and remediation response times with McAfee End Point Security, use Intel Security’s connected architecture to strengthen and accelerate the threat defense lifecycle, and more. 


       

    • Enabling Digital Transformation with MySQL

      Feb 18, 2016
      Cloud Computing

      Watch this webcast and you will learn how to improve database security, how to enhance the performance of  open source web applications, and more. 

    • Securely Archive Data in Today’s Federal Organization

      Jan 28, 2016
      Cybersecurity

      Learn how your organization can easily and securely archive data, maintain regulatory compliance, and meet eDiscovery requirements. In under one hour get details on benefits with archiving in the cloud, eDiscovery, and more.

      • Understanding the File Analysis Market — Get Ready for Growth

        Nov 4, 2015
        Big Data and Analytics

        Watch this webcast and learn the importance of File Analysis in the future of IT, government client examples, and Acaveo's DEAL registration program.

         

        • How to Get the Most Out of Your Cyber Security Professionals’ Time

          Oct 22, 2015
          Cybersecurity

          How much of a high value cyber security professional’s time is spent on activities that are not improving the security posture of the enterprise? How do federal agencies make sure the most important vulnerabilities, patches and remediations are focused on first?  

           

        • Simple, Easy & Flexible – Streamline Your Licensing and Permitting Process

          Oct 14, 2015
          Cloud Computing

          Watch this webcast and find out how Sofbang's solution can reduce lines, phone calls, and enhance constituent satisfaction.

        • Securing the Cloud

          Aug 26, 2015

          Join Aaron Faulkner, Chief Strategy Officer with InfoReliance Corporation and Bill Eckman Senior Account Representative, Defense Health Agency as they discuss the pitfalls to avoid and the key to securing your data as you transition to the cloud.

        • Debunking 4 Myths of Vulnerability Management

          Aug 20, 2015

          Join immixGroup and Secunia, Inc. for this interactive Webinar to to learn interesting data points that will help you make better informed decisions on your mitigation strategies.

        • Slashing Storage Costs in Half: 5 Essential Tips for Modern Data Storage

          Jun 23, 2015

          Slashing Storage Costs in Half: 5 Essential Tips for Modern Data Storage
          Discover how to meet your IT convergence initiatives and budget requirements while avoiding unnecessary storage costs and reducing expenses by more than half.

        • Significantly Increase Your FPDS-NG Productivity and Spend Analysis Intelligence

          May 7, 2015
          Big Data and Analytics

          As recognized global experts in government spend analysis and strategic sourcing, BravoSolution has found that many government agencies are faced with the challenging task of consolidating, cleansing and normalizing their spend data across many disparate source data systems. Learn more with this on-demand Webinar.

        • Breaking the Cyber Attack Kill Chain

          Apr 30, 2015
          Cybersecurity

          With a constantly changing threat landscape how can we prevent, detect, and mitigate these advanced attacks? This on-demand Webinar lets gives you an understanding of how to address these advanced targeted attacks.

        • Managing the Risks of the Insider Threat

          Apr 28, 2015
          Cybersecurity

          In order to properly manage an organization’s information security program, the threat landscape must be assessed and understood.  This on-demand Webinar focuses on internal threats and how an organization can identify and manage the risks resulting from these internal threats.

        • Got Big Data? Uncovering hidden insights within Big Content

          Apr 8, 2015
          Big Data and Analytics

          Join immixGroup and TIBCO in this on-demand Webinar to find out how Spotfire can help you derive contextual value and dig deeper beyond the norm to understand your data  – all without having to leave your desk.

        • Cyber Range: Better Defense, Better Training, Better Cybersecurity

          Mar 31, 2015
          Cybersecurity

          Results show that testing new cyber technologies takes 10 to 20 times longer without a Cyber Range, yet the value of using a Cyber Range has not been fully realized by many Defense agencies due to slow adoption. Learn about how the value in training, technology utilization and maturing of process and procedures in a Cyber Range can increase efficiency and effectiveness of your resources.

        • Why You Need Cybersecurity Visibility, Automation, and Centralization

          Mar 26, 2015
          Cybersecurity

          Let’s face it, there are better ways to close the security gaps that exist throughout our environments. CSG Invotas identifies three methods: radically altering our perception of our existing environments, getting a better view of your enterprise by rigorously monitoring interaction data for suspicious activity beyond known threats, and lastly segmenting your Security Visibility by zones based on predictable patterns to help fully utilize your new perspective while securing based on your business needs.

        • ABAC - The Convergence of API Security and Identity Management

          Mar 19, 2015
          Cybersecurity

          As agencies and organizations increase access to services and applications, the need for access control and enforcement has become critical. This can be a challenging and complex task. In this webinar, you will learn how API gateway technology simplifies Role Based, Content Based, and Attribute Based Access Control to provide a secure, centralized point of enforcement.

        • Why Modernizing Siebel Is More Cost Effective than Replacing It

          Feb 26, 2015

          Siebel CRM still offers unmatched depth and breadth of enterprise process support, however Siebel functionality does not include modern innovations such as omnichannel support and self-service customer portals. While competitors are aggressively selling the wholesale replacement of Siebel software, Siebel customers now have a new option. 

        • Operation Archangel: Live Report on Research into Hacker Network in Asia-Pacific Region

          Feb 25, 2015
          Cybersecurity

          For twelve months Intel Security labs observed and analyzed  Archangel, a  live hacking network in Asia Pacific. This network was able to access information on ally embassies, ally military, and US military contractors in the Asia Pacific Theatre. After studying this threat's techniques, Intel Security demonstrated how this research was conducted & what preventive measures needed to be taken in order to mitigate an advanced threat such as this.

        • Gain Visibility and Control Over Your Cloud Infrastructure

          Feb 24, 2015
          Cloud Computing, Cybersecurity

          Virtual private cloud (VPC) offerings, like those from Amazon Web Services, give organizations great flexibility not only for computing, but also to deploy new network infrastructure quickly. However, the nature and speed of these deployments can leave you wondering who has access to your data and are your security policies in compliance.

        • Advanced Threat Hunting: Identify and Track Zero-Day Attacks Infiltrating Your Agencies

          Feb 11, 2015
          Cybersecurity

          Attacks are highly sophisticated, well-funded and persistently targeting enterprise environments. Perimeter security is no longer effective at preventing these types of threats, as attackers easily and efficiently land on company endpoints. Because of this, there are really two types of companies: those that have been breached and know it, and those that have been breached and don’t know it yet. With this in mind, agencies need a variety of capabilities at their disposal to identify a potential compromise—one being the ability to hunt threats in their environment.

        • An Actionable Federal Response to PII Data Security

          Jan 14, 2015
          Cybersecurity

          In FY13 alone, there were over 25,500 breaches to Personally Identifiable Information (PII) in the Federal Public Sector, according to a recent GAO report, with nearly all agencies surveyed failing to comply with data control laws. Government apps and online support organizations handle vast amounts of PII, such as tax payer data or SSNs, and adoption of digital services is only making security more complex.

        • Who’s On Your Network? Understanding Cloud Security

          Jan 12, 2015
          Cloud Computing, Cybersecurity

          Data center consolidation initiatives require several layers of security and hypervisor-level protection is critical for context awareness. These software-based solutions can enable rapid and secure workload deployments when properly configured for NIST.

        • Delivering Choice, Flexibility, and Lower Costs to the Public Sector

          Dec 11, 2014
          IT Infrastructure

          With budget constraints and growing demand for services, Open Source continues to be the "go to" approach for government. Oracle offers agencies industry-leading open source solutions as a viable choice to incorporate into their mission-critical environments. As a result, government customers can benefit with lower costs, easier manageability, higher availability, and improved reliability – along with increased performance and scalability advantages.

        • A Geospatial Approach to Cyber Situational Awareness

          Nov 13, 2014
          Cybersecurity

          For cybersecurity to become truly effective, organizations need a mechanism to integrate all available data to quickly discover and prioritize cyber threats against their most critical processes and devices. The goal is to increase agility when responding to complex intrusions.

        • Vulnerability Management & Insider Threats from a Government Hacker’s Perspective with Marc Maiffret

          Aug 26, 2014
          Cybersecurity

          Government agencies are confronting a threat landscape which is increasing in complexity and sophistication. Vulnerability assessment tools play a critical role in protecting the network from internal and external threats. Leverage expertise, and learn about advanced vulnerability management capabilities to combat insider threats during this on-demand Webinar.

        • Are You JIE Ready?

          Aug 21, 2014
          Cybersecurity

          Join RedSeal’s Webinar to explore best practices in network analysis and visualization to prepare for JIE.

        • Advanced Persistent Threat: The Real Story of an Agency Breach

          Jul 24, 2014
          Cybersecurity

          Getting hacked isn’t a hypothetical nightmare – it’s an everyday reality that today's agencies are facing. It can take the form of highly complicated, and well-funded, state-sponsored attacks – many of which pose a significant threat to our economy and national security.

          Please join Intel Security and SwishData for an in-depth look at the anatomy of a real-life hack and how it could have been prevented along the way.  

        • Intel Security Network Defenses for the Department of Energy

          Jul 16, 2014
          Cybersecurity

          As the cyber security landscape changes and advanced malware continues to evolve, more of the focus today is on network vulnerability. Learn more about these network vulnerabilities and discover how this solution can enable your agency today.

        • Advanced Threat Defense: Finding and Mitigating Malware

          Jun 17, 2014
          Cybersecurity

          Join Intel Security's Engineer, Mac Sheehan, for an interactive Webinar addressing the three key requirements to solving today's advanced malware problem: find, fix, and freeze.

        • Ethernet Fabrics: Networks for Virtualized Government Environments

          May 28, 2014
          Cloud Computing, IT Infrastructure

          This Webinar covers the challenges of networking in highly virtualized data centers, systems, and clouds, and the advantages of fabric technology.

        • Dramatically Simplify Your Oracle Database Operations

          May 21, 2014
          Business and Operations, IT Infrastructure

          Virtualizing Oracle databases enables provisioning databases faster, to deliver better availability and lower costs. But the complexity and cost of creating the best storage environment to support this architecture has been daunting—until now. This Webinar demonstrates how databases run better on Pure Storage.

        • Enterprise Mobility Management: Delivering Government’s Mission on the Go

          May 6, 2014

          The government is transitioning from a legacy mobile environment to one that captures the emergence of smart phone and tablet technologies to support agency missions. This new mobile ecosystem includes the wireless carriers, the devices, security/monitoring tools, and the management of the lifecycle and expenses associated with the components of this mobile ecosystem. FedInsider has brought to the table government stakeholders to discuss agency plans for implementing new ways to achieve cost savings and innovation through mobility.

        • End-to-end process improvement changes the game in your favor

          May 1, 2014
          Business and Operations

          Government agencies are driven by sometimes opposing goals. In a resource-constrained environment how can you improve productivity and enhance the quality of data-dependent decisions? Is your documentation up to date? Is it a reliable, single source of truth for process management? View this recording to find out how government agencies are now able to implement standardized, streamlined IT systems.

        • Improving Cybersecurity and Resilience Through CDM

          Apr 8, 2014

          Join FedInsider in this quarterly emerging technologies series to hear from government leaders about their view of 2014 and beyond.

        • Take back control – make the network work for you

          Apr 3, 2014
          Cybersecurity

          This on-demand Webinar by Palo Alto Networks and NetScout Systems will show you how to ensure you have the protection and control you need against the latest threats.

        • The Future of Federal Networks is Software-based

          Mar 26, 2014
          Cloud Computing, IT Infrastructure

          View this on-demand Webinar focused on Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies.

        • Continuous Diagnostics & Mitigation: Getting Started

          Mar 20, 2014
          Cybersecurity

          In any comprehensive cyber security program, Continuous Diagnostics and Mitigation (CDM) is the fundamental building block and core practice for satisfying FISMA requirements by agencies and government contractors. CDM facilitates, in real-time or near real-time, insights into the organization’s network health and security situation.

        • Federal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service

          Mar 19, 2014

          Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become increasingly sophisticated, aggressive, and persistent.

        • Navigate the CDM Process and Preview Upcoming Program Phases

          Mar 18, 2014
          Cybersecurity

          DHS' Continuous Diagnostics and Mitigation (CDM) program is an unprecedented opportunity for agencies to fortify federal computer networks and systems cybersecurity. Recently, John Streufert, DHS Director of Federal Network Resilience and leading voice of the CDM movement, participated in a Webinar with McAfee, a premier government CDM and cyber security solution supplier.

        • Increasing Your Success with RightNow CX

          Mar 13, 2014

          As with other SaaS CRM applications, RightNow CX customers often underestimate the need for post-implementation support resources.  Overcoming this issue is key to achieving your business objectives and avoiding the risk of a failed deployment.

        • Unusual Suspects: Fighting the Invisible Enemy Part II

          Mar 12, 2014
          Big Data and Analytics, Business and Operations, Cybersecurity

          This invaluable Webinar series reveals new ways to combat cybercrime using TIBCO StreamBase LiveView®. Utilize a real-time analytics platform with live, streaming data to visualize information in motion and expose cyber criminals. Transform your ability to identify and combat fraudulent activity.

        • Encryption for the Next Generation Endpoint: Webinar for DOD

          Feb 20, 2014
          Cybersecurity

          Join McAfee’s DOD Senior Security Engineer, Nicholas Clark, for an interactive Webinar to review DAR solutions and how they should work in the DOD environment.

      • Already Registered?

        Enter your email address