What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Upcoming Webcasts

  • CDM: Getting from Concept to Implementation

    The Continuous Diagnostics and Mitigation program is a significant but complex undertaking for federal agencies – not least because of the complexity of agencies themselves and their IT landscapes. The Department of Homeland Security is an interesting case study, because the department is helping to oversee the CDM initiative as well as implementation for its own benefit. In this webcast, Jeff Gallucci, Director of Authorization, Reviews and Monitoring Ongoing Risk (ARMOR) in the Department of Homeland Security Information Security Office, will share insights and lessons learned from the department’s experience as an early adopter. 09/09/2015

  • Advanced Secure Multilevel Access: Going Beyond Secure KVM

    For many years, Secure KVM switching technology has been one of the best options for providing users with a way to access desktop systems with different security levels from a single keyboard, monitor and mouse. However, as reliable as Secure KVM has been, it has failed to keep pace with important advances in how agencies manage access to systems and data. That’s where virtual desktop infrastructure and simultaneous multilevel access solutions enter the frame. In this webcast, you will learn how VDI makes it possible for agencies to field secure thin clients that improve both the security and flexibility of multilevel access, while also reducing the cost of operations. 07/28/2015

Whitepapers

  • DevOps: Drving Organizational Charge and Agility with PaaS

    Creating and managing applications and processes using the Platform as a Service model has always been an excellent way for developers to work faster and more productively, while letting the operations team reduce the time it takes to get important services and applications to users. Agencies that have been using PaaS to achieve these benefits know well that while the productivity, cost and scalability advantages have been significant, there are sometimes roadblocks to achieving even greater benefits. Download this free eBook to find out how PaaS can better assist you!

  • The Cost of an Unintentional Insider Threat

    All workplaces share the same security threat: the well-meaning but careless employee who may be more focused on productivity than protecting the company’s sensitive or confidential information. Often, without thinking of the potential consequences, they leave confidential documents in plain view, share passwords, circumvent security procedures and transfer sensitive data to the public cloud without company approval – ultimately costing much more to your organization’s bottom line than the employee hoped to save in time. IT professionals agree that more security incidents are caused by negligence than malicious acts. This paper considers the causes for negligence in the workplace such as multitasking, workplace stress, training and culture and points the way to solutions for alleviating the cost of UIT to the organization.

  • Internet Security Threat Report

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 57.6 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Intelligence, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.

  • Securing Data in an Unsecure World

    Individuals and organizations today are generating more sensitive data than ever before. For most, it is not a question of if you suffer a breach, but when. This ebook provides specific information on the state of security today and practical steps you can take to secure your sensitive data.

  • Flash Array Deployment for Dummies