What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Upcoming Webcasts

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes. 10/23/2014

  • Big Data Marries End User Behavior – Mitigate the Insider Threat

    Join us to hear from Vice President and Research Fellow, IT Security and IT GRC, Derek E Brink as he presents his white paper about the insider threat, 3 activities to worry about, 5 ways they’re allowed to happen and what to do about it. He will be joined by Director of Insider Threat Programs, Daniel Velez, who will share over a decade of lessons learned regarding insider threat solutions. 10/09/2014

Whitepapers

  • Navigating Your VDI Decisions

    What are you really trying to deliver when you choose VDI? Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve needs around mobility and BYOD. Even as traditional VDI vendors bring their own solutions to market, is it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services make more sense, we can take a smarter approach to these difficult decisions.

  • Lenovo and webNetwork: One Workspace, All Data, All Devices

    Download this solution spotlight to learn how the webNetwork from Lenovo unites data center, cloud resources, and local application and file needs, seamlessly serving these resources to diverse operating systems, devices and users. Case workers, first responders, and knowledge workers get a consistently superb experience, and agency IT gets easy deployment and administration.

  • Where VDI Ends & The Cloud Begins

    Virtual desktop infrastructure (VDI) works best for smaller centrally located user bases that share a core set of application and file needs. As the world moves to the web and the cloud, is VDI still a good fit for emerging mobility and BYOD needs? Download this informative infographic to learn more.

  • IBM i2 National Security and Defense Intelligence

    The defense and national security environment has changed dramatically in recent years. While the government agencies involved in defense and in national security remain the key national lines of defense, the threats that these agencies face are now more sophisticated. Read this whitepaper to learn how agencies can keep pace with ever more sophisticated attacks.

  • Data Center Micro-Segmentation