Government Agencies (non-U.S.) Multimedia
-
How to Prevent Security Breaches Through Effective Management and Control of USB Devices
Sponsored by: LumensionLearn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
-
How One Solution Handled Federal Government Security Demands
Sponsored by: Riverbed Technology, Inc.The U.S. government has big IT needs in security and performance. Discover a single solution that met all expectations.
-
Welcome to a New Era of Digital Government
Sponsored by: OktaEvery online interaction, no matter how big or small, begins with an identity.In order to best serve the public, governments need to make sure every one of their digital experiences is centered around a human. Watch this video to learn more.
-
The Critical Security Controls – Moving Beyond the Checklist Mentality
Sponsored by: LumensionThe "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
-
Virtual Desktop Solutions in the Federal Government
Sponsored by: VMware, Inc.This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.
-
Endace Video 11
Sponsored by: EndaceIn discussion with Endace’s Michael Morris, Cisco Systems’ Senior National Security and Government Strategist provides his thoughts on cybersecurity standards and the risks in today’s landscape. The two consider how government agencies could promote bolstered security resiliency. Watch now to unlock their conversation in full.
-
Enhancing Security with Intel® Trusted Execution Technology
Sponsored by: Dell, Inc. and Intel®This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
-
Custom Express Do and Don't
Sponsored by: TechTargetCustom Express Do and Don't