• June News from immixGroup

      Issue 142 | Jun 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • May News from immixGroup

      Issue 141 | May 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • April News from immixGroup

      Issue 140 | Apr 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • Déjà vu all over again: How to prepare for CVE announcements webinar

      Mar 31, 2022 | Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      Secure software development isn’t always a top concern to the business unless you are in a highly regulated industry. Today, time to market is often more important than security, increasing the value of the product that you sell with continuous improvement and quick software releases. To create and maintain a lead on the competition, you have to be really good at Agile and DevOps. That’s where immixGroup and Checkmarx come in.

    • March News from immixGroup

      Issue 139 | Mar 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • The Enterprise Approach to Unified Endpoint Management and Security

      Find out why point solutions don't work, and the advantages of a Tanium enterprise solution when it comes to management and security.

    • How to help agencies fund critical IT modernization projects

      Feb 23, 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • February News from immixGroup

      Issue 138 | Feb 2022 | , BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,



      • Palo Alto Zero Trust Webinar

        Jan 27, 2022 | Cybersecurity, State & Local

        Watch this immixGroup webinar sponsored by CDWG where you will learn from Palo Alto Networks experts how to achieve Zero Trust for private cloud security. You will also discover how to take a pragmatic approach to implementing Zero Trust architectures for enterprise data centers.

      • January News from immixGroup

        Issue 137 | Jan 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • NetScout Connect360 Federal partner program

        Dec 15, 2021 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

        NetScout is excited to announce the launch of our enhanced federal partner program – Connect360 partner program for U.S. Federal. This program is designed to deliver new avenues of revenue to enable you to further grow your business through aggressive discounts on deal registration, strong renewal rates, certification training and more!

      • December News from immixGroup

        Issue 136 | Dec 2021 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • November news from immixGroup

        Issue 135 | Nov 2021 | Business and Operations, Cybersecurity, Enterprise Mobility, IT Infrastructure, State & Local

      • The Executive Order and Zero Trust webinar with BGT and Forcepoint

        Jul 22, 2021 | Cybersecurity

        Find out how your company can implement Zero Trust solutions in this webinar featuring Braxton-Grant Technologies and Forcepoint.

      • The Executive Order and Zero Trust webinar with BGT and Forcepoint

        Jul 21, 2021 | Cybersecurity

        Register today for this webinar to learn more about launching Zero Trust solutions with Braxton-Grant Technologies and Forcepoint

      • Monitoring for Remote Workforce

        Aug 6, 2020 | Cybersecurity

        Join immixGroup and Veriato to hear about how the pandemic is driving a surge in the use of Remote Monitoring Software, for employees working from home.

      • The Definitive Guide to Federal Protection

        Explore how to take a proactive stance on data protection—and why it’s the safe choice for agencies today in Forcepoint's latest whitepaper.

      • Barracuda CloudGen Firewall

        Learn how Barracuda Networks can help provide reliable and secure ways to connect home offices with enterprise applications.

      • Secure Your OT Environment

        Apr 28, 2020 | Cybersecurity, IT Infrastructure

        Attend this webinar with Gigamon and ClearShark to learn how to gain visibility into your operational environment to keep your OT network secure, efficient and cost effective.

      • Prisma Access Business Continuity and Enabling a Secure Mobile Workforce

        Mar 26, 2020 | Cybersecurity

        Watch this webinar to learn more about Palo Alto Networks customized offerings that are easy to consume, purchase and deploy.

      • McAfee MVISION Federal Overview

        Aug 30, 2018 | Cybersecurity, IT Infrastructure

        In this webinar, learn about the new McAfee MVISION portfolio that’s focused on making its products even more interoperable with third-party solutions and multiple platforms. 

      • Security Metrics That Matter

        Apr 24, 2018 | Cybersecurity

        Join RedSeal to learn how its solutions platform identifies cyber defensive gaps and runs continuous penetration tests to give stakeholders the understandable and actionable metric they need to drive toward resilience.

      • Analyzing the Modernizing Government Technology (MGT) Act and its Impact on Federal Cybersecurity Programs

        Jul 11, 2017 | BigData and Analytics, Cybersecurity

        Join Cameron Chehreh, Vice President and Chief Technology Officer at Dell EMC Federal, and Chris Brazdziunas, Vice President of Products at LogRhythm, as they examine the impacts of MGT Act on federal cyber security programs and capabilities

      • Defensive Cyber Operations – What Do You Need to Think About?

        Jun 29, 2017 | Cybersecurity

        2017 brings major changes to the way the DOD conducts Defensive Cyber Operations, both tactically and strategically. Watch this webinar to learn how you can adapt to the changes and be prepared.

      • President Trump’s Cybersecurity Executive Order and what agencies need to do to respond

        Jun 27, 2017 | Cybersecurity

        On May 11th, 2017, the President issued his Executive Order on strengthening cybersecurity and protecting the country’s digital infrastructure. Join RedSeal and GuidePoint Security as they review the EO and advise on how to effectively address the highest cybersecurity risks.

      • Gain visibility and secure network access to prevent emerging threats

        May 25, 2017 | Cybersecurity

        Join Pulse Secure in this webinar to learn strategies for tackling growing challenges government agencies face with connected internet of things devices and emerging cybersecurity threats, while also trying to provide easy access to data.

      • Threat Spelunking: Combining data-centric and endpoint hunt models for more effective threat hunting in Splunk

        May 2, 2017 | Cybersecurity

        Infocyte and Splunk have partnered to offer Splunk users a fully comprehensive threat hunting solution that combines the best of data-centric hunting provided by Splunk and agentless endpoint hunt capabilities offered by Infocyte. By combining the two solutions, Splunk users benefit from a proven and defined hunt workflow that reduces time-to-detection and eases hunter skillset requirements.

      • HPE Data Security webinar

        May 1, 2017 | Cybersecurity

        The challenge all organizations face with encryption solutions today is that you must decrypt your data before you use it.

      • HPE/Aruba Federal (Partner Ready for Networking Program) Review

        Nov 30, 2016 | Cybersecurity

        Watch this webinar to hear more about the new HPE FEDERAL Partner Ready for Networking Program and how you can benefit from an enhanced go-to-market model with greater margin opportunities for new business and mobile competencies. This review is specific to the FEDERAL market and is a separate program from the commercial model.

      • Windows 10: Managing Native Encryption with McAfee

        Nov 29, 2016 | Cybersecurity

        McAfee MNE (Management of Native Encryption) offers Windows 10 users the ability to reduce complexity by leveraging their current infrastructure to manage Native Encrytion (Bitlocker). Moreover, this reduces TCO, increases automation and streamlines processes for cyber professionals in the DoD.

      • Solving Data Privacy and Compliance Challenges with EnForce Risk Manager

        Oct 18, 2016 | Cybersecurity

        Every organization or agency has some form of sensitive information.  Whether that information is in the form of trade secrets or classified data, there is a strong need to manage and protect sensitive information at every stage of its lifecycle, especially in light of data breaches, data loss, and increasingly complex privacy regulations.  Learn how to proactively identify, categorize, and remediate sensitive and private information with Guidance Software’s newest product – EnForce Risk Manager.

      • Disruption Ahead: Applying Machine Learning for High Speed Network Security

        Aug 23, 2016 | Cybersecurity

        Traditional security tools are struggling to keep pace with the speed and volume of advanced, never-before-seen cyber threats hitting the network. Most compromises are detected first by third-parties, often months after an initial breach. Learn how a machine-learning solution can scan all network traffic at wire speed to detect, investigate and remediate advanced, “unknown” malware before damage is done.

      • Securing Hybrid Infrastructures

        Jun 28, 2016 | Cybersecurity

        Do you lack full security visibility across hybrid infrastructures? Do you lack the capability to sufficiently protect the data center and the cloud? Do you have challenges identifying and blocking today’s advanced threats? In this webinar, you will learn how Intel Security provides customers security and visibility of workloads on- and off-premises through security solutions that 1.) Protect physical, virtual, and cloud infrastructures 2.) Detect advanced targeted attacks, and 3.) Correct infected servers, storage, and networks. With centralized management, our customers improve visibility into their IT security posture for faster remediation and reporting to reduce risk and cost.

      • How to Mitigate Lateral Movement of Malicious Activity

        Jun 23, 2016 | Cybersecurity

        Despite record setting spending in the security space, data breach numbers are exploding. Today's cyber security landscape demands that we look beyond breach prevention, focusing more of our efforts on mitigating access, early detection, and quick response times.


      • Federal Cybersecurity Update: From Cyber Sprint to CSIP Marathon

        May 3, 2016 | Cybersecurity, CDM

        Learn best practices for how agencies are protecting our Nation’s critical infrastructure in the face of increasingly sophisticated and persistent cyber threats.

      • Mind the Gaps: Understanding the NCPS

        Apr 26, 2016 | Cybersecurity

        Join this live Webinar to learn about the National Cyber Protection System (NCPS), current compliance issues, and what security issues remain after NCPS deployment.

      • Puppet: Security and Compliance

        Apr 12, 2016 | Cybersecurity

        Security breaches and the demand of regulatory policies make compliance and quickly addressing security vulnerabilities harder than ever before. Watch this webinar to learn to define and deploy policies across all systems, continuously monitor drift, gain visibility to prove compliance, and more.

      • Optimizing End Point Protection with Intel Security

        Feb 24, 2016 | Cybersecurity

        Watch this webcast and come away with details on how you can speed detection and remediation response times with McAfee End Point Security, use Intel Security’s connected architecture to strengthen and accelerate the threat defense lifecycle, and more. 


      • Securely Archive Data in Today’s Federal Organization

        Jan 28, 2016 | Cybersecurity

        Learn how your organization can easily and securely archive data, maintain regulatory compliance, and meet eDiscovery requirements. In under one hour get details on benefits with archiving in the cloud, eDiscovery, and more.

        • How to Get the Most Out of Your Cyber Security Professionals’ Time

          Oct 22, 2015 | Cybersecurity

          How much of a high value cyber security professional’s time is spent on activities that are not improving the security posture of the enterprise? How do federal agencies make sure the most important vulnerabilities, patches and remediations are focused on first?  


        • Breaking the Cyber Attack Kill Chain

          Apr 30, 2015 | Cybersecurity

          With a constantly changing threat landscape how can we prevent, detect, and mitigate these advanced attacks? This on-demand Webinar lets gives you an understanding of how to address these advanced targeted attacks.

        • Managing the Risks of the Insider Threat

          Apr 28, 2015 | Cybersecurity

          In order to properly manage an organization’s information security program, the threat landscape must be assessed and understood.  This on-demand Webinar focuses on internal threats and how an organization can identify and manage the risks resulting from these internal threats.

        • Cyber Range: Better Defense, Better Training, Better Cybersecurity

          Mar 31, 2015 | Cybersecurity

          Results show that testing new cyber technologies takes 10 to 20 times longer without a Cyber Range, yet the value of using a Cyber Range has not been fully realized by many Defense agencies due to slow adoption. Learn about how the value in training, technology utilization and maturing of process and procedures in a Cyber Range can increase efficiency and effectiveness of your resources.

        • Why You Need Cybersecurity Visibility, Automation, and Centralization

          Mar 26, 2015 | Cybersecurity

          Let’s face it, there are better ways to close the security gaps that exist throughout our environments. CSG Invotas identifies three methods: radically altering our perception of our existing environments, getting a better view of your enterprise by rigorously monitoring interaction data for suspicious activity beyond known threats, and lastly segmenting your Security Visibility by zones based on predictable patterns to help fully utilize your new perspective while securing based on your business needs.

        • ABAC - The Convergence of API Security and Identity Management

          Mar 19, 2015 | Cybersecurity

          As agencies and organizations increase access to services and applications, the need for access control and enforcement has become critical. This can be a challenging and complex task. In this webinar, you will learn how API gateway technology simplifies Role Based, Content Based, and Attribute Based Access Control to provide a secure, centralized point of enforcement.

        • Operation Archangel: Live Report on Research into Hacker Network in Asia-Pacific Region

          Feb 25, 2015 | Cybersecurity

          For twelve months Intel Security labs observed and analyzed  Archangel, a  live hacking network in Asia Pacific. This network was able to access information on ally embassies, ally military, and US military contractors in the Asia Pacific Theatre. After studying this threat's techniques, Intel Security demonstrated how this research was conducted & what preventive measures needed to be taken in order to mitigate an advanced threat such as this.

        • Gain Visibility and Control Over Your Cloud Infrastructure

          Feb 24, 2015 | Cloud Computing, Cybersecurity

          Virtual private cloud (VPC) offerings, like those from Amazon Web Services, give organizations great flexibility not only for computing, but also to deploy new network infrastructure quickly. However, the nature and speed of these deployments can leave you wondering who has access to your data and are your security policies in compliance.

        • Advanced Threat Hunting: Identify and Track Zero-Day Attacks Infiltrating Your Agencies

          Feb 11, 2015 | Cybersecurity

          Attacks are highly sophisticated, well-funded and persistently targeting enterprise environments. Perimeter security is no longer effective at preventing these types of threats, as attackers easily and efficiently land on company endpoints. Because of this, there are really two types of companies: those that have been breached and know it, and those that have been breached and don’t know it yet. With this in mind, agencies need a variety of capabilities at their disposal to identify a potential compromise—one being the ability to hunt threats in their environment.

        • An Actionable Federal Response to PII Data Security

          Jan 14, 2015 | Cybersecurity

          In FY13 alone, there were over 25,500 breaches to Personally Identifiable Information (PII) in the Federal Public Sector, according to a recent GAO report, with nearly all agencies surveyed failing to comply with data control laws. Government apps and online support organizations handle vast amounts of PII, such as tax payer data or SSNs, and adoption of digital services is only making security more complex.

        • Who’s On Your Network? Understanding Cloud Security

          Jan 12, 2015 | , Cloud Computing, Cybersecurity

          Data center consolidation initiatives require several layers of security and hypervisor-level protection is critical for context awareness. These software-based solutions can enable rapid and secure workload deployments when properly configured for NIST.

        • A Geospatial Approach to Cyber Situational Awareness

          Nov 13, 2014 | Cybersecurity

          For cybersecurity to become truly effective, organizations need a mechanism to integrate all available data to quickly discover and prioritize cyber threats against their most critical processes and devices. The goal is to increase agility when responding to complex intrusions.

        • Vulnerability Management & Insider Threats from a Government Hacker’s Perspective with Marc Maiffret

          Aug 26, 2014 | Cybersecurity

          Government agencies are confronting a threat landscape which is increasing in complexity and sophistication. Vulnerability assessment tools play a critical role in protecting the network from internal and external threats. Leverage expertise, and learn about advanced vulnerability management capabilities to combat insider threats during this on-demand Webinar.

        • Are You JIE Ready?

          Aug 21, 2014 | Cybersecurity

          Join RedSeal’s Webinar to explore best practices in network analysis and visualization to prepare for JIE.

        • Intel Security Network Defenses for the Department of Energy

          Jul 16, 2014 | Cybersecurity

          As the cyber security landscape changes and advanced malware continues to evolve, more of the focus today is on network vulnerability. Learn more about these network vulnerabilities and discover how this solution can enable your agency today.

        • Advanced Threat Defense: Finding and Mitigating Malware

          Jun 17, 2014 | Cybersecurity

          Join Intel Security's Engineer, Mac Sheehan, for an interactive Webinar addressing the three key requirements to solving today's advanced malware problem: find, fix, and freeze.

        • Take back control – make the network work for you

          Apr 3, 2014 | Cybersecurity

          This on-demand Webinar by Palo Alto Networks and NetScout Systems will show you how to ensure you have the protection and control you need against the latest threats.

        • Continuous Diagnostics & Mitigation: Getting Started

          Mar 20, 2014 | Cybersecurity

          In any comprehensive cyber security program, Continuous Diagnostics and Mitigation (CDM) is the fundamental building block and core practice for satisfying FISMA requirements by agencies and government contractors. CDM facilitates, in real-time or near real-time, insights into the organization’s network health and security situation.

        • Navigate the CDM Process and Preview Upcoming Program Phases

          Mar 18, 2014 | Cybersecurity

          DHS' Continuous Diagnostics and Mitigation (CDM) program is an unprecedented opportunity for agencies to fortify federal computer networks and systems cybersecurity. Recently, John Streufert, DHS Director of Federal Network Resilience and leading voice of the CDM movement, participated in a Webinar with McAfee, a premier government CDM and cyber security solution supplier.

        • Unusual Suspects: Fighting the Invisible Enemy Part II

          Mar 12, 2014 | BigData and Analytics, Business and Operations, Cybersecurity

          This invaluable Webinar series reveals new ways to combat cybercrime using TIBCO StreamBase LiveView®. Utilize a real-time analytics platform with live, streaming data to visualize information in motion and expose cyber criminals. Transform your ability to identify and combat fraudulent activity.

        • Encryption for the Next Generation Endpoint: Webinar for DOD

          Feb 20, 2014 | Cybersecurity

          Join McAfee’s DOD Senior Security Engineer, Nicholas Clark, for an interactive Webinar to review DAR solutions and how they should work in the DOD environment.

      • Download Line Card

        PDF IconClick here to download the Cybersecurity line card in PDF format.