• Data-driven government - Best pracatices for public-private clouds and Zero Trust webinar

      Jun 22, 2022 | Cybersecurity

      This decision-maker webinar was sponsored by Palo Alto Networks and Precisely, and hosted by Arrow Electronics and immixGroup. It featured some amazing guest speakers including Jorge Avila, Project Director, California Department of Technology, Karen Jackson, Interim Executive Director, New College Institute (NCI) and former Secretary of Technology, Commonwealth of Virginia, Fadi Fadhil, K-12 Cybersecurity Strategist, Palo Alto Networks, and former CIO for the city of Minneapolis and the Minneapolis Public Schools, Nick Smith, Federal Solutions Specialists, Precisely, Jeanne Holm, Deputy Mayor, City of Los Angeles and UCLA Distinguished Instructor, and Amelia Powers Gardner, County Commissioner, Utah County.

         

      • June News from immixGroup

        Issue 142 | Jun 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • May News from immixGroup

        Issue 141 | May 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • April News from immixGroup

        Issue 140 | Apr 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • Déjà vu all over again: How to prepare for CVE announcements webinar

        Mar 31, 2022 | Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

        Secure software development isn’t always a top concern to the business unless you are in a highly regulated industry. Today, time to market is often more important than security, increasing the value of the product that you sell with continuous improvement and quick software releases. To create and maintain a lead on the competition, you have to be really good at Agile and DevOps. That’s where immixGroup and Checkmarx come in.

      • March News from immixGroup

        Issue 139 | Mar 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • The Enterprise Approach to Unified Endpoint Management and Security

        Find out why point solutions don't work, and the advantages of a Tanium enterprise solution when it comes to management and security.

      • How to help agencies fund critical IT modernization projects

        Feb 23, 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • February News from immixGroup

        Issue 138 | Feb 2022 | , BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

         

           

        • Palo Alto Zero Trust Webinar

          Jan 27, 2022 | Cybersecurity, State & Local

          Watch this immixGroup webinar sponsored by CDWG where you will learn from Palo Alto Networks experts how to achieve Zero Trust for private cloud security. You will also discover how to take a pragmatic approach to implementing Zero Trust architectures for enterprise data centers.

        • January News from immixGroup

          Issue 137 | Jan 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

        • NetScout Connect360 Federal partner program

          Dec 15, 2021 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

          NetScout is excited to announce the launch of our enhanced federal partner program – Connect360 partner program for U.S. Federal. This program is designed to deliver new avenues of revenue to enable you to further grow your business through aggressive discounts on deal registration, strong renewal rates, certification training and more!

        • December News from immixGroup

          Issue 136 | Dec 2021 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

        • November news from immixGroup

          Issue 135 | Nov 2021 | Business and Operations, Cybersecurity, Enterprise Mobility, IT Infrastructure, State & Local

        • October news from immixGroup

          Issue 134 | Oct 2021 | Business and Operations, Cybersecurity, State & Local

        • Where to find those hidden AF opportunities

          Apr 23, 2021 | BigData and Analytics, Cybersecurity

        • FY21: Overview of Civilian and Defense Budget Priorities

          Nov 20, 2020 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, IT Infrastructure

          Learn more about budget priorities for the Department of Defense and select civilian agencies in this latest webinar.

        • Top DoD Capital Expenditure Programs

          Oct 7, 2020 | BigData and Analytics, Cloud Computing, Cybersecurity, IT Infrastructure

          Watch this webinar to find out who will be making the largest CAPEX investments in FY21.

        • Monitoring for Remote Workforce

          Aug 6, 2020 | Cybersecurity

          Join immixGroup and Veriato to hear about how the pandemic is driving a surge in the use of Remote Monitoring Software, for employees working from home.

        • The Definitive Guide to Federal Protection

          Explore how to take a proactive stance on data protection—and why it’s the safe choice for agencies today in Forcepoint's latest whitepaper.

        • Barracuda CloudGen Firewall

          Learn how Barracuda Networks can help provide reliable and secure ways to connect home offices with enterprise applications.

        • In-Depth Analysis of Application Whitelisting

          Learn more about the benefits of Application Whitelisting in PC Matic's whitepaper.

        • Securing the Cloud With Prisma

          Apr 2, 2020 | Cybersecurity

          Secure your journey to the cloud by providing the most comprehensive cloud security in the industry, protecting users, applications, and data — regardless of where they are.

        • Prisma Access Business Continuity and Enabling a Secure Mobile Workforce

          Mar 26, 2020 | Cybersecurity

          Watch this webinar to learn more about Palo Alto Networks customized offerings that are easy to consume, purchase and deploy.

        • New DoD Cybersecurity Maturity Model

          Mar 5, 2020 | Cybersecurity

          View this on-demand webinar to learn about the newest CMMC requirements.

        • Supplier Update: FedRAMP Moves Forward

          Nov 21, 2019 | Cybersecurity

          Learn how to navigate the FedRAMP review and approval process and accelerate authorization.

        • Supporting the Evolving SLED Cyber Market

          Nov 21, 2019 | Cybersecurity, State & Local

          How state and local governments are responding to new cyber threats with innovative strategies.How state and local governments are responding to new cyber threats with innovative strategies.

        • IoT for Government—Opportunities and Observations

          Nov 21, 2019 | BigData and Analytics, Cloud Computing, Cybersecurity, IT Infrastructure

          How agencies are implementing IoT applications and how industry can help them select and deploy effective, trusted solutions.

        • Defending the Federal Enterprise with Smart Cyber Strategies

          Nov 21, 2019 | Cybersecurity

          How agencies are leveraging powerful new cyber technologies such as advanced monitoring, ransomware mitigation, threat intelligence and more.

        • Market Intelligence Briefing: The Civilian FY20 Budget

          Nov 21, 2019 | BigData and Analytics, Cloud Computing, Cybersecurity, IT Infrastructure

          Latest details on IT budgets, technology priorities and organizational landscapes for FY20 programs in civilian agencies.

        • Market Intelligence Briefing: The DOD FY20 Budget

          Nov 21, 2019 | BigData and Analytics, Cloud Computing, Cybersecurity, IT Infrastructure

          Latest details on IT budgets, technology priorities and organizational landscapes for DOD FY20 programs.

        • Mission Control: The State of the Industry

          Nov 21, 2019 | BigData and Analytics, Cloud Computing, Cybersecurity, IT Infrastructure

          IT executives from industry share their perspectives on driving results that matter – for government and industry.

        • Delivering Trust Confidence Through Digital Resilience

          Nov 4, 2019 | Cybersecurity

          Learn how your agency can clean up its networks, address compliance issues and respond more rapidly to incidents by integrating its security products – ensuring a digitally resilient network.

        • Cyber Attack Vectors: The Case for Predictive Prioritization

          Sep 19, 2019 | Cybersecurity

          Learn how Tenable’s Predictive Prioritization help government customers prioritize and re-mediate critical vulnerabilities in this joint webinar.

        • Web and Email Isolation

          Mar 14, 2019 | Cloud Computing, Cybersecurity

          How do you prevent malicious websites and email messages from reaching the federal government? Symantec’s web and email isolation provides a virtual air-gap between the endpoint and Internet, sending only safe information to the user. This prevents any website or email malware from ever reaching your device.

        • Making mobile access secure and convenient using derived PIV credentials

          Dec 12, 2018 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity

          The government workplace is already using tablets and/or smartphones to access secure data, but the existing technology available to reach this data securely can be unwieldy and somewhat outdated. With the introduction of derived PIV credentials, you can use your existing secure technology to access important information without it being a hassle.

        • Making Infrastructure Invisible with One - Click Provisioning

          Oct 25, 2018 | Cloud Computing, Cybersecurity, IT Infrastructure

          In this joint webinar, Nutanix and Mellanox will unlock the mystery on how to simplify data center infrastructure management by demonstrating one-click networking with AHV (from Nutanix) and NEO (from Mellanox)

        • McAfee MVISION Federal Overview

          Aug 30, 2018 | Cybersecurity, IT Infrastructure

          In this webinar, learn about the new McAfee MVISION portfolio that’s focused on making its products even more interoperable with third-party solutions and multiple platforms. 

        • Hyperconverged Storage for Backup and Hybrid Cloud Solutions

          Jul 17, 2018 | Cloud Computing, Cybersecurity, Enterprise Mobility

          Secondary environments consist of several fragmented silos that are hard and expensive to manage. Join us for this webinar to learn how Cohesity can consolidate these silos, reduce cost by over 50 percent and provide a complete backup/ recovery and native hybrid cloud solution.

        • How to Allow Broad Web Access by Isolating Your Traffic

          Jul 17, 2018 | Cloud Computing, Cybersecurity

          Isolate web browsing - keep it outside of the enterprise! Enable users full web browsing experience, without the risks of bringing the web traffic into their enterprise!

        • Everything You Need to Know About IT Sales Opportunities at Department of Commerce

          Apr 30, 2018 | Cloud Computing, Cybersecurity, IT Infrastructure

          The Department of Commerce’s mission of economic growth has many moving parts. And cutting-edge technology is playing a big role in keeping those parts well-oiled. Market Intelligence consultant, Tom O’Keefe, provides insight on Commerce’s IT priorities, funded programs and most-pressing challenges.

        • Security Metrics That Matter

          Apr 24, 2018 | Cybersecurity

          Join RedSeal to learn how its solutions platform identifies cyber defensive gaps and runs continuous penetration tests to give stakeholders the understandable and actionable metric they need to drive toward resilience.

        • Cloud Ramps Up at DOD—Here’s What You Need to Know

          Feb 22, 2018 | Cloud Computing, Cybersecurity

          The Department of Defense is getting more strategic with its cloud initiatives but there’s lots of confusion as to how it will play out. Market Intelligence consultant, Stephanie Meloni, and senior analyst, Mark Wisinger, discuss how various DOD organizations are approaching cloud and the best strategy and messaging for technology companies.

        • Combatant Commands: Big Challenges, Big Opportunities for Tech

          Aug 1, 2017 | BigData and Analytics, Cybersecurity, Enterprise Mobility, IT Infrastructure

          Combatant Commands have a variety of missions, often operating in austere environments. You’ll learn how technology can play a role as Market Intelligence Senior Analyst, Mark Wisinger, unravels IT priorities, top decision makers and challenges at the various COCOMs.

        • Department of State Building Next-Gen IT Backbone

          Jul 17, 2017 | Cloud Computing, Cybersecurity, IT Infrastructure

          FY18 sparks a pivotal year for their next generation infrastructure advancement and you will want to find out what the future holds for State’s IT strategy as Market Intelligence Analyst, Kevin Shaker, shares technology initiatives and funded IT programs that are shaping acquisitions at the State Department, USAID and related agencies and bureaus.

        • Tech Paving the Way for Smarter Transportation

          Jun 9, 2017 | BigData and Analytics, Cloud Computing, Cybersecurity, Enterprise Mobility, IT Infrastructure, State & Local

          Discover how technology vendors can support the growth of smart transportation as SLED Consultant Rachel Eckert shares what’s driving state and local transportation initiatives and what transportation systems of the future look like.

        • Cybersecurity 2017: Safeguarding Government in an Era of Emerging Threats

          May 17, 2017 | Cybersecurity, CDM

          How are agencies protecting our nation’s critical infrastructure in the face of emerging and persistent cyber threats? Find out as government IT leaders give first-hand accounts of cyber challenges and future action plans.

        • Army’s IT Modernization Plan – What Lies Ahead?

          Apr 5, 2017 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, IT Infrastructure

          The Army continues to face challenges in rolling out its IT modernization plan. Learn about the multi-domain solutions Army needs to advance its mission-critical IT priorities as Stephanie Meloni, DOD consultant, shares which Army organizations and programs will make your sales efforts more effective.

        • IT Sales Opportunities at the VA – Everything You Need to Know but Were Afraid to Ask

          Mar 7, 2017 | Business and Operations, Cloud Computing, Cybersecurity

          Find out how the new administration plans on prioritizing modernization efforts at the Department of Veterans Affairs as Market Intelligence Consultant, Chris Wiedemann shares technology trends and strategic initiatives essential to your FY17 territory plan.

        • Federal Cybersecurity Update: From Cyber Sprint to CSIP Marathon

          May 3, 2016 | Cybersecurity, CDM

          Learn best practices for how agencies are protecting our Nation’s critical infrastructure in the face of increasingly sophisticated and persistent cyber threats.

        • Managing the Risks of the Insider Threat

          Apr 28, 2015 | Cybersecurity

          In order to properly manage an organization’s information security program, the threat landscape must be assessed and understood.  This on-demand Webinar focuses on internal threats and how an organization can identify and manage the risks resulting from these internal threats.

        • Operation Archangel: Live Report on Research into Hacker Network in Asia-Pacific Region

          Feb 25, 2015 | Cybersecurity

          For twelve months Intel Security labs observed and analyzed  Archangel, a  live hacking network in Asia Pacific. This network was able to access information on ally embassies, ally military, and US military contractors in the Asia Pacific Theatre. After studying this threat's techniques, Intel Security demonstrated how this research was conducted & what preventive measures needed to be taken in order to mitigate an advanced threat such as this.

        • Gain Visibility and Control Over Your Cloud Infrastructure

          Feb 24, 2015 | Cloud Computing, Cybersecurity

          Virtual private cloud (VPC) offerings, like those from Amazon Web Services, give organizations great flexibility not only for computing, but also to deploy new network infrastructure quickly. However, the nature and speed of these deployments can leave you wondering who has access to your data and are your security policies in compliance.

        • Advanced Threat Hunting: Identify and Track Zero-Day Attacks Infiltrating Your Agencies

          Feb 11, 2015 | Cybersecurity

          Attacks are highly sophisticated, well-funded and persistently targeting enterprise environments. Perimeter security is no longer effective at preventing these types of threats, as attackers easily and efficiently land on company endpoints. Because of this, there are really two types of companies: those that have been breached and know it, and those that have been breached and don’t know it yet. With this in mind, agencies need a variety of capabilities at their disposal to identify a potential compromise—one being the ability to hunt threats in their environment.

        • An Actionable Federal Response to PII Data Security

          Jan 14, 2015 | Cybersecurity

          In FY13 alone, there were over 25,500 breaches to Personally Identifiable Information (PII) in the Federal Public Sector, according to a recent GAO report, with nearly all agencies surveyed failing to comply with data control laws. Government apps and online support organizations handle vast amounts of PII, such as tax payer data or SSNs, and adoption of digital services is only making security more complex.

        • Proceed with Caution: Hidden Cybersecurity Risk in IT Consolidation - Government IT Sales Summit

          Nov 20, 2014 | Cybersecurity

          As government infrastructure shrinks and interoperability improves across agencies, industry can play a key role in helping to keep systems and data secure. Watch this video from the Government IT Sales Summit, as government experts discuss strategies to protect against threats, and how industry can help.

        • A Geospatial Approach to Cyber Situational Awareness

          Nov 13, 2014 | Cybersecurity

          For cybersecurity to become truly effective, organizations need a mechanism to integrate all available data to quickly discover and prioritize cyber threats against their most critical processes and devices. The goal is to increase agility when responding to complex intrusions.

        • Threat Briefing & Next Gen Firewall Demo

          Mar 19, 2014 | Cybersecurity

          View this on-demand webinar for Systems Integrators covering analytics on the latest threats, vectors, techniques, and an interactive demo of McAfee Next Generation Firewall. Learn how you can help your customers use advanced analytics to predict, prevent, detect, and respond to exponential growth of cyberthreats, detect attacks that are penetrating existing firewalls and IPS, centrally manage critical network processes with high availability, decrease the redundant tasks of multiple systems, and consolidate security systems to lower hardware and software costs.