The Young AFCEANs from AFCEA's NOVA Chapter recently sponsored a webinar, "Capture strategies in constrained timeframes." Jeffrey Shen, vice president and general manager at Red Team Consulting, provided a one-hour briefing on the basic sales principles in determining whether to pursue a business opportunity. Here are some lead-off questions businesses need to ask themselves:
Today, military communications deploy diverse technologies that comprise the tactical and strategic converged networks needed to support warfighters' missions. Challenges exist in deploying and operating these networks that include a broad range of technologies including: VoIP, TDM, SatCom, cellular, tactical radios, SCIP, WiFi and GSM. Additionally, military communications must support the wide range of diverse and not necessarily interconnected networks which are comprised of legacy and emerging technologies.
On August 11, 2011 at 12 noon ET, join us for a webinar discussion on how the U.S. Defense Department and coalition partners can safely move mission-critical data without compromising security or compliance through assured air gap transfer. Today's missions-whether they include sharing vital information in forward locations, moving data between coalition partners, or delivering command instructions and situation briefs-depend on the secure movement of data. However, in recent years, USB devices have been identified as potential attack vectors for viruses and malware that could impact critical systems and so have been banned or restricted in many environments.
Join us on June 23 at 1 p.m. for a webinar sponsored by SafeNet on how Ethernet encryption over other technologies can help you improve your bottom line while simplifying your network.
Widespread access to sensitive or confidential documents poses serious risks of information disclosure, as was witnessed this year with confidential information ending up in the hands of WikiLeaks. Join us on May 26, 2011, at 1 pm ET for a discussion on how an effective data classification strategy can help government organizations comply with marking standards, reduce data loss and optimize information sharing whether internally or externally.
Everyone who registers before May 26 is eligible to win a free iPad. You do not need to attend the webinar to win.
Join us on April 21, 2011 at noon ET as SIGNAL Editor-in-Chief Robert K. Ackerman talks with Mercury Computer Systems' Marc Couture and Tom Roberts in "Detect, Deceive and Defeat: Increasing the HPOI of your EW System":
Join us March 10, 2011 at 12 noon as SIGNAL Editor-in-Chief Robert K. Ackerman talks with Alan Henderson, Vice President of Engineering, Globecomm Network Services Corp.:
Data center networking presents many challenges in terms of supporting cost-effective, reliable and high-performance services for business-critical applications. A coherent overall networking strategy leading to the deployment of a powerful and flexible network creates more long-term value than a series of tactical, project-oriented steps.
In this virtual seminar, Ciena's Jim Morin and Jeff Verrant discuss bandwidth options and other ideas for taking a more strategic approach to data center networking that addresses the heart of the problem: The need for a high-performance, deterministic, manageable and cost-efficient network.
The next SIGNAL webinar will be held on Thursday, February 25, at 12:00 PM Eastern Time. The topic will focus on service portfolio management, which is new to the world of service management in ITIL V3. It provides the critical guidance to ensure that "the complete set of services that are being managed by a service provider" in terms of the value to the mission and the organizational value that they provide.
For more information and to register, visit the Web site.
As defense entities continue to virtualize their IT environments, they must revisit not only their security architectures but their policy and governance models, the subject of the next SIGNAL webinar on November 12 at 11 a.m. Eastern Time.
Join Dr. James Ransome of Cisco Systems as he explores how the three commonly accepted models for cloud-service delivery can be implemented to drive efficiencies while maintaining desired security levels.
For more information and to register, click here.
In today's telephony environment, the U.S. Department of Defense needs to not only meet the legacy demands of its current TDM technology but also lead its organization to the future of end-to-end IP-centric communications on the GIG, the subject of the next SIGNAL webinar on October 29 at 1 p.m. Eastern Time.
Join Steve Anderson of Cisco Federal and Jeff Sinclair of PacStar as they discuss key innovations of the newest Small End Office (SMEO) solution, certified August 2009.
Carrier Ethernet takes the dominant LAN technology-namely, Ethernet-and extends it onto Metro and Wide Area networks (MANs/WANs). This potent force greatly simplifies access to, and use of, IP traffic for mission-critical applications and services.
Please join co-presenter Chris Janson, coauthor of the book Carrier Ethernet for Dummies, and Lt. Col Jeff Verrant, USMCR, Ciena's director of DOD business development, for "Carrier Ethernet 101 - A Primer on Carrier Ethernet for the DOD" on Thurs., Oct. 15, 2009, at 1:00 PM ET.
The next SIGNAL Webinar will be held on September 24, 2009, at 12:00 PM Eastern.
Government agencies and departments around the globe are rapidly moving forward with their efforts of converging voice, data and video services onto a common IP infrastructure. The main force behind this accelerated transition to IP networks is a realization of the efficiency and cost savings from running multiple applications and services across a single infrastructure.
Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought. A well thought-out defense-in-depth strategy includes multiple layers of security and different overlapping technologies.
Attendees will learn how a secure data center architecture can:
Managing virtual environments is becoming more complex, Federal initiatives are piling on, and your organization's infrastructure is what it is. Is the promise of virtualization a pipe dream? How do you manage it all and keep your sanity?
This webinar, to be held March 19, 2009, at 12 noon ET, will explore:
SIGNAL's next webinar will be on February 26 at 11 a.m. and features Kurt Dickey, Unified Communications Specialist at Cisco Federal. From the description:
Organizations that maintain separate voice and data networks are confronted with the challenge of increasing productivity while reducing costs.
The next SIGNAL Webinar, "Data at Rest Protection: An Integral Part of an Enterprise Data Protection Strategy," will be on Tuesday, December 9 at 12 Eastern. Here's the description:
Government agencies and enterprises require an Enterprise Data Protection (EDP) solution to effectively secure their data from the "core" where key data repositories exist, across networks, and all the way to the "edge" where the data is used - a perimeter defense will no longer suffice in today's world. A truly comprehensive EDP solution includes database / server encryption, network encryption, key management systems, disk & file encryption, and authentication tokens.
Details have been announced for the next AFCEA Solutions Series webinar, which will be on May 21, 2008, 1-2 p.m. SIGNAL Editor-in-Chief Robert K. Ackerman will moderate the panel, which includes:
Robert Lentz, Director for Information Assurance, OASD NII