Post-GEOINT Webinar Series:
Continue Driving Data to Decisions and Action
Thales e-Security: Don't Let a CSP Control Your Data Security
Thales e-Security provides comprehensive data security solutions that enable your organization to safely use, share, and store data anywhere. Thales products can help you meet your data protection and security compliance challenges.
ikeGPS: Integrate Laser Measurements with Your Mobile Device, and Esri's Survey123 for ArcGIS
Spike is a laser measurement solution for all types of geospatial applications. Quickly measure areas, elevations, distances between two points, and GPS/GNSS location by taking a photo from your smartphone or tablet. Data collected with Spike can be imported into GIS software including Collector for ArcGIS and Survey123 for ArcGIS.
CA Technologies: Modern Identity and Access Management for Intel
CA Technologies helps customers succeed in a future where every federal agency is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for agencies in the application economy.
Proofpoint: Protect & Govern Sensitive Business Data
Proofpoint protects your people, data, and brand from advanced threats and compliance risks across email, mobile apps, and social media. They help you safely manage critical data as you send, store, and archive it. They give you the intelligence, insight, and tools to respond quickly when things go wrong.
Software Acquisition: Make Buy Trades Driving Data to Decisions
CEO, Buck Consulting
When procuring GEOINT applications, agencies face a decision between buying COTS or contracting to develop a GOTS solution. In today's API economy with open platforms, agencies can harness the advantages of both, leveraging extending COTS software platforms with GOTS and Open Source development. This session will provide insight into a Hybrid COTS/GOTS approach to achieve GEOINT decision advantage.
Virtualizing Critical Infrastructure: Glen Canyon Dam
Civil Engineer, US Bureau of Reclamation
Hear how the US Bureau of Reclamation created unified intelligent models of Glen Canyon Dam and power plant using Autodesk software to better assess current conditions and ensure the site's longevity. Join this session to discover how the data and models created can be used for projects ranging from design, operations & maintenance, security, education, and visualization.
Splunk: Platform for Machine Data
Splunk Inc. provides the leading platform for Operational Intelligence. Splunk® software searches, monitors, analyzes, and visualizes machine-generated big data from websites, applications, servers, networks, sensors, and mobile devices. More than 14,000 organizations use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, improve service performance, and reduce costs.
Red Hat: Automate GEOINT with Ansible
Containers, systems, networks, and clouds can be more efficient and secure with automation. This session will demonstrate how to automate policy enforcement, vulnerability detection, and remediation using Ansible and CloudForms by Red Hat.
Trend Micro: Security for Mobile, Endpoints, Gateways, Servers, & Cloud
Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints.
| 3:00pm ET|
Cylance: The Temporal Advantage
Cylance® uses artificial intelligence to deliver prevention-first, predictive security products and specialized services that change how organizations approach endpoint security. Cylance's security solutions combine AI driven predictive prevention with dynamic threat detection and response to deliver consistent protection and visibility across the enterprise.
Akamai: Using Actionable Threat Intelligence for Situational Cyber Defense & Awareness
Akamai is the leading cloud platform for making Internet infrastructure secure, reliable, and fast, utilizing a globally distributed content delivery platform. Akamai's Threat Intelligence provides situational awareness in the cyber domain to analyze, visualize, and track adversaries globally. Akamai's vantage point provides insights into active threats as they target organizations across the Internet. Learn how to use Akamai's unique visibility to proactively defend yourself from threats and optimize your cyber defense capability.
Adobe: Modernizing Government Business Processes Through Efficiencies and Collaboration
Adobe's trusted and proven enterprise solutions enable next-generation digital government. They change the game on how to design, anticipate, and deliver rapidly adaptable experiences across web, mobile, and any end point. Adobe solutions focus on driving insight and action to the decision maker, war-fighter, and first-responder.
Palo Alto Networks: Next-Generation Security Platform
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Their security platform, with game-changing technology, safely enables applications, users, and content, empowering businesses and government agencies to securely and efficiently move their organizations forward.
GeoNorth Information Systems: Taking the Next Steps with GeoNorth Information Systems
GeoNorth Information Systems (GNIS) provides tailored GEOINT services to clients in the U.S. defense, intelligence, civilian, and commercial markets. Established in 1999, GNIS is an Alaska Native Corporation and a SBA 8a firm, with offices in Alaska, Colorado, and Virginia. GNIS is a wholly-owned subsidiary of The Tatitlek Corp.
Active Risk: Quickly and Securely Identify Risks with Active Risk Manager
Sword Active Risk provides Enterprise Risk Management software that brings risk information together across the organization to consistently identify, assess, monitor, control, and mitigate risks through powerful analytics and dashboards. The Active Risk approach to ERM includes four key areas: Operational Risk Management, Project Risk Management, Governance & Compliance, and Opportunity Management.
Google Cloud: Increase Your Agency's Efficiency with Google Cloud Platform
Google is a trusted technology partner who understands how to help agencies transition from legacy architectures and utilize their data to fuel true mission success. The Google Cloud Platform provides cloud-native infrastructure with layered security, machine learning, and analytics at web-scale to rapidly innovate and advance agency goals.
MapAnything: Visualize Your Enterprise
MapAnything makes Geo-Productivity Software, for companies that use Salesforce and ServiceNow, to empower field sales, field service, fleet, and marketing teams with location-based insights. Our app suite, including our LoT-enabled MapAnything LIVE product, enables businesses to drive more revenue, lower costs, and increase productivity, all within their CRM workflow.
ServiceNow: IT Service Management Automation Cloud Suite
ServiceNow is changing the way Intelligence Community agencies work. They provide a service model that defines, structures, and automates the flow of work for mission and business applications, removing inefficient or manual processes to streamline the delivery of services within a single system of record.
Intermap Technologies: Experience the Next-Generation Digital Elevation Model
Intermap is an industry leader in geospatial intelligence solutions including location-based information, risk assessment, geographic information systems, engineering, utilities, GPS, oil & gas, renewable energy, hydrology, environmental planning, land management, telecommunications, transportation, and 3D visualization. Additionally, Intermap leads in geospatial data management and processing, including fusion, analytics, and orthorectification.
Aqua Security: Protect Your Containerized Applications from Build to Production
Aqua Security enables enterprises to secure their container and cloud-native applications from development to productions, accelerating application deployment and bridging the gap between DevOps and IT security. Aqua's Container Security Platform provides full visibility into application activity, allowing organizations to detect and prevent suspicious activity and attacks in real time.
Axway: Secure, Share, and Control Access Management for Intel
More than one million personnel across DoD use Axway to validate CAC credentials. They've evolved to provide an API solution that connects data from anywhere, fuels applications, and delivers real-time analytics for mission success. From idea to execution, Axway helps secure and share data across DoD and the Intelligence community.
ASG Technologies: Flexible Solutions Offering Speed & Scalability
ASG Technologies brings peace of mind to every enterprise with information access, management, and control for our customers and enables greater insight to drive intelligent decisions from legacy to leading edge environments. ASG is a global provider of technology solutions supporting nearly 4,000 midmarket and enterprise customers around the world.
F5 Networks: Privileged User Access
The 2017 Verizon Data Breach report determined that over 81% of hacking related breaches leveraged either stolen or weak credentials and F5 Labs has determined that in the last decade over 10 Billion user name and passwords have been stolen! Join F5 to learn how your routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP administration interfaces, storage array interfaces, VDI, and more, can all be CAC Authenticated into using a Privileged User Access Solution.
Software Licensing to Maximize Government Value
CEO, Buck Consulting
Historically, agencies have purchased COTS software using "perpetual" licenses. Purchasing this way provides lower life cycle cost. However, Pay for Use is a licensing approach where the customer is invoiced only for the actual usage of the software and has the flexibility to stop using it on demand. Both approaches fall on a licensing spectrum that should be considered for every procurement. This session will discuss best practices for deciding which route to go.
ForgeRock: Digital Identity & Access Management Platform
ForgeRock®, the leader in digital identity management, transforms how organizations build trusted relationships with people, services, and things. Monetize customer relationships, address privacy regulations, and leverage LoT with ForgeRock. We serve hundreds of brands, from GEICO, Toyota, and TomTom, to governments like Norway and Canada.
ForeScout: Transforming Security Through Visibility
ForeScout Technologies offers the unique ability to see devices the instant they connect to the network, control them, and orchestrate information sharing and threat response among disparate security tools.
Technical Evangelist, Carahsoft Technology Corp.
Do your facilities predate CAD and BIM? Reality capture allows the digitization of any physical object. This session will cover different sensor options for reality capture including LiDAR, SONAR, Photogrammetry, and the use of platforms to deploy these sensors including sUAS (drones), UAVs, USVs, etc.. Different real world examples of how and why reality capture technologies were used, such as, buildings, critical infrastructure, mines, and even a sunken battleship, will be featured in this session.
Trustwave: Information Security & Continuous Monitoring
Trustwave Government is a leading provider of information security and continuous monitoring solutions to government entities. Technology solutions include Database Scanning, Web Application Firewalls & Scanning, Log Management, Access Control, Data Loss Prevention, and services include incident response, penetration testing, and vulnerability assessments.