Interagency Advisory Board Meeting Agenda, Wednesday, July 27, 2011

Size: px
Start display at page:

Download "Interagency Advisory Board Meeting Agenda, Wednesday, July 27, 2011"

Transcription

1 Interagency Advisory Board Meeting Agenda, Wednesday, July 27, Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. A TWIC Program Status and Update (John Schwartz, TSA) 3. CAC/PKI Logon to Warriorgateway.org (Devin Holmes, Warrior Gateway) 4. A Federal Security Professional PACS Perspective since the Signing of HSPD 12 (Ron Martin, HHS) 5. Closing Remarks (Mr. Tim Baldridge, IAB Chair)

2 7/27/2011 Warrior Gateway & CAC

3 Mission Statement: Leverage the power of information to help the military community to quickly find the trusted and reliable services they need as they transition to civilian life.

4 What does Warrior Gateway do? We have several programs Built in the last 18 months: Warriorgateway.org: The web portal for the military community The Gateway Information Network platform Warrior Gateway Coming this year: Military Family web portal Civilian Portal (the other 99%) Homeless Veterans locator

5 3/10: Launched the web portal Warriorgateway.org

6 Initially built around the Warrior Gateway Directory

7 Warrior Gateway Directory Includes the following: National, Regional, Local organizations Government & Non- Profit Geospatial search w/integrated Google Map Warrior Gateway Over 45,000 profiles including contact information (not just URL s) Rating & Commenting Features Facebook Likes (coming soon)

8 How Does It Work Find Search Find 23

9 How Does It Work Add Add 24

10 The Voice of the Veteran

11 How Does It Work Rate Rate Comment Engage 26

12 How Does It Work Share Share 27

13 So where does CAC fit it? Users are anonymous until: They want to rate & comment on a WG profile Today: Users must create a profile and login in We listened to our users and.. Warrior Gateway Built but not yet deployed: CAC authentication Facebook Connect Both will replace the use of our current system

14 So where does CAC fit it? Once logged in: Users can: Users can also: Rate Comment Utilize the Facebook Like button (not deployed yet) Warrior Gateway Claim & own an org profile Respond to comments on their org profile Personalize their search results

15 What does it cost our veterans?

16 GATEWAY INFORMATION NETWORK

17 March 2010 Launched the web portal: Warriorgateway.org

18 While building the Warrior Gateway platform Piloted the Gateway Information Network

19 Building the Warrior Gateway platform Piloted the Gateway Information Network

20 Colorado State Department of Veterans Affairs

21 Gateway Information Network (GIN) What is it? GIN is a set of API s that allows read access to the WG databases GIN enables website developers to retain their own brand GIN allows publishers to build web and mobile apps on the WG platform Warrior Gateway GIN leverages the scalability and reliability of the WG platform in the cloud GIN is raw XML

22 Gateway Information Network (GIN) It is NOT. A link to warriorgateway.org on another website A widget that uses redirect links Warrior Gateway A subdomain site (e.g. virginia.someurl.org) A fixed design white label website A lead or traffic generator for warriorgateway.org A proprietary technology solution

23 What does it cost our partners?

24 WHY THE GATEWAY INFORMATION NETWORK

25 Gateway Information Network (GIN) Why build it? The data problem is only solved by: Increased common usage of the data leads to: Partner involvement in data management Crowd-sourced data improvements Warrior Gateway Increased quality of the data displayed (both topdown and crowd-sourced) Better Analytics

26 Early Analytical Insights Top 5 Searched Terms (12/10) Top 5 Searched Geographies Food Banks Peer Support Counseling SAVE (Statewide Advocacy for Veterans Empowerment) Recreation Massachusetts Washington California Ashburn, VA Wisconsin

27 Gateway Information Network (GIN) What s next? Write API functionality Open-sourced CMS Military Family Portal Warrior Gateway What will all of these costs to users/partners? Open-sourced CMS & API s Civilian Portal Homeless Veterans Locator

28 Thank you for your support in giving back to our nation s heroes.

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011 Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Using PKI to Mitigate Leaky Documents (John Landwehr, Adobe) 3. The Digital Identity

More information

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. FIPS 201-2 Update and Panel Discussion with NIST Experts in Q&A Session (Bill MacGregor

More information

Filtering and Identifying Web Activity by User Name

Filtering and Identifying Web Activity by User Name WavecrestTechBrief Filtering and Identifying Web Activity by User Name www.wavecrest.net When a company implements Web filtering and monitoring software, it typically wants to filter and monitor the Web

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 1. Opening Remarks 2. A Security Industry Association (SIA) Perspective on the Cost and Methods for Migrating PACS Systems to Use PIV

More information

Interagency Advisory Board Meeting Agenda, August 25, 2009

Interagency Advisory Board Meeting Agenda, August 25, 2009 Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and

More information

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical

More information

SharePoint 2019 and Extranet User Manager

SharePoint 2019 and Extranet User Manager SharePoint 2019 and Extranet User Manager Tuesday, June 5, 2018 12:00-1:00 PM http://eum.co (#) Agenda Introductions SharePoint 2019 Announcements SharePoint On Premises Extranets EUM Features and Licensing

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

App Gateway Deployment Guide

App Gateway Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical

More information

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Revision of the Digital Signature Standard (Tim Polk, NIST) 3. Update on Content

More information

Interagency Advisory Board Meeting Agenda, July 28, 2010

Interagency Advisory Board Meeting Agenda, July 28, 2010 Interagency Advisory Board Meeting Agenda, July 28, 2010 1. Opening Remarks 2 Research Collaboration in the Cloud: How NCI and Research Partners Are Improving Business Processes using Digital Identities

More information

5 OAuth EssEntiAls for APi AccEss control layer7.com

5 OAuth EssEntiAls for APi AccEss control layer7.com 5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 42.0, Spring 18 @salesforcedocs Last updated: February 13, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

5 OAuth Essentials for API Access Control

5 OAuth Essentials for API Access Control 5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 41.0, Winter 18 @salesforcedocs Last updated: November 22, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

OpenID: From Geek to Chic. Greg Keegstra OpenID Summit Tokyo Dec 1, 2011

OpenID: From Geek to Chic. Greg Keegstra OpenID Summit Tokyo Dec 1, 2011 OpenID: From Geek to Chic Greg Keegstra OpenID Summit Tokyo Dec 1, 2011 Why OpenID? Time for a poll Who has reused their same password when logging into a new website? Who has forgotten their password

More information

IPv6 Transition Progress

IPv6 Transition Progress Department of Veterans Affairs Transition Progress 2011 and Beyond February 2, 2011 Steven Pirzchalski Transition Manager Agenda USG Then and Now 2011 and Beyond 2005 2010 USG IPV6 THEN AND NOW 12/13/2010

More information

IAB Minutes Page 1 of 6 April 18, 2006

IAB Minutes Page 1 of 6 April 18, 2006 IAB Minutes Page 1 of 6 The Interagency Advisory Board (IAB) meeting convened on Tuesday, April 17, 2006 at 9:15 AM at the Sheraton National Hotel in Arlington. After opening remarks by Randy Vanderhoof

More information

MOBILE WI-FI Policy enforced Wi-Fi for moving vehicle applications

MOBILE WI-FI Policy enforced Wi-Fi for moving vehicle applications MOBILE WI-FI Policy enforced Wi-Fi for moving vehicle applications Background The evolution of high speed LTE cellular networks and integrated LTE / Wi-Fi modems brings the opportunity for high speed Wi-Fi

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 39.0, Spring 17 @salesforcedocs Last updated: March 14, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Introduction to the Extended Development Platform

Introduction to the Extended Development Platform Hong Kong 2018 Introduction to the Extended Development Platform Richard Schaefer, Sr. Enterprise Solution Manager BlackBerry Development Platform A collection of enterprise ready tools which enable enterprise

More information

Dell One Identity Cloud Access Manager 8.0. Overview

Dell One Identity Cloud Access Manager 8.0. Overview Dell One Identity Cloud Access Manager 8.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information

Aruba Central. Tech Webinar, October 6 th Christian Dupont, Britto Jagadesh & Barath Srinivasan

Aruba Central. Tech Webinar, October 6 th Christian Dupont, Britto Jagadesh & Barath Srinivasan Aruba Central Tech Webinar, October 6 th 2016 Christian Dupont, Britto Jagadesh & Barath Srinivasan Aruba Instant Virtualized Controller 2 Aruba Instant - Virtualized Controller Solution Manual Configuration

More information

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice

More information

Workshare Client Extranet. Getting Started Guide. for Mac

Workshare Client Extranet. Getting Started Guide. for Mac Workshare Client Extranet Getting Started Guide for Mac Build trust with your clients Share files with your clients and partners in professional, branded workspaces that you control. Create your look Work

More information

Partner Information Manager Supplier Guide October 2017

Partner Information Manager Supplier Guide October 2017 Partner Information Manager Supplier Guide October 2017 Copyright 2017 Exostar, LLC All rights reserved. Contents Exostar s Partner Information Manager (PIM)... 2 Cybersecurity Questionnaire... 2 NIST

More information

Integrating Your Mission with Your Website

Integrating Your Mission with Your Website Integrating Your Mission with Your Website Heidi Hess, Director of Online Communications, Children s Defense Fund Jim Jacobs, Vice President, Interactive, OmniStudio 2009 Convio, Inc. Page 1 Mandy O Neill,

More information

Extranets in SharePoint 2010 and 2013

Extranets in SharePoint 2010 and 2013 Extranets in SharePoint 2010 and 2013 Presented by Peter Carson President, Envision IT April 11, 2013 Rob Karimi Account Manager, Envision IT e: rkarimi@envisionit.com m: (416) 473 4726 LinkedIn: http://ca.linkedin.com/in/robkarimi

More information

OPTIMIZING YOUR WEBSITE TO SERVE AND ENGAGE YOUR COMMUNITY. An Analysis of Top Tasks Performed on City Websites

OPTIMIZING YOUR WEBSITE TO SERVE AND ENGAGE YOUR COMMUNITY. An Analysis of Top Tasks Performed on City Websites OPTIMIZING YOUR WEBSITE TO SERVE AND ENGAGE YOUR COMMUNITY An Analysis of Top Tasks Performed on City Websites INTRODUCTION The public s digital expectations are growing at a rapid rate, pushed forward

More information

Developing Enterprise Cloud Solutions with Azure

Developing Enterprise Cloud Solutions with Azure Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course

More information

Copyright

Copyright This video looks at Claim Based/Identity Based systems using Active Directory Federation Services as an example. An example of a claim based system is where the user logs into a system like a web page

More information

The U.S. Manufacturing Extension Partnership - MEP

The U.S. Manufacturing Extension Partnership - MEP The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/

More information

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012 Smart Card Alliance Update Update to the Interagency Advisor Board (IAB) June 27, 2012 Industry s Access Control Payments (NEW) Mobile & NFC Identity Industry s Healthcare Transportation Access Control

More information

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World Technology for a Changing World Architecture Assessment Case Study Single Sign on Approach Document PROBLEM: Existing portal has Sign on Capabilities based on the SQL Server database and it s not having

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Cloud Access Manager Overview

Cloud Access Manager Overview Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

NetMotion Wireless Get Connected. Stay Connected

NetMotion Wireless Get Connected. Stay Connected NetMotion Wireless Get Connected. Stay Connected 2 Background & Agenda Enterprise Mobility Management Software Company Founded in 2001; Multiple mobile technology patents Core competencies: Connectivity,

More information

LSP O365 Hands-on Training Planet Technologies. 1

LSP O365 Hands-on Training Planet Technologies. 1 LSP O365 Hands-on Training 2016 Planet Technologies. 1 Agenda for today Intro IT Update/ Ground Rules O365 Overview Break Outlook and OWA Mobile Device Lunch Skype for Business FAQ Tips and Issues Evolve

More information

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT Business today runs on technology 71% of surveyed internet, technology and social experts predict: In 2016, 82% of server workloads will be running in virtual environments. Total IT services spend: 45%

More information

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, April 2018

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, April 2018 User Management Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, April 2018 Agenda Introduction User Management Roadmap Related Activities 1 Introduction NextGEOSS High-Level Architecture DataHub harvest and

More information

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments.

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments. TECHNICAL GUIDE SSO SAML At 360Learning, we don t make promises about technical solutions, we make commitments. This technical guide is part of our Technical Documentation. 2 360Learning is a Leading European

More information

Extranets in SharePoint and SSO for Claims Apps. January 18, 2017

Extranets in SharePoint and SSO for Claims Apps. January 18, 2017 Extranets in SharePoint and SSO for Claims Apps January 18, 2017 Peter Carson President, Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com http://blog.petercarson.ca

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Encapto WiFi OVERVIEW

Encapto WiFi OVERVIEW Encapto WiFi OVERVIEW Encapto WiFi is a one-stop configuration, management, reporting and control system for your WiFi network. Encapto Cloud Deck s intuitive web interface enables secure access from anywhere,

More information

Karyn Higa-Smith, Research Program Manager

Karyn Higa-Smith, Research Program Manager Personal Identity Verification- Interoperability/ First Responder Authentication Credential (PIV-I/FRAC) I/FRAC) Technology Transition Work Group (TTWG) Karyn Higa-Smith, Research Program Manager Identity

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 36.0, Spring 16 @salesforcedocs Last updated: March 3, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Salesforce External Identity Implementation Guide

Salesforce External Identity Implementation Guide Salesforce External Identity Implementation Guide Salesforce, Spring 17 @salesforcedocs Last updated: March 11, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

Interagency Advisory Board Meeting Agenda, April 27, 2011

Interagency Advisory Board Meeting Agenda, April 27, 2011 Interagency Advisory Board Meeting Agenda, April 27, 2011 1. Open Remarks (Mr. Tim Baldridge, IAB Chair) 2. FICAM Plan for FIPS 201-2 (Tim Baldridge, IAB Chair and Deb Gallagher, GSA) 3. NSTIC Cross-Sector

More information

Colligo Console. Administrator Guide

Colligo Console. Administrator Guide Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...

More information

ResponseTek Listening Platform Release Notes Q4 16

ResponseTek Listening Platform Release Notes Q4 16 ResponseTek Listening Platform Release Notes Q4 16 Nov 23 rd, 2016 Table of Contents Release Highlights...3 Predictive Analytics Now Available...3 Text Analytics Now Supports Phrase-based Analysis...3

More information

Configuring a Virtual Desktop

Configuring a Virtual Desktop Cloud Contact Center Software Configuring a Virtual Desktop Administrator s Guide October 2017 This guide describes how to implement a virtual desktop infrastructure (VDI) integration that enables your

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Exam : Implementing Microsoft Azure Infrastructure Solutions

Exam : Implementing Microsoft Azure Infrastructure Solutions Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service

More information

Office 365 External Sharing Webinar November 7, 2017

Office 365 External Sharing Webinar November 7, 2017 Office 365 External Sharing Webinar November 7, 2017 Introductions Peter Carson President, Extranet User Manager and Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com

More information

Department of Veterans Affairs Internet Protocol Version 6 (IPv6): North American IPv6 Summit

Department of Veterans Affairs Internet Protocol Version 6 (IPv6): North American IPv6 Summit Department of Veterans Affairs Internet Protocol Version 6 (): North American Summit April 10, 2012 Steven Pirzchalski Director, Enterprise Transport Services VA Transition Manager Outreach Chair, Federal

More information

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant Windows 10 October 25, 2018 Helping you grow your business with Bruce Ward, VP of Business Strategy scalable IT services & solutions Dan Sharp, Senior Consultant for today s challenges & tomorrow s vision.

More information

The Old is New Again Engineering Security in the Age of Data Access from Anywhere

The Old is New Again Engineering Security in the Age of Data Access from Anywhere The Old is New Again Engineering Security in the Age of Data Access from Anywhere Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 10, 2014 Session 14971 AGENDA History 1 This

More information

SEO PROPOSAL YOUR SEO CAMPAIGN YOUR SEO PROPOSAL CAMPAIGN STRATEGY

SEO PROPOSAL YOUR SEO CAMPAIGN YOUR SEO PROPOSAL CAMPAIGN STRATEGY SEO PROPOSAL CAMPAIGN STRATEGY YOUR SEO CAMPAIGN Mr. Pipeline sets out to find you the right leads that will convert at a higher rate. We do not obsess about increasing page rankings, but over time will

More information

GODAN Digital Communications Plan July Global Open Data for Agriculture and Nutrition

GODAN Digital Communications Plan July Global Open Data for Agriculture and Nutrition GODAN Digital Communications Plan July 2015 Global Open Data for Agriculture and Nutrition 1 INTRODUCTION p.3 WEBSITE Where we are p.3 Site architecture p.6 Web content p.9 SOCIAL MEDIA p.10 2 INTRODUCTION

More information

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California

More information

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017 User Management Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017 Agenda Introduction User Management Federation Objectives 1 Introduction NextGEOSS High-Level Architecture DataHub harvest

More information

REST API Developer Preview

REST API Developer Preview REST API Developer Preview Dave Carroll Developer Evangelist dcarroll@salesforce.com @dcarroll Alex Toussaint Sr. Product Manager atoussaint@salesforce.com @alextoussaint Safe Harbor Safe harbor statement

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

Nuance Management Center

Nuance Management Center Nuance Management Center Version 5.6 Release Notes Copyright Copyright 2002-2016 Nuance Communications, Inc. All rights reserved. Nuance, ScanSoft, the Nuance logo, the Dragon logo, Dragon, DragonBar,

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

Deltek Touch CRM for GovWin Capture Management. User Guide

Deltek Touch CRM for GovWin Capture Management. User Guide Deltek Touch CRM for GovWin Capture Management User Guide September 2017 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical

More information

TECHNICAL GUIDE SSO SAML Azure AD

TECHNICAL GUIDE SSO SAML Azure AD 1 TECHNICAL GUIDE SSO SAML Azure AD At 360Learning, we don t make promises about technical solutions, we make commitments. This technical guide is part of our Technical Documentation. Version 1.0 2 360Learning

More information

Module 1: Introduction to Informatica Cloud B2B Gateway

Module 1: Introduction to Informatica Cloud B2B Gateway Module 1: Introduction to Informatica Cloud B2B Gateway Lab 1-1: Lab Environment Setup Verify Informatica Cloud B2B Gateway Components in ICS Scenario: In this lab, you will log in to ICS org and verify

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc.

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc. March 13, 2010 Presented by: Noble Studios, Inc. 1 Communication Timeline 2 Familiar Social Media Sites According to Facebook, more than 1.5 million local businesses have active pages on Facebook According

More information

Office 365 and Azure Active Directory Identities In-depth

Office 365 and Azure Active Directory Identities In-depth Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication

More information

Release Notes May 2017

Release Notes May 2017 Release Notes May 2017 About the Release Notes... 3 Release Overview... 3 Other Announcements... 4 SpringCM Login name change... 4 Workflow Step and Workflows Initiated Reports are being deprecated...

More information

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global Enabling Compliance for Physical and Cyber Security in Mobile Devices Chip Epps & Daniel Bailin HID Global 1 Agenda Managing Identities Traditional cards for PACS and IT Smart Devices Convergence & Compliance

More information

Nuance Management Center

Nuance Management Center Nuance Management Center Version 5.7 Release Notes Copyright Copyright 2002-2016 Nuance Communications, Inc. All rights reserved. Nuance, ScanSoft, the Nuance logo, the Dragon logo, Dragon, DragonBar,

More information

FAQ. General Information: Online Support:

FAQ. General Information: Online Support: FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com Phone:

More information

Example Azure Implementation for Government Agencies. Indirect tax-filing system. By Alok Jain Azure Customer Advisory Team (AzureCAT)

Example Azure Implementation for Government Agencies. Indirect tax-filing system. By Alok Jain Azure Customer Advisory Team (AzureCAT) Example Azure Implementation for Government Agencies Indirect tax-filing system By Alok Jain Azure Customer Advisory Team (AzureCAT) June 2018 Example Azure Implementation for Government Agencies Contents

More information

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com

More information

With Aruba Central, you get anywhere-anytime access to ensure that your network is up and performing efficiently.

With Aruba Central, you get anywhere-anytime access to ensure that your network is up and performing efficiently. Product overview Aruba Central, a cloud platform for managing Aruba Instant wireless LANs and Aruba Mobility Access Switches, offers IT organizations a simple and effective way to manage and monitor their

More information

AMPS Snapshot: User Registration External Users

AMPS Snapshot: User Registration External Users Do You Need an AMPS Account? How to Prepare for AMPS Account Registration Not an employee of DLA or DFAS? If you cannot authenticate your identity with a smart card, you can still obtain an AMPS account

More information

Transforming the Internal IT Landscape with APIs. Scott Cranton Director, Application Platform SAs April 2018

Transforming the Internal IT Landscape with APIs. Scott Cranton Director, Application Platform SAs April 2018 Transforming the Internal IT Landscape with APIs Scott Cranton Director, Application Platform SAs April 2018 AGENDA API Domain Overview (very) Brief Technical Overview How to help your API Program Succeed

More information

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor

More information

Medical Device Vulnerability Management

Medical Device Vulnerability Management Medical Device Vulnerability Management MDISS / NH-ISAC Process Draft Dale Nordenberg, MD June 2015 Market-based public health: collaborative acceleration Objectives Define a trusted and repeatable process

More information

Mobile Validation Solutions

Mobile Validation Solutions 227 Mobile Validation Solutions John Bys Executive Vice President Copyright 2007, CoreStreet, Ltd. Who has requirements? Maritime Safety Transportation Act Ports / MTSA Facilities Vehicle check points

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN

More information

Data Driven Design BUSINESS BOOST: GOOGLE GEEK SESSION. datadriven.design. Paul Hickey

Data Driven Design BUSINESS BOOST: GOOGLE GEEK SESSION. datadriven.design. Paul Hickey Data Driven Design BUSINESS BOOST: GOOGLE GEEK SESSION datadriven.design Paul Hickey WHO WE WORK WITH Small to Midsize Businesses Start-ups Enterprise Level Companies We support agencies who don t staff

More information

Health Professional & ADFS Integration Guide

Health Professional & ADFS Integration Guide Health Professional & ADFS Integration Guide Martyn Bradshaw, Sitekit Ltd 01/10/2014 09:48:23 Registered Office Company Department Author Document Type Document Title Version Number 1.1 Approved By Sitekit

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description March 22, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager INTEGRATION GUIDE Using SAM as an Identity Provider for Remedyforce Contents Support Contacts... 2 Description... 3 Single Sign-On Dataflow... 3 Configuring SAM as an Identity

More information

Technical Note. Customer Process Manager. 7.1 Release 2. CPM Next Best Action Adapter

Technical Note. Customer Process Manager. 7.1 Release 2. CPM Next Best Action Adapter Technical Note Customer Process Manager 7.1 Release 2 CPM Next Best Action Adapter Copyright 2014 Pegasystems Inc., Cambridge, MA All rights reserved. This document describes products and services of Pegasystems

More information

Application Virtualization Hosting Environment

Application Virtualization Hosting Environment Infrastructure and Operations Division Engineering, Design and Deployment Branch Application Virtualization Hosting Environment June 15, 2016 Version: 16 Unclassified/For Official Use Only (FOUO) Document

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Introduction. The Safe-T Solution

Introduction. The Safe-T Solution Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,

More information

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc. Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying

More information