Free online learning for government employees.

How Network Modernization Lays a Strong Cyber Foundation
Outdated network infrastructure is trouble waiting to happen. Agencies relying on legacy solutions are both missing out on recent advances in networking and security capabilities and running the risk of costly network failures and increased cyber vulnerabilities. In this video interview, Tom Van Meter, Senior Director of Sales Engineering at Juniper Networks Federal, discusses the path to network modernization and how it can help agencies strengthen their cyber posture.
Related Videos
Aug-06-2025
For agencies aiming to rein in costs and boost efficiency, outdated technology is a problem hiding in plain sight. In this vide...
Tackle Hidden Waste Through Asset Lifecycle Management
Aug-06-2025
When agencies keep outdated technology, the math never works out: They end up spending more money to maintain increasingly inef...
Asset Lifecycle Management: Stop Wasting Money on Outdated Tech
Jul-10-2025
As agencies look to transform their operations and services, their legacy digital communications and collaboration solutions ha...
How Digital Communication, Collaboration Service Can Transform Operations
Jul-10-2025
Legacy digital communications and collaboration services, many of which were patched together during remote work, have emerged ...
Digital Comms and Collaboration: Case Studies in Transformation
Jun-13-2025
Agencies cannot move ahead with AI at speed unless they learn to manage the risks associated with it. And failing to move ahead...
How to Minimize the Risk on the Road to AI
Jun-13-2025
Security. Data privacy. AI governance and ethics. These are some of the pressing concerns that make it difficult for agencies t...
How to Accelerate the Journey to AI
Jun-09-2025
Cloud computing appeals to agencies looking for operational and other efficiencies. But faced with cost overruns and more compl...
Cloud Security: Complex Threats, Clear Solutions
Jun-09-2025
Despite its potential for efficiencies and other savings, the cloud has proven too expensive and vulnerable for many agencies, ...
The Essentials of Cloud Data Security
Jun-06-2025
Government employees make significant use of cell phones, tablets, laptops and other mobile endpoints that connect to agency ne...
How to Secure an Agency’s Many Mobile Devices
Jun-06-2025
Mobile devices such as cell phones, tablets and laptops may boost efficiency and make government employees more productive, but...
How to Tackle Your Mobile-Device Security Risks
Apr-25-2025
Identity solutions have played an essential role in cybersecurity for more than 20 years. But agencies are beginning to realize...
Why It's Time to Take an Identity-First Approach to Security
Apr-25-2025
Security capabilities are just one aspect of an identity-based security solution. As agencies increasingly rely on cloud- and s...
How to Get Your Identity-Based Security Up to Speed
Mar-17-2025
Agencies relying on outdated infrastructure are both missing out on recent advances in networking and security capabilities and...
Why Network Modernization Tops the IT Agenda
Oct-24-2024
Automation plays a vital role in the management of the modern data center, but agencies are not necessarily realizing the full ...