Wait, don't miss out on the latest GovCon industry news!

Sign Up Now! GovCon Wire provides you with Daily Updates and News Briefings

*By clicking "Join us now" you agree to receive email, promotions and general messages from GovCon Wire, In addition, you also agree to GovCon Wire Privacy Policy and Terms & Conditions.

X Remind me Later

Tag: end user

Dell Technologies’ Chris Thomas: 5G Could Help Agencies Bring Real-Time Operations Close to End UsersNews

Dell Technologies’ Chris Thomas: 5G Could Help Agencies Bring Real-Time Operations Close to End Users

Chris Thomas, a technology strategist at Dell Technologies (NYSE: DELL), said government agencies seeking to advance digital modernization should adopt
Salesforce’s John Frank: Collaborative AI Key to Accelerating Government Insight GenerationNews

Salesforce’s John Frank: Collaborative AI Key to Accelerating Government Insight Generation

John Frank, vice president of collaborative AI for industries at Salesforce (NYSE: CRM), said agencies seeking to derive insights from
Okta’s Habib Hourani: Further Insight Into User’s Activity Key to Frictionless AuthenticationNews

Okta’s Habib Hourani: Further Insight Into User’s Activity Key to Frictionless Authentication

Habib Hourani, a solutions engineer at San Francisco-based identity management services provider Okta (Nasdaq: OKTA), said having deeper insights into…
SolarWinds’ Brandon Shopp: User Education, Cross-Team Collaboration Key to Gov’t Network SecurityNews

SolarWinds’ Brandon Shopp: User Education, Cross-Team Collaboration Key to Gov’t Network Security

Brandon Shopp, vice president of product strategy for security at SolarWinds (NYSE: SWI), has said agencies should look at user…
Trustwave’s Bill Rucker: Strategic Partnerships Could Help Ensure Federal Network SecurityCybersecurity

Trustwave’s Bill Rucker: Strategic Partnerships Could Help Ensure Federal Network Security

Bill Rucker, president of Trustwave Government Solutions, has said government agencies should establish strategic partnerships and identify vulnerabilities in order