What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


Utility Storage for Government – NetApp Storage Without Capital Expense

This datasheet covers DLT Solutions Storage-as-a-Service (STaaS). STaaS is a NetApp hardware, software and services solution that combines secure, available, and dedicated on-premise infrastructure with a pay-as-you-go model that requires zero capital investment.


Special Report: Infrastructure Security

Evolve or die. That’s the imperative guiding the development of cybersecurity technologies and strategies across government and industry. The ongoing evolution of the federal IT enterprise, extended in all directions by advances in networking and mobile technology, must be matched to similar advances in information and network security. But above all, the nature of the current cybersecurity threats requires a new way of thinking. The old approach to cybersecurity, which was based on defending the perimeter, cannot hold up against the wide array of cyber threats that agencies now face. Download this special report for in-depth articles on infrastructure security.


TippingPoint Hacktivist Survival Guide

The last decade has seen the rise of crowd-sourced, activist-driven hacker groups.1 The term hacktivist has been coined to describe this group and refers to the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. Most notable of these hacktivist groups is Anonymous, a loose collective of individuals borne out of a cybersubculture that has gone mainstream.The goal of this paper is to provide a glimpse into the world of hacktivism and, more importantly, the group known as Anonymous.


Five Ways that Identity Federation is Improving Online Security for Government Agencies

Cloud computing, social networking and mobile devices are improving efficiency and collaboration in the public sector. But anytime, anywhere accessibility also increases the need to simplify, control and secure identities. This paper provides a brief overview of federated identity and reviews its roles within the identity management strategies of civilian agencies, the Department of Defense (DoD) and the intelligence community.


Enable Your Applications for CAC and PIV Smart Cards

Since HSPD-12 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and contractors wear their identity around their neck. While most agencies are leveraging these for physical access, the challenge comes in trying to use them for logical access to systems. Read this whitepaper to learn about a solution that allows end users to use their PIV cards for seamless access to on-premise, hosted and cloud-based applications.


Invest to Save with Collaboration Technologies

With budgets and staffs stretched thin, public sector organizations are searching for ways to cut costs and help employees work more productively. IT leaders recognize that collaborative voice, video, and mobile technologies could enable their organizations to achieve these goals, but they expect to implement these technologies when investment dollars are more plentiful. Download this whitepaper for an in-depth look at how collaboration technologies are helping IT managers “invest to save” by delivering significant long-term savings while improving the effectiveness of their organizations.


Special Report: Best Practices for Meeting Big Data Challenges

Big data is a top priority for CIOs, but few know exactly what it is – and what it can help their organizations achieve. As the creation of data has multiplied recently, IT organizations are left wondering how to manage those data stores while at the same time being asked to help the business side of the house innovate, cut costs and improve end-user satisfaction. Download this special report for in-depth articles on meeting the challenges you face as you take on "big data."


GameChanger: Data Center Consolidation

Since the government’s Federal Data Center Consolidation Initiative launched in 2010, agencies have been working hard to consolidate their data centers. Clearly, the benefits of data center consolidation are well worth the effort. In addition to obvious payoffs, such as lowering the cost of operations, data center consolidation can greatly improve performance and provide more efficient energy consumption. Download this in-depth report for more on the benefits of DCC.


Six Ways of Losing Mobile Data

This paper briefly reviews the top six threats to your mobile workforce, matching real-world hazards with really helpful ways you can take action and achieve the security your business requires.


Breaking News: Big Data is Solved!

The good news is that solutions can now be delivered to address the data management needs posed by Big Data. Without much risk of contradiction, it can be said that the requirements of absorbing and storing Big Data have been solved by industry to date, by a combination of both the demand-driven commercial-off-the-shelf software manufacturers and by the voluntary software development contributions of participants in the free and open source consortia.


How To Achieve Secure ID Assurance

Nearly 10 years after establishment of the Federal Identity, Credential and Access Management (FICAM) program, most federal agencies have yet to complete a comprehensive approach to unifying physical and logical access using a single smart card or token. The time to act is now. In this white paper, we’ll review the key FICAM use cases and the approaches agencies can take to efficiently accomplish them.


Mobility, from Start to End User

Government agencies are embracing the notion of mobility both for their employees and consumers, but they’re finding that adoption means plenty of adaption. Most of the time, IT managers can’t simply apply desktop PC requirements to mobile devices and call it a day. Mobility brings a host of new challenges that can best be solved by looking at the individual pieces with the finished puzzle in mind. To kick-start your strategy, download the Digital Dialogue now!


Avoiding Disaster Recovery Pitfalls

Hurricane Sandy was just one of many recent weather-related events that underscored the importance of keeping systems and operations up and running with as little interruption as possible. But whether it’s a natural disaster or an application failure that brings down a system, agencies must have a plan in place to protect their data and quickly recover IT services. Organizations are much more dependent on technology than they used to be. Download the summary report now from the recent webcast: Disaster Recovery and COOP: How to Make the Best of a Worst-Case Scenario


Government Cloud Collaboration Services: Collaborate More Easily and Effectively While Reducing IT Costs

Like many organizations, federal agencies can drive progress through social collaboration. Read the solution brief to see how secure, scalable, cloud-based solutions can help your agency collaborate socially without any extra cost, complexity or compliance concerns. See how these tools can also help enable better decisions to be made faster.


2012 Symantec Avoiding Hidden Costs of Cloud Survey

Cloud provides significant advantages, improved agility and reduced costs. But there is a darker side – the hidden costs of cloud that can negate the benefits if not properly contained. The 2013 Symantec Avoiding the Hidden Costs of Cloud Survey reveals some of these unanticipated challenges, and ways to mitigate risk, so agencies can benefit from today’s efficient cloud solutions.


The Power of Cloud: Driving Business Model Innovation

Although cloud capabilities offer numerous opportunities to drive business innovation, its potential beyond technological capabilities remains virtually untapped. Read the white paper to learn more about the benefits of cloud-enabled business models in promoting sustainable competitive advantage.


Enterprise 2.0 – The Next Generation, Mobile Enterprise

With the barriers of traditional enterprises breaking down, CIOs must prepare to support a progressive workforce and trends such as bring-your-own-device, virtual desktop environments and the cloud. Are you prepared?


Making Tablets and Touch Devices Work for Government

Government workers need greater mobility to get their jobs done in today’s challenging times. While tablets and touch devices used to be more promise than practicality for government, new hardware and software capabilities are changing mobile devices from ”toys” into high-performance computing devices that can perform public sector work powerfully and securely.


Windows Migration in Government: Conquering OS Deployment Challenges

A research survey on the State of Windows Migration reveals that most government IT departments (57%) are still in the midst of their upgrades. Eighty-three percent of those who have completed the migration process rated their level of satisfaction at 7 or above on a ten point scale. About a third of respondents (34%) note the appeal of the operating system is its overall capabilities rather than any one single feature. While government IT organizations admit to a host of organizational and technical issues, none of these barriers are insurmountable. The proof: The majority of government organizations claim their Windows 7 migrations are proceeding on schedule.


Methods and Insights Into Managing Mobile Securely

Mobile device usage continues to grow throughout the federal government. In January and February 2013, FCW surveyed IT decision makers across federal agencies that are involved with mobile security strategy. Read this report for key points on the current state of mobile security in the federal government.


Special Report: Business Continuity

If the unthinkable were to occur and your agency had to continue providing essential services and performing essential activities, would you know what to do and where to go? In most cases, the answer is yes. Today, thanks to lessons learned from past disasters and government requirements, most government agencies and departments have some type of business continuity plan that allows them to maintain critical functions.


Defeating Advanced Persistent Threat Malware

DNS-exploiting – or advanced persistent threat (APT) – malware is the most costly, sophisticated, and difficult of malwares to deal with. Did you know a DNS firewall can help? Read this whitepaper to learn more!


Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges

This Forrester Research whitepaper highlights cloud adoption trends as well as the key benefits and challenges that enterprises see when considering and adopting hybrid IaaS strategies.


Security and Compliance in the Cloud

Identity, Access and Security Management solutions integrate to control access to cloud services and data, reduce risk of breaches in hybrid environments, and achieve compliance with Federal regulations and policies such as FISMA & FedRAMP. Download now to read more.


Sustainable Compliance: How to Align Compliance, Security and Agency Goals

Compliance with Federal security mandates has become increasingly difficult for agencies. Agencies are searching for an effective, sustainable, & scalable approach that will achieve their compliance objectives while improving their overall security. Download to read more.


The Federal Agenda: How to Optimize a Windows 7 Deployment

As Federal agencies work to meet the demands of citizens for more accountability and transparency, IT execs must enable greater flexibility for users within the agencies, while maintaining tight controls over their computer environments. More federal agencies are migrating to Windows 7 for highly optimized desktops and security. Find out how.


IT Executive Guide to Security Intelligence

This white paper discusses how security intelligence addresses threat detection shortcomings and empowers organizations to maintain comprehensive and cost-effective information security.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Managing Identities and Access in the Cloud

The ability to share services and information with various departments, partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption.


Five Steps to Achieve Success in Your Application Security Program

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.


Avoiding Insider Threats to Enterprise Security

This whitepaper outlines a solution that helps organizations securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability.


Consolidated Security Management for Mainframe Clouds

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Security Intrusion Prevention Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. This whitepaper presents a comprehensive portfolio of intrusion prevention solution that go beyond traditional intrusion prevention to provide multilayered,end-to-end security that can actually protect networks from attacks before they occur.


Extending Security Intelligence with Big Data

This whitepaper details a solution that enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.


Continuous Monitoring for Government Agencies

This whitepaper details how government agencies can gain a 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.


GameChanger: Mobile Application Security

There are several advantages of a mobile workforce, however, there are also several risks to security as employees use personal devices from a variety of manufacturers and providers to conduct business. Review this complimentary whitepaper to learn how mobile devide management (MDM) and mobile application management (MAM) can prevent threats to your agency.


The Dynamic DNS Infrastructure

The proliferation of mobile devices and the ever increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile, DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing.


Top Considerations When Choosing an Application Delivery Controller

Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security.


Ebook: Sink or Swim in Risky Waters! Don't Navigate Risk without Internal Audit

There's an ocean of information out there about risk and how internal audit departments are in a unique position to help business leaders comprehend and navigate higher-level risks. We invite you to download this eBook, which provides an overview of internal audit’s evolving role in providing assurance around risk management, as well as tips, case studies and resources for getting started!


Reframing Big Data: Understanding How Big Data Can Benefit Your Organization

As government agencies and private businesses alike continue to grapple with defining, storing and managing big data, questions about the massive quantities of information that are generated daily also proliferate. The first step to understanding big data is to reframe how we think about it.


Dashboard Best Practices for Government Agencies

Dashboards are becoming the new face of business intelligence (BI). Executive Information Systems (EIS) had a similar look and served a similar purpose, modern Dashboards are interactive, easier to set up and update to changing business needs, and much more flexible to use. They are able to present data and information at both a summary and detailed level thus becoming one of the most powerful tools in the business user’s kit. Download NOW to learn more!


GameChanger: Hadoop

By any measure, government data is growing at lightning-fast speed, due in large part to the fast-growing stores of unstructured data. Hadoop, an open source software framework, is showing up in more and more and, is specifically suited to these types of tasks.


Bring Your Own Device: Device Freedom Without Compromising the IT Network

Bring Your Own Device (BYOD) has become one of the most influential trends that has or will touch each and every IT organization. The term has come to define a megatrend occurring in IT that requires sweeping changes to the way devices are used in the workplace. This whitepaper discusses how this trend will affect agencies, explores the challenges it creates for IT, and outlines technologies that are part of the solution.


How Architecture Enables a Mobile, Work-Anywhere Agency

This whitepaper will outline the main challenges facing government agencies trying to modernize their IT infrastructures to support improved service to citizens and higher productivity for their employees through mobile solutions.


IBM Solutions for Clouds and Virtualization in Enterprise Environments

The benefits of virtualization, from accelerated service delivery and resource optimization to reduced costs for IT resources, have spurred many organizations to move toward a virtual infrastructure. But what can an organization do to solve the complexities inherent in shared resources? This whitepaper will show you the way.


Mitigating Risk in Government Cloud Services

Cloud computing is shifting the way government agencies build, deploy and use applications; raising expectations on how quickly, cost effectively and securely applications and services can be delivered. This whitepaper shows that through taking a holistic view,the greatest benefit might be gained.


Taking the Guesswork Out of Big Data

Take the guesswork out of Big Data. Understanding where the information comes from and what’s required to process it will aid adoption. Download this complimentary whitepaper to review how your agency can benefit from Big Data.


Manage Identities and Access for Continuous Compliance and Reduced Risk

As organizations strive to securely deliver high-quality, high-availability services to their user communities, they grapple control and ever-changing user populations, access points,and applications. Download this complimentary whitepaper to learn how you can administer, control and monitor user access to resources, applications and information.


Transforming the Future: The promise of Networx

By the end of 2012, most federal agencies will have fully transitioned to contracts under the Networx program. This is only the first step in realizing the promise of what the Networx program can truly offer. Download to learn more!


Fraud Detection and Prevention in the Public Sector

This complimentary white paper highlights the value of having a framework of organization-wide fraud detection and prevention to help discover and combat fraud before it occurs. Learn how a consistent view of activity in real time makes it easy to flag suspicious transactions identify existing or potential perpetrators, uncover schemes in progress, and document instances of FWA.