What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


Transforming the Future: The promise of Networx

By the end of 2012, most federal agencies will have fully transitioned to contracts under the Networx program. This is only the first step in realizing the promise of what the Networx program can truly offer. Download to learn more!


Fraud Detection and Prevention in the Public Sector

This complimentary white paper highlights the value of having a framework of organization-wide fraud detection and prevention to help discover and combat fraud before it occurs. Learn how a consistent view of activity in real time makes it easy to flag suspicious transactions identify existing or potential perpetrators, uncover schemes in progress, and document instances of FWA.


Beyond Continuous Monitoring: Threat Modeling for Real-time Response

In its purest sense, continuous monitoring is inwardly focused on activities such as vulnerability assessment and patch management, providing valuable situational awareness of systems and potential vulnerabilities. Yet simply knowing a problem exists doesn’t offer protection. One has to be able to act correctly and in time to keep up with the evolving threat and minimize risk.


Managed Products and Services Help Agencies Secure Their Networks

Download this complimentary whitepaper to learn how your agency can obtain services and support, including MTIPS as a man­aged security service, that can help it comply with and even exceed the requirements of federal mandates.


Research Report: Big Data

Download this complimentary Research Report on Big Data to learn the benefits of leveraging "Big Data" within your agency, including greater accuracy and speed of agency decision making, more efficient internal processes and a greater ability to meet agency mission goals.


Defining a Framework For Cloud Adoption

As interest in cloud computing continues to gain momentum,there is increasing confusion about what cloud computing represents. Without a common, defined vocabulary and a standardized frame of reference, organizations cannot have acogent discussion about cloud computing.


How to Meet Mission Requirements and OMB Mandates

Gain a comprehensive understanding of your applications and mainframe environment – locate dead or duplicative code to reduce unnecessary processing cycles, create more efficient applications, increase operational performance and set priorities for managing the portfolio of applications that will result in significant cost savings – often in year one.


BYOD in Government: Prepare for The Rising Tide

Read Forrester’s recent study of the use of personal devices for work purposes within government agencies. Learn what it discovered about use, policy and security concerns and gain a valuable starting point for embarking on the journey toward BYOD.


Research Summary: Big Data in the Clouds

Depending on how it’s viewed, big data presents either an enormous headache, or an amazing opportunity. The ability to sift through massive amounts of structured and unstructured data to reveal useful facts in real-time may help government organizations make better decisions that streamline operations and refine constituent services. Download to learn more.


Coalescing of Communication In Social Media

Social media has become the de-facto medium for humans to communicate about events as they are occurring. Whether it’s a natural disaster such as a tornado or earthquake, a social movement such as the Arab Spring or Occupy Wall Street, or a popular event such as a concert or the Olympics, social media has become the mainstream method for all people involved to share their thoughts with each other.


Continuous Monitoring for Government Agencies

Government agencies confront an increasingly hazardous IT security environment.Continuous monitoring will enable agencies to determine their own security health and compare it to other agencies so they can most cost-effectively apply their resources towards identifying and repairing their security gaps and vulnerabilities. Download this complimentary whitepaper to learn more about FISMA 2.0 and continuous monitoring for your government agency.


Is Your Network Ready for Mobility? Maximize Your Network to Accommodate BYOD & Mobility Trends

With BYOD trends on the rise, many agencies are building policies and procedures to accommodate mobility within their organizations. Therefore, agencies must now consider various components of their network infrastructure to be adequately prepared for the inherent burdens additional mobile devices will demand.


Mobile and Wireless : The Report

As more and more government departments allow or even encourage employees to use mobile devices to perform their jobs in or out of the office, everyone involved is beginning to see just how beneficial they are. Not only do mobile devices increase employees’ productivity and effectiveness, but they further enable telework and increase employee satisfaction. What are the security challenges and solutions related with this technology? Read to find out.


Cloud First: Which Cloud Deployment Model Works Best for Federal?

The 2011 Cloud First initiative has lead federal agencies to seek out cloud services. This white paper examines the key benefits of migrating to the cloud and the pros and cons of cloud deployment models available to government agencies, including private, community, public and hybrid clouds.


Game Changer: Data Security

The pressure is on for federal agencies to take data security to the next level. The complexity of data today — data stored in various places, some of it unstructured and some barely touched in the past decade — makes meeting security mandates challenging. Download this whitepaper to learn about the key issues surrounding secure data, along with best practices and tools that can help further their goals.


Solutions Guide: How to Meet Your Agency's Bandwidth Needs

It’s every CIO’s dilemma: bandwidth requirements ebb and flow throughout the month and there are certain times when network traffic increases and certain times when it decreases. For most agencies, this means there are days or even weeks when they are using all of the bandwidth that they have available. However, there may be just as many instances when reduced network demand means there’s excess capacity. That’s money going down the drain!


The Stand: Health IT

While healthcare remains a contentious political issue, the need for a robust health IT infrastructure has become increasingly evident. One veteran of the industry explains the importance of health IT to the delivery of healthcare services, what emerging issues could have the most impact, and how technologies such as cloud, Big Data and mobile will affect the development of healthcare.


Unified Communications Helps Agencies Connect Better, Faster and at a Lower Cost

Review this complimentary whitepaper to learn how Unified Communications (UC) can help agencies connect better, faster, and at a lower cost. You'll learn about the many benefits that can be garnered by the increase in productivity in UC offers.


Taking Collaboration to the Cloud

Given the budget and mission pressures that are the norm in government today, these cloud tools can help your employees be more productive and collaborative. Download this complimentary whitepaper to learn more about taking collaboration to the cloud.


NITAAC Contract Guide

Review this complimentary whitepaper to learn about how the NITACC provides fast, government-wide access to the latest IT products and services.


Cloud Services

Download this complimentary whitepaper to learn the benefits and limitations of IaaS, four cloud trends you need to know, and how to address compliance issues in the cloud.


Choosing the Right MSP Provider

Managed services adoption is rampant, but there's still plenty of confusion in the industry as to what managed services actually entail. Review this complimentary whitepaper to learn how managed services are helping agencies grow and innovate.


STAND: Cloud Computing

Cloud computing has been a highly touted way for government agencies to gain efficiencies, cut costs and improve the delivery of IT services. Many agencies have already moved “low hanging fruit” such as email and collaboration tools to the cloud. Now the early hype is over, agencies are faced with much tougher decisions. Three cloud industry experts discuss what issues agencies face, what the business and cost factors are in moving to the cloud, and what best practices they can use to ensure a smooth migration.


Cyber Attacks on Government: How to Stop the APT Attacks that are Compromising Federal Agencies

Protect your agency from cybercriminals. Learn how to stop the advanced attacks that threaten government agencies across all vectors with a solution that offers real-time, dynamic protection from today’s email and Web-based threats.


CAC and PIV: Government Leading the Way into Mobile Security

The Department of Defense has mandated that its Common Access Card (CAC), issued to military-connected personnel and contractors, be used to secure access to DoD networks and services from mobile devices such as smart phones and tablets. A similar directive could eventually come regarding the Personal Identity Verification (PIV) card issued to federal civilian employees. This leads to one very big question: what products and technologies are currently available to accomplish that goal? Read now to learn!


Key Considerations in Modernizing Your Backup and Deduplication Solutions

There is a definite need for better data backup solutions in today’s enterprise data centers. This complimentary whitepaper describes the key considerations in modernizing your agency's backup and deduplication solutions.


The Federal Mandate for Data Center Consolidation

The Federal Data Center Consolidation Initiative (FDCCI) addresses decades of redundant IT investments that have resulted in a costly, unsustainable IT infrastructure.


Converging Communications

There’s a wide range of communications technologies now appearing and still to be developed that promise far more flexible and faster ways for people to collaborate with each other. Review this complimentary whitepaper to learn what agencies should look out for as they plan their future initiatives.


Modernizing the Network

Review this complimentary whitepaper to learn how your agency can get ahead of the demand of wireless networks. You'll learn about network security trends and adding the cloud as an extension to your network.


Securing the Cloud

Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. Review this complimentary whitepaper to learn how you can keep your most precious assets safe, no matter where they live.


Six Common Challenges of Cloud Implementations

Private cloud—as an approach to IT operations—calls for organizations to transform their data centers, including the network. Using strategic points of control to aggregate and dynamically provision IT resources can help organizations meet network-related challenges and move past the hype to successfully build, deploy, and secure private clouds.


Ensuring Application Security in Mobile Device Environments

As a result of the increase in wireless devices in the workforce, organizations are becoming more concerned with mobile security. Many, in fact, see this area as a primary technology challenge to address and a main focus for security initiatives.


Beyond the Next Generation:Putting Advanced Network Security to Work

As the network has evolved, so has network security. Firewalls retain their role of first-line filtration based on policy, but have grown to embrace a wider range of capability. In this report, EMA highlights specific examples of the ways in which converged security systems put today’s more advanced capabilities to work in practical application.


Identity and Access Intelligence:Transforming the Nature of Enterprise Security

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud security challenges and proactively protect sensitive IT assets.


Keeping Distributed Endpoints Safe and Compliant

With rapidly increasing numbers of remote workers and mobile devices, there is no well-defined perimeter. The perimeter, by necessity, must be the endpoint itself. Endpoints, by their very nature, are highly vulnerable to attack— including system damage inflicted by malware, theft by phishing, privacy infringements through social networking, or loss of productivity due to spam, interruptions and system instabilities. Read this whitepaper to learn about a solution that provides real-time visibility and control over each endpoint’s status, remediating issues to help ensure continuous security and compliance.


Intelligent role management for improved security and compliance

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.


An Early Leader across the Big Data Security Analytics

This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one of the few vendors offering an integrated approach to combat this.


Stay Ahead of Insider Threats with Predictive, Intelligent Security

It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools.


Addressing Social Determinants and their Impact On Healthcare

This executive overview paper examines the many factors that are driving change in the healthcare industry. It covers the social determinants of health and introduces a smarter approach to care that enables healthcare providers to personalize programs, services and treatments based on a holistic view of the individual and the individual’s family.


IBM zSecure Compliance and Administration

IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administra-tion. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to help detect threats.


Application security and risk management

The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to collectively address application security by identifying and remediating vulnerabilities early in the software development lifecycle, when they are easier and less expensive to correct. IBM research drives IBM Security AppScan solutions to identify the latest threats with advanced security testing for application security analysts. With more than a decade of application security experience, IBM Security AppScan solutions deliver some of the most advanced testing features that combine expert analysis with ease of use.


Secure Web Applications: Creating a Security Culture

Companies move applications to the Web to improve customer interactions, lower business processing costs and speed outcomes. But driving applications to the Web also increases vulnerabilities – unless security is an integral component of the application development process.


How does IBM deliver cloud security?

Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualized environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and de-provisioning environment while experiencing the loss of direct control of security compliance, and privacy parameters.


Identity and Access Management Buyer's Guide

This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.


Protecting Consumer and Business Information with Advanced Threat Protection

As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it serves.


Delivering Success that Scales with the Largest Enterprises

IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and event management (SIEM) solutions. In order to support the demands of organizations across industries, IBM offers the geographic reach to serve global organizations and the partner ecosystem required to deliver powerful and comprehensive solutions.


Secure By Design: Building Identity-based Security into Today’s Information Systems

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible


Increase Productivity and Security with Identity and Access Management

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. To meet the needs of a changing user population while simultaneously maintaining a security-rich environment, organizations need identity management solutions that can define, grant and remove access privileges to match the user’s job role and actual access requirements.


IBM Security Intrusion Preventions Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers a comprehensive portfolio of intrusion prevention solutions that go beyond traditional intrusion prevention to provide multilayered, end-to-end security that can actually protect networks from attacks before they occur.


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford duscusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.