What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


Expert Q&A: Continuous Monitoring

As attacks on agency networks and assets become ever more divergent and sophisticated, continuous monitoring will be a critical element in an organization’s cybersecurity strategy. But it’s not an easy thing to implement. Download this Q&A report for industry perspectives on the various elements of effective continuous monitoring, and why it’s not just one more technology program.


Contract Guide: GSA IT Schedule 70

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.


Research Report: Collaboration Solutions Transforming Government

Government agencies are getting serious about online collaboration tools because they see the opportunity to improve enterprise-wide information sharing, support real-time communications during a crisis, and to reduce the money they spend on large in-person meetings or conferences. A recent survey conducted by the 1105 Government Information Group shows that these and other potential benefits are leading many agencies to deepen their investment in collaboration tools and to make collaboration part of their organizational culture. Download this exclusive research report for more on collaboration trends in government.


Monitoring IT: Why the current demands and constraints on IT professionals need a new approach

It’s critical to intimately know an application and what it’s requirements are in order for it to perform well. To establish that kind of performance baseline, you’ll need to know such things as who uses the application, where they use it from, how much network bandwidth it needs,and so on. This kind of information is needed for each application, both from the administrator and user point of view. To get there, you’ll have to monitor the legacy production environment so you know both what makes the application perform consistently well, and how to monitor it. Then you’ll have to continuously monitor the application as changes are made to it and the environment it runs in so you can measure any negative effects on its performance. Download this whitepaper for a new approach to IT monitoring.


Utility Storage for Government – NetApp Storage Without Capital Expense

This datasheet covers DLT Solutions Storage-as-a-Service (STaaS). STaaS is a NetApp hardware, software and services solution that combines secure, available, and dedicated on-premise infrastructure with a pay-as-you-go model that requires zero capital investment.


Special Report: Infrastructure Security

Evolve or die. That’s the imperative guiding the development of cybersecurity technologies and strategies across government and industry. The ongoing evolution of the federal IT enterprise, extended in all directions by advances in networking and mobile technology, must be matched to similar advances in information and network security. But above all, the nature of the current cybersecurity threats requires a new way of thinking. The old approach to cybersecurity, which was based on defending the perimeter, cannot hold up against the wide array of cyber threats that agencies now face. Download this special report for in-depth articles on infrastructure security.


TippingPoint Hacktivist Survival Guide

The last decade has seen the rise of crowd-sourced, activist-driven hacker groups.1 The term hacktivist has been coined to describe this group and refers to the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. Most notable of these hacktivist groups is Anonymous, a loose collective of individuals borne out of a cybersubculture that has gone mainstream.The goal of this paper is to provide a glimpse into the world of hacktivism and, more importantly, the group known as Anonymous.


Five Ways that Identity Federation is Improving Online Security for Government Agencies

Cloud computing, social networking and mobile devices are improving efficiency and collaboration in the public sector. But anytime, anywhere accessibility also increases the need to simplify, control and secure identities. This paper provides a brief overview of federated identity and reviews its roles within the identity management strategies of civilian agencies, the Department of Defense (DoD) and the intelligence community.


Enable Your Applications for CAC and PIV Smart Cards

Since HSPD-12 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and contractors wear their identity around their neck. While most agencies are leveraging these for physical access, the challenge comes in trying to use them for logical access to systems. Read this whitepaper to learn about a solution that allows end users to use their PIV cards for seamless access to on-premise, hosted and cloud-based applications.


Invest to Save with Collaboration Technologies

With budgets and staffs stretched thin, public sector organizations are searching for ways to cut costs and help employees work more productively. IT leaders recognize that collaborative voice, video, and mobile technologies could enable their organizations to achieve these goals, but they expect to implement these technologies when investment dollars are more plentiful. Download this whitepaper for an in-depth look at how collaboration technologies are helping IT managers “invest to save” by delivering significant long-term savings while improving the effectiveness of their organizations.


Special Report: Best Practices for Meeting Big Data Challenges

Big data is a top priority for CIOs, but few know exactly what it is – and what it can help their organizations achieve. As the creation of data has multiplied recently, IT organizations are left wondering how to manage those data stores while at the same time being asked to help the business side of the house innovate, cut costs and improve end-user satisfaction. Download this special report for in-depth articles on meeting the challenges you face as you take on "big data."


GameChanger: Data Center Consolidation

Since the government’s Federal Data Center Consolidation Initiative launched in 2010, agencies have been working hard to consolidate their data centers. Clearly, the benefits of data center consolidation are well worth the effort. In addition to obvious payoffs, such as lowering the cost of operations, data center consolidation can greatly improve performance and provide more efficient energy consumption. Download this in-depth report for more on the benefits of DCC.