What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


Text Analytics in Government: Using Automated Analysis to Unlock the Hidden Secrets of Unstructured Data

This white paper explores how federal, state and local agencies are using text analytics to determine the relevance of digital data so they can accurately gauge public sentiment, influence opinion, shape policy, identify hidden risks and stop fraud.


Viewpoint: Insider Threats Pose Unique Cyber Challenge

Agencies are aware of the need for cyber defense within their infrastructure to protect from insider threats; however it is important for organizations to recognize what data is most at risk for being targeted. Defining the top IT risk scenarios can greatly help agencies analyze and monitor anomalies to enhance the prevention of insider threat attacks. Download this informative Q&A to gain valuable insights from an industry expert in the field of cybersecurity and insider threats.


GameChanger: Secure Mobility

The number and variety of threats to mobile devices and the data they access will never disappear—and in fact, new threats will continue to arise. But with the right tools and planning, most of these threats can be thwarted before they harm an agency, its data or its users. Download this report to discover the top mobile threats and how to keep your organization’s mobile strategies secure.


Guard Data in Government Environments by Implementing Continuous Diagnostics and Mitigation

As government agencies continue to face increasingly hazardous IT security threats, they are constantly challenged to keep these threats at bay while protecting sensitive—and often classified— data. Read this whitepaper to learn more on the implementation of continuous diagnostics and mitigation, which is designed to facilitate an automated approach to evolving network and systems cybersecurity.


Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation

Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. Read this whitepaper to learn more about a flexible automated framework for effective continuous monitoring and mitigation.


Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations

Ponemon 2014 Threat Intelligence & Incident Response Survey: 1083 CISOs and security technicians reveal the unsettling truth about how limited information security departments are in defending their domains.


The Evolving Enterprise: Mobile, Flexible and Secure

Federal agencies are looking to deliver a wider range of services and to extend those services to wherever users might go. Download this informative digital dialogue to learn how agencies are leveraging mobility, unified communications and data center consolidation and optimization to achieve this goal.


Snapshot: Solutions for Collaborative Government

Collaboration has always been a part of the way government does business, but until relatively recently it was something that happened only at certain times and between select groups of people. That is because with the older generation of tools, there was often a fear that collaboration would distract workers and drag down productivity. But new technology has allayed those fears, and now government managers are the numerous benefits of supporting collaboration, from easier sharing of information and faster response to events, to a better use of scarce budget dollars. The focus now is on developing the goals and strategies for successful collaboration initiatives, and providing the best-in-class solutions for employees.


Virtualization Fosters More Collaborative Healthcare Services

Virtualization and cloud solutions make it much easier to manage the mix of old and new systems now found in many healthcare organizations. Download this informative digital dialogue to learn about the rapid changes in healthcare services, including how to build a business case for point of care solutions.


VMware® View™ for Government-Agency Multilevel Secure (MLS) Desktops

The complexities of delivering simultaneous access by users with different security clearances and needs-to-know, and preventing users from obtaining access to information for which they lack authorization, are almost overwhelming. Recurring security problems such as covert channels (where highly classified data is transmitted inappropriately to lower-classification users), bypassing (where unsecured data paths are opened maliciously or mistakenly), and an assortment of other issues have plagued MLS systems. And today, the accelerating pace of technological change creates additional challenges for government-agency MLS systems.


Face-to-Face: Cloud

It has been about three years since the White House launched its “Cloud First” mandate to encourage agencies to speed up their use of cloud computing. However, most agencies have struggled with structuring cloud contracts and defining exactly what capabilities they need from industry, according to speakers at a recent event. Download this event overview to discover more highlights from this recent cloud event, including how to create an acquisition strategy for buying into the cloud.


Research Report: The Virtualization Playbook

The increasing complexity of the government enterprise—and the increasing volume and complexity of the data being managed—is forcing agency IT managers to rethink how they manage the infrastructure. Virtualization is at the center of that. By virtualizing key elements of the data center, agencies gain flexibility, scalability and manageability. And those gains are magnified when agencies integrate those systems into a cohesive whole. At the same time, IT managers are looking to bolster their infrastructures with emerging storage and storage management options. The data center of the future is taking shape now.