What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


Beyond the Next Generation:Putting Advanced Network Security to Work

As the network has evolved, so has network security. Firewalls retain their role of first-line filtration based on policy, but have grown to embrace a wider range of capability. In this report, EMA highlights specific examples of the ways in which converged security systems put today’s more advanced capabilities to work in practical application.


Stay Ahead of Insider Threats with Predictive, Intelligent Security

It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools.


An Early Leader across the Big Data Security Analytics

This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one of the few vendors offering an integrated approach to combat this.


Growth in Online Services Push Agencies to Solve Identity Crisis

Download this informative digital dialogue, based on the recent FCW Executive Briefing titled “Federal Identity and Access Management Update" to gain a further understanding of how agencies can address current identity and access management challenges in hopes of improving the user experience.


Proper Analysis Brings Better Mission Outcomes

Officials in the areas of defense, law enforcement and national security can use analytics to pinpoint persons or areas of interest. In the case of money laundering and attribute analysis, visualization was used to see how a front company used people to move cash around. Download this informative digital dialogue to further understand the benefits and abilities of visualization for analytics.


GIS: The Gateway to Innovation and Collaboration

Download this informative Viewpoint to hear from Christopher Thomas, Director, Government Market at Esri to gain an interesting perspective on the upcoming opportunities for innovation and collaboration in the industry as it relates to GIS.


The Rise of Project Intelligence: When Project Management is Just Not Enough

Given ongoing budget constraints and the push to deliver a better product in less time, project intelligence will be essential to the success of federal PMO. Learn to make the PI process an integral part of project management for everyone involved in an organization and utilize the power of historical knowledge for the implementation of future projects.


Business Process Management for Dummies

In today’s dynamic business environment, organizations need to be agile so they’re ready to respond to the litany of challenges coming their way. Business Process Management (BPM) provides that agility by ensuring the full utilization of technology; helping your agency to become far more responsive and meet your goals. Read this eBook to learn more about how BPM enables a more flexible, agile and scalable business model.


Operational Decision Management for Dummies

Everything your agency does relies on decisions. Operational decision management (ODM) is a set of technologies and methods that allow you to automate your day-to-day business decisions without compromising their accuracy and effectiveness. This eBook examines how ODM ensures responsible governance by assuring proper decision approval, securing the library, providing authorization for changes, measuring decision outcomes, and creating a feedback loop to identify further improvements and refinements.


Extending Access Control to the Cloud

Organizations are consuming software-as-a-service applications at an exponential rate. While the advantages of SaaS applications are great, so are the potential pitfalls of unauthorized access. Download this whitepaper and learn about the risks of cloud computing, how you can control those risks and a few things to keep in mind when selecting a vendor for your cloud solutions


Privileged Users: Managing Hidden Risk in Your Organization

While insider breaches have happened for years, many organizations find themselves asking: Are we at risk? The answer comes down to a group known as “privileged users” within your organization. This whitepaper explains 4 simple rules to cut privileged user access issues.


Why It Pays to Take a Business-Centric Approach to Compliance

A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance; particularly with identity management and access governance. Read this whitepaper to learn more.