What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


Digital Dialogue: The Enterprise Goes Social

The workplace has changed dramatically over the last three decades. Today’s government workers want tools that help them do their jobs efficiently; tools that foster real collaboration and enable them to drive knowledge from other users. Download this informative digital dialogue to dive deeper into the realm of social enterprise as well as learn the key to creating an efficient environment for your agency.


Contract Guide: Continuous Diagnostics and Mitigation

In September 2013, the Department of Homeland Security and the General Services Administration began a new era in federal information security with the launch of the Continuous Diagnostics and Monitoring program. CDM is designed to help agencies bolster their continuous monitoring programs by providing easy access to essential tools and services. Download this special report to gain further insight on how to leverage the full benefits of continuous diagnostics and mitigation.


Continuous Monitoring for Dummies

The United States federal, state, and municipal IT infrastructures maintain and manage vital assets. However, every day it seems as though the media has a report about some agency or commercial business being exploited or compromised, suffering from a distributed denial-of-service (DDoS) attack or the damage and theft of sensitive information. Read this eBook to learn how you can make your agency infrastructure more secure by using the continuous monitoring process and solutions discussed within.


Ensuring Application Security in Mobile Device Environments

As a result of the increase in wireless devices in the workforce, organizations are becoming more concerned with mobile security. Many, in fact, see this area as a primary technology challenge to address and a main focus for security initiatives.


Intelligent role management for improved security and compliance

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.


Keeping Distributed Endpoints Safe and Compliant

With rapidly increasing numbers of remote workers and mobile devices, there is no well-defined perimeter. The perimeter, by necessity, must be the endpoint itself. Endpoints, by their very nature, are highly vulnerable to attack— including system damage inflicted by malware, theft by phishing, privacy infringements through social networking, or loss of productivity due to spam, interruptions and system instabilities. Read this whitepaper to learn about a solution that provides real-time visibility and control over each endpoint’s status, remediating issues to help ensure continuous security and compliance.


Beyond the Next Generation:Putting Advanced Network Security to Work

As the network has evolved, so has network security. Firewalls retain their role of first-line filtration based on policy, but have grown to embrace a wider range of capability. In this report, EMA highlights specific examples of the ways in which converged security systems put today’s more advanced capabilities to work in practical application.


Identity and Access Intelligence:Transforming the Nature of Enterprise Security

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud security challenges and proactively protect sensitive IT assets.


Stay Ahead of Insider Threats with Predictive, Intelligent Security

It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools.


An Early Leader across the Big Data Security Analytics

This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one of the few vendors offering an integrated approach to combat this.


Proper Analysis Brings Better Mission Outcomes

Officials in the areas of defense, law enforcement and national security can use analytics to pinpoint persons or areas of interest. In the case of money laundering and attribute analysis, visualization was used to see how a front company used people to move cash around. Download this informative digital dialogue to further understand the benefits and abilities of visualization for analytics.


Growth in Online Services Push Agencies to Solve Identity Crisis

Download this informative digital dialogue, based on the recent FCW Executive Briefing titled “Federal Identity and Access Management Update" to gain a further understanding of how agencies can address current identity and access management challenges in hopes of improving the user experience.