What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download now...

How To Achieve Secure ID Assurance: Whitepaper

Nearly 10 years after establishment of the Federal Identity, Credential and Access Management (FICAM) program, most federal agencies have yet to complete a comprehensive approach to unifying physical and logical access using a single smart card or token. The time to act is now. In this white paper, we’ll review the key FICAM use cases and the approaches agencies can take to efficiently accomplish them.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

HP Security Research: Cyber Risk Report 2015: Asset

Welcome to the HP Cyber Risk Report 2015. In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.


Cyber Risk Report 2015: Executive Summary: Asset

The 2015 edition of HP’s annual security research Cyber Risk Report details a threat landscape still heavily populated by old problems and known issues, even as the pace of the security world quickens. The environment is one in which well-known attacks and misconfigurations exist side-by-side with mobile malware and connected devices (Internet of Things [IoT]) that remain largely unsecured. As the global economy continues its recovery, enterprises have continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.


Federal Agencies, Cautiously, Target IT Shared Services: Asset

Download this Shared Services Guide to learn how to stay ahead of the curve with a "Shared First" approach to IT service delivery.