Whitepapers


Top Mobile Security Questions Answered

The top six questions your security and IT peers have about mobile security, answered. Get details on top threats, critical gaps, and why enterprises need visibility into mobile today.


Federal Agencies Have a BYOD Program, Like It or Not

Many federal agencies claim they don't have a BYOD program. This survey of federal employees, however, says something different. Get data on personal device usage at work, who's breaking the rules, and more.


FAA Saves Makes Strategic Sourcing a Reality

In recent years, the federal government has been building its case for strategic sourcing as a way to buy products and services more cost-effectively and efficiently. The Federal Aviation Administration just might be exhibit number one. Download this contract profile to learn how the FAA’s ten-year old program meets mission needs while delivering on cost and quality.


The Future of Military Manufacturing: The Digital Depot

DoD depots are vital to national defense, but aging systems and growing budget pressures stress the capabilities of these highly dynamic environments. To be most effective, depots need to optimize and evolve, transforming into digital depots.


Rugged Computing in Federal Government: More Important and More Useful than Ever

Download this informative Market Insights Special Report to discover the findings from a recent survey conducted by FCW and Panasonic, which revealed the need for secure, progressive, feature-rich rugged devices that continue to evolve to meet federal agency needs.


IT Playbook:
Records Management

Most agencies are well on their way toward meeting the 2016 NARA mandate to electronically manage e-mail records. Now they’re looking toward 2019—the deadline for electronically managing all records. Download this resource to get the play-by-play on what to expect from the 2019 mandate and how your agency can strategize to successfully make the transition to electronic records management.


12 Considerations: Build a Business Case for Mobile Platforms

Move beyond tactical mobile apps to a more strategic approach to development, deployment, and management of those apps. Reduce the complexity of developing and managing multiple apps—across varied device platforms—and connecting to many data points and back-end systems. This e-book will help structure and quantify a business case for a mobile app platform approach to mobility.


Invest in the Right Flash Storage Solution

You are looking at flash storage because you see it is taking the storage world by storm. You are interested in accelerating business-critical applications, consolidating a virtual server or desktop deployment, trying to get ahead of your company’s data onslaught, or some combination of the above. This easy-to-read guide was developed to help arm you with key considerations and questions to ask before investing in a flash storage array for your business, today and for the future.


A Proven Security Intelligence Model for Combating Cyber Threats

Cyber security is a journey, not a destination. It takes time and resources to mature any significant organizational capability, and achieving significant reductions in MTTD and MTTR is no different. However, for organizations determined to reduce their cyber security risk posture, it is a capability that must be invested in. LogRhythm’s unified platform approach and flexible product architecture allow an organization to adopt and mature capabilities over time, comfortable in the fact that subsequent investments will build on previous steps along the maturity model. Download this article to learn more!


Mobility in Government Services: A Checklist Towards Regulatory Compliance

In the US, the story is already complex, and increasingly so. And the more regulations shift, the tougher it is for government organizations to keep up. In government organizations “nearly 60% say their mobile data protection policies are driven by both internal prioritization and federal and state requirements. However, technical controls to support policies are not always in place. For example, just 27% can prevent data from leaving secured devices.”


Making the Most of NETCENTS-2

The suite of contracts for IT products, infrastructure solutions and application services is mandatory for the Air Force. But it can be a valuable option for other agencies as well. Download this report to learn more details on how this massive acquisition vehicle can benefit your agency.


Cross-Agency Teamwork, Anytime and Anywhere

Learn how Dan McCrae, Director of IT Service Delivery Division at the National Oceanic and Atmospheric Administration (NOAA) used Google Apps to coordinate schedules, share documents, and create final reports - without the hassle of emailing attachments back and forth.


How Scientists Self-Assess

Download this informative Case Study, featuring Dr. Rosio Alvarez, CIO of the Lawrence Berkeley National Laboratory to learn how Google Apps enabled them to streamline the performance review process and make it simple, flexible, transparent and more importantly, easy.


Flash Storage for Dummies

Flash technology is making quite a splash in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives, flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments running mission-critical, I/O intensive applications. Flash Storage For Dummies, NetApp 2nd Special Edition, explores the many uses and benefits of flash storage technology in the enterprise. From flash-accelerated storage to all-flash arrays, flash technology improves performance and increases reliability in storage infrastructures. Download now to learn more!


NETCENTS-2: New Air Force Contract Aims High

This mandatory use contract for the Air Force brings qualified vendors to the forefront, ensuring access to the best technologies at competitive pricing. Download this contract profile to learn how to make the most out of this contract’s product focus.


U.S. Fish and Wildlife Service Revamps Operations with Nimble Storage

Download this informative Digital Dialogue, capturing highlights from a recent webcast event to learn how the U.S. Fish and Wildlife Service (FWS) is saving money and working smarter after implementing flash storage and predictive analytics at its data centers and regional offices.


Army ITES: Recharging the Enterprise

The manner in which the Army procures its technology to run the Army enterprise continues to evolve almost as rapidly as the technology itself. New and revised contract vehicles provide sensible, cost-effective means of equipping the Army with the latest technologies, including cybersecurity and mobile technology. As Army Chief of Staff General Mark Milley says, new and emerging technologies could “deeply change the character of war.”


Improving Data Quality and IT Portfolio Management for Federal Agencies

Are you looking to improve data quality and IT Portfolio Management within your organization? Check out InQuisient’s white paper on improving data quality, and how their software is managing programs, projects and applications through a single system, creating order from chaos. InQuisient’s 100% web-based Platform is a proven solution, currently implemented across the Federal Government.


Human Outcome Analytics

It is becoming increasingly difficult for caseworkers and care providers to ensure healthy and productive lifestyles for individuals and families. The combination of assessing individual risk and aligning programming helps promote satisfying, productive family environments; adjust or reinforce positive individual behavior; aid in overcoming trauma and reduce or avoid risk. As a result, there is a pressing need for solutions to assess specifically what services are required at a given time for an individual or family. But by using predictive analytics technology, combining best practices in risk assessment with best-in-class analytic tools to better assess risk and determine near real-time outcome pathways, Human Outcome Analytics help practitioners provide the quality care families and individuals need.


Operational Intelligence is a Game-Changer

Too often agencies are managing the performance and security of their systems based on the limited set of data targeted by system and network monitoring tools. Here’s how agencies can translate that data into true operational intelligence that can transform the performance and security of the enterprise.


Analytics: The upside of disruption

Powerful disruptions have occurred within the global marketplace. Long-standing business practices and interactions – particularly between the business and IT functions – have fundamentally changed. We find that a majority of organizations are embracing marketplace disruptions as opportunities, intensifying their adoption of big data and analytics technologies. More than before, organizations see the upside of acting quickly to innovate their business models and analytics strategies, and improve the information infrastructure to support a future view. Download to learn more!


NETCENTS-2: Bringing Convergence to Defense

The relatively new NETCENTS-2 contract vehicle is a true evolution of earlier iterations. It is intended to provide faster, more flexible and more comprehensive access to a variety of technology categories. The contract aims to provide agencies with network-centric IT, networking, security, voice, video and data communications solutions and services not available through other mandatory-use DoD or Air Force contract formats.


Warrior Canine Connection: Innovating Building Renovation with Autodesk

With Building Information Models (BIM), stakeholders are empowered to make smarter decisions on maintenance repair and operations (MRO) projects. See how Autodesk is helping public sector agencies, such as Warrior Canine Connection, with MRO and BIM.


Reimagining the Citizen Experience

Agencies have embraced technology as a way to reengage the citizens they serve on a more personal level and to enhance the way they deliver services. When citizens interact with government agencies, they expect the experience to be easy, fast, and efficient. Download this event summary to learn how the Acquia Drupal platform can help your agency.


Considerations for Modernizing the Government Data Center

This white paper looks at how federal government organizations can modernize their data centers to meet new data center requirements.


IT Consolidation and Modernization Put Spotlight on Virtualization

IT managers are turning to state-of-the-art solutions such as cloud computing and virtualization to help with their consolidation and modernization efforts. As a result, agencies are operating more smoothly and at lower costs. Download this digital dialogue to read more on highlights from a recent webcast series on virtualization.


All Systems Are Go for SEWP V

The latest iteration of NASA's governmentwide acquisition contract opened for business about a year ago. Download this informative Contract Guide to learn what that means for agency customers.


IT Portfolio Management for Federal Agencies

Are you looking to improve IT Portfolio Management within your organization? Check out InQuisient’s short overview on how their software is managing programs, projects and applications through a single system, creating order from chaos. InQuisient’s 100% web-based Platform is a proven solution, currently implemented across the Federal Government.


Facing Down Cyberthreats

The Continuous Diagnostics and Mitigation (CDM) program makes tools and services— such as network sensors and dashboards—available to agencies via a government-wide contract. These tools and services help them identify cybersecurity risks on an ongoing basis, prioritize these risks based on potential threats, and mitigate them. The goal is to reduce breaches, improve visibility and move agencies away from a compliance focus and toward a continuous monitoring approach to security. See what government and industry experts had to say at the May 11th event CDM: Building Advanced Cyber Strategies.


The Rise of Hyperconvergence

Moving to a hyperconverged infrastructure addresses many of the issues facing federal government agencies these days. It can be more cost-effective, provide greater capacity, increased flexibility, rapid scalability, and promote innovation. This report — presented by Dell, Intel® and Tracewell — details several aspects of the move to hyperconvergence; from establishing a “future-ready” architecture capable of handling massive data stores and the durability requirements of field operations to software-based and virtualized infrastructure


The Big Picture View of Security

Cyber analytics focuses on improving intrusion detection and response. It’s most effective when considered as a single aspect of a larger cybersecurity game plan. To get the most out of cyber analytics, agencies should build their systems securely from the ground up. Take a holistic and layered approach, promote visibility, think strategically, be able to scale, promote security awareness and enforce basic security practices. Learn more about Cyberanalytics from this event overview based on the April 27th event Cyber Analytics, Compliance, and Business Agility.


What Agencies Need to Know About HCI

Hyper-converged infrastructure is the latest incarnation of a time-tested concept of distributed systems. Download this informative special report to learn what it really means — and why government IT leaders should care.


Samsung on Android: The Secure, Defense-Grade Alternative

Samsung and Google have undertaken a number of initiatives to build security into the core Android operating system, provide robust application screening and provisioning, and deliver innovative hardware-based security platforms. Together, these enhancements have positively affected perceptions of Android security and underscore Android’s enterprise worthiness. Download this informative whitepaper to learn how Google’s ongoing commitment to providing monthly Android security patches, robust security services, and diligent application vetting with strict review processes, combined with Samsung’s device-based security features, position Android-based Samsung devices as the secure and logical choice for businesses and government agencies wishing to realize the potential of a digital enterprise.


ITES-3H: The New Face of Defense Contracts

The most recent iteration of the U.S. Army’s IT Enterprise Solutions contract—ITES-3H—is a notable step forward in the evolution of this contract. After the ITES-2H contract, originally award in 2014, was extended several times and had more than $1 billion added to its ceiling, it was time for a new format. Under ITES-3H, the contract is open to other defense agencies, although the Army is expected to account for the majority of the awards. This special report will present a series of articles explaining the evolution of ITES, the broad reaching impact of the new contract, its impact of cybersecurity, and what’s next for this contract format.


A Better Storage Alternative For Federal Agencies

Under the Federal Data Center Consolidation Initiative and the Cloud First initiative, agencies are being asked to evaluate cloud storage among their modernization options. While some cloud storage services have a reputation for being an economical option, many agencies are understandably reluctant to transfer control and management of their IT infrastructure to a cloud storage provider because of concerns over security, access, and meeting critical SLAs. But there is another option. High-density flash storage offers agencies an unbeatable combination of high performance and cost competitiveness. This white paper compares the cost, control, security, and performance between the two options.


Single View of Citizen Demo

This demonstration provides 3 specific examples of how government agencies can utilize a single 360 degree view of the citizen to improve service delivery while reducing cost and preventing fraud. Watch Demo


Coordinating Health and Human Services
Digital White Paper

Learn how outcomes can improve when Federal, State and Local organizations work together to create a more complete view of the citizen. See how integration of systems and data have changed outcomes for citizens with specific examples in San Diego, Camden and Clark County. Learn More


Hackers have an effective plan to get to your privileged accounts – here’s a three-step plan to prevent their success

Gaining access to privileged accounts is key to a hacker’s success because of the unlimited access that they provide. Read this paper to learn a framework for creating a Privileged Account Management (PAM) governance plan and a three-step process for taking control of your privileged accounts.


Modern Manufacturing Comes to Federal Agencies

Call it 3D printing, call it additive manufacturing; by any name, it’s transforming fields as diverse as biological engineering and aircraft part production. Fields like that require precise tolerances in component production, which digital 3D printing provides. They also have significant degrees of flexibility and versatility, since 3D printer output is generated directly from digital files you can instantly edit or revise as needed.Download this exclusive Executive Insights to learn how 3D printing is emerging as the answer for many complex government production and prototyping projects.


Navigating Next-Generation Networks

The network is the lifeblood of federal agencies’ many missions today. The readiness of people and organizations to do the work required by the mission depends more and more on leveraging a reliable, resilient and secure network to access and share information. Download this exclusive report to learn how agencies are inserting innovation into network planning to meet growing demands.


GameChanger: Data Analytics Critical for Data Defense

Data analytics has become a first-line defense for federal agencies. Whether it’s identifying fraud and abuse, stopping hackers in their tracks, or enhancing disaster response, using data analytics to better understand what’s happening in the world is a critical function these days. Download this report to read more on how data analytics are essential to effective cybersecurity, including how to find the right solution for your organization.


SEWP V Raises the Bar on Buying Experience

For more than 20 years, federal agencies have been taking advantage of one of the most far-ranging, service-oriented, cost-effective procurement vehicles available. Download this report to learn more on how SEWP V is setting an even higher standard.


Research Report: Digital Government Strategies

Across all levels of state and federal government, agencies are embracing the shift to digital services. Many of the moving pieces continue to evolve and work together such as: the steady move to the cloud, the increase in mobile device usage, and the cultural shifts. Download this research report to access further findings from a recent survey covering the strategies for digital government.


The Brave New Infrastructure

Agencies spend as much as 80 percent of their time chasing problems associated with legacy infrastructure. Download this article to get more insight into how software driven infrastructure can help relieve agencies from managing legacy systems.


Proactive Response to Today’s Advanced Persistent Threats

This white paper describes the ability of IBM BigFix to respond to unintentional errors and malicious cyber attacks, mitigating threats rapidly with visibility and control that arm IT operations with near zero-day protection across platforms and distributed endpoints.


The Case for Security Intelligence Services, Hosted from the Cloud

Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.


Top Tips for Securing Big Data Environments

As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments


Security Strategy Depends on Risk-Management

Risk framing is an essential aspect of formulating a security strategy. It establishes the boundary and scope of the environment in which risk-based decisions are made. Download this digital dialogue to gain insights from NASA on the best practices for creating a strong information security strategy for your organization.


Expert Q&A: The Hyperconverged Datacenter

Hyperconvergence is the next step in the evolution of datacenter technology. It packages infrastructure elements—storage, compute and network—into an appliance. As Chris Howard, Nutanix vice president of federal sales, and Jeff Hogarth, Dell’s federal sales director, explain, the result is simplified administration, reduced ROI and faster response to agency demands.


Analytics: The Upside of Disruption

In order for companies to succeed in the digital market, they must learn to overcome the disruptions of Accelerated digitization, Radical technology changes, and Knowledge can replace speculation. Failure to stay ahead of these disruptions can leave organization stranded and alone while their competitors speed ahead to success. Download this article to learn more!