Whitepapers


The Future of the Data Center Network: Infographic

VMware NSX delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Center. Because NSX builds networks in software, data center operators can achieve levels of agility, security, and economics that were previously unreachable with physical networks.


All-Flash Storage for Dummies

All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all‐flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale‐out solutions have emerged that are designed to power the new cloud services of the future.


Infographic | Improving Contractor Accountability

With the increase of government contractors within federal agencies, it is important to understand the benefits of tracking and accountability. Download this informative infographic to learn how near-real-time contractor tracking would help improve accountability and optimize oversight in your agency.


Lessons Learned from Healthcare.gov: Why Application Monitoring is Mission-Critical

The newest generation of citizen services is running in the cloud. On paper, that makes perfect sense. The cloud provides a flexible, scalable platform for extending services to wherever citizens might be. In practice, however, it's inviting trouble. Too often, organizations move services to the cloud without the ability to monitor application and website performance. The more successful a service is, the more likely it is that transactions will drop and outages occur—with the agency having no idea why. This whitepaper analyzes the perfect use case: The Centers for Medicare and Medicaid Services (CMS), which runs some of the most high-profile public websites, including Healthcare.gov.


Filling Cybersecurity Gaps

Continuous Diagnostics and Mitigation (CDM), provides continuous monitoring tools and services to agencies via a governmentwide contract. CDM helps agencies identify their cyber risks on an ongoing basis, prioritize those risks and mitigate them, which is particularly valuable as cyber threats grow to become more sophisticated and complex. Download this digital dialogue to learn highlights from our recent webcast, including how NASA relies on CDM tools to provide greater visibility into cyber vulnerabilities.


2017 Enterprise Roadmap

Download this informative white paper to hear what industry and government speakers had to say at the Oct. 19th event: The 2017 Enterprise Roadmap: Laying the Foundation for Modernization.


IQ Portfolio Insight

Are you looking to improve IT Portfolio Management within your organization? InQuisient's IQ Portfolio Insight tool can help you monitor and manage data across federated organizations and systems, allowing you to deliver trusted, up-to-date information for your decision-makers. Thousands of users across government enterprises, including the Department of Defense (DoD) and the Intelligence Community, are using InQuisient to manage billions of dollars in single instances.


IQ FITARA A Plus

Do you need to improve your agency's FITARA Scorecard? InQuisient's FITARA A Plus can do just that. This tool will track and analyze agency data and produce required FITARA reports automatically.


IQ Strategic Planner

Are you in need of a strategic plan that aligns your organization's architecture and spending portfolio to your objectives and business goals? InQuisient's IQ Strategic Planner, a web-based software, enables you to link your business vision, goals, strategies, tactics and business rules, then bridges the resulting business specifications to align your EA and IT stack with your goals and directives. By tying these disparate sources of information together, your organization can answer the hard questions with confidence, to ensure the accuracy and value of your strategic plan.


IQ Platform Overview

InQuisient’s browser-based platform collects all Enterprise Data in one place, and enables one seamless view of information for the C-Suite – from the organization’s Enterprise Architecture to IT Portfolio Management – enabling business transformation at the speed of your mission. The InQuisient platform puts users in control, providing advanced visualization for real-time health assessments and decision-making.


Detect and Deter Insider Threats: A Before, During and After Approach

Today, there are more connected devices than ever before. Everything from refrigerators and smoke detectors to health bands and lighting are part of a vast interconnected network — with more devices on the way. While these devices bring exciting new capabilities, they also represent new network access points — and a huge threat to the network and everything on it. In this whitepaper, we explore the importance of a comprehensive security strategy, including tips to combat attacks as the threat landscape continues to change.


Feds: You Have a BYOD Program, Like It or Not

Many federal agencies claim they don't have a BYOD program. However, after analyzing 20 federal agencies, Lookout discovered 14,622 Lookout-enabled devices associated with government networks. Download this research report to get more data on the state of federal BYOD, including your employees’ personal devices usage at work, who's breaking the rules, mobile malware encounters and more.


Mobile Security: The 6 Questions Modern Organizations are Asking

Wherever your organization falls on the spectrum of mobility adoption, the global trend is moving towards BYOD to benefit from enhanced worker productivity, increased revenues, and reduced device and data expenses. However, this increase in mobile devices brings important security implications. Download to get your top mobile security questions answered, including top threats, critical gaps, and why enterprises need visibility into mobile today.


Database Discovery: Identifying Hidden Risks and Sensitive Data

Keeping track of databases, and the associated data they host, is a significant challenge. Given the dynamic nature of organizational data, the way it is being used, stored, and eventually destroyed is constantly in flux and needs to be tracked on a continuous basis. Without a complete, continuously updated understanding, it is not possible to protect the most critical information assets.


Infographic: The Path to Network Transformation

The only way to reduce costs, increase security and prepare for the future is to modernize the network. Modernization requires transformation. And transformation includes not only upgrades to the network infrastructure, but also changes in operational business practices. Download this informative Infographic - based on a recent survey - to learn the best practices in transforming your network.


6 Steps to Successful Shared Services in Government

Shared services - a model that enables resources to be leveraged across an entire organization or multiple organizations based on agreed upon customer-service levels - is increasingly popular in the public sector. However, to take full advantage of a shared services agreement, the provider and consumer need to find some middle ground to ensure both of their needs are being met.


5 Chaos-Inducing IT Trends - And How to Be Prepared

Working in government IT isn’t easy. Constantly shifting trends, technologies, priorities and challenges often leave decision-makers feeling like they are on unstable ground. Fortunately, some steps can be taken to prepare for and harness this new normal of IT disruption. Here are the five forces of chaos to look out for and how to harness them.


Easing the Transition: Key Steps for Migrating to Windows 10

The U.S. Department of Defense (DoD) is facing a daunting mission with a tight deadline – the migration of all desktop users to Windows 10 by January 2017. In this digital dialogue, IT experts offer their advice for helping DoD IT teams to make progress on the upcoming deadline. Including how to minimize the complexity of the transition and to future proof desktop migrations overall.


True or False: Debunking Flash Myths

This e-book addresses common misconceptions about enterprise flash storage, providing clarity for anyone using or considering flash in enterprise environments. Learn about old myths laid to rest and the reality of how enterprises can make full use of their flash storage investment.


Anatomy of a Hack Disrupted

This paper discusses a real-life situation, in which a malware attack took place but was discovered before any damage occurred. This malicious activity could have led to a very serious intrusion with devastating repercussions, but it was caught immediately, and the client was able to research and mitigate it easily and quickly.


Strategies for a Better Flow of Information

By 2020 about 1.7 megabytes of new information will be created every second for every human being on the planet, and at least 90% of it will be unstructured. The challenge that faces every organization is being able to extract meaningful information from the overload of data. Compounding this challenge is paper-based data that has to processed at the same time of electronic data. In this guide, get strategies on how to move paper files to electronic records for a digital transformation that can ultimately make a "paperless office" a reality, where extracting insights from data will be easier and more efficient.


Digital Government Focuses Attention on the User

Creating a digital agency demands a bottom-up instead of a top-down approach. This means thinking first about what customers need and then delivering on that, according to speakers at a Sept. 15th event: Digital Government: From Vision to ROI.


Health IT Guide: Better Tools for Better Outcomes

While technology has always been an important aspect of the healthcare industry, recent advances are helping move the state of healthcare forward. Managing the massive volumes of digital healthcare data and deriving the greatest value from the data for improved patient care is the primary goal. Ensuring patient security is also critical. Standardizing healthcare records formats can help ensure improved collaboration, security and efficiency. Download this guide to see how modern advances are working together to improve the overall quality and effectiveness of healthcare.


ITES-3H Focuses on Integrated Solutions

The Army's ITES-Enterprise Hardware Solutions contract began life humbly enough in 2003. It was originally a component of an $800 million contract vehicle to support the Army Infostructure Transformation program. The ITES contract is now in its third iteration - sprawling $5 billion contract that is the principal resource for the Army's IT system needs. Download this contract profile to learn how the Army ITES-3H contract continues to evolve to keep pace with technological trends.


IT Mandate: Getting Ready to Move to Windows 10

Last year, Microsoft Corp. introduced Windows 10—the latest version of its Windows operating system. This new version of its flagship OS offers many features that government agencies should find attractive; especially those looking to increase security and improve mobile device support. Download this IT Mandate to discover the top seven tips for planning a smooth migration to Windows 10.


Mobile Security: A Multi-Faceted Approach

Government agencies rely on mobile devices more than ever before. And it’s not just field operatives or inspectors. Agency staffers at all levels are being issued mobile devices. The challenge now for agencies is to ensure productivity and access to the tools they need to do their jobs; while at the same time ensuring those devices are truly secure. Security threats facing mobile devices continue to evolve, and so too must the security solutions and policies that protect those devices.


5 Ways Storage is Holdling You Back

Every day, government agencies must deal with new data challenges and raising public expectations for instantaneous, real-time service. In order to meet these needs, government IT departments are seeking a range of storage solutions in the hopes of optimizing the way data is stored, used and analyzed. Solid state storage used to cost a pretty penny but with its cost decreasing, it’s a game changer for agency data centers. In this white paper, learn five reasons why it’s worth considering upgrading to all-flash storage.


Flash Storage Buyer's Guide

Even if you haven't deployed flash in your infrastructure yet, chances are, in the next year it's likely to happen. To help you get started, we developed a comprehensive, vendor-neutral Flash Storage Buyer's Guide. The purpose of this guide is to provide a basis for evaluating and selecting the best flash storage solution for your business.


Simply Pure Cloud Economics 101

To the cloud, or not to the cloud? The answer may be more simple and economical than you imagine. In this white paper, Brian Garrett from Enterprise Strategy Group, is providing a quick lesson in cloud economics, based on an ESG audit of a model that compares the monthly cost of public cloud infrastructure with the monthly cost of leasing a converged private cloud.


Unlocking The Value of Federal Big Data

There has always been information around us. But it has only been in recent years that we have been able to harness the potent combination of powerful computing capabilities and an exploding volume of data to achieve unprecedented insights into our environments through Big Data. Despite widespread agreement that Big Data promises many benefits to federal agencies, fundamental questions and confusion remain over how to go about developing and applying Big Data capabilities.


Improving Threat Defenses with Pervasive Network Visibility and Security

With network complexity at an all-time high, gaining visibility across the network is harder than ever to achieve. Using sophisticated behavioral analytics, the Cisco StealthWatch System transforms data from existing infrastructure into actionable intelligence to deliver comprehensive visibility and protection for even the largest, most dynamic networks.


Tripwire Enterprise: Filling in the Gaps of HBSS

On the surface, the concept of the HBSS product suite is good: a set of pre-selected security solutions sold as an affordable package to protect the U.S. Department of Defense information systems and networks. Yet the solutions that the DoD can choose from leave gaps in security coverage. Learn how Tripwire® Enterprise helps fill those gaps.


Implementing FISMA SI-7: Tackle this Challenging Control to Improve Your FISMA Grade

To enhance your FISMA compliance grade, you must implement one of the most challenging controls in NIST SP800-53: SI-7, which requires organizations to employ automated and centrally-managed integrity verification tools to detect unauthorized change. This level of visibility can be difficult enough to achieve, but SI-7 also requires organizations to incorporate the unauthorized changes they find into their incident response process and be ready to pass an audit trial demonstrating these capabilities.


BIM Poised for Greater Adoption

Government agencies at the federal, state and local levels are always looking for ways to improve the manner in which they carry out various programs. This is both to ensure better outcomes and get the most out of the limited financial and staff resources they have to assign to projects. When it comes to building and construction jobs, nothing seems more promising than Building Information Modeling (BIM). Download this report to get access to findings from a recent survey polling more than 100 government and contractor sources about their organizations’ current use of BIM.


SEWP Keeps Pace with Tech Horizons

NASA’s Solutions for Enterprise-Wide Procurement (SEWP) contract vehicle has grown in size and currently operates with 145 contract holders, 119 of which are small businesses. Over the years, SEWP has gone from just one of a number of government-wide acquisition contracts (GWACs) to the top of the pile. It’s widely considered as one of best run IT-based contracts and has become a go-to resource for government agencies. Download this special report containing expert viewpoints from SEWP Program Manager, Joanne Woytek and experienced contract holders, as we take a deeper dive into SEWP V.


Getting the Edge on Cyberthreats

An event overview of the Aug. 24th Security Summit: Getting the Edge on Cyber Threats. Download now to learn more!


Advanced Analytics: A Powerful Prescription for Health and Social Programs

Advanced analytics can bring significant changes to government healthcare and social programs. Applying this level of data analytics can greatly improve patient outcomes, enhance research efforts and drive greater value from disparate data stores. It is already helping improve diagnoses and care and promises to streamline healthcare and social service practices in the future. Download this informative eBook to learn more!


Mobile Management from the Ground Up

The use mobile of devices throughout government agencies continues to increase. The security threats specifically targeting those devices and the challenges agencies face securing and managing those devices continue to multiply as well. It’s a combination of security solutions and policies to arrive at the delicate balance of ensuring access and ensuring security.


Digital Government: Moving From Vision to Reality

Do agencies really "get" digital government? Do they understand its promise and potential, and do they see it as vital to their future? A recent survey, commissioned by Unisys, explored the perceived and real benefits that agencies are realizing in their efforts to transform through digital technologies. Download this informative Executive Summary to learn more about where federal, state and local agencies are on the path to transformation and where they see that path taking them in the future.


Keep Pace with Cloud Security

Agencies have made significant inroads migrating some of their applications to the cloud. As user expectations rise and cloud implementations become more sophisticated though, they have to double down on security and management practices.


Cloud Gives Agencies Transformational Tools

After resolving some initial concerns, many agencies have embraced cloud computing as a secure option to support their mission and transformation goals. As they delve deeper into the cloud though, agencies find they still have hurdles to clear—especially cultural issues.


Mobility Surge Raises Security Stakes

Until recently, federal agencies saw mobile technology as a promising tool primarily for improving the productivity of employees whose work often takes them on the road—the so-called mobile warriors. Today, agencies recognize the federal workforce has become a mobile workforce, with employees expecting access to information and services at any time, from anywhere, using any device. Download this informative GameChanger to learn how federal agencies are using gamechanging technology to use mobile security not as something that inhibits productivity, but as a facilitator.


Smarter Care: Impact at the Point of Care

Health and social care systems are interdependent and each critically affects the other. Yet, a complex matrix of public and private stakeholders dedicated to the health and well-being of individuals still operates largely within silos. They provide separate types of intervention, often with competing objectives and insufficient regard for the outcomes. The world is now at the cusp of creating a type of “system of systems,” in which private and public stakeholders are coming together to coordinate resources at unprecedented levels. These stakeholders span industries, governments, cities and communities. Learn how you can improve social systems at the point of delivery in this white paper.


FAA Saves Makes Strategic Sourcing a Reality

In recent years, the federal government has been building its case for strategic sourcing as a way to buy products and services more cost-effectively and efficiently. The Federal Aviation Administration just might be exhibit number one. Download this contract profile to learn how the FAA’s ten-year old program meets mission needs while delivering on cost and quality.


The Future of Military Manufacturing: The Digital Depot

DoD depots are vital to national defense, but aging systems and growing budget pressures stress the capabilities of these highly dynamic environments. To be most effective, depots need to optimize and evolve, transforming into digital depots.


IT Playbook:
Records Management

Most agencies are well on their way toward meeting the 2016 NARA mandate to electronically manage e-mail records. Now they’re looking toward 2019—the deadline for electronically managing all records. Download this resource to get the play-by-play on what to expect from the 2019 mandate and how your agency can strategize to successfully make the transition to electronic records management.


12 Considerations: Build a Business Case for Mobile Platforms

Move beyond tactical mobile apps to a more strategic approach to development, deployment, and management of those apps. Reduce the complexity of developing and managing multiple apps—across varied device platforms—and connecting to many data points and back-end systems. This e-book will help structure and quantify a business case for a mobile app platform approach to mobility.


Invest in the Right Flash Storage Solution

You are looking at flash storage because you see it is taking the storage world by storm. You are interested in accelerating business-critical applications, consolidating a virtual server or desktop deployment, trying to get ahead of your company’s data onslaught, or some combination of the above. This easy-to-read guide was developed to help arm you with key considerations and questions to ask before investing in a flash storage array for your business, today and for the future.


Mobility in Government Services: A Checklist Towards Regulatory Compliance

In the US, the story is already complex, and increasingly so. And the more regulations shift, the tougher it is for government organizations to keep up. In government organizations “nearly 60% say their mobile data protection policies are driven by both internal prioritization and federal and state requirements. However, technical controls to support policies are not always in place. For example, just 27% can prevent data from leaving secured devices.”


Making the Most of NETCENTS-2

The suite of contracts for IT products, infrastructure solutions and application services is mandatory for the Air Force. But it can be a valuable option for other agencies as well. Download this report to learn more details on how this massive acquisition vehicle can benefit your agency.