What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


Contract Guide: Continuous Diagnostics and Mitigation

In September 2013, the Department of Homeland Security and the General Services Administration began a new era in federal information security with the launch of the Continuous Diagnostics and Monitoring program. CDM is designed to help agencies bolster their continuous monitoring programs by providing easy access to essential tools and services. Download this special report to gain further insight on how to leverage the full benefits of continuous diagnostics and mitigation.

Continuous Monitoring for Dummies

The United States federal, state, and municipal IT infrastructures maintain and manage vital assets. However, every day it seems as though the media has a report about some agency or commercial business being exploited or compromised, suffering from a distributed denial-of-service (DDoS) attack or the damage and theft of sensitive information. Read this eBook to learn how you can make your agency infrastructure more secure by using the continuous monitoring process and solutions discussed within.

Growth in Online Services Push Agencies to Solve Identity Crisis

Download this informative digital dialogue, based on the recent FCW Executive Briefing titled “Federal Identity and Access Management Update" to gain a further understanding of how agencies can address current identity and access management challenges in hopes of improving the user experience.

Proper Analysis Brings Better Mission Outcomes

Officials in the areas of defense, law enforcement and national security can use analytics to pinpoint persons or areas of interest. In the case of money laundering and attribute analysis, visualization was used to see how a front company used people to move cash around. Download this informative digital dialogue to further understand the benefits and abilities of visualization for analytics.

GIS: The Gateway to Innovation and Collaboration

Download this informative Viewpoint to hear from Christopher Thomas, Director, Government Market at Esri to gain an interesting perspective on the upcoming opportunities for innovation and collaboration in the industry as it relates to GIS.

The Rise of Project Intelligence: When Project Management is Just Not Enough

Given ongoing budget constraints and the push to deliver a better product in less time, project intelligence will be essential to the success of federal PMO. Learn to make the PI process an integral part of project management for everyone involved in an organization and utilize the power of historical knowledge for the implementation of future projects.

Business Process Management for Dummies

In today’s dynamic business environment, organizations need to be agile so they’re ready to respond to the litany of challenges coming their way. Business Process Management (BPM) provides that agility by ensuring the full utilization of technology; helping your agency to become far more responsive and meet your goals. Read this eBook to learn more about how BPM enables a more flexible, agile and scalable business model.

Operational Decision Management for Dummies

Everything your agency does relies on decisions. Operational decision management (ODM) is a set of technologies and methods that allow you to automate your day-to-day business decisions without compromising their accuracy and effectiveness. This eBook examines how ODM ensures responsible governance by assuring proper decision approval, securing the library, providing authorization for changes, measuring decision outcomes, and creating a feedback loop to identify further improvements and refinements.

Why It Pays to Take a Business-Centric Approach to Compliance

A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance; particularly with identity management and access governance. Read this whitepaper to learn more.

Privileged Users: Managing Hidden Risk in Your Organization

While insider breaches have happened for years, many organizations find themselves asking: Are we at risk? The answer comes down to a group known as “privileged users” within your organization. This whitepaper explains 4 simple rules to cut privileged user access issues.

Staying Secure in a Cloudy World

Organizations that deploy public, private or hybrid cloud infrastructures—which today is virtually all of them—must mitigate inherent security risks while also maintaining compliance with industry and government regulations. This paper contains three simple steps for maintaining visibility and control when moving to the cloud.

Extending Access Control to the Cloud

Organizations are consuming software-as-a-service applications at an exponential rate. While the advantages of SaaS applications are great, so are the potential pitfalls of unauthorized access. Download this whitepaper and learn about the risks of cloud computing, how you can control those risks and a few things to keep in mind when selecting a vendor for your cloud solutions