Whitepapers


All-Flash Storage for Dummies

All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all‐flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale‐out solutions have emerged that are designed to power the new cloud services of the future.


Infographic | Improving Contractor Accountability

With the increase of government contractors within federal agencies, it is important to understand the benefits of tracking and accountability. Download this informative infographic to learn how near-real-time contractor tracking would help improve accountability and optimize oversight in your agency.


Lessons Learned from Healthcare.gov: Why Application Monitoring is Mission-Critical

The newest generation of citizen services is running in the cloud. On paper, that makes perfect sense. The cloud provides a flexible, scalable platform for extending services to wherever citizens might be. In practice, however, it's inviting trouble. Too often, organizations move services to the cloud without the ability to monitor application and website performance. The more successful a service is, the more likely it is that transactions will drop and outages occur—with the agency having no idea why. This whitepaper analyzes the perfect use case: The Centers for Medicare and Medicaid Services (CMS), which runs some of the most high-profile public websites, including Healthcare.gov.


Filling Cybersecurity Gaps

Continuous Diagnostics and Mitigation (CDM), provides continuous monitoring tools and services to agencies via a governmentwide contract. CDM helps agencies identify their cyber risks on an ongoing basis, prioritize those risks and mitigate them, which is particularly valuable as cyber threats grow to become more sophisticated and complex. Download this digital dialogue to learn highlights from our recent webcast, including how NASA relies on CDM tools to provide greater visibility into cyber vulnerabilities.


Improve Your Agency’s FITARA Score

The Federal Information Technology Acquisition Reform Act (FITARA), passed by Congress in December 2014, represents the first major overhaul of how federal agencies buy their technology in almost 20 years. In 2015, the FITARA committee worked with the Government Accountability Office to develop a scorecard to help assess agencies' FITARA implementation efforts. Do you need to improve your agency's FITARA Scorecard? This whitepaper explains how you can take steps to do just that, including applying solutions like InQuisient's FITARA A Plus. This tool will track and analyze agency data and automatically generate required FITARA reports in the mandated format.


Improve Agency Portfolio Management

Federal agencies are acquiring more technology and different types of technology than ever before. IT Portfolio Management rapidly becomes an issue when managing new IT projects, and integrating them with existing systems. Are you looking to improve IT Portfolio Management within your organization? Download this whitepaper for strategies to get a better handle on IT projects, including how tools like InQuisient's IQ Portfolio Insight can help you monitor and manage data across federated organizations and systems, allowing you to deliver trusted, up-to-date information for your decision-makers. Thousands of users across federal agencies, including the Department of Defense and the Intelligence Community, already use InQuisient to manage billions of dollars in single instances.


Use Data to Drive Better Decisions

Using a browser-based platform to collect an agency’s enterprise data in one place and providing a seamless view of that information to agency executives is critical for comprehensive agency management and better decision-making. Agency executives have to see everything from the organization’s Enterprise Architecture to IT Portfolio Management in order to enable business transformation at the speed of the agency’s mission. This whitepaper will explain how using a browser-based platform like InQuisient puts users in control, providing advanced visualization for real-time health assessments and decision-making.


Detect and Deter Insider Threats: A Before, During and After Approach

Today, there are more connected devices than ever before. Everything from refrigerators and smoke detectors to health bands and lighting are part of a vast interconnected network — with more devices on the way. While these devices bring exciting new capabilities, they also represent new network access points — and a huge threat to the network and everything on it. In this whitepaper, we explore the importance of a comprehensive security strategy, including tips to combat attacks as the threat landscape continues to change.


Mobile Security: The 6 Questions Modern Organizations are Asking

Wherever your organization falls on the spectrum of mobility adoption, the global trend is moving towards BYOD to benefit from enhanced worker productivity, increased revenues, and reduced device and data expenses. However, this increase in mobile devices brings important security implications. Download to get your top mobile security questions answered, including top threats, critical gaps, and why enterprises need visibility into mobile today.


Feds: You Have a BYOD Program, Like It or Not

Many federal agencies claim they don't have a BYOD program. However, after analyzing 20 federal agencies, Lookout discovered 14,622 Lookout-enabled devices associated with government networks. Download this research report to get more data on the state of federal BYOD, including your employees’ personal devices usage at work, who's breaking the rules, mobile malware encounters and more.


6 Steps to Successful Shared Services in Government

Shared services - a model that enables resources to be leveraged across an entire organization or multiple organizations based on agreed upon customer-service levels - is increasingly popular in the public sector. However, to take full advantage of a shared services agreement, the provider and consumer need to find some middle ground to ensure both of their needs are being met.


5 Chaos-Inducing IT Trends - And How to Be Prepared

Working in government IT isn’t easy. Constantly shifting trends, technologies, priorities and challenges often leave decision-makers feeling like they are on unstable ground. Fortunately, some steps can be taken to prepare for and harness this new normal of IT disruption. Here are the five forces of chaos to look out for and how to harness them.