Organizations and public agencies are increasingly aware of the need for digital transformation, whose success fundamentally rests upon the ability to control, manage, and protect the collections of information that reside across the extended information enterprise. There are, however, some inherent challenges that may complicate the ability to manage information in an increasingly complex environment. Download to Learn More
Sponsored By Veritas
If you like the online ease of shopping at Amazon, you’ll want to check out SEWP V, the latest iteration of NASA’s Solutions for Enterprise-Wide Procurement (SEWP). The agency’s new procurement solution brings point-and-click convenience to federal acquisitions. A pair of catalogs offered by SEWP V make it possible for buyers to order from a set list of products, eliminating the need for agencies to issue requests for quotation (RFQ) every time they make a purchase. These innovations are expected to enhance SEWP’s popularity and reputation for ease of use and fast turnaround times.
Sponsored By CDW-G
In its very first Cybersecurity Executive Order, the Trump administration mandated broader support for strengthening both the cybersecurity of federal networks and of our nation’s critical infrastructure. While it’s tempting to see these as two parallel but fundamentally separate objectives, it becomes harder to separate the two when federal agencies are discovering entirely new categories of vulnerable physical and logical assets right in their own backyards.
Sponsored By Tripwire
With the DOD’s compliance deadline in the rearview mirror, here are a few things that civilian contractors can learn from their DOD counterparts and proactive steps they should be taking in advance of GSA publishing its final requirements.
The majority of security practitioners agree that establishing foundational security controls will give agencies the biggest security bang for their buck. So where should those agencies focus their efforts in order to ensure a strong foundation of security?
Most security practitioners and experts alike agree that establishing foundational security controls will give agencies the biggest security bang for their buck. So where should IT managers focus their efforts in order to ensure a strong foundation of security? As we have examined in parts one and two of this series, there are four key fundamentals at the heart of every effective security foundation: log management, file integrity monitoring, policy compliance and vulnerability management. Here, in part three of this series, we address policy compliance.
For the Defense Department and other federal agencies, the ability to prepare for and recover from energy disruptions is imperative. In a new white paper, “Beyond Appropriated Funding: An Innovative Financial Equation for Building Energy Resilience,” the paper’s authors explore strategies for implementing resiliency plans without placing new burdens on appropriated funding sources.
Sponsored By Schneider Electric
Government agencies can plan to generate energy needed for continuity of operations in the event that military bases or other federal facilities lose primary sources of energy. A new white paper, “7 Strategic Steps for Building Energy Security and Ensuring Mission Readiness in Federal Facilities,” provides guidelines and case studies for developing and implementing energy security programs.
Does your agency have the processes in place to investigate and effectively respond to these incidents? This IDC InfoBrief shares insights and statistics on the consolidated time security teams spend on incident response, how organizations are coping with an average of 40 actionable security incidents per week and where organizations should focus their security efforts.
In this report, Gartner outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy.
Learn how to reduce monitoring blind spots, how to address ITOM requirements across IT and non-IT, distinct layers and identify functionality gaps with domain-specific products.
This ebook provides insight into the current government threat landscape, and how best to address them. See how an analytics-driven approach to security is being used at Fairfax County and City of Los Angeles in this guide.
This IDC analyst report dives into what to look for in an IT infrastructure monitoring solution, its benefits, key characteristics of modern infrastructure solutions and how best to implement a new or improved infrastructure monitoring approach.