Whitepapers


Millennials: A Tsunami of Risk for Federal Agencies?

Federal agencies face rising threats as more millennials enter the workforce. Almost two-thirds also use their personal devices for their work. More than 60% of millennials won’t take a job without unrestricted access to their social media platforms and more than 40% use the same password for multiple devices and apps. Is your organization ready to handle their relaxed security and technology practices?


The Future of the Data Center Network: Infographic

VMware NSX delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Center. Because NSX builds networks in software, data center operators can achieve levels of agility, security, and economics that were previously unreachable with physical networks.


Lessons Learned from Healthcare.gov: Why Application Monitoring is Mission-Critical

The newest generation of citizen services is running in the cloud. On paper, that makes perfect sense. The cloud provides a flexible, scalable platform for extending services to wherever citizens might be. In practice, however, it's inviting trouble. Too often, organizations move services to the cloud without the ability to monitor application and website performance. The more successful a service is, the more likely it is that transactions will drop and outages occur—with the agency having no idea why. This whitepaper analyzes the perfect use case: The Centers for Medicare and Medicaid Services (CMS), which runs some of the most high-profile public websites, including Healthcare.gov.


Filling Cybersecurity Gaps

Continuous Diagnostics and Mitigation (CDM), provides continuous monitoring tools and services to agencies via a governmentwide contract. CDM helps agencies identify their cyber risks on an ongoing basis, prioritize those risks and mitigate them, which is particularly valuable as cyber threats grow to become more sophisticated and complex. Download this digital dialogue to learn highlights from our recent webcast, including how NASA relies on CDM tools to provide greater visibility into cyber vulnerabilities.


Improve Agency Portfolio Management

Federal agencies are acquiring more technology and different types of technology than ever before. IT Portfolio Management rapidly becomes an issue when managing new IT projects, and integrating them with existing systems. Are you looking to improve IT Portfolio Management within your organization? Download this whitepaper for strategies to get a better handle on IT projects, including how tools like InQuisient's IQ Portfolio Insight can help you monitor and manage data across federated organizations and systems, allowing you to deliver trusted, up-to-date information for your decision-makers. Thousands of users across federal agencies, including the Department of Defense and the Intelligence Community, already use InQuisient to manage billions of dollars in single instances.


Improve Your Agency’s FITARA Score

The Federal Information Technology Acquisition Reform Act (FITARA), passed by Congress in December 2014, represents the first major overhaul of how federal agencies buy their technology in almost 20 years. In 2015, the FITARA committee worked with the Government Accountability Office to develop a scorecard to help assess agencies' FITARA implementation efforts. Do you need to improve your agency's FITARA Scorecard? This whitepaper explains how you can take steps to do just that, including applying solutions like InQuisient's FITARA A Plus. This tool will track and analyze agency data and automatically generate required FITARA reports in the mandated format.


Use Data to Drive Better Decisions

Using a browser-based platform to collect an agency’s enterprise data in one place and providing a seamless view of that information to agency executives is critical for comprehensive agency management and better decision-making. Agency executives have to see everything from the organization’s Enterprise Architecture to IT Portfolio Management in order to enable business transformation at the speed of the agency’s mission. This whitepaper will explain how using a browser-based platform like InQuisient puts users in control, providing advanced visualization for real-time health assessments and decision-making.


Detect and Deter Insider Threats: A Before, During and After Approach

Today, there are more connected devices than ever before. Everything from refrigerators and smoke detectors to health bands and lighting are part of a vast interconnected network — with more devices on the way. While these devices bring exciting new capabilities, they also represent new network access points — and a huge threat to the network and everything on it. In this whitepaper, we explore the importance of a comprehensive security strategy, including tips to combat attacks as the threat landscape continues to change.


Mobile Security: The 6 Questions Modern Organizations are Asking

Wherever your organization falls on the spectrum of mobility adoption, the global trend is moving towards BYOD to benefit from enhanced worker productivity, increased revenues, and reduced device and data expenses. However, this increase in mobile devices brings important security implications. Download to get your top mobile security questions answered, including top threats, critical gaps, and why enterprises need visibility into mobile today.


Feds: You Have a BYOD Program, Like It or Not

Many federal agencies claim they don't have a BYOD program. However, after analyzing 20 federal agencies, Lookout discovered 14,622 Lookout-enabled devices associated with government networks. Download this research report to get more data on the state of federal BYOD, including your employees’ personal devices usage at work, who's breaking the rules, mobile malware encounters and more.


6 Steps to Successful Shared Services in Government

Shared services - a model that enables resources to be leveraged across an entire organization or multiple organizations based on agreed upon customer-service levels - is increasingly popular in the public sector. However, to take full advantage of a shared services agreement, the provider and consumer need to find some middle ground to ensure both of their needs are being met.


Easing the Transition: Key Steps for Migrating to Windows 10

The U.S. Department of Defense (DoD) is facing a daunting mission with a tight deadline – the migration of all desktop users to Windows 10 by January 2017. In this digital dialogue, IT experts offer their advice for helping DoD IT teams to make progress on the upcoming deadline. Including how to minimize the complexity of the transition and to future proof desktop migrations overall.