Whitepapers


NETCENTS-2 Contract Delivers on Price and Products

Since its debut in 2013, the Air Force’s NETCENTS-2 family of IDIQ contracts has delivered a wide array of products and services from a variety of vendors. This is intended to help the Air Force and other eligible defense agencies standardize networks, encourage interoperability and manage IT requirements from an enterprise perspective. In this Contract Profile, we explore how NETCENTS-2 has evolved to keep up with increasing demand and ever-changing technology needs.


Apply Modern DLP for Full Protection

As budgets tighten, risks change, and government mandates grow, Data Loss Prevention (DLP) emerges as a way to minimize costs, avoid incidents, and simplify compliance. DLP tools identify exactly where data is at all times— at rest, in transit and in use. Download this whitepaper to find out the key capabilities needed to ensure the most comprehensive level of protection for your agency’s data.


CDM Program Will Combat Cyberthreats

Cyberthreats continue to bring security concerns to government organizations. However, agencies are taking strong action and with the help of the CDM program, they can follow guidance to properly protect and defend their networks. In this helpful infographic, you’ll learn how taking a holistic approach to adopting CDM can help agencies combat new threats.


Nimble Storage Vision Drives to Leadership in Gartner Magic Quadrant

Gartner gives a breakdown of how different storage vendor systems compare to each other, giving the strengths and cautions of different known companies like IBM, Dell, and Nimble Storage . Download this informative white paper to see how Nimble Storage stacks up to the competition.


US Fish and Wildlife Service Revamps Operations with Nimble Storage

In 2013 the US Fish and Wildlife Services found its old storage-area network reaching its end of life and becoming difficult to manage. The FWS decided to go with Nimble Storage and federal solutions partner IT Navigation. Nimble Storage utilizes flash in a fundamentally different way. This unique approach should result in very favorable performance for spindle metrics, data center environmental factors, and simplicity of use. Download this article to learn more!


5 Things to Consider When Evaluating Flash Storage

The performance benefits of all-flash storage might be clear, but there are other critical criteria when evaluating flash technology. Here are 5 insights that will help you ask the right questions during your evaluation.


6 Strategies for Transformation Beyond Digital Government

Government agencies are under tremendous pressure to work faster, smarter and better. Many have embraced basic mobile device management and secure e-mail to help them achieve those goals. Now they’re realizing their employees need more and are recognizing the advantages of adding applications to provide secure mobile access to files, instant messaging and other job-specific tools. In this Executive Insights, we explore six strategies agencies can implement for improved mobile management.


Enterprise Outlook: The Software-Defined Enterprise

To keep pace with technology modernization efforts, agencies need to find ways to improve how they ingest, manage, integrate and share large amounts of data from diverse sources. In this Enterprise Outlook, we explore how defining all moving pieces via software can help agencies achieve effective integration leading to benefits such as lower costs, greater agility and higher productivity.


Techniques for Dealing with Ransomware, Business Email Compromise and Spearphishing

New, sophisticated cyber-attacks are outpacing organizations’ defenses and users are the weakest link. In 2016, most organizations were the victim of ransomware, BEC or spearphishing and 25% of them didn’t even know it! Download this whitepaper to lower your agency's odds of becoming a victim.


Advanced Evasion Techniques for Dummies

Advanced evasion techniques (AETs) are here to stay, and you need to know how to stop them. In this e-book, Forcepoint security expert Klaus Majewski explains how AETs defeat traditional security measures and how you can beat them, with special attention to the risks posed to industrial control systems.


From C&A to A&A: The RMF Shoe Has Dropped

Certification and accreditation (C&A) has been like alphabet soup. As it transitions to assessment and authorization (A&A), it’s time to sort through the confusion and identify which terms and processes apply in any given situation. This whitepaper details the cross domain solution (CDS) A&A processes being used by the Department of Defense (DoD), the Intelligence Community (IC) and Civilian government.


The Cost of an Unintentional Insider Threat

A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today’s workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.