Download now...

DCAA Compliance Requires Better Processes and Flexible Tools - 'Documentation Traceability' Can Build Confidence in Audits: Asset

This whitepaper serves to educate government contractors on the need for reliable, accessible and traceable data that reconciles internal billing information with federal contracts. In this paper, relevant experience from Government Contractors who are utilizing Microsoft Dynamics financial and operations management solutions successfully to meet the FAR requirements is provided. Additionally, industry experts comment on the best practices in industry and provide additional background as to what DCAA is expecting and how to accomplish that through foundational best practices.

File Type: .pdf


Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

Blockchain: Distributed Ledger Holds Promise for Agencies: Asset

Blockchain is gaining traction among agencies as a way to create permanent, secure, and transparent transactions for numerous application beyond the original intent for which it was created. Blockchain is a shared, immutable, distributed ledger for recording transaction history. It is typically associated with the Bitcoin brand of digital currency, but it can be used for more than that. Download this informative report from a recent event titled "Blockchain Beyond Bitcoin: Transforming Government Security" to learn how some agencies such as the General Services Administration (GSA) have already reaped the benefits of a blockchain and other agencies such as the Department of Health and Human Services (HHS) and Customs and Border Protection (CBP) are still testing the waters as they iron out key management and privacy issues.

Security Execs, It's Time We Had The Integrity Talk: Asset

By nature of its definition, true integrity allows for no variance between something’s established value and its current state. For security executives, the meaning—and role—of integrity has been somewhat difficult to pin down and even more challenging to manage. Originally, integrity, as defined in the SANS Institute’s CIA Triad, was narrowly focused on organizational data and making sure that data remained unchanged by external sources. It was one of three components—Confidentiality, Integrity and Availability—viewed as critical to identifying and mitigating risk to the data. Unfortunately, most organizations tend to invest heavily in tools and processes that enable confidentiality and availability, while integrity is the least addressed component. Learn how to make the change in your organization and the benefits in this informative report.

Boost Cybersecurity with Identity as a Service: Whitepaper

Agencies are starting to realize that identity and access management (IAM) is critical to the success of digital initiatives. In this enterprise outlook, we explore how to develop a strong IAM through cloud-based models and multi-factor authentication.