What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download now...

Beyond Continuous Monitoring: Threat Modeling for Real-time Response: Whitepaper

In its purest sense, continuous monitoring is inwardly focused on activities such as vulnerability assessment and patch management, providing valuable situational awareness of systems and potential vulnerabilities. Yet simply knowing a problem exists doesn’t offer protection. One has to be able to act correctly and in time to keep up with the evolving threat and minimize risk.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

ITES-3H: The New Face of Defense Contracts: Whitepaper

The most recent iteration of the U.S. Army’s IT Enterprise Solutions contract—ITES-3H—is a notable step forward in the evolution of this contract. After the ITES-2H contract, originally award in 2014, was extended several times and had more than $1 billion added to its ceiling, it was time for a new format. Under ITES-3H, the contract is open to other defense agencies, although the Army is expected to account for the majority of the awards. This special report will present a series of articles explaining the evolution of ITES, the broad reaching impact of the new contract, its impact of cybersecurity, and what’s next for this contract format.


Mind the Gap Study - Oxford Economics: Asset

Discover how common application delays affect company performance in this study sponsored by Nimble Storage and produced in collaboration with Oxford Economics. Learn how to remove the frustration caused by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.