Whitepapers


Shared Services Seeks Common Ground

The concept of shared services is making headway in government agencies. Shared services help agencies save money and provide better services to their citizen customers in an era of limited resources. There is already a strong foundation for shared services and significant progress has been made, particularly over the past 15 months, the speakers said at a Dec 7th event Shared Services: A Model for the New Administration.


IQ Architect

Increasingly, many CIOs are asking for data truth in order to manage enterprise technology. InQuisient's IQ Architect allows for a data truth and data-driven approach, creating an enterprise-level management tool set that enables every participant in the enterprise management or analysis team to interact with the same information. Our web services approach makes it unnecessary to hire expensive DB developers to build out your enterprise architecture. This makes the Total Cost of Ownership much lower than other solutions.


Bakersfield PD Locks Down Remote Access with One Identity

Compliance requirements from the U.S. Department of Justice have made two factor authentication a must. Download this case study to see how One Identity Defender allowed the Bakersfield Police Department to meet these requirements and save money for their department.


4 Strategies for Securing Federal Applications at the Speed of DevOps

Federal agencies want to move faster through the use of DevOps and open source software. Teams developing applications at a furious pace don’t want to be encumbered by bolt-on security procedures. Agencies need security protocols that can keep pace with development practices without holding them back.


Keep Pace with DATA

As federal agency data management programs continue to evolve, agency staff is finding the cultural, organizational and policy issues present the biggest challenges, not the technology. However, technology is really only a small part of the data management and analytics equation, according to government and industry experts speaking at a Nov. 29th event: Big Issues Conference: Federal IT after the Transition. Download this informative article to learn more!


Surfacing Critical Cyber Threats Through Security Intelligence

It’s almost quaint and more than a bit naive to look back on the days when an enterprise felt it could install a few firewalls and some anti-virus software and feel confident that the organization was well defended against cyber threats. Those days weren’t so long ago, but much has changed in a few short years. In a relatively short time span, cyber security has become a major concern for government agencies, military branches, companies across every industry. Download this informative whitepaper to learn how you can protect yourself!


The Threat Lifecycle Management Framework

Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences.These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M. The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizations were compromised in 2015. Against this backdrop, organizations increasingly expect that it’s not if they will be compromised, but rather when will they be compromised.


Meet with Anyone, Anywhere — Securely

Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.


Market Insights: The Road to Windows 10

This report highlights findings from a recent 1105 Public Sector Media Group survey of 250 government users. The objective of this survey was to determine federal, state, and local government attitudes towards Windows 10. This report details survey respondents’ journey to Windows 10, including migration plans, obstacles and benefits.


Use Case: Government Endpoint

Government endpoints are a critical path to sensitive government data and are central to government operations. Malicious, unauthorized changes and access to these systems can have a significant impact on an agency’s operations. They can be protected against today’s swiftly changing threat environment in a manner that is minimally disruptive to government operations and meets the productivity needs of the end user.


Don't Risk IT Infographic

Are you entrusting your organization’s crucial data to aging, end-of-life infrastructure? Don’t Risk IT! Cisco security-driven network offerings are built from concept to completion and include built-in security to protect sensitive data.


IoT: a strategic approach to logistics

The complex and varied work of federal agencies creates logistics challenges that can limit agencies’ efficiency and effectiveness. Today’s decisions on logistics deployments have the power to shape an agency’s operations for years to come. This white paper serves as a guide to help agencies implement viable logistics solutions by providing best practices and key considerations geared toward augmenting the value of their assets.


Collaboration Technologies Drive Meaningful Outcomes

Agencies could become more productive and increase employee satisfaction by adopting new ways of operating, but many lack the communication tools essential to support effective teamwork. A number of government offices have begun to build more collaborative workplaces thanks to Unified Communications solutions. Because the core of UC consists of voice, email, and instant messaging (IM) – services already in use in virtually every workplace – agencies are able to reap the benefits of collaboration without ripping and replacing legacy equipment or making major investments in new hardware.


Improving RMF Practices Through Automation

Relentless cyber attacks prompt federal agencies to take a more holistic and systematic approach to integrating security into broader risk management strategies. The National Institute of Standards and Technology’s (NIST) issued the Risk Management Framework (RMF) requiring federal agencies to continually understand, assess, monitor, and document their cyber security risks over the lifecycle of their IT assets.


Cisco WebEx Web Conferencing

Go ahead. Create and join meetings easily from your computer or mobile device. Invite participants to share content in real time. See who you’re talking to. All in a highly secure environment.


Next-Gen Flash Plays Major Role in Modernization

As data continues to grow and evolve, agencies’ storage requirements are changing as well. Today’s agencies need high-performing systems that scale easily and allow for agility. Learn how your organization can gain value by turning to the newest All Flash Arrays to meet these growing storage demands.


Mezzanine in Action - GIS Data Visualization

In almost every industry, geographical data plays a part in key strategic decisions that can affect the future trajectory of an organization. For Fortune 500 organizations and government agencies, effectively utilizing this complex information is a daunting challenge, but if done correctly, it can be a significant competitive advantage. Mapping software and geographical information systems (GIS) do an impressive job allowing businesses to use, analyze, and integrate geographical data with other business applications. However, to truly capitalize on your GIS initiatives and make better, data-driven decisions, you need to visualize information at human-scale and interact with it collaboratively as a team.


Mezzanine by Oblong

Mezzanine™ is an immersive collaboration platform for the enterprise. Surround your teams with everything they need to perform at their best —videoconference and share content across the globe in a truly dynamic workspace. Mezzanine is the competitive advantage that makes presentations more engaging, meetings more productive, and collaboration better than ever.


Mezzanine in Action - Emergency Management

Emergency management and crisis response require the orchestration of a considerable number of federal, state and local departments and agencies to join forces with private organizations to solve extraordinarily complex challenges. Effective decision-making demands real time access to critical information, and every second and piece of data counts. But as we have learned in numerous crisis events, critical information may not reside within your organization. Imagine a solution adept at improving operational coordination and decision-making. Imagine instantaneous information sharing between deployed personnel and HQ operations.


What’s New in the Windows 10 Security Log

Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions.


The Ransomware Threat: A How-To Guide on Preparing for and Detecting an Attack

Is your organization prepared for a ransomware attack? Successfully defending your organization against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.


Mezzanine in Action - Data Visualization

Database technologies and business intelligence applications provide part of the solution, allowing you to manage and run analyses on your structured, semi-structured, and unstructured data to reveal trends and patterns. But you also need to easily visualize those analytics, digest their meaning, and make decisions with other members of your organization.


Secure Mobility: Slow but Steady Progress

Government agencies face an increasing volume and variety of attacks against their mobile infrastructure. Spyware and other forms of malware continue to evolve and attack in increasingly sophisticated ways. While many agencies have made significant progress in defending against these mobile platform vulnerabilities, a recent survey revealed agencies realize there remains much work to be done. Deploying the right security solutions, supported by comprehensive security policies, is critical to their success.


Adaptive Technology Eases Maintenance and Repair

The ability to print 3-D objects on demand was once the stuff of science fiction. Today it’s a reality. It’s also a game changer for agencies like the Department of Defense (DoD), which frequently have to perform maintenance, repair and overhaul (MRO) tasks. In an August 4th webcast entitled “Reverse Engineering in the DoD,” run by Autodesk CAM Product specialist Jordan Roberts, he explains technology advancements are helping agencies like the DoD determine what they need, with regards to software or hardware, by analyzing what already exists. Download this Digital Dialogue to learn more!


2016 Federal Study: The Insecurity of Privileged Users

Privileged users can be an agency’s riskiest employees, as many have access beyond their roles or responsibilities. Moreover, current security platforms often fail to provide the necessary context to show if an incident is caused by an insider. What is your agency doing to address potentially high-risk employees and protect critical data?


Millennials: A Tsunami of Risk for Federal Agencies?

Federal agencies face rising threats as more millennials enter the workforce. Almost two-thirds also use their personal devices for their work. More than 60% of millennials won’t take a job without unrestricted access to their social media platforms and more than 40% use the same password for multiple devices and apps. Is your organization ready to handle their relaxed security and technology practices?


2017 Security Predictions: The New Digital Battlefield

The world is transforming, blending the physical and digital into an age of convergence. Is your agency prepared for the resulting security challenges? Drawing upon the deep resources of both Forcepoint Security Labs™ and Raytheon, the 2017 Forcepoint Security Predictions report investigates this new shift that blurs the lines between man and technology.


The Future of the Data Center Network: Infographic

VMware NSX delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Center. Because NSX builds networks in software, data center operators can achieve levels of agility, security, and economics that were previously unreachable with physical networks.


All-Flash Storage for Dummies

All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all‐flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale‐out solutions have emerged that are designed to power the new cloud services of the future.


Infographic | Improving Contractor Accountability

With the increase of government contractors within federal agencies, it is important to understand the benefits of tracking and accountability. Download this informative infographic to learn how near-real-time contractor tracking would help improve accountability and optimize oversight in your agency.


Lessons Learned from Healthcare.gov: Why Application Monitoring is Mission-Critical

The newest generation of citizen services is running in the cloud. On paper, that makes perfect sense. The cloud provides a flexible, scalable platform for extending services to wherever citizens might be. In practice, however, it's inviting trouble. Too often, organizations move services to the cloud without the ability to monitor application and website performance. The more successful a service is, the more likely it is that transactions will drop and outages occur—with the agency having no idea why. This whitepaper analyzes the perfect use case: The Centers for Medicare and Medicaid Services (CMS), which runs some of the most high-profile public websites, including Healthcare.gov.


Filling Cybersecurity Gaps

Continuous Diagnostics and Mitigation (CDM), provides continuous monitoring tools and services to agencies via a governmentwide contract. CDM helps agencies identify their cyber risks on an ongoing basis, prioritize those risks and mitigate them, which is particularly valuable as cyber threats grow to become more sophisticated and complex. Download this digital dialogue to learn highlights from our recent webcast, including how NASA relies on CDM tools to provide greater visibility into cyber vulnerabilities.


2017 Enterprise Roadmap

Download this informative white paper to hear what industry and government speakers had to say at the Oct. 19th event: The 2017 Enterprise Roadmap: Laying the Foundation for Modernization.


IQ Portfolio Insight

Are you looking to improve IT Portfolio Management within your organization? InQuisient's IQ Portfolio Insight tool can help you monitor and manage data across federated organizations and systems, allowing you to deliver trusted, up-to-date information for your decision-makers. Thousands of users across government enterprises, including the Department of Defense (DoD) and the Intelligence Community, are using InQuisient to manage billions of dollars in single instances.


IQ FITARA A Plus

Do you need to improve your agency's FITARA Scorecard? InQuisient's FITARA A Plus can do just that. This tool will track and analyze agency data and produce required FITARA reports automatically.


IQ Platform Overview

InQuisient’s browser-based platform collects all Enterprise Data in one place, and enables one seamless view of information for the C-Suite – from the organization’s Enterprise Architecture to IT Portfolio Management – enabling business transformation at the speed of your mission. The InQuisient platform puts users in control, providing advanced visualization for real-time health assessments and decision-making.


Detect and Deter Insider Threats: A Before, During and After Approach

Today, there are more connected devices than ever before. Everything from refrigerators and smoke detectors to health bands and lighting are part of a vast interconnected network — with more devices on the way. While these devices bring exciting new capabilities, they also represent new network access points — and a huge threat to the network and everything on it. In this whitepaper, we explore the importance of a comprehensive security strategy, including tips to combat attacks as the threat landscape continues to change.


Mobile Security: The 6 Questions Modern Organizations are Asking

Wherever your organization falls on the spectrum of mobility adoption, the global trend is moving towards BYOD to benefit from enhanced worker productivity, increased revenues, and reduced device and data expenses. However, this increase in mobile devices brings important security implications. Download to get your top mobile security questions answered, including top threats, critical gaps, and why enterprises need visibility into mobile today.


Feds: You Have a BYOD Program, Like It or Not

Many federal agencies claim they don't have a BYOD program. However, after analyzing 20 federal agencies, Lookout discovered 14,622 Lookout-enabled devices associated with government networks. Download this research report to get more data on the state of federal BYOD, including your employees’ personal devices usage at work, who's breaking the rules, mobile malware encounters and more.


Database Discovery: Identifying Hidden Risks and Sensitive Data

Keeping track of databases, and the associated data they host, is a significant challenge. Given the dynamic nature of organizational data, the way it is being used, stored, and eventually destroyed is constantly in flux and needs to be tracked on a continuous basis. Without a complete, continuously updated understanding, it is not possible to protect the most critical information assets.


Infographic: The Path to Network Transformation

The only way to reduce costs, increase security and prepare for the future is to modernize the network. Modernization requires transformation. And transformation includes not only upgrades to the network infrastructure, but also changes in operational business practices. Download this informative Infographic - based on a recent survey - to learn the best practices in transforming your network.


6 Steps to Successful Shared Services in Government

Shared services - a model that enables resources to be leveraged across an entire organization or multiple organizations based on agreed upon customer-service levels - is increasingly popular in the public sector. However, to take full advantage of a shared services agreement, the provider and consumer need to find some middle ground to ensure both of their needs are being met.


Easing the Transition: Key Steps for Migrating to Windows 10

The U.S. Department of Defense (DoD) is facing a daunting mission with a tight deadline – the migration of all desktop users to Windows 10 by January 2017. In this digital dialogue, IT experts offer their advice for helping DoD IT teams to make progress on the upcoming deadline. Including how to minimize the complexity of the transition and to future proof desktop migrations overall.


5 Chaos-Inducing IT Trends - And How to Be Prepared

Working in government IT isn’t easy. Constantly shifting trends, technologies, priorities and challenges often leave decision-makers feeling like they are on unstable ground. Fortunately, some steps can be taken to prepare for and harness this new normal of IT disruption. Here are the five forces of chaos to look out for and how to harness them.


True or False: Debunking Flash Myths

This e-book addresses common misconceptions about enterprise flash storage, providing clarity for anyone using or considering flash in enterprise environments. Learn about old myths laid to rest and the reality of how enterprises can make full use of their flash storage investment.


Anatomy of a Hack Disrupted

This paper discusses a real-life situation, in which a malware attack took place but was discovered before any damage occurred. This malicious activity could have led to a very serious intrusion with devastating repercussions, but it was caught immediately, and the client was able to research and mitigate it easily and quickly.


Strategies for a Better Flow of Information

By 2020 about 1.7 megabytes of new information will be created every second for every human being on the planet, and at least 90% of it will be unstructured. The challenge that faces every organization is being able to extract meaningful information from the overload of data. Compounding this challenge is paper-based data that has to processed at the same time of electronic data. In this guide, get strategies on how to move paper files to electronic records for a digital transformation that can ultimately make a "paperless office" a reality, where extracting insights from data will be easier and more efficient.


Mobile Security: A Multi-Faceted Approach

Government agencies rely on mobile devices more than ever before. And it’s not just field operatives or inspectors. Agency staffers at all levels are being issued mobile devices. The challenge now for agencies is to ensure productivity and access to the tools they need to do their jobs; while at the same time ensuring those devices are truly secure. Security threats facing mobile devices continue to evolve, and so too must the security solutions and policies that protect those devices.


Health IT Guide: Better Tools for Better Outcomes

While technology has always been an important aspect of the healthcare industry, recent advances are helping move the state of healthcare forward. Managing the massive volumes of digital healthcare data and deriving the greatest value from the data for improved patient care is the primary goal. Ensuring patient security is also critical. Standardizing healthcare records formats can help ensure improved collaboration, security and efficiency. Download this guide to see how modern advances are working together to improve the overall quality and effectiveness of healthcare.


ITES-3H Focuses on Integrated Solutions

The Army's ITES-Enterprise Hardware Solutions contract began life humbly enough in 2003. It was originally a component of an $800 million contract vehicle to support the Army Infostructure Transformation program. The ITES contract is now in its third iteration - sprawling $5 billion contract that is the principal resource for the Army's IT system needs. Download this contract profile to learn how the Army ITES-3H contract continues to evolve to keep pace with technological trends.