Whitepapers


CDM Program Will Combat Cyberthreats

Cyberthreats continue to bring security concerns to government organizations. However, agencies are taking strong action and with the help of the CDM program, they can follow guidance to properly protect and defend their networks. In this helpful infographic, you’ll learn how taking a holistic approach to adopting CDM can help agencies combat new threats.


Nimble Storage Vision Drives to Leadership in Gartner Magic Quadrant

Gartner gives a breakdown of how different storage vendor systems compare to each other, giving the strengths and cautions of different known companies like IBM, Dell, and Nimble Storage . Download this informative white paper to see how Nimble Storage stacks up to the competition.


US Fish and Wildlife Service Revamps Operations with Nimble Storage

In 2013 the US Fish and Wildlife Services found its old storage-area network reaching its end of life and becoming difficult to manage. The FWS decided to go with Nimble Storage and federal solutions partner IT Navigation. Nimble Storage utilizes flash in a fundamentally different way. This unique approach should result in very favorable performance for spindle metrics, data center environmental factors, and simplicity of use. Download this article to learn more!


5 Things to Consider When Evaluating Flash Storage

The performance benefits of all-flash storage might be clear, but there are other critical criteria when evaluating flash technology. Here are 5 insights that will help you ask the right questions during your evaluation.


6 Strategies for Transformation Beyond Digital Government

Government agencies are under tremendous pressure to work faster, smarter and better. Many have embraced basic mobile device management and secure e-mail to help them achieve those goals. Now they’re realizing their employees need more and are recognizing the advantages of adding applications to provide secure mobile access to files, instant messaging and other job-specific tools. In this Executive Insights, we explore six strategies agencies can implement for improved mobile management.


Enterprise Outlook: The Software-Defined Enterprise

To keep pace with technology modernization efforts, agencies need to find ways to improve how they ingest, manage, integrate and share large amounts of data from diverse sources. In this Enterprise Outlook, we explore how defining all moving pieces via software can help agencies achieve effective integration leading to benefits such as lower costs, greater agility and higher productivity.


Leverage the Power of Agile Development

Many organizations are seeing the need for change at a faster rate and with more consistent results. This balancing act is especially challenging in enterprise organizations. To succeed, enterprises must be able to rapidly change the way they create and deliver value to their customers. That means improving how they develop software and systems. The more complex, the more important collaboration, innovation, and speed become in ensuring success. As a development methodology, Agile is a major step in that direction, but Agile was developed for small teams, and by itself, does not scale to the needs of the larger enterprises and the systems they create. This whitepaper explains how tools like InQuisient’s IQ Agile Developer can solve that problem, applying the power of Agile in a package that allows your team to connect to all of its data, leveraging the Scaled Agile Framework (SAFe®) to ensure success.


Gain Insights into and Control of Your IT Assets

The larger the enterprise, the more IT assets there are to manage. Tracking all of these assets and keeping basic lists up-to-date are enormous, never-ending tasks, prone to human error simply because of the scope. And trying to align asset management with strategic planning is often out of reach because the two systems are so disparate. This whitepaper explains how tools like InQuisient’s IQ Asset Manager will help you to gain valuable insights into and management control of your ‘as-is’ software and hardware IT stack and your ‘to be’ IT portfolio, to identify gaps or overlaps. This capability makes managing your IT assets dramatically more accurate, allowing you to ensure your approved/unapproved lists are actionable.


What Is Enterprise Mobile Security?

Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.


Federal CIO Insights: What's Next in Mobile Security

Mobile security presents one of the federal government’s biggest information technology challenges. Read the Lookout report to learn about the greatest risks, current security solutions, and the future for BYOD.


Foster Citizen Engagement

Agencies have already begun to recognize the importance of having a culture that values user input in creating digital services, according to government and industry experts speaking at a Feb. 22 Citizen Engagement Summit. This attitude shift itself represents a success, but like any good relationship, citizen engagement takes dedication, long-term commitment and a willingness to listen. Download this informative Executive Summary to learn more!


Make Citizen Engagement Part of the Culture

It’s not enough for agencies to say they believe in putting the citizen first. They must create a culture and a mindset within the organization that supports this notion, according to industry and government speakers at a February 22, 2017 Citizen Engagement Summit. Download this article to learn more now.


i2 Enterprise Insight Analysis for Cyber Threat Analysis

Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat analysis into their security strategy and turn their defense into a proactive offense. Featuring a combination of multi-dimensional visual analysis capabilities and advanced analytics designed to turn overwhelming and disparate data sets into intelligence, i2 Enterprise Insight Analysis helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats.


Advanced Analytics: A Powerful Prescription for Health and Social Program

Advanced analytics can bring significant changes to government healthcare and social programs. Applying this level of data analytics can greatly improve patient outcomes, enhance research efforts and drive greater value from disparate data stores. It is already helping improve diagnoses and care and promises to streamline healthcare and social service practices in the future. Download this informative eBook to learn more!


Cloud-Enabled Data Center for Dummies

Is your agency looking for a way to end the rising costs and complexity of scaling data storage without having to sacrifice overall performance, availability, or security of your data? If so, look no further. Download this exclusive "For Dummies" guide for these answers, along with learning more on NAS, hybrid cloud and cloud bursting, and how to converge local storage and compute infrastructures with the cloud.


Analytics: The upside of disruption

In an analytics study, 1,226 respondents worldwide report dramatically higher use of big data and analytics technologies in the past year. This upsurge was spurred by three notable disruptions that besides posing threats to those organizations that don’t act – offer untold opportunities for those that do. They are: the rise of digitized ecosystems; radical technological transformation; and greater capability to know rather than speculate about the future. More than before, organizations see the upside of acting quickly to innovate their business models and analytics strategies, and improve the information infrastructure to support a future view.


IDC Intelligence-Led Security

While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.


User Identity and Access Management: A Bridge to Government IT Modernization

Government agencies face unique technology challenges in today’s world, including complex legacy IT systems, antiquated processes and a prohibitive legislative budgeting cycle. Because of these challenges, many agencies are looking for creative new approaches to overcome the obstacles preventing adoption of the latest technologies.


Secure the Digital Mission

Public agencies are tasked with maintaining the safety and liberty of their citizens. To protect and preserve these rights, accurate, up-to-date information and instant communication are mission critical. The data center and building infrastructure you recommend must deliver airtight security, rock-solid availability and cost efficient productivity that enable public officials to make smart strategic decisions in real time.


Federal Mobility Fails with Standard Templates

Enterprise mobility is an important aspect of the modern government agency. And selecting and deploying the right (Mobile Device Management) MDM system is critical to ensuring the security and efficiency of an enterprise mobility platform. No two government agency mobile scenarios are alike, so agencies need to ensure they select the right partner to help launch and maintain their enterprise mobility platform. Download this whitepaper to learn how the right mobile devices, properly configured and managed, can help agencies reach unparalleled levels of productivity and efficiency.


2015 Cybersecurity: Attack Resiliency Challenges Industry Collaboration

Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling. Download this informative infographic to learn more.


Cisco Cybersecurity Pocket Guide 2016

As much as the Digital Economy and the Internet of Everything (IoE) create opportunities for government agencies and consumers - over $19 trillion in value to organizations over the next decade - they also create opportunities for hackers and cybercriminals. With an expanded attack surface represented by the IoE, cybercriminals look to cash in on the estimated value of $450 billion to over $1trillion of the Hacker Economy.


Nine Steps to Building an Insider Threat Defense Program

Regardless of how they originate, cyber threats eventually take advantage of an internal source. A well-constructed Insider Threat defense program incorporates people, processes and technology to quickly identify areas of risk before they inflict crippling damage. Read this whitepaper to learn how to secure your agency without disrupting productivity, overburdening your IT staff or hurting your reputation.


The Case for Modern Network Security Operations

Cloud computing initiatives, network monitoring and risk management are driving network security operations. Meanwhile, federal agencies face record levels of threats yet still rely on manual processes and outdated point tools. Agency network security operations must be modernized to streamline network security operations and mitigate IT risk.


Simulation Models Get a Makeover

Technological advancements continue to make it easier than ever to create simulation and training models. What used to take hours to calculate and generate can now often be done with the click of a button. This generates more accurate results and greater efficiency. Speaking at a recent webcast titled “Taking Simulations to the Next Level with Autodesk,” Gregg Lagnese, senior technical account manager at Autodesk, describes this new approach as a challenge to the status quo.


Virtualization: The Promise vs. The Reality

Getting virtualization right is critical for government agencies. They need to build agile development environments for cloud native applications and to successfully run their mission critical enterprise applications. Taking a modern approach can ensure virtualized applications are allotted all the storage they need to run at peak performance.


New Challenges Raise Stakes for Network Visibility

Advances to government networks over the past decade have created more traffic, connections, and complexity. To remain productive and secure, agencies need consistent and thorough visibility into all these connections. Yet today, many organizations don’t have the visibility they need. In this GameChanger, we explore how a holistic approach can be better suited toward today’s complex networks.


Workforce Management Looks to the Future

As government agencies face tighter budgets and widening skills gaps, making better use of their workforce data can help them save money, improve productivity and minimize compliance risks. Every organization has to manage its workforce data. There’s time and attendance, payroll, scheduling, leave, overtime pay, and pension pay-out data among the numerous workforce-related tasks organizations must track on an ongoing basis. Learn how automation and analytics help reveal the value of workforce data to inform better decisions.


Shared Services Seeks Common Ground

The concept of shared services is making headway in government agencies. Shared services help agencies save money and provide better services to their citizen customers in an era of limited resources. There is already a strong foundation for shared services and significant progress has been made, particularly over the past 15 months, the speakers said at a Dec 7th event Shared Services: A Model for the New Administration.


Bakersfield PD Locks Down Remote Access with One Identity

Compliance requirements from the U.S. Department of Justice have made two factor authentication a must. Download this case study to see how One Identity Defender allowed the Bakersfield Police Department to meet these requirements and save money for their department.


Keep Pace with DATA

As federal agency data management programs continue to evolve, agency staff is finding the cultural, organizational and policy issues present the biggest challenges, not the technology. However, technology is really only a small part of the data management and analytics equation, according to government and industry experts speaking at a Nov. 29th event: Big Issues Conference: Federal IT after the Transition. Download this informative article to learn more!


IoT: a strategic approach to logistics

The complex and varied work of federal agencies creates logistics challenges that can limit agencies’ efficiency and effectiveness. Today’s decisions on logistics deployments have the power to shape an agency’s operations for years to come. This white paper serves as a guide to help agencies implement viable logistics solutions by providing best practices and key considerations geared toward augmenting the value of their assets.


Collaboration Technologies Drive Meaningful Outcomes

Agencies could become more productive and increase employee satisfaction by adopting new ways of operating, but many lack the communication tools essential to support effective teamwork. A number of government offices have begun to build more collaborative workplaces thanks to Unified Communications solutions. Because the core of UC consists of voice, email, and instant messaging (IM) – services already in use in virtually every workplace – agencies are able to reap the benefits of collaboration without ripping and replacing legacy equipment or making major investments in new hardware.


Market Insights: The Road to Windows 10

This report highlights findings from a recent 1105 Public Sector Media Group survey of 250 government users. The objective of this survey was to determine federal, state, and local government attitudes towards Windows 10. This report details survey respondents’ journey to Windows 10, including migration plans, obstacles and benefits.


Use Case: Government Endpoint

Government endpoints are a critical path to sensitive government data and are central to government operations. Malicious, unauthorized changes and access to these systems can have a significant impact on an agency’s operations. They can be protected against today’s swiftly changing threat environment in a manner that is minimally disruptive to government operations and meets the productivity needs of the end user.


Next-Gen Flash Plays Major Role in Modernization

As data continues to grow and evolve, agencies’ storage requirements are changing as well. Today’s agencies need high-performing systems that scale easily and allow for agility. Learn how your organization can gain value by turning to the newest All Flash Arrays to meet these growing storage demands.


2016 Federal Study: The Insecurity of Privileged Users

Privileged users can be an agency’s riskiest employees, as many have access beyond their roles or responsibilities. Moreover, current security platforms often fail to provide the necessary context to show if an incident is caused by an insider. What is your agency doing to address potentially high-risk employees and protect critical data?


2017 Security Predictions: The New Digital Battlefield

The world is transforming, blending the physical and digital into an age of convergence. Is your agency prepared for the resulting security challenges? Drawing upon the deep resources of both Forcepoint Security Labs™ and Raytheon, the 2017 Forcepoint Security Predictions report investigates this new shift that blurs the lines between man and technology.


Millennials: A Tsunami of Risk for Federal Agencies?

Federal agencies face rising threats as more millennials enter the workforce. Almost two-thirds also use their personal devices for their work. More than 60% of millennials won’t take a job without unrestricted access to their social media platforms and more than 40% use the same password for multiple devices and apps. Is your organization ready to handle their relaxed security and technology practices?


The Future of the Data Center Network: Infographic

VMware NSX delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Center. Because NSX builds networks in software, data center operators can achieve levels of agility, security, and economics that were previously unreachable with physical networks.


Lessons Learned from Healthcare.gov: Why Application Monitoring is Mission-Critical

The newest generation of citizen services is running in the cloud. On paper, that makes perfect sense. The cloud provides a flexible, scalable platform for extending services to wherever citizens might be. In practice, however, it's inviting trouble. Too often, organizations move services to the cloud without the ability to monitor application and website performance. The more successful a service is, the more likely it is that transactions will drop and outages occur—with the agency having no idea why. This whitepaper analyzes the perfect use case: The Centers for Medicare and Medicaid Services (CMS), which runs some of the most high-profile public websites, including Healthcare.gov.


Filling Cybersecurity Gaps

Continuous Diagnostics and Mitigation (CDM), provides continuous monitoring tools and services to agencies via a governmentwide contract. CDM helps agencies identify their cyber risks on an ongoing basis, prioritize those risks and mitigate them, which is particularly valuable as cyber threats grow to become more sophisticated and complex. Download this digital dialogue to learn highlights from our recent webcast, including how NASA relies on CDM tools to provide greater visibility into cyber vulnerabilities.


Improve Agency Portfolio Management

Federal agencies are acquiring more technology and different types of technology than ever before. IT Portfolio Management rapidly becomes an issue when managing new IT projects, and integrating them with existing systems. Are you looking to improve IT Portfolio Management within your organization? Download this whitepaper for strategies to get a better handle on IT projects, including how tools like InQuisient's IQ Portfolio Insight can help you monitor and manage data across federated organizations and systems, allowing you to deliver trusted, up-to-date information for your decision-makers. Thousands of users across federal agencies, including the Department of Defense and the Intelligence Community, already use InQuisient to manage billions of dollars in single instances.


Improve Your Agency’s FITARA Score

The Federal Information Technology Acquisition Reform Act (FITARA), passed by Congress in December 2014, represents the first major overhaul of how federal agencies buy their technology in almost 20 years. In 2015, the FITARA committee worked with the Government Accountability Office to develop a scorecard to help assess agencies' FITARA implementation efforts. Do you need to improve your agency's FITARA Scorecard? This whitepaper explains how you can take steps to do just that, including applying solutions like InQuisient's FITARA A Plus. This tool will track and analyze agency data and automatically generate required FITARA reports in the mandated format.


Use Data to Drive Better Decisions

Using a browser-based platform to collect an agency’s enterprise data in one place and providing a seamless view of that information to agency executives is critical for comprehensive agency management and better decision-making. Agency executives have to see everything from the organization’s Enterprise Architecture to IT Portfolio Management in order to enable business transformation at the speed of the agency’s mission. This whitepaper will explain how using a browser-based platform like InQuisient puts users in control, providing advanced visualization for real-time health assessments and decision-making.


Detect and Deter Insider Threats: A Before, During and After Approach

Today, there are more connected devices than ever before. Everything from refrigerators and smoke detectors to health bands and lighting are part of a vast interconnected network — with more devices on the way. While these devices bring exciting new capabilities, they also represent new network access points — and a huge threat to the network and everything on it. In this whitepaper, we explore the importance of a comprehensive security strategy, including tips to combat attacks as the threat landscape continues to change.


Mobile Security: The 6 Questions Modern Organizations are Asking

Wherever your organization falls on the spectrum of mobility adoption, the global trend is moving towards BYOD to benefit from enhanced worker productivity, increased revenues, and reduced device and data expenses. However, this increase in mobile devices brings important security implications. Download to get your top mobile security questions answered, including top threats, critical gaps, and why enterprises need visibility into mobile today.


Feds: You Have a BYOD Program, Like It or Not

Many federal agencies claim they don't have a BYOD program. However, after analyzing 20 federal agencies, Lookout discovered 14,622 Lookout-enabled devices associated with government networks. Download this research report to get more data on the state of federal BYOD, including your employees’ personal devices usage at work, who's breaking the rules, mobile malware encounters and more.


6 Steps to Successful Shared Services in Government

Shared services - a model that enables resources to be leveraged across an entire organization or multiple organizations based on agreed upon customer-service levels - is increasingly popular in the public sector. However, to take full advantage of a shared services agreement, the provider and consumer need to find some middle ground to ensure both of their needs are being met.


Easing the Transition: Key Steps for Migrating to Windows 10

The U.S. Department of Defense (DoD) is facing a daunting mission with a tight deadline – the migration of all desktop users to Windows 10 by January 2017. In this digital dialogue, IT experts offer their advice for helping DoD IT teams to make progress on the upcoming deadline. Including how to minimize the complexity of the transition and to future proof desktop migrations overall.