5 trends that will drive IT management in 2015

5 trends that will drive IT management in 2015

2015 is shaping up as a year when data analytics, ubiquitous video, and cyber forensics will force government IT managers to make decisions about how they deploy their resources.

2015 mobility mantra: manage data, not devices

2015 mobility mantra: manage data, not devices

Government mobility managers are racing to stay ahead of the proliferation of mobile devices with strategies that focus on data and applications rather than devices themselves.

relevance of antivirus software

Is antivirus software still relevant?

No matter how useful antivirus software can be, its drawbacks are causing information security professionals to take a second look at antivirus protection – and the alternatives.

Michigan builds identity proofing pilot program

Michigan builds identity proofing pilot

An automated multi-step identity authentication portal aims to cut down on fraud and waste by confirming the identity of clients at the time they are applying for benefits.

In 2015, a convergence of agency IT security and operations

In 2015, agency IT security and operations converge

The new year will see a convergence of IT security and operations, as agencies spread responsibilities across IT departments and security tools become integrated into software lifecycles earlier .

Privacy accessories for the secure and stylish

Privacy wearables and accessories for the secure – and stylish

After the wakeup call from the Sony hack, people inside and outside of government are taking a harder look at protecting their personal information – and vendors are ready with solutions from stylish privacy accessories to secure communications ecosystems.

Best practices for emergency preparedness

'Tis the season for emergency preparedness

Before the weather gets frightful – increasing the chances that you may experience significant system downtime – make sure you have a plan in place and follow these best practices.

Fujitsu launches secure enterprise tablets

Fujitsu launches secure enterprise tablets

Fujitsu introduced two 'enterprise-ready' Windows tablets this week, targeting government users who need extra security features.

KEMP introduces support for Federal ID smart cards

KEMP introduces support for federal ID smart cards

The provider of software-centric and cloud-focused load balancer solutions now supports integration with Defense Department environments using CAC authentication and Active Directory application infrastructures.

DISA drafts new cloud security requirements

DISA drafts new cloud security requirements

The Defense Information Systems Agency released a draft of cloud computing security requirements for the Defense Department.

Will CDM finally be ‘the realization of IT security’?

Will CDM finally be ‘the realization of IT security’?

Tools and services are being chosen for Phase 2 of the Continuous Diagnostics and Mitigation program, which security watchers say could be a revolutionary step in how the government protects its information.

Can BlackBerry Classic power a comeback?

Can BlackBerry Classic power a comeback?

BlackBerry Classic returns to the old form factor and includes BlackBerry Balance, the technology that allows personal and work data to reside in separate partitions on the device.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.


More from 1105 Public Sector Media Group