What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepaper List


State of California Technical Case Study

California is the world’s eighth-largest economy, and its IT challenges exceed those of many national governments. That was particularly true during the budget crisis that began in 2008. In the face of severe budget cutbacks, state agencies needed to radically change the way they operated to keep meeting their missions to serve citizens. The State of California sets a new standard for IT with Shared Services. Learn how the California Natural Resources Agency harnessed the power of cloud computing to reduce IT capital costs by 42% and speed up service delivery by 70%.


Cybersecurity: Evolving Threats, Evolving Solutions

Cyber threats are no less abundant than in the past, but they’ve evolved to where the most dangerous easily circumvent traditional defenses. To cope with them — and an expected blizzard of threats against mobile and other information technology — government organizations will need to use a mix of old and new security technologies, and change how they think about cybersecurity.


It’s Not Public Versus Private Clouds - It’s the Right Infrastructure at the Right Time with the IBM Systems and Storage Portfolio

In this whitepaper, you will learn about state of the art dynamic hybrid cloud deployments as well as IBM’s Systems and Storage offerings that represents a complete set of hardware, software, and hosted offerings to meet the needs of the modern enterprise and emerging cloud service providers.


Cloud Control: Moving to the Comfort Zone

As cloud deployments accelerate, there's no question that Federal agencies are reaping the benefits – improved agility, less IT complexity, and greater collaboration through shared services. But, while the benefits are clear, concerns around data stewardship and management can stop migrations in their tracks. So how are Federal agencies dealing with the control challenge? To find out, MeriTalk surveyed 153 Federal IT professionals closely involved in their agency's cloud implementations.


Data Center Micro-Segmentation

The software-defined data center is beginning to reveal some benefits beyond agility, speed, and efficiency to government agencies. One critical area is security. Read this brief to find out how VMware is making micro-segmentation operationally feasible in the data center for the first time.


Contract Guide NetCents-2: Air Force Builds a Bridge to the Future

In this special report, we offer insights into the program as a whole as well as the individual contracts. The information is timely. Although the NetCents program has been around for many years, the Air Force has made significant changes since the first iteration. In many ways, it’s a whole new ballgame.


Top 7 Benefits of an Enterprise-Class Hybrid Cloud for Government

VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud service that delivers the tried and tested VMware capabilities widely used by government organizations today, with the added security and compliance assurance of FedRAMP authorization. Download this infographic to further explore the many benefits of hybrid cloud service.


The Current and Future Benefits of SDN in the Campus

For the last two years, Software-Defined Networking (SDN) has been the hottest topic in networking. There is tremendous interest in SDN on the part of vendors and a wide range of user groups including hyper-scale data center providers, service providers and enterprises of all types and sizes. While most of the discussion of SDN focuses on its use in the data center, The 2013 Guide to Network Virtualization and SDN1 highlights the fact that enterprise IT organizations are interested in deploying SDN broadly throughout their environment, including in their WAN and campus networks.


Is Your Enterprise Campus Network Ready for SDN?

SDN in the enterprise campus? IDC reports that now is the time to embrace the simplicity of SDN in campus network architectures—and explains why it’s critical to adopt it sooner rather than later.


Three Ways to Harden the Security of Your Campus Network

Fiction. Nearly 70% of security breaches actually originate within campus networks. Aberdeen explains why campus network security is essential to your overall data security.


6 Reasons to Consider SDN for Campus Networks

Did you know that SDN can deliver immediate advantages to your campus network today? This new eGuide reveals six valuable benefits of deploying SDN sooner rather than later.


5 Hybrid Cloud Starting Points

Did you know that more than 50% of organizations are already using or planning a move to hybrid cloud? And that these same IT leaders expect to double their hybrid cloud budget over the next two years? VMware customers are seamlessly extending their on-premises data center built on the trusted foundation of VMware vSphere® to hybrid cloud. Take a look at the top five most common ways you can get started with hybrid cloud migration within your organization.


Government Cloud: A New Era in Collaboration

Collaboration is a constant in government. By its very nature, much of the work done in government requires employees to collaborate, either with their co-workers, their colleagues in other agencies or with outside partners. It is not a question of whether feds will collaborate or not-it’s only a question of how effectively. That is why the new generation of online collaboration tools is so important. A new survey by the 1105 Public Sector Media Group shows that agencies are finally ready to move beyond their reliance on e-mail and calendaring and enter a new era of cloud-based collaboration.


Next Generation Data Centers: Agencies Find New Options For Flexibility, Efficiency and Power in Data Center Operations

Change often has come slowly to the federal data center, and for good reason. Given the importance of the data center, agencies prefer to stick with traditional designs and solutions. Unfortunately, with the increasing complexity of the IT enterprise, those designs have proven inefficient and inflexible and are not likely to meet future needs. Fortunately, the next generation of data centers, based on new technologies and innovative processes, is quickly taking shape. Download this special report to learn more.


Boost Business Agility and Insight with Flash Storage for Analytics

Applications, servers and IT resources are all waiting for the same thing—data. But data access depends on the response of storage. Now with IBM FlashSystem storage, you can eliminate wait times and accelerate critical applications for faster decision making. FlashSystem includes advanced technologies to help your organization effectively support analytics workloads with compelling data economics, enterprise resiliency and easy infrastructure integration. Download this solution brief to learn more benefits of IBM FlashSystem.


Infographic: Big Data Solutions on System x

This infographic on IBM System x Reference Architectures for Big Data provides concise and compelling statistics in an easily consumable graphical deliverable. Download now to learn how IBM System x can improve platform flexibility and more.


The Rising Threat of Enterprise Cybercrime

Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.


Staging the Deployment of Private Clouds with IBM SmartCloud Foundation

IBM is in a strong position to facilitate the deployment of private clouds. A key component of IBM’s cloud solutions is SmartCloud Foundation, an integrated set of technologies for deploying private and hybrid clouds. These hardware and software technologies are built on a common architecture, giving customers a smooth upgrade path as they advance along the maturity curve of deploying private clouds.


The ViewPoint | Going Mobile: How to Boost Productivity and Data Integrity

Download this Q&A to gain further insight from industry leaders addressing the challenges faced by many government agencies as they struggle to balance both security and efficiency.


Moving to a Private Cloud? Infrastructure Really Matters!

This Clipper Group paper outlines the importance of the underlying IT infrastructure for private cloud environments and lays the groundwork for clients navigating cloud, highlighting many key aspects of a private cloud infrastructure. Download this informative whitepaper to gain further insight on cloud computing.


Store Less, Spend Less: Managing Data According to Its Economic Value

The term “big data” is now passing into the common vernacular. Although initially as much about the power of business analytics and data mining, the semantics have now swung to encapsulate data that is just big and of course, resource hungry, whether in terms of management, sheer storage capacity, or budgets. In that respect, the numbers are getting increasingly alarming: Estimates suggest that 90% of the world’s information was created in the last two years, and 2.5 quintillion bytes of data are created daily. Download this informative whitepaper to gain further insights into the conflicting demands of storage management.


Stopping Zero-Day Exploits for Dummies

Cyber attacks are growing every day and can become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you will discover the zero-day exploits and threats used to compromise your agency.


Data Flows Faster at Montgomery County Dept. of Liquor Control

With the implementation of backup and recovery solutions, the Montgomery County, MD, Department of Liquor Control has reduced backup times from up to 16 hours under their old system to just one to two hours. Learn how.


Big Five in Overdrive: Are State and Local Networks Ready?

As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.


Journey to the Hybrid Cloud

Cloud adoption continues to expand beyond the base of cutting-edge early adopters and is now reaching the "early mainstream" stage, increasingly being looked at by enterprises as a viable model for agile, cost-effective IT delivery. However, the prevailing binary paradigm of cloud infrastructure (public versus private) limits the extent to which enterprises can fully leverage the on-demand, self-service, elastic resource provisioning attributes of public cloud while maintaining the same security, reliability, performance, and management frameworks present in current private cloud implementations. Download this informative whitepaper to learn how hybrid cloud solves this problem.


Meet Business Demands and Drive IT Innovation

The demands for new IT solutions can often times outpace the ability of the IT team to deploy them, forcing the organization to be more reactive than proactive. Read this whitepaper to learn how your agency can gain the infrastructure flexibility needed to rapidly respond to evolving IT needs.


Viewpoint: Getting the Edge on Insider Threats

Agencies are aware of the need for cyber defense within their infrastructure to protect from insider threats; however it is important for organizations to recognize what data is most at risk for being targeted. Defining the top IT risk scenarios can greatly help agencies analyze and monitor anomalies to enhance the prevention of insider threat attacks. Download this informative Q&A to gain valuable insights from an industry expert in the field of cybersecurity and insider threats.


Web Application Security Requires Multi-Pronged Approach

Attackers are increasingly targeting web-based applications, but agencies can bolster their security posture by infusing the right mix of process, technology and vigilance into their organizations. Download this informative digital dialogue to learn more on the best practices in web-based application security.


An Executive Guide to Analytics Infrastructure: Imperatives for Advanced Analytics

Get the most information from your data. Business has never been faster and is increasingly dependent on the timely analysis of large volumes of data for strategic and operational decisions. As executives come to rely on advanced analytics, the importance of a robust IT infrastructure cannot be overstated.Data comes from everywhere; make sure you get it in time, every time.


The New Currency of Business: Getting Big Value out of Big Data

Today, data is the new currency of business. But many organizations have yet to make the most of data insights that drive better outcomes. This e-book describes how businesses can manage information with greater efficiency, speed and continuity for improved ROI through IBM® Storwize® platform and IBM FlashSystem™ Family. Case studies illustrate how various industries are successfully utilizing these solutions to optimize their performance and efficiency.


Snapshot: Solutions for Collaborative Government

Collaboration has always been a part of the way government does business, but until relatively recently it was something that happened only at certain times and between select groups of people. That is because with the older generation of tools, there was often a fear that collaboration would distract workers and drag down productivity. But new technology has allayed those fears, and now government managers are the numerous benefits of supporting collaboration, from easier sharing of information and faster response to events, to a better use of scarce budget dollars. The focus now is on developing the goals and strategies for successful collaboration initiatives, and providing the best-in-class solutions for employees.


IBM's Next-Generation Smart City Solutions

At the Ovum conference "From Smart to Future Cities" held in June 2013, the emphasis was on how the market is at an inflection point between talking about what "smart city" means and understanding how to implement it. The evidence of the shift is the increasing maturity of the demand side, the development of standards, and the arrival of investment in the form of stimulus funding from government, sovereign wealth funds, and venture capital.


Hybrid Model Expands Cloud Possibilities

Cloud computing has become a critical element in enterprise IT, changing the way organizations use and consume IT resources. IDC estimates that worldwide spending on cloud services will reach more than $100 billion this year. Download this informative digital dialogue to gain more insight on the benefits of hybrid cloud as well as the new possibilities it offers for disaster recovery and capacity management.


Research Report: The Virtualization Playbook

The increasing complexity of the government enterprise—and the increasing volume and complexity of the data being managed—is forcing agency IT managers to rethink how they manage the infrastructure. Virtualization is at the center of that. By virtualizing key elements of the data center, agencies gain flexibility, scalability and manageability. And those gains are magnified when agencies integrate those systems into a cohesive whole. At the same time, IT managers are looking to bolster their infrastructures with emerging storage and storage management options. The data center of the future is taking shape now.


Cloud in 2014: A Guide for Government

Cloud is set to play a major role in government. Although agencies are still working out security issues and other policies, they also are deploying cloud technology to meet an increasingly wide array of mission requirements. And the options to government users of cloud are expanding. Hybrid clouds, which support both public and private options, provide a much-needed solution for users, the government’s FedRAMP program offers better choices for secure cloud services, and cloud brokers could take care of most of the procurement angst. Without a doubt, 2014 will be a big year for the cloud.


Taking Storage to the Next Level

As agencies move more and more of their operations to a virtual infrastructure, they cannot afford to ignore a critical component: Storage management. Download this digital dialogue to learn how Virtual SAN can simplify storage to let software driven policy controls do the work.


Virtualization Key to Meeting IT Goals

Virtualization technology can provide agencies with the agility they need, whether they are dealing with consolidation, automation or security. Download this informative digital dialogue to learn the benefits of adopting a virtualization solution within your organization.


GameChanger: The Face of Insider Threats

Cyberthreats of all types are more difficult to detect than ever before, thanks to more efficient and intelligent malicious software, increased use of mobile devices, the volume of network activity and the explosion of cloud computing. At the same time, cybercriminals are becoming more clever, using everything from remote access software, e-mail and instant messaging to removable devices and peer-to-peer networks. Download this GameChanger to get a behind the scenes look at the mitigation and detection of insider threats.


Secure Login Provides Key to Safe, Accessible Citizen Services

It’s become almost a cliché for people to lament how many login names and passwords they have to maintain. Cybersecurity advisors regularly warn people not to use the same password for multiple online services. Problems with the common model of identification and authentication afflict both government agencies offering online services and the users accessing them. Download this informative whitepaper to learn more on the username/password paradigm and the evolution of identity verification.


Best Practices for Cloud Adoption

Discover how your IT organization can become more agile by leveraging Cloud computing to its full potential. Enter a few basic details in this online tool to generate a customized IDC white paper that outlines the benefits and best practices of cloud implementation.


Moving to a Private Cloud? Infrastructure Really Matters!

This Clipper Group paper outlines the importance of the underlying IT infrastructure for private cloud environments and lays the groundwork for clients navigating cloud, highlighting many key aspects of a private cloud infrastructure. This is a great door opener to a conversation about our systems and cloud computing.


Significantly Improving Storage Efficiency — IBM Adds Real-time Compression to Storage

The Clipper Group asks if you are suffering from too much data with an insufficient budget, Storwize V7000 with Real-time Compression may well be the solution you need. If your data center needs to compress both blocks and files, IBM’s plans to enhance its Storwize V7000 Unified, when available, will provide the single platform that the data center needs to simplify deployment. Each will be like getting more shelf space without en-larging the grocery store and without paying the going price for additional shelves. Isn’t that the kind of surprise you want to pull out of your bag of tricks the next time you are asked?


Research Report: Best Practices in Networking and Storage Efficiency

The results of a new survey of government IT professionals reflects a broader recognition that existing infrastructures could soon be overwhelmed by the current rate of growth in data. Sixty-six percent of respondents said their agencies needed “to implement a network architecture that will enable high-velocity data capture, discovery, storage and analytics.” But it’s not just a matter of keeping up with the data. Download this research report to discover more findings, as well as learn how agencies are adopting other technologies that can have a significant impact on their IT infrastructure.


GameChanger: NoSQL

Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.


Top Ten Database Threats

Databases have the highest rate of breaches among all business assets. Failing to safeguard databases that store sensitive data can cripple your operations, result in regulatory violations, and destroy your reputation. Understanding the top database threats and implementing the solutions outlined in this paper will enable you to recognize when you’re vulnerable or being attacked, maintain security best practices, and ensure that your most valuable assets are protected.


Viewpoint: Rapid Detection Key to Security

As cyber threats increase and become more complex, it is more important than ever for organizations to learn the key ingredients to developing a rapid response strategy. Download this insightful Q&A report to gain further knowledge from industry experts on the current cybersecurity atmosphere.


NetCents-2: A New Way of Doing Business

The six-year, $24.2 billion NetCents-2 program is a major expansion of the smaller and more compact NetCents-1, and its success will be key to the Air Force’s plans to modernize its networks and improve the way it delivers information to warfighters. Download this special report to discover how NetCents-2 will be a major driver towards lower costs, faster delivery of technology and new opportunities for small businesses.


The STAND: Cybersecurity

Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.


Three Best Practices to Help Government Agencies Overcome BYOD Challenges

This paper highlights key challenges facing government IT administrators in a BYOD environment—and discusses steps and strategies for network preparation, ongoing support, and securing information to enable widespread adoption of personal device use, while enhancing data security.


Extending Security Intelligence with Big Data Solutions

Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering