What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepaper List


The STAND: Cybersecurity

Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.


Three Best Practices to Help Government Agencies Overcome BYOD Challenges

This paper highlights key challenges facing government IT administrators in a BYOD environment—and discusses steps and strategies for network preparation, ongoing support, and securing information to enable widespread adoption of personal device use, while enhancing data security.


i2 Intelligence Analysis Platform

IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.


Consolidated Security Management for Mainframe Clouds

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Ensuring Application Security in Mobile Device Environments

In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.


Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Extending Security Intelligence with Big Data Solutions

Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


Avoiding Insider Threats to Enterprise Security

This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.


Managing Threats in the Digital Age

News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.


Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity

In this paper, learn about four technology-based approaches to improving processes and increasing productivity while driving down department and agency costs.


Enhancing a City’s Ability to Plan, Protect and Manage with Intelligent Video Analytics

In this paper, learn how cities are using intelligent video solutions to help them face the challenges of increasing urbanization.


Addressing Social Determinants and Their Impact on Healthcare

This executive overview paper examines the many factors that are driving change in the healthcare industry.2 It covers the social determinants of health and introduces a smarter approach to care that enables healthcare providers to personalize programs, services and treatments based on a holistic view of the individual and the individual’s family. By intervening proactively to address the social determinants of health and with this smarter approach to care, the costs of healthcare can be curtailed or even reduced.


Ciena Cloud Networking: Performance On-Demand

True software-driven networking for the cloud, with automated resource orchestration and provisioning that yields reduced network capacity requirements, predictable service performance, and simpler operations.


Montgomery County Leverages Professional Certifications for Secure Cloud Computing

Three years ago, Montgomery County IT officials decided to move the enterprise infrastructure, applications and data required by the government’s 34 departments to the cloud, using the expertise their IT team had gained through (ISC)2’s CISSP security certification. Learn how they did it.


Thinking Locally, Targeted Globally: New Security Challenges for State and Local Government

Even as budgets remain tight, tech-savvy citizens demand higher levels of service, thus making cyber security even more critical for state agencies, municipalities, and public utilities. Download the whitepaper to learn the multi-vector, multi-stage nature of today’s advanced persistent attacks and why traditional tools fail to detect them.


Business Process Management for Dummies

In today’s dynamic business environment, organizations need to be agile so they’re ready to respond to the litany of challenges coming their way. Business Process Management (BPM) provides that agility by ensuring the full utilization of technology; helping your agency to become far more responsive and meet your goals. Read this eBook to learn more about the flexible, agile and scalable business model - BPM.


Guard Data in Government Environments by Implementing Continuous Diagnostics and Mitigation

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.


The Social Imperative in Workforce Skills Development

Using social technologies, organizations can develop a workforce development program where employees can develop skills on the job by collaborating with experts and sharing tacit knowledge. This white paper shows how organizations that develop a social learning program can improve employee engagement, reduce attrition and decrease the amount of time employees waste searching for expertise and information.


Continuous Diagnostics and Mitigation Demands, CyberScope and Beyond

To assist federal agencies with CyberScope reporting and the transition to Continuous Diagnostics and Monitoring programs, IBM Endpoint Manager provides insight and control for endpoints with streamlined, automated capabilities for real-time monitoring and remediation of security risks.


Smarter Infrastructure to Address Growing Citizen Demands

Learn more about IBM solutions for asset and facilities management that provide a way for government departments and agencies to collect and analyze asset and facilities data and performance from a centralized point of control, with capabilities such as asset lifecycle management and facility energy usage.


Cloud Raises the Bar on Delivery of Social Services

Case workers are busy people. From helping victims of domestic abuse find new homes, to connecting single parents with financial assistance or helping the elderly get quality medical care, their days are packed with the tasks of advocating for persons in need. Download this interesting digital dialogue to discover how anywhere, anytime access can help not only case workers but the public sector IT.


IDC: Real-time Compression Advances Storage Optimization

It should come as no surprise that storage budgets are constantly under pressure from opposing forces: On one hand, economic forces are pushing budgets to either stay flat or, in many cases, shrink as a percentage of a company's revenue. On the other hand, the infrastructure struggles to keep up with the pace of data growth, pressured by many variables, both social and economic. Businesses have no choice but to acclimate their storage infrastructure to the unprecedented levels at which data is growing.


Protect Your IT System with Next Generation Security

A data breach, probings, hackers… protect your critical IT information. What these real-life examples have in common is that perpetrators can attack companies through their IT systems. Read this whitepaper to learn how agencies are adapting their efforts to combat emerging cyber threats.


Benefits of Integrated Systems for Cloud Infrastructure

Learn why increasing numbers of agency IT service providers and data center managers are implementing dynamic self-service cloud architectures.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Proven VPN WAN - Technology Design Guide

Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology.


Miercom Verified: Read Cisco 4451-X ISR Report

In June 2013, Cisco engaged Miercom to evaluate the capabilities and performance of the latest Cisco Integrated Service Router (ISR) for branch offices—the Cisco 4451-X ISR. Review the report in full and discover why Miercom awarded the Cisco 4451-X ISR the Performance Verified award.


Video Surveillance Technology: More than Meets the Eye

Pictures might tell the story, but a variety of emerging technologies are allowing investigators to delve even deeper into video evidence. Download this informative digital dialogue to discover the importance of video surveillance technology, including the three tips for effective video planning.


Real-User Management-as-a-Service Solution for Cloud-based Applications

This informative whitepaper will help you gain a comprehensive view into end-user experience, so your agency can make informed decisions about acceleration and optimization for the delivery of web applications and streamline the adoption of cloud-based services.


Creating A Digital Strategy to Provide Exceptional Digital Experiences

In the age of the interconnected world where the primary touchpoints are digital, the purpose of the digital experience as part of the digital strategy is clear: deliver an engaging, useful and ideally, differentiating experience to the user – and make every experience truly “exceptional”. This whitepaper demonstrates how organizations, with their unique requirements, have created and benefited from an exceptional digital experience.


The Future of Applications and Emails is Social

Email will retain relevance as a key business collaboration tool by evolving toward a more integrated approach with social tools. This whitepaper examines the evolution of the social email experience and how it can ultimately help to deliver real business value.


Stay Ahead of Insider Threats with Predictive, Intelligent Security

It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools.


Identity and Access Intelligence:Transforming the Nature of Enterprise Security

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud security challenges and proactively protect sensitive IT assets.


Keeping Distributed Endpoints Safe and Compliant

With rapidly increasing numbers of remote workers and mobile devices, there is no well-defined perimeter. The perimeter, by necessity, must be the endpoint itself. Endpoints, by their very nature, are highly vulnerable to attack— including system damage inflicted by malware, theft by phishing, privacy infringements through social networking, or loss of productivity due to spam, interruptions and system instabilities. Read this whitepaper to learn about a solution that provides real-time visibility and control over each endpoint’s status, remediating issues to help ensure continuous security and compliance.


Ensuring Application Security in Mobile Device Environments

As a result of the increase in wireless devices in the workforce, organizations are becoming more concerned with mobile security. Many, in fact, see this area as a primary technology challenge to address and a main focus for security initiatives.


An Early Leader across the Big Data Security Analytics

This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one of the few vendors offering an integrated approach to combat this.


Intelligent role management for improved security and compliance

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.


Beyond the Next Generation:Putting Advanced Network Security to Work

As the network has evolved, so has network security. Firewalls retain their role of first-line filtration based on policy, but have grown to embrace a wider range of capability. In this report, EMA highlights specific examples of the ways in which converged security systems put today’s more advanced capabilities to work in practical application.


Software-Defined Data Center Helps IT Stay Up-to-Date

VMware’s comprehensive solution addresses virtualization and automation to provide security, backup and efficiency of operations. Download this insightful digital dialogue to learn more about the foundation of software-defined data centers, including the benefits it could provide to your organization.


The Rise of Open GIS Data

Download this informative Viewpoint to hear from Paul Ross, Product Manager,ArcGIS Online at Esri to get a first hand look of his perspective of the evolution of GIS and how it will play a major role in innovative government programs in years to come.


Cloud Removes Barriers, Increases Value

The word cloud has become so overused, but the approach is quite valuable. In this free white paper, you'll learn how you can apply automation and virtualization to entire data centers. Covered in this resource: What a software-defined data center is, how it can reduce costs, and how to implement it.


Preventing Disastrous Disaster Recovery

Whether it’s a routine data-center consolidation or a fast-moving disaster response, server migration is often a complicated task. But it doesn’t have to be. Download this informative digital dialogue to learn how to simplify and improve your organization’s disaster recovery and data center consolidation initiatives.


Virtual Network Key to Software-Defined Data Center

Experts say it is has become increasingly clear that the software-defined data center is the data center of the future. But to realize the full benefits of SDDC, organizations might need to adopt software-defined networking as well. Download this digital dialogue to read more highlights from a recent webcast on virtualization.


Collaborative Care Beyond the Care Continuum

While new models of care collaboration are being implemented in many forms globally, moving from concept to successful implementation involves process changes and business transformation that may be the biggest challenges to healthcare organizations. Care collaboration tools that support and assist organizational transformation are key to driving successful outcomes. What these tools can enable is important. But who these tools engage and connect, the way in which they are engaged and connected, and the way in which they ultimately use the tools are more important in transforming care delivery.


Your Data System Should be Always On, Fast and Affordable

Partners and customers expect instantaneous response and continuous uptime from data systems, but the volume and velocity of data make it difficult to respond with agility. IBM PureData System for Transactions enable businesses to gear up and meet these challenges.


The future of Data Services Delivery and Management Starts Here

Data workloads are rapidly evolving and changing. Today's enterprises have many different types of applications, with different usage patterns, all constantly accessing data. As a result, data services need to be more robust and scalable. IBM PureApplication System and IBM PureData™ System for Transactions are designed to meet these needs. This paper shows how the latest technology and expertise built into these systems gives businesses an innovative approach to rapidly create and manage highly scalable data services, without the complexity of traditional approaches.


Transparent Application Scaling with IBM DB2 pureScale

The IBM DB2 pureScale feature is designed to address your current and future business needs for continuous availability. This white paper introduces DB2 pureScale—what it looks like, where it comes from, and how it allows you to scale out your database on a set of servers in an active-active configuration that combines high availability with truly transparent application scaling.


IBM PureData Sytem for Transactions: Delivering “Competitive-Advantage-Critical” Data Services

Infostructure Associates reviews the benefits and value add of the IBM PureData System for Transactions, stating that '...IBM PureData System for Transactions is a significant step forward in transactional scalability that should allow savvy users to achieve better near-real-time data processing to run the business and to gain competitive advantage on its own, or as a key part of a full information-management solution.’