What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepaper List


Secure Web Applications: Creating a Security Culture

Companies move applications to the Web to improve customer interactions, lower business processing costs and speed outcomes. But driving applications to the Web also increases vulnerabilities – unless security is an integral component of the application development process.


IBM zSecure Compliance and Administration

IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administra-tion. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to help detect threats.


Application security and risk management

The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to collectively address application security by identifying and remediating vulnerabilities early in the software development lifecycle, when they are easier and less expensive to correct. IBM research drives IBM Security AppScan solutions to identify the latest threats with advanced security testing for application security analysts. With more than a decade of application security experience, IBM Security AppScan solutions deliver some of the most advanced testing features that combine expert analysis with ease of use.


Identity and Access Management Buyer's Guide

This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.


How does IBM deliver cloud security?

Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualized environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and de-provisioning environment while experiencing the loss of direct control of security compliance, and privacy parameters.


Using Load Balancers & ADC’s to Optimize Web and Application Infrastructure for Federal Government Agencies

Using a Load Balancer to reduce the costs associated with deploying and maintaining highly available application infrastructures in Federal Government environments.


Reducing the Costs and Risks of Data Storage in the Federal Government

When it comes to data storage management, the challenge is to do more…with less. Government entities are being asked to store and protect more data that is mandated by more regulations, involves more advanced technologies—such as cloud—and is generated by more digital devices from more vendors.


Three Keys to Building a Sustainable Mobile Infrastructure

Government departments and agencies at all levels are going mobile. Federal employees are rapidly expanding their use of smartphones, tablets, laptops, and other mobile devices for work outside the office. In a time of constrained budgets, agencies need the productivity gains and cost savings that mobile computing can bring. Download this whitepaper to explore the three keys of developing a sustainable mobile infrastructure and learn how virtualization can support mobile initiatives.


GameChanger: Cloud Infrastructure

The government has long embraced the concept of open source computing, starting in earnest in 2009 with the Obama administration’s Open Government Initiative. Today, the concept of open government has even extended to the cloud. Download this whitepaper to further explore the emerging trends of cloud infrastructures as well as discover the tips for maximizing cloud benefits for your organization.


Big Data: Let Business Priorities Drive Tech

IT shops across government are putting Hadoop through its paces in an effort to understand its usefulness to the business. Download this expert Q&A report to uncover the best combination of technologies that support big data analytics as well as learn the main benefits Hadoop can provide.


Crime Prediction and Prevention

Crime prediction and prevention analytics from IBM helps agencies make the best use of the people and information at hand to monitor, measure and predict crime and crime trends. Analysis of police data provides insight that lets officers track criminal activities, predict the likelihood of incidents, effectively deploy resources and solve cases faster.


Accelerate Your Windows 7 Migration

The deadline of Extended Support for Windows XP is set to expire on April 8, 2014, and cost implications of remaining on XP are staggering. Plus, running XP at your own risk leaves your environment vulnerable. Download this free White Paper and learn how many organizations are migrating tens of thousands of PCs in record time.


Government Analytics for Dummies

Government Analytics For Dummies, showcases how business analytics enables federal, state, and local agencies to drive better outcomes in government through better prediction capabilities, visibility into performance, and data access for dynamic decision making.


Emerging Cyber Threats Demand New Thinking

Government agencies need a better approach to dealing with cybersecurity threats, and they know it. A recent survey by the 1105 Government Information Group found that government agencies are not satisfied with current efforts to protect their information from the dynamic threat environment. Download this research report to uncover more findings, including what agencies view as the top threat to their organization.


Holistic View Aids Critical Infrastructure Protection

With cyberattack targets shifting from government networks to the commercial industrial base, new requirements need to be developed to ensure the proper protection of networks. This often requires a comprehensive security program that provides a real-time view into your network to allow for proactive responses to potential threats. Download this whitepaper to read more on the best ways to approach critical infrastructure protection.


A Revolutionary Approach to Network Visibility

Enterprise data centers bring together all of the benefits and challenges of the latest networking architectures. Virtualization technology, wireless and mobility, and use of clouds for infrastructure and applications have produced lower costs, better performance, and richer user experiences. But they’ve also brought an important challenge. Download this whitepaper to read more on network visibility and the current best practices in data center consolidation.


Advanced Case Management: Making its Mark in Key Government Sectors

Government agencies faced with shrinking budgets yet ongoing pressure to deliver superior services to the public need smarter ways to handle their growing, increasingly complex caseloads. Advanced case management, as a strategy, can help government agencies alleviate many of the challenges associated with claims and social services processes.


The Next Evolution of Data Warehousing: Smart Consolidation Driving a new level of Agility and Performance

This whitepaper can help organizations develop information strategies that match their evolving environment, and develop ecosystems that encompass the new multitude of information sources; data volume, variety and velocity; and complex business needs. With a smart consolidation strategy, organizations can do more than keep pace with the data revolution - they can truly use it to their advantage.


Modernization through Virtualization

The Government Printing Office’s chief information officer, Chuck Riddle, said the agency’s mission hasn’t changed much since it opened in 1861, but technology has changed the way that mission is carried out. Download this whitepaper to learn more on virtual desktop infrastructure, including the four goals of information technology in the digital age.


Hadoop for Dummies

In this whitepaper you will learn about the various infrastructures available for managing big data and how to determine which one is appropriate for handling your agency's needs.


Build Trust into Mobile Solutions

Many agencies seek to minimize the cost of deploying and managing mobile devices but security capabilities and hardware configuration management considerations vary depending on the operating system the devices employ. By focusing investment and support on a preferred platform, government IT shops can limit the range of expertise necessary to ensure trusted remote communications with their users’ mobile devices. Download this informative whitepaper to learn expert advice on how to improve your agency’s mobile security strategies.


Filling Gaps in Your Cybersecurity Infrastructure

The traditional cybersecurity infrastructure contains several detection, analysis and remediation gaps. Today, organizations need to focus on two main things: detecting unknown threats and reducing response time. Download this informative whitepaper to read more on the weaknesses of the traditional cybersecurity model and how agencies are filling the gaps.


2012 IBM X-Force Annual Trend and Risk Report

The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done to mitigate it.


Increase Productivity and Security with Identity and Access Management

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. To meet the needs of a changing user population while simultaneously maintaining a security-rich environment, organizations need identity management solutions that can define, grant and remove access privileges to match the user’s job role and actual access requirements.


IBM Security Intrusion Preventions Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers a comprehensive portfolio of intrusion prevention solutions that go beyond traditional intrusion prevention to provide multilayered, end-to-end security that can actually protect networks from attacks before they occur.


How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security

This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford duscusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


Delivering Success that Scales with the Largest Enterprises

IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and event management (SIEM) solutions. In order to support the demands of organizations across industries, IBM offers the geographic reach to serve global organizations and the partner ecosystem required to deliver powerful and comprehensive solutions.


Secure By Design: Building Identity-based Security into Today’s Information Systems

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible


GameChanger: Rethinking Data Center Design

As agencies begin to upgrade or consolidate their data centers, many are starting to realize that it’s much more complicated than simply combining equipment or facilities. In some cases, the consolidated data center may not have the space, power or cooling available to support virtualized servers or the multitude of equipment that needs to be consolidated. In other cases, existing data centers may not have the infrastructure required to support the sheer volume of data that must be stored and processed. Download this in-depth report for more on a different approach to data center design.


IDC Analyst Connection: Video Trends in the Public Sector

Rich Costello, Senior Analyst Enterprise Communications Infrastructure answers questions from Cisco on trends, use cases, key considerations and strategies for deploying video conferencing and telepresence within public sector.


Telework Solutions for Government

From the aggressive telework program of the U.S. General Services Administration to Georgia’s tax credits for private sector telecommuting programs, agencies at all levels of government are embracing telework for a variety of reasons. By leveraging Adobe technologies government employees are enabled to work anywhere, anytime—plus it makes them more productive and efficient working in the agency’s office. Downlaod this whitepaper for more on Adobe's telework solutions


Adobe® Connect™: Bringing together video and next-generation web conferencing

Many businesses can achieve the benefits of face-to-face meetings through an investment in a video or web conferencing solution, saving the company both travel time and resources. Selecting the right technology to replace in-person meetings begins with understanding your organizational needs and pairing these needs with the optimal conferencing solution. Download this whitepaper for more on Adobe Connect.


Solution Brief: Discover the power of Adobe Connect for Web Meetings

Adobe Connect for Web Meetings significantly improves collaboration with your colleagues, partners, and customers anytime, anywhere, across virtually any device. With Adobe Connect, meeting organizers can go far beyond simple screen sharing and deliver easy-to-access, rich meetings from a desktop or directly from a mobile device.


Success Story: Adobe Connect Solution to facilitate collaboration and peer engagement across Department of Defense

In June 2007, DISA awarded Defense Connect Online (DCO), a two-part Adobe Connect solution for collaboration and engagement across DoD global operations. Two different systems comprise the Adobe Connect implementation, one for the unclassified network, and one for the classified network. A pre-release version of DCO was tested over a five-month period and went live in April 2008, enabling deployed troops, supporting personnel, and military leaders to collaborate effortlessly across locations worldwide. Read more about how DISA enabled secure collaboration with Adobe Connect.


Expert Q&A: Continuous Monitoring

As attacks on agency networks and assets become ever more divergent and sophisticated, continuous monitoring will be a critical element in an organization’s cybersecurity strategy. But it’s not an easy thing to implement. Download this Q&A report for industry perspectives on the various elements of effective continuous monitoring, and why it’s not just one more technology program.


Contract Guide: GSA IT Schedule 70

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.


Research Report: Collaboration Solutions Transforming Government

Government agencies are getting serious about online collaboration tools because they see the opportunity to improve enterprise-wide information sharing, support real-time communications during a crisis, and to reduce the money they spend on large in-person meetings or conferences. A recent survey conducted by the 1105 Government Information Group shows that these and other potential benefits are leading many agencies to deepen their investment in collaboration tools and to make collaboration part of their organizational culture. Download this exclusive research report for more on collaboration trends in government.


Government by Design: Using Strategic Planning to Design the Business of Government

This white paper introduces government by design and describes how it can address the growing challenges and pains felt at all levels of government.


Overcoming Challenges of Asset Management Amid Declining Federal Budgets

Modern asset management solutions are often no longer included in large program budgets and logistics professionals and engineers at federal agencies are being tasked to do more with less and extend the service life of existing assets. Without the ability to piggy-back modern asset management solutions onto large program budgets, agencies must find other ways to modernize their asset management solutions, and they have many good reasons to do so. Built on a single platform, IBM Maximo® Asset Management solutions for federal government deliver seamless integration and support maintenance of all asset types across the enterprise, from production and facilities to transportation and IT.


Optimizing Data Storage in Federal Government Data Centers

Federal IT and data center managers face an unprecedented and inescapable perfect storm of requirements related to the management and security of mission-critical and mission essential data. The alignment of mission and service delivery and enabling information requires full information lifecycle visibility, management and automation to converge IT capabilities with mission and service delivery objectives—taking into account the farreaching regulatory and compliance mandates that serve as overarching constraints.


All Data Archiving Tools Are Not Created Equal: The Importance of Index and Search

Most organizations possess considerable intellectual property. Unfortunately, that information is useless unless employees know how to find it. Archiving tools with powerful index and search capabilities can help maximize the value of intellectual property.


Cloud Infrastructure for the Real World

The evolutionary process of cloud adoption has been leading to an open hybrid approach – a new model for IT – demanding organizations to manage traditional and cloud workloads simultaneously. Learn how Red Hat is making hybrid a reality with Red Hat Cloud Infrastructure.


Special Report: Infrastructure Security

Evolve or die. That’s the imperative guiding the development of cybersecurity technologies and strategies across government and industry. The ongoing evolution of the federal IT enterprise, extended in all directions by advances in networking and mobile technology, must be matched to similar advances in information and network security. But above all, the nature of the current cybersecurity threats requires a new way of thinking. The old approach to cybersecurity, which was based on defending the perimeter, cannot hold up against the wide array of cyber threats that agencies now face. Download this special report for in-depth articles on infrastructure security.


Invest to Save with Collaboration Technologies

With budgets and staffs stretched thin, public sector organizations are searching for ways to cut costs and help employees work more productively. IT leaders recognize that collaborative voice, video, and mobile technologies could enable their organizations to achieve these goals, but they expect to implement these technologies when investment dollars are more plentiful. Download this whitepaper for an in-depth look at how collaboration technologies are helping IT managers “invest to save” by delivering significant long-term savings while improving the effectiveness of their organizations.


Special Report: Best Practices for Meeting Big Data Challenges

Big data is a top priority for CIOs, but few know exactly what it is – and what it can help their organizations achieve. As the creation of data has multiplied recently, IT organizations are left wondering how to manage those data stores while at the same time being asked to help the business side of the house innovate, cut costs and improve end-user satisfaction. Download this special report for in-depth articles on meeting the challenges you face as you take on "big data."


Building a Private Optical Network

Are you wrestling with the options of building dedicated, private networks or continuing to buy managed network services? This paper describes the advantages of a building a private optical network and the technologies to consider.


We Have the Capacity to Handle Your Back (haul): Wireless Solutions for Government Networks

Gigabit Ethernet (GigE) wireless solutions are an ideal way to backhaul video imaging systems for public safety and surveillance purposes, national security and intelligence. This paper will explore the vital role that wireless solutions play for government agencies


Government Cloud Collaboration Services: Collaborate More Easily and Effectively While Reducing IT Costs

Like many organizations, federal agencies can drive progress through social collaboration. Read the solution brief to see how secure, scalable, cloud-based solutions can help your agency collaborate socially without any extra cost, complexity or compliance concerns. See how these tools can also help enable better decisions to be made faster.


The Power of Cloud: Driving Business Model Innovation

Although cloud capabilities offer numerous opportunities to drive business innovation, its potential beyond technological capabilities remains virtually untapped. Read the white paper to learn more about the benefits of cloud-enabled business models in promoting sustainable competitive advantage.