What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepaper List


Improving Mission Effectiveness with Social Media Analytics

The ability to leverage the valuable information contained in the social media universe can be critical for agencies that need to be aware of dynamic changes in the environments that they serve. Learn how agencies can implement social media analytics to derive valuable insights that are often obscured by the sheer volume of information produced.


Predictive Maintenance and Quality Solution

Organizations that lead in analytics can triple the performance of those that are just beginning to adopt analytics. Learn how to navigate vast amounts of data and apply industry-specific dashboards, accelerators, and methods to help create powerful, user-friendly predictive models.


Addressing Social Determinants and their Impact On Healthcare

This executive overview paper examines the many factors that are driving change in the healthcare industry. It covers the social determinants of health and introduces a smarter approach to care that enables healthcare providers to personalize programs, services and treatments based on a holistic view of the individual and the individual’s family.


Anti-Money Laundering when Transaction Monitoring is not Sufficient

The recent, public admonishments of poor operational practices at some of the best known, global banking institutions have served to highlight the fact that Anti-Money Laundering (AML) procedures and protocols must be improved at the earliest opportunity to ensure compliance with evolving regulatory requirements. This whitepaper examines how data must be viewed as an asset from which AML intelligence can be derived.


Could Healthcare Reform be Just Another Program?

Today there is a new urgency for administrations to address two seemingly mutually exclusive challenges: to significantly lower the cost of social programs and to simultaneously improve the service for their citizens. Relying on traditional service delivery models that have fallen short in attempting to achieve either of these goals is not an option – a new approach is clearly needed. Will the Affordable Care Act live up to these standards?


Asset Management for Local Government

When individual departments use separate systems to manage their own assets, the result can be a complex, multi-layered enterprise. Local governments need to look at enterprise solutions that allow them to take an enterprise asset management approach to maintain their assets, deliver services and improve performance of the government as a whole.


Managing Enterprise Virtual Infrastructures

Read this whitepaper to learn how your agency or organization can gain the insight, control, and automation necessary to optimize resources, understand utilization, and plan for future capacity needs.


Empowering Analysts with Big Data

The paper focuses on the technologies and capabilities organizations should arm their analysts with, so they cannot just ingest big data, but uncover difficult evidence and turn it that big data into actionable intelligence.


Smart Planning for a Smart City Infrastructure

This paper looks at how municipal asset owners and operators planning smart infrastructure projects can benefit from a systems engineering approach to project design.


AV/IT Infrastructure Guidelines and Best Practices for Coordinating AV and IT

InfoComm International®, the nonprofit association for professional AV technology, and the American Institute of Architects Academy of Architecture for Justice have jointly produced this guideline for AV/IT project design for courts and judicial offices.


Network Optimization: Networks in Motion

For years, agencies have optimized their networks primarily by adding capacity and perhaps fine-tuning their architecture. But the surging demand for capacity driven by such trends as cloud computing and teleworking, and from bandwidth-hogging applications such as video, are quickly increasing the pressure on network performance. Agencies can no longer afford to respond by simply throwing more bandwidth at the problem. Instead, they are turning their attention to network optimization.


Roadmap to a Contact Center of Excellence

When it comes to government IT-based programs, the technology itself rarely seems to be a stumbling block. Agency culture is most often the culprit. The need for improved communication and collaboration are not the only factors preventing your agency from achieving contact center excellence. Download this special report to learn how to get your agency’s contact center on the right path through mobility, social media, cloud services and performance management.


Mobile Strategies: All Systems Go

Although there are countless mobile apps available in the market, the number of feasible options is reduced considerably because of agency concerns about security and privacy. Still, the Digital Government Strategy calls for “developing models for the secure, yet rapid, delivery of commercial mobile applications into the Federal environment.” Download this special report to learn more about mobile strategies including the four steps to successful mobile development.


How Protected is Your Website?

Even today, strange as it sounds, far too many websites have no protection at all. In organizations where developers are evaluated primarily on their ability to ship code on time, there is often a lack of incentive to adopt secure coding practices. Website protection services can quickly add measurable security to your web presence compared to deploying and managing your own equipment and infrastructure to provide similar capabilities.


Government On the Go: Lessons from the Battlefield

The Army’s Command Post of the Future integrates intelligence from multiple sources onto one virtually available map to let commanders in the field make more informed decisions. Download this informative digital dialogue to gain further insight on the potential of mobility and the future of warfighting.


Research Report: Emerging Strategies for Managing Mobility

In August 2013, GCN surveyed defense, civilian and state and local agency decision-makers about their mobile management strategies. The survey covered topics regarding workforce deployment of mobile devices, BYOD vs. agency-issued device policies, usage and security concerns that stem from the use of mobile devices and architectural considerations including virtualization strategies. Download this informative report to uncover the research findings and broaden your scope of knowledge on mobile management.


Research Report: The Virtual Public Sector

For more and more government agencies, desktop virtualization is proving to be the right solution at the right time. The technology, which makes it possible to deploy, manage and optimize desktop-based applications and data from a central console, can help agencies extend desktop computing resources to a wide range of end-user devices securely and cost effectively, whether users are in the office, on the road or working at home. Download this report to discover further research findings on virtualization trends and the shape of things to come.


Protecting Consumer and Business Information with Advanced Threat Protection

As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it serves.


Secure Web Applications: Creating a Security Culture

Companies move applications to the Web to improve customer interactions, lower business processing costs and speed outcomes. But driving applications to the Web also increases vulnerabilities – unless security is an integral component of the application development process.


IBM zSecure Compliance and Administration

IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administra-tion. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to help detect threats.


Identity and Access Management Buyer's Guide

This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.


How does IBM deliver cloud security?

Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualized environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and de-provisioning environment while experiencing the loss of direct control of security compliance, and privacy parameters.


Application security and risk management

The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to collectively address application security by identifying and remediating vulnerabilities early in the software development lifecycle, when they are easier and less expensive to correct. IBM research drives IBM Security AppScan solutions to identify the latest threats with advanced security testing for application security analysts. With more than a decade of application security experience, IBM Security AppScan solutions deliver some of the most advanced testing features that combine expert analysis with ease of use.


Using Load Balancers & ADC’s to Optimize Web and Application Infrastructure for Federal Government Agencies

Using a Load Balancer to reduce the costs associated with deploying and maintaining highly available application infrastructures in Federal Government environments.


Reducing the Costs and Risks of Data Storage in the Federal Government

When it comes to data storage management, the challenge is to do more…with less. Government entities are being asked to store and protect more data that is mandated by more regulations, involves more advanced technologies—such as cloud—and is generated by more digital devices from more vendors.


Three Keys to Building a Sustainable Mobile Infrastructure

Government departments and agencies at all levels are going mobile. Federal employees are rapidly expanding their use of smartphones, tablets, laptops, and other mobile devices for work outside the office. In a time of constrained budgets, agencies need the productivity gains and cost savings that mobile computing can bring. Download this whitepaper to explore the three keys of developing a sustainable mobile infrastructure and learn how virtualization can support mobile initiatives.


GameChanger: Cloud Infrastructure

The government has long embraced the concept of open source computing, starting in earnest in 2009 with the Obama administration’s Open Government Initiative. Today, the concept of open government has even extended to the cloud. Download this whitepaper to further explore the emerging trends of cloud infrastructures as well as discover the tips for maximizing cloud benefits for your organization.


Big Data: Let Business Priorities Drive Tech

IT shops across government are putting Hadoop through its paces in an effort to understand its usefulness to the business. Download this expert Q&A report to uncover the best combination of technologies that support big data analytics as well as learn the main benefits Hadoop can provide.


Crime Prediction and Prevention

Crime prediction and prevention analytics from IBM helps agencies make the best use of the people and information at hand to monitor, measure and predict crime and crime trends. Analysis of police data provides insight that lets officers track criminal activities, predict the likelihood of incidents, effectively deploy resources and solve cases faster.


Accelerate Your Windows 7 Migration

The deadline of Extended Support for Windows XP is set to expire on April 8, 2014, and cost implications of remaining on XP are staggering. Plus, running XP at your own risk leaves your environment vulnerable. Download this free White Paper and learn how many organizations are migrating tens of thousands of PCs in record time.


Government Analytics for Dummies

Government Analytics For Dummies, showcases how business analytics enables federal, state, and local agencies to drive better outcomes in government through better prediction capabilities, visibility into performance, and data access for dynamic decision making.


Holistic View Aids Critical Infrastructure Protection

With cyberattack targets shifting from government networks to the commercial industrial base, new requirements need to be developed to ensure the proper protection of networks. This often requires a comprehensive security program that provides a real-time view into your network to allow for proactive responses to potential threats. Download this whitepaper to read more on the best ways to approach critical infrastructure protection.


Emerging Cyber Threats Demand New Thinking

Government agencies need a better approach to dealing with cybersecurity threats, and they know it. A recent survey by the 1105 Government Information Group found that government agencies are not satisfied with current efforts to protect their information from the dynamic threat environment. Download this research report to uncover more findings, including what agencies view as the top threat to their organization.


A Revolutionary Approach to Network Visibility

Enterprise data centers bring together all of the benefits and challenges of the latest networking architectures. Virtualization technology, wireless and mobility, and use of clouds for infrastructure and applications have produced lower costs, better performance, and richer user experiences. But they’ve also brought an important challenge. Download this whitepaper to read more on network visibility and the current best practices in data center consolidation.


Advanced Case Management: Making its Mark in Key Government Sectors

Government agencies faced with shrinking budgets yet ongoing pressure to deliver superior services to the public need smarter ways to handle their growing, increasingly complex caseloads. Advanced case management, as a strategy, can help government agencies alleviate many of the challenges associated with claims and social services processes.


The Next Evolution of Data Warehousing: Smart Consolidation Driving a new level of Agility and Performance

This whitepaper can help organizations develop information strategies that match their evolving environment, and develop ecosystems that encompass the new multitude of information sources; data volume, variety and velocity; and complex business needs. With a smart consolidation strategy, organizations can do more than keep pace with the data revolution - they can truly use it to their advantage.


Modernization through Virtualization

The Government Printing Office’s chief information officer, Chuck Riddle, said the agency’s mission hasn’t changed much since it opened in 1861, but technology has changed the way that mission is carried out. Download this whitepaper to learn more on virtual desktop infrastructure, including the four goals of information technology in the digital age.


Hadoop for Dummies

In this whitepaper you will learn about the various infrastructures available for managing big data and how to determine which one is appropriate for handling your agency's needs.


Build Trust into Mobile Solutions

Many agencies seek to minimize the cost of deploying and managing mobile devices but security capabilities and hardware configuration management considerations vary depending on the operating system the devices employ. By focusing investment and support on a preferred platform, government IT shops can limit the range of expertise necessary to ensure trusted remote communications with their users’ mobile devices. Download this informative whitepaper to learn expert advice on how to improve your agency’s mobile security strategies.


Filling Gaps in Your Cybersecurity Infrastructure

The traditional cybersecurity infrastructure contains several detection, analysis and remediation gaps. Today, organizations need to focus on two main things: detecting unknown threats and reducing response time. Download this informative whitepaper to read more on the weaknesses of the traditional cybersecurity model and how agencies are filling the gaps.


Increase Productivity and Security with Identity and Access Management

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. To meet the needs of a changing user population while simultaneously maintaining a security-rich environment, organizations need identity management solutions that can define, grant and remove access privileges to match the user’s job role and actual access requirements.


2012 IBM X-Force Annual Trend and Risk Report

The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done to mitigate it.


How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security

This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.


IBM Security Intrusion Preventions Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers a comprehensive portfolio of intrusion prevention solutions that go beyond traditional intrusion prevention to provide multilayered, end-to-end security that can actually protect networks from attacks before they occur.


Secure By Design: Building Identity-based Security into Today’s Information Systems

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible


Delivering Success that Scales with the Largest Enterprises

IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and event management (SIEM) solutions. In order to support the demands of organizations across industries, IBM offers the geographic reach to serve global organizations and the partner ecosystem required to deliver powerful and comprehensive solutions.


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford duscusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


GameChanger: Rethinking Data Center Design

As agencies begin to upgrade or consolidate their data centers, many are starting to realize that it’s much more complicated than simply combining equipment or facilities. In some cases, the consolidated data center may not have the space, power or cooling available to support virtualized servers or the multitude of equipment that needs to be consolidated. In other cases, existing data centers may not have the infrastructure required to support the sheer volume of data that must be stored and processed. Download this in-depth report for more on a different approach to data center design.


IDC Analyst Connection: Video Trends in the Public Sector

Rich Costello, Senior Analyst Enterprise Communications Infrastructure answers questions from Cisco on trends, use cases, key considerations and strategies for deploying video conferencing and telepresence within public sector.


Telework Solutions for Government

From the aggressive telework program of the U.S. General Services Administration to Georgia’s tax credits for private sector telecommuting programs, agencies at all levels of government are embracing telework for a variety of reasons. By leveraging Adobe technologies government employees are enabled to work anywhere, anytime—plus it makes them more productive and efficient working in the agency’s office. Downlaod this whitepaper for more on Adobe's telework solutions