What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepaper List


Fraud Detection and Prevention in the Public Sector

This complimentary white paper highlights the value of having a framework of organization-wide fraud detection and prevention to help discover and combat fraud before it occurs. Learn how a consistent view of activity in real time makes it easy to flag suspicious transactions identify existing or potential perpetrators, uncover schemes in progress, and document instances of FWA.


Building a Business Case for BPM – a Fast Path to Real Results

Business Process Management (BPM) initiatives are growing in popularity. With a relatively low investment in technology and resources, you can achieve huge gains in process efficiency, productivity, control, and business agility. Download this whitepaper to learn about a repeatable framework for developing a business case for new or continued justification of BPM projects – with the objective being to help accelerate the startup time and enable more organizations to realize success from BPM.


Recognize the Many Faces of Fraud

Fraud is big business. The range of fraud and the resourcefulness of fraudsters pose a daunting problem for those charged with its detection and prevention. Yet each of these criminal activities leaves a trail of behavioural and transactional data that can be detected to prevent future transactions.


Four steps to improving your security in the cloud

This whitepaper explores the effects of cloud computing on enterprise security and the associated opportunities and challenges. We will take a comprehensive look at the importance of security in cloud and discuss how you can use the technology you already have — such as SELinux and sVirt — to improve your security in the cloud.


Integrated Intelligence Platform for Government: Focus on the Work, not the Tools

Without a unified work environment, government agencies can’t efficiently derive value from the growing volume of information available. Read this to see how integrated intelligence platform (IIP) for government integrates all the applications you need to turn data into insights. So you can focus on the work, not the tools.


Functional, Flexible, Fiscally Responsible Cloud Solutions for Government

Government agencies are finding new approaches to effectively deliver services to constituents – and manage budgets. Read this white paper to learn more about cloud solutions that can help these agencies take advantage of economies of scale and optimize workloads.


Ten Cybersecurity Myths Busted

Firewalls and antivirus are all you need to protect your agencies resources. Fact or fiction? Download 10 Cybersecurity Myths Busted and you will soon know. This series explores tip and tricks to make your agency more successful in the ever changing world of networking.


BYOD in Government: Prepare for The Rising Tide

Read Forrester’s recent study of the use of personal devices for work purposes within government agencies. Learn what it discovered about use, policy and security concerns and gain a valuable starting point for embarking on the journey toward BYOD.


GameChanger: Big Data

Depending on how it’s viewed, big data presents either an enormous headache, or an amazing opportunity. The ability to sift through massive amounts of structured and unstructured data to reveal useful facts in real-time may help government organizations make better decisions that streamline operations and refine constituent services. Download to learn more.


Network Visibility

Managing an enterprise network to maintain predictable and reliable performance and security is a challenging task, always evolving thanks to federal initiatives and mandates such as cloud computing, virtualization and consolidation. Download this whitepaper to learn how you can proactively manage your complex enterprise communications!


Top 5 Reasons You Need a Data Replication Solution

Download this free, insight-packed business brief to see how SharePlex beats the competition in the areas that matter most: cost, simplicity, support, scalability, and productivity.


Memphis PD: Keeping Ahead of Criminals by Finding the "Hot Spots"

Read this whitepaper to understand how Memphis PD used smart policing tactics to reduce the overall crime volume in Memphis by 30%, making life safer for the citizens that were demanding it.


A New Approach to Security Intelligence

Today's security landscape includes a broader set of attacks and more innovative and targeted attacks coming from persistent adversaries. This solutions guide explores Splunk's unique security intelligence approach that monitors for known threats as reported by rule based systems and also watches for unknown threats using extensive analytics on system and user behavior.Read how security teams are bringing their investigations to the next level.


Cloud Services

Download this complimentary whitepaper to learn the benefits and limitations of IaaS, four cloud trends you need to know, and how to address compliance issues in the cloud.


Network Visibility: The Critical Need for Application Discovery & Dependency Mapping

In today’s dynamic world, monitoring and analyzing network performance is vital. What is running on your network and how accurately can you analyze the relationships and dependencies of vital applications? Understand these interdependencies before, during and after your IT implementations and mandated changes.


DoDAF 2.0 Migration Toolkit

The Department of Defense and the US Government Accountability Office (GAO) have mandated the use of DoDAF 2.0, which is conceptually different from previous DoDAF versions. By using a DoDAF 2.0 Migration Toolkit, organizations can reduce the complexity and risk of data loss and support a more effective migration.


Converging Communications

There’s a wide range of communications technologies now appearing and still to be developed that promise far more flexible and faster ways for people to collaborate with each other. Review this complimentary whitepaper to learn what agencies should look out for as they plan their future initiatives.


Intelligent Transportation

IBM Intelligent Transportation provides citywide traffic visibility to help alleviate congestion and rapidly respond to incidents.


Reducing Energy Consumption in the Data Center

The surging demands on data centers for processing power, virtualization and consolidation are making the thermal management of them more challenging. This paper focuses on increasing cooling efficiency using air containment systems.


Defending Cyberspace: A Framework to Improve the Supply Chain

Maintaining security in cyberspace is a never-ending battle. However, there is a framework to help federal organizations better defend themselves and overcome any attacks. You will understand how the framework helps federal agencies establish a more secure, resilient and efficient global supply chain—and conduct business in a safer cyberspace.


The Benefits of Cloud Computing

Recent advances in the performance of digital components have resulted in a massive increase in the scale of IT environments – driving the need to manage them as a unified cloud. Learn more about the benefits of cloud computing in terms of responsiveness, effectiveness and efficiency in IT service delivery.


Five Steps to Achieve Success in Your Application Security Program

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.


Secure Data Access in a Mobile Universe

The Economist Intelligence Unit in June 2012 conducted a global survey of senior executives to explore how organizations can accommodate rising demands for mobile access to business information while minimizing the security risks to proprietary data.


Breaking News: Big Data is Solved!

The good news is that solutions can now be delivered to address the data management needs posed by Big Data. Without much risk of contradiction, it can be said that the requirements of absorbing and storing Big Data have been solved by industry to date, by a combination of both the demand-driven commercial-off-the-shelf software manufacturers and by the voluntary software development contributions of participants in the free and open source consortia.


Extending Security Intelligence with Big Data

This whitepaper details a solution that enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.


Avoiding Insider Threats to Enterprise Security

This whitepaper outlines a solution that helps organizations securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability.


Continuous Monitoring for Government Agencies

This whitepaper details how government agencies can gain a 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.


Consolidated Security Management for Mainframe Clouds

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


IT Executive Guide to Security Intelligence

This white paper discusses how security intelligence addresses threat detection shortcomings and empowers organizations to maintain comprehensive and cost-effective information security.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Security Intrusion Prevention Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. This whitepaper presents a comprehensive portfolio of intrusion prevention solution that go beyond traditional intrusion prevention to provide multilayered,end-to-end security that can actually protect networks from attacks before they occur.


Managing Identities and Access in the Cloud

The ability to share services and information with various departments, partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption.