What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here

Whitepaper List

Accelerating Economic Growth and Vitality through Smarter Public Safety Management

Many public safety agencies need to do more with less and link spending to outcomes. The global trends highlighted in this report show the increasing challenges and issues confronting public safety agencies. This white paper describes how developing competencies in five key area can help public safety agencies more effectively do their jobs in the face of extremely important and difficult sets of issues.

Special Report: A Virtual Infrastructure

Agencies have to invest in order to achieve the kinds of efficiencies in their operations that both administration and congressional authorities are constantly demanding from them. Virtualization, with its inherent promise of being able to do more with the technology that’s available, is an option whose attraction is increasingly obvious. Although virtualization has been around as a concept for a long time, it’s only begun to proliferate in government as a result of mandates such as the Office of Management and Budget’s Federal Data Center Consolidation Initiative (FDCCI), launched early in the Obama administration’s first term. Budget pressures and other requirements, such as the need for agencies to boost teleworking, are now putting a focus on other technologies such as desktop and application virtualization. Download this in depth special report for more insight into Virtual Infrastructure.

Telco Acronyms Guide v2

By popular demand! The second edition of The Telco Acronyms Guide, is a handy guide to help you decipher the telecom industry’s acronym alphabet soup. Inside, you’ll find over 3,000 entries!

GameChanger: Data Loss Prevention

Although data security has long been an important issue in government, it has taken on much greater importance in recent years. The sense of urgency has been heightened by several high profile data breaches resulting in the exposure of personal information of tens of millions of military personnel, veterans and private citizens. Download now to lead more.

Identity and Access Management for the Real World

This white paper discusses a revolutionary approach to identity and access management, available through Quest One Identity Solutions, that actually reduces complexity, accelerates time-to-value, and enables the business to drive IAM.

Bring Your Own Device: How Do State and Local Governments Address the Proliferation of Employee Devices?

By the end of 2012, the number of mobile devices will exceed the number of people on the planet. And in increasing numbers, government employees are using their tablets and smartphones for work—whether or not their employer has a formal bring-your-own-device (BYOD) policy. Is BYOD a bane or boon for government? Find out in the complimentary whitepaper.

How Architecture Enables a Mobile, Work-Anywhere Government

This white paper will outline the main challenges facing government organizations trying to modernize their IT infrastructures to support improved service to citizens and higher productivity for their employees through mobile solutions.

Ensuring High Availability for Critical Systems and Applications

Read this technical brief to see how Quest SharePlex(r) for Oracle can help organizations ensure high availability of their Oracle databases to improve overall system availability. Topics include offloading reporting, hardware and software changes, and Oracle platform migrations as well as disaster recovery strategies.

IBM Rational System Architect DoDAF 2.0 Migration Toolkit

Users in the DoD, the aerospace and defense industries have created and reused model assets over an extended period of time for various projects. The DoD has issued a directive calling for the use of DoDAF version 2.0, making migration or rebuilding of these existing assets necessary.

Predictive Coding For Dummies

Increasingly, agencies are challenged with information requests due to things like on-going legal investigations. Agencies are required to produce electronically stored information (EIS) in response to these requests but, for many, this process (eDiscovery) can be time consuming and costly. This report reviews predictive coding technology as a new approach to document review.

Defining a Blueprint for a Smarter Data Center for Flexibility and Cost-effectiveness

IT managers must choose between spending to maintain existing systems and engaging in new developments. Analytics services can help provide insights into your data center to balance these demands and unlock greater

The Transformation of Education through State Education Clouds

Cloud computing represents a revolutionary technological paradigm shift that can dramatically improve the quality of education for all students in a given state, from K-12 to higher education. Through the Internet, it can deliver the most advanced software and educational materials, hardware resources and services to students and educators in even the most impoverished or remote school districts in the state, without the need for advanced IT expertise at those locations.

Mobile Strategies for Government

This white paper will review the benefits of a forward-looking mobile strategy, the challenges and opportunities of emerging bring-your-own-device (BYOD) strategies, mobile security, device and wireless provider selection, and how to ensure that a wireless network infrastructure supports mobile activities.

Smart Solutions: Stalwart Enterprise Asset Management System

A well designed, innovative asset management system can accurately track and account for organizational assets, while providing affordability upfront, and minimizing recurring costs. Review this complimentary whitepaper to learn how your organization can find the best asset management solution.

Snapshot: Information Sharing

Recent advances in cloud computing, mobility, networking and related technologies have helped government officials approach information sharing in new ways. Download this complimentary whitepaper to learn about the Digital Government Strategy and how it can energize information-sharing initiatives among federal agencies.

Fraud Detection and Prevention in the Public Sector

This complimentary white paper highlights the value of having a framework of organization-wide fraud detection and prevention to help discover and combat fraud before it occurs. Learn how a consistent view of activity in real time makes it easy to flag suspicious transactions identify existing or potential perpetrators, uncover schemes in progress, and document instances of FWA.

Building a Business Case for BPM – a Fast Path to Real Results

Business Process Management (BPM) initiatives are growing in popularity. With a relatively low investment in technology and resources, you can achieve huge gains in process efficiency, productivity, control, and business agility. Download this whitepaper to learn about a repeatable framework for developing a business case for new or continued justification of BPM projects – with the objective being to help accelerate the startup time and enable more organizations to realize success from BPM.

Recognize the Many Faces of Fraud

Fraud is big business. The range of fraud and the resourcefulness of fraudsters pose a daunting problem for those charged with its detection and prevention. Yet each of these criminal activities leaves a trail of behavioural and transactional data that can be detected to prevent future transactions.

Four steps to improving your security in the cloud

This whitepaper explores the effects of cloud computing on enterprise security and the associated opportunities and challenges. We will take a comprehensive look at the importance of security in cloud and discuss how you can use the technology you already have — such as SELinux and sVirt — to improve your security in the cloud.

Integrated Intelligence Platform for Government: Focus on the Work, not the Tools

Without a unified work environment, government agencies can’t efficiently derive value from the growing volume of information available. Read this to see how integrated intelligence platform (IIP) for government integrates all the applications you need to turn data into insights. So you can focus on the work, not the tools.

Functional, Flexible, Fiscally Responsible Cloud Solutions for Government

Government agencies are finding new approaches to effectively deliver services to constituents – and manage budgets. Read this white paper to learn more about cloud solutions that can help these agencies take advantage of economies of scale and optimize workloads.

Ten Cybersecurity Myths Busted

Firewalls and antivirus are all you need to protect your agencies resources. Fact or fiction? Download 10 Cybersecurity Myths Busted and you will soon know. This series explores tip and tricks to make your agency more successful in the ever changing world of networking.

BYOD in Government: Prepare for The Rising Tide

Read Forrester’s recent study of the use of personal devices for work purposes within government agencies. Learn what it discovered about use, policy and security concerns and gain a valuable starting point for embarking on the journey toward BYOD.

GameChanger: Big Data

Depending on how it’s viewed, big data presents either an enormous headache, or an amazing opportunity. The ability to sift through massive amounts of structured and unstructured data to reveal useful facts in real-time may help government organizations make better decisions that streamline operations and refine constituent services. Download to learn more.

Network Visibility

Managing an enterprise network to maintain predictable and reliable performance and security is a challenging task, always evolving thanks to federal initiatives and mandates such as cloud computing, virtualization and consolidation. Download this whitepaper to learn how you can proactively manage your complex enterprise communications!

Top 5 Reasons You Need a Data Replication Solution

Download this free, insight-packed business brief to see how SharePlex beats the competition in the areas that matter most: cost, simplicity, support, scalability, and productivity.

Memphis PD: Keeping Ahead of Criminals by Finding the "Hot Spots"

Read this whitepaper to understand how Memphis PD used smart policing tactics to reduce the overall crime volume in Memphis by 30%, making life safer for the citizens that were demanding it.

A New Approach to Security Intelligence

Today's security landscape includes a broader set of attacks and more innovative and targeted attacks coming from persistent adversaries. This solutions guide explores Splunk's unique security intelligence approach that monitors for known threats as reported by rule based systems and also watches for unknown threats using extensive analytics on system and user behavior.Read how security teams are bringing their investigations to the next level.

Cloud Services

Download this complimentary whitepaper to learn the benefits and limitations of IaaS, four cloud trends you need to know, and how to address compliance issues in the cloud.

Network Visibility: The Critical Need for Application Discovery & Dependency Mapping

In today’s dynamic world, monitoring and analyzing network performance is vital. What is running on your network and how accurately can you analyze the relationships and dependencies of vital applications? Understand these interdependencies before, during and after your IT implementations and mandated changes.

DoDAF 2.0 Migration Toolkit

The Department of Defense and the US Government Accountability Office (GAO) have mandated the use of DoDAF 2.0, which is conceptually different from previous DoDAF versions. By using a DoDAF 2.0 Migration Toolkit, organizations can reduce the complexity and risk of data loss and support a more effective migration.

Converging Communications

There’s a wide range of communications technologies now appearing and still to be developed that promise far more flexible and faster ways for people to collaborate with each other. Review this complimentary whitepaper to learn what agencies should look out for as they plan their future initiatives.

Intelligent Transportation

IBM Intelligent Transportation provides citywide traffic visibility to help alleviate congestion and rapidly respond to incidents.

Reducing Energy Consumption in the Data Center

The surging demands on data centers for processing power, virtualization and consolidation are making the thermal management of them more challenging. This paper focuses on increasing cooling efficiency using air containment systems.

Defending Cyberspace: A Framework to Improve the Supply Chain

Maintaining security in cyberspace is a never-ending battle. However, there is a framework to help federal organizations better defend themselves and overcome any attacks. You will understand how the framework helps federal agencies establish a more secure, resilient and efficient global supply chain—and conduct business in a safer cyberspace.

The Benefits of Cloud Computing

Recent advances in the performance of digital components have resulted in a massive increase in the scale of IT environments – driving the need to manage them as a unified cloud. Learn more about the benefits of cloud computing in terms of responsiveness, effectiveness and efficiency in IT service delivery.

Five Steps to Achieve Success in Your Application Security Program

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.

Secure Data Access in a Mobile Universe

The Economist Intelligence Unit in June 2012 conducted a global survey of senior executives to explore how organizations can accommodate rising demands for mobile access to business information while minimizing the security risks to proprietary data.

Breaking News: Big Data is Solved!

The good news is that solutions can now be delivered to address the data management needs posed by Big Data. Without much risk of contradiction, it can be said that the requirements of absorbing and storing Big Data have been solved by industry to date, by a combination of both the demand-driven commercial-off-the-shelf software manufacturers and by the voluntary software development contributions of participants in the free and open source consortia.

Extending Security Intelligence with Big Data

This whitepaper details a solution that enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.

Avoiding Insider Threats to Enterprise Security

This whitepaper outlines a solution that helps organizations securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability.

Consolidated Security Management for Mainframe Clouds

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

Continuous Monitoring for Government Agencies

This whitepaper details how government agencies can gain a 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.

Managing Identities and Access in the Cloud

The ability to share services and information with various departments, partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption.

Security Intrusion Prevention Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. This whitepaper presents a comprehensive portfolio of intrusion prevention solution that go beyond traditional intrusion prevention to provide multilayered,end-to-end security that can actually protect networks from attacks before they occur.

IT Executive Guide to Security Intelligence

This white paper discusses how security intelligence addresses threat detection shortcomings and empowers organizations to maintain comprehensive and cost-effective information security.

Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.