What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here

Whitepaper List

Modernization through Virtualization

The Government Printing Office’s chief information officer, Chuck Riddle, said the agency’s mission hasn’t changed much since it opened in 1861, but technology has changed the way that mission is carried out. Download this whitepaper to learn more on virtual desktop infrastructure, including the four goals of information technology in the digital age.

Hadoop for Dummies

In this whitepaper you will learn about the various infrastructures available for managing big data and how to determine which one is appropriate for handling your agency's needs.

Build Trust into Mobile Solutions

Many agencies seek to minimize the cost of deploying and managing mobile devices but security capabilities and hardware configuration management considerations vary depending on the operating system the devices employ. By focusing investment and support on a preferred platform, government IT shops can limit the range of expertise necessary to ensure trusted remote communications with their users’ mobile devices. Download this informative whitepaper to learn expert advice on how to improve your agency’s mobile security strategies.

Filling Gaps in Your Cybersecurity Infrastructure

The traditional cybersecurity infrastructure contains several detection, analysis and remediation gaps. Today, organizations need to focus on two main things: detecting unknown threats and reducing response time. Download this informative whitepaper to read more on the weaknesses of the traditional cybersecurity model and how agencies are filling the gaps.

Increase Productivity and Security with Identity and Access Management

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. To meet the needs of a changing user population while simultaneously maintaining a security-rich environment, organizations need identity management solutions that can define, grant and remove access privileges to match the user’s job role and actual access requirements.

2012 IBM X-Force Annual Trend and Risk Report

The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done to mitigate it.

Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford duscusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.

Delivering Success that Scales with the Largest Enterprises

IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and event management (SIEM) solutions. In order to support the demands of organizations across industries, IBM offers the geographic reach to serve global organizations and the partner ecosystem required to deliver powerful and comprehensive solutions.

IBM Security Intrusion Preventions Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers a comprehensive portfolio of intrusion prevention solutions that go beyond traditional intrusion prevention to provide multilayered, end-to-end security that can actually protect networks from attacks before they occur.

How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security

This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.

Secure By Design: Building Identity-based Security into Today’s Information Systems

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible

GameChanger: Rethinking Data Center Design

As agencies begin to upgrade or consolidate their data centers, many are starting to realize that it’s much more complicated than simply combining equipment or facilities. In some cases, the consolidated data center may not have the space, power or cooling available to support virtualized servers or the multitude of equipment that needs to be consolidated. In other cases, existing data centers may not have the infrastructure required to support the sheer volume of data that must be stored and processed. Download this in-depth report for more on a different approach to data center design.

IDC Analyst Connection: Video Trends in the Public Sector

Rich Costello, Senior Analyst Enterprise Communications Infrastructure answers questions from Cisco on trends, use cases, key considerations and strategies for deploying video conferencing and telepresence within public sector.

Telework Solutions for Government

From the aggressive telework program of the U.S. General Services Administration to Georgia’s tax credits for private sector telecommuting programs, agencies at all levels of government are embracing telework for a variety of reasons. By leveraging Adobe technologies government employees are enabled to work anywhere, anytime—plus it makes them more productive and efficient working in the agency’s office. Downlaod this whitepaper for more on Adobe's telework solutions

Adobe® Connect™: Bringing together video and next-generation web conferencing

Many businesses can achieve the benefits of face-to-face meetings through an investment in a video or web conferencing solution, saving the company both travel time and resources. Selecting the right technology to replace in-person meetings begins with understanding your organizational needs and pairing these needs with the optimal conferencing solution. Download this whitepaper for more on Adobe Connect.

Success Story: Adobe Connect Solution to facilitate collaboration and peer engagement across Department of Defense

In June 2007, DISA awarded Defense Connect Online (DCO), a two-part Adobe Connect solution for collaboration and engagement across DoD global operations. Two different systems comprise the Adobe Connect implementation, one for the unclassified network, and one for the classified network. A pre-release version of DCO was tested over a five-month period and went live in April 2008, enabling deployed troops, supporting personnel, and military leaders to collaborate effortlessly across locations worldwide. Read more about how DISA enabled secure collaboration with Adobe Connect.

Solution Brief: Discover the power of Adobe Connect for Web Meetings

Adobe Connect for Web Meetings significantly improves collaboration with your colleagues, partners, and customers anytime, anywhere, across virtually any device. With Adobe Connect, meeting organizers can go far beyond simple screen sharing and deliver easy-to-access, rich meetings from a desktop or directly from a mobile device.

Expert Q&A: Continuous Monitoring

As attacks on agency networks and assets become ever more divergent and sophisticated, continuous monitoring will be a critical element in an organization’s cybersecurity strategy. But it’s not an easy thing to implement. Download this Q&A report for industry perspectives on the various elements of effective continuous monitoring, and why it’s not just one more technology program.

Research Report: Collaboration Solutions Transforming Government

Government agencies are getting serious about online collaboration tools because they see the opportunity to improve enterprise-wide information sharing, support real-time communications during a crisis, and to reduce the money they spend on large in-person meetings or conferences. A recent survey conducted by the 1105 Government Information Group shows that these and other potential benefits are leading many agencies to deepen their investment in collaboration tools and to make collaboration part of their organizational culture. Download this exclusive research report for more on collaboration trends in government.

Contract Guide: GSA IT Schedule 70

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.

Government by Design: Using Strategic Planning to Design the Business of Government

This white paper introduces government by design and describes how it can address the growing challenges and pains felt at all levels of government.

Overcoming Challenges of Asset Management Amid Declining Federal Budgets

Modern asset management solutions are often no longer included in large program budgets and logistics professionals and engineers at federal agencies are being tasked to do more with less and extend the service life of existing assets. Without the ability to piggy-back modern asset management solutions onto large program budgets, agencies must find other ways to modernize their asset management solutions, and they have many good reasons to do so. Built on a single platform, IBM Maximo® Asset Management solutions for federal government deliver seamless integration and support maintenance of all asset types across the enterprise, from production and facilities to transportation and IT.

Optimizing Data Storage in Federal Government Data Centers

Federal IT and data center managers face an unprecedented and inescapable perfect storm of requirements related to the management and security of mission-critical and mission essential data. The alignment of mission and service delivery and enabling information requires full information lifecycle visibility, management and automation to converge IT capabilities with mission and service delivery objectives—taking into account the farreaching regulatory and compliance mandates that serve as overarching constraints.

All Data Archiving Tools Are Not Created Equal: The Importance of Index and Search

Most organizations possess considerable intellectual property. Unfortunately, that information is useless unless employees know how to find it. Archiving tools with powerful index and search capabilities can help maximize the value of intellectual property.

Cloud Infrastructure for the Real World

The evolutionary process of cloud adoption has been leading to an open hybrid approach – a new model for IT – demanding organizations to manage traditional and cloud workloads simultaneously. Learn how Red Hat is making hybrid a reality with Red Hat Cloud Infrastructure.

Special Report: Infrastructure Security

Evolve or die. That’s the imperative guiding the development of cybersecurity technologies and strategies across government and industry. The ongoing evolution of the federal IT enterprise, extended in all directions by advances in networking and mobile technology, must be matched to similar advances in information and network security. But above all, the nature of the current cybersecurity threats requires a new way of thinking. The old approach to cybersecurity, which was based on defending the perimeter, cannot hold up against the wide array of cyber threats that agencies now face. Download this special report for in-depth articles on infrastructure security.

Invest to Save with Collaboration Technologies

With budgets and staffs stretched thin, public sector organizations are searching for ways to cut costs and help employees work more productively. IT leaders recognize that collaborative voice, video, and mobile technologies could enable their organizations to achieve these goals, but they expect to implement these technologies when investment dollars are more plentiful. Download this whitepaper for an in-depth look at how collaboration technologies are helping IT managers “invest to save” by delivering significant long-term savings while improving the effectiveness of their organizations.

Special Report: Best Practices for Meeting Big Data Challenges

Big data is a top priority for CIOs, but few know exactly what it is – and what it can help their organizations achieve. As the creation of data has multiplied recently, IT organizations are left wondering how to manage those data stores while at the same time being asked to help the business side of the house innovate, cut costs and improve end-user satisfaction. Download this special report for in-depth articles on meeting the challenges you face as you take on "big data."

Building a Private Optical Network

Are you wrestling with the options of building dedicated, private networks or continuing to buy managed network services? This paper describes the advantages of a building a private optical network and the technologies to consider.

We Have the Capacity to Handle Your Back (haul): Wireless Solutions for Government Networks

Gigabit Ethernet (GigE) wireless solutions are an ideal way to backhaul video imaging systems for public safety and surveillance purposes, national security and intelligence. This paper will explore the vital role that wireless solutions play for government agencies

Government Cloud Collaboration Services: Collaborate More Easily and Effectively While Reducing IT Costs

Like many organizations, federal agencies can drive progress through social collaboration. Read the solution brief to see how secure, scalable, cloud-based solutions can help your agency collaborate socially without any extra cost, complexity or compliance concerns. See how these tools can also help enable better decisions to be made faster.

The Power of Cloud: Driving Business Model Innovation

Although cloud capabilities offer numerous opportunities to drive business innovation, its potential beyond technological capabilities remains virtually untapped. Read the white paper to learn more about the benefits of cloud-enabled business models in promoting sustainable competitive advantage.

Key Factors in Modernizing Backup and Recovery

There is a definite need for better data protection solutions in today’s data centers. Learn the trends that have made modernizing backup and recovery an urgent priority, the key requirements for solution offerings, and how Symantec NetBackupTM appliances deliver a simple, complete, and cost-effective solution.

Manage Identities and Access for Continuous Compliance and Reduced Risk

Most organizations have invested in security tools and techniques. But layered defenses are not the same as building security intelligence into your environment. Read this whitepaper and learn how to provide value beyond risk control alone—with accountability and transparency for user entitlements throughout the user lifecycle.

Special Report: Business Continuity

If the unthinkable were to occur and your agency had to continue providing essential services and performing essential activities, would you know what to do and where to go? In most cases, the answer is yes. Today, thanks to lessons learned from past disasters and government requirements, most government agencies and departments have some type of business continuity plan that allows them to maintain critical functions.

Special Report: Rugged IT

The rugged IT market is about to get a wake-up call. For a long time, both buyers and sellers alike accepted the notion that buying rugged IT means giving up a lot of features that come with standard products. But as the general IT market continues to emphasize mobility and smaller device form factors, those lower expectations are bound to be revisited.

Economics Benefits of Cisco’s Cloud Strategy

ACG Research models a private cloud implementation of cloud infrastructure compared with individual virtualized data centers as a baseline. The model includes expected benefits from taking advantage of the end-to-end infrastructure and by optimizing services across public and private clouds.

The Transformation of Education through State Education Clouds

Cloud computing represents a revolutionary technological paradigm shift that can dramatically improve the quality of education for all students in a given state, from K-12 to higher education. Through the Internet, it can deliver the most advanced software and educational materials, hardware resources and services to students and educators in even the most impoverished or remote school districts in the state, without the need for advanced IT expertise at those locations.

Intelligent Operations Center for Smarter Cities

Learn how your city can improve the efficiency of everything from daily operations to recovery responses in emergency situations, without increasing costs. Streamlining these functions are critical to providing enhanced services to your citizens.

The Five Must-Haves Of Big Data Storage

Is your company struggling to keep up with unprecedented data growth? If so, you're not alone. CIOs now rank data growth as their top concern, and making sense of all that data is their top priority. Download this complimentary whitepaper to learn how your agency can handle massive volumes of structured and unstructured data.

The Path to Smarter Government

Rising costs and revenue shortfalls are affecting the ability of governments to meet the level of services citizens expect. The path to a smarter government begins with the budget and finance process. The evershifting landscape means that governments today need to rely on technology to help navigate its complexities. Download now to read learn how!

Accelerating Economic Growth and Vitality through Smarter Public Safety Management

Many public safety agencies need to do more with less and link spending to outcomes. The global trends highlighted in this report show the increasing challenges and issues confronting public safety agencies. This white paper describes how developing competencies in five key area can help public safety agencies more effectively do their jobs in the face of extremely important and difficult sets of issues.

Special Report: A Virtual Infrastructure

Agencies have to invest in order to achieve the kinds of efficiencies in their operations that both administration and congressional authorities are constantly demanding from them. Virtualization, with its inherent promise of being able to do more with the technology that’s available, is an option whose attraction is increasingly obvious. Although virtualization has been around as a concept for a long time, it’s only begun to proliferate in government as a result of mandates such as the Office of Management and Budget’s Federal Data Center Consolidation Initiative (FDCCI), launched early in the Obama administration’s first term. Budget pressures and other requirements, such as the need for agencies to boost teleworking, are now putting a focus on other technologies such as desktop and application virtualization. Download this in depth special report for more insight into Virtual Infrastructure.

Telco Acronyms Guide v2

By popular demand! The second edition of The Telco Acronyms Guide, is a handy guide to help you decipher the telecom industry’s acronym alphabet soup. Inside, you’ll find over 3,000 entries!

GameChanger: Data Loss Prevention

Although data security has long been an important issue in government, it has taken on much greater importance in recent years. The sense of urgency has been heightened by several high profile data breaches resulting in the exposure of personal information of tens of millions of military personnel, veterans and private citizens. Download now to lead more.

Identity and Access Management for the Real World

This white paper discusses a revolutionary approach to identity and access management, available through Quest One Identity Solutions, that actually reduces complexity, accelerates time-to-value, and enables the business to drive IAM.

Bring Your Own Device: How Do State and Local Governments Address the Proliferation of Employee Devices?

By the end of 2012, the number of mobile devices will exceed the number of people on the planet. And in increasing numbers, government employees are using their tablets and smartphones for work—whether or not their employer has a formal bring-your-own-device (BYOD) policy. Is BYOD a bane or boon for government? Find out in the complimentary whitepaper.

How Architecture Enables a Mobile, Work-Anywhere Government

This white paper will outline the main challenges facing government organizations trying to modernize their IT infrastructures to support improved service to citizens and higher productivity for their employees through mobile solutions.

Ensuring High Availability for Critical Systems and Applications

Read this technical brief to see how Quest SharePlex(r) for Oracle can help organizations ensure high availability of their Oracle databases to improve overall system availability. Topics include offloading reporting, hardware and software changes, and Oracle platform migrations as well as disaster recovery strategies.

IBM Rational System Architect DoDAF 2.0 Migration Toolkit

Users in the DoD, the aerospace and defense industries have created and reused model assets over an extended period of time for various projects. The DoD has issued a directive calling for the use of DoDAF version 2.0, making migration or rebuilding of these existing assets necessary.