What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


The Rising Threat of Enterprise Cybercrime

Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.


Staging the Deployment of Private Clouds with IBM SmartCloud Foundation

IBM is in a strong position to facilitate the deployment of private clouds. A key component of IBM’s cloud solutions is SmartCloud Foundation, an integrated set of technologies for deploying private and hybrid clouds. These hardware and software technologies are built on a common architecture, giving customers a smooth upgrade path as they advance along the maturity curve of deploying private clouds.


Cloud without compromise for the US Federal Government

Now enhanced for FedRAMP and FISMA compliance, SoftLayer, an IBM company, offers US Federal agencies a robust cloud foundation for a wide range of agency missions. The latest capabilities allow for federal agencies to deploy solutions designed precisely for their needs, on-demand or in near-real time. Download this FREE whitepaper to discover how SoftLayer is designed for federal standards and how it can provide the cloud without compromise.


The ViewPoint | Going Mobile: How to Boost Productivity and Data Integrity

Download this Q&A to gain further insight from industry leaders addressing the challenges faced by many government agencies as they struggle to balance both security and efficiency.


Contract Guide: SEWP Steps into the Future

After more than two decades, NASA’s Solutions for Enterprise-Wide Procurement (SEWP) government-wide acquisition contract remains one of the most popular vehicles for IT products and related services. But that’s not to say that NASA is resting on its laurels. Instead, the agency continues to listen to its customers and develop new tools and processes to help them meet their IT buying requirements. This special report offers insights into the changes in store when SEWP V opens for business later this year.


The Road to Enterprise PaaS

Interested in leveraging automation technologies and a cloud architecture to make developers more productive?  Learn how PaaS can benefit your agency to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies.  Begin charting your path to PaaS with OpenShift Enterprise.


How the Shared Services Strategy is Bridging the Gap Between Business Managers and IT Shops

Business managers use words like bottom line, efficiency, and productivity. Developers speak in terms of platforms, interoperability, and capabilities. Learn how agencies turn to PaaS with OpenShift Enterprise to bridge the gap between business managers and IT shops, enabling developers to innovate faster and managers to chip away at $46 billion in redundant commodity IT services.


Openshift Enterprise: An On-Premise, Private PaaS by Red Hat

Struggling to keep up with increasing application demand? Platform as a Service (PaaS) can streamline application development processes and make resource management easy with auto-scaling and consistent integration.  Learn how OpenShift Enterprise can help architects standardize development processes, while letting developers focus on their code.


Moving to a Private Cloud? Infrastructure Really Matters!

This Clipper Group paper outlines the importance of the underlying IT infrastructure for private cloud environments and lays the groundwork for clients navigating cloud, highlighting many key aspects of a private cloud infrastructure. Download this informative whitepaper to gain further insight on cloud computing.


IDC Technology Spotlight: The Benefits and Significance of Private Platform as a Service

Shrinking budgets coupled with growing demand for new applications has put a strain on IT organizations leading to the need for an effective PaaS to accelerate app development processes.  Explore PaaS market trends, benefits and an in-depth look at OpenShift Enterprise by Red Hat in this IDC Technology Spotlight.


Continuous Monitoring to Achieve Cybersecurity

As the cyber threat landscape evolves, security methods and tools need to change, too. In this Digital Dialogue, Ken Durbin, manager of Continuous Monitoring Practice at Symantec, explains how the undefined boundaries of the modern IT infrastructure necessitate the deployment of continuous monitoring solutions.


Store Less, Spend Less: Managing Data According to Its Economic Value

The term “big data” is now passing into the common vernacular. Although initially as much about the power of business analytics and data mining, the semantics have now swung to encapsulate data that is just big and of course, resource hungry, whether in terms of management, sheer storage capacity, or budgets. In that respect, the numbers are getting increasingly alarming: Estimates suggest that 90% of the world’s information was created in the last two years, and 2.5 quintillion bytes of data are created daily. Download this informative whitepaper to gain further insights into the conflicting demands of storage management.


Stopping Zero-Day Exploits for Dummies

Cyber attacks are growing every day and can become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you will discover the zero-day exploits and threats used to compromise your agency.


Data Flows Faster at Montgomery County Dept. of Liquor Control

With the implementation of backup and recovery solutions, the Montgomery County, MD, Department of Liquor Control has reduced backup times from up to 16 hours under their old system to just one to two hours. Learn how.


Big Five in Overdrive: Are State and Local Networks Ready?

As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.


Meet Business Demands and Drive IT Innovation

The demands for new IT solutions can often times outpace the ability of the IT team to deploy them, forcing the organization to be more reactive than proactive. Read this whitepaper to learn how your agency can gain the infrastructure flexibility needed to rapidly respond to evolving IT needs.


Journey to the Hybrid Cloud

Cloud adoption continues to expand beyond the base of cutting-edge early adopters and is now reaching the "early mainstream" stage, increasingly being looked at by enterprises as a viable model for agile, cost-effective IT delivery. However, the prevailing binary paradigm of cloud infrastructure (public versus private) limits the extent to which enterprises can fully leverage the on-demand, self-service, elastic resource provisioning attributes of public cloud while maintaining the same security, reliability, performance, and management frameworks present in current private cloud implementations. Download this informative whitepaper to learn how hybrid cloud solves this problem.


Tech Tips: Getting Started with VMware vCloud Hybrid Service

VMware vCloud® Hybrid Service™ is a secure, infrastructure-as-a-service cloud, owned and operated by VMware, built on the trusted foundation of VMware vSphere®. The service supports existing workloads as well as new application development, giving IT a common platform for seamlessly extending their data center to the cloud. Download this whitepaper to learn the top five tech tips to keep in mind when migrating workloads to vCloud Hybrid Service.


VDI Deployment Comes Alive: Muskegon County Case Study

The IT team of Muskegon County began deploying a VDI infrastructure under a very aggressive schedule to modernize a computing infrastructure that hosted a large number of older, mostly outdated computers. Read this case study to learn how the team successfully implemented the infrastructure and what benefits they gained from their virtual desktops.


The New Rules for Storage in the Era of Big Data

The big data era presents new opportunities and advantages for agencies that are able to exploit its capabilities. However, the velocity at which data must be processed poses major challenges as it relates to the IT infrastructure. This whitepaper examines what all-flash storage systems can do to help agencies leverage big data technologies and optimize the benefits they can attain.


Text Analytics in Government: Using Automated Analysis to Unlock the Hidden Secrets of Unstructured Data

This white paper explores how federal, state and local agencies are using text analytics to determine the relevance of digital data so they can accurately gauge public sentiment, influence opinion, shape policy, identify hidden risks and stop fraud.


Viewpoint: Getting the Edge on Insider Threats

Agencies are aware of the need for cyber defense within their infrastructure to protect from insider threats; however it is important for organizations to recognize what data is most at risk for being targeted. Defining the top IT risk scenarios can greatly help agencies analyze and monitor anomalies to enhance the prevention of insider threat attacks. Download this informative Q&A to gain valuable insights from an industry expert in the field of cybersecurity and insider threats.


Web Application Security Requires Multi-Pronged Approach

Attackers are increasingly targeting web-based applications, but agencies can bolster their security posture by infusing the right mix of process, technology and vigilance into their organizations. Download this informative digital dialogue to learn more on the best practices in web-based application security.


An Executive Guide to Analytics Infrastructure: Imperatives for Advanced Analytics

Get the most information from your data. Business has never been faster and is increasingly dependent on the timely analysis of large volumes of data for strategic and operational decisions. As executives come to rely on advanced analytics, the importance of a robust IT infrastructure cannot be overstated.Data comes from everywhere; make sure you get it in time, every time.


The New Currency of Business: Getting Big Value out of Big Data

Today, data is the new currency of business. But many organizations have yet to make the most of data insights that drive better outcomes. This e-book describes how businesses can manage information with greater efficiency, speed and continuity for improved ROI through IBM® Storwize® platform and IBM FlashSystem™ Family. Case studies illustrate how various industries are successfully utilizing these solutions to optimize their performance and efficiency.


Snapshot: Solutions for Collaborative Government

Collaboration has always been a part of the way government does business, but until relatively recently it was something that happened only at certain times and between select groups of people. That is because with the older generation of tools, there was often a fear that collaboration would distract workers and drag down productivity. But new technology has allayed those fears, and now government managers are the numerous benefits of supporting collaboration, from easier sharing of information and faster response to events, to a better use of scarce budget dollars. The focus now is on developing the goals and strategies for successful collaboration initiatives, and providing the best-in-class solutions for employees.


IBM's Next-Generation Smart City Solutions

At the Ovum conference "From Smart to Future Cities" held in June 2013, the emphasis was on how the market is at an inflection point between talking about what "smart city" means and understanding how to implement it. The evidence of the shift is the increasing maturity of the demand side, the development of standards, and the arrival of investment in the form of stimulus funding from government, sovereign wealth funds, and venture capital.


Hybrid Model Expands Cloud Possibilities

Cloud computing has become a critical element in enterprise IT, changing the way organizations use and consume IT resources. IDC estimates that worldwide spending on cloud services will reach more than $100 billion this year. Download this informative digital dialogue to gain more insight on the benefits of hybrid cloud as well as the new possibilities it offers for disaster recovery and capacity management.


Cloud in 2014: A Guide for Government

Cloud is set to play a major role in government. Although agencies are still working out security issues and other policies, they also are deploying cloud technology to meet an increasingly wide array of mission requirements. And the options to government users of cloud are expanding. Hybrid clouds, which support both public and private options, provide a much-needed solution for users, the government’s FedRAMP program offers better choices for secure cloud services, and cloud brokers could take care of most of the procurement angst. Without a doubt, 2014 will be a big year for the cloud.


Research Report: The Virtualization Playbook

The increasing complexity of the government enterprise—and the increasing volume and complexity of the data being managed—is forcing agency IT managers to rethink how they manage the infrastructure. Virtualization is at the center of that. By virtualizing key elements of the data center, agencies gain flexibility, scalability and manageability. And those gains are magnified when agencies integrate those systems into a cohesive whole. At the same time, IT managers are looking to bolster their infrastructures with emerging storage and storage management options. The data center of the future is taking shape now.


Virtualization Key to Meeting IT Goals

Virtualization technology can provide agencies with the agility they need, whether they are dealing with consolidation, automation or security. Download this informative digital dialogue to learn the benefits of adopting a virtualization solution within your organization.


Deciding on the Right Flash Storage for High Density Virtual Infrastructures

Read this whitepaper to discover how IT planners in the Fed space are looking to flash-based storage to allow the quest for scale and density to continue.


Taking Storage to the Next Level

As agencies move more and more of their operations to a virtual infrastructure, they cannot afford to ignore a critical component: Storage management. Download this digital dialogue to learn how Virtual SAN can simplify storage to let software driven policy controls do the work.


GameChanger: The Face of Insider Threats

Cyberthreats of all types are more difficult to detect than ever before, thanks to more efficient and intelligent malicious software, increased use of mobile devices, the volume of network activity and the explosion of cloud computing. At the same time, cybercriminals are becoming more clever, using everything from remote access software, e-mail and instant messaging to removable devices and peer-to-peer networks. Download this GameChanger to get a behind the scenes look at the mitigation and detection of insider threats.


Secure Login Provides Key to Safe, Accessible Citizen Services

It’s become almost a cliché for people to lament how many login names and passwords they have to maintain. Cybersecurity advisors regularly warn people not to use the same password for multiple online services. Problems with the common model of identification and authentication afflict both government agencies offering online services and the users accessing them. Download this informative whitepaper to learn more on the username/password paradigm and the evolution of identity verification.


Best Practices for Cloud Adoption

Discover how your IT organization can become more agile by leveraging Cloud computing to its full potential. Enter a few basic details in this online tool to generate a customized IDC white paper that outlines the benefits and best practices of cloud implementation.


Moving to a Private Cloud? Infrastructure Really Matters!

This Clipper Group paper outlines the importance of the underlying IT infrastructure for private cloud environments and lays the groundwork for clients navigating cloud, highlighting many key aspects of a private cloud infrastructure. This is a great door opener to a conversation about our systems and cloud computing.


Significantly Improving Storage Efficiency — IBM Adds Real-time Compression to Storage

The Clipper Group asks if you are suffering from too much data with an insufficient budget, Storwize V7000 with Real-time Compression may well be the solution you need. If your data center needs to compress both blocks and files, IBM’s plans to enhance its Storwize V7000 Unified, when available, will provide the single platform that the data center needs to simplify deployment. Each will be like getting more shelf space without en-larging the grocery store and without paying the going price for additional shelves. Isn’t that the kind of surprise you want to pull out of your bag of tricks the next time you are asked?


Research Report: Best Practices in Networking and Storage Efficiency

The results of a new survey of government IT professionals reflects a broader recognition that existing infrastructures could soon be overwhelmed by the current rate of growth in data. Sixty-six percent of respondents said their agencies needed “to implement a network architecture that will enable high-velocity data capture, discovery, storage and analytics.” But it’s not just a matter of keeping up with the data. Download this research report to discover more findings, as well as learn how agencies are adopting other technologies that can have a significant impact on their IT infrastructure.


GameChanger: NoSQL

Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.


Top Ten Database Threats

Databases have the highest rate of breaches among all business assets. Failing to safeguard databases that store sensitive data can cripple your operations, result in regulatory violations, and destroy your reputation. Understanding the top database threats and implementing the solutions outlined in this paper will enable you to recognize when you’re vulnerable or being attacked, maintain security best practices, and ensure that your most valuable assets are protected.


Viewpoint: Rapid Detection Key to Security

As cyber threats increase and become more complex, it is more important than ever for organizations to learn the key ingredients to developing a rapid response strategy. Download this insightful Q&A report to gain further knowledge from industry experts on the current cybersecurity atmosphere.


The STAND: Cybersecurity

Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.


NetCents-2: A New Way of Doing Business

The six-year, $24.2 billion NetCents-2 program is a major expansion of the smaller and more compact NetCents-1, and its success will be key to the Air Force’s plans to modernize its networks and improve the way it delivers information to warfighters. Download this special report to discover how NetCents-2 will be a major driver towards lower costs, faster delivery of technology and new opportunities for small businesses.


Three Best Practices to Help Government Agencies Overcome BYOD Challenges

This paper highlights key challenges facing government IT administrators in a BYOD environment—and discusses steps and strategies for network preparation, ongoing support, and securing information to enable widespread adoption of personal device use, while enhancing data security.


i2 Intelligence Analysis Platform

IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.


Consolidated Security Management for Mainframe Clouds

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Ensuring Application Security in Mobile Device Environments

In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.


Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.