What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


Secure Login Provides Key to Safe, Accessible Citizen Services

It’s become almost a cliché for people to lament how many login names and passwords they have to maintain. Cybersecurity advisors regularly warn people not to use the same password for multiple online services. Problems with the common model of identification and authentication afflict both government agencies offering online services and the users accessing them. Download this informative whitepaper to learn more on the username/password paradigm and the evolution of identity verification.


Best Practices for Cloud Adoption

Discover how your IT organization can become more agile by leveraging Cloud computing to its full potential. Enter a few basic details in this online tool to generate a customized IDC white paper that outlines the benefits and best practices of cloud implementation.


Significantly Improving Storage Efficiency — IBM Adds Real-time Compression to Storage

The Clipper Group asks if you are suffering from too much data with an insufficient budget, Storwize V7000 with Real-time Compression may well be the solution you need. If your data center needs to compress both blocks and files, IBM’s plans to enhance its Storwize V7000 Unified, when available, will provide the single platform that the data center needs to simplify deployment. Each will be like getting more shelf space without en-larging the grocery store and without paying the going price for additional shelves. Isn’t that the kind of surprise you want to pull out of your bag of tricks the next time you are asked?


Moving to a Private Cloud? Infrastructure Really Matters!

This Clipper Group paper outlines the importance of the underlying IT infrastructure for private cloud environments and lays the groundwork for clients navigating cloud, highlighting many key aspects of a private cloud infrastructure. This is a great door opener to a conversation about our systems and cloud computing.


Research Report: Best Practices in Networking and Storage Efficiency

The results of a new survey of government IT professionals reflects a broader recognition that existing infrastructures could soon be overwhelmed by the current rate of growth in data. Sixty-six percent of respondents said their agencies needed “to implement a network architecture that will enable high-velocity data capture, discovery, storage and analytics.” But it’s not just a matter of keeping up with the data. Download this research report to discover more findings, as well as learn how agencies are adopting other technologies that can have a significant impact on their IT infrastructure.


GameChanger: NoSQL

Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.


Top Ten Database Threats

Databases have the highest rate of breaches among all business assets. Failing to safeguard databases that store sensitive data can cripple your operations, result in regulatory violations, and destroy your reputation. Understanding the top database threats and implementing the solutions outlined in this paper will enable you to recognize when you’re vulnerable or being attacked, maintain security best practices, and ensure that your most valuable assets are protected.


Viewpoint: Rapid Detection Key to Security

As cyber threats increase and become more complex, it is more important than ever for organizations to learn the key ingredients to developing a rapid response strategy. Download this insightful Q&A report to gain further knowledge from industry experts on the current cybersecurity atmosphere.


The Power of Analytics for the Public Sector

Agencies face the difficulty of managing the increasing complexity of the “information explosion”. Adopting analytics can help solve these issues and achieve desirable outcomes. Read this white paper and see how analytics solutions can help the Government evaluate excess data and unlock insights to create better informed decisions.


NetCents-2: A New Way of Doing Business

The six-year, $24.2 billion NetCents-2 program is a major expansion of the smaller and more compact NetCents-1, and its success will be key to the Air Force’s plans to modernize its networks and improve the way it delivers information to warfighters. Download this special report to discover how NetCents-2 will be a major driver towards lower costs, faster delivery of technology and new opportunities for small businesses.


The STAND: Cybersecurity

Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.


Three Best Practices to Help Government Agencies Overcome BYOD Challenges

This paper highlights key challenges facing government IT administrators in a BYOD environment—and discusses steps and strategies for network preparation, ongoing support, and securing information to enable widespread adoption of personal device use, while enhancing data security.


Understanding the Impact of Ultra-Dense Hyper-Scale Servers

For years high performance computing (HPC) was largely associated with large-scale scientific workloads and with applied technical computing. However, new workloads such as digital media, analytics and various applications have made their way onto HPC server. Read this whitepaper to learn how and why the arrival of ultra-dense, hyper-scale design is poised to make the latest shift in the HPC market.


Technical Computing for a New Era

Today, high performance systems are used to solve technical computing problems across a range of sectors. This is because technical computing is more accessible than ever thanks to a wave of recent innovations. Read this whitepaper to learn about the high-value challenges that supercomputing allows agencies to address and the advanced capabilities it offers.


i2 Intelligence Analysis Platform

IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.


Consolidated Security Management for Mainframe Clouds

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Extending Security Intelligence with Big Data Solutions

Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


Managing Threats in the Digital Age

News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.


Avoiding Insider Threats to Enterprise Security

This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.


Ensuring Application Security in Mobile Device Environments

In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.


Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.


Unlocking the Power of Unstructured Data

This paper explains the value of analyzing and mining unstructured data, the changes and opportunities that mining unstructured data will create for healthcare organizations and how healthcare organizations are already using this new approach to reveal insights in patient care.


The New Business of Technology: Extend, Transact and Optimize

The design principles of service-oriented architecture (SOA) make it possible for you to develop new engagements in a way that optimizes value for your organization. This whitepaper explores the elements of a strong application foundation and business agility technologies that can make your agency truly engaging.


Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity

In this paper, learn about four technology-based approaches to improving processes and increasing productivity while driving down department and agency costs.


The Value of Smarter Public Safety and Security

Politicians and citizens consistently rank safety and security as a high priority. However, public safety services are facing increasingly strained budgets and a rapidly evolving security environment that make it difficult to meet the expectations of the public. Read this whitepaper to learn about the emerging initiatives and technologies that are being used to combat these challenges.


Addressing Social Determinants and Their Impact on Healthcare

This executive overview paper examines the many factors that are driving change in the healthcare industry.2 It covers the social determinants of health and introduces a smarter approach to care that enables healthcare providers to personalize programs, services and treatments based on a holistic view of the individual and the individual’s family. By intervening proactively to address the social determinants of health and with this smarter approach to care, the costs of healthcare can be curtailed or even reduced.


Enhancing a City’s Ability to Plan, Protect and Manage with Intelligent Video Analytics

In this paper, learn how cities are using intelligent video solutions to help them face the challenges of increasing urbanization.


Ciena Cloud Networking: Performance On-Demand

True software-driven networking for the cloud, with automated resource orchestration and provisioning that yields reduced network capacity requirements, predictable service performance, and simpler operations.


Montgomery County Leverages Professional Certifications for Secure Cloud Computing

Three years ago, Montgomery County IT officials decided to move the enterprise infrastructure, applications and data required by the government’s 34 departments to the cloud, using the expertise their IT team had gained through (ISC)2’s CISSP security certification. Learn how they did it.


Thinking Locally, Targeted Globally: New Security Challenges for State and Local Government

Even as budgets remain tight, tech-savvy citizens demand higher levels of service, thus making cyber security even more critical for state agencies, municipalities, and public utilities. Download the whitepaper to learn the multi-vector, multi-stage nature of today’s advanced persistent attacks and why traditional tools fail to detect them.


Business Process Management for Dummies

In today’s dynamic business environment, organizations need to be agile so they’re ready to respond to the litany of challenges coming their way. Business Process Management (BPM) provides that agility by ensuring the full utilization of technology; helping your agency to become far more responsive and meet your goals. Read this eBook to learn more about the flexible, agile and scalable business model - BPM.


Guard Data in Government Environments by Implementing Continuous Diagnostics and Mitigation

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.


Florida Department of Juvenile Justice Gains Deeper Insight

The Florida Department of Juvenile Justice (FDJJ) is the state agency responsible for managing juvenile delinquency and administering the juvenile justice system throughout Florida. This whitepaper examines how the agency uses sophisticated analytics to assess delinquency patterns and proactively allocate resources in an environment where funding is very tightly controlled.


The Social Imperative in Workforce Skills Development

Using social technologies, organizations can develop a workforce development program where employees can develop skills on the job by collaborating with experts and sharing tacit knowledge. This white paper shows how organizations that develop a social learning program can improve employee engagement, reduce attrition and decrease the amount of time employees waste searching for expertise and information.


Continuous Diagnostics and Mitigation Demands, CyberScope and Beyond

To assist federal agencies with CyberScope reporting and the transition to Continuous Diagnostics and Monitoring programs, IBM Endpoint Manager provides insight and control for endpoints with streamlined, automated capabilities for real-time monitoring and remediation of security risks.


Smarter Infrastructure to Address Growing Citizen Demands

Learn more about IBM solutions for asset and facilities management that provide a way for government departments and agencies to collect and analyze asset and facilities data and performance from a centralized point of control, with capabilities such as asset lifecycle management and facility energy usage.


Cloud Raises the Bar on Delivery of Social Services

Case workers are busy people. From helping victims of domestic abuse find new homes, to connecting single parents with financial assistance or helping the elderly get quality medical care, their days are packed with the tasks of advocating for persons in need. Download this interesting digital dialogue to discover how anywhere, anytime access can help not only case workers but the public sector IT.


IDC: Real-time Compression Advances Storage Optimization

It should come as no surprise that storage budgets are constantly under pressure from opposing forces: On one hand, economic forces are pushing budgets to either stay flat or, in many cases, shrink as a percentage of a company's revenue. On the other hand, the infrastructure struggles to keep up with the pace of data growth, pressured by many variables, both social and economic. Businesses have no choice but to acclimate their storage infrastructure to the unprecedented levels at which data is growing.


Protect Your IT System with Next Generation Security

A data breach, probings, hackers… protect your critical IT information. What these real-life examples have in common is that perpetrators can attack companies through their IT systems. Read this whitepaper to learn how agencies are adapting their efforts to combat emerging cyber threats.


Benefits of Integrated Systems for Cloud Infrastructure

Learn why increasing numbers of agency IT service providers and data center managers are implementing dynamic self-service cloud architectures.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Proven VPN WAN - Technology Design Guide

Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology.


Miercom Verified: Read Cisco 4451-X ISR Report

In June 2013, Cisco engaged Miercom to evaluate the capabilities and performance of the latest Cisco Integrated Service Router (ISR) for branch offices—the Cisco 4451-X ISR. Review the report in full and discover why Miercom awarded the Cisco 4451-X ISR the Performance Verified award.


Video Surveillance Technology: More than Meets the Eye

Pictures might tell the story, but a variety of emerging technologies are allowing investigators to delve even deeper into video evidence. Download this informative digital dialogue to discover the importance of video surveillance technology, including the three tips for effective video planning.


Real-User Management-as-a-Service Solution for Cloud-based Applications

This informative whitepaper will help you gain a comprehensive view into end-user experience, so your agency can make informed decisions about acceleration and optimization for the delivery of web applications and streamline the adoption of cloud-based services.


The Future of Applications and Emails is Social

Email will retain relevance as a key business collaboration tool by evolving toward a more integrated approach with social tools. This whitepaper examines the evolution of the social email experience and how it can ultimately help to deliver real business value.


Creating A Digital Strategy to Provide Exceptional Digital Experiences

In the age of the interconnected world where the primary touchpoints are digital, the purpose of the digital experience as part of the digital strategy is clear: deliver an engaging, useful and ideally, differentiating experience to the user – and make every experience truly “exceptional”. This whitepaper demonstrates how organizations, with their unique requirements, have created and benefited from an exceptional digital experience.


Identity and Access Intelligence:Transforming the Nature of Enterprise Security

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud security challenges and proactively protect sensitive IT assets.