What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


GameChanger: The Face of Insider Threats

Cyberthreats of all types are more difficult to detect than ever before, thanks to more efficient and intelligent malicious software, increased use of mobile devices, the volume of network activity and the explosion of cloud computing. At the same time, cybercriminals are becoming more clever, using everything from remote access software, e-mail and instant messaging to removable devices and peer-to-peer networks. Download this GameChanger to get a behind the scenes look at the mitigation and detection of insider threats.


Secure Login Provides Key to Safe, Accessible Citizen Services

It’s become almost a cliché for people to lament how many login names and passwords they have to maintain. Cybersecurity advisors regularly warn people not to use the same password for multiple online services. Problems with the common model of identification and authentication afflict both government agencies offering online services and the users accessing them. Download this informative whitepaper to learn more on the username/password paradigm and the evolution of identity verification.


Best Practices for Cloud Adoption

Discover how your IT organization can become more agile by leveraging Cloud computing to its full potential. Enter a few basic details in this online tool to generate a customized IDC white paper that outlines the benefits and best practices of cloud implementation.


Moving to a Private Cloud? Infrastructure Really Matters!

This Clipper Group paper outlines the importance of the underlying IT infrastructure for private cloud environments and lays the groundwork for clients navigating cloud, highlighting many key aspects of a private cloud infrastructure. This is a great door opener to a conversation about our systems and cloud computing.


Significantly Improving Storage Efficiency — IBM Adds Real-time Compression to Storage

The Clipper Group asks if you are suffering from too much data with an insufficient budget, Storwize V7000 with Real-time Compression may well be the solution you need. If your data center needs to compress both blocks and files, IBM’s plans to enhance its Storwize V7000 Unified, when available, will provide the single platform that the data center needs to simplify deployment. Each will be like getting more shelf space without en-larging the grocery store and without paying the going price for additional shelves. Isn’t that the kind of surprise you want to pull out of your bag of tricks the next time you are asked?


Research Report: Best Practices in Networking and Storage Efficiency

The results of a new survey of government IT professionals reflects a broader recognition that existing infrastructures could soon be overwhelmed by the current rate of growth in data. Sixty-six percent of respondents said their agencies needed “to implement a network architecture that will enable high-velocity data capture, discovery, storage and analytics.” But it’s not just a matter of keeping up with the data. Download this research report to discover more findings, as well as learn how agencies are adopting other technologies that can have a significant impact on their IT infrastructure.


GameChanger: NoSQL

Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.


Top Ten Database Threats

Databases have the highest rate of breaches among all business assets. Failing to safeguard databases that store sensitive data can cripple your operations, result in regulatory violations, and destroy your reputation. Understanding the top database threats and implementing the solutions outlined in this paper will enable you to recognize when you’re vulnerable or being attacked, maintain security best practices, and ensure that your most valuable assets are protected.


Viewpoint: Rapid Detection Key to Security

As cyber threats increase and become more complex, it is more important than ever for organizations to learn the key ingredients to developing a rapid response strategy. Download this insightful Q&A report to gain further knowledge from industry experts on the current cybersecurity atmosphere.


NetCents-2: A New Way of Doing Business

The six-year, $24.2 billion NetCents-2 program is a major expansion of the smaller and more compact NetCents-1, and its success will be key to the Air Force’s plans to modernize its networks and improve the way it delivers information to warfighters. Download this special report to discover how NetCents-2 will be a major driver towards lower costs, faster delivery of technology and new opportunities for small businesses.


The STAND: Cybersecurity

Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.


Three Best Practices to Help Government Agencies Overcome BYOD Challenges

This paper highlights key challenges facing government IT administrators in a BYOD environment—and discusses steps and strategies for network preparation, ongoing support, and securing information to enable widespread adoption of personal device use, while enhancing data security.


i2 Intelligence Analysis Platform

IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.


Consolidated Security Management for Mainframe Clouds

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.


Ensuring Application Security in Mobile Device Environments

In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.


Extending Security Intelligence with Big Data Solutions

Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


Managing Threats in the Digital Age

News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.


Avoiding Insider Threats to Enterprise Security

This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.


Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity

In this paper, learn about four technology-based approaches to improving processes and increasing productivity while driving down department and agency costs.


Enhancing a City’s Ability to Plan, Protect and Manage with Intelligent Video Analytics

In this paper, learn how cities are using intelligent video solutions to help them face the challenges of increasing urbanization.


Addressing Social Determinants and Their Impact on Healthcare

This executive overview paper examines the many factors that are driving change in the healthcare industry.2 It covers the social determinants of health and introduces a smarter approach to care that enables healthcare providers to personalize programs, services and treatments based on a holistic view of the individual and the individual’s family. By intervening proactively to address the social determinants of health and with this smarter approach to care, the costs of healthcare can be curtailed or even reduced.


Ciena Cloud Networking: Performance On-Demand

True software-driven networking for the cloud, with automated resource orchestration and provisioning that yields reduced network capacity requirements, predictable service performance, and simpler operations.


Montgomery County Leverages Professional Certifications for Secure Cloud Computing

Three years ago, Montgomery County IT officials decided to move the enterprise infrastructure, applications and data required by the government’s 34 departments to the cloud, using the expertise their IT team had gained through (ISC)2’s CISSP security certification. Learn how they did it.


Thinking Locally, Targeted Globally: New Security Challenges for State and Local Government

Even as budgets remain tight, tech-savvy citizens demand higher levels of service, thus making cyber security even more critical for state agencies, municipalities, and public utilities. Download the whitepaper to learn the multi-vector, multi-stage nature of today’s advanced persistent attacks and why traditional tools fail to detect them.


Business Process Management for Dummies

In today’s dynamic business environment, organizations need to be agile so they’re ready to respond to the litany of challenges coming their way. Business Process Management (BPM) provides that agility by ensuring the full utilization of technology; helping your agency to become far more responsive and meet your goals. Read this eBook to learn more about the flexible, agile and scalable business model - BPM.


Guard Data in Government Environments by Implementing Continuous Diagnostics and Mitigation

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.


Continuous Diagnostics and Mitigation Demands, CyberScope and Beyond

To assist federal agencies with CyberScope reporting and the transition to Continuous Diagnostics and Monitoring programs, IBM Endpoint Manager provides insight and control for endpoints with streamlined, automated capabilities for real-time monitoring and remediation of security risks.


The Social Imperative in Workforce Skills Development

Using social technologies, organizations can develop a workforce development program where employees can develop skills on the job by collaborating with experts and sharing tacit knowledge. This white paper shows how organizations that develop a social learning program can improve employee engagement, reduce attrition and decrease the amount of time employees waste searching for expertise and information.


Smarter Infrastructure to Address Growing Citizen Demands

Learn more about IBM solutions for asset and facilities management that provide a way for government departments and agencies to collect and analyze asset and facilities data and performance from a centralized point of control, with capabilities such as asset lifecycle management and facility energy usage.


Cloud Raises the Bar on Delivery of Social Services

Case workers are busy people. From helping victims of domestic abuse find new homes, to connecting single parents with financial assistance or helping the elderly get quality medical care, their days are packed with the tasks of advocating for persons in need. Download this interesting digital dialogue to discover how anywhere, anytime access can help not only case workers but the public sector IT.


IDC: Real-time Compression Advances Storage Optimization

It should come as no surprise that storage budgets are constantly under pressure from opposing forces: On one hand, economic forces are pushing budgets to either stay flat or, in many cases, shrink as a percentage of a company's revenue. On the other hand, the infrastructure struggles to keep up with the pace of data growth, pressured by many variables, both social and economic. Businesses have no choice but to acclimate their storage infrastructure to the unprecedented levels at which data is growing.


Benefits of Integrated Systems for Cloud Infrastructure

Learn why increasing numbers of agency IT service providers and data center managers are implementing dynamic self-service cloud architectures.


Protect Your IT System with Next Generation Security

A data breach, probings, hackers… protect your critical IT information. What these real-life examples have in common is that perpetrators can attack companies through their IT systems. Read this whitepaper to learn how agencies are adapting their efforts to combat emerging cyber threats.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Miercom Verified: Read Cisco 4451-X ISR Report

In June 2013, Cisco engaged Miercom to evaluate the capabilities and performance of the latest Cisco Integrated Service Router (ISR) for branch offices—the Cisco 4451-X ISR. Review the report in full and discover why Miercom awarded the Cisco 4451-X ISR the Performance Verified award.


Proven VPN WAN - Technology Design Guide

Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology.


Video Surveillance Technology: More than Meets the Eye

Pictures might tell the story, but a variety of emerging technologies are allowing investigators to delve even deeper into video evidence. Download this informative digital dialogue to discover the importance of video surveillance technology, including the three tips for effective video planning.


Real-User Management-as-a-Service Solution for Cloud-based Applications

This informative whitepaper will help you gain a comprehensive view into end-user experience, so your agency can make informed decisions about acceleration and optimization for the delivery of web applications and streamline the adoption of cloud-based services.


Creating A Digital Strategy to Provide Exceptional Digital Experiences

In the age of the interconnected world where the primary touchpoints are digital, the purpose of the digital experience as part of the digital strategy is clear: deliver an engaging, useful and ideally, differentiating experience to the user – and make every experience truly “exceptional”. This whitepaper demonstrates how organizations, with their unique requirements, have created and benefited from an exceptional digital experience.


The Future of Applications and Emails is Social

Email will retain relevance as a key business collaboration tool by evolving toward a more integrated approach with social tools. This whitepaper examines the evolution of the social email experience and how it can ultimately help to deliver real business value.


Stay Ahead of Insider Threats with Predictive, Intelligent Security

It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools.


Five Steps to Achieve Success in Your Application Security Program

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.


Keeping Distributed Endpoints Safe and Compliant

With rapidly increasing numbers of remote workers and mobile devices, there is no well-defined perimeter. The perimeter, by necessity, must be the endpoint itself. Endpoints, by their very nature, are highly vulnerable to attack— including system damage inflicted by malware, theft by phishing, privacy infringements through social networking, or loss of productivity due to spam, interruptions and system instabilities. Read this whitepaper to learn about a solution that provides real-time visibility and control over each endpoint’s status, remediating issues to help ensure continuous security and compliance.


Ensuring Application Security in Mobile Device Environments

As a result of the increase in wireless devices in the workforce, organizations are becoming more concerned with mobile security. Many, in fact, see this area as a primary technology challenge to address and a main focus for security initiatives.


Identity and Access Intelligence:Transforming the Nature of Enterprise Security

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud security challenges and proactively protect sensitive IT assets.


Intelligent role management for improved security and compliance

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.


An Early Leader across the Big Data Security Analytics

This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one of the few vendors offering an integrated approach to combat this.