What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


GameChanger: NoSQL

Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.


Viewpoint: Rapid Detection Key to Security

As cyber threats increase and become more complex, it is more important than ever for organizations to learn the key ingredients to developing a rapid response strategy. Download this insightful Q&A report to gain further knowledge from industry experts on the current cybersecurity atmosphere.


Top Ten Database Threats

Databases have the highest rate of breaches among all business assets. Failing to safeguard databases that store sensitive data can cripple your operations, result in regulatory violations, and destroy your reputation. Understanding the top database threats and implementing the solutions outlined in this paper will enable you to recognize when you’re vulnerable or being attacked, maintain security best practices, and ensure that your most valuable assets are protected.


NetCents-2: A New Way of Doing Business

The six-year, $24.2 billion NetCents-2 program is a major expansion of the smaller and more compact NetCents-1, and its success will be key to the Air Force’s plans to modernize its networks and improve the way it delivers information to warfighters. Download this special report to discover how NetCents-2 will be a major driver towards lower costs, faster delivery of technology and new opportunities for small businesses.


The STAND: Cybersecurity

Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.


Three Best Practices to Help Government Agencies Overcome BYOD Challenges

This paper highlights key challenges facing government IT administrators in a BYOD environment—and discusses steps and strategies for network preparation, ongoing support, and securing information to enable widespread adoption of personal device use, while enhancing data security.


Extending Security Intelligence with Big Data Solutions

Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering


Beyond the Next Generation: Meeting the Converging Demands of Network Security

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Managing Threats in the Digital Age

News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.


Avoiding Insider Threats to Enterprise Security

This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.


Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.


Ensuring Application Security in Mobile Device Environments

In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


Consolidated Security Management for Mainframe Clouds

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity

In this paper, learn about four technology-based approaches to improving processes and increasing productivity while driving down department and agency costs.


Addressing Social Determinants and Their Impact on Healthcare

This executive overview paper examines the many factors that are driving change in the healthcare industry.2 It covers the social determinants of health and introduces a smarter approach to care that enables healthcare providers to personalize programs, services and treatments based on a holistic view of the individual and the individual’s family. By intervening proactively to address the social determinants of health and with this smarter approach to care, the costs of healthcare can be curtailed or even reduced.


Enhancing a City’s Ability to Plan, Protect and Manage with Intelligent Video Analytics

In this paper, learn how cities are using intelligent video solutions to help them face the challenges of increasing urbanization.


Ciena Cloud Networking: Performance On-Demand

True software-driven networking for the cloud, with automated resource orchestration and provisioning that yields reduced network capacity requirements, predictable service performance, and simpler operations.


Montgomery County Leverages Professional Certifications for Secure Cloud Computing

Three years ago, Montgomery County IT officials decided to move the enterprise infrastructure, applications and data required by the government’s 34 departments to the cloud, using the expertise their IT team had gained through (ISC)2’s CISSP security certification. Learn how they did it.


Thinking Locally, Targeted Globally: New Security Challenges for State and Local Government

Even as budgets remain tight, tech-savvy citizens demand higher levels of service, thus making cyber security even more critical for state agencies, municipalities, and public utilities. Download the whitepaper to learn the multi-vector, multi-stage nature of today’s advanced persistent attacks and why traditional tools fail to detect them.


Business Process Management for Dummies

In today’s dynamic business environment, organizations need to be agile so they’re ready to respond to the litany of challenges coming their way. Business Process Management (BPM) provides that agility by ensuring the full utilization of technology; helping your agency to become far more responsive and meet your goals. Read this eBook to learn more about the flexible, agile and scalable business model - BPM.


Guard Data in Government Environments by Implementing Continuous Diagnostics and Mitigation

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.


The Social Imperative in Workforce Skills Development

Using social technologies, organizations can develop a workforce development program where employees can develop skills on the job by collaborating with experts and sharing tacit knowledge. This white paper shows how organizations that develop a social learning program can improve employee engagement, reduce attrition and decrease the amount of time employees waste searching for expertise and information.


Continuous Diagnostics and Mitigation Demands, CyberScope and Beyond

To assist federal agencies with CyberScope reporting and the transition to Continuous Diagnostics and Monitoring programs, IBM Endpoint Manager provides insight and control for endpoints with streamlined, automated capabilities for real-time monitoring and remediation of security risks.


Smarter Infrastructure to Address Growing Citizen Demands

Learn more about IBM solutions for asset and facilities management that provide a way for government departments and agencies to collect and analyze asset and facilities data and performance from a centralized point of control, with capabilities such as asset lifecycle management and facility energy usage.


Cloud Raises the Bar on Delivery of Social Services

Case workers are busy people. From helping victims of domestic abuse find new homes, to connecting single parents with financial assistance or helping the elderly get quality medical care, their days are packed with the tasks of advocating for persons in need. Download this interesting digital dialogue to discover how anywhere, anytime access can help not only case workers but the public sector IT.


IDC: Real-time Compression Advances Storage Optimization

It should come as no surprise that storage budgets are constantly under pressure from opposing forces: On one hand, economic forces are pushing budgets to either stay flat or, in many cases, shrink as a percentage of a company's revenue. On the other hand, the infrastructure struggles to keep up with the pace of data growth, pressured by many variables, both social and economic. Businesses have no choice but to acclimate their storage infrastructure to the unprecedented levels at which data is growing.


Benefits of Integrated Systems for Cloud Infrastructure

Learn why increasing numbers of agency IT service providers and data center managers are implementing dynamic self-service cloud architectures.


Protect Your IT System with Next Generation Security

A data breach, probings, hackers… protect your critical IT information. What these real-life examples have in common is that perpetrators can attack companies through their IT systems. Read this whitepaper to learn how agencies are adapting their efforts to combat emerging cyber threats.


Miercom Verified: Read Cisco 4451-X ISR Report

In June 2013, Cisco engaged Miercom to evaluate the capabilities and performance of the latest Cisco Integrated Service Router (ISR) for branch offices—the Cisco 4451-X ISR. Review the report in full and discover why Miercom awarded the Cisco 4451-X ISR the Performance Verified award.


Proven VPN WAN - Technology Design Guide

Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology.


Video Surveillance Technology: More than Meets the Eye

Pictures might tell the story, but a variety of emerging technologies are allowing investigators to delve even deeper into video evidence. Download this informative digital dialogue to discover the importance of video surveillance technology, including the three tips for effective video planning.


Five Steps to Achieve Success in Your Application Security Program

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.


The Transformation of Education through State Education Clouds

Cloud computing represents a revolutionary technological paradigm shift that can dramatically improve the quality of education for all students in a given state, from K-12 to higher education. Through the Internet, it can deliver the most advanced software and educational materials, hardware resources and services to students and educators in even the most impoverished or remote school districts in the state, without the need for advanced IT expertise at those locations.