What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


How Protected is Your Website?

Even today, strange as it sounds, far too many websites have no protection at all. In organizations where developers are evaluated primarily on their ability to ship code on time, there is often a lack of incentive to adopt secure coding practices. Website protection services can quickly add measurable security to your web presence compared to deploying and managing your own equipment and infrastructure to provide similar capabilities.


Government On the Go: Lessons from the Battlefield

The Army’s Command Post of the Future integrates intelligence from multiple sources onto one virtually available map to let commanders in the field make more informed decisions. Download this informative digital dialogue to gain further insight on the potential of mobility and the future of warfighting.


Research Report: Emerging Strategies for Managing Mobility

In August 2013, GCN surveyed defense, civilian and state and local agency decision-makers about their mobile management strategies. The survey covered topics regarding workforce deployment of mobile devices, BYOD vs. agency-issued device policies, usage and security concerns that stem from the use of mobile devices and architectural considerations including virtualization strategies. Download this informative report to uncover the research findings and broaden your scope of knowledge on mobile management.


Research Report: The Virtual Public Sector

For more and more government agencies, desktop virtualization is proving to be the right solution at the right time. The technology, which makes it possible to deploy, manage and optimize desktop-based applications and data from a central console, can help agencies extend desktop computing resources to a wide range of end-user devices securely and cost effectively, whether users are in the office, on the road or working at home. Download this report to discover further research findings on virtualization trends and the shape of things to come.


Protecting Consumer and Business Information with Advanced Threat Protection

As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it serves.


Secure Web Applications: Creating a Security Culture

Companies move applications to the Web to improve customer interactions, lower business processing costs and speed outcomes. But driving applications to the Web also increases vulnerabilities – unless security is an integral component of the application development process.


IBM zSecure Compliance and Administration

IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administra-tion. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to help detect threats.


Identity and Access Management Buyer's Guide

This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.


How does IBM deliver cloud security?

Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualized environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and de-provisioning environment while experiencing the loss of direct control of security compliance, and privacy parameters.


Application security and risk management

The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to collectively address application security by identifying and remediating vulnerabilities early in the software development lifecycle, when they are easier and less expensive to correct. IBM research drives IBM Security AppScan solutions to identify the latest threats with advanced security testing for application security analysts. With more than a decade of application security experience, IBM Security AppScan solutions deliver some of the most advanced testing features that combine expert analysis with ease of use.


Using Load Balancers & ADC’s to Optimize Web and Application Infrastructure for Federal Government Agencies

Using a Load Balancer to reduce the costs associated with deploying and maintaining highly available application infrastructures in Federal Government environments.


Reducing the Costs and Risks of Data Storage in the Federal Government

When it comes to data storage management, the challenge is to do more…with less. Government entities are being asked to store and protect more data that is mandated by more regulations, involves more advanced technologies—such as cloud—and is generated by more digital devices from more vendors.


Three Keys to Building a Sustainable Mobile Infrastructure

Government departments and agencies at all levels are going mobile. Federal employees are rapidly expanding their use of smartphones, tablets, laptops, and other mobile devices for work outside the office. In a time of constrained budgets, agencies need the productivity gains and cost savings that mobile computing can bring. Download this whitepaper to explore the three keys of developing a sustainable mobile infrastructure and learn how virtualization can support mobile initiatives.


GameChanger: Cloud Infrastructure

The government has long embraced the concept of open source computing, starting in earnest in 2009 with the Obama administration’s Open Government Initiative. Today, the concept of open government has even extended to the cloud. Download this whitepaper to further explore the emerging trends of cloud infrastructures as well as discover the tips for maximizing cloud benefits for your organization.


Big Data: Let Business Priorities Drive Tech

IT shops across government are putting Hadoop through its paces in an effort to understand its usefulness to the business. Download this expert Q&A report to uncover the best combination of technologies that support big data analytics as well as learn the main benefits Hadoop can provide.


Crime Prediction and Prevention

Crime prediction and prevention analytics from IBM helps agencies make the best use of the people and information at hand to monitor, measure and predict crime and crime trends. Analysis of police data provides insight that lets officers track criminal activities, predict the likelihood of incidents, effectively deploy resources and solve cases faster.


Accelerate Your Windows 7 Migration

The deadline of Extended Support for Windows XP is set to expire on April 8, 2014, and cost implications of remaining on XP are staggering. Plus, running XP at your own risk leaves your environment vulnerable. Download this free White Paper and learn how many organizations are migrating tens of thousands of PCs in record time.


Government Analytics for Dummies

Government Analytics For Dummies, showcases how business analytics enables federal, state, and local agencies to drive better outcomes in government through better prediction capabilities, visibility into performance, and data access for dynamic decision making.


Emerging Cyber Threats Demand New Thinking

Government agencies need a better approach to dealing with cybersecurity threats, and they know it. A recent survey by the 1105 Government Information Group found that government agencies are not satisfied with current efforts to protect their information from the dynamic threat environment. Download this research report to uncover more findings, including what agencies view as the top threat to their organization.


Holistic View Aids Critical Infrastructure Protection

With cyberattack targets shifting from government networks to the commercial industrial base, new requirements need to be developed to ensure the proper protection of networks. This often requires a comprehensive security program that provides a real-time view into your network to allow for proactive responses to potential threats. Download this whitepaper to read more on the best ways to approach critical infrastructure protection.


A Revolutionary Approach to Network Visibility

Enterprise data centers bring together all of the benefits and challenges of the latest networking architectures. Virtualization technology, wireless and mobility, and use of clouds for infrastructure and applications have produced lower costs, better performance, and richer user experiences. But they’ve also brought an important challenge. Download this whitepaper to read more on network visibility and the current best practices in data center consolidation.


The Next Evolution of Data Warehousing: Smart Consolidation Driving a new level of Agility and Performance

This whitepaper can help organizations develop information strategies that match their evolving environment, and develop ecosystems that encompass the new multitude of information sources; data volume, variety and velocity; and complex business needs. With a smart consolidation strategy, organizations can do more than keep pace with the data revolution - they can truly use it to their advantage.


Advanced Case Management: Making its Mark in Key Government Sectors

Government agencies faced with shrinking budgets yet ongoing pressure to deliver superior services to the public need smarter ways to handle their growing, increasingly complex caseloads. Advanced case management, as a strategy, can help government agencies alleviate many of the challenges associated with claims and social services processes.


Modernization through Virtualization

The Government Printing Office’s chief information officer, Chuck Riddle, said the agency’s mission hasn’t changed much since it opened in 1861, but technology has changed the way that mission is carried out. Download this whitepaper to learn more on virtual desktop infrastructure, including the four goals of information technology in the digital age.


Hadoop for Dummies

In this whitepaper you will learn about the various infrastructures available for managing big data and how to determine which one is appropriate for handling your agency's needs.


Build Trust into Mobile Solutions

Many agencies seek to minimize the cost of deploying and managing mobile devices but security capabilities and hardware configuration management considerations vary depending on the operating system the devices employ. By focusing investment and support on a preferred platform, government IT shops can limit the range of expertise necessary to ensure trusted remote communications with their users’ mobile devices. Download this informative whitepaper to learn expert advice on how to improve your agency’s mobile security strategies.


Filling Gaps in Your Cybersecurity Infrastructure

The traditional cybersecurity infrastructure contains several detection, analysis and remediation gaps. Today, organizations need to focus on two main things: detecting unknown threats and reducing response time. Download this informative whitepaper to read more on the weaknesses of the traditional cybersecurity model and how agencies are filling the gaps.


Increase Productivity and Security with Identity and Access Management

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. To meet the needs of a changing user population while simultaneously maintaining a security-rich environment, organizations need identity management solutions that can define, grant and remove access privileges to match the user’s job role and actual access requirements.


2012 IBM X-Force Annual Trend and Risk Report

The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done to mitigate it.


How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security

This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.


IBM Security Intrusion Preventions Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers a comprehensive portfolio of intrusion prevention solutions that go beyond traditional intrusion prevention to provide multilayered, end-to-end security that can actually protect networks from attacks before they occur.


Delivering Success that Scales with the Largest Enterprises

IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and event management (SIEM) solutions. In order to support the demands of organizations across industries, IBM offers the geographic reach to serve global organizations and the partner ecosystem required to deliver powerful and comprehensive solutions.


Secure By Design: Building Identity-based Security into Today’s Information Systems

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford duscusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


GameChanger: Rethinking Data Center Design

As agencies begin to upgrade or consolidate their data centers, many are starting to realize that it’s much more complicated than simply combining equipment or facilities. In some cases, the consolidated data center may not have the space, power or cooling available to support virtualized servers or the multitude of equipment that needs to be consolidated. In other cases, existing data centers may not have the infrastructure required to support the sheer volume of data that must be stored and processed. Download this in-depth report for more on a different approach to data center design.


IDC Analyst Connection: Video Trends in the Public Sector

Rich Costello, Senior Analyst Enterprise Communications Infrastructure answers questions from Cisco on trends, use cases, key considerations and strategies for deploying video conferencing and telepresence within public sector.


Telework Solutions for Government

From the aggressive telework program of the U.S. General Services Administration to Georgia’s tax credits for private sector telecommuting programs, agencies at all levels of government are embracing telework for a variety of reasons. By leveraging Adobe technologies government employees are enabled to work anywhere, anytime—plus it makes them more productive and efficient working in the agency’s office. Downlaod this whitepaper for more on Adobe's telework solutions


Adobe® Connect™: Bringing together video and next-generation web conferencing

Many businesses can achieve the benefits of face-to-face meetings through an investment in a video or web conferencing solution, saving the company both travel time and resources. Selecting the right technology to replace in-person meetings begins with understanding your organizational needs and pairing these needs with the optimal conferencing solution. Download this whitepaper for more on Adobe Connect.


Success Story: Adobe Connect Solution to facilitate collaboration and peer engagement across Department of Defense

In June 2007, DISA awarded Defense Connect Online (DCO), a two-part Adobe Connect solution for collaboration and engagement across DoD global operations. Two different systems comprise the Adobe Connect implementation, one for the unclassified network, and one for the classified network. A pre-release version of DCO was tested over a five-month period and went live in April 2008, enabling deployed troops, supporting personnel, and military leaders to collaborate effortlessly across locations worldwide. Read more about how DISA enabled secure collaboration with Adobe Connect.


Solution Brief: Discover the power of Adobe Connect for Web Meetings

Adobe Connect for Web Meetings significantly improves collaboration with your colleagues, partners, and customers anytime, anywhere, across virtually any device. With Adobe Connect, meeting organizers can go far beyond simple screen sharing and deliver easy-to-access, rich meetings from a desktop or directly from a mobile device.


Secure Data Access in a Mobile Universe

The Economist Intelligence Unit in June 2012 conducted a global survey of senior executives to explore how organizations can accommodate rising demands for mobile access to business information while minimizing the security risks to proprietary data.


Expert Q&A: Continuous Monitoring

As attacks on agency networks and assets become ever more divergent and sophisticated, continuous monitoring will be a critical element in an organization’s cybersecurity strategy. But it’s not an easy thing to implement. Download this Q&A report for industry perspectives on the various elements of effective continuous monitoring, and why it’s not just one more technology program.


Research Report: Collaboration Solutions Transforming Government

Government agencies are getting serious about online collaboration tools because they see the opportunity to improve enterprise-wide information sharing, support real-time communications during a crisis, and to reduce the money they spend on large in-person meetings or conferences. A recent survey conducted by the 1105 Government Information Group shows that these and other potential benefits are leading many agencies to deepen their investment in collaboration tools and to make collaboration part of their organizational culture. Download this exclusive research report for more on collaboration trends in government.


Contract Guide: GSA IT Schedule 70

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.


Government by Design: Using Strategic Planning to Design the Business of Government

This white paper introduces government by design and describes how it can address the growing challenges and pains felt at all levels of government.


Overcoming Challenges of Asset Management Amid Declining Federal Budgets

Modern asset management solutions are often no longer included in large program budgets and logistics professionals and engineers at federal agencies are being tasked to do more with less and extend the service life of existing assets. Without the ability to piggy-back modern asset management solutions onto large program budgets, agencies must find other ways to modernize their asset management solutions, and they have many good reasons to do so. Built on a single platform, IBM Maximo® Asset Management solutions for federal government deliver seamless integration and support maintenance of all asset types across the enterprise, from production and facilities to transportation and IT.


Optimizing Data Storage in Federal Government Data Centers

Federal IT and data center managers face an unprecedented and inescapable perfect storm of requirements related to the management and security of mission-critical and mission essential data. The alignment of mission and service delivery and enabling information requires full information lifecycle visibility, management and automation to converge IT capabilities with mission and service delivery objectives—taking into account the farreaching regulatory and compliance mandates that serve as overarching constraints.


All Data Archiving Tools Are Not Created Equal: The Importance of Index and Search

Most organizations possess considerable intellectual property. Unfortunately, that information is useless unless employees know how to find it. Archiving tools with powerful index and search capabilities can help maximize the value of intellectual property.


Cloud Infrastructure for the Real World

The evolutionary process of cloud adoption has been leading to an open hybrid approach – a new model for IT – demanding organizations to manage traditional and cloud workloads simultaneously. Learn how Red Hat is making hybrid a reality with Red Hat Cloud Infrastructure.


Special Report: Infrastructure Security

Evolve or die. That’s the imperative guiding the development of cybersecurity technologies and strategies across government and industry. The ongoing evolution of the federal IT enterprise, extended in all directions by advances in networking and mobile technology, must be matched to similar advances in information and network security. But above all, the nature of the current cybersecurity threats requires a new way of thinking. The old approach to cybersecurity, which was based on defending the perimeter, cannot hold up against the wide array of cyber threats that agencies now face. Download this special report for in-depth articles on infrastructure security.