What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download Now

Contract Guide: GSA IT Schedule 70 : Whitepaper

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

Cloud Solutions and the One-Size-Fits-All Fallacy: Whitepaper

While it may be tempting to make an all-or-nothing decision when it comes to the cloud, it’s not that simple. Download this Q&A to gain further insight from industry experts on how to choose the right cloud strategy for your organization.


Threats and Mitigations | A Guide to Multi-Layered Web Security: Asset

There’s a new age of cybersecurity threats targeting websites and business-critical applications - how can you fight back and protect your organization? This guide will detail the threats common to websites and web applications and what you can do to mitigate them.


Rethinking Data Discovery and Data Classification: Whitepaper

Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can’t expect to adequately protect data if they don’t have knowledge about what data exists, where it resides, its value to the organization, and who can use it. Read this report to learn how to utilize data classification in your data security initiatives.