Whitepapers


Infographic: Internet of Things in Smart Cities

The smart city train is leaving the station. According to a worldwide user survey conducted by Extreme Networks, 66% of municipal IT staffs are investigating, evaluating, and implementing smart city projects with Internet of Things devices. A broad range of projects are being driven by the very low cost of IoT sensors, the prevalence of smart phones, and the growing demand of residents for more and better services.


Internet of Things: Smart Government Solution

The Internet of Things (IoT) is ushering in an era of smart cities and smart government. The benefits of smart government include reduced operating costs, increased responsiveness, improved sustainability, higher efficiency, constantly-available process data, and greater citizen satisfaction. In the consumer world, people have become familiar with smart consumer devices that enable interaction with the smart home via mobile phone. As this moves into government and commercial realms, significant new considerations must be managed.


The State of Security in State & Local Government

Cyberattacks are more frequent and sophisticated than ever. According to Akamai’s State of Internet Security Report, web application attacks alone grew by 35% between Q1 2016 and Q1 2017. As attackers become less selective, every agency is at risk. In this infographic we explore how state and local governments are stepping up to battle these growing cyberthreats.


Research Report: VDI Gains Ground with Room to Grow

In a recent study by the 1105 Public Sector Media Group, over 115 federal, state and local government respondents were surveyed on their views and their agency’s experiences with VDI. Topics included VDI adoption status, IT challenges and strategies, implementation benefits, and hosting and purchasing preferences. Download this research report to gain access to the survey findings.


Defending Government Against Ransomware Attacks

Ransomware and other threats to data security are serious concerns for any organization, but the stakes are higher and the risks are greater for government agencies. This paper details the current security challenges confronting government organizations, and provides insights on how a cloud sandbox can protect sensitive data from this 21st-century form of extortion.


Supporting Government Application Development through Digital Innovation

Explore how to develop and maintain cloud-based applications with Red Hat. Using OpenShift Container Platform, developers can quickly and easily create applications on demand directly from the tools they use most. Learn more about additional features and benefits here.


The Staying Power of SEWP

With nearly 150 approved contractors, a huge array of products, and stellar customer service, it’s no surprise NASA SEWP (Solutions for Enterprise-Wide Procurement) is still going strong after 24 years. In this special report, we take an in-depth look at this contract’s operations, processes and key offerings as well as highlight the benefits that make SEWP the reigning go-to vehicle for agencies needing to acquire advanced commercial technology.


2017 Thales Data Threat Report Federal Government Edition

Federal agencies must deal with critical needs for sensitive data in volume, the most challenging threat environments, the strictest regulations and the most difficult budget constraints – and it’s putting their data at risk. Read the report to learn the state of data threats for federal agencies today, and best practice recommendations from 451 Research.


Vormetric Data Security Platform Mapping to NIST 800-53

Critical to certification for meeting FIPS, is the implementation of security controls from NIST800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform.


Hybrid Cloud Storage: Federal Agency Considerations for Moving to the Cloud

Over the last few years, cloud computing and infrastructure—the delivery of services to users over a network—has taken the IT world by storm. There’s hardly a government agency that hasn’t already adopted (or isn’t currently considering) a move to cloud-based delivery models, and for good reason: the cloud offers a solution to IT management, resource, and cost challenges facing agencies today. Learn more in this informative report.


Oracle Cloud Services: New Possibilities for Government

Are you taking advantage of the most modern cloud options to empower your agency missions? Cloud solutions are less expensive, more scalable, and promote faster implementation of new services. Hear how both The City of Fort Wayne and The City of Chicago achieved their goals with the cloud in this informative report.


Open Source Security 101

At present, there are a lot of broken links in the security world. It is well-known that attacks on government systems are multiplying and concurrently becoming more sophisticated on a daily basis. Further, the technology the world consumes is becoming more complex, and defending it isn’t such an easy feat. Both enterprises and federal agencies face the daunting task of satisfying security needs while embracing digitalization. Many security experts are asking the question: “what’s the best way?”


Snapshot Report: A New Blueprint for Digital Government

Digital services are the future of government. Yet despite the clear need for improved digital services, agencies without a mature digital strategy simply can’t get there. To achieve a successful and sustainable transformation, services must be anchored with reliable security. Download this special report to learn the six strategies agencies should adopt to ensure digital transformations are both effective and secure.


Top 3 Unique Splunk Security Integrations

Taking a holistic approach in which tools are fully integrated can strengthen and improve the overall cybersecurity posture of an organization. Agencies can even implement solutions that create a uniform experience for multiple environments where all content is synchronized to assist in the smarter use of data. Download this eBook to explore the top three unique Splunk integrations August Schell identified to help enhance the value of your agency’s security analytics program.


Rugged Tablets Drive Government Mobile Workforce Evolution

While tablets are becoming less popular with consumers, it is not the case in the government market. While smartphones are becoming widespread, tablet demand is increasing across the government. Download this informative white paper to learn how government agencies are rapidly moving towards a mobile workforce!


Infographic: Time for a Load Balancer Upgrade?

Government networking experts are moving away from traditional hardware-based architectures. In this infographic, we outline the critical success factors needed to future proof your agency’s application delivery control. Uncover the benefits of using a software-first architecture, including an improvement in security, increase in agility, and a reduction in operational overhead.


Take Cybersecurity to the Next Level

A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


Take the Software-First Approach to App Delivery

As agencies address the challenges of adapting their networks to suit modern requirements, and doing so within static or shrinking budgets, they’re forced to make some challenging tactical decisions. Those decisions often involve new approaches and new technologies to streamline network operations and expand network capabilities. Ultimately, agencies are adopting virtualization and software-based network technologies to accommodate increased capacity demands, support new initiatives and reduce costs.


Expert Q&A: Realizing the Promise of DevOps

DevOps is changing the way government organizations develop applications to improve business functions and provide better services. However, the process is often obstructed from delivering its full potential value since applications developed for one environment don’t often work as well in another. In this Expert Q&A, Red Hat’s Joel Jackson shares insight on how container technology and microservices can help support the full promise of DevOps.


A Guide to 2017 Connectivity Solutions

It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges. In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.


Improving RMF Practices Through Automation

Relentless cyber attacks from adversaries have prompted federal agencies to take a more holistic and systematic approach to integrating information security into broader organizational risk management strategies. Practices defined in the Risk Management Framework (RMF) are being employed across the federal government to improve visibility, implement better controls, and support faster responses to cyber threats across IT applications and infrastructure.


The Economics of Software-Defined Storage

Data growth is a standard problem of the modern digital age. Being data driven to remain in business and increase profitability is not an option; rather, it is a necessity. In these complex times, tighter IT budgets along with the need to shift the focus on business requirements are putting added pressures on IT departments. This whitepaper examines a new era of software-defined storage solutions that allows businesses to build out a service-based storage infrastructure in an economically feasible manner.


OpenStack Storage for Dummies

As more applications and data are distributed across virtual machines in the cloud, a more agile and scalable solution is needed to enable ever expanding cloud services and, ultimately, the software‐defined data center supporting them. Download this guide to learn more on OpenStack and Ceph storage, including real-world use cases and configuration best practices.


Mobile Security: A Multi-Faceted Approach

Government agencies rely on mobile devices more than ever before. And it’s not just field operatives or inspectors. Agency staffers at all levels are being issued mobile devices. The challenge now for agencies is to ensure productivity and access to the tools they need to do their jobs; while at the same time ensuring those devices are truly secure. Security threats facing mobile devices continue to evolve, and so too must the security solutions and policies that protect those devices.


Adopt Commercial Best Practices for Travel

Despite a modest degree of automation and modernization, the steps federal government employees have to go through to make travel arrangements and then file vouchers is unnecessarily complicated and time-consuming. By adopting best practices already in use by private enterprise, federal government agencies can streamline processes, save money, increase visibility and efficiency, and improve the user experience for both the individual and agency administration.


SEWP Keeps Pace with Tech Horizons

NASA’s Solutions for Enterprise-Wide Procurement (SEWP) contract vehicle has grown in size and currently operates with 145 contract holders, 119 of which are small businesses. Over the years, SEWP has gone from just one of a number of government-wide acquisition contracts (GWACs) to the top of the pile. It’s widely considered as one of best run IT-based contracts and has become a go-to resource for government agencies. Download this special report containing expert viewpoints from SEWP Program Manager, Joanne Woytek and experienced contract holders, as we take a deeper dive into SEWP V.


How to Evaluate DDoS Mitigation Providers: Four Critical Criteria

How can you be sure that the DDoS mitigation services provider you bring on board can deliver on the promise to stop the Internet’s largest and most sophisticated attacks? This white paper explores four critical criteria on which to evaluate DDoS mitigation providers before signing on the dotted line. Akamai has developed key questions related to each to help you evaluate a provider’s threat intelligence, experience, mitigation capabilities and capacity. Our guidance is based on Akamai’s practical experience in proven mitigation approaches for different DDoS attack scenarios, as well as on our keen insight into the minds and strategies of cybercriminals and DDoS attackers.


Army ITES: Recharging the Enterprise

The manner in which the Army procures its technology to run the Army enterprise continues to evolve almost as rapidly as the technology itself. New and revised contract vehicles provide sensible, cost-effective means of equipping the Army with the latest technologies, including cybersecurity and mobile technology. As Army Chief of Staff General Mark Milley says, new and emerging technologies could “deeply change the character of war.”


IBM QRadar Security Intelligence: Evidence of Value

In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.


Forrester Total Economic Impact (TEI) Study of IBM Security Guardium

In September 2015, IBM commissioned Forrester Research consulting to conduct a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) that organizations may realize by deploying IBM Security Guardium. The study uncovered that organizations achieve cost and risk reductions while increasing productivity and tactical efficiencies from implementing IBM Security Guardium. Read the study to learn more.