What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download Now

: Asset

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

IDC Intelligence-Led Security: Asset

A significant challenge for many organizations has been enabling their analysts to find the 'unknown unknown.' Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.


The Evolving Face of Cyber Threats: Asset

Cyberattacks are a clear and present threat to government agencies. The estimated annual global cost of cybercrime is upwards of $445B.


NETCENTS-2 Makes Good Business Sense: Whitepaper

The Defense Department’s focus on net-centric war fighting has sharpened over the past decade. Along the way, its IT contract vehicles have become more important as a way to focus technology on that goal. Network Centric Solutions-2 (NETCENTS-2) is a critical contract vehicle to help the Air Force acquire technology tailored to its specific mission needs.