Whitepaper List


Implementing High Availability and Disaster Recovery

This IBM Redbooks publication describes and demonstrates common, prescriptive scenarios for setting up disaster recovery for common workloads using IBM WebSphere Application Server, IBM DB2, and WebSphere MQ between two IBM PureApplication System racks using the features in PureApplication System V2. The intended audiences for this book are pattern developers and operations team members who are setting up production systems using software patterns from IBM that must be highly available or able to recover from a disaster (defined as the complete loss of a data center).


Tools for Making Cloud and On-Premises Systems Work Together

In this white paper, you’ll learn how tools for continuous development, patterns for scaling infrastructure, resources for managing APIs, and highly flexible application servers can help meet your goals, as well as meet management and market demands. you’ll be able to see how tools like IBM DevOps, IBM StrongLoop, PureApplication, UrbanCode Deploy, IBM Cloud Orchestrator, and WAS Liberty can take you and your company to the next level across mobile, cloud, and on-premises systems.


Alameda County Goes Green and Imrpves Turnaround Time by 80% with DocuSign

Learn how Alameda County rose to the Green challenge and improved document turnaround time by 80%, digitized paper workflows and improved visibility to of documents status in the review cycle.


Nevada Department of Transportation (DOT) Streamlines with DocuSign

Check out this great case study of how Nevada DOT overcame huge paper bottle necks to earn the Cashman Good Government Award from Nevada Taxpayers Association by streamlining processes with DocuSign.


City of Palo Alto Accelerates Approvals with DocuSign

See how the heart of the Silicon Valley, Palo Alto, is leading the way with accelerated approvals of city documents, increased accountability and reduced contract turnaround.


State of North Carolina Accelerates Approval Time by 80% with DocuSign

Complicated state governments have challenges with operations. Learn how North Carolina adopted DocuSign to cut costs, reduced document error, accelerated document approval time by 80% and were better able to provide more time serving citizens.


Building a More Efficient Government with eSignatures

Review this insightful whitepaper from DocuSign and Ombud exploring how eSignatures can help governments at both the state and local levels achieve security, document workflow and manage costs.


The Rugged Truth: TCO of Rugged vs. Non-Rugged Computing Devices

Are you trying to determine if a rugged notebook or tablet is right for your business? Technology Business Research, Inc.(TBR) found in their recent research, purchasers should understand the true value of their mobile computing by calculating the total cost of ownership to see if a switch to rugged systems is worthwhile. In order to help IT and organizational purchasers make the right computing investment, Dell and Intel® recently worked with VDC Research to understand the true total cost of ownership for rugged vs. non–rugged notebooks and tablets in harsh work environments. Read this white paper to see the costs associated with each scenario and to help you determine if a rugged solution would benefit your business.


Real-World Testing Ensures Real-World Performance for Rugged Devices

The increasingly mobile nature of technology enables computing devices to go out into the field with workers. And computing devices leaving the office face the same perils as their human counterparts. Like workers in the field, the technology needs to be tough enough to survive adverse conditions.


Evolving Threat Landscape Drives New Approaches to Cybersecurity

Preventing and responding to cyberthreats continues to dominate the conversation. One increasingly popular way to improve security while also saving money is through cloud services. Although the government has put programs in place to simplify cloud adoption, many agencies are still experiencing growing pains. A recent webcast series looked at the primary categories of cyberthreats and how cloud can help agencies deliver digital services in the face of the danger. Download this informative Digital Dialogue to learn how cloud and mobile are driving ways to improve security, IT performance, service delivery, and the user experience.


Coplink on Cloud

IBM COPLINK on Cloud links IBM i2 COPLINK data directly to subscribers. The convenience of cloud access enables officers, agents and others to validate information, compare partial observations and update situational awareness with any compatible access device.


Protecting Your Critical Data With Integrated Security Intelligence

By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM Security Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.


3 Guiding Principles for Data Security and Compliance

The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.


Cloud Encryption Gateway: Enabling Security and Compliance of Sensitive Data in Cloud Storage

Companies are increasingly reliant on cloud storage and are storing sensitive data in cloud storage, which could be vulnerable to security threats. The Vormetric Cloud Encryption Gateway is a scalable solution that provides the security to use the cloud fully without sacrificing performance.


Fighting the Bad Guys with Advanced Cyber Threat Analysis

Many organizations feel that their systems are safe behind heavy layers of perimeter security, but the truth is that most cyber threats only need to exploit a single vulnerable point to gain access. These threats can live within the system go by for months without being detected. Incorporating Cyber Threat analysis can help combat these threats more quickly. Cyber Threat Analysis can be used to uncover hidden connections and patterns in large and disparate data sets, and take an intelligence-driven approach to cyber defense. Check out this Interactive Demo to learn more!


Army ITES: Recharging the Enterprise

The manner in which the Army procures its technology to run the Army enterprise continues to evolve almost as rapidly as the technology itself. New and revised contract vehicles provide sensible, cost-effective means of equipping the Army with the latest technologies, including cybersecurity and mobile technology. As Army Chief of Staff General Mark Milley says, new and emerging technologies could “deeply change the character of war.”


Coplink on Cloud

IBM COPLINK on Cloud links IBM i2 COPLINK data directly to subscribers. The convenience of cloud access enables officers, agents and others to validate information, compare partial observations and update situational awareness with any compatible access device.


Software Asset Management Key to Security, Compliance and Cost Savings

Download this informative Digital Dialogue, sharing highlights from a recent webcast on Software Asset Management (SAM) to learn how SAM people, process and technology are required for a strong strategy to help government agencies control software costs, reduce security risk and maintain license compliance.


The Evolving Face of Cyber Threats

Cyberattacks are a clear and present threat to government agencies. The Center for Strategic and International Studies (CSIS) estimated the annual global cost of cybercrime is upwards of $445 billion in a 2014 study. The report further states the average cyberattack continues undetected for several months. Full and detailed data analysis is one of the only emerging ways to get ahead of these threats. According to industry experts, cyber threat analysis currently relies on automated as well as human input.


NETCENTS-2: Bringing Convergence to Defense

The relatively new NETCENTS-2 contract vehicle is a true evolution of earlier iterations. It is intended to provide faster, more flexible and more comprehensive access to a variety of technology categories. The contract aims to provide agencies with network-centric IT, networking, security, voice, video and data communications solutions and services not available through other mandatory-use DoD or Air Force contract formats.


Body Cameras Help Serve and Protect

Supplementing investigations with video evidence is not a new facet of law enforcement. As video continues to cement itself as a valuable resource in the field and office, a natural extension of this technology and the value it provides is found in body-worn cameras.There is much in store for the future of video and law enforcement. The proliferation of body worn cameras has no end in sight and video from body cameras will be combined with that from static cameras (e.g. security, traffic, surveillance and CCTV cameras). Download this informative eBook to learn more!


Expediting Police Response

Technology is an increasingly important weapon in law enforcement’s ongoing battle against crime. As criminal elements become more sophisticated, law enforcement agencies must endeavor to remain several steps ahead; which means increased use of things like body-worn cameras, video and data analytics, and cloud-based technologies. The most advanced agencies are planning to use or are already using these cutting edge technologies.


The New Look of Cyberdefense: Converged Infrastructure

These are interesting times when it comes to technology. Outside of security, government has come to realize that traditional infrastructures can no longer cope with the data traffic, which rapidly continues to grow. Market analyst IDC believes worldwide that it could reach 180 zettabytes—or 180 billion terabytes— in 2025, up from just 4.4 zettabytes in 2013. How to cost-effectively upgrade and scale their IT infrastructures to handle this explosion of data is a primary focus for government agencies. Download this informative report to learn more.


The Rise of Hyperconvergence

Moving to a hyperconverged infrastructure addresses many of the issues facing federal government agencies these days. It can be more cost-effective, provide greater capacity, increased flexibility, rapid scalability, and promote innovation. This report — presented by Dell, Intel® and Tracewell — details several aspects of the move to hyperconvergence; from establishing a “future-ready” architecture capable of handling massive data stores and the durability requirements of field operations to software-based and virtualized infrastructure.


Take a Positive Approach to Security

When it comes to a developing an organizational vision for security, government agencies need to address the frequent view of security as an obstacle to performance and productivity. Agency and IT leaders must weigh the trade-offs between using new technologies and services, and how related security measures would affect workflow. Dell Security believes that’s the wrong way to view security. It maintains that security "done right" can help government organizations to more readily leverage technology, helping their workers to be more productive and to safely access the information and applications they need to do their jobs.


Case Study: Iowa Communication Network

After struggling with large amounts of data scattered across multiple services, Iowa Communications Network (ICN), the state's premier broadband carrier network, needed to create a central visual point for data. Read how ICN implemented SiSense Business Intelligence to combine, visualize and analyze data, bring data transparency to their agency, and ultimately inspire better performance.


ITES-3H: The New Face of Defense Contracts

The most recent iteration of the U.S. Army’s IT Enterprise Solutions contract—ITES-3H—is a notable step forward in the evolution of this contract. After the ITES-2H contract, originally award in 2014, was extended several times and had more than $1 billion added to its ceiling, it was time for a new format. Under ITES-3H, the contract is open to other defense agencies, although the Army is expected to account for the majority of the awards. This special report will present a series of articles explaining the evolution of ITES, the broad reaching impact of the new contract, its impact of cybersecurity, and what’s next for this contract format.


Are Hybrid Clouds the Answer?

There’s an old management axiom that says, “You can’t manage what you can’t measure.” One possible addition to that bit of wisdom might be, “You can’t measure what you can’t see.” For government agency IT managers, whose job it is to ensure system uptime, it is becoming increasingly difficult to track performance across the IT infrastructure and its various systems and applications. Download this exclusive GameChanger to learn how agencies are achieving true enterprise visibility through monitoring data from all sources.


Flash Storage Buyer's Guide

This guide covers all product classes and where they can be best applied, as well as what the key elements are for each to avoid potential pitfalls in the selection process. We’ll show you where you can be easily confused by vendors, and provide you with tools to make the best possible decision based on your environment and your applications.


Case Management in the Government Cloud

The Empowering the Business of Government eBook shares practical advice on how agencies can communicate more efficiently and effectively with the community.


Forbes Insights Report: How Agencies Achieve Results in the Cloud

Through interviews with over a dozen senior executives from a range of government agencies, consultancies and technology providers, Forbes Insights examines the state of cloud adoption by government and the likelihood it will soon accelerate.


Government Cybersecurity Imperative: A Microsoft Perspective

The U.S. national government has embraced the reality that cybersecurity is one of the most important challenges we face in our digital economy. Find out how Microsoft is working every day to enhance the security of our cloud and our customers.


Insider’s Guide to Police Body-Worn Video

Body-worn camera technology is a part of more informed police work. Learn valuable lessons from departments that have deployed this technology and have already seen results in The Insider’s Guide to Police Body-Worn Camera Video.


Infographic: Modern Software Development

The process of modern software development incorporates agile development practices to more quickly deliver higher quality applications. Download this useful infographic to get a step by step view of how to best navigate your organization through this process.


COPLINK Everywhere

COPLINK® Everywhere puts IBM i2 COPLINK access on an officer’s mobile handheld device. i2 COPLINK is a flexible, scalable solution suite that can support a variety of law enforcement needs. Its core capabilities derive from the large COPLINK database.


How to Evaluate DDoS Mitigation Providers: Four Critical Criteria

How can you be sure that the DDoS mitigation services provider you bring on board can deliver on the promise to stop the Internet’s largest and most sophisticated attacks? This white paper explores four critical criteria on which to evaluate DDoS mitigation providers before signing on the dotted line. Akamai has developed key questions related to each to help you evaluate a provider’s threat intelligence, experience, mitigation capabilities and capacity. Our guidance is based on Akamai’s practical experience in proven mitigation approaches for different DDoS attack scenarios, as well as on our keen insight into the minds and strategies of cybercriminals and DDoS attackers.


Research Report: Digital Government Strategies

Across all levels of state and federal government, agencies are embracing the shift to digital services. Many of the moving pieces continue to evolve and work together such as: the steady move to the cloud, the increase in mobile device usage, and the cultural shifts. Download this research report to access further findings from a recent survey covering the strategies for digital government.


Enterprise Insight Analysis

Whether they are part of a business or working for a government organization, today’s investigators, security specialists and intelligence analysts are facing extraordinary pressure to respond quickly to a wide range of threats — from cyber attacks, terrorist threats, criminality, and unethical and immoral activities. These attacks are especially challenging as societies are increasing their reliance on cyberspace for economic growth, societal well-being, government operations and critical infrastructure monitoring and management. Concurrent with the increase in cyberspace reliance is an increase in cyberspace vulnerability. This vulnerability is amplified by an increasing frequency and complexity of attacks and highly variable, diverse and rapidly evolving threats. As such, there is a greater burden on organizations to respond in real time.


Combatting Advanced Threat with Endpoint Security Intelligence

IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.


IBM QRadar Security Intelligence: Evidence of Value

In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.


Forrester Total Economic Impact (TEI) Study of IBM Security Guardium

In September 2015, IBM commissioned Forrester Research consulting to conduct a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) that organizations may realize by deploying IBM Security Guardium. The study uncovered that organizations achieve cost and risk reductions while increasing productivity and tactical efficiencies from implementing IBM Security Guardium. Read the study to learn more.


Bring Order to Hybrid Clouds

While many government agencies are choosing a hybrid cloud approach to realize the primary benefits of both private and public clouds, many are realizing additional benefits of opting for an open source-based hybrid cloud. A standard hybrid cloud still entails managing cloud software components from multiple vendors and ensuring all applications and data are properly integrated. When agencies take the open source-based approach, they can simplify migration to a hybrid cloud, while also realizing the agility and flexibility of open source.


Monitoring is a Security Essential

As government agencies migrate to the cloud, they are working to adhere to the Government Performance and Results Modernization Act, launched by the Office of Management and Budget in 2012 to improve federal network security. Continuous Diagnostic Monitoring (CDM) is the foundation of this security initiative. CDM aims to improve security by watching round the clock for intrusions, vulnerabilities and other potentially malicious activity.


Open Source Drives the Agile Cloud

More government agencies are moving data and applications to the cloud. In doing so, the first major decision is choosing the best platform for the job: public, private or hybrid. Another option has been emerging of late—the open hybrid cloud. With open hybrid cloud platforms, government agencies are finding greater efficiency, flexibility and cost savings.


eBook: The Right Infrastructure Strategy to Support Bimodal IT Capabilities

Chances are good that your IT organization is supporting a large number of core business applications—and they’re probably under extreme pressure to deliver innovation for the business at a moment’s whim. But to do both effectively, your IT infrastructure better boast some very specific characteristics—such as a bimodal model—but why?


Blending cloud-native and conventional applications

Most cloud native applications rely on conventional system integrations to deliver business value. Cloud native apps are optimized for agility and speed, but conventional apps bring the security and stability enterprises need in their infrastructures. Download this whitepaper to learn the ten lessons from early adopters for successful integration of cloud native and traditional applications.


Enterprise Insight Analysis for Cyber Threat Analysis

Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Today’s cyber threats are becoming more sophisticated, agile and capable of getting past any network security. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat analysis into their security strategy and turn their defense into a proactive offense. Download this article to learn more!


Beyond Borders: Tracing the impacts of Smarter Public Safety, Frost and Sullivan

See how law enforcement agencies are pursuing more effective public safety by taking advantage of advances in predictive analytics and collaboration technologies.


Drive Data to Decision

Data and information assist the decisions made during military defense operations. In this eBook, we look at the rapidly evolving use of advanced analytics in defense intelligence.


What is Cyber Threat Analysis?

What is Cyber Threat Analysis? Human-led analysis and computer-driven analytics equal actionable insights that protect data and neutralize cyber threats. Download this infographic to learn more!