Whitepapers


NETCENTS-2 Makes Good Business Sense

The Defense Department’s focus on net-centric war fighting has sharpened over the past decade. Along the way, its IT contract vehicles have become more important as a way to focus technology on that goal. Network Centric Solutions-2 (NETCENTS-2) is a critical contract vehicle to help the Air Force acquire technology tailored to its specific mission needs.


Building a More Efficient Government with eSignatures

Replacing manual paper-based systems with digital systems can help any federal agency operate more efficiently and experience tremendous cost savings. Something like an electronic signature system can also provide greater security and transparency. After all, electronic workflows and e-signatures have been a legal form of representation following the ESIGN Act of 2000. This paper details how reengineering processes to incorporate e-signatures can expedite federal agency workflows and improve efficiency, accuracy and security.


Case Study: DocuSign Delivers 70-fold ROI for Large Midwestern State’s Child Welfare Department

The Child Welfare Department in a large Midwestern state was experiencing backlogs in contract processing. Most contracts typically require as many twelve signatures that were extremely hard to secure in a timely fashion. An electronic signature seemed like the obvious answer. DocuSign’s e-signature system saved $70,000 annually and reduced contract processing from three weeks to less than an hour. This case study presents their experience with the e-signature system.


Reimagining Government in the Cloud

The cloud continues to dramatically change the manner in which federal agencies operate, saving costs and time and increasing security. Following the guidance of FedRAMP, the Program Management Office estimates agencies have experienced $40 million in cost savings within in the first two years. Reaplcing manual processes with digital cloud-based processes, and relying on FedRAMP authorized cloud services, can streamline federal agency operations, as defined in this white paper.


The Time to Go Digital Is Now

During a recent webcast, government and industry experts gathered to discuss the benefits government agencies can realize by moving to digital processes. Agencies adopting electronic signatures can greatly reduce delays, improve security, expedite projects, and experience significant cost savings. Speakers included experts from DocuSign, and agency executives from the Oregon and Nevada Departments of Transportation. This webcast review summarizes their comments and experiences.


Case Study: Nevada DOT Speeds Contracts by 10x with DocuSign

When the Nevada Department of Transportation needed to expedite operations, it opted to replace paper-based processes with an e-signature system. It chose DocuSign’s Digital Transaction Management (DTM), which greatly improved the agency’s efficiency across the board. For example, moving to electronic documents reduced the time for processing highway construction contracts from 50 days to five. This case study outlines the advantages it realized, and how any federal agency can experience similar outcomes.


Internet of Things: Smart Government Solution

The Internet of Things (IoT) is ushering in an era of smart cities and smart government. The benefits of smart government include reduced operating costs, increased responsiveness, improved sustainability, higher efficiency, constantly-available process data, and greater citizen satisfaction. In the consumer world, people have become familiar with smart consumer devices that enable interaction with the smart home via mobile phone. As this moves into government and commercial realms, significant new considerations must be managed.


Infographic: Internet of Things in Smart Cities

The smart city train is leaving the station. According to a worldwide user survey conducted by Extreme Networks, 66% of municipal IT staffs are investigating, evaluating, and implementing smart city projects with Internet of Things devices. A broad range of projects are being driven by the very low cost of IoT sensors, the prevalence of smart phones, and the growing demand of residents for more and better services.


The State of Security in State & Local Government

Cyberattacks are more frequent and sophisticated than ever. According to Akamai’s State of Internet Security Report, web application attacks alone grew by 35% between Q1 2016 and Q1 2017. As attackers become less selective, every agency is at risk. In this infographic we explore how state and local governments are stepping up to battle these growing cyberthreats.


The Rugged Truth: TCO of Rugged vs. Non-Rugged Computing Devices

Are you trying to determine if a rugged notebook or tablet is right for your business? Technology Business Research, Inc.(TBR) found in their recent research, purchasers should understand the true value of their mobile computing by calculating the total cost of ownership to see if a switch to rugged systems is worthwhile. In order to help IT and organizational purchasers make the right computing investment, Dell and Intel® recently worked with VDC Research to understand the true total cost of ownership for rugged vs. non–rugged notebooks and tablets in harsh work environments. Read this white paper to see the costs associated with each scenario and to help you determine if a rugged solution would benefit your business.


Breakthrough Technology Interactive eGuide

The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready.


Real-World Testing Ensures Real-World Performance for Rugged Devices

The increasingly mobile nature of technology enables computing devices to go out into the field with workers. And computing devices leaving the office face the same perils as their human counterparts. Like workers in the field, the technology needs to be tough enough to survive adverse conditions.


Research Report: VDI Gains Ground with Room to Grow

In a recent study by the 1105 Public Sector Media Group, over 115 federal, state and local government respondents were surveyed on their views and their agency’s experiences with VDI. Topics included VDI adoption status, IT challenges and strategies, implementation benefits, and hosting and purchasing preferences. Download this research report to gain access to the survey findings.


Defending Government Against Ransomware Attacks

Ransomware and other threats to data security are serious concerns for any organization, but the stakes are higher and the risks are greater for government agencies. This paper details the current security challenges confronting government organizations, and provides insights on how a cloud sandbox can protect sensitive data from this 21st-century form of extortion.


Supporting Government Application Development through Digital Innovation

Explore how to develop and maintain cloud-based applications with Red Hat. Using OpenShift Container Platform, developers can quickly and easily create applications on demand directly from the tools they use most. Learn more about additional features and benefits here.


Hyperconvergence Saves Money, Boosts Efficiency

Are you running multiple systems and hardware types within your data center? Is a lot of that hardware ready for a refresh? Download this informative report to learn how the Harris County, Texas, district attorney’s office reduced its data center footprint by 80 percent, reduced downtime, and increased resiliency by shifting away from a traditional setup.


The Staying Power of SEWP

With nearly 150 approved contractors, a huge array of products, and stellar customer service, it’s no surprise NASA SEWP (Solutions for Enterprise-Wide Procurement) is still going strong after 24 years. In this special report, we take an in-depth look at this contract’s operations, processes and key offerings as well as highlight the benefits that make SEWP the reigning go-to vehicle for agencies needing to acquire advanced commercial technology.


2017 Thales Data Threat Report Federal Government Edition

Federal agencies must deal with critical needs for sensitive data in volume, the most challenging threat environments, the strictest regulations and the most difficult budget constraints – and it’s putting their data at risk. Read the report to learn the state of data threats for federal agencies today, and best practice recommendations from 451 Research.


Vormetric Data Security Platform Mapping to NIST 800-53

Critical to certification for meeting FIPS, is the implementation of security controls from NIST800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform.


Hybrid Cloud Storage: Federal Agency Considerations for Moving to the Cloud

Over the last few years, cloud computing and infrastructure—the delivery of services to users over a network—has taken the IT world by storm. There’s hardly a government agency that hasn’t already adopted (or isn’t currently considering) a move to cloud-based delivery models, and for good reason: the cloud offers a solution to IT management, resource, and cost challenges facing agencies today. Learn more in this informative report.


Oracle Cloud Services: New Possibilities for Government

Are you taking advantage of the most modern cloud options to empower your agency missions? Cloud solutions are less expensive, more scalable, and promote faster implementation of new services. Hear how both The City of Fort Wayne and The City of Chicago achieved their goals with the cloud in this informative report.


Open Source Security 101

At present, there are a lot of broken links in the security world. It is well-known that attacks on government systems are multiplying and concurrently becoming more sophisticated on a daily basis. Further, the technology the world consumes is becoming more complex, and defending it isn’t such an easy feat. Both enterprises and federal agencies face the daunting task of satisfying security needs while embracing digitalization. Many security experts are asking the question: “what’s the best way?”


Snapshot Report: A New Blueprint for Digital Government

Digital services are the future of government. Yet despite the clear need for improved digital services, agencies without a mature digital strategy simply can’t get there. To achieve a successful and sustainable transformation, services must be anchored with reliable security. Download this special report to learn the six strategies agencies should adopt to ensure digital transformations are both effective and secure.


Top 3 Unique Splunk Security Integrations

Taking a holistic approach in which tools are fully integrated can strengthen and improve the overall cybersecurity posture of an organization. Agencies can even implement solutions that create a uniform experience for multiple environments where all content is synchronized to assist in the smarter use of data. Download this eBook to explore the top three unique Splunk integrations August Schell identified to help enhance the value of your agency’s security analytics program.


Rugged Tablets Drive Government Mobile Workforce Evolution

While tablets are becoming less popular with consumers, it is not the case in the government market. While smartphones are becoming widespread, tablet demand is increasing across the government. Download this informative white paper to learn how government agencies are rapidly moving towards a mobile workforce!


Infographic: Time for a Load Balancer Upgrade?

Government networking experts are moving away from traditional hardware-based architectures. In this infographic, we outline the critical success factors needed to future proof your agency’s application delivery control. Uncover the benefits of using a software-first architecture, including an improvement in security, increase in agility, and a reduction in operational overhead.


Take Cybersecurity to the Next Level

A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


Take the Software-First Approach to App Delivery

As agencies address the challenges of adapting their networks to suit modern requirements, and doing so within static or shrinking budgets, they’re forced to make some challenging tactical decisions. Those decisions often involve new approaches and new technologies to streamline network operations and expand network capabilities. Ultimately, agencies are adopting virtualization and software-based network technologies to accommodate increased capacity demands, support new initiatives and reduce costs.


Expert Q&A: Realizing the Promise of DevOps

DevOps is changing the way government organizations develop applications to improve business functions and provide better services. However, the process is often obstructed from delivering its full potential value since applications developed for one environment don’t often work as well in another. In this Expert Q&A, Red Hat’s Joel Jackson shares insight on how container technology and microservices can help support the full promise of DevOps.


A Guide to 2017 Connectivity Solutions

It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges. In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.


Improving RMF Practices Through Automation

Relentless cyber attacks from adversaries have prompted federal agencies to take a more holistic and systematic approach to integrating information security into broader organizational risk management strategies. Practices defined in the Risk Management Framework (RMF) are being employed across the federal government to improve visibility, implement better controls, and support faster responses to cyber threats across IT applications and infrastructure.


OpenStack Storage for Dummies

As more applications and data are distributed across virtual machines in the cloud, a more agile and scalable solution is needed to enable ever expanding cloud services and, ultimately, the software‐defined data center supporting them. Download this guide to learn more on OpenStack and Ceph storage, including real-world use cases and configuration best practices.


The Economics of Software-Defined Storage

Data growth is a standard problem of the modern digital age. Being data driven to remain in business and increase profitability is not an option; rather, it is a necessity. In these complex times, tighter IT budgets along with the need to shift the focus on business requirements are putting added pressures on IT departments. This whitepaper examines a new era of software-defined storage solutions that allows businesses to build out a service-based storage infrastructure in an economically feasible manner.


Adopt Commercial Best Practices for Travel

Despite a modest degree of automation and modernization, the steps federal government employees have to go through to make travel arrangements and then file vouchers is unnecessarily complicated and time-consuming. By adopting best practices already in use by private enterprise, federal government agencies can streamline processes, save money, increase visibility and efficiency, and improve the user experience for both the individual and agency administration.


Mobile Security: A Multi-Faceted Approach

Government agencies rely on mobile devices more than ever before. And it’s not just field operatives or inspectors. Agency staffers at all levels are being issued mobile devices. The challenge now for agencies is to ensure productivity and access to the tools they need to do their jobs; while at the same time ensuring those devices are truly secure. Security threats facing mobile devices continue to evolve, and so too must the security solutions and policies that protect those devices.


Mobile E-Signatures for Government

Although it is still early stages for mobile government, organizations at all levels are developing mobile strategies. Many are taking a two-pronged approach, equipping employees for mobile productivity while also using mobile apps to improve civic engagement and service delivery. As a result, we are seeing an increase in inquiries on mobile e-signature capability for government employees signing documents as part of G2E, G2G, G2B and G2C use cases. While many are focused on internal signing workflows, there is a need to adopt responsive technologies and mobile tools that can scale to vendor- and citizen-facing use cases – especially those mediated by recruiters, first responders, inspectors and other field personnel.


SEWP Keeps Pace with Tech Horizons

NASA’s Solutions for Enterprise-Wide Procurement (SEWP) contract vehicle has grown in size and currently operates with 145 contract holders, 119 of which are small businesses. Over the years, SEWP has gone from just one of a number of government-wide acquisition contracts (GWACs) to the top of the pile. It’s widely considered as one of best run IT-based contracts and has become a go-to resource for government agencies. Download this special report containing expert viewpoints from SEWP Program Manager, Joanne Woytek and experienced contract holders, as we take a deeper dive into SEWP V.


How to Evaluate DDoS Mitigation Providers: Four Critical Criteria

How can you be sure that the DDoS mitigation services provider you bring on board can deliver on the promise to stop the Internet’s largest and most sophisticated attacks? This white paper explores four critical criteria on which to evaluate DDoS mitigation providers before signing on the dotted line. Akamai has developed key questions related to each to help you evaluate a provider’s threat intelligence, experience, mitigation capabilities and capacity. Our guidance is based on Akamai’s practical experience in proven mitigation approaches for different DDoS attack scenarios, as well as on our keen insight into the minds and strategies of cybercriminals and DDoS attackers.


Cloud Encryption Gateway: Enabling Security and Compliance of Sensitive Data in Cloud Storage

Companies are increasingly reliant on cloud storage and are storing sensitive data in cloud storage, which could be vulnerable to security threats. The Vormetric Cloud Encryption Gateway is a scalable solution that provides the security to use the cloud fully without sacrificing performance.


Army ITES: Recharging the Enterprise

The manner in which the Army procures its technology to run the Army enterprise continues to evolve almost as rapidly as the technology itself. New and revised contract vehicles provide sensible, cost-effective means of equipping the Army with the latest technologies, including cybersecurity and mobile technology. As Army Chief of Staff General Mark Milley says, new and emerging technologies could “deeply change the character of war.”


NETCENTS-2: Bringing Convergence to Defense

The relatively new NETCENTS-2 contract vehicle is a true evolution of earlier iterations. It is intended to provide faster, more flexible and more comprehensive access to a variety of technology categories. The contract aims to provide agencies with network-centric IT, networking, security, voice, video and data communications solutions and services not available through other mandatory-use DoD or Air Force contract formats.


Expediting Police Response

Technology is an increasingly important weapon in law enforcement’s ongoing battle against crime. As criminal elements become more sophisticated, law enforcement agencies must endeavor to remain several steps ahead; which means increased use of things like body-worn cameras, video and data analytics, and cloud-based technologies. The most advanced agencies are planning to use or are already using these cutting edge technologies.


The Rise of Hyperconvergence

Moving to a hyperconverged infrastructure addresses many of the issues facing federal government agencies these days. It can be more cost-effective, provide greater capacity, increased flexibility, rapid scalability, and promote innovation. This report — presented by Dell, Intel® and Tracewell — details several aspects of the move to hyperconvergence; from establishing a “future-ready” architecture capable of handling massive data stores and the durability requirements of field operations to software-based and virtualized infrastructure.


Take a Positive Approach to Security

When it comes to a developing an organizational vision for security, government agencies need to address the frequent view of security as an obstacle to performance and productivity. Agency and IT leaders must weigh the trade-offs between using new technologies and services, and how related security measures would affect workflow. Dell Security believes that’s the wrong way to view security. It maintains that security "done right" can help government organizations to more readily leverage technology, helping their workers to be more productive and to safely access the information and applications they need to do their jobs.


Government Cybersecurity Imperative: A Microsoft Perspective

The U.S. national government has embraced the reality that cybersecurity is one of the most important challenges we face in our digital economy. Find out how Microsoft is working every day to enhance the security of our cloud and our customers.


Insider’s Guide to Police Body-Worn Video

Body-worn camera technology is a part of more informed police work. Learn valuable lessons from departments that have deployed this technology and have already seen results in The Insider’s Guide to Police Body-Worn Camera Video.


Case Management in the Government Cloud

The Empowering the Business of Government eBook shares practical advice on how agencies can communicate more efficiently and effectively with the community.


Forbes Insights Report: How Agencies Achieve Results in the Cloud

Through interviews with over a dozen senior executives from a range of government agencies, consultancies and technology providers, Forbes Insights examines the state of cloud adoption by government and the likelihood it will soon accelerate.


Infographic: Modern Software Development

The process of modern software development incorporates agile development practices to more quickly deliver higher quality applications. Download this useful infographic to get a step by step view of how to best navigate your organization through this process.


How to Evaluate DDoS Mitigation Providers: Four Critical Criteria

How can you be sure that the DDoS mitigation services provider you bring on board can deliver on the promise to stop the Internet’s largest and most sophisticated attacks? This white paper explores four critical criteria on which to evaluate DDoS mitigation providers before signing on the dotted line. Akamai has developed key questions related to each to help you evaluate a provider’s threat intelligence, experience, mitigation capabilities and capacity. Our guidance is based on Akamai’s practical experience in proven mitigation approaches for different DDoS attack scenarios, as well as on our keen insight into the minds and strategies of cybercriminals and DDoS attackers.