DISA Reports

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

Overcoming challenges of asset management amid declining federal budgets
sponsored by IBM
WHITE PAPER: This paper details an asset management solution from IBM. This option is designed for the federal government and enables seamless integration and support maintenance of every asset across the enterprise. Read this now and learn how this option can offer complete visibility into every asset, enable elevated risk management and more.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

IBM

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

Globalscape

Building Solutions For Smarter Governments: Six Ways to Increase Responsiveness, Service Quality, Accountability and Taxpayer Value
sponsored by IBM
WHITE PAPER: This paper describes how smarter government means making operations and services truly citizen-centric, integrating their service delivery, coordinating programs and allowing a choice of access channels, as well as placing the most needed transactions on the Web.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

IBM

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

Essential Supplier Report: Smart City Suppliers
sponsored by IBM
WHITE PAPER: This report cuts to the chase when it comes to suppliers focusing on smart cities and forwar-thinking municipalities. Read now for evaluations on leading players in the market that have the capacity to provide leadership on large-scale projects spanning multiple city requirements.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

IBM

Cloud Computing: Get to know the basics
sponsored by Red Hat
WHITE PAPER: This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
Posted: 23 Jan 2012 | Published: 05 Jan 2012

Red Hat

Technical Guide on Government Security
sponsored by TechTarget Security
EGUIDE: Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Posted: 26 May 2011 | Published: 23 May 2011

TechTarget Security