Defense Information Systems Agency Research
-
Infographic: Who needs to be on your digital transformation team?
Sponsored by: TechTarget ComputerWeekly.comAssembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
-
Advanced Case Management for Government
Sponsored by: IBMHow can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
-
Analytics Solution Center (ASC) Website
Sponsored by: IBMThe IBM Analytics Solution Center in the Washington, DC area focuses on solving the business and mission problems of public sector agencies, and the U.S. Federal government through the use of analytics. Visit this center online and see how you too can gain access to useful information, industry experts, and technology to reach your mission goals.
-
Boost Government Revenues Without a Tax Increase
Sponsored by: SAP America, Inc.SAP analytics solutions can help today's government agencies overcome the many challenges associated with tax discovery. Read on to learn how SAP's public sector software solutions can benefit government agencies by improving performance, reducing costs and streamlining service delivery.
-
Building Solutions For Smarter Governments: Six Ways to Increase Responsiveness, Service Quality, Accountability and Taxpayer Value
Sponsored by: IBMThis paper describes how smarter government means making operations and services truly citizen-centric, integrating their service delivery, coordinating programs and allowing a choice of access channels, as well as placing the most needed transactions on the Web.
-
Clearswift Government Communications 2.0
Sponsored by: ClearswiftIn this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
-
Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud
Sponsored by: IBMThis article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.
-
Cloud Computing: Get to know the basics
Sponsored by: Red HatThis white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
-
Continuous monitoring, remediation and CyberScope reporting
Sponsored by: IBMThis white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
-
Critical Technologies for Compliance and Risk Management
Sponsored by: Siperian, Inc.Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
-
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
Sponsored by: IBM Software GroupWhen you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
-
Endpoint Threat Detection Gets More Response
Sponsored by: Solarwinds MSPThis white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
-
Enterprise Content Management for Transforming Government
Sponsored by: EMC CorporationRead this issue brief by Center for Digital Government to learn how the Commonwealth of Massachusetts and the County of San Diego are improving service delivery by managing information electronically. What benefits could ECM bring to your agency?
-
Essential Supplier Report: Smart City Suppliers
Sponsored by: IBMThis report cuts to the chase when it comes to suppliers focusing on smart cities and forwar-thinking municipalities. Read now for evaluations on leading players in the market that have the capacity to provide leadership on large-scale projects spanning multiple city requirements.
-
Gartner Middle East CIO Leadership Forum
Sponsored by: GartnerJoin Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
-
Get a Better Handle on Unspent Funds
Sponsored by: SAP America, Inc.This paper details SAP's range of public sector solutions, designed specifically to assist government agencies in proactively monitoring their current and future spending. Learn how to get a better handle on unspent funds such as unliquidated obligations (ULOs) by drilling into layers of data to create accurate reports and projections in real time.
-
Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
Sponsored by: Hewlett Packard EnterpriseUncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
-
Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
Sponsored by: IBMThis resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
-
How to Prevent Security Breaches Through Effective Management and Control of USB Devices
Sponsored by: LumensionLearn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
-
Improved Scalability and Availability are the Keys to Better Storage Management
Sponsored by: EMC & ArrowThis white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
-
Into the Future: The Fast Track for Financial Markets
Sponsored by: IBM Line of BusinessThis paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
-
Optimizing the PC Segment of California's IT Infrastructure
Sponsored by: Intel CorporationResearchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
-
Overcoming challenges of asset management amid declining federal budgets
Sponsored by: IBMThis paper details an asset management solution from IBM. This option is designed for the federal government and enables seamless integration and support maintenance of every asset across the enterprise. Read this now and learn how this option can offer complete visibility into every asset, enable elevated risk management and more.
-
Protecting Critical Data is a Main Priority for the U.S. Army
Sponsored by: GlobalscapeIn this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.