federal government

Results 26 - 50 of 52Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
     Cisco
By: Cisco     Published Date: Dec 21, 2016
Across organizations from all sectors, the network is becoming more integral to daily operations. This is acutely felt by public sector organizations in the United States, namely federal, state, and local governmental organizations. Public sector organizations contend with the challenge of ensuring the security of highly sensitive data on the network in the midst of uncertain budgets and, in many cases, outdated infrastructure. At the same time, many public sector organizations grapple with a complex web of compliance protocols that must be supported on the network. This Analyst Connection explores the need for network infrastructure upgrades that include "foundational security."
Tags : 
     Cisco
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
     Cox Business
By: Palo Alto Networks     Published Date: Dec 02, 2016
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered.
Tags : palo alto, automated malware, security, cloud
     Palo Alto Networks
By: CyrusOne     Published Date: Jul 05, 2016
Data centers help state and federal agencies reduce costs and improve operations. Every day, government agencies struggle to meet critical cost controls with lower operational expenses while fulfilling the Federal Data Center Consolidation Initiative’s (FDCCI) goal. All too often they are finding themselves constrained by their legacy in-house data centers and connectivity solutions that fail to deliver exceptional data center reliability and uptime.
Tags : data center, best practices, competitive advantage, productivity
     CyrusOne
By: Dice     Published Date: Feb 10, 2016
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector. These results are a must-read for government officials who want to stay up-to-date with developing trends in recruiting.
Tags : reachmail dice, tech candidate sentiment, government officials, recruiting trends, millenials
     Dice
By: Dell     Published Date: Feb 04, 2016
Dell Software has been chosen by over 95% of Federal agencies to complete their missions. Our federal government services and solutions are designed to be future-ready, and we’ve done it all without locking customers into proprietary technology. They’re based on open standards, and they’re modular and easily scalable to give your organization the flexibility and agility it needs to capitalize on every opportunity - even the ones that don’t yet exist. We hope this document, along with the simplified procurement of DLT Solutions, will provide enough help to get your mission needs executed.
Tags : dell, software, government, technology, federal, enterprise applications
     Dell
By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management
     IBM MaaS360
By: Dice     Published Date: Jul 01, 2015
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector.
Tags : recruiting, management, talent, connectivity. culture, millenial
     Dice
By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
     Teradata
By: McAfee     Published Date: Oct 28, 2014
For SIEM to help usher in more effective security and risk management strategies—particularly related to threat mitigation, embracing trends, and aligning with business priorities—these five business issues must be addressed. McAfee spoke with SIEM users and this brief lists those top issues along with corresponding customer case studies and use cases.
Tags : big security data, situational awareness, real-time context, management ease, integrated security, siem, mcafee, risk management strategies, siem use cases, customer stories, federal government, healthcare provider, retailer, utility company, financial services, security
     McAfee
By: Agile IT     Published Date: May 13, 2014
The American Federation of Government Employees (AFGE) is the largest federal labor union, representing close to 650,000 federal government employees. Since the organization was looking for a cost-effective solution to upgrade its mail system and communication environment, and its users were already familiar with Microsoft programs, the organization looked to migrate to Microsoft Office 365 with the help of Agile IT.
Tags : federal labor union, office 365, agile it, networking, it management, enterprise applications, platforms
     Agile IT
By: Interactive Intelligence     Published Date: Apr 23, 2014
To put it carefully, certain technology decisions at the federal level since 2002 have been questionable. But citing new “Cloud First” policies for implementations in government contact centers, data centers, and federal agencies, cloud initiatives are now showing value by way of cost reductions and broader functionality. Abdo Rabadi of Blue Kite Consultants and Mechele Herres of Interactive Intelligence say even more benefits of the cloud await. Read how the federal government can best achieve them.
Tags : interactive intelligence, cloud communications, cloud, cloud solutions, government, cloud providers, business process automation, contact center, infrastructure, data center
     Interactive Intelligence
By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management
     FireEye
By: Riverbed     Published Date: Jul 17, 2013
This guide includes a demonstration on how you can accelerate troubleshooting, gain end-to-end visibility, and solve intermittent performance problems without having to recreate them; a detailed case study that shows how a large-scale federal government and defense consultant solved a months-long problem in just 15 minutes; and an on-demand webinar that introduces you to Cascade Shark and Cascade Pilot.
Tags : network, troubleshooting, speed of thought, performance, network
     Riverbed
By: Tripwire     Published Date: Feb 08, 2013
John Gilligan, former CIO of the U.S. Air Force and the U.S. Department of Energy, led the development of this document; it represents a consensus of government and nongovernment experts.
Tags : cyberdefender, security, federal, government, sans 20 sc, dhs, defense
     Tripwire
By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring
     Q1 Labs
By: Levene Strategies     Published Date: Oct 25, 2011
Writing effective Federal proposals is a necessary component of doing business with the Government. Learn how to avoid several common mistakes.
Tags : 
     Levene Strategies
By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
Learn more about how LifeSize is changing the game in the video space and what government agencies should be looking for when purchasing video confere
Tags : lifesize, video conferencing, multimedia presentation, productivity, high definition
     LifeSize, a division of Logitech
By: VMware     Published Date: Aug 18, 2011
Federal IT leaders are deploying VMware cloud infrastructure solutions to meet these new mandates emphasizing the use of modern technologies to achieve greater efficiency and contain costs.
Tags : vmware, federal roadmap, cloud, federal government, virtualization, it transformation, cloud infrstructure solutions
     VMware
By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
     Aberdeen
By: Aberdeen Group     Published Date: Jun 02, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
     Aberdeen Group
By: Shavlik Technologies     Published Date: Apr 19, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
     Shavlik Technologies
By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
     Shavlik Technologies
By: ACT-IAC     Published Date: Feb 03, 2011
Comments by the American Council for Technology-Industry Advisory Council represented in Office of Management and Budget memorandum
Tags : federal it, technology, communications, acquisition, government, omb
     ACT-IAC
Start   Previous    1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com