Visual Privacy: A Critical Protection Area for the Federal Government
[ Source: 3M ]
October 2010-
In the public services sector, the protection of private information is seen as a basic right. But while much focus has been put on storage and transmission security, displayed data remains exposed to risk. We cover the challenges and potential solutions here.
How To Provide Government Services Through Social Media: Tips Revealed
[ Source: Adobe ]
September 2010-
This IDC Government Insights White Paper discusses government's new efforts to achieve its goals regarding service delivery to citizens, businesses, and other government agencies.
Today, more than ever, citizens are looking for their government leaders to keep them informed and support their needs. And citizens increasingly expect to interact with government on their terms, 24 x 7, and not only receive information but also conduct their government business through self-service when possible.
As ...
Meeting Compliance Objectives In SharePoint
[ Source: AvePoint ]
February 2009-
This document is intended to aid IT administrators and other stakeholders responsible for managing Microsoft SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.
Best Practices For SharePoint Backup And Recovery
[ Source: AvePoint ]
April 2009-
This white paper is intended to aid IT administrators responsible for managing Microsoft SharePoint deployments in planning and implementing a comprehensive, reliable, and efficient data protection strategy appropriate to their organizational needs. It outlines the planning, guidelines, and implementation considerations for SharePoint backup and disaster recovery, then briefly reviews the singular attributes of DocAve Backup and Recovery.
From Development To Production: Streamining SharePoint Deployment With DocAve Deployment Manager
[ Source: AvePoint ]
March 2009-
This paper –- co-authored by AvePoint and Microsoft -– reviews best practices for propagating SharePoint customizations, services, and solutions throughout a complex SharePoint environment, and introduces tools and strategies available to automate and streamline this process.
Private Sector Cyber Security as a National Security Issue
[ Source: Bloomberg Government ]
January 2012-
In this revealing study, Bloomberg Government discusses the need for the U.S. government and corporations to plug cyber-security gaps that threaten the economy, sensitive data and military communications. Bloomberg Government defense analyst Rob Levinson examines the ongoing efforts to expand the government's role in securing non-government systems, and discusses concerns over costs and privacy issues.
Ideal ID
[ Source: CA Technologies ]
April 2010-
National Institutes of Health, part of the U.S. Department of Health and Human Services, and a major government agency supporting medical research, implements massive single sign-on user authentication project.
11 Ways to Comply with Federal Information Systems Security Requirements
[ Source: Core Security Technologies ]
April 2010-
In this white paper, government agencies learn about new provisions added to the Guide for Assessing Controls in Federal Information Systems (NIST SP 800-53A), and how a new commercial software tool addresses these provisions with penetration testing that identifies and assesses critical vulnerabilities existing across networks, endpoints and web applications.
Implementing Critical Controls for Federal Information Security
[ Source: Core Security Technologies ]
April 2010-
The release of the 2009 Consensus Audit Guidelines (CAG) outlines the need for federal cyber-security controls that are tacitly proactive and can “inform defense” of actual attacks that have compromised systems, or those that could transpire to do so.
This white paper explores specific directives of the CAG, and highlights a commercial software application that arms government agencies and their private-sector partners with the tools to perform ongoing penetration testing of web applications, network ...
6 Best Practices for Government Agencies to Secure Cyberspace
[ Source: Core Security Technologies ]
April 2010-
The Center for Strategic and International Studies (CICS) report recommends broad adoption of penetration testing across the federal space, and greater use of vulnerability and exploit testing to improve the nation’s cybersecurity standing within several different contexts.
This white paper outlines the key CICS recommendations and identifies a commercial software solution and services that address each of these key issues.