September 2014- Protecting the government's data is an all-consuming, top priority. As the federal government's data growth continues to spiral, and as the types of data threats and leakage change, data and storage managers have no choice but to be on the front lines of protecting their agencies' data. That means first building a solid data storage and management foundation Â– one that ensures that all data is accounted for at all times and that it's continually backed ...
Each U.S. federal agency must implement information security safeguards, audit these safeguards annually, and make an accounting to the Office of Management and Budget (OMB). However, agencies face a number of challenges in implementing and monitoring these safeguards such as constantly-changing IT systems and a lack of specialized tools.
The good news is that even seemingly small measures can have a significant impact. In this white paper, we discuss:
August 2014- From physical to virtual to cloud, I.T. organizations have adopted increasingly complex technologies as their enterprises demand greater agility. It's left to I.T. leaders and their organizations to manage this complexity, keeping operating costs low while delivering on ever-increasing SLA expectations. With the rapid growth in unstructured data volumes, I.T. organizations are turning their attention to storage to eliminate costs and inefficiencies while increasing performance, security, and reliability.
August 2014- File sync and share capabilities are now considered essential by an increasingly mobile and productive work force. While consumer-grade, cloud-based file sync and share solutions often provide a convenient data storage medium, they are outside of corporate control and data policies, and represent a serious concern for enterprise IT departments. To address these shortcomings, ownCloud, Red Hat, and HP have worked together to provide a cost-effective and scalable file sync and share solution that is ...
The cost of cyber crime across the globe has already grown to $100 billion
annually, not counting the intangible damage to enterprise and government
security. In addition to the data loss and security breach, there is immeasurable,
and sometimes irrevocable, damage to the brand.
Analyzing machine data from firewalls and perimeter devices in real time to thwart - and predict - threats is the only defense for most institutions. However, the amount of data ...
August 2014- The asymmetric nature of today's cyberthreats means that federal organizations face dangers from multiple fronts. A pioneer in big data analytic methodologies, IBM delivers a complete solution framework that enables government agencies to confront an evolving cyberthreat landscape.
October 2014- How can federal organizations stay ahead of today's sophisticated, fast-changing threats, particularly when budgets are tight? It's not that agencies lack protections. Most have put in place strong perimeter defenses and other security tools, but they cannot simply stand pat against threats that are constantly devising new ways to evade defenses, compromise networks, and exﬁltrate data. Agencies must be equally agile in countering evolving cyber threats. Doing so requires that they ﬁnd ways to ...
March 2014- This anthology of blog posts from Tripwire's award-winning blog, "The State of Security" provides five cybersecurity experts' views on vulnerability management."
Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how their company handles the immediate aftermath of a cyber-attack and what would help their teams more successfully detect and remediate these events.
Learn the unsettling truth about how limited today?s information security departments really are when it comes to defending their domains, including:
February 2014- IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.
November 2013- The research service sets the stage for visionary thinking by identifying and analyzing one of the significant Mega Trends, Smart is the New Green. 'Smart' as a value proposition has been increasingly replacing 'Green' concepts. This presentation would highlight examples of projects, companies and technologies that will invade and change the smart city space globally in the next decade. It also provides information on the total addressable smart city market size opportunity and discusses smart ...
Even with multi-factor authentication becoming more and more the norm in the defense community, managing accounts with elevated privileges continues to be a challenge. Application service accounts and administrative accounts can be used to make siginifcant changes to IT infrastructure -- and since they are often common accounts used by multiple individuals, controlling and monitoring their usage can be time-consuming and problematic at best.
This technical brief, "Managing the Risk of Privileged Accounts ...
When federal leaders discuss solutions for big-data initiatives, there are a few "must haves:" power, flexibility, ease of use and affordability. With the right solution, federal leaders can manipulate big data to produce actionable insights while increasing productivity across the agency.
This GCN technical brief discusses the Kitenga™ Analytics Suite and why it's the perfect choice for federal agencies.
May 2013- IBM QRadar Security Intelligence Platform integrates SIEM, log management, behavioral anomaly detection, and configuration and vulnerability management to give government agencies 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.
May 2013- For the busy executive, security is not an issue that can simply be delegated; it must be embraced as another important component of any plan for doing business in an increasingly complex and technology-driven world.
May 2013- Access to reliable, cross-department mission and financial and operational performance information is crucial to ensure transparency and accountability. Read the white paper to see how analytics unites data silos so that government agencies can set goals, make more informed decisions and achieve improved outcomes for citizens.
Seamless integration between the data center and globally distributed locations at the edge
Maximizing user productivity regardless of where they reside is a key requirement but for branch offices, there is a particular challenge - where to place the resources the users need. Typically, it is a choice between the branch and the data center.
So what is the best approach? Until now, organizations had to choose between one or the ...
March 2013- The drive to capitalize on big data in government is strong, yet the influx of this data is presenting new challenges for IT departments. For example, analyzing and storing big data requires substantial infrastructure resources, but with declining budgets and limited data center capacities, IT groups cannot simply add hardware as they might have in the past. To control costs, they need to make better use of existing resources. To take advantage of big data ...
Many public safety agencies need to do more with less and link spending to outcomes. The global trends highlighted in this report show the increasing challenges and issues confronting public safety agencies.
This white paper describes how developing competencies in five key area can help public safety agencies more effectively do their jobs in the face of extremely important and difficult sets of issues.
February 2013- Crime prediction and prevention analytics from IBM helps agencies make the best use of the people and information at hand to monitor, measure and predict crime and crime trends. Analysis of police data provides insight that lets officers track criminal activities, predict the likelihood of incidents,effectively deploy resources and solve cases faster.
Learn how Big Data analysis techniques gives enterprises the data security they need to withstand today's highly customized inbound attacks.
Enterprises today are exposed to a range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats have evolved over time, new ...
February 2013- While IT managers can’t predict when disaster will strike, they can take steps to ensure that service will be restored as quickly as possible when it does. Raritan’s Business Continuity and Disaster Recovery Solutions helps IT staff to quickly, efficiently and accurately troubleshoot, diagnose and repair post-disaster system failures.
To ensure the secure transmission of classified and secret information, the U.S. Government has mandated that beginning April, 2013 all access to military, intelligence, and other classified systems will require the use of a limited-access computer network Secret Internet Provider Network (SIPRNet) token.
Even after organizations upgrade their systems for SIPRNet token access and issue hardware tokens, complying with the DoD mandate still poses significant challenges: How can authorized users quickly and securely ...
January 2013- Cloud computing represents a strategic generational shift in how IT operates. It can help IT address growing pressures to be more flexible and more responsive to business needs. It can increase IT efficiency and agility, and help reduce risk of operation in organizations of all sizes. Most important, cloud computing can make IT more reliable, without sacrificing security and governance.
January 2013- A secure cloud is attainable. In fact, industry luminaries David Hunter of VMware and Arthur Coviello of EMC say clouds can be more secure than physical infrastructure. These professionals explain how to keep your cloud secure and the security solutions offered by VMware and RSA.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services