Each U.S. federal agency must implement information security safeguards, audit these safeguards annually, and make an accounting to the Office of Management and Budget (OMB). However, agencies face a number of challenges in implementing and monitoring these safeguards such as constantly-changing IT systems and a lack of specialized tools.
The good news is that even seemingly small measures can have a significant impact. In this white paper, we discuss:
The Affordable Care Act (ACA) already has created a considerable amount of concern in the healthcare industry. It's also opening up new opportunities as well as significant business challenges for health insurance companies. Insurers need a means of:
• Handling the influx of new members
• Understanding the needs of these new members
• Ensuring processes are in place to meet compliance and quality standards
• Monitoring change as business models transition from an ...
September 2013- Dell Software commissioned leading government market research provider Market Connections, Inc. to poll federal IT workers on awareness of, and attitudes toward, the use of cloud technology for messaging and directory services in federal agencies, especially the process and timelines associated with provisioning and de-provisioning users. The results and their importance to the federal government are explained in this white paper.
July 2013- With budgets slashed to the minimum, and IT managers asked to do more with less, federal agencies have limited options for cultivating data analytics capabilities. However, powerful self-service solutions provide "in house" options for transforming big data into actional insights. See how the right solution bridges the gap between a data scientist and an in-house IT employee. Read this report.
July 2013- In "Big Data Analytics Buyer's Guide," learn how big data analytics can solve even the most challenging governmental information hurdles. Then, see what to look for in a big data analytics solution, and which one is the right fit for your agency. Read this valuable guide today.
The benefits of self-service business analytics are unlimited. However, setting up a self-service business analytics environment takes discipline, a strong plan, the right tools and more.
In this new McKnight Consulting Group white paper by Dell, discover the top five things to consider when discussing self-service BI - and why each is important for success.
July 2013- Federal data is growing at an alarming rate, fed by mobile technology, smart sensors, cloud services and mobile and online interactions. What's more, much of this data is unstructured - data like video, audio, email, sensor data, text messages and social media posts. Unstructured data is much more difficult to store, process and analyze than traditional, structured data from databases and transactional data. The challenge for government agencies is how to use this growing cache, ...
Knowing which programs your agency should support doesn't have to be a guessing game. With Oracle's Primavera Portfolio Management's enterprise approach to governance, agency executives can align projects with strategic goals, balance spending and assess risk.
This paper addresses the challenges and benefits of implementing a strategic governance solution to assist in better portfolio management and, ultimately, improved delivery of high value capabilities and citizen services from all projects and programs.
Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How an organization is able to store and manage their data, including email, has a high impact on regulatory compliance.
Read this white paper ...
August 2012- The core architecture of external storage solutions have gone largely unchanged for the past 20 years. Until recently, scale-out storage was a solution for niche markets. It has been tucked away in an IT corner, mostly used in HPC, scientific computing, and media and entertainment environments. A good deal of data center spending was put on hold, recently there has been uptake in scale-out storage, but adoption was clearly hampered by IT budget pressures. Now, with ...
August 2012- Over the past ten years, enterprises have seen enormous gains in scalability, flexibility, and affordability as they migrated from proprietary, monolithic server architectures to architectures that are virtualized, open source, standardized, and commoditized. Unfortunately, storage has not kept pace with computing. The proprietary, monolithic, and scale-up-solutions that dominate the storage industry today do not deliver the scalability, flexibility, and economics that modern datacenter and cloud computing environments need in a hyper-growth, virtualized, and increasingly cloud-based ...
Scale-out storage technologies have rapidly gained popularity over the past several years, successfully crossing the chasm from niche technology to mainstream enterprise solution. As this shift occurs, an increasing number of enterprises are seeking to understand the advantages of the newer technology when it comes to the storage of exploding amounts of unstructured data.
While many sources have investigated the advantages of scale-out storage from a technology perspective, few have taken on this ...
February 2012- This report describes the challenges that arise during a transformation to stakeholder-centric or citizen-centric service delivery. It highlights the crucial roles that key business and IT capabilities play for any public sector organization navigating those challenges.
December 2011- To assist federal agencies with the implementation of CyberScope reporting, IBM Tivoli Endpoint Manager, built on BigFix technology, provides insight and control for endpoints with streamlined, automated capabilities for continuously monitoring and remediating security compliance.
March 2012- Federal agencies are refining program management practices in response to the Obama administration's Government Accountability Initiative. Learn more.
SolarWinds IT management products are used by virtually every civilian agency, state government, and branch of the military.
Discover why SolarWinds provides powerful and affordable IT management software to federal, state, local and education customers - from enterprise deployments to tactical networks supporting warfighters. Built by IT pros for IT pros, our products are downloadable, easy-to-use and maintain, and provide the power, scale, and flexibility required to manage today's complex, multi-vendor IT environments. <...
The National Institute for Standards and Technology (NIST) recently released new Federal Information System Management Act (FISMA) guidance in two publications. The aim of the new guidance is to help federal agencies develop a continuous monitoring program as part of a risk management framework. It is also supposed to help the government gain an enterprise-wide view of its security stance by using automation to roll up reports of security information across all agencies.
Continuous monitoring enables information security professionals and others to see a continuous stream of near real-time snapshots of the state of risk to their security, data, the network, end points, and even cloud devices and applications. Assessing security controls as well as ongoing monitoring of security controls are both directly assisted by continuous monitoring through vulnerability monitoring processes, which many organizations already have in place.
In this white paper SANS Analyst, Dr. E. ...
August 2011- In this age of compliance, most retailers do what’s required to become compliant, but often fail to improve security through these efforts. In fact, several organizations have achieved compliance but still have been breached—even though they had the data needed to head those breaches off before any significant damage was done. So how did they miss this critical evidence? Unfortunately, IT security teams are inundated with data from many sources that they cannot ...
Cyberwar fundamentally changes how government must handle security. Faced with increasingly sophisticated attacks from gangs of cyber criminals and foreign governments probing systems for sensitive data, threats frequently go undetected for days, weeks, and even months. And it's not just financial data being stolen. Terrorists and rogue governments may steal confidential data, including intelligence information, that exposes a country and its citizens to potential harm. Unfortunately, the traditional fortress approach no longer suffices.
May 2011- This whitepaper by Spire Security explains the advantages, disadvantages and limitations of 802.1x as it relates to network access control (NAC). In practice, 802.1x has proven to be costly and cumbersome to roll-out, particularly for large organizations. Furthermore, 802.1x does not include or address many important features of a full-blown NAC system. This whitepaper includes a case study of a large U.S. defense agency that tried rolling out 802.1x and then, after discovering significant ...
September 2010- Firewalls are designed to provide access control. Although there is risk associated with any access, by limiting what access is permitted the risk is limited and understood and can be evaluated against business need to effectively justify the risk. However, poor firewall management defeats this purpose by ineffectively controlling access and limiting visibility into what access is actually permitted; poor management also increases the cost associated with security management. The result of poor management is ...
July 2010- For the past eight years, government agencies have struggled to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA). The goal of FISMA is to control information security as it impacts national security and the economic interests of the United States. Compliance obligates each U.S. federal government agency to “develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations ...
July 2010- In the first ten months after a new Massachusetts identity theft law took effect in late-2007, the Office of Consumer Affairs and Business Regulation reported that over 625,000 residents of the Commonwealth had been directly impacted by a data breach of their personally identifiable information (PII). Of these, about 60% were the result of criminal / unauthorized acts and the remainder due to employee error or “sloppy internal handling” of PII. To help mitigate the negative impacts of ...
There are not “regulated” industries that must preserve records and “unregulated” industries that can discard their records with impunity. Rather, there are heavily regulated industries and less heavily regulated industries. So, all organizations must be compliant to some degree.
This paper examines the current state of regulatory compliance, the impact of non-compliance, the current political environment and the shift in the compliance landscape and compliance enforcement. Also discussed are best practices that can ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services