Government White Papers

Are you up to date on Government policies, regulations and agencies? No matter what your particular business entails, you need to be well-informed about essential government-related subject areas, including National, State and Local Governments and Government Agencies, Government Information Security, and Compliance.

Use this Bitpipe Research Guide on government-related subjects to locate the latest white papers, webcasts, case studies, and product information for industry issues and related topics, including Regulatory Compliance and compliance with specific legislation, such as Sarbanes-Oxley and HIPAA, as well as other related topics, including Public Administration, eGovernment and Homeland Security.

Recent Government Reports
(topics include eGovernment, Government Information Security, Local, State, National Governments, Public Administration)


Computer Weekly – 24 November 2015: Technology helping to deliver aid for refugees

sponsored by
In this week's Computer Weekly, we find out how technology is helping to deliver vital aid to Syrian refugees in the Middle East. We look at the barriers to achieving the government's aim of a paperless NHS. And the CTO of special effects studio Framestore talks about the IT challenges behind hit movies such as Gravity. Read the issue now. (EZINE: November 20, 2015) more..

Mobility Case Study: Franciscan Missionaries of Our Lady Health System

sponsored by Citrix
In this case study, discover how Franciscan Missionaries of Our Lady Health System – the largest health system in Louisiana – maximized their efficiency by building a clinician-centric, mobile-focused infrastructure for their organization. Learn how to mobilize your healthcare organization and address the proliferation of BYOD. (CASE STUDY: July 31, 2015) more..

Solutions for Healthcare and HIPAA Compliance

sponsored by Citrix
This guide reviews how new mobile technologies can help improve care using modern applications. (WHITE PAPER: December 31, 2014) more..

Mobile Healthcare Workspaces Infographic

sponsored by Citrix
View this infographic to learn about top initiatives impacting healthcare organizations and how to meet these challenges with flexible IT solutions that improve operational efficiency and provide clinicians greater mobility with secure access to healthcare applications and patient data. (RESOURCE: November 11, 2015) more..

Securing, Categorizing, and Archiving Digital Photographs, Images and Videos

sponsored by Unisys
This solution brief sheds light on image processing services that assist with managing, storing and securing images. Take a look and discover answers to common video, image, and audio securing questions. (WHITE PAPER: September 30, 2015) more..

Essential Supplier Report: Smart City Suppliers

sponsored by IBM
This report cuts to the chase when it comes to suppliers focusing on smart cities and forwar-thinking municipalities. Read now for evaluations on leading players in the market that have the capacity to provide leadership on large-scale projects spanning multiple city requirements. (WHITE PAPER: November 10, 2015) more..

Medical Device Cybersafety - Separating Hype from Substance

sponsored by Symantec & Intuitive
In this webcast, distinguished healthcare architect Axel Wirth reviews the difference between healthcare data compliance vs. security and the risks medical devices introduce to healthcare organizations. View now to learn medical device security priorities and best practices in order to avoid compliance failure and data loss. (WEBCAST: October 20, 2015) more..

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security

sponsored by Proofpoint, Inc.
This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS). (WHITE PAPER: December 31, 2013) more..

Smart City as a Service: Using Analytics to Equip Communities for Data Driven Decisions

sponsored by IBM
This white paper how to enable municipal IT managers to build a flexible cloud foundation and support a smart city service strategy. Read on to discover how to deploy on a secure hybrid cloud model to accommodate all workloads. (WHITE PAPER: November 5, 2015) more..

Protective Monitoring and the UK Public Services Network

sponsored by LogRhythm, Inc.
This white paper addresses the specific security concerns of government organizations and discusses why protective monitoring is essential for keeping your citizens safe. (WHITE PAPER: November 3, 2015) more..

Data Privacy in the Cloud

sponsored by OpenText
This white paper can help you navigate the complexities of international data privacy laws and cloud computing. (WHITE PAPER: November 2, 2015) more..

Data Privacy vs. Data Protection

sponsored by PEER 1
Access this white paper to learn what specific privacy challenges "ease of access" brings with it. Learn how you can protect the sensitive data of e-government. (WHITE PAPER: November 2, 2015) more..

Risk Management for Medical Devices

sponsored by Symantec & Intuitive
This white paper reviews the regulations and challenges surrounding medical device and data security and how to take control of risk management. (WHITE PAPER: October 7, 2015) more..

Case Study: Local Government Finds Cybersecurity that Meets its Budget

sponsored by AlienVault
This white paper tells the story of how the IT managers for the City of Lewiston found a security solution that worked for them, keeping their network secure without incurring additional costs or requiring additional manpower. (WHITE PAPER: October 26, 2015) more..

Practical Threat Management for Government Entities

sponsored by AlienVault
Access this white paper for essential security tips tailored to the needs – and the budgets – of state and local governments. (WHITE PAPER: May 31, 2015) more..

Investment bank meets complex compliance requirements

sponsored by Blue Coat Systems
Today's compliance requirements have been growing and evolving rapidly over the past few years. Access this case study to find out how Jefferies, an independent investment bank, met these complex, fast-changing compliance requirements while empowering users. (CASE STUDY: November 29, 2013) more..

Identify Risks and Opportunities with Event Processing

sponsored by TIBCO Software Inc.
This white paper provides an overview of event processing functions and key features provided by event processing technology. Read on to learn how optimized event processing can allow your organization to reduce operational costs and improve operational efficiencies. (WHITE PAPER: April 24, 2015) more..

Case Study: Protecting PHI without Slowing Patient Care

sponsored by Identity Finder, LLC
This paper describes the challenges of managing PHI and presents an in-depth case study of a healthcare organization that overcame these challenges. (WHITE PAPER: October 12, 2015) more..

Software Change Management: Gain Business Agility Without Compromising Compliance

sponsored by CollabNet
In this resource, you'll learn how a software change management (SCM) platform can provide your enterprise with real-time visibility, traceability, and code change process automation to improve business agility while meeting the strictest regulatory compliance standards. (WHITE PAPER: July 11, 2014) more..

The Essential Guide to Microsoft Azure Compliance

sponsored by Softchoice Corporation
Access this essential guide to dive deep into security, compliance, and regulations with Microsoft Azure and examine how Azure handles major compliance and regulation concerns – including those for PCI, HIPPA, and more. (ESSENTIAL GUIDE: October 2, 2015) more..

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement