IT Agents  >   Government Agencies (U.S.)  >  


RSS Feed    Add to Google    Add to My Yahoo!
FTC Reports
E-Book: Red Flag Rules Compliance
sponsored by Gemalto
EBOOK: presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
Posted: 09 Sep 2010 | Published: 09 Sep 2010


A Modern Disaster Recovery Approach Fit for US Government Security Standards
sponsored by NTT America, Inc.
CASE STUDY: In this business impact summary, find out how one government organization formed a flexible, fast, and cloud-based disaster recovery strategy that held up under strict regulations.
Posted: 17 Sep 2015 | Published: 30 Apr 2015

NTT America, Inc.

The Global Information Technology Report 2013
sponsored by
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

Accenture Technology Vision 2014
sponsored by
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

California Sets New Standard For IT With Shared Services
sponsored by NetApp
CASE STUDY: This case study explores how a large state agency implemented a cloud infrastructure to help unite 29 IT departments, lower costs, and increase data storage capacity.
Posted: 09 Jul 2015 | Published: 31 Dec 2014


Modern Cyber Threats and Government Agencies
sponsored by M86 Security
WHITE PAPER: View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

M86 Security

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013


Maryland Government Agency Case Study: Growing Beyond the Limits
sponsored by Dell, Inc.
CASE STUDY: In this case study, you'll learn how a Maryland government agency responds to user needs faster thanks to a server and storage virtualization solution from Dell.
Posted: 02 Jul 2010 | Published: 01 Oct 2008

Dell, Inc.

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud
sponsored by IBM
TECHNICAL ARTICLE: This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.
Posted: 13 Sep 2010 | Published: 17 Aug 2010

Visit - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
FTC White Papers | FTC Multimedia | FTC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement