IT Agents  >  

Government Agencies (non-U.S.)

RSS Feed    Add to Google    Add to My Yahoo!
Government Agencies (non-U.S.) Reports
1 - 25 of 41 Matches Previous Page  |  Next Page
Government IT strategy & challenges in Australia
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

CEM Trends in Government and the Public Sector: Serving a New Generation of Citizens
sponsored by SAP Hybris
RESEARCH CONTENT: Explore the results of an Aberdeen Group survey that polled 162 organizations regarding trends and best practices for customer experience management (CEM), social media and CRM, and BI, with a specific focus on government and the public sector.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

SAP Hybris

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Focus: IT for government and public sector
sponsored by ComputerWeekly.com
EGUIDE: It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

ComputerWeekly.com

E-government benchmark 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ComputerWeekly.com

CW500: Enterprise collaboration for a mobile workforce – Parliamentary Digital Service
sponsored by ComputerWeekly.com
PRESENTATION: Computer Weekly's CW500 Club heard from IT leaders who have introduced collaboration technology to support an increasingly mobile workforce. This presentation came from Laura Bennett, head of digital collaboration at the Parliamentary Digital Service.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

ComputerWeekly.com

7 Ways to Simplify Security Intelligence so Your Team Can Work Smarter, Not Harder
sponsored by LogRhythm, Inc.
WHITE PAPER: With automated response, your analysts can review the situation before countermeasures are executed, while at the same time greatly reducing mean time to respond. In this resource, you'll uncover 7 best practices for getting security intelligence technology to work harder, so people can work smarter.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

LogRhythm, Inc.

Infor ePathway: Intuitive Self Service Capabilities for Local Authorities
sponsored by Infor
WHITE PAPER: Learn about the Infor Pathway platform and find out how to incorporate enhanced dashboards and KPI reporting into your BPM strategy for processes like people management, property management, revenue management, and regulatory management.
Posted: 30 Aug 2016 | Published: 05 Sep 2017

Infor

Secure Voting
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

ComputerWeekly.com

The Albion Growth Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than 6O% of small to medium-sized enterprises plan to grow 'dramatically' or 'moderately' in the next two years, however IT and Telecoms companies report difficulties recruiting, this report from Albion Ventures reveals.
Posted: 27 Jan 2016 | Published: 27 Jan 2016

ComputerWeekly.com

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Building a digital government based on user needs
sponsored by ComputerWeekly.com
PRESENTATION: Liam Maxwell the government’s first chief technology officer talks about his strategy to deliver the technology that the user needs.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

ComputerWeekly.com

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

Did North Korea Rob Bangladesh Bank?
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about North Korea's plausible involvement in the 2016 Bangladesh Bank theft. Discover the reasons for it, the actors behind the cyber thefts and the tools they could have used to carry out their malicious mission.
Posted: 25 Oct 2016 | Published: 22 Jun 2016

Booz Allen Hamilton

Advanced Case Management for Government
sponsored by IBM
WHITE PAPER: How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye
1 - 25 of 41 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement