IT Agents  >  

Government Industry

RSS Feed    Add to Google    Add to My Yahoo!
Government IndustryReports
 
Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Get a Better Handle on Unspent Funds
sponsored by SAP America, Inc.
WHITE PAPER: This paper details SAP's range of public sector solutions, designed specifically to assist government agencies in proactively monitoring their current and future spending. Learn how to get a better handle on unspent funds such as unliquidated obligations (ULOs) by drilling into layers of data to create accurate reports and projections in real time.
Posted: 29 Jun 2012 | Published: 29 Jun 2012

SAP America, Inc.

Technical Guide on Government Security
sponsored by SearchSecurity.com
EGUIDE: Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Posted: 26 May 2011 | Published: 23 May 2011

SearchSecurity.com

Social Media in Government: 5 Key Considerations
sponsored by Hootsuite
WHITE PAPER: Government agencies have begun to follow private-sector companies in leveraging social media, but may still have questions regarding the tools, processes, and organizational changes required to make social media work. This informative resource details the five top considerations for government agencies looking to deploy social media strategies.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Hootsuite

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions
sponsored by Lumension
WHITE PAPER: The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.
Posted: 18 Jun 2009 | Published: 28 May 2009

Lumension

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Reduce Fraud, Waste and Abuse with Flexible Analytics
sponsored by SAP America, Inc.
WHITE PAPER: This paper examines how SAP's latest analytics solutions can analyze multiple databases in real-time to identify and prevent improper government payments before they happen. Read on to learn how government agencies can leverage this technology to speed up the process of accessing multiple data sources, reduce the burden on IT staff and much more.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

SAP America, Inc.

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by GlobalScape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

GlobalScape
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement