IT Agents  >  

Agencies

RSS Feed   
Agencies Reports
 
Protecting Government Assets
sponsored by Dell
RESOURCE: Take a look at this infographic to find out how thin clients can provide government organizations at the local, regional, and federal levels with a secure platform that enables IT to meet strict government mandates to access highly sensitive information.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Dell

Increase Customer Satisfaction by Focusing on the Citizen Experience
sponsored by Avtex
WHITE PAPER: In this white paper, explore how governments and government agencies can improve their citizens' satisfaction by refining their citizen experience. Additionally, learn how to define a successful citizen experience, and uncover 3 steps to improving yours.
Posted: 16 Sep 2019 | Published: 31 Dec 2017

Avtex

Boost Government Revenues Without a Tax Increase
sponsored by SAP America, Inc.
WHITE PAPER: SAP analytics solutions can help today's government agencies overcome the many challenges associated with tax discovery. Read on to learn how SAP's public sector software solutions can benefit government agencies by improving performance, reducing costs and streamlining service delivery.
Posted: 29 Jun 2012 | Published: 29 Jun 2012

SAP America, Inc.

Smart City as a Service: Using Analytics to Equip Communities for Data Driven Decisions
sponsored by IBM
WHITE PAPER: This white paper how to enable municipal IT managers to build a flexible cloud foundation and support a smart city service strategy. Read on to discover how to deploy on a secure hybrid cloud model to accommodate all workloads.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

IBM

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

Continuous monitoring, remediation and CyberScope reporting
sponsored by IBM
WHITE PAPER: This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
Posted: 19 Jul 2012 | Published: 31 Dec 2011

IBM

Cloud Computing: Get to know the basics
sponsored by Red Hat
WHITE PAPER: This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
Posted: 23 Jan 2012 | Published: 05 Jan 2012

Red Hat

Endpoint Threat Detection Gets More Response
sponsored by Solarwinds MSP
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

Solarwinds MSP
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement