Environment Protection Agency Reports

ACCELERATING IMPACT: NONPROFITS + SERVICENOW
sponsored by ServiceNow
EBOOK: How can you balance the nuanced IT requirements within your nonprofit while delivering exceptional experiences for customers and employees? Access this e-book to examine the key areas in which ServiceNow supports the organizational and digital transformation goals of nonprofits.
Posted: 07 Jan 2025 | Published: 07 Jan 2025

ServiceNow

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

ecuring Civilian Agencies Next-Gen SIEM for Enhanced Protection
sponsored by CrowdStrike
WEBCAST: Civilian organizations are increasingly being exposed to advanced threats. In this webcast, experts from CrowdStrike break down their mission to secure civilian agencies with next-gen SIEM for enhanced protection. Watch the webcast now to learn more about Falcon Next-Gen SIEM.
Posted: 23 Oct 2024 | Premiered: Oct 23, 2024

TOPICS:  .NET
CrowdStrike

CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

KELYN Technologies and The Missile Defense Agency (MDA)
sponsored by Commvault
CASE STUDY: This case study details KELYN Technologies' implementation of its KMDS solution for the Missile Defense Agency, replacing a cumbersome NetBackup system. Completed in 6 weeks instead of 6-12 months, it freed IT staff and improved data restoration times. Read the full case study to see how critical defense data is protected.
Posted: 10 Apr 2025 | Published: 10 Apr 2025

Commvault

How law enforcement agencies use 5G and LTE solutions
sponsored by Ericsson
INFOGRAPHIC: Modern law enforcement uses 5G and LTE for technologies like live-streaming body cameras, drones for mapping, and in-vehicle systems. Read this infographic to learn how secure, reliable connectivity supports operations.
Posted: 05 May 2025 | Published: 05 May 2025

Ericsson

Securing Virtualized Environments: The Imperative of Preemptive Protection
sponsored by Centripetal Networks
WHITE PAPER: Virtualized environments face unique security challenges due to vulnerabilities in VDI and virtual server technologies. This white paper explores how intelligence-powered cybersecurity can deliver preemptive protection against exploits, reducing the risk of damaging breaches during the patching window. Read the full white paper to learn more.
Posted: 11 Jun 2024 | Published: 11 Jun 2024

Centripetal Networks

Protecting Against Ransomware with a Comprehensive Cybersecurity Strategy for Detection and Prevention
sponsored by Merlin International
PRODUCT OVERVIEW: Federal agencies face evolving cybersecurity threats, with ransomware posing a major risk. A comprehensive strategy requires more than just EDR solutions—it must include privilege management, cryptographic security, and data recovery. Read the solution brief to discover how an integrated approach can strengthen your ransomware defense.
Posted: 21 Mar 2025 | Published: 22 Mar 2025

Merlin International

Build Your Agency’s Next Breakthrough
sponsored by FCN
WHITE PAPER: Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
Posted: 18 Jul 2023 | Published: 18 Jul 2023

TOPICS:  .NET
FCN

The Power Users Guide - Equipping Government Agency Power Users in Hybrid Work
sponsored by HP
EGUIDE: This guide examines the needs of government power users in hybrid work environments. It profiles data scientists and engineers, detailing their workflow requirements and matching them with high-performance computing solutions. Learn how to equip your agency's specialists with the right technology. Read the full e-book to support your power users.
Posted: 11 Apr 2025 | Published: 12 Apr 2025

HP

Implementing High Availability in a Linux Environment
sponsored by SIOS Technology Corp
WHITE PAPER: Explore how organizations can implement high-availability solutions for Linux without sacrificing performance or security while reducing costs. This white paper examines open source and commercial solutions, highlighting how SIOS Protection Suite for Linux creates SANless failover clusters with real-time data replication and monitoring.
Posted: 02 Apr 2025 | Published: 03 Apr 2025

SIOS Technology Corp

Securing your Microsoft 365 environment.
sponsored by Covenco
WHITE PAPER: Securing your Microsoft 365 environment is crucial as hybrid work exposes users to increased cyber threats. This white paper details attack vectors targeting M365, the limitations of native security, and how an integrated security platform can provide comprehensive protection. Read the full white paper to learn how to enhance your M365 defenses.
Posted: 07 Feb 2025 | Published: 07 Feb 2025

Covenco

Embracing The Future: Leveraging AI For Federal Agencies
sponsored by FCN
WHITE PAPER: This white paper explores how federal agencies can leverage AI to drive innovation, enhance productivity, and improve citizen services. Learn about the benefits of AI, the challenges agencies face, and strategies for successful AI implementation. Discover how Dell Technologies and FCN, Inc. can guide your agency's AI journey.
Posted: 12 Nov 2024 | Published: 13 Nov 2024

FCN

Unlocking the Future of Government Operations
sponsored by FCN
PRODUCT OVERVIEW: Government agencies are adopting cloud technologies to capitalize on redundancy and failover capabilities, among other benefits. This FCN and Dell Technologies product overview examines hybrid cloud solutions built for government operations. Discover how FCN and Dell Technologies can transform your agency's cloud operations by reading on.
Posted: 12 Nov 2024 | Published: 13 Nov 2024

FCN

Secure your hybrid environment with AWS & Cisco
sponsored by AWS & Cisco
TECHTARGET STREAMING MEDIA: During this webcast led by John Grady, Principal Analyst at Enterprise Strategy Group, you’ll learn about 4 SecOps essentials for ultimate protection. Tune in now to unlock expert insights and discover how you can secure your hybrid environment with AWS & Cisco.
Posted: 24 Apr 2025 | Published: 25 Apr 2025

TOPICS:  .NET
AWS & Cisco

Secure Software Development Environments
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure software development environments are critical to prevent supply chain attacks. This solution brief outlines how Zentera's CoIP Platform can help organizations achieve NIST SP800-218 compliance while maintaining developer productivity through a zero trust architecture. Read the full solution brief to learn more.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

The Evolution of Ecommerce
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: PH
Posted: 03 Feb 2022 | Published: 03 Feb 2022

LexisNexis® Risk Solutions

Navigating and Protecting the World of Web-Based LLMs
sponsored by Google Cloud
WHITE PAPER: As web-based LLMs spread, organizations must balance innovation with security. This white paper examines LLM vulnerabilities like prompt injections and overreliance, emphasizing that traditional application security methods remain relevant despite LLMs' probabilistic nature. Read to learn how to assess and protect your AI-enabled applications.
Posted: 21 Mar 2025 | Published: 21 Mar 2025

Google Cloud

A Rapid Recovery from Ransomware.
sponsored by Covenco
CASE STUDY: When a leading automotive business suffered a ransomware attack, Covenco rapidly recovered the customer's data, restoring business continuity within 48 hours. Learn how Covenco's Ransomware Recovery Service can protect your critical data. Read the full case study.
Posted: 07 Feb 2025 | Published: 07 Feb 2025

Covenco

CW ANZ: Australian firms connect people in new ways
sponsored by TechTarget ComputerWeekly.com
EZINE: Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com

Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK: The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024

TOPICS:  .NET
Saviynt

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

Balancing Requirements for Application Protection: Teams Desire Consolidation but Need Specialized Protection
sponsored by LevelBlue
ESG THOUGHT LEADERSHIP EBOOK: Application environments are increasingly complex, with web apps cloud-resident, containerized, and API-driven. This has led to security challenges like tool sprawl, bot attacks, and DDoS. Learn how organizations are consolidating web application protection in this e-book.
Posted: 31 Jan 2025 | Published: 01 Feb 2025

LevelBlue

Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017

TechTarget ComputerWeekly.com

Balancing Requirements for Application Protection
sponsored by Human Security
ESG THOUGHT LEADERSHIP EBOOK: This Enterprise Strategy Group eBook examines how evolving web application environments have increased security challenges. It explores trends in DDoS, bot, and API attacks, and the need for consolidated web application protection. Read the eBook to learn how to better secure your web applications and APIs.
Posted: 05 Feb 2025 | Published: 06 Feb 2025

Human Security