Environment Protection Agency Reports

Adobe Experience Manager
sponsored by AWS & Adobe
VIDEO: Adobe’s Experience Manager, powered by AWS, assists government agencies in connecting with residents on a more personal level and advancing their citizen-centric missions. Tune into this video to understand Experience Manager’s core capabilities.
Posted: 12 Jun 2024 | Premiered: 12 Jun 2024

AWS & Adobe

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

ecuring Civilian Agencies Next-Gen SIEM for Enhanced Protection
sponsored by CrowdStrike
WEBCAST: Civilian organizations are increasingly being exposed to advanced threats. In this webcast, experts from CrowdStrike break down their mission to secure civilian agencies with next-gen SIEM for enhanced protection. Watch the webcast now to learn more about Falcon Next-Gen SIEM.
Posted: 23 Oct 2024 | Premiered: Oct 23, 2024

TOPICS:  .NET
CrowdStrike

Protect Federal Agencies by Securing DevOps, Secrets and Other Non-human Identities
sponsored by Merlin International
WHITE PAPER: Securing non-human identities is crucial for federal agencies to prevent costly breaches and protect critical infrastructure. Learn how effective secrets management can enable secure DevSecOps and fulfill key cybersecurity directives. Read the full white paper.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Merlin International

Be The Agency Of Change In Public Services
sponsored by Avanade
EBOOK: In the face of tight budgets, many public service agencies are striving to reduce their cloud costs. To unlock guidance for accomplishing that mission, explore this 59-page leader’s guide.
Posted: 21 Feb 2024 | Published: 21 Feb 2024

TOPICS:  .NET
Avanade

Securing Virtualized Environments: The Imperative of Preemptive Protection
sponsored by Centripetal Networks
WHITE PAPER: Virtualized environments face unique security challenges due to vulnerabilities in VDI and virtual server technologies. This white paper explores how intelligence-powered cybersecurity can deliver preemptive protection against exploits, reducing the risk of damaging breaches during the patching window. Read the full white paper to learn more.
Posted: 11 Jun 2024 | Published: 11 Jun 2024

Centripetal Networks

Build Your Agency’s Next Breakthrough
sponsored by FCN
WHITE PAPER: Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
Posted: 18 Jul 2023 | Published: 18 Jul 2023

TOPICS:  .NET
FCN

Digital And Hybrid Event Platform In An ISO-Certified AWS Environment
sponsored by AllCloud
CASE STUDY: VOK DAMS, an international communications agency for events and live marketing, needed a way to create a platform for hosting hybrid events with both digital and in-person participants. Check out this brief case study to explore the benefits of working with AWS and AllCloud to build a foundation for your business innovation needs.
Posted: 27 Jan 2022 | Published: 27 Jan 2022

TOPICS:  .NET
AllCloud

From Laggard To Leader: Generative AI Can Put Government In Front Of The Change Curve
sponsored by Avanade
WHITE PAPER: Generative AI presents possibilities and risks to businesses in every industry, including government and public agencies. So, how can those agencies embark on gen AI journeys while maintaining public trust and protecting citizens’ data? Review this 7-page white paper for insights.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

TOPICS:  .NET
Avanade

Anything is Possible with the Right Data Foundation
sponsored by Hitachi Vantara
EBOOK: Federal agencies have massive amounts of data, but struggle to fully leverage it. Upgrading data storage infrastructure, investing in analytics tools, and enhancing security can help unlock the full potential of your data. Read the e-book to learn how the VSP One platform from Hitachi Vantara Federal can transform your data foundation.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Hitachi Vantara

We Need to Talk
sponsored by Avanade
WHITE PAPER: To harness the power of AI, government and public service agencies need a strong data foundation. Read this white paper to find out how you can establish such a foundation at your agency.
Posted: 06 Mar 2024 | Published: 06 Mar 2024

TOPICS:  .NET
Avanade

Arctic Wolf Protects Breadth and Depth of Club’s Vast IT Environment
sponsored by Arctic Wolf
CASE STUDY: Composing the Parramatta Leagues Club (PLC) are the Parra Leagues and the Parramatta Eels, a community club and a professional rugby league football club, respectively. So, how does the PLC secure its vast IT environment? Find out in this case study.
Posted: 22 Mar 2024 | Published: 22 Mar 2024

TOPICS:  .NET
Arctic Wolf

Modern Data Storage: The Backbone of Government Innovation
sponsored by Hitachi Vantara
WHITE PAPER: As data growth accelerates, government agencies must leverage modern data storage to drive innovation and achieve mission objectives. This issue brief explores how Hitachi Vantara's storage solutions can provide the performance, reliability, agility, and security agencies need. Read the full brief to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Hitachi Vantara

Defense Agency Dramatically Shrinks Data Center Footprint
sponsored by Hitachi Vantara
CASE STUDY: A defense agency dramatically reduced its data center footprint by 25% through storage virtualization and infrastructure modernization with Hitachi Vantara. The solution delivered major benefits in cost, resiliency, and performance. Read the full case study to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Hitachi Vantara

How Endpoint Privilege Management Fulfills Federal Mandates
sponsored by Merlin International
WHITE PAPER: Endpoint privilege management is crucial for federal agencies to fulfill security mandates and defend against sophisticated cyberattacks. This whitepaper explores how CyberArk Endpoint Privilege Manager can help agencies meet Zero Trust requirements, prevent privilege escalation, and reduce ransomware risks. Read the whitepaper to learn more.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Merlin International

CW ANZ: Australian firms connect people in new ways
sponsored by TechTarget ComputerWeekly.com
EZINE: Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

The Evolution of Ecommerce
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: PH
Posted: 03 Feb 2022 | Published: 03 Feb 2022

LexisNexis® Risk Solutions

Identity Protection for the SOC
sponsored by TD Synnex
WEBCAST: For security teams, their legacy identity management solutions are no longer suited for securing today’s environments. Combining 2 distinct identity security technologies, IBM Verify Identity Protection presents an approach to identity security that is designed to meet today’s threats. Watch this webcast to learn more about the emerging solution.
Posted: 20 Aug 2024 | Premiered: Aug 21, 2024

TOPICS:  .NET
TD Synnex

The complex environment facing financial services
sponsored by Tanium
RESEARCH CONTENT: Today, banks and insurers sell through digital channels while their customers interact digitally as well. As a result, financial services companies are the target of frequent and severe cyberattacks. In this report, learn about the scope and scale of the threat landscape and what this sector can do to gain visibility into their IT environments.
Posted: 09 Aug 2023 | Published: 09 Aug 2023

TOPICS:  .NET
Tanium

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com

Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK: The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024

TOPICS:  .NET
Saviynt

Cloudflare One for Data Protection
sponsored by Cloudflare
PRODUCT OVERVIEW: Data occupies an increasingly important and complex role in the way modern organizations run, but as a result, it has become a primary focus for attackers. Cloudflare One’s data protection suite is built to stay at the forefront of these distinctly modern risks. Download this product overview to learn more.
Posted: 02 Feb 2024 | Published: 03 Feb 2024

TOPICS:  .NET
Cloudflare

Sustainable End User Computing: Lower costs, protect the environment, gain a competitive edge
sponsored by Unicon GmbH
WHITE PAPER: Sustainable end-user computing is crucial for reducing costs, protecting the environment, and gaining a competitive edge. Learn how VDI, energy-efficient devices, and extended device lifecycles can drive sustainability in this white paper.
Posted: 27 Aug 2024 | Published: 28 Aug 2024

All resources sponsored by Unicon GmbH

Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017

TechTarget ComputerWeekly.com

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com