Federal Government Reports

Australia's cybersecurity game plan
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 23 Aug 2020 | Published: 24 Aug 2020

ComputerWeekly.com

CIO Trends #8:Middle East
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we feature the small Island state of Bahrain and its efforts to make itself the go to fintech hub of the Middle East. On the subject of progressive ICT infrastructures this e-guide also looks at the rapid progress being made in Dubai as the government strives to make the city smart.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

ComputerWeekly.com

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com

CW Europe – September 2018: Costs stack up for Dutch government IT projects
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

ComputerWeekly.com

Dutch organisations demand more from government
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

ComputerWeekly.com

Top 10 Middle East stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017

ComputerWeekly.com

Computer Weekly – 23 August 2016: Odeon and UCI Cinemas Group adopts hybrid cloud strategy
sponsored by ComputerWeekly.com
EZINE: In this issue, we profile Odeon and UCI Cinemas Group's use of hybrid cloud as part of a digital transformation programme aimed at enhancing customer experience and staving off competition from on-demand streaming. We also look at the summertime game of musical chairs at the Government Digital Service, and at 50 years of business software.
Posted: 19 Aug 2016 | Published: 23 Aug 2016

ComputerWeekly.com

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

Federal SOA Institute
sponsored by IBM Line of Business
CASE STUDY: The Federal SOA Institute's mission is to help the federal government adopt and benefit from service oriented architecture (SOA) by providing a robust education environment.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

IBM Line of Business

Applications for 5G in the Federal Government
sponsored by T-Mobile for Government
PODCAST: Listen to this podcast to learn how enterprises can take advantage of the speed and flexibility of 5G.
Posted: 08 Sep 2022 | Premiered: Jul 28, 2022

TOPICS:  .NET
T-Mobile for Government

Virtual Desktop Solutions in the Federal Government
sponsored by VMware, Inc.
WEBCAST: This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.
Posted: 07 Feb 2012 | Premiered: Feb 7, 2012

VMware, Inc.

Zero trust: Enhancing Federal Government cybersecurity
sponsored by BROADCOM, Inc
WHITE PAPER: The migration to zero trust has been mandated via an Executive Order for Federal Agencies and it’s become a major obstacle to build an effective zero-trust architecture. Download this white paper to learn how Broadcom aims to protect your organization with its ICAM platform in 4 major ways and help you meet compliance.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

TOPICS:  .NET
BROADCOM, Inc

How One Solution Handled Federal Government Security Demands
sponsored by Riverbed Technology, Inc.
WEBCAST: The U.S. government has big IT needs in security and performance. Discover a single solution that met all expectations.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

Reducing the costs and risks of data storage in the federal government
sponsored by IBM
WHITE PAPER: This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
Posted: 29 Oct 2013 | Published: 30 Jun 2012

IBM

Securing Your Cloud Solutions for Government Adoption
sponsored by Coalfire
ANALYST REPORT: FedRAMP establishes cybersecurity requirements for CSPs that deliver solutions to the federal market and utilizes independent experts to advise organizations and assess their compliance. In this report, assess the market and industry dynamics that affect both FedRAMP and cloud adoption in the federal government.
Posted: 08 Feb 2021 | Published: 13 Jul 2020

Coalfire

Overcoming challenges of asset management amid declining federal budgets
sponsored by IBM
WHITE PAPER: This paper details an asset management solution from IBM. This option is designed for the federal government and enables seamless integration and support maintenance of every asset across the enterprise. Read this now and learn how this option can offer complete visibility into every asset, enable elevated risk management and more.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

IBM

Project Portfolio Management in the Public Sector: Benefits, Challenges, Best Practices and Gotchas
sponsored by Oracle Corporation
WHITE PAPER: As federal government programs have dramatically increased in number and complexity, more agencies have turned to project portfolio management (PPM). This helpful white paper provides an overview of the key things federal agency officials need to know about PPM, as well as best practices to follow and pitfalls to avoid with PPM implementation.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

Oracle Corporation

SAP Human Capital Management for U.S. Federal Government Organizations
sponsored by SAP AG
PRODUCT LITERATURE: Investigate how a U.S. federal agency uses SAP ERP HCM to strategically manage human capital resources for mission alignment and performance achievement - enabling efficient recruitment, process transparency, and new insight.
Posted: 21 Feb 2008 | Published: 01 Jan 2006

SAP AG

How Integration Tax Management Systems Can Benefit from Effective Taxpayer Communication Strategies
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: The white paper details Integrated Tax Management, software that brings together all State revenue collection processes, including those performed by the Federal Government, and collections on behalf of municipalities.
Posted: 01 Dec 2008 | Published: 01 Jul 2008

Pitney Bowes Group 1 Software

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

Analytics Solution Center (ASC) Website
sponsored by IBM
INFORMATION CENTER: The IBM Analytics Solution Center in the Washington, DC area focuses on solving the business and mission problems of public sector agencies, and the U.S. Federal government through the use of analytics. Visit this center online and see how you too can gain access to useful information, industry experts, and technology to reach your mission goals.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

IBM

Modernizing Records Management Federal Government Goes Electronic To Meet M-19-21 Requirements
sponsored by Hyland
WHITE PAPER: Access this white paper for a brief overview of the current records management landscape, and unlock essential steps and practices you should be taking in order to prepare for the Federally-mandated shift to electronic record filing processes.
Posted: 11 Jul 2022 | Published: 11 Jul 2022

TOPICS:  .NET
Hyland

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

IT in the Electronic Hospital
sponsored by SearchHealthIT.com
EGUIDE: The federal government’s push for electronic healthcare records has made compliance and data security even more pressing. This e-guide offers a look at where healthcare IT leaders should begin, and what they should watch out for as they move to embrace the HITECH Act, HIPAA and other initiatives.
Posted: 18 Aug 2011 | Published: 17 Aug 2009

SearchHealthIT.com

Continuous monitoring, remediation and CyberScope reporting
sponsored by IBM
WHITE PAPER: This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
Posted: 19 Jul 2012 | Published: 31 Dec 2011

IBM

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

E-Book: IT in the Electronic Hospital
sponsored by Imprivata
EBOOK: The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.
Posted: 11 Feb 2010 | Published: 11 Feb 2010

Imprivata

eBook: IT in the Electronic Hospital
sponsored by SearchCIO.com and SearchSecurity.com
EBOOK: The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

All resources sponsored by SearchCIO.com and SearchSecurity.com

ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection
sponsored by ExaGrid Systems, Inc.
CASE STUDY: Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

ExaGrid Systems, Inc.

A CISO’s Guide To Log Management For Cybersecurity
sponsored by Graylog
RESOURCE: High profile security incidents continue to make headlines, and those headlines are impacting bottom lines. To stay competitive, businesses need to establish and enforce best practices — starting with modernizing their security infrastructures. Read this CISO guide to log management for cybersecurity to learn excellent first steps.
Posted: 14 Jan 2022 | Published: 15 Jan 2022

TOPICS:  .NET
Graylog

Enable Better Citizen And Intra-agency Services With A Modern It Infrastructure
sponsored by Spectrum Enterprise
WHITE PAPER: Driven by the need to reduce operational costs, improve service efficiency and meet data security requirements, modernizing legacy networks and systems has become a priority for government agencies. Access this white paper to learn how you can achieve essential connectivity infrastructure for a modern government.
Posted: 03 Aug 2022 | Published: 03 Aug 2022

TOPICS:  .NET
Spectrum Enterprise

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud
sponsored by IBM
TECHNICAL ARTICLE: This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.
Posted: 13 Sep 2010 | Published: 17 Aug 2010

IBM

2022 Zero Trust Outlook Report
sponsored by TwinGate
WHITE PAPER: According to a recent Microsoft report, 82% of companies implemented zero-trust strategies within the past three years, with 21% doing so in the past 12 months.Access this white paper to learn how you can secure your distributed workforce with zero trust.
Posted: 23 Mar 2022 | Published: 24 Mar 2022

TOPICS:  .NET
All resources sponsored by TwinGate