IT Agents  >  

Government Agencies (U.S.)

RSS Feed   
ALSO CALLED: Federal Agencies, Regulatory Committees, Agencies, Government Industry, Government Departments, Interagency Committees, Regulatory Organizations
DEFINITION: Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures. This term takes CRM as its abbreviation, and is a deliberate play on the more common expansion of that abbreviation, customer relationship management  … 

Government Agencies (U.S.) definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Government Agencies (U.S.) Reports
1 - 25 of 57 Matches Previous Page  |  Next Page
Hack the Pentagon Case Study
sponsored by Synack
CASE STUDY: The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.
Posted: 26 May 2020 | Published: 31 Oct 2018

Synack

Digital Transformation from the Front Lines to Dispatch to the Cloud
sponsored by Dell Technologies
WHITE PAPER: Click inside to take a closer look at the technology trends shaping public safety's digital transformation journey, including edge computing, multi-cloud, and even virtual and augmented reality.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

Workforce Transformation: A Guide and Checklist for Change
sponsored by Dell Technologies
WHITE PAPER: Discover how government organizations can take steps to align their workforce culture with modernization efforts. Inside, you’ll also find a best practices checklist to gauge the status of your workforce.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

Preparing for Digital Transformation in Public Safety
sponsored by Dell Technologies
WHITE PAPER: Explore the findings of a March 2019 survey that quizzed 125 state and local government officials about what public safety technology projects they planned on implementing over the next two years, ranging from increasing body camera counts to integrating 5G network connectivity.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Best Practices for Securing Critical Infrastructure for State & Local Governments
sponsored by VMware International Unlimited Company
WHITE PAPER: For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.
Posted: 07 May 2020 | Published: 31 Jan 2020

VMware International Unlimited Company

Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

DCOI for Dummies
sponsored by Nlyte Software
EBOOK: Initially slated for the end of 2018, the Data Center Optimization Initiative (DCOI) has been officially extended to the end of the fiscal year 2020, now bundled into the sweeping government project known as Cloud Smart. Inside this For Dummies guide, take a closer look at what the DCOI includes.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Nlyte Software

Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse
sponsored by SAS
WHITE PAPER: Government fraud is at an all-time high and growing rapidly. In fact, research shows that it accounts for roughly 10% of overall government spending. But what if governments could minimize deficits by eliminating fraud, waste and abuse? Download this white paper to discover the benefits of an enterprise approach to fraud.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

SAS

Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

Guide to Zero Trust for Federal Agencies
sponsored by Gigamon
WHITE PAPER: Cyberattacks targeting federal agencies are growing in both volume and complexity, and existing tactics are unable to protect these networks. To meet rising threats, security leaders are adopting a zero-trust model, a concept that states that users, devices and apps can’t be trusted without authentication. Read on to learn more.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Gigamon

Exploring AI Use Cases Across Education and Government
sponsored by Dell Technologies
RESOURCE: Artificial intelligence has the potential to transform how public sector and educational institutions operate, innovate and serve the needs of their constituents. Read onward to learn AI use cases already starting to emerge across education and public sector organizations– and what use cases to look forward to in the future.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Dell Technologies

L.A. Tourism and Convention Board
sponsored by Absolute Software Corporation
CASE STUDY: As a non-profit organization, LA Tourism’s IT team is under tremendous pressure to ensure security while remaining efficient with limited resources. Download this case study and follow LA Tourism’s journey as they partner with Absolute to establish a security strategy that improved compliance and network visibility.
Posted: 07 Feb 2020 | Published: 06 May 2019

Absolute Software Corporation

How Government Agencies Can Enhance Security and Reduce Costs
sponsored by ServiceNow
WHITE PAPER: IT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.
Posted: 06 Feb 2020 | Published: 31 Jan 2018

ServiceNow

Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats
sponsored by DomainTools
CASE STUDY: In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

DomainTools

The State and Local Cybersecurity Crisis
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware attacks are rising threat for government agencies. In 2019 alone, 22 cities experienced ransomware attacks – causing financial and reputational damage for agencies already facing budgetary constraints. Download this white paper to take a closer look at where the vulnerabilities lie & tactics that can help fill the resource gap.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Arctic Wolf Networks, Inc.

The State of Texas protects its data with a Defense in Depth cybersecurity strategy
sponsored by Capgemini
CASE STUDY: In this case study, uncover how the State of Texas Department of Information Resources developed a holistic security strategy in order to preserve the privacy of citizen data and protect personally identifiable information for users across the state.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Capgemini

State of Georgia Becomes an Adaptive Provider of Modern IT Services
sponsored by Capgemini
CASE STUDY: Inside, learn how the Georgia Enterprise Technology Services (GETS) program, the IT infrastructure and network services provider for the state’s 89 executive branch agencies, consolidated its server and network resources to create an efficient, multi-service IT ecosystem.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

Capgemini

Transforming the Delivery of Government Services the Texas Way
sponsored by Capgemini
CASE STUDY: Inside this publication, learn how the state of Texas’ Department of Information Resources (DIR) utilized a multi-sourcing service integration model to guide its digital transformation efforts – earning the ability to deliver world-class IT services to agencies across the state.
Posted: 19 Dec 2019 | Published: 18 Feb 2019

Capgemini

5 Ways Technology Can Transform Government Operations
sponsored by Smartsheet
WHITE PAPER: In this whitepaper, learn how governments and agencies can improve the success rate of their transformation journey by switching to a reliable cloud-based application. Review your software options with Smartsheet, and discover how cloud-based applications can help your organization drive progress towards digital transformation in 5 critical ways.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Smartsheet

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

Endpoint Threat Detection Gets More Response
sponsored by Solarwinds MSP
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

Solarwinds MSP

Advanced Case Management for Government
sponsored by IBM
WHITE PAPER: How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

Essential Supplier Report: Smart City Suppliers
sponsored by IBM
WHITE PAPER: This report cuts to the chase when it comes to suppliers focusing on smart cities and forwar-thinking municipalities. Read now for evaluations on leading players in the market that have the capacity to provide leadership on large-scale projects spanning multiple city requirements.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

IBM

Smart City as a Service: Using Analytics to Equip Communities for Data Driven Decisions
sponsored by IBM
WHITE PAPER: This white paper how to enable municipal IT managers to build a flexible cloud foundation and support a smart city service strategy. Read on to discover how to deploy on a secure hybrid cloud model to accommodate all workloads.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

IBM
1 - 25 of 57 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info