IT Agents  >  

Government Agencies (U.S.)

RSS Feed   
ALSO CALLED: Federal Agencies, Regulatory Committees, Agencies, Government Industry, Government Departments, Interagency Committees, Regulatory Organizations
DEFINITION: Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures. This term takes CRM as its abbreviation, and is a deliberate play on the more common expansion of that abbreviation, customer relationship management  … 

Government Agencies (U.S.) definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Government Agencies (U.S.) Reports
1 - 25 of 59 Matches Previous Page  |  Next Page
Industry Guide for Big Data in Federal Agencies & the Public Sector
sponsored by MapR
WHITE PAPER: Big data has been making a difference in enterprises for several years now. But what about in government agencies? Discover in this resource several use cases for big data in government, including cybersecurity and crime prediction.
Posted: 26 Jun 2018 | Published: 26 Jun 2018

MapR

Wi-Fi: Secure Enough For Federal Government?
sponsored by Aruba Networks
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the federal government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 08 Jun 2018 | Published: 08 Jun 2018

Aruba Networks

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

NSA insiders reveal what went wrong
sponsored by ComputerWeekly.com
EBRIEF: Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

ComputerWeekly.com

Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Proven Tactics to Handle Evidentiary Information in the Cloud
sponsored by AWS-Netapp
WHITE PAPER: In this quick guide, find out 5 pro tips for handling evidentiary information in the cloud, from how to anticipate evolving regulation stipulations, how to build secure hybrid cloud architecture, and more.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

AWS-Netapp

Secure Virtualization Trusted by Government Agencies
sponsored by Red Hat
WHITE PAPER: Red tape in the virtual environments of a small business and a government agency are starkly different – especially when it comes to security. Click to learn about a virtualization platform designed to negate security threats within hypervisors and VMs without compromising performance, and learn why it's trusted by agencies like the NSA.
Posted: 07 Aug 2018 | Published: 31 Jul 2016

Red Hat

Did North Korea Rob Bangladesh Bank?
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about North Korea's plausible involvement in the 2016 Bangladesh Bank theft. Discover the reasons for it, the actors behind the cyber thefts and the tools they could have used to carry out their malicious mission.
Posted: 25 Oct 2016 | Published: 22 Jun 2016

Booz Allen Hamilton

Endpoint Threat Detection Gets More Response
sponsored by Solarwinds MSP
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

Solarwinds MSP

Advanced Case Management for Government
sponsored by IBM
WHITE PAPER: How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

Essential Supplier Report: Smart City Suppliers
sponsored by IBM
WHITE PAPER: This report cuts to the chase when it comes to suppliers focusing on smart cities and forwar-thinking municipalities. Read now for evaluations on leading players in the market that have the capacity to provide leadership on large-scale projects spanning multiple city requirements.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

IBM

Smart City as a Service: Using Analytics to Equip Communities for Data Driven Decisions
sponsored by IBM
WHITE PAPER: This white paper how to enable municipal IT managers to build a flexible cloud foundation and support a smart city service strategy. Read on to discover how to deploy on a secure hybrid cloud model to accommodate all workloads.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

IBM

Implementing a Data Integration Strategy For Legacy Modernization
sponsored by Information Builders
WHITE PAPER: This white paper explains why federal agencies need to prioritize legacy modernization and the creation of a fully unified data quality and integration infrastructure in order to gain a unified view of business data.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Information Builders

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

Globalscape

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

Social Media in Government: 5 Key Considerations
sponsored by Hootsuite
WHITE PAPER: Government agencies have begun to follow private-sector companies in leveraging social media, but may still have questions regarding the tools, processes, and organizational changes required to make social media work. This informative resource details the five top considerations for government agencies looking to deploy social media strategies.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Hootsuite

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift
1 - 25 of 59 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement