IT Agents  >  

Government Departments

RSS Feed   
Government Departments Reports
 
CJIS Security Policy Evaluation Guide
sponsored by Absolute Software Corporation
DATA SHEET: IT and Information Security teams need to be equipped with powerful, versatile tools that will allow them to increase their operational efficiency. Download this overview to see how Absolute helps protect regulated data, eliminate compliance failures, and respond rapidly to security exposures.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Absolute Software Corporation

The State and Local Cybersecurity Crisis
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware attacks are rising threat for government agencies. In 2019 alone, 22 cities experienced ransomware attacks – causing financial and reputational damage for agencies already facing budgetary constraints. Download this white paper to take a closer look at where the vulnerabilities lie & tactics that can help fill the resource gap.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Arctic Wolf Networks, Inc.

State of Georgia Becomes an Adaptive Provider of Modern IT Services
sponsored by Capgemini
CASE STUDY: Inside, learn how the Georgia Enterprise Technology Services (GETS) program, the IT infrastructure and network services provider for the state’s 89 executive branch agencies, consolidated its server and network resources to create an efficient, multi-service IT ecosystem.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

Capgemini

How Government Agencies Can Enhance Security and Reduce Costs
sponsored by ServiceNow
WHITE PAPER: IT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.
Posted: 06 Feb 2020 | Published: 31 Jan 2018

ServiceNow

Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

Continuous monitoring, remediation and CyberScope reporting
sponsored by IBM
WHITE PAPER: This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
Posted: 19 Jul 2012 | Published: 31 Dec 2011

IBM

Smartphones: A Savvy Strategy for Government Employees
sponsored by BlackBerry
WHITE PAPER: There is no reason why government agencies shouldn’t take advantage of all that smartphones have to offer. Employed efficiently, smartphones can address several organizational imperatives, including cost savings, greater mobility, increased telework options and sensitivity to environmental concerns. Continue reading to learn more.
Posted: 12 Jan 2011 | Published: 11 Jan 2011

BlackBerry

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Endpoint Threat Detection Gets More Response
sponsored by Solarwinds MSP
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

Solarwinds MSP
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info