IT Agents  >  

Interagency Committees

RSS Feed   
Interagency Committees Reports
 
Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

Secure Mobility for Remote Public Sector Workers
sponsored by Lookout Inc.
CASE STUDY: Public sector organizations are tasked with the protection and maintenance of highly sensitive information, which is why it’s paramount that employees being enabled to work remotely are done so through a secure, seamless process that manages devices and controls access. Read on to learn how Lookout may be able to address these challenges.
Posted: 07 Apr 2020 | Published: 27 Mar 2020

Lookout Inc.

State of Georgia Becomes an Adaptive Provider of Modern IT Services
sponsored by Capgemini
CASE STUDY: Inside, learn how the Georgia Enterprise Technology Services (GETS) program, the IT infrastructure and network services provider for the state’s 89 executive branch agencies, consolidated its server and network resources to create an efficient, multi-service IT ecosystem.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

Capgemini

DCOI for Dummies
sponsored by Nlyte Software
EBOOK: Initially slated for the end of 2018, the Data Center Optimization Initiative (DCOI) has been officially extended to the end of the fiscal year 2020, now bundled into the sweeping government project known as Cloud Smart. Inside this For Dummies guide, take a closer look at what the DCOI includes.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Nlyte Software

Building Solutions For Smarter Governments: Six Ways to Increase Responsiveness, Service Quality, Accountability and Taxpayer Value
sponsored by IBM
WHITE PAPER: This paper describes how smarter government means making operations and services truly citizen-centric, integrating their service delivery, coordinating programs and allowing a choice of access channels, as well as placing the most needed transactions on the Web.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

IBM

Social Media in Government: 5 Key Considerations
sponsored by Hootsuite
WHITE PAPER: Government agencies have begun to follow private-sector companies in leveraging social media, but may still have questions regarding the tools, processes, and organizational changes required to make social media work. This informative resource details the five top considerations for government agencies looking to deploy social media strategies.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Hootsuite

Analytics Solution Center (ASC) Website
sponsored by IBM
INFORMATION CENTER: The IBM Analytics Solution Center in the Washington, DC area focuses on solving the business and mission problems of public sector agencies, and the U.S. Federal government through the use of analytics. Visit this center online and see how you too can gain access to useful information, industry experts, and technology to reach your mission goals.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

IBM

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info