Security Without Compromise
sponsored by Remediant
CASE STUDY:
As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020
|
|
|
Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER:
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013
|
|
|
Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE:
Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020
|
|
|
2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER:
Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020
|
|
|
How to Ensure NIAP Mobile Application Compliance
sponsored by NowSecure
WHITE PAPER:
Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.
Posted: 19 Jun 2020 | Published: 19 Jun 2020
|
|
|
Salesforce Customer 360
sponsored by Salesforce
PRODUCT OVERVIEW:
Government missions are complex, but the business processes and systems driving them don’t have to be. Learn how you can integrate your teams and technologies around one CRM platform—enabling all employees to engage customers like a unified organization, not a series of different, disconnected departments—with Salesforce.
Posted: 24 Nov 2020 | Published: 24 Nov 2020
|
|
|
Continuous monitoring, remediation and CyberScope reporting
sponsored by IBM
WHITE PAPER:
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
Posted: 19 Jul 2012 | Published: 31 Dec 2011
|
|
|
Get a Better Handle on Unspent Funds
sponsored by SAP America, Inc.
WHITE PAPER:
This paper details SAP's range of public sector solutions, designed specifically to assist government agencies in proactively monitoring their current and future spending. Learn how to get a better handle on unspent funds such as unliquidated obligations (ULOs) by drilling into layers of data to create accurate reports and projections in real time.
Posted: 29 Jun 2012 | Published: 29 Jun 2012
|
|
|
Technical Guide on Government Security
sponsored by SearchSecurity.com
EGUIDE:
Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Posted: 26 May 2011 | Published: 23 May 2011
|
|
|
Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY:
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013
|
|
|
|
|