government

Results 176 - 200 of 505Sort Results By: Published Date | Title | Company Name
Published By: QTS Data Centers     Published Date: May 01, 2017
In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. Now, more than ever, CIOs and CTOs are challenged to build sustainable IT strategies against a constantly changing backdrop. Enterprises are quickly realizing that the resources required are exceeding their in-house capabilities. So, who are they trusting with these most valued assets? Data center providers. Learn how IT strategies are evolving and the role data centers play in those strategies.
Tags : 
    
QTS Data Centers
Published By: Cox Business     Published Date: Apr 27, 2017
From the largest states and cities to the smallest municipalities, the public sector is undergoing large-scale modernization projects. To serve constituents now and in the years ahead, government agencies need a strategy to build the right networking infrastructure. The following six steps can help state and local governments build a solid foundation for modernization initiatives.
Tags : 
    
Cox Business
Published By: SAS     Published Date: Apr 25, 2017
Tax evasion is the largest economic crime in the world (in terms of monetary loss), costing trillions of dollars to governments around the globe. A 2011 study by The Tax Justice Network estimates that on a global scale, total tax evasion is in excess of US$3.1 trillion, or about 5.1% of world GDP.1 And that’s just the known tax evasion and noncompliance; it doesn’t include the underground economy and cash businesses.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 20, 2017
Hype and hope — Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) — the network of people, data, things and processes that is increasingly linked through automated connections and sensors — and the future of Big Data can seem quite daunting.
Tags : 
    
SAS
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: Citrix     Published Date: Apr 06, 2017
The NHS is currently evolving to meet the needs of an ageing population. This means that not only is the delivery of clinical care more challenging in the acute hospital set- ting but it increasingly relies on enhanced information access in the primary care, mental health and community environments too.
Tags : 
security, nhs, citrix, healthcare, government
    
Citrix
Published By: Citrix     Published Date: Apr 06, 2017
Local governments face a growing public demand for services, and unprecedented cuts in expenditures. Consequently, their IT departments need to start thinking fresh.This includes supporting fundamental change in council operations, enabled by digital transformation. IT leaders must not only understand what technology can be harmonized and shared, and what must be designed individually for specific needs, but also where legacy IT has become a barrier to change.
Tags : 
digital, transformation, government, citrix
    
Citrix
Published By: Datastax     Published Date: Apr 04, 2017
Enterprises today continue to differentiate themselves with cloud applications – any application that needs to be always-on, distributed, scalable, real-time, and contextual. With DataStax Enterprise, DataStax delivers comprehensive data management with a unique always-on architecture that accelerates the ability of enterprises, government agencies, and systems integrators to power the exploding number of cloud applications. DataStax Enterprise (DSE) powers these cloud applications that require data distribution across data centers and clouds, by using a secure, operationally simple platform. At its core, DSE offers the industry’s best distribution of Apache Cassandra™. This paper provides a summary of the features and functionality of DataStax Enterprise that make it the best choice for companies that are looking to leverage the promise of Apache Cassandra™ for production environments.
Tags : 
distribution, apache cassandra, cloud, datastax
    
Datastax
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows
Published By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
Download these case studies to learn how Whil was able to increase employee satisfaction and decrease employee turnover by introducing mindfulness in the below organizations: Global fashion retailer City government Technology University Leading non-profit Production company Global advertising agency
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep
    
Whil Concepts, Inc.
Published By: Lenovo and Intel     Published Date: Jan 20, 2017
We all love laptops, tablets, and mobile devices; but, sometimes you need a powerful desktop that still fits neatly in small, awkward, or even non-traditional spaces. Enter Tiny. In this eBook, we dive into the diverse settings where Tiny has proven to be the better fit. Get the eBook now.
Tags : 
lenovo, government technology, infrastructure, hardware
    
Lenovo and Intel
Published By: IBM     Published Date: Jan 20, 2017
Government agencies are taking advantage of new capabilities like mobile and cloud to deliver better services to its citizens. Many agencies are going paperless, streamlining how they interact with citizens and providing services more efficiently and faster. This short video will show real examples of how government agencies are applying new capabilities like cognitive and analytics to improve how they ingest, manage, store and interact with content.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 20, 2017
Government agencies are taking advantage of new capabilities like mobile and cloud to deliver better services to its citizens. Many agencies are going paperless, streamlining how they interact with citizens and providing services more efficiently and faster. This short video will show real examples of how government agencies are applying new capabilities like cognitive and analytics to improve how they ingest, manage, store and interact with content.
Tags : 
ibm, ecm, analytics, smarter content, ecm for government, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 13, 2017
As traditional network perimeters surrounding data centers dissolve, agencies face enormous difficulties fending off attacks using a patchwork of traditional security tools to protect classified or personally identifiable information (PII). Time and again, traditional security practices have proven porous and/or unsustainable. Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence -Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: IBM     Published Date: Jan 11, 2017
Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence - Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: Qualys     Published Date: Jan 11, 2017
In this age of supply chain interconnectedness, a large organization may have hundreds of third parties with access to its physical premises, IT networks and data. Your organization may have a secure IT infrastructure, but third parties can make it vulnerable to breaches, which often result in corporate data theft, brand damage and hefty government fines.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance, enterprise applications, business technology
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Across organizations from all sectors, the network is becoming more integral to daily operations. This is acutely felt by public sector organizations in the United States, namely federal, state, and local governmental organizations. Public sector organizations contend with the challenge of ensuring the security of highly sensitive data on the network in the midst of uncertain budgets and, in many cases, outdated infrastructure. At the same time, many public sector organizations grapple with a complex web of compliance protocols that must be supported on the network. This Analyst Connection explores the need for network infrastructure upgrades that include "foundational security."
Tags : 
    
Cisco
Published By: Cox Business     Published Date: Dec 19, 2016
It’s no secret that a potent combination of new digital technologies and rising constituent expectations is transforming government. The impact is being felt at all levels, from the largest state agencies and departments to the smallest municipalities.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Solutions that make it easy to keep track of security and software updates will give you an edge like no other. In many cases, hackers target specific holes in outdated software. Rather than dealing with the headache of continually updating each computer in your network, use tools that track and perform system updates automatically. You’ll always be ahead of the curve.
Tags : 
    
Cox Business
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee