government agencies

Results 76 - 100 of 103Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry, standards, performance, security, management, unified, solution, it management
    
AlienVault
Published By: SAP     Published Date: Jan 21, 2010
The goal of this article will be to contribute to the emerging dialog on the subject of business value by extrapolating from BI lessons learned and from DecisionPath Consultings experience working with Fortune 1000 customers and Government agencies.
Tags : 
sap, business intelligence, data warehousing, enterprise application, erp, scm, crm, manufacturing, process engineering, readiness assessment, roi analysis, business value delivery
    
SAP
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: Lumension     Published Date: Jun 10, 2011
Government agencies must protect sensitive data while improving transparency and accessibility-all in the face of rising cyberthreats. Download this free whitepaper to learn how.
Tags : 
malware, endpoint security, cyberattack, hacker, government security, identity
    
Lumension
Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS
Published By: Adobe     Published Date: Oct 25, 2017
With the right foundation, the road to digital transformation is easy. Find out the steps you can take to start your journey – and start delivering experiences that truly put your customers at the center. Read the guide, Customer-centric Digital Transformation: What You Need to Know to learn: • Five steps toward customer-centric digital transformation • Four key components that make up excellent customer experiences • Tips and inspiration from industry experts and digital government agencies
Tags : 
public sector, digital innovation, customer-centric, digital government, customer experience
    
Adobe
Published By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe
Published By: IBM     Published Date: Jun 09, 2015
Government revenue management agencies are using computer technology to capture and harvest data and extract value from it. This paper explains the importance of being data-droven and outlines a way forward in the journey of getting there.
Tags : 
ibm, government, data, records, legal, information, benefits
    
IBM
Published By: Neustar     Published Date: Mar 29, 2010
How SMS can help government agencies reach the public in 160 characters or less.
Tags : 
neustar, sms, mobile networks, text message, call to action, mobile marketing, government
    
Neustar
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
As employers, government agencies face a unique set of challenges. Fierce competition to find, keep, and develop the best talent, along with an increasingly intense level of scrutiny is placing human capital front and center. Not having enough staff, not having them properly trained, or having a noncompliant workplace can trigger a public crisis.
Tags : 
management, talent, organizations, communication
    
Cornerstone OnDemand
Published By: ForeSee Results     Published Date: Feb 07, 2007
Find out how e-government agencies, departments and offices fared in customer satisfaction, and how satisfaction was earned, in this Q4 Report by Foresee Results.
Tags : 
loyalty and retention, e-government, customer satisfaction, foresee, foresee results
    
ForeSee Results
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
Government agencies today are focused on collaboration and how they can best share information and make it available to those who need it, while maintaining security. This white paper discusses the necessary elements of a personalized portal and how they are leveraged to enable e-intelligence. Includes case studies of the U.S. Air Force Portal and the U.S. Coast Guard Portal.
Tags : 
egovernment, e-government, government, usaf, agency, agencies, portal, broadvision, knowledge management
    
Clearvale by BroadVision
Published By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : 
data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
    
Safe Software
Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management, information security, physical security, holistic, riskwatch
    
RiskWatch
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify, security best practices, common vulnerabilities, code
    
HP - Enterprise
Published By: SAS     Published Date: Apr 16, 2015
We often hear about how the massive volumes of data the US government collects hold a treasure trove of answers to our most challenging questions – be it on population health, national security, education or how to recoup losses from tax fraud. If only the government could figure out how to make use of all that information. Texas is one example of a government that is using analytics to solve complex problems. As the case studies here demonstrate, agencies and academia in the Lone Star State are putting big data and analytics to work to eliminate waste, improve productivity and, in some cases, even enhance transparency.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 20, 2017
Hype and hope — Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) — the network of people, data, things and processes that is increasingly linked through automated connections and sensors — and the future of Big Data can seem quite daunting.
Tags : 
    
SAS
Published By: Time Warner Cable     Published Date: Apr 11, 2011
Time Warner Cable Business Class' cable broadband, teleworking services, and fiber-based solutions offer government agencies the communications options they need to enable resilient COOP.
Tags : 
time warner cable, business class, business continuity, cable broadband, teleworking, coop planning
    
Time Warner Cable
Published By: FireEye     Published Date: Sep 11, 2012
Cyber Attacks on Government: How to Stop the APT Attacks that are Compromising Federal Agencies.
Tags : 
cyber attacks, apt attacks, federal, compromising, security, business technology
    
FireEye
Published By: Pega     Published Date: Apr 04, 2016
Governments have long found it challenging to modernize legacy IT systems. Now comes pressure to offer digital government services. However, which takes priority? The answer is both. But rather than thinking linearly, the smart way is to execute simultaneously by standing a traditional IT approach on its head. Government agencies need to use technology to develop proactive and digital government services, from the outside in, from the perspective of the constituent, while making modernizing adjustments. To be successful, it is critical for government agencies to move beyond traditional development methodologies by adopting an agile development approach. But what are the challenges? How can they modernize massive projects already in the works? In short, how to get there? Download this E-book and find out where government agencies are falling short and where they can improve regarding digitization.
Tags : 
    
Pega
Published By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft
Published By: IBM     Published Date: Jan 20, 2017
Government agencies are taking advantage of new capabilities like mobile and cloud to deliver better services to its citizens. Many agencies are going paperless, streamlining how they interact with citizens and providing services more efficiently and faster. This short video will show real examples of how government agencies are applying new capabilities like cognitive and analytics to improve how they ingest, manage, store and interact with content.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee