Regulatory Organizations Reports

Essential Supplier Report: Smart City Suppliers
sponsored by IBM
WHITE PAPER: This report cuts to the chase when it comes to suppliers focusing on smart cities and forwar-thinking municipalities. Read now for evaluations on leading players in the market that have the capacity to provide leadership on large-scale projects spanning multiple city requirements.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

IBM

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud
sponsored by IBM
TECHNICAL ARTICLE: This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.
Posted: 13 Sep 2010 | Published: 17 Aug 2010

IBM

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Building Solutions For Smarter Governments: Six Ways to Increase Responsiveness, Service Quality, Accountability and Taxpayer Value
sponsored by IBM
WHITE PAPER: This paper describes how smarter government means making operations and services truly citizen-centric, integrating their service delivery, coordinating programs and allowing a choice of access channels, as well as placing the most needed transactions on the Web.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

IBM

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

Globalscape

Cloud Computing: Get to know the basics
sponsored by Red Hat
WHITE PAPER: This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
Posted: 23 Jan 2012 | Published: 05 Jan 2012

Red Hat

Enterprise Content Management for Transforming Government
sponsored by EMC Corporation
WHITE PAPER: Read this issue brief by Center for Digital Government to learn how the Commonwealth of Massachusetts and the County of San Diego are improving service delivery by managing information electronically.  What benefits could ECM bring to your agency?
Posted: 10 Dec 2010 | Published: 10 Dec 2010

EMC Corporation

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM