Whitepaper List


Definitive Guide to Next-Generation Threat Protection

Feb 18, 2014

Winning the War Against the New Breed of Cyber Attacks: Today's cyber adversaries are launching zero-day attacks that move through networks, undetected, for extended periods of time. In this eye-opening guide for Federal IT security professionals, you’ll learn about the evolution of today's new breed of attacks as well as the keys to truly securing agency networks.


The Insider Threat - How Privileged Users Put Critical Data at Risk

Jan 31, 2014

This white paper discusses the growing insider risks. It will also cover how organizations become breached—either by internal users through malicious or benign actions or from external threats that acquire the credentials of trusted insiders. Learn how organizations can implement technologies to protect data by decrypting at the point of use, and setting rules on who can see unencrypted data.


Addressing Insider Threat Through Big Data Analytics

Nov 01, 2013

This paper presents a new approach to leveraging Big Data analytics that advances the state-of-the-art for tracking a user’s behavior within a computer network system and reduces the threat of malicious insider behavior.


Contract Guide: GSA IT Schedule 70

May 10, 2013

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.


Powering Federal Mobility: Simplified Mobile Computing, BYOD, Telework

Apr 18, 2013

This new white paper discusses options for a mobile-services focused computing architecture that empowers productivity for federal government agencies through mobility, telework, consumerization and collaboration.


Download Now

Cloud Computing: Game Changing Technology to Meet Agency Missions

Feb 26, 2012

Although cloud computing can help the federal government achieve lower cost, more efficient IT operations, there’s still much confusion surrounding these services in public sector environments. In this report, learn more about cloud deployment models, best practices and top predictions for 2012..


Keeping Distributed Endpoints Safe and Compliant

Dec 30, 2013

With rapidly increasing numbers of remote workers and mobile devices, there is no well-defined perimeter. The perimeter, by necessity, must be the endpoint itself. Endpoints, by their very nature, are highly vulnerable to attack— including system damage inflicted by malware, theft by phishing, privacy infringements through social networking, or loss of productivity due to spam, interruptions and system instabilities. Read this whitepaper to learn about a solution that provides real-time visibility and control over each endpoint’s status, remediating issues to help ensure continuous security and compliance.


Intelligent role management for improved security and compliance

Dec 30, 2013

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.


Stay Ahead of Insider Threats with Predictive, Intelligent Security

Dec 30, 2013

It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools.


An Early Leader across the Big Data Security Analytics

Dec 30, 2013

This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one of the few vendors offering an integrated approach to combat this.


Ensuring Application Security in Mobile Device Environments

Dec 30, 2013

As a result of the increase in wireless devices in the workforce, organizations are becoming more concerned with mobile security. Many, in fact, see this area as a primary technology challenge to address and a main focus for security initiatives.


Identity and Access Intelligence:Transforming the Nature of Enterprise Security

Dec 30, 2013

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud security challenges and proactively protect sensitive IT assets.


How does IBM deliver cloud security?

Sep 02, 2013

Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualized environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and de-provisioning environment while experiencing the loss of direct control of security compliance, and privacy parameters.


Identity and Access Management Buyer's Guide

Sep 02, 2013

This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.


Protecting Consumer and Business Information with Advanced Threat Protection

Sep 02, 2013

As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it serves.


Secure Web Applications: Creating a Security Culture

Sep 02, 2013

Companies move applications to the Web to improve customer interactions, lower business processing costs and speed outcomes. But driving applications to the Web also increases vulnerabilities – unless security is an integral component of the application development process.


Application security and risk management

Sep 02, 2013

The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to collectively address application security by identifying and remediating vulnerabilities early in the software development lifecycle, when they are easier and less expensive to correct. IBM research drives IBM Security AppScan solutions to identify the latest threats with advanced security testing for application security analysts. With more than a decade of application security experience, IBM Security AppScan solutions deliver some of the most advanced testing features that combine expert analysis with ease of use.


IBM zSecure Compliance and Administration

Sep 02, 2013

IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administra-tion. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to help detect threats.


Accelerate Your Windows 7 Migration

Aug 07, 2013

The deadline of Extended Support for Windows XP is set to expire on April 8, 2014, and cost implications of remaining on XP are staggering. Plus, running XP at your own risk leaves your environment vulnerable. Download this free White Paper and learn how many organizations are migrating tens of thousands of PCs in record time.


Integrating Security into Development, No Pain Required

Jun 03, 2013

In this whitepaper, senior SANS Analyst Dave Shackleford duscusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


Delivering Success that Scales with the Largest Enterprises

Jun 03, 2013

IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and event management (SIEM) solutions. In order to support the demands of organizations across industries, IBM offers the geographic reach to serve global organizations and the partner ecosystem required to deliver powerful and comprehensive solutions.


2012 IBM X-Force Annual Trend and Risk Report

Jun 03, 2013

The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done to mitigate it.


How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security

Jun 03, 2013

This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.


Secure By Design: Building Identity-based Security into Today’s Information Systems

Jun 03, 2013

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible


Increase Productivity and Security with Identity and Access Management

Jun 03, 2013

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. To meet the needs of a changing user population while simultaneously maintaining a security-rich environment, organizations need identity management solutions that can define, grant and remove access privileges to match the user’s job role and actual access requirements.


IBM Security Intrusion Preventions Solutions

Jun 03, 2013

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers a comprehensive portfolio of intrusion prevention solutions that go beyond traditional intrusion prevention to provide multilayered, end-to-end security that can actually protect networks from attacks before they occur.


Five Steps to Achieve Success in Your Application Security Program

Mar 04, 2013

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.


Extending Security Intelligence with Big Data

Mar 04, 2013

This whitepaper details a solution that enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.


Security Intrusion Prevention Solutions

Mar 04, 2013

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. This whitepaper presents a comprehensive portfolio of intrusion prevention solution that go beyond traditional intrusion prevention to provide multilayered,end-to-end security that can actually protect networks from attacks before they occur.


Consolidated Security Management for Mainframe Clouds

Mar 04, 2013

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

Mar 04, 2013

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


Avoiding Insider Threats to Enterprise Security

Mar 04, 2013

This whitepaper outlines a solution that helps organizations securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability.


IT Executive Guide to Security Intelligence

Mar 04, 2013

This white paper discusses how security intelligence addresses threat detection shortcomings and empowers organizations to maintain comprehensive and cost-effective information security.


Managing Identities and Access in the Cloud

Mar 04, 2013

The ability to share services and information with various departments, partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption.


Continuous Monitoring for Government Agencies

Mar 04, 2013

This whitepaper details how government agencies can gain a 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.


CAC and PIV: Government Leading the Way into Mobile Security

Aug 23, 2012

The Department of Defense has mandated that its Common Access Card (CAC), issued to military-connected personnel and contractors, be used to secure access to DoD networks and services from mobile devices such as smart phones and tablets. A similar directive could eventually come regarding the Personal Identity Verification (PIV) card issued to federal civilian employees. This leads to one very big question: what products and technologies are currently available to accomplish that goal? Read now to learn!


What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts

  • How Do You Support the Project Lifecycle?

    How do best-in-class project-based companies create and actively mature successful organizations? They find the right mix of people, processes and tools that enable them to effectively manage the project lifecycle. REGISTER for this webinar to hear how properly managing the cycle of capture, bid, accounting, execution, IPM and analysis will allow you to better manage your programs to stay on scope, schedule and budget. Learn More!

  • Sequestration, LPTA and the Top 100

    Join Washington Technology’s Editor-in-Chief Nick Wakeman as he analyzes the annual Top 100 list and reveals critical insights into how market trends have impacted its composition. You'll learn what movements of individual companies means and how the market overall is being impacted by the current budget environment, how the Top 100 rankings reflect the major trends in the market today and how the biggest companies in the market are adapting to today’s competitive environment. Learn More!