Whitepaper List


Top Five Considerations for Technology Managers

Aug 05, 2015

Being a technology manager involves much more than project management skills. In this dynamic field of software development, managers who understand what a software developer does and know how to build a tech team will have an advantage over those who don’t really get it. To better manage technology projects, it is also necessary to understand why IT projects fail, the importance of QA and UA testing, and the inevitability of changes in scope.


How the Implementation of Development Strategies Plays a Role in Project Management

Aug 05, 2015

Agile, Extreme Programming, Scrum, Kanban—the exhaustive list of methodologies goes on. While the pros and cons of each framework spark endless debate, all of them have a place in software development. By taking a look at a few of these methodologies, tech managers can get a feel for which ones might be helpful for their team.


Definitive Guide to Next-Generation Threat Protection

Feb 18, 2014

Winning the War Against the New Breed of Cyber Attacks: Today's cyber adversaries are launching zero-day attacks that move through networks, undetected, for extended periods of time. In this eye-opening guide for Federal IT security professionals, you’ll learn about the evolution of today's new breed of attacks as well as the keys to truly securing agency networks.


The Insider Threat - How Privileged Users Put Critical Data at Risk

Jan 31, 2014

This white paper discusses the growing insider risks. It will also cover how organizations become breached—either by internal users through malicious or benign actions or from external threats that acquire the credentials of trusted insiders. Learn how organizations can implement technologies to protect data by decrypting at the point of use, and setting rules on who can see unencrypted data.


Addressing Insider Threat Through Big Data Analytics

Nov 01, 2013

This paper presents a new approach to leveraging Big Data analytics that advances the state-of-the-art for tracking a user’s behavior within a computer network system and reduces the threat of malicious insider behavior.


Contract Guide: GSA IT Schedule 70

May 10, 2013

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.


Powering Federal Mobility: Simplified Mobile Computing, BYOD, Telework

Apr 18, 2013

This new white paper discusses options for a mobile-services focused computing architecture that empowers productivity for federal government agencies through mobility, telework, consumerization and collaboration.


Download Now

Cloud Computing: Game Changing Technology to Meet Agency Missions

Feb 26, 2012

Although cloud computing can help the federal government achieve lower cost, more efficient IT operations, there’s still much confusion surrounding these services in public sector environments. In this report, learn more about cloud deployment models, best practices and top predictions for 2012..


Consolidated Security Management for Mainframe Clouds

Mar 04, 2013

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Extending Security Intelligence with Big Data

Mar 04, 2013

This whitepaper details a solution that enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.


Five Steps to Achieve Success in Your Application Security Program

Mar 04, 2013

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.


Security Intrusion Prevention Solutions

Mar 04, 2013

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. This whitepaper presents a comprehensive portfolio of intrusion prevention solution that go beyond traditional intrusion prevention to provide multilayered,end-to-end security that can actually protect networks from attacks before they occur.


Avoiding Insider Threats to Enterprise Security

Mar 04, 2013

This whitepaper outlines a solution that helps organizations securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability.


IT Executive Guide to Security Intelligence

Mar 04, 2013

This white paper discusses how security intelligence addresses threat detection shortcomings and empowers organizations to maintain comprehensive and cost-effective information security.


Managing Identities and Access in the Cloud

Mar 04, 2013

The ability to share services and information with various departments, partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption.


Continuous Monitoring for Government Agencies

Mar 04, 2013

This whitepaper details how government agencies can gain a 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.


Beyond the Next Generation: Meeting the Converging Demands of Network Security

Mar 04, 2013

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.


CAC and PIV: Government Leading the Way into Mobile Security

Aug 23, 2012

The Department of Defense has mandated that its Common Access Card (CAC), issued to military-connected personnel and contractors, be used to secure access to DoD networks and services from mobile devices such as smart phones and tablets. A similar directive could eventually come regarding the Personal Identity Verification (PIV) card issued to federal civilian employees. This leads to one very big question: what products and technologies are currently available to accomplish that goal? Read now to learn!


What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
 2015 fast 50
contracts DB
SEARCH

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts