Whitepaper List

Enterprise Insight Analysis for Defense Intelligence

Oct 01, 2015

As national security and defense threats become more asymmetrical and complex, intelligence organizations and agencies are challenged to respond more efficiently and precisely. With shrinking budgets and limited resources, these agencies need a solution that can help them accelerate the data-to-decision process, so they can make better informed decisions and take confident, effective action. IBM® i2® Enterprise Insight Analysis is a next-generation intelligence solution designed to help do just that by applying advanced analytics at scale and with critical speed.

Enterprise Insight Analysis for Cyber Intelligence

Oct 01, 2015

Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD2. And today’s cyber criminals are becoming more sophisticated, agile and capable of launching more attacks at faster speeds. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. The IBM® i2® Enterprise Insight Analysis solution is a next-generation intelligence solution designed to turn overwhelming and disparate data sets into comprehensive intelligence, in near real time.

Top Five Considerations for Technology Managers

Aug 05, 2015

Being a technology manager involves much more than project management skills. In this dynamic field of software development, managers who understand what a software developer does and know how to build a tech team will have an advantage over those who don’t really get it. To better manage technology projects, it is also necessary to understand why IT projects fail, the importance of QA and UA testing, and the inevitability of changes in scope.

How the Implementation of Development Strategies Plays a Role in Project Management

Aug 05, 2015

Agile, Extreme Programming, Scrum, Kanban—the exhaustive list of methodologies goes on. While the pros and cons of each framework spark endless debate, all of them have a place in software development. By taking a look at a few of these methodologies, tech managers can get a feel for which ones might be helpful for their team.

Definitive Guide to Next-Generation Threat Protection

Feb 18, 2014

Winning the War Against the New Breed of Cyber Attacks: Today's cyber adversaries are launching zero-day attacks that move through networks, undetected, for extended periods of time. In this eye-opening guide for Federal IT security professionals, you’ll learn about the evolution of today's new breed of attacks as well as the keys to truly securing agency networks.

The Insider Threat - How Privileged Users Put Critical Data at Risk

Jan 31, 2014

This white paper discusses the growing insider risks. It will also cover how organizations become breached—either by internal users through malicious or benign actions or from external threats that acquire the credentials of trusted insiders. Learn how organizations can implement technologies to protect data by decrypting at the point of use, and setting rules on who can see unencrypted data.

Addressing Insider Threat Through Big Data Analytics

Nov 01, 2013

This paper presents a new approach to leveraging Big Data analytics that advances the state-of-the-art for tracking a user’s behavior within a computer network system and reduces the threat of malicious insider behavior.

Contract Guide: GSA IT Schedule 70

May 10, 2013

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.

Powering Federal Mobility: Simplified Mobile Computing, BYOD, Telework

Apr 18, 2013

This new white paper discusses options for a mobile-services focused computing architecture that empowers productivity for federal government agencies through mobility, telework, consumerization and collaboration.

Download Now

Cloud Computing: Game Changing Technology to Meet Agency Missions

Feb 26, 2012

Although cloud computing can help the federal government achieve lower cost, more efficient IT operations, there’s still much confusion surrounding these services in public sector environments. In this report, learn more about cloud deployment models, best practices and top predictions for 2012..

Managing Identities and Access in the Cloud

Mar 04, 2013

The ability to share services and information with various departments, partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption.

Continuous Monitoring for Government Agencies

Mar 04, 2013

This whitepaper details how government agencies can gain a 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.

Consolidated Security Management for Mainframe Clouds

Mar 04, 2013

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

Extending Security Intelligence with Big Data

Mar 04, 2013

This whitepaper details a solution that enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.

Security Intrusion Prevention Solutions

Mar 04, 2013

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. This whitepaper presents a comprehensive portfolio of intrusion prevention solution that go beyond traditional intrusion prevention to provide multilayered,end-to-end security that can actually protect networks from attacks before they occur.

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Mar 04, 2013

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? This whitepaper provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

IT Executive Guide to Security Intelligence

Mar 04, 2013

This white paper discusses how security intelligence addresses threat detection shortcomings and empowers organizations to maintain comprehensive and cost-effective information security.

Five Steps to Achieve Success in Your Application Security Program

Mar 04, 2013

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.

Avoiding Insider Threats to Enterprise Security

Mar 04, 2013

This whitepaper outlines a solution that helps organizations securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability.

CAC and PIV: Government Leading the Way into Mobile Security

Aug 23, 2012

The Department of Defense has mandated that its Common Access Card (CAC), issued to military-connected personnel and contractors, be used to secure access to DoD networks and services from mobile devices such as smart phones and tablets. A similar directive could eventually come regarding the Personal Identity Verification (PIV) card issued to federal civilian employees. This leads to one very big question: what products and technologies are currently available to accomplish that goal? Read now to learn!

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here