Whitepaper List


Managing Identities and Access in the Cloud

Mar 04, 2013

The ability to share services and information with various departments, partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption.


IT Executive Guide to Security Intelligence

Mar 04, 2013

This white paper discusses how security intelligence addresses threat detection shortcomings and empowers organizations to maintain comprehensive and cost-effective information security.


Continuous Monitoring for Government Agencies

Mar 04, 2013

This whitepaper details how government agencies can gain a 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.


Security Intrusion Prevention Solutions

Mar 04, 2013

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. This whitepaper presents a comprehensive portfolio of intrusion prevention solution that go beyond traditional intrusion prevention to provide multilayered,end-to-end security that can actually protect networks from attacks before they occur.


Five Steps to Achieve Success in Your Application Security Program

Mar 04, 2013

This whitepaper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program’s maturity.


Consolidated Security Management for Mainframe Clouds

Mar 04, 2013

IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.


Extending Security Intelligence with Big Data

Mar 04, 2013

This whitepaper details a solution that enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.


CAC and PIV: Government Leading the Way into Mobile Security

Aug 23, 2012

The Department of Defense has mandated that its Common Access Card (CAC), issued to military-connected personnel and contractors, be used to secure access to DoD networks and services from mobile devices such as smart phones and tablets. A similar directive could eventually come regarding the Personal Identity Verification (PIV) card issued to federal civilian employees. This leads to one very big question: what products and technologies are currently available to accomplish that goal? Read now to learn!


Download Now

Technology Considerations to Leverage Sustainable Building Design

Mar 30, 2012

Gain insight into core technology decisions needed to successfully design and deploy a sustainable, smart building that delivers tangible infrastructure and business process improvements, as well as increased operational efficiencies.


Download Now

Research Report: Cloud Computing

Mar 22, 2012

Cloud adoption is on the rise. Nearly four out of 10 respondents to a recent survey has either adopted cloud computing or are in the process of adopting it for at least one process or application. As they have learned more about cloud computing, they have gained a more mature perspective on the benefits and risks. In this research report, learn more about those benefits, which type of cloud is most popular and what is their biggest concern.


Download Now

Data Center Optimization

Feb 05, 2012

Under pressure to consolidate data centers, many government IT managers are focusing on hardware utilization. From state and local governments to the Defense Department and civilian agencies, IT managers are feeling the pressure to squeeze more capacity out of their servers, storage devices and other expensive pieces of hardware. In this research report, learn how several techniques can help agencies maximize their IT investments, including data center optimization and server virtualization.


Download Now

Iron Bow Technologies Integrates VTC into its Daily Operations

Jan 01, 2012

Iron Bow Technologies is a recognized leader in developing Video Teleconferencing (VTC) solutions for the Federal Government. See how they employ VTC within their own company and why Cisco sums up their relationship with Iron Bow with one word -- “Trust.”


Download Now

2011 Dresner Advisory Services Wisdom of Crowds BI Market Study

Jan 01, 2012

Review the results of the "2011 Dresner Advisory Services Wisdom of Crowds BI Market StudyTM." Howard Dresner, report author and worldwide authority on BI, shares the latest market trends and insight and reviews Actuate's score and position in the market.


Download Now

Strengthening Our Nation's Security by Building a Trusted Identity Environment

Jan 01, 2012

Read this white paper and learn how your agency can dissuade credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.


Download Now

Achieving Cost Savings and Compliance with Green IT Network

Jan 01, 2012

Technology advances have enabled network design that is green friendly; consuming less power and requiring less space and cooling. This trend does more than help operators feel good about the environment; it also saves money.


Download Now

Remote Support Solutions: Anywhere, Anytime

Jan 01, 2012

The challenges for remote workers, especially for federal employees, are unlikely to disappear as technology and needs continue to evolve. In this white paper, learn more about how to provide safe and accurate assistance to your workers, whenever they need it.


Download Now

Innovation Matters: Rapidly Deploying Cost-Effective, Energy-Efficient Data Centers

Jan 01, 2012

Download this informative how-to-guide and learn innovative tactics for deploying high performing data centers which can enable agency and IT growth.


Download Now

CyberSecurity Assessment Brief: How to Maintain Insight, Respond Quickly and Plan Proactively

Dec 01, 2011

Cyber-attackers have now learned how to exploit user trust by masquerading as social networking friends, business associates, or trusted acquaintances – spreading millions of new strains of malware each year. Learn how to effectively safeguard your networks with real-time cyberanalytic tools.


Download Now

Three Demographic Mega-Trends to Transform the Aerospace and Defense Workforce

Dec 01, 2011

Three demographic mega-trends promise to transform the composition of the Aerospace & Defense workforce. In this informative whitepaper from Oracle, learn about these trends and how they are beginning to take effect, driving imbalances that are rippling through a number of talent markets.


Download Now

Data Loss Prevention: When Mobile Device Management Alone Isn't Enough

Nov 17, 2011

Many businesses are turning to mobile device management (MDM) solutions to better secure, manage, and support the variety of mobile devices their employees use. In many instances, MDM alone is not enough to protect against data loss and leakage. This paper introduces Good for Enterprise—and its unique approach to managing security on mobiles, including data loss prevention features.


Download Now

WAN Optimization: Transformation Through Technology

Nov 16, 2011

As organization have consolidated their data, storage and servers, WAN optimization has become a critical enabling technology to speed response times and reduce bandwidth for central file access which allows for centralized storage architectures and applications. Learn more about the evolution of WAN optimization in this report.


Download Now

A Best Practice Guide to Securing Data

Nov 10, 2011

Archiving is a vital tool as part of a data center cost savings exercise - The data center needs to reduce its total cost of ownership (TCO) for its data retention infrastructure. It must contain costs, manage data growth, improve the data retention process, and make it more efficient. Unstructured data is often the core data asset in an organization’s work flow and is inherent in revenue generating operations.


Download Now

Making the Case for All-in-One Digital Forensics

Nov 09, 2011

Tracking a serial killer can be one of the most difficult things an investigator can do. Cunning and smart, serial killers are careful to leave only the very basic calling cards — just enough to confound police, but usually not enough to get caught.


Download Now

The STAND: Data Center Efficiency

Nov 07, 2011

Agency data centers are the biggest cost in government IT but given the explosive growth in data that have to be managed and the ever-increasing demands for IT services, they are also the most important asset. Getting more out of their data centers in the most cost-effective way is a priority for agencies. An industry veteran explains what they need to do for that, and what potential roadblocks they should look out for.


Download Now

The Regulatory Impact on eDiscovery for Government and Corporations

Oct 31, 2011

The explosive growth in electronic information has changed the way legal matters are managed. This white paper will identify the challenges that affect multi-party litigations, drawing upon examples from NASA, the Executive Office of US Attorneys and Enron.


Download Now

Gartner Magic Quadrant for PC Configuration Life Cycle

Oct 24, 2011

This current Magic Quadrant document offers a third party perspective of IBM's leadership and visionary position in the PCCLM space while providing an in-depth comparison against our perceived competition. Read the report to see where IBM/BigFix is positioned.


Download Now

Continuous Monitoring, Remediation and CyberScope Reporting

Oct 24, 2011

To assist federal agencies with the implementation of CyberScope reporting, IBM Tivoli Endpoint Manager, built on BigFix technology, provides insight and control for endpoints with streamlined, automated capabilities for continuously monitoring and remediating security compliance.


Download Now

Is Your Network a Battlefield: How to Proactively Combat Cybersecurity Threats

Oct 24, 2011

Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.


Download Now

The Smarter Supply Chain of the Future - Chief Supply Chain Officer Study

Oct 19, 2011

Discover how to leverage advanced analytics to help your agency address challenges such as risk, visibility, globalization and cost containment in this newly-released whitepaper.


Download Now

Evaluating Handheld Computing Devices for Support of DoD Operations

Oct 18, 2011

Intermec develops and integrates products, services and technologies that identify, track and manage supply chain assets and information.


Download Now

Global Threat Intelligence

Oct 13, 2011

This white paper discusses protection against known, unknown and emerging cybersecurity threats; risk mitigation and prevention of successful intrusions.


Download Now

Transforming the Data Center – from Consolidation to the Cloud

Oct 07, 2011

Agencies face looming deadlines to comply with federal mandates to automate as many IT processes as possible while continuing to deliver key services and lower expenses. In this special report, learn ways to resolve these and other challenges facing public sector organizations today.


Download Now

Capitalizing on the Software Asset Management Imperative

Oct 07, 2011

Managing software assets—or Software Asset Management (SAM)—and associated costs have once again risen as a high priority for IT, and rightfully so. Software licenses represent a significant part of IT’s budget and offer an opportunity for substantial expense reduction at a time when cutting costs and optimizing investments are so critical. This renewed interest in SAM surfaces periodically—with spikes most often related to IT finance and contractual compliance.


Download Now

Service Desk Management Works Case Study

Oct 07, 2011

Their ability to deliver services is highly dependent upon their capability to operate with highly reliable and efficient IT operations. The changes described in this case study will help to assure they will be able to achieve that goal.


Download Now

Cloud computing Payback

Oct 07, 2011

Cloud Computing ROI study conducted by IBM Research uses customer environment data and cost saving data from more than one dozen companies working with IBM on Cloud Computing. The results overview the financial benefits of implementing cloud computing.


Download Now

Enhance Service Delivery and Process Automation

Oct 07, 2011

Tivoli process automation engine helps automate, integrate and enhance service delivery across the enterprise.


Download Now

Discover and visualize your dynamic IT Infrastructure Solution Brief

Oct 07, 2011

IBM Tivoli Application Dependency Discovery Manager supports the alignment of IT and business with robust and automated application mapping and discovery that helps organizations understand the impact of change and meet compliance needs with detailed reporting and auditing.


Download Now

Optimizing the Data Center for Today’s Federal Government

Oct 06, 2011

This whitepaper provides an overview of key drivers for data center optimization in the federal government.


Download Now

Infrastructure Optimization Special Report

Oct 06, 2011

The use of virtualization, the cloud and the need to green both the data center and the organization continue to be hot button topics when it comes to optimizing the infrastructure. Learn more about emerging methods and trends in this special report.


Download Now

ExaData For Dummies Ebook

Oct 06, 2011

It seems that every system is growing rapidly with changing enterprise processing requirements and increased system availability demands. Unfortunately, IT budgets are not growing at the same rate as these demands. Read this informative guide and learn how you can achieve a consolidated, high-performance database and storage server Infrastructure without breaking your IT budget.


Download Now

Improving the Standard of Health Care

Oct 04, 2011

Health IT has been pushed for years as a way for improving the delivery of health care in the U.S. and for cutting costs. After a period of confusion and outright resistance to the adoption of electronic health records, seen as the key technology, implementation is finally taking off.


Download Now

The STAND: C4ISR

Sep 29, 2011

Military effectiveness on the battlefield increasingly depends on C4ISR technologies to deliver accurate and real time information to warfighters, even while those technologies must operate in an ever-more complex environment. An industry veteran of this space explains what the challenges are and what’s needed to meet current and future needs.


Download Now

The STAND: Teleworking

Sep 23, 2011

An experienced industry hand takes a look at how well government agencies are prepared to meet new mandates for increasing the amount of teleworking the government employees are expected to do, why many of them fall short of such things as connectivity and security requirements, and what they can do about it.


Download Now

Making a Case for Improving Efficiency and Outcomes in the Healthcare Industry

Sep 23, 2011

With fewer resources, there is increased pressure to streamline processes and comply with ever-changing government regulation and compliance requirements. forcing organizations to find new and innovative ways to increase value, optimize processes and deliver better outcomes.


Download Now

Making a Case for Problem Solving in the Energy and Utilities Industries

Sep 23, 2011

In today’s ever-changing business environment, energy and utility companies are under increased pressure to streamline their processes, reduce costs and improve customer service with fewer resources.


Download Now

Court Case Management from IBM

Sep 23, 2011

Law enforcement agencies face significant challenges to build cases and compile dockets for the district attorney to submit to the court. Discover how agencies at the federal, state, and local level are leveraging case information and automation to improve efficiencies and decision making.


Download Now

Making a Case for Citizen-Centric Services in Government Agencies

Sep 23, 2011

With change as the driver, government agencies of all sizes are charged with balancing needs with greater demand and complexity to keep government moving. This whitepaper discusses how advanced analytics can dynamically work with citizens, communities, and businesses in real time to promote efficiency, innovation, and progress.


Download Now

Government IT Trends Driving CIO Priority Shifts

Sep 20, 2011

Despite technologies designed to increase storage efficiency, enterprise data continues to expand at more than 40% per year, which means growing operations cost. In order to meet these demands CIOs are aligning technology in their IT infrastructure to better support business objectives.


Download Now

Key Considerations for Long-Term Bulk Storage

Sep 20, 2011

Keeping large amounts of data on expensive primary storage is untenable. Consolidation partially addresses the challenge. But, careful analysis of usage and performance, and implementing a tiered architecture, can help meet business objectives.


Download Now

Next Generation Security Technology Promises To Be Leaner and Greener

Sep 20, 2011

Uncertainty about how to effectively secure sensitive data is causing friction inside agencies as they struggle with how to achieve compliance with White House-led cybersecurity mandates. This white paper provides best practices advice for public sector organizations seeking cost-effective and energy efficient alternatives for securing sensitive data.