government organizations

Results 1 - 25 of 52Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Innovation requires many ingredients: a great idea, creativity, persistence, the right data, and technology. Governments around the world are taking advantage of the cloud to reduce cost and transform the way they deliver on their mission. The expectations of an increasingly digital citizenry are high, yet all levels of government face budgetary and human resource constraints. Cloud computing (on-demand delivery of IT resources via the Internet with pay-as-you-go pricing) can help government organizations increase innovation, agility, and resiliency, all while reducing costs. This whitepaper provides guidelines that governments can use to break down innovation barriers and achieve a digital transformation that helps them engage and serve citizens.
Tags : 
    
Amazon Web Services APAC
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
Innovation requires many ingredients: a great idea, creativity, persistence, the right data, and technology. Governments around the world are taking advantage of the cloud to reduce cost and transform the way they deliver on their mission. The expectations of an increasingly digital citizenry are high, yet all levels of government face budgetary and human resource constraints. Cloud computing (on-demand delivery of IT resources via the Internet with pay-as-you-go pricing) can help government organizations increase innovation, agility, and resiliency, all while reducing costs. This whitepaper provides guidelines that governments can use to break down innovation barriers and achieve a digital transformation that helps them engage and serve citizens.
Tags : 
    
Amazon Web Services EMEA
Published By: AppZen     Published Date: Aug 02, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Sep 10, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: Ciena     Published Date: Nov 15, 2016
"Economic conditions have changed the operating landscape for government and educational organizations. Modern, converged networks utilize advanced optical and Ethernet technologies to form a highly flexible and scalable infrastructure capable of delivering many emerging applications and ready to scale far into the future. Additional benefits of building better networks for state and local governments include: >Better public service at lower taxpayer cost >Support for emerging applications in transportation, public safety, healthcare, and education >A graceful technology migration from legacy to converged network > Preparation for future, unplanned government applications Download ""Building Better Networks for State and Local Governments"" to discover more today."
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Discover how a converged network allows government and educational organizations to offer better service with lower taxpayer cost.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Discover how a converged network allows government and educational organizations to offer better service with lower taxpayer cost.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Cisco     Published Date: Nov 17, 2015
This white paper presents IDC’s analysis of the business value organizations are achieving by using Cisco UCS as a platform for SAP HANA and other SAP Business Suite applications. This analysis is based on IDC’s interviews with 12 Cisco UCS customers. These organizations are all relatively large organizations (1,500–85,000 employees), with an average of 25,383 employees. Interviewees represent a variety of industries: natural resources, agriculture, energy, government, automotive, retail, food and beverage, distribution, technology, healthcare, and IT. These organizations are based in the United States, EMEA, Mexico, and Brazil.
Tags : 
cisco, idc, business values, cisco ucs, sap hana, sap business suite, networking, it management, wireless, knowledge management, enterprise applications, data management
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : 
cisco, public safety, disaster response, networking, security
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Across organizations from all sectors, the network is becoming more integral to daily operations. This is acutely felt by public sector organizations in the United States, namely federal, state, and local governmental organizations. Public sector organizations contend with the challenge of ensuring the security of highly sensitive data on the network in the midst of uncertain budgets and, in many cases, outdated infrastructure. At the same time, many public sector organizations grapple with a complex web of compliance protocols that must be supported on the network. This Analyst Connection explores the need for network infrastructure upgrades that include "foundational security."
Tags : 
    
Cisco
Published By: Comcast Business     Published Date: Mar 24, 2015
It’s a transformative time in government information technology. Public sector organizations are moving to the cloud. At the same time, seemingly everything that can be virtualized is quickly heading in that direction. Immersive Web applications are enabling next-generation services, including innovative mobile apps that give agency staff members and constituents anytime access to valuable resources. Video seems to be everywhere, with one research firm estimating that video streaming accounts for more than 53 percent of all downstream traffic in North America. In this white paper from the Center for Digital Government (CDG), we break down what every IT leader needs to know about today’s networking to ensure project success.
Tags : 
high-performance networks, modern government, cloud, immersive web, mobile technology, networking, it management, data management
    
Comcast Business
Published By: Dell     Published Date: Sep 26, 2017
Government organizations need a workforce approach that not only enables employees to make informed decisions and work more efficiently, but also promotes engagement and satisfaction. Download this whitepaper to learn more about how to enable employees to better focus on their core roles and expertise and how to access the right information on demand to be more productive. As well, determine best practices for selecting the right devices to enable the organization as a whole to accomplish its mission, meet citizens’ needs, and attract and retain the workforce it needs for the future.
Tags : 
    
Dell
Published By: Dell     Published Date: Sep 26, 2017
Government leaders have the unprecedented opportunity to accelerate the path to IT modernization. Download this whitepaper to learn more about the IT trends driving digital transformations and the considerations to be made in determining a successful strategy toward effective and compliant IT modernization. With the right approach, organizations can create an efficient and future-ready launching pad to agilely, cost-effectively and securely meet the needs of constituents, employees and internal customers; accommodate increasing data volumes; and comply with regulatory requirements.
Tags : 
    
Dell
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, networking, security, it management, wireless, enterprise applications
    
E-SignLive by Silanis
Published By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
    
Exabeam
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Big Data is not just a big buzzword. Government agencies have been collecting large amounts of data for some time and analyzing the data collected to one degree or another. Big data is a term that describes high volume, variety and velocity of information that inundates an organization on a regular basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and better services.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
When asked how important technology is to driving innovation in their organizations, 100 percent of CEOs indicated it was important, with 80 percent pointing out that it’s very important, according to HP sponsored research. Even CIOs agree with their CEOs. According to the same research, when asked whether or not technology will be the innovation engine or administrative engine for a business or government, approximately two out of three CEOs said it would be the “innovation engine.” This represents a significant shift in the role that technology is playing in enterprises. Today, organizations demand new applications and more functionality delivered more quickly, and at a lower cost than ever before. Many organizations either want a mobile application or are already using one. In fact, according to analysts, by 2016 350 million employees will use smartphones at work and businesses will increase spending on mobile projects over 100 percent in the same time.
Tags : 
mobile, cloud, applications, apps, mobile apps, mobile data systems, wireless application software, wireless hardware, business intelligence
    
HP - Enterprise
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: IBM     Published Date: Jun 08, 2017
The healthcare payer ecosystem in the United States has changed dramatically over the last decade and is expected to evolve at an even faster pace over the next few years. Many world-class companies involved in healthcare payment processing are finding themselves constrained by their existing information technology infrastructure. The silos that they built around business-to-business (B2B) processing are constraining them, making it difficult to achieve governmental mandates and (more importantly) increase processing efficiency and competitive advantage. Gone are the days of a small set of data following static and simple standards traded between a limited set of organizations. Gone are the days where the rules for when data is valid versus invalid can expressed in a paragraph or two. Gone are the days when information about a healthcare payment was almost entirely about the "who," "when," and "how much."
Tags : 
hipaa, healthcare, b2b, organizational strategy, affordable care
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis, financial institutions are faced with increasing scrutiny from government regulators. The Dodd-Frank act was passed in response to the disaster, creating the Consumer Financial Protection Bureau and mandating 398 new rulemakings, many of which remain to be finalized. In light of these events financial services organizations are increasingly relying on Intralinks® as the most secure way to control sensitive information when collaborating within and outside their organizations. Intralinks meets the strictest security, auditability, and compliance requirements of regulated entities around the world – regardless of business complexities. Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection
    
Intralinks
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
You’re aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.
Tags : 
malware threats, cyberespionage, security technologies, security, it management, knowledge management, data management, business intelligence
    
Kaspersky Lab
Start   Previous   1 2 3    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.