WHITE PAPER:
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
WHITE PAPER:
Government agencies have begun to follow private-sector companies in leveraging social media, but may still have questions regarding the tools, processes, and organizational changes required to make social media work. This informative resource details the five top considerations for government agencies looking to deploy social media strategies.
WHITE PAPER:
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
EGUIDE:
Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
EGUIDE:
Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
WHITE PAPER:
This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.