RSS feed Get our RSS feed

News by Topic

government

Results 126 - 150 of 475Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Oct 24, 2016
All of these elements of growing connectivity have the potential to significantly increase productivity, streamline operations and enhance service levels to citizens and stakeholders. But these benefits are only one side of the story. The added complexity of the new eGovernment environment also creates many new challenges, as government agencies search for effective ways to secure and control access to the rapidly growing number and variety of gateways to their ecosystems.
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : security, security application, pki, authentication, internet security, security access
     Entrust Datacard
By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
     Entrust Datacard
By: Equinix APAC     Published Date: Feb 25, 2019
The Edge Completes the Cloud Edge computing delivers the decentralized complement to today’s hyperscale cloud and legacy data centers. To maximize application potential and user experience, enterprise architects and technology innovation leaders need to plan distributed computing solutions. Enabling this thinking is that although the cloud is becoming mainstream, that does not imply that all workloads will be placed in the cloud during the next decade or so. Technical incompatibilities, decades of embedded business logic in mainframe applications, government regulations and simple economics all conspire to keep some workloads out of the cloud, driving us toward a hybrid multi cloud future.
Tags : 
     Equinix APAC
By: ESET, LLC.     Published Date: May 16, 2011
Just recently a very stereotypical 419 was put together, using the Libyan crisis as bait and "government funds" as hook. Yep, every time a dictator is deposed or dies, someone seizes the opportunity to offer his fortune. Read this report for details.
Tags : eset, global threat report, april 2011, 419, scam, cybercrime
     ESET, LLC.
By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
     Exabeam
By: F5 Networks Inc     Published Date: Aug 25, 2017
DDoS attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks that took down Donald Trump’s campaign website and Brazilian government sites during the Olympics. But while volumetric attacks still reign supreme, there are other, more insidious, low-level DoS attacks that can also damage your site, your applications, and your business. If you think you’re ready for a DDoS attack—or that you don’t need to worry about one—make sure you’re not buying into some of these popular myths.
Tags : 
     F5 Networks Inc
By: Factiva     Published Date: Dec 01, 2015
When compliance managers think about the good old days, they do not have to look back too far. In fact, prior to 2008, the world was a much simpler place: the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) published a list of sanctioned companies and individuals, and as long as their company was not doing business with any person on that list, they seemed to be in good shape. This was definitely not an easy task. However, after 2008, it became more complicated when OFAC guidance stated that an ownership interest of 50% or more by a sanctioned subject was blocked or otherwise limited.
Tags : compliance, ofac, sanction
     Factiva
By: FICO     Published Date: May 11, 2017
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : customer experience, credit, credit policies
     FICO
By: FICO EMEA     Published Date: Jan 25, 2019
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
     FICO EMEA
By: FireEye     Published Date: Sep 11, 2012
Cyber Attacks on Government: How to Stop the APT Attacks that are Compromising Federal Agencies.
Tags : cyber attacks, apt attacks, federal, compromising, security
     FireEye
By: FireEye     Published Date: Feb 28, 2014
This whitepaper further educates you on the new security challenges for state and local governments.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
     FireEye
By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
     FireEye
By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
     FireEye
By: Forcepoint     Published Date: Dec 27, 2018
The case for leveraging cloud capabilities in government has been clearly proven—to drive savings and deliver mission-serving solutions faster. In 2018, the President’s Management Agenda makes it clear that moving to the cloud is still a top priority for agencies, and the latest 2018 Federal Cloud Computing Strategy, “Cloud Smart,” provides an updated long-term, high-level strategy to drive cloud adoption in Federal agencies. This is the first cloud policy update in seven years, offering a path forward for agencies to migrate to a safe and secure cloud infrastructure.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Dec 27, 2018
Digital transformation has driven unprecedented connectivity throughout government agencies. Users want to work in dynamic applications that reside on premises, in the cloud or in a hybrid environment. They also expect to access data, including Controlled Unclassified Information (CUI), from anywhere - and from any type of device.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Dec 27, 2018
Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your agency and the primary source of security breaches driving cyber risk to all-time highs.
Tags : 
     Forcepoint
By: ForeSee Results     Published Date: Feb 07, 2007
Find out how e-government agencies, departments and offices fared in customer satisfaction, and how satisfaction was earned, in this Q4 Report by Foresee Results.
Tags : loyalty and retention, e-government, customer satisfaction, foresee, foresee results, market research, usability
     ForeSee Results
By: ForUsAll     Published Date: Jun 18, 2018
The 401(k) market has rapidly changed.Is your plan up to date? Since 2012, there have been significant changes in 401(k)s which have created new risks and opportunities for small and midsized business 401(k) plans. With this rapid pace of change, many business owners, and even some small advisors and recordkeepers have not been able to keep up. We’ll summarize both changes to the 401(k) industry and the opportunities that exist for you to improve your plan, specifically in the following 5 areas: 1. Staying compliant with increasingly complicated regulations – New government regulations have increased burdens on companies offering both health plans and 401(k)s. What used to be compliant may no longer work. Furthermore, software has improved, allowing many error prone, manual retirement plan administration tasks to be automated. 2. Increasing plan effectiveness by lowering fees – Since 2009, average 401(k) plan costs have dropped by almost 30%*. While average costs have come down, not al
Tags : 
     ForUsAll
By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
The diversity and bureaucratic nature of government agencies have had complicated communication for decades. But today digital technologies offer a path to connectivity and information sharing that could help break the gridlock. Innovative mobile and field force automation (FFA) technologies are helping state and federal government agencies break down the walls that hindered cooperation and decision making between offices and field personnel. To find our more download this ebook today.
Tags : 
     Fujitsu America, Inc.
By: Fujitsu America, Inc.     Published Date: Jan 18, 2019
The diversity and bureaucratic nature of government agencies have complicated communication for decades. But today digital technologies offer a path to connectivity and information sharing that could help break the gridlock. Innovative mobile and field force automation (FFA) technologies are helping state and federal government agencies break down the walls that hindered cooperation and decision making between offices and field personnel. This document is designed to help ensure that your mobile device platform selection and processes provide the power, reliability, and flexibility you need to achieve your mission — in the office, in the field, or ten flights up in the air. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
     Fujitsu America, Inc.
By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. The diversity and bureaucratic nature of government agencies have complicated communication for decades. But today digital technologies offer a path to connectivity and information sharing that could help break the gridlock. Innovative mobile and field force automation (FFA) technologies are helping state and federal government agencies break down the walls that hindered cooperation and decision making between offices and field personnel. This document is designed to help ensure that your mobile device platform selection and processes provide the power, reliability, and flexibility you need to achieve your mission — in the office, in the field, or ten flights up in the air.
Tags : 
     Fujitsu America, Inc.
By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : web security, web threats, ssl, secure sockets layer, technology, solution, security
     GeoTrust
By: GeoTrust     Published Date: Oct 06, 2014
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : cloud provider, cloud computing, economic benefits, safeguard information assets, ssl, confidence
     GeoTrust
By: GGR Communications     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : ggr communication, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
     GGR Communications
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics