RSS feed Get our RSS feed

News by Topic

government

Results 126 - 150 of 475Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: Dec 05, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and find out how governments can harness the benefits and apply them across regions to enhance mobility, experiences and safety. In this report by Counterpoint Technology Market Research, learn why the HERE Open Location Platform – described as super-rich and always up-to-date, is a leader in the location data arena.
Tags : public sector, urbanization, traffic management
     HERE Technologies
By: Asentria Corporation     Published Date: Sep 04, 2007
The use of pollable remote access units enable integration of phone systems with telecommunications management, plus system-wide access, monitoring and alarm notification that includes unmanned remote sites. Few telephone networks connect a user base that is involved in such a multitude of vital services as local government.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: Oracle     Published Date: Sep 11, 2012
This paper explores ways for government to provide Citizens access before or after hours and conduct government business--much as they can log on to their computers whenever they want to buy from Amazon.com.
Tags : it marketing, customer service, oracle, web experiences
     Oracle
By: Dell     Published Date: Sep 26, 2017
Government organizations need a workforce approach that not only enables employees to make informed decisions and work more efficiently, but also promotes engagement and satisfaction. Download this whitepaper to learn more about how to enable employees to better focus on their core roles and expertise and how to access the right information on demand to be more productive. As well, determine best practices for selecting the right devices to enable the organization as a whole to accomplish its mission, meet citizens’ needs, and attract and retain the workforce it needs for the future.
Tags : 
     Dell
By: Pega     Published Date: Jun 21, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases.
Tags : 
     Pega
By: Pega     Published Date: May 25, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases. Download this Gartner analysis and gain a better understanding of the case management frameworks solutions offe
Tags : business optimization, business strategy, network management, business applications, best practices, business process management, solutions, case management
     Pega
By: Adobe     Published Date: Oct 25, 2017
With the right foundation, the road to digital transformation is easy. Find out the steps you can take to start your journey – and start delivering experiences that truly put your customers at the center. Read the guide, Customer-centric Digital Transformation: What You Need to Know to learn: • Five steps toward customer-centric digital transformation • Four key components that make up excellent customer experiences • Tips and inspiration from industry experts and digital government agencies
Tags : public sector, digital innovation, customer-centric, digital government, customer experience
     Adobe
By: FireEye     Published Date: Sep 11, 2012
Cyber Attacks on Government: How to Stop the APT Attacks that are Compromising Federal Agencies.
Tags : cyber attacks, apt attacks, federal, compromising, security
     FireEye
By: Palo Alto Networks     Published Date: Sep 30, 2016
Palo Alto Networks is leading a new era in cybersecurity by securing thousands of enterprise, government, and service provider network from cyber threats and protecting our digital way of life.
Tags : palo alto, firewall, cyber security, automation, cybersecurity for dummies
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : palo alto, security, network security, threats, malware, zero trust, breach, security breaches
     Palo Alto Networks
By: Dell     Published Date: Aug 28, 2015
Download this white paper to lean more about how Dell's Connected Security solutions give you the power to solve your security and compliance challenges today, while proactively keeping you one step ahead of tomorrow’s threats.
Tags : cybersecurity, dell, government, compliance, apt, cybercriminal activity, spam, malware
     Dell
By: Tripwire     Published Date: Feb 08, 2013
Cyberwar fundamentally changes how government must handle security. Firewalls, intrusion detection systems and other security devices can stop the average hacker, but new threats use stealth techniques that these defenses cannot detect on their own.
Tags : cyberwar, hacker detection, defense, security, government, firewall, cyber attacks, cyber threats
     Tripwire
By: Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
     Cylance
By: CyrusOne     Published Date: Jul 05, 2016
Data centers help state and federal agencies reduce costs and improve operations. Every day, government agencies struggle to meet critical cost controls with lower operational expenses while fulfilling the Federal Data Center Consolidation Initiative’s (FDCCI) goal. All too often they are finding themselves constrained by their legacy in-house data centers and connectivity solutions that fail to deliver exceptional data center reliability and uptime.
Tags : data center, best practices, competitive advantage, productivity
     CyrusOne
By: CyrusOne     Published Date: Jul 06, 2016
Data centers help state and federal agencies reduce costs and improve operations. Download to learn how.
Tags : cyrusone, data centers, connectivity
     CyrusOne
By: IBM     Published Date: Jun 09, 2015
Government revenue management agencies are using computer technology to capture and harvest data and extract value from it. This paper explains the importance of being data-droven and outlines a way forward in the journey of getting there.
Tags : ibm, government, data, records, legal, information, benefits
     IBM
By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
     Safe Software
By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
     Incapsula
By: F5 Networks Inc     Published Date: Aug 25, 2017
DDoS attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks that took down Donald Trump’s campaign website and Brazilian government sites during the Olympics. But while volumetric attacks still reign supreme, there are other, more insidious, low-level DoS attacks that can also damage your site, your applications, and your business. If you think you’re ready for a DDoS attack—or that you don’t need to worry about one—make sure you’re not buying into some of these popular myths.
Tags : 
     F5 Networks Inc
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers
     BlackBerry
By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
     NAVEX Global
By: Adobe     Published Date: Mar 05, 2018
Governments are close, but fall short when meeting constituents' experiential needs online. People expect compelling, convenient experiences when engaging with their government online. According to research conducted by Adobe and the WPP Government & Public Sector Practice, the current approaches to digital government services can be improved.
Tags : 
     Adobe
By: Adobe     Published Date: Oct 25, 2017
Outdated, manual services aren’t just frustrating for citizens, they slow government processes down and increase costs. The Governing Institute recently analyzed how well state governments deliver digital experiences for citizens, employees, and businesses. Read Delivering on the Digital Experiences that Drive Efficiency to learn: • How digital experiences measure up in all 50 states • About our new customer experience maturity model for state governments • Best practices for improving digital processes in your own state
Tags : customer experience, digital government, digital maturity, customer-centric, customer engagement
     Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics