Defense Communications Agency Reports

ACCELERATING IMPACT: NONPROFITS + SERVICENOW
sponsored by ServiceNow
EBOOK: How can you balance the nuanced IT requirements within your nonprofit while delivering exceptional experiences for customers and employees? Access this e-book to examine the key areas in which ServiceNow supports the organizational and digital transformation goals of nonprofits.
Posted: 07 Jan 2025 | Published: 07 Jan 2025

ServiceNow

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

The Defender’s Advantage
sponsored by Google
EBOOK: By reading this e-book, you will understand how to activate your cyber defense with an intelligence-led approach. Read on now to learn how you can leverage threat intelligence, detection engineering, and coordinated incident response to maximize your Defender's Advantage and strengthen your cybersecurity posture.
Posted: 17 Jan 2025 | Published: 21 Jan 2025

Google

Five Ways to Improve Cybersecurity at Your Government Agency
sponsored by Hughes Network Systems
BLOG: Government agencies, regardless of their mission or size, hold onto a significant amount of data. Some of this data is highly confidential when you consider it includes the DMV, the IRS and more. Because of the nature of the data they collect, cybersecurity is always top of mind. Read on to learn cybersecurity tips that any agency can benefit from.
Posted: 22 Jun 2023 | Published: 22 Jun 2023

TOPICS:  .NET
Hughes Network Systems

Defending A Defense Contractor With A Compliant Unified Communications Solution
sponsored by ARG, Inc.
CASE STUDY: A national, privately held defense contractor had previously leveraged Avaya on-prem PBX, Verizon PRIs and numerous collaboration and messaging tools (Teams, Slack, etc.) As many of these were disjointed, compliance risks arose. View this case study to learn how ARG helped this contractor aggregate tools and eliminate overlap.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

TOPICS:  .NET
All resources sponsored by ARG, Inc.

AI For Cyber Defense
sponsored by CyberMaxx
EBOOK: For a deep dive on the relationship between AI and cyber defense, check out this 14-page e-book by SVP of Security Operations at CyberMaxx, Gary Monti.
Posted: 20 Sep 2024 | Published: 23 Sep 2024

CyberMaxx

CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

Build Your Agency’s Next Breakthrough
sponsored by FCN
WHITE PAPER: Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
Posted: 18 Jul 2023 | Published: 18 Jul 2023

TOPICS:  .NET
FCN

A Network Defense Layer That Actually Works
sponsored by Centripetal Networks
PRODUCT OVERVIEW: As cyber threats evolve, traditional firewalls alone are no longer sufficient. Centripetal's CleanINTERNET adds a critical external defense layer, leveraging advanced threat intelligence to detect and block threats in real-time. Download this blog to learn how a multi-layered security approach can enhance your enterprise's defense.
Posted: 13 Sep 2024 | Published: 14 Sep 2024

Centripetal Networks

CW ANZ: Australian firms connect people in new ways
sponsored by TechTarget ComputerWeekly.com
EZINE: Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

Fedramp-Compliant Unified Communications Solution Delivers Simplicity, Scalability, And Savings
sponsored by ARG, Inc.
CASE STUDY: A top 10 federal defense contractor with over 20,000 employees was managing a complex environment with large Avaya and Cisco footprints for PBX and contact center. They required a FedRAMP environment that provided a seamless consolidation of collaboration, conferencing and voice. Download this case study to learn how they got it.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

TOPICS:  .NET
All resources sponsored by ARG, Inc.

Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.
Posted: 13 Mar 2023 | Published: 14 Mar 2023

TechTarget ComputerWeekly.com

The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016

TechTarget ComputerWeekly.com

Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.
Posted: 08 Feb 2021 | Published: 09 Jun 2020

TechTarget ComputerWeekly.com

Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK: The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024

TOPICS:  .NET
Saviynt

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Wind River In Aerospace And Defense
sponsored by Wind River
PRODUCT OVERVIEW: Whether your organization sells goods and services to the public or builds fighter jets for the military, one thing remains the same: you need safe, secure and reliable computing systems to get the job done. To make it happen, more businesses are turning to a partner who has been doing just that for over 40 years. Read on to learn more.
Posted: 03 Jan 2025 | Published: 07 Sep 2023

TOPICS:  .NET
Wind River

Protect Federal Agencies by Securing DevOps, Secrets and Other Non-human Identities
sponsored by Merlin International
WHITE PAPER: Securing non-human identities is crucial for federal agencies to prevent costly breaches and protect critical infrastructure. Learn how effective secrets management can enable secure DevSecOps and fulfill key cybersecurity directives. Read the full white paper.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Merlin International

CW ANZ: Trend Watch - communications infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, Computer Weekly looks at how Australia's bushfires impacted its telecoms networks and the increase in SD-WAN adoption in Asia-Pacific
Posted: 08 Feb 2021 | Published: 16 Apr 2020

TechTarget ComputerWeekly.com

Intermedia Archiving: An Essential Service for Business Communications
sponsored by Intermedia.Net
WHITE PAPER: Archiving communications is critical for businesses to comply with regulations, resolve disputes, and access vital information. This whitepaper explores the benefits of Intermedia Archiving and how it can help your organization. Read the full whitepaper to learn more.
Posted: 17 Jan 2025 | Published: 17 Jan 2025

Intermedia.Net

Computer Weekly – 5 December 2023: Technologies to support hybrid working
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.
Posted: 01 Dec 2023 | Published: 05 Dec 2023

TechTarget ComputerWeekly.com

Before Tackling Secure Texting In Healthcare, Change Your Company Culture
sponsored by AVST
EGUIDE: In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
Posted: 08 Feb 2021 | Published: 16 Feb 2017

AVST

Cyber Security in Healthcare: Frontline Defenses for Critical Data
sponsored by Fortra
EBOOK: This e-book explores critical cyber security challenges facing healthcare organizations, including phishing, insider threats, data breaches, and ransomware. Learn how to strengthen your security posture with tailored training solutions that empower your team. Read the e-book to build a resilient cyber security culture.
Posted: 19 Dec 2024 | Published: 19 Dec 2024

Fortra

Computer Weekly – 3 May 2022: A prescription for digital accessibility at Boots
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer's guide examines communications as a service. And we talk to Trainline's CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now.
Posted: 03 May 2022 | Published: 03 May 2022

TechTarget ComputerWeekly.com

Securely Moving to the (Government) Cloud
sponsored by Cisco
ANALYST REPORT: It’s no secret that FedRAMP compliance is the staple of government cloud operations. This SANS white paper examines the security requirements of cloud-based resources as well as how you can best position your agency for that transition. Download and read the SANS white paper now to learn more.
Posted: 06 Sep 2024 | Published: 06 Sep 2024

TOPICS:  .NET
Cisco

How Endpoint Privilege Management Fulfills Federal Mandates
sponsored by Merlin International
WHITE PAPER: Endpoint privilege management is crucial for federal agencies to fulfill security mandates and defend against sophisticated cyberattacks. This whitepaper explores how CyberArk Endpoint Privilege Manager can help agencies meet Zero Trust requirements, prevent privilege escalation, and reduce ransomware risks. Read the whitepaper to learn more.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Merlin International

E-government benchmark 2016
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 08 Feb 2021 | Published: 03 Feb 2017

TechTarget ComputerWeekly.com