Environment Protection Agency Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

ecuring Civilian Agencies Next-Gen SIEM for Enhanced Protection
sponsored by CrowdStrike
WEBCAST: Civilian organizations are increasingly being exposed to advanced threats. In this webcast, experts from CrowdStrike break down their mission to secure civilian agencies with next-gen SIEM for enhanced protection. Watch the webcast now to learn more about Falcon Next-Gen SIEM.
Posted: 23 Oct 2024 | Premiered: Oct 23, 2024

TOPICS:  .NET
CrowdStrike

Protect Federal Agencies by Securing DevOps, Secrets and Other Non-human Identities
sponsored by Merlin International
WHITE PAPER: Securing non-human identities is crucial for federal agencies to prevent costly breaches and protect critical infrastructure. Learn how effective secrets management can enable secure DevSecOps and fulfill key cybersecurity directives. Read the full white paper.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Merlin International

CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

Sustainable environment
sponsored by Fujitsu
EBOOK: Fujitsu believes that the key to closing the sustainability gap is Sustainability Transformation through digital innovation. But what exactly does this mean? Download this e-book to find out.
Posted: 02 Feb 2024 | Published: 02 Feb 2024

TOPICS:  .NET
Fujitsu

Securing Virtualized Environments: The Imperative of Preemptive Protection
sponsored by Centripetal Networks
WHITE PAPER: Virtualized environments face unique security challenges due to vulnerabilities in VDI and virtual server technologies. This white paper explores how intelligence-powered cybersecurity can deliver preemptive protection against exploits, reducing the risk of damaging breaches during the patching window. Read the full white paper to learn more.
Posted: 11 Jun 2024 | Published: 11 Jun 2024

Centripetal Networks

Protect Kubernetes Environments with CN-Series Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: Kubernetes environments pose unique security challenges. Learn how the CN-Series firewall from Palo Alto Networks provides Layer 7 visibility and enforcement using native Kubernetes context to protect against known and unknown threats. Read the white paper to learn more.
Posted: 05 Nov 2024 | Published: 06 Nov 2024

Palo Alto Networks

Build Your Agency’s Next Breakthrough
sponsored by FCN
WHITE PAPER: Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
Posted: 18 Jul 2023 | Published: 18 Jul 2023

TOPICS:  .NET
FCN

Digital And Hybrid Event Platform In An ISO-Certified AWS Environment
sponsored by AllCloud
CASE STUDY: VOK DAMS, an international communications agency for events and live marketing, needed a way to create a platform for hosting hybrid events with both digital and in-person participants. Check out this brief case study to explore the benefits of working with AWS and AllCloud to build a foundation for your business innovation needs.
Posted: 27 Jan 2022 | Published: 27 Jan 2022

TOPICS:  .NET
AllCloud

The Secret to a Highly Resilient AWS Environment
sponsored by N2W Software Inc
EBOOK: In this e-book, you'll discover key strategies for building a highly resilient AWS environment. You'll also learn how to automate backup snapshots, protect your data, and recover with confidence. Read on now to learn more.
Posted: 27 Nov 2024 | Published: 04 Dec 2024

All resources sponsored by N2W Software Inc

The Secret to a Highly Resilient AWS Environment
sponsored by N2W Software Inc
WHITE PAPER: Discover the strategies for building a highly resilient AWS environment. Learn how to automate backup snapshots, protect your data, and recover with confidence. Read the full white paper to learn more.
Posted: 29 Nov 2024 | Published: 28 Nov 2024

All resources sponsored by N2W Software Inc

A Practical Guide to Zero Trust Implementation in Multicloud Environments
sponsored by Connections
EBOOK: Explore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.
Posted: 19 Sep 2024 | Published: 20 Sep 2024

Connections

How Endpoint Privilege Management Fulfills Federal Mandates
sponsored by Merlin International
WHITE PAPER: Endpoint privilege management is crucial for federal agencies to fulfill security mandates and defend against sophisticated cyberattacks. This whitepaper explores how CyberArk Endpoint Privilege Manager can help agencies meet Zero Trust requirements, prevent privilege escalation, and reduce ransomware risks. Read the whitepaper to learn more.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Merlin International

Embracing The Future: Leveraging AI For Federal Agencies
sponsored by FCN
WHITE PAPER: This white paper explores how federal agencies can leverage AI to drive innovation, enhance productivity, and improve citizen services. Learn about the benefits of AI, the challenges agencies face, and strategies for successful AI implementation. Discover how Dell Technologies and FCN, Inc. can guide your agency's AI journey.
Posted: 12 Nov 2024 | Published: 13 Nov 2024

FCN

Unlocking the Future of Government Operations
sponsored by FCN
PRODUCT OVERVIEW: Government agencies are adopting cloud technologies to capitalize on redundancy and failover capabilities, among other benefits. This FCN and Dell Technologies product overview examines hybrid cloud solutions built for government operations. Discover how FCN and Dell Technologies can transform your agency's cloud operations by reading on.
Posted: 12 Nov 2024 | Published: 13 Nov 2024

FCN

Arctic Wolf Protects Breadth and Depth of Club’s Vast IT Environment
sponsored by Arctic Wolf
CASE STUDY: Composing the Parramatta Leagues Club (PLC) are the Parra Leagues and the Parramatta Eels, a community club and a professional rugby league football club, respectively. So, how does the PLC secure its vast IT environment? Find out in this case study.
Posted: 22 Mar 2024 | Published: 22 Mar 2024

TOPICS:  .NET
Arctic Wolf

Secure Software Development Environments
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure software development environments are critical to prevent supply chain attacks. This solution brief outlines how Zentera's CoIP Platform can help organizations achieve NIST SP800-218 compliance while maintaining developer productivity through a zero trust architecture. Read the full solution brief to learn more.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Build and Operate Secure Containerized Environments at Scale
sponsored by Amazon Web Services
EBOOK: Learn how to build and operate secure containerized environments at scale. This eBook explores best practices for maximizing the benefits of containers while minimizing security risks. Get expert guidance on protecting your containerized applications and workloads.
Posted: 30 Oct 2024 | Published: 31 Oct 2024

Amazon Web Services

CW ANZ: Australian firms connect people in new ways
sponsored by TechTarget ComputerWeekly.com
EZINE: Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

The Evolution of Ecommerce
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: PH
Posted: 03 Feb 2022 | Published: 03 Feb 2022

LexisNexis® Risk Solutions

Put AI To Work For Human Capital And Talent Transformation For Government Agencies
sponsored by IBM
EBOOK: Human capital leaders in government are leveraging AI to enhance HR and talent transformation, focusing on enhancing government human capital processes, improving employee experience, and driving outcomes in skills development, employee communications, and process management. Read on now to learn more.
Posted: 13 Nov 2024 | Published: 13 Nov 2024

IBM

Identity Protection for the SOC
sponsored by TD Synnex
WEBCAST: For security teams, their legacy identity management solutions are no longer suited for securing today’s environments. Combining 2 distinct identity security technologies, IBM Verify Identity Protection presents an approach to identity security that is designed to meet today’s threats. Watch this webcast to learn more about the emerging solution.
Posted: 20 Aug 2024 | Premiered: Aug 21, 2024

TOPICS:  .NET
TD Synnex

Data protection 101: A comprehensive e-guide
sponsored by SkyKick
EGUIDE: Unlock a 36-page ultimate guide to data protection in this e-book, which explores how data protection differs from data privacy and data security, provides experts' thoughts on the impact of the GDPR, and presents a template for data protection policies.
Posted: 25 Nov 2024 | Published: 22 Nov 2024

SkyKick

The complex environment facing financial services
sponsored by Tanium
RESEARCH CONTENT: Today, banks and insurers sell through digital channels while their customers interact digitally as well. As a result, financial services companies are the target of frequent and severe cyberattacks. In this report, learn about the scope and scale of the threat landscape and what this sector can do to gain visibility into their IT environments.
Posted: 09 Aug 2023 | Published: 09 Aug 2023

TOPICS:  .NET
Tanium

Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK: The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024

TOPICS:  .NET
Saviynt

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com