Skip to main content
 

government

Results 451 - 475 of 501Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Jul 14, 2015
Case studies of organized crime rings defrauding federal subsidy programs.
Tags : 
fraud, detection, prevention, cost savings, efficiency, state/local/municipal, federal
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
From midsize companies and government organizations to global banks and professional sports teams, all types of organizations are using data visualization to help make sense of their data and to comprehend information quickly. Keep reading to learn how six organizations of all types and sizes are using data visualization to improve customer relationships, fight fraud and more.
Tags : 
data visualization, data, technology, fraud, security
    
SAS
Published By: SAS     Published Date: Apr 20, 2017
Hype and hope — Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) — the network of people, data, things and processes that is increasingly linked through automated connections and sensors — and the future of Big Data can seem quite daunting.
Tags : 
    
SAS
Published By: CSC     Published Date: Oct 18, 2010
The CSC Security Stack white paper lifts the fog of complexity with regards to the cybersecurity challenges businesses and governments face.
Tags : 
cybersecurity, security, information technology
    
CSC
Published By: Red Hat     Published Date: Jan 21, 2011
Gunnar Hellekson - Chief Technology Strategist, US Public Sector, Red Hat The government was an early advocate of open source and Red Hat. Red Hat is now ubiquitous, in every state, every branch of the Department Of Defense, and in every cabinet-level agency. After ten years, we no longer hear about security or whether open source is ready for the enterprise. So what's next? How is Red Hat driving the next wave of innovation in government?
Tags : 
red hat virtual tradeshow, live event, us government, public sector, department of defense
    
Red Hat
Published By: ESET, LLC.     Published Date: May 16, 2011
Just recently a very stereotypical 419 was put together, using the Libyan crisis as bait and "government funds" as hook. Yep, every time a dictator is deposed or dies, someone seizes the opportunity to offer his fortune. Read this report for details.
Tags : 
eset, global threat report, april 2011, 419, scam, cybercrime
    
ESET, LLC.
Published By: ACT-IAC     Published Date: Feb 03, 2011
Comments by the American Council for Technology-Industry Advisory Council represented in Office of Management and Budget memorandum
Tags : 
federal it, technology, communications, acquisition, government, omb
    
ACT-IAC
Published By: Time Warner Cable     Published Date: Apr 11, 2011
Time Warner Cable Business Class' cable broadband, teleworking services, and fiber-based solutions offer government agencies the communications options they need to enable resilient COOP.
Tags : 
time warner cable, business class, business continuity, cable broadband, teleworking, coop planning
    
Time Warner Cable
Published By: Bloomberg     Published Date: Dec 28, 2011
No other source puts so much data in one place, allowing you to be more efficient and effective in your job. Once you've experienced BGOV, you'll wonder how you ever worked without it.
Tags : 
bloomberg government insider, bgov, demo, free trial, policy analysis, data breakdowns, editorial expertise, news aggregator, policy research, government contract database, congressional staff database, state/local/municipal, federal
    
Bloomberg
Published By: IBM     Published Date: Jul 24, 2012
Detect and prevent fraud by finding subtle patterns and associations in your data. IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance more efficiently and by focusing investigations on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, business, healthcare, taxes, government, ibm, spss, finance
    
IBM
Published By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
Download this rich media whitepaper to learn how and to hear from up to 3 customer references, IDC analysts and access additional reference articles on HP's converged infrastructure and more.
Tags : 
strategy guide, converged government, intel, data management
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier - mainly about application modernization in government.
Tags : 
application modernization, modernization, government
    
HP and Intel® Xeon® processors
Published By: Oracle     Published Date: Sep 11, 2012
This paper explores ways for government to provide Citizens access before or after hours and conduct government business--much as they can log on to their computers whenever they want to buy from Amazon.com.
Tags : 
it marketing, customer service, oracle, web experiences
    
Oracle
Published By: FireEye     Published Date: Sep 11, 2012
Cyber Attacks on Government: How to Stop the APT Attacks that are Compromising Federal Agencies.
Tags : 
cyber attacks, apt attacks, federal, compromising
    
FireEye
Published By: Workday     Published Date: Mar 02, 2018
An updated IT department for your government agency is becoming more accessible thanks to outside-the-box thinking, partnerships, and strategies. By focusing on the nine priorities in this guide, you can keep your government agency on the cutting edge of technology. View case studies, exclusive CIO interviews, and key tips.
Tags : 
updated it department, government agency, priorities
    
Workday
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
Learn how government and educational institutions are reducing their need for upfront storage capacity and making more efficient use of resources by eliminating stranded storage capacity using autonomic management and more.
Tags : 
strategy guide, public institutions, hp intel
    
Sponsored by HP and Intel® Xeon® processors
Published By: Dell SecureWorks     Published Date: May 28, 2013
Advanced Persistent Threats (APT) are a serious concern in today’s threat landscape. They represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government suppliers, thereby threatening the victim country’s national mission.
Tags : 
    
Dell SecureWorks
Published By: IBM     Published Date: Sep 30, 2013
IBM conducted more than 1,700 in-depth, face-to-face interviews with CEOs, general managers and senior public sector leaders from around the globe. Our newest CEO Study, the largest of its type ever undertaken, is the latest in the IBM C-suite Study Series. It explores how CEOs are responding to the complexity of increasingly interconnected organizations, markets, societies and governments – what we call the connected economy. Three themes emerged. Today's CEOs must: - Empower employees through values - Engage customers as individuals - Amplify innovation with partnerships Register now to access the insights that can help you lead more effectively through impactful connections with your employees, customers and partners.
Tags : 
global chief executive officer, leadership, technology, connectedness, customer insights, connections, ceos, business strategy
    
IBM
Published By: IBM     Published Date: Nov 05, 2013
Providing a superior experience for citizens and constituents is not easy, and gone are the days when problematic customer interactions can be smoothed over by empathetic service representatives. In an omni-channel world, the number of citizen touchpoints is not only increasing, but is increasingly automated, and governments will not get many chances to take the steps that are required to make things right. Unlike at any other time in history, the quality of your operations will shine through, in virtually every interaction with the citizen. A Smarter Process approach helps you to reinvent business operations in the era of the citizen.
Tags : 
government, smarter process approach, agility, business process management, bpm, cities, efficient government, state/local/municipal, federal
    
IBM
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Cisco     Published Date: Dec 04, 2015
Gartner defines contact center infrastructure (CCI) as the products (equipment, software and services) needed to operate call centers for telephony support and contact centers for multichannel support. This type of infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, gartner, magic quadrant, contact center, infrastructure, telephony support
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
Infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, magic quadrant, contact center infrastructure, worldwide, support center
    
Cisco
Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global
Published By: FireEye     Published Date: Feb 28, 2014
This whitepaper further educates you on the new security challenges for state and local governments.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet
    
Intel Security
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.