Skip to main content
 

government

Results 126 - 150 of 520Sort Results By: Published Date | Title | Company Name
Published By: Deltek - Nethawk     Published Date: Mar 05, 2013
Doing business with the government is vastly different from working in the commercial sector, this 30- minute webcast recording spells out these differences in detail.
Tags : 
government contracting, government contractors, cloud, how to, technology
    
Deltek - Nethawk
Published By: Deltek - Nethawk     Published Date: Mar 05, 2013
This 30- minute webcast recording reviews the basics of project management and reporting for government contractors. Based on content from the Deltek Special Edition Government Contracting for Dummies e-book.
Tags : 
project management, government contractors, reporting, spending, budget management, project execution, technology
    
Deltek - Nethawk
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
Why it’s more important than ever before. Today, wider varieties of contract types, larger numbers of stakeholders, and increased government regulatory requirements are all driving the demands of the global economy and making contract management even more crucial and complex.
Tags : 
    
Determine (Selectica)
Published By: Dice     Published Date: Jul 06, 2015
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector. These results are a must-read for government officials who want to stay up-to-date with developing trends in recruiting.
Tags : 
    
Dice
Published By: Dice     Published Date: Feb 12, 2016
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector. These results are a must-read for government officials who want to stay up-to-date with developing trends in recruiting.
Tags : 
    
Dice
Published By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
Diligent
Published By: DocuSign     Published Date: Jun 25, 2014
Governments today are under constant pressure to provide effective support and services to their citizen with limited resources, budgets and antiquated systems. Furthermore citizens expect transparency and accountability from their government. With the rise of digital innovations, those expectations have only continued to grow.
Tags : 
docusign, electronic signatures, reduce costs, esignatures, contract execution
    
DocuSign
Published By: DocuSign     Published Date: Mar 23, 2016
Complicated state governments have challenges with operations. Learn how North Carolina adopted DocuSign to cut costs, reduced document error, accelerated document approval time by 80% and were better able to provide more time serving citizens.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
Moreover, more than half of Fortune 500 pharmaceutical and medical device companies are operating under corporate integrity agreements (CIA) with the U.S. government to mitigate the risks.
Tags : 
    
DocuSign
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: e-SignLive     Published Date: Oct 11, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile tablets and smartphones as productivity tools for agents, representatives and personnel, and developing enterprise apps for these devices.
Tags : 
ipad, mobility, apple, e-signatures, esign
    
e-SignLive
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio
    
E-SignLive by Silanis
Published By: E.ON     Published Date: Nov 21, 2018
The government has made it clear that it sees electric vehicles as the main way of reducing carbon emissions from road transport and improving air quality. The Road to Zero strategy states that the UK government wants 'one of the best electric vehicle infrastructure networks in the world' and unveiled targets for at least fifty per cent of new car sales to be ultra low emission by 2030, and forty per cent of new vans. See how E.ON can help your business get ahead of the game by downloading this whitepaper today!
Tags : 
    
E.ON
Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Entrust Datacard     Published Date: Oct 24, 2016
All of these elements of growing connectivity have the potential to significantly increase productivity, streamline operations and enhance service levels to citizens and stakeholders. But these benefits are only one side of the story. The added complexity of the new eGovernment environment also creates many new challenges, as government agencies search for effective ways to secure and control access to the rapidly growing number and variety of gateways to their ecosystems.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
    
Entrust Datacard
Published By: Equinix APAC     Published Date: Feb 25, 2019
The Edge Completes the Cloud Edge computing delivers the decentralized complement to today’s hyperscale cloud and legacy data centers. To maximize application potential and user experience, enterprise architects and technology innovation leaders need to plan distributed computing solutions. Enabling this thinking is that although the cloud is becoming mainstream, that does not imply that all workloads will be placed in the cloud during the next decade or so. Technical incompatibilities, decades of embedded business logic in mainframe applications, government regulations and simple economics all conspire to keep some workloads out of the cloud, driving us toward a hybrid multi cloud future.
Tags : 
    
Equinix APAC
Published By: ESET, LLC.     Published Date: May 16, 2011
Just recently a very stereotypical 419 was put together, using the Libyan crisis as bait and "government funds" as hook. Yep, every time a dictator is deposed or dies, someone seizes the opportunity to offer his fortune. Read this report for details.
Tags : 
eset, global threat report, april 2011, 419, scam, cybercrime
    
ESET, LLC.
Published By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
    
Exabeam
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
DDoS attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks that took down Donald Trump’s campaign website and Brazilian government sites during the Olympics. But while volumetric attacks still reign supreme, there are other, more insidious, low-level DoS attacks that can also damage your site, your applications, and your business. If you think you’re ready for a DDoS attack—or that you don’t need to worry about one—make sure you’re not buying into some of these popular myths.
Tags : 
    
F5 Networks Inc
Published By: Factiva     Published Date: Dec 01, 2015
When compliance managers think about the good old days, they do not have to look back too far. In fact, prior to 2008, the world was a much simpler place: the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) published a list of sanctioned companies and individuals, and as long as their company was not doing business with any person on that list, they seemed to be in good shape. This was definitely not an easy task. However, after 2008, it became more complicated when OFAC guidance stated that an ownership interest of 50% or more by a sanctioned subject was blocked or otherwise limited.
Tags : 
compliance, ofac, sanction, finance
    
Factiva
Published By: FICO     Published Date: May 11, 2017
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : 
customer experience, credit, credit policies, finance
    
FICO
Published By: FICO EMEA     Published Date: Jan 25, 2019
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.