Govtech.com

2014 Government Internet Security Threat Report, Volume 19

The Government Internet Security Threat Report provides an overview and analysis of the year’s global threat activity. The report is based on data from Symantec’sTM Global Intelligence Network, which Symantec analysts use to identify, analyze, and provide commentary on emerging trends in the threat landscape.

Symantec has the most comprehensive source of threat data in the world through the Global Intelligence Network which contains 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in more than 157 countries through a combination of enterprise and consumer products and services as well as outside data. Security analysts use big data aggregation and correlation to determine threat activity, deliver comprehensive security protection, and recommend countermeasures.


Managed PKI for Strong Authentication and Remote Access

Learn how the Entrust Mobile Smart Credential solution and managed Public Key Infrastructure (PKI) technology helped this government agency, which employs over 100,000 people and delivers more than $140 billion in public services annually, replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.

Transform your Business with Mobile Authentication

Leave outdated traditional two factor authentication in the past. Mobile authentication transforms a smartphone into a mobile smart credential. Now it's possible for users to securely identify themselves by simply clicking 'ok' on their device, eliminating the hassle of a traditional hard token or physical cards.

Why All-Flash Storage is the Next Step for Government Data Centers

Government data is rapidly increasing, but agencies can't just build more data centers to house this data. For a more effective and efficient solution, government leaders can turn to all-flash storage. Read this Q&A with Pure Storage State and Local Government Director Melanie Stevens to learn more.

The Value of Smarter Public Safety & Security

By developing key competencies, agencies can create a safe, more desirable environment for citizens. Smarter public safety capabilities include: access to relevant data, integrated and trusted information, operational insight, proactive planning, unified threat assessment and response.

Frost & Sullivan: Smart City as a Service

Read this report from Frost & Sullivan to learn how forward-looking organizations are realizing powerful analytic capabilities without committing to large capital expenditures, by obtaining analytics as a cloud-delivered service.

Optimizing the Hybrid Cloud for State and Local Government

Government is increasingly migrating to the hybrid cloud - 41 percent of surveyed leaders said hybrid was the best choice for their agency. Hybrid combines the best of the private and public cloud options, but it still has its challenges. Governments must be strategic in order to reap the biggest rewards from hybrid cloud. Read this issue brief to find out how.

Achieve a Smarter Technology Portfolio

Are you struggling to determine which technology projects and objectives best align with your agency's strategic plan? Learn how to develop your resource and budget allocation scenarios to achieve a more intelligent portfolio.

Optimizing the Hybrid Cloud

Government leaders are increasingly drawn to the hybrid cloud. It combines the best of both private and public clouds, enabling public sector agencies to reap maximum cost efficiency, scalability and flexibility. But hybrid cloud does have a few hurdles to overcome. Check out this infographic to see how best to address these challenges and optimize the hybrid cloud.

E-Signatures for Government Contracting

Government has achieved impressive examples of savings and efficiencies by going digital with e-contracting processes. However, many procurement processes are still executed on paper. All levels of government need to be able to exchange, negotiate and sign contracts without the costs and inefficiencies of paper. This eBook explains how.

GovTech Social Webcast: Content Moderation Guide

Content moderation is one of the most difficult aspects of managing public sector social media accounts. It's vital to have a process that enables you to properly respond to controversial content to mitigate any potential liability. This content moderation guide provides three tactics to effectively moderate content and an easy-to-adopt moderation framework created by Wake County, NC.
Pull up to display more papers!