Govtech.com

2014 Government Internet Security Threat Report, Volume 19

The Government Internet Security Threat Report provides an overview and analysis of the year’s global threat activity. The report is based on data from Symantec’sTM Global Intelligence Network, which Symantec analysts use to identify, analyze, and provide commentary on emerging trends in the threat landscape.

Symantec has the most comprehensive source of threat data in the world through the Global Intelligence Network which contains 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in more than 157 countries through a combination of enterprise and consumer products and services as well as outside data. Security analysts use big data aggregation and correlation to determine threat activity, deliver comprehensive security protection, and recommend countermeasures.


Breaking the Attack Lifecycle: A Guide by HP

Government faces a constant barrage of cyber attacks. This report provides insight into the cost of cybercrime, the cyber marketplace, and how you can break the attack lifecycle and better secure your agency.

HP Security Research Cyber Risk Report 2015

With the 2015 Cyber Risk Report, HP's leading team of researchers and analysts give you deep insight into the cyber vulnerabilities facing your agency and recommendations to keep your network and data secure.

Leveraging End-User Computing to Improve Government Services

Read this issue brief to find out how virtualization, enterprise mobility management and cloud computing can help state and local governments increase productivity, efficiency and security across the enterprise.

Optimizing Government with Data-Driven Citizen Engagement

The bar has been raised and citizens are expecting better experiences and higher levels of engagement from government agencies, as illustrated in this paper.

Big Data Integration and Analytics for Cyber Security

Download this Cyber Security eBook to learn why Big Data analytics, along with advanced network security, are important components to mitigating cyber attacks.

GovTech Social Webcast: Social Media Verification & Archiving Tips

Verifying social media accounts and maintaining the associated digital records has become increasingly important for agencies across the country. This GovTech Social Webcast guide provides tips for your agency to consider for using social media in the public sector.

How Virtual SANs Help Governments Overcome Common Challenges

Are you short on budget but find your storage demands are growing? You aren't alone. Read this issue brief to find out how virtual storage area networks (SANs) can bring efficiencies and scalability to government, and are the first step in creating a software-defined data center.

Definitive Guide to Data Centers

State and local governments strive for efficiencies, reliability and cost savings at every corner - especially when it comes to data centers. Leading-edge technologies, business models and data center platforms are breathing new life into public sector data centers. While the conventional dedicated data center is still the dominate platform of choice in the public sector, it is no longer the only option. The most recent Center for D

Taking infrastructure asset management to the next level

In today's economic climate, municipal and regional governments are under more pressure than ever to deliver first-rate services while effectively maintaining and managing the critical, increasingly complex asset infrastructures that urban environments require.

How the Internet of Everything Can Unlock New Possibilities for Cities Across the Globe

With contributions from leading public sector innovators from across the country, this crowdsourced white paper explores how the Internet of Everything (IoE) is currently at work in communities today and peeks around the corner to see the new possibilities the IoE might unlock in the future. It also discusses the challenges - and potential solutions - city leaders might encounter as they move forward with IoE implementations.
Pull up to display more papers!