Achieving CJIS Compliance

In 2011, a new security policy for CJIS data was issued — a ”minimum set of standards” for keeping criminal justice data safe from unauthorized access. The policy is scheduled to go into full effect by September 30, 2013. To achieve compliance with the new security policy, CJIS-connected agencies must tackle three chief areas of concern: security management, availability and authentication/encryption. This solution brief helps agencies address these three areas of concern and explains how Symantec’s comprehensive set of enterprise-class technologies ensures data is protected, managed, stored and available – anytime, anywhere.

Trouble Managing Cloud Environments?

Read this paper to find out more about the brokerage model and the benefits agencies can gain from it.

IBM Counter Fraud and Improper Payments for Government

The IBM Counter Fraud Management and Improper Payments for Government solution is designed to help agencies avoid the 'pay and chase' scenario by intercepting transactions in real time that are potentially fraudulent, while detecting, identifying, and building the case against past fraudulent activity and improper payments.

IBM Counter Fraud Management for Government

The IBM solution for counter fraud and compliance in government is designed to help government agencies avoid the pay-and-chase scenario by intercepting suspicious transactions in real time while detecting, identifying and building the case against past fraudulent activity.

Getting from Data Glut to Data Glory

Many government agencies have an unstructured data nightmare, with bits and bytes scattered across servers, clouds and hypervisors. Sprawling data repositories make it difficult for government agencies to glean valuable insights from data and unchecked – and often duplicate – data is costly to manage. Read this issue brief to find out how agencies can better manage – and protect – their critical information for better decision-making.

How to Create the Next-Generation Government Portal

This white paper discusses the key challenges to offering high-quality Web services and examines proven tactics for building or upgrading a government Web portal to meet employee, citizen and business expectations for security, reliability and mobility.

Law Enforcement Social Media: To Protect and Preserve

When a controversial incident caused a surge of traffic on the Vineland Police Department’s social media pages in the spring of 2015, a spike in public information requests for the social media records followed predictably close behind. Fortunately, the officer responsible for producing the records had already replaced his time-consuming, manual retention process with automated archiving. Read this case study to find out more.

10 Pillars to Building a Winning Mobile Strategy

Mobility is increasingly blurring the lines of physical and digital interactions in our lives as consumers, employees, and citizens. The challenges of being mobile extend far beyond the device and into an evolving digital world that is reshaping how we engage with people, content, machines, and our environment. This e-book reflects recent market trends and perspectives from our client projects with the aim to help you achieve demonstrable, repeatable mobile successes.

Red Hat Mobile Application Platform for Government

Red Hat Mobile Application Platform brings together agility and centralized control for mobile innovation and a competitive edge. Formerly known as FeedHenry 3, this product offers a suite of features that embrace collaborative app development, centralized control of security and back-end integration, and a range of cloud deployments.

Q&A: A Citizen Request Tool for the 21st Century

Learn how Warren, Mich., uses QScend Technologies' QAlert citizen request management (CRM) system to decrease the amount of time it takes to respond to citizen requests, improve employee workflow, and increase transparency into operations.

Cisco Mid-Year Security Report

The Cisco 2015 Midyear Security Report examines intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015.
Pull up to display more papers!