Infrastructure: A Matter of Choice

Should your agency deploy a commercial or government-owned network? Should employees bring their own devices or should you supply devices to them? Our latest Special Report evaluates these questions along with other critical infrastructure choices that government leaders face. Inside you will find a framework that helps leaders make these difficult decisions, insights from your peers that have already chosen a path and in-depth research from the field that will help your agency get the most out of its current and future IT infrastructure investments.


Economics of Software-defined Storage

This IDC white paper examines the economics of deploying Red Hat Gluster Storage and Red Hat Ceph Storage. Red Hat is ushering in a new era of software-defined storage solutions. Such solutions leverage commodity x86-based hardware from server vendors and a distributed shared nothing architecture that allows businesses to build out a service-based storage infrastructure in an economically feasible manner.

OpenStack Storage for Dummies

This book consists of three short chapters. Chapter 1 covers the basics of OpenStack and Ceph storage concepts and architectures. Chapter 2 describes OpenStack/Ceph real-world use cases and configuration best practices, and Chapter 3 explains why Red Hat Ceph Storage is the best solution to deploy Ceph in your enterprise.

50 Shades of Dark: Threat Intelligence Reveals Secrets

There is a lot of talk about the dark web these days, not least about how cybercriminals use it to spread malware, leak intellectual property, and publish user account credentials.

Aim Small, Miss Small: Producing a World-Class Threat Intelligence Capability

This paper focuses on critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.

Understand Your Attacker: A Practical Guide to Identifying TTPs With Threat Intelligence

This paper will detail the value proposition of identifying attacker TTPs and understanding information source types so that organizations can improve collection strategies, analyze the resulting information, and turn it into a workflow for relevant and timely intelligence reporting.

Effective Ransomware Responses

Download this paper to learn about ransomware and how to successfully combat it.

Advanced Security for Cloud-Based Email Services

This paper shows how you can reap the benefits of the cloud-based email solutions such as Microsoft Office 365 without forfeiting security. It discusses how FireEye helps reduce attacks to email-borne security risks while preserving the benefits of cloud-based email services

SQL Server 2016: The Best Choice for the Government Enterprise

Download this paper to learn how organizations can keep operations efficient, responsive and secure by upgrading to SQL Server 2016.

Transforming Government with a Plan that's Secure, Sustainable and Streamlined

Download this paper to learn about three foundational layers of digital transformation - security, sustainability, and streamlined operations - and how government agencies can improve their workflow and processes to enable a more seamless transformation effort.

Mobile Security: The 6 Questions Modern Organizations Are Asking

How secure is your mobile workforce? Read the Lookout whitepaper to learn what six questions you need to be asking to make sure your enterprise is safe and secure.