Federal cloud & data center summit whitepaper

August 24, 2018

The most recent installment of the Federal Cloud & Data Center Summit, held on June 13,
2018, included five MITRE-ATARC (Advanced Technology Academic Research Center) Collaboration
Sessions. These collaboration sessions allowed industry, academic, government, and
MITRE representatives the opportunity to collaborate and discuss challenges the government
faces in cloud computing and data center modernization. The goal of these sessions is to
create a forum to exchange ideas and develop recommendations to further the adoption
and advancement of cloud computing and data center management techniques and best
practices within the government.

Spotlight

Centrify Corporation

Centrify is the first and only Zero Trust leader to deliver Next-Gen Access that seamlessly converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM), and transforms security to go on the offense and stop the breach. The company's Zero Trust framework verifies every user and device and limits the amount of access to apps and infrastructure.

OTHER WHITEPAPERS
news image

The Projected Total Economic Impact™ Of IBM Cloud Pak For Data

whitePaper | May 24, 2022

Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester’s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges.

Read More
news image

Citrix Cloud Services Data Protection Overview

whitePaper | September 29, 2022

Citrix understands that data protection is one of the top priorities for our customers when selecting a cloud service. Data protection is also a rapidly-evolving domain and requires enterprises to assess more information over time about the data handling practices of their vendors.

Read More
news image

4 Best Practices for Using the Cloud to Manage Security

whitePaper | May 4, 2023

Next-generation firewalls (NGFWs) secure both on-premises and cloud-based computing infrastructures and are a critical part of a well-designed, defense-in-depth, security architecture. Security professionals depend on NGFWs for visibility, enforcement of security and compliance policies, and to protect their IT infrastructure. Whether your company is large or small, it is important to have tools to easily manage and maintain your firewalls as well as other security devices you may employ.

Read More
news image

An Overview of the AWS Cloud Adoption Framework

whitePaper | May 12, 2022

In 2006, Amazon Web Services (AWS) began offering IT infrastructure services to businesses in the form of web services now commonly known as cloud computing. One of the key benefits of cloud computing is the opportunity to replace up-front capital infrastructure expenses with low variable costs that scale with your business. With the cloud, businesses no longer need to plan for and procure servers and other IT infrastructure weeks or months in advance. Instead, they can instantly spin up hundreds or thousands of servers in minutes and deliver results faster. Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world.

Read More
news image

Five Emerging Use Cases for Cloud Integration

whitePaper | February 15, 2023

The popularity of integration platform as a service (iPaaS) started with business users wanting to gain control and share data among their increasing number of SaaS apps without relying on IT. iPaaS is now being adopted by IT to support business users to ensure security is being maintained and to provide more of a self-service environment.

Read More
news image

Security and Privacy White Paper Poly Lens Cloud Service, Lens Desktop App, And Lens Mobile App

whitePaper | September 29, 2022

This white paper addresses security and privacy related information for the Poly Lens cloud service as well as Lens Desktop app and Lens Mobile app. This paper also describes the security features and access controls in Poly’s processing of personally identifiable information or personal data (“personal data”) and customer data in connection with the provisioning and delivery of the Poly Lens service and related apps, and the location and transfers of personal and other customer data. Poly will use such data in a manner consistent with the Poly Privacy Policy, and this white paper which may be updated from time to time. This white paper is supplemental to the Poly Privacy Policy. The most current version of this white paper will be available on Poly’s website. You may also subscribe to receive notifications when this paper is updated from the website.

Read More

Spotlight

Centrify Corporation

Centrify is the first and only Zero Trust leader to deliver Next-Gen Access that seamlessly converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM), and transforms security to go on the offense and stop the breach. The company's Zero Trust framework verifies every user and device and limits the amount of access to apps and infrastructure.

Events