Sponsored

Policy Guide – Understanding the Cyber Threat by AT&T

The time for action on cybersecurity is now. If there’s a common thread running through the interviews, it’s that lawmakers and senior government leaders must engage more deeply on cybersecurity.
Read More

Executive Summary - What Legislators Need To Know About Cybersecurity by AT&T

To be effective, Cybersecurity needs statewide executive support. Elected and appointed officials should have a key role in this process by better understanding cyber threats, supporting agency leaders, educating citizens and championing funding for state CIOs and CISOs.
Read More

Infographic – What Legislators Need To Know About Cybersecurity by AT&T

Cybersecurity is not just an IT problem. To be effective, it needs statewide executive support. Elected and appointed officials should have a key role in this process by better understanding cyber threats, supporting agency leaders, educating citizens and championing funding for state CIOs and CISOs.
Read More

Announcement: ENS-Inc Launches New Enterprise Security and Service Management Division with Athol Smith at the helm.

Enterprise Networking Solutions, Inc. (ENS-Inc) continues 2017 with the addition of an exciting new practice with former Warrigal CEO, Athol Smith.
Read More

Case Study: WebFOCUS, by Information Builders, Improves Visibility Into Crime Statistics for Michigan State Police

State law enforcement agencies like the Michigan State Police Department (MSPD) need to leverage vital criminal justice data from various agencies statewide in order to meet priorities, objectives, and information needs.
Read More

Announcement: ENS-Inc expands Sales Team

Enterprise Networking Solutions, Inc. (ENS-Inc) has started 2017 with the addition of key new hires to its Sales Team, including Katrina Roxas, Marlon Clemmons and Jasmine Hodges as Inside Account Executives, and Capri Paintal as an Account Executive for ENS-Inc’s Commercial Business.
Read More

White Paper: Gaining End-to-End Visibility: Better IT Operations through Operational Intelligence from GovLoop and Splunk

The importance of meeting the needs and citizen demands for government is at an all-time high. While efforts to meet the demands of today’s environment are a priority, it has introduced significant challenges into the IT operations of the public sector.
Read More

Announcement: Palo Alto Networks Now a Five-Time Gartner Magic Quadrant Leader!

Gartner’s 2016 Magic Quadrant for Enterprise Network Firewalls has been released, and Palo Alto Networks is proud to be positioned in the Leaders quadrant for the fifth straight year. We’re thrilled that Gartner researchers continue to highlight both our ability to execute and the completeness of our vision. Once again, we are one of only two vendors distinguished as Leaders in this space.
Read More

Case Study: Government Procurement Transformation: How to Create a Practical Strategy for Success by KPMG

Where does all the money go? State and local government agencies have been asking this age-old question for years. The key to understanding the best way to manage this process comes from a modern and practical procurement process.
Read More

White Paper: The Definitive Guide to Security Intelligence and Analytics from LogRhythm

Advanced threats are methodically evading enterprise security controls and causing major data breaches. These threats may target any organization, so no company is immune.
Read More

Announcement: HPE to Acquire SimpliVity and Expand Leadership in Growing Hybrid IT Industry

PALO ALTO, California, January 17, 2017 – Hewlett Packard Enterprise (NYSE: HPE) today announced a definitive agreement to acquire SimpliVity, a leading provider of software-defined, hyperconverged infrastructure, for $650 million in cash.
Read More

White Paper: Rethink Data Modeling By Marklogic

Traditional data modeling is inadequate. Today, organizations are constrained by relational technology and they need a better approach to data modeling in order to integrate data faster and build smarter applications. For that reason, organizations are now choosing a multi-model approach using NoSQL and semantics.
Read More

Case Study: Citrix Helps Public Safety Quickly Respond to Citizens in Need

Balancing speed and security is a tough challenge for public safety and criminal justice organizations. Further complicating the balancing act, public safety and criminal justice organizations are tasked with diverse responsibilities.
Read More

Announcement: Former ENS-Inc Account Executive, Zach Oxman, Joins AppDynamics

Zach Oxman recently joined AppDynamics, an Application Intelligence company, providing business and operational insights into application performance, user experience and business impact of software applications.
Read More

White Paper: Data Drives the Citizen Experience from Cloudera

Cloudera Enterprise, powered by Apache Hadoop, provides public sector policy makers with a secure platform to build and analyze a complete view of constituents and relevant data to inform every decision.
Read More

Announcement: “Blue-Jeans” IT: How Direct Technology’s (Anti)revolutionary Approach is Spreading Nationwide

When Levi Strauss Co. patented blue jeans in 1873, they disrupted an industry—and continued to do so, generation after generation. How? Denim wasn’t a new fabric. Pants certainly weren’t the hot new thing. But Levis transformed the face of work and casual apparel forever by fulfilling an existing and widespread need for function, reliability, and accessibility.
Read More

Case Study: Town Of Paradise in Butte County California standardizes on Simplivity

The Town of Paradise, California replaced its legacy IT systems with SimpliVity hyperconverged infrastructure. The SimpliVity solution accelerates data backup and recovery functions while eliminating IT cost and complexity.
Read More

Announcement: Forrester Names WildFire by Palo Alto Networks a Leader in Automated Malware Analysis

Forrester tested 11 automated malware analysis providers to show how each provider helps security and risk professionals. Security solutions were ranked on how well they inspected traffic and the methods used to automatically detect malware.
Read More

Case Study: Louisiana Department of Health Creates Unified Citizen Records with Omni-Gen from Information Builders

Statewide Master Data Management project unites data to deliver better services. From Medicare to child welfare, food stamps to behavioral health, U.S. citizens in every state rely on critical services from the public sector.
Read More

White Paper: Streamline HHS Service Delivery with Citrix Solutions

Improve the health and well-being of your constituents with IT innovation. Citrix solutions provide simple, secure access to applications and information from anywhere, on any device, so your staff can smoothly manage larger workloads.
Read More

White Paper: A Proven Security Intelligence Model for Combating Cyber Threats: A Reference Model for IT Security Practitioners from Logrhythm

According to PricewaterhouseCoopers LLP, cyber security incidents have increased 66% year-over-year since 2009. These attacks and the notion that you may already be compromised indicates that CISOs must make a shift in processes and priorities toward detecting and responding to threats more quickly.
Read More

Announcement: SimpliVity Extends Leadership in Healthcare Industry with Support and Availability for Epic Hyperspace

Healthcare institutions choose SimpliVity to consolidate data centers, improve data protection, and meet regulatory compliance
Read More

Sponsored: ForeScout Shares Market Guide for IoT Security

IoT security solutions enable organizations to securely manage IoT devices, and ensure IoT endpoint and data security, and asset discovery.
Read More

Case Study: Brocade IP Fabric Design Document for the True Next Generation Data Center

Data center networking architectures have evolved with the changing requirements of the modern data center and cloud environments. The traffic patterns in data center networks are shifting rapidly from north-south to east-west
Read More

Sponsored: Palo Alto Networks Shares Prevention is Non-Negotiable

Attackers have traditionally profited by stealing identities or credit card numbers, and then selling them on underground markets. According to the Verizon Data Breach Investigations Report, the price for stolen records has fallen, so cyber attackers are on the hunt for new ways to make a profit.
Read More
Load More

Member Companies

​​