Federal Insights

Making Wireless Access and BYOD a Reality at your Agency

by ccollura on ‎01-11-2017 05:42 AM (2,971 Views)

Mobile devices have become ubiquitous in our society. According to the Digital Government Strategy group, more Americans access the internet from mobile devices than from desktop computers. These devices increase productivity in citizens’ personal lives and offer agencies the opportunity to more efficiently deliver services and meet mission objectives.

Read more...

Imagine two cars are racing. The first is a Ferrari, while the second is a 1999 Ford Taurus. The comparison seems unfair, yet this is one way to view the relationship between today’s government IT environment and IT expectations. The Ferrari represents government employee and citizen expectations for security and reliable data access. The Ford Taurus represents aging government networks that cannot keep pace with a wide variety of emerging security threats. In the current vehicles, it’s an impossible race to win.

 

However, this scenario doesn’t need to be the case. Machine learning in the network can help detect and negate attacks. Similar to the idea of automatically upgrading the engine in the Ford Taurus, weaving real-time intelligence via machine learning into the network infrastructure can help keep pace with emerging threats. In a world where attacks can occur at any time, the network needs agile defensive and offensive capabilities. With machine learning built into the network, a heightened level of awareness is integrated in to your environment to address zero-day threats as well as other service disruptive anomalies.

 

While many machine-learning capabilities are still being developed, this is the time for agencies to prepare. Government should take three steps to leverage machine learning for your network within the next few years.

 

Read more...

Security Services Abstraction via Software Defined Paradigm

by walkerj ‎02-08-2016 08:31 AM - edited ‎02-08-2016 10:29 AM (4,127 Views)

The recent explosion of connected devices, big data and cloud computing has led to revolutionary changes in our use of technology. While these innovative technologies have unleashed unparalleled possibilities for government agencies, they have also seriously threatened network security. Every new piece of technology added to the network – from sensors, to laptops, to cloud datacenters, to mobile phones – is a new endpoint that has the potential to be compromised.

 

 

Read more...

What’s Missing from Government’s Security Wish List?

by Anthony Robbins ‎02-23-2015 10:06 AM - edited ‎02-24-2015 04:58 AM (4,905 Views)

There is no question that security is becoming one of government’s top IT concerns. Breaches have become so frequent that it is no longer a question of if they will occur, but when.

 

According to a GAO report, the number of security incidents at federal agencies that have involved the potential exposure of citizens’ personal information has increased from 10,400 in 2009 to more than 25,500 in 2013. As network security remains the most critical area of vulnerability prevention, government agencies are in need of next-gen solutions that don’t stifle innovation. 

Read more...

The time to focus on data center modernization results and performance instead of vanity metrics is now. How is your agency addressing consolidation and modernization goals?

Read more...

Announcements
Download FREE NVMe eBook
Gen6 Downloads and Videos
Labels