Federal Insights

Security On The Edge: How Is Your Agency Protecting Data at the Edge?

by walkerj ‎03-21-2017 08:47 AM - edited ‎03-21-2017 09:58 AM (4,748 Views)

It’s no surprise that the Internet of Things (IoT) is expanding. IHS predicts that the number of IoT-connected devices will grow to 75.4 billion in 2025. While greater connectivity increases innovation and operational flexibility, these devices raise concerns about network security.

 

In January 2017, the Government Business Council (GBC) surveyed 442 federal employees about the state of their network security and what their agencies are doing to secure the data at the edge. Sixty percent of respondents cited security as the most important performance feature when it comes to the devices and sensors their agency uses to transmit data, ranking above stability, speed and accuracy. Further, 89 percent of those surveyed felt it was very or extremely important that devices operating on the edge, such as IoT-connected devices, were secure from malicious attackers.

 

Despite this agreement, 58 percent of respondents are only somewhat, not very or not at all confident about the security of edge devices. The most commonly cited tactic for securing the edge is also one of the easiest approaches for hackers to work around: stringent password requirements. What is causing these security gaps? Insufficient funding, slow procurement and lack of technical expertise were highlighted as top challenges. However, agencies can take steps to protect their networks from the edge to the core.

 

Read more...

Imagine two cars are racing. The first is a Ferrari, while the second is a 1999 Ford Taurus. The comparison seems unfair, yet this is one way to view the relationship between today’s government IT environment and IT expectations. The Ferrari represents government employee and citizen expectations for security and reliable data access. The Ford Taurus represents aging government networks that cannot keep pace with a wide variety of emerging security threats. In the current vehicles, it’s an impossible race to win.

 

However, this scenario doesn’t need to be the case. Machine learning in the network can help detect and negate attacks. Similar to the idea of automatically upgrading the engine in the Ford Taurus, weaving real-time intelligence via machine learning into the network infrastructure can help keep pace with emerging threats. In a world where attacks can occur at any time, the network needs agile defensive and offensive capabilities. With machine learning built into the network, a heightened level of awareness is integrated in to your environment to address zero-day threats as well as other service disruptive anomalies.

 

While many machine-learning capabilities are still being developed, this is the time for agencies to prepare. Government should take three steps to leverage machine learning for your network within the next few years.

 

Read more...

At Brocade’s Federal Forum, government and industry will come together to discuss how new, innovative technologies will change the way the federal government serves citizens and warfighters through network modernization and the concept of the New IP. Many of the conversations at Federal Forum will focus on the possibilities modernization enables, but what does this mean in action? What does the technology look like?

 

To answer these questions, keynotes, breakouts and panel sessions will be coupled with a series of demonstrations in the Technology Pavilion. The Technology Pavilion will showcase advancements in network management and data visibility and provide an interactive experience that can be tailored to fit specific interests and questions from visitors to the Pavilion. Those who attend can expect to explore various aspects of software-defined networking (SDN), network security, high-performance analytics technology and much more.

Read more...

2016 will mark the fifth year government and industry leaders have come together to discuss IT infrastructure modernization, emerging tech trends and more at the 2016 Federal Forum, presented by Brocade.

 

For those with a greater interest in the technologies impacting government, the tech track provides a deeper level of insight. The tech track complements the technology pavilion and is designed specifically for techies, covering topics like network security, software-defined networking and DevOps.

 

As we prepare to take a deeper dive into network modernization at the Forum, here’s a preview of three key conversations that will frame the technical track.

 

Read more...

Government networks now face a multitude of users demanding access to massive amounts of data, but they’re losing steam trying to keep up.

 

The legacy frameworks propelling them forward aren’t getting any more capable, either. But through a revolutionary networking practice called the New IP, limited and wasteful networks can transform into open networks — and they can do it now.

Read more...

Budget Constraints, Network Performance Top Government’s List of Security Barriers

by walkerj ‎04-27-2015 08:37 AM - edited ‎04-27-2015 10:24 AM (5,093 Views)

With breaches affecting government entities from the White House to the Department of State, high profile security incidents have dominated headlines over the past year. According to a Government Accountability Office (GAO) report, the U.S. Computer Emergency Readiness Team (CERT) recognized more than 46,000 security incidents in 2013. With these issues in mind, it comes as no surprise that a recent Market Connections survey of federal IT decision makers and influencers found that only 26 percent of agencies feel their network data is fully protected. 

Read more...

What’s Missing from Government’s Security Wish List?

by Anthony Robbins ‎02-23-2015 10:06 AM - edited ‎02-24-2015 04:58 AM (5,269 Views)

There is no question that security is becoming one of government’s top IT concerns. Breaches have become so frequent that it is no longer a question of if they will occur, but when.

 

According to a GAO report, the number of security incidents at federal agencies that have involved the potential exposure of citizens’ personal information has increased from 10,400 in 2009 to more than 25,500 in 2013. As network security remains the most critical area of vulnerability prevention, government agencies are in need of next-gen solutions that don’t stifle innovation. 

Read more...

Announcements
We are excited to announce that the vADC, vRouter, vEPC and SDN Controller Acquisitions from Brocade are complete!
Download FREE NVMe eBook
Gen6 Downloads and Videos
Labels