secure software

February 5, 2018
Posted by Kimberly Underwood
The military wants smaller, lighter and ruggedized servers, routers and other equipment that contain cybersecurity measures in order to take their networks into battle. Here, soldiers are taking a look at the PacStar Tactical Fidelis Cybersecurity System. Photo Credit: Pacific Star Communications.

As the military, including the U.S. Army, works to update network command systems, size, weight, power and capability improvements are central, especially when paired with cybersecurity protections. The network improvements provide key flexibility and operations for tactical missions and command posts.

January 22, 2018
 

X Technologies Incorporated, San Antonio, Texas, was awarded a competitive, hybrid firm-fixed-price and cost-plus-fixed-fee contract for system engineering and technical support services necessary to strengthen the security postures and technical capability for the Department of Defense public key infrastructure (PKI) and common service provider. The core services will provide for the review of system engineering documentation and development of software to support PKI. The face value of the contract is $7,655,049 funded by fiscal year 2018 defense working capital funds, while the total value of the contract is $38,320,674. Performance will be at facilities in Maryland. Proposals were solicited via the Federal Business Opportunities webs

January 18, 2017
By Sandra Jontz
Warfighter Information Network-Tactical (WIN-T) equipment is pictured in preparation for the Army's Network Integration Evaluation 12.1 in November 2011.

A communications network management software solution deployed last year across the U.S. Army has proven to drastically reduce network downtime as soldiers operate in an increasingly complex command post environment.

Army and civilian communicators and network specialists, untrained on PacStar’s IQ-Core Software, configured and managed complex networking equipment up to 10 times faster than comparable manual methods and with nine times fewer errors, according to an independent research firm’s report released today.

May 13, 2011
By Beverly T. Schaeffer

With the thousands of applications running on U.S. Defense Department networks, programmers have literally been dream weavers, pulling together the pieces necessary to make these systems fully functional. Hundreds of contracting organizations are tied up in these networks, making it a monumental challenge to pool all resources into an efficient, future "whole." But as with any evolution, it cannot take place overnight. In his second installment in a series of articles covering defense information technology, Paul A.