Cisco Systems Inc., San Jose, California, was awarded a single-award indefinite-delivery/indefinite-quantity contract with a ceiling of $1,180,185,116 for brand name Cisco Smart Net Total Care and Software Support Services for users across the Department of Defense. The period of performance is a one-year base period and two one-year option periods, for a total contract life cycle of three years. Proposals were solicited from the System for Award Management website (beta.SAM.gov), and three proposals were received. The Defense Information Technology Contracting Organization, Scott Air Force Base, Illinois, is the contracting activity (HC1084-21-D-0003).
COVID-19 has done more than increase hand-washing and mask-wearing. It has meant an entirely new way of communicating and collaborating. Those on the front lines say some of these changes are here to stay and will last much longer than the pandemic simply because they are more efficient ways to do business.
A security framework established by the U.S. National Institute of Standards and Technology (NIST) is serving as a template for protecting networks using a threat-centric approach. The framework establishes five core functions in sequential order, and they are applicable across all network sectors.
The five core functions are Identify, Protect, Detect, Respond and Recover. Some of them can be bundled as part of an overall cybersecurity program, which is an approach already being adopted by commercial security providers.
Would you rather be stuck in an elevator for 24 hours or have your network hacked? According to a new survey, 71 percent of government information technology decision makers think the elevator is a more appealing choice. But improving security still ranks second to the most important technology goal in the coming year—reducing costs.
Lt. Gen. Ronnie Hawkins, USAF, Director of the Defense Information Systems Agency, always sees mobile through the eyes of a warfighter. “Mobility means a lot of things to a lot of different people,” he told the inaugural edition of the “AFCEA Answers” radio program (listen here). “When we look at it from the perspectives of what we do in the Joint Information Environment, we see it as one of the disruptive technologies that we’re bringing to bear.”
John Chambers, CEO of internet router manufacturer CISCO, told the DISA Customer and Industry Forum in Baltimore yesterday that "Collaboration will be the productivity tool of the next decade." Generally, its tough to anticipate what challenges and opportunities will present themselves five years from now, he continued.
Several years ago, for example, his company designed and built one of the first routers capable of handling one million telephone calls per second. In the first year, they sold only seven, with many people wondering what you would use such a device for. Five years later, he said, they had sold over 5,000.
Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought. A well thought-out defense-in-depth strategy includes multiple layers of security and different overlapping technologies.
Attendees will learn how a secure data center architecture can: