Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

The Cyber Edge September 2020
Author: AFCEA   Send Email to POC   View Content
A Cyber Thread Runs Through Government Future Assessments.
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas.

Faster Deployments for the Electronic Battlefield
Author: Abaco   Send Email to POC   View Content
Invisible conflicts on the electronic battlefield are won or lost in tiny
fractions of a second. Adversaries are continually deploying new or modified threats. Our warfighters are at risk if they're not equipped to respond.

Monitoring & Analytics for Virtual and Veeamprotected Cloud and Physical Workloads
Author: Veeam   Send Email to POC   View Content
Today with the growth of data exploding,it's difficult to keep track of all the systems it touches, especially with data spread across virtual, physical, hybrid and public cloud environments. How do you keep track of all the systems your data resides on and transports through? How do you ensure everything is running at peak performance, and how can you remediate data issues faster?

Your Office is in the Cloud
Author: Veeam   Send Email to POC   View Content
In 2017, the White House's American Technology Council advised federal agencies to move IT operations in the direction of shared services and cloud modernization. Congress provided funds for digital transformation through the Modernizing Government Technology Act, and many agencies took advantage of the opportunity to make upgrades.

Enterprise-class Mission Control
Author: Veeam   Send Email to POC   View Content
Government agencies are accountable for properly handling sensitive data. Civil servants operate in an environment based on close oversight, prescriptive procedures and rules. As the trusted custodians of that data, they need to take careful and necessary precautions to protect it, which can slow mission progress.

A Single Solution that Delivers Unparalleled Data Availability
Author: Veeam   Send Email to POC   View Content
Availability Suite enables customers to achieve unparalleled data availability, visibility, automation and governance across data centers, at the edge and in the cloud. As modern IT organizations look to innovate faster, legacy backup and recovery infrastructure cannot support customers' forward-looking initiatives.

Complete Access, Control and Protection for Your Office 365 Data
Author: Veeam   Send Email to POC   View Content
Microsoft provides a wide array of powerful services within Office 365 but a comprehensive backup of your Office 365 data is not one of them. Veeam Backup for Microsoft Office 365 eliminates the risk of losing access and control over your Office 365 data including Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams so that your data is always protected and accessible.

Veeam Software for DoD and Federal Civilian Agencies
Author: Veeam   Send Email to POC   View Content
Veeam Availability Suite is Veeam's flagship backup solution that enables modern data protection and is simple, flexible and reliable. This comprehensive enterprise suite empowers organizations with advanced capabilities and powerful tools to effectively achieve their goals of achieving complete data protection, with high availability and reduced downtime. Businesses of all sizes, from small startups to the largest enterprises, embark on similar journeys for keeping their data protected and available, and Veeam Availability Suite is the complete tool for the job.

Seriously Powerful, Modern Data Protection
Author: Veeam   Send Email to POC   View Content
Businesses have many opportunities to improve, automate and streamline their data protection as the digital landscape continues to expand. However, with greater options, organizations face a multitude of challenges when it comes to IT and data management. Public cloud usage is rapidly increasing and IT professionals struggle with how to e-ciently migrate and manage data between environments. in addition, continued operational e-ciency and budget constraints make meeting recovery objectives in an increasingly distributed world harder than ever.

Unified Visibility Reduces MTTR and Boosts a Large Civilian Agency's Digital Journey
Author: RavenTek   Send Email to POC   View Content
Application performance directly impacts business performance. If applications are not working properly, employees cannot work properly, collaboration cannot happen, customers and citizens cannot be served efficiently, and transactions cannot be completed effectively. RavenTek's guidance has made way for the agency's stakeholders to now have unified visibility into all possible pain points with Riverbed's SteelCentral solution. They also have a better understanding of how to solve key performance issues and the agency is now armed with critical information needed to mak ...

Simplify your TDM-to-IP evolution with Nokia
Author: Nokia   Send Email to POC   View Content
With legacy TDM equipment reaching end of life and, in many cases, end of support, the U.S. Department of Defense (DoD) has been given a tight timeframe to migrate to IP-based networking technologies. As it makes that transition, it can't afford to strand existing users of legacy TDM-based applications. Responding to the need to ensure operations continuity as the DoD moves from TDM to IP, Nokia offers a field-proven TDM-to-IP evolution solution, ensuring a smooth, seamless and future-proof migration.

Nokia Opt-In - By submitting this form, you agree to r ...

Effectively Integrating Cybersecurity Into Enterprise Risk Management
Author: AFCEA   Send Email to POC   View Content
Cybersecurity is now a significant area of focus and concern for senior leaders of public and private organizations. Unfortunately, for too many organizations, cybersecurity continues to be a technically focused effort managed by the technical wizards. Instead, board of director discussions often zero in on describing the latest cyber threats, which are often unintelligible to leaders, counts of cyber attacks thwarted and recommendations for cybersecurity investments. Learn how to conduct enterprise risk management processes to benefit your organization to help all staf ...

How Faster Deployment of Transformative Capabilities are Changing the Game in Defense: Case Study on the World's Only Small Form Factor Multi-Channel Link 16 Radio
Author: ViaSat, Inc.   Send Email to POC   View Content
Read how the private sector is deploying new and non-traditional business models that are designed to rapidly deliver cutting-edge technologies ahead of the traditional government procurement model. This approach to innovation enables unprecedented warfighter operational capabilities that meet mission-critical requirements today while maintaining the flexibility to support the evolving mission demands of tomorrow.

What Defense Manufacturers Need to Know About the Cybersecurity Maturity Model Certification - Manufacturing Webinar Series
Author: Infor   Send Email to POC   View Content
All defense manufacturers know that it is of utmost priority to protect the defense supply chain from cybersecurity threats. The success of your business now depends on the cybersecurity of your supply chain, based on the recently released Cybersecurity Maturity Model Certification (CMMC) from the U.S. Department of Defense. By the end of 2020, it's expected that defense suppliers without the CMMC certification level required by an RFP will be ineligible to bid on that contract. Watch this on-demand webinar for details on the CMMC timeline, certification levels, and how ...

How Faster Deployment of Transformative Capabilities are Changing the Game in Defense: Case Study on the World�s First and Only Handheld Link 16 Radio
Author: ViaSat, Inc.   Send Email to POC   View Content
Read how the private sector is deploying new and non-traditional business models that are designed to rapidly deliver cutting-edge technologies ahead of the traditional government procurement model. This approach to innovation enables unprecedented warfighter operational capabilities that meet mission-critical requirements today while maintaining the flexibility to support the evolving mission demands of tomorrow.

Ransomware Mitigation
Author: Attivo Networks   Send Email to POC   View Content
The Attivo Networks Endpoint Detection Net (EDN) ransomware mitigation functions arm security teams with the defense they need to detect and derail both common and advanced ransomware attacks quickly.

Taking the Risk out of Software Supply Chain Management
Author: Flexera   Send Email to POC   View Content
Supply chain management is vitally important to running and maintaining an organization's IT systems. When it is carried out, in many federal agencies it's traditionally a manual process managed on spreadsheets. In recent years new directives have mandated that the Department of Defense (DOD) and civilian agencies must all begin monitoring this, especially for cybersecurity considerations within the Department's Risk Management Framework (RMF). In this editorial, Flexera Software explains how many department directors are paying more attention to life-cycle management f ...

Citizens Broadband Radio Service
Author: CommScope   Send Email to POC   View Content
The rise of high-speed wireless access redefined the mission potential of public servants in the 21st century. While many advancements can trace their origin to the convenience created by Wi-Fi services, new legislation finalized by the Federal Communications Commission (FCC) in 2018 now ensures that mobile spectrum broadband will play a major role in providing the secure coverage agencies need

U.S. Air Force Expedites Mission Capabilities Leveraging ML
Author: TAMR   Send Email to POC   View Content
The United States SEEK EAGLE Office (AFSEO) is the center of excellence responsible for managing the aircraft store compatibility process. Get an insider's look at how AFSEO leveraged ML to accelerate time to insights by automating entity resolution, record duplication, and categorization. Learn how the office is able to increase ROI and utilization of Air Force aircraft.

COVID-19 COMPELS BETTER NSEP PLANNING
Author: AFCEA   Send Email to POC   View Content
Any comprehensive National Security Emergency Preparedness (NSEP) capability in the United States has atrophied amid the increase of threats that could cause a catastrophic disaster across the country. Of key interest is whether any of the DHS/FEMA critical infrastructure Information Sharing and Analysis Centers or Information Sharing and Analysis Organizations have been utilized in the dramatic effort to address COVID-19.