AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
Developed by ViaSat and Harris, the Small Tactical Terminal (STT) KOR-24A is a two-channel radio designed to meet the needs of users who have SWaP-C constraints, but also need simultaneous access to Link 16 and either wideband waveforms or legacy communications pathways, including Very High Frequency and Ultra-High Frequency (VHF/UHF). With the STT, it is now possible to consume tactical information from a ground network and pass that information over to Link 16 and vice versa, creating seamless SA and a Common Operational Picture (COP) between air and ground forces. It ...
Author: Red Hat
IDC interviewed organizations using Red Hat® technologies and representing a variety of vertical industries. IDC asked these organizations how Red Hat Training courses improved IT operations and the ability to support business requirements and new technologies.
IDC survey results confirm that Red Hat training courses offer key benefits to companies:
- Adding just 1.5% of project budget to include training can move the project success rate from 50% to 80%.
- 389% 3-year ROI
- 71% less unplanned downtime
Read this white paper to learn how federal agencies can create a tailored technology roadmap to support their eventual migration to the cloud, as well as the benefits of modernizing IT infrastructure to ease that transition. Government organizations can begin today by consolidating applications, simplifying IT operations, driving expanded automation, and
gaining greater management control of networks to ensure more agile and trusted computing environments in the future.
Author: Peach Tech
API security issues have caught many large organizations off-guard. This white paper outlines the challenges to scaling API security along with understanding the complexity and why automated API Security during development matters.
The importance of partnerships to securing the homeland can be seen every day. One of the most widely known partnerships is the "If You See Something, Say Something™" public awareness campaign. This campaign involves federal, state, local, tribal, territorial and private-sector partners to enhance the public's awareness of suspicious activity related to terrorism and terrorism-related crime.
IT security teams within federal government agencies and their contractors face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions. Their networks and
infrastructures are prime targets for nation-states, political agitators, organized criminals, and other hackers eager for access to truly critical content, be it for espionage purposes, to cause political embarrassment, or to reap financial gain. Furth ...
This eBook will guide you through how to assess and improve your threat hunting capabilities, how to prioritize what to hunt for, and share with you proven methods to track advanced threats within massive datasets generated from large, complex networks.
FedRAMP certification provides a well-vetted selection of CSPs for all Federal Agencies to choose from and enables the individual Agencies to choose the functionality each requires. However, FedRAMP certification does not ensure data security. That remains the responsibility of the Federal Agency that owns the data and places it in the cloud.
Now more than ever, data transmissions are an increasingly prevalent part of every military mission. From Headquarters to Tactical Operations Centers to the individual warfighter, the amount of data is massive and clear distinctions between classified and unclassified data transmission methods are progressively blurred. Top Secret and Secret classifications of data are well established and the methods for transporting these data types are known. But new methods are required to protect classified data as a result of the sheer volume of data, the time sensitive nature of ...
Author: Perkins Technical Services, Inc. (PTS)
PTS supports Soldiers by providing tactical radio Expeditionary Kits (E-Kit™). PTS E-Kit™ offers the solution for expeditionary tactical communications by enabling Soldiers to install their tactical radios in a command post in under 20 minutes. PTS E-Kit™ components include tactical radio docking station, DC power supply and quick install antennas supporting the currently fielded Harris, Raytheon and SINCGARS tactical radios. E-Kit™ components are configurable based on unit needs. PTS is committed to providing reliable quality products to the Soldier.
The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure information dominance and operational agility in the battlefield, the modern Warfighter requires innovative, lightweight, purpose-built infrastructure that supports mission-critical applications with rapid deployment, high availability, linear scaling and secure operations. Deploying such enterprise-grade data center solutions to the tactical edge with minimal physical footpr ...
Hexagon US Federal's hub and spoke approach to computer-aided dispatch *(CAD) provides an alternative to a standalone independent system. This solution enables installations to share information on a common platform and create a state of interoperability between the various participating individual U.S. Army Installations' Directorates of Emergency Service (DES), regionally and Army wide. This whitepaper provides an overview of our approach, identifies some of its advantages, and provides examples of where it is successfully working today.
For most Federal Government institutions, budgets are tighter than ever. While short-staffed teams work to modernize their data centers by saving money through virtualization, the latest storage appliances and the cloud, their data volumes continue to explode and end users are demanding access to data 24.7.365. This places a heavy burden on IT, making it a challenge to meet SLAs and provide consistent availability to data and applications. Veeam® Availability Suite™ combines the award-winning data Availability and virtualization management expertise of Veeam Backup & R ...
Federal requirements for nonfederal organizations to safeguard Controlled Unclassified Information (CUI) are changing. Many of the organizations affected by these changes may underestimate the scope of the requirements and the implications associated with nonconformities. COACT has identified the requirements associated with these specific changes and described how the National Institute for Standards and Technology (NIST) Special Publication (SP) 800-171, Revision 1, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, rel ...
Every federal government agency faces serious and persistent threats from both inside and outside their digital networks. Yet mitigating risks and preventing breaches is challenging, as agencies are typically hampered by restricted budgets, legacy systems, and scarce resources.
Unisys steps into this gap with Unisys Stealth®, a software-defined security portfolio that delivers consistent, reliable security for global enterprises focused on protecting data in their data center, cloud, and mobile infrastructures. By substituting traditional hardware security techno ...
The concepts of network visibility, network monitoring, and network blind spots help you understand what is happening on your network. While some of the terms can be intimidating at first, straightforward definitions eliminate the confusion. Read this book, which is a compilation of blog posts from Ixia network visibility experts, to get a quick and clear understanding of the terminology associated with network monitoring. Over 20 terms are explained. In addition, examples throughout the text provide ideas on how the concepts can be useful to IT networks. See for yourse ...
Author: TwentyEighty Strategy Execution
In many agencies, there has been advancements in program improvement and process innovation. However, the threat to such initiatives lies in the failure to attain the targets and metrics for success. Often times, improving project management has as much to do with changing hearts and minds as it is with getting down to the business of putting actual programs and initiatives into action. If you're not claiming that your projects fail, then you've been re-setting the clock on your schedule and adjusting your costs and budget.
This article discusses:
- The "easy" ...
Author: TwentyEighty Strategy Execution
Agile project managers have a range of metrics from which to choose for tracking a project's progress. Understanding these metrics enables them to determine how and when to use them most effectively to perform one of the key functions of Agile: communicating progress to the customer. Because the sheer number of options can be daunting, TwentyEighty Strategy Execution boiled down the hundreds of metrics tracking approaches to offer you a comprehensive list-with explanations-of the most useful ones to project managers today.
Author: Carbon Black
Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions that tackle hacking, the Center for Internet Security Critical Security Controls for Effective Cyber Defense offers guidance for prioritizing security processes, and standardization and automation are among its 20 Critical Security Controls derived from frameworks such as NIST SP 800-53. Carbon Black experts describe some of the simple defense measures your organization eas ...
You are responsible for your organization's network security and performance management and the concept of network visibility has been introduced to you. But what is Network Visibility? How does it help you optimize performance and keep your network defenses strong? Download this e-book to learn how to use a visibility foundation to access all traffic, and protect and deliver the information you need for a great customer experience.