AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
AFCEA International is hosting TechNet Augusta in an exciting and diverse format. The conference's series of information-sharing events began with the Army's request for industry capabilities proposals to some of its most difficult problems. Members of the association's Technical Committee reviewed more than 60 potential solutions. This document features these solutions, which have been made available to the Army's leaders, program managers and technologists
Cyber security experts estimate that 90% of cyber-attacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to DOD's Principal Cyber Advisor.
The United States SEEK EAGLE Office (AFSEO) is the center of excellence responsible for managing the aircraft store compatibility process. Get an insider's look at how AFSEO leveraged ML to accelerate time to insights by automating entity resolution, record duplication, and categorization. Learn how the office is able to increase ROI and utilization of Air Force aircraft.
Artificial intelligence (AI), the internet of things (IoT), and security technologies are set to disrupt every industry in the next decade. To get there, leading organizations like McDonald's, Uber Eats, and HSBC have built adaptable digital platforms via APIs. In the ebook, MuleSoft founder Ross Mason shares his point of view on how to build a thoughtful API strategy that will help your organization take full advantage of emerging technologies like AI, chatbots, and IoT without compromising on security.
Author: Regions Bank
The COVID-19 pandemic has precipitated an unprecedented international economic contraction. Many companies will face challenges. One factor that will distinguish the winners from the losers is the financial flexibility to seize M&A opportunities; invest in new, profitable lines of business; and keep teams with valuable and hard-to-replicate skillsets together through tough times. Even more critical is the ability to have a diversified business that is resilient enough to weather any storm. A business with a well-diversified customer base and product offering is likely t ...
Intelligence community and government personnel who work with classified or sensitive information often use multiple computers on their desks, each one connected to a separate network based on the security level of the information being accessed.
This can create a variety of IT and logistical challenges for workers
onsite, but as ongoing COVID-19 pandemic and other circumstances force more people to work remotely, managing all of this equipment and their security requirements from a private home can be difficult or nearly impossible without multilevel secure ...
Author: Attivo Networks
Most organizations will start Zero Trust with a focus on users and devices. Attivo Networks adds another layer of access control that focuses on applications, data, and access for post-authentication protection. The company's ThreatDefend platform offers capabilities that implement elements of a Zero Trust architecture, particularly in the areas of data trust and application trust.
Cybersecurity and its relationship to the national interests have evolved swiftly and will continue to do so. AFCEA International's Cyber Committee offers strategy recommendations as a result of numerous studies and commissions. This is the first in a series that will highlight specific recommendations that merit action now and in the next four years.
A Cyber Thread Runs Through Government Future Assessments.
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas.
Invisible conflicts on the electronic battlefield are won or lost in tiny
fractions of a second. Adversaries are continually deploying new or modified threats. Our warfighters are at risk if they're not equipped to respond.
Government agencies are accountable for properly handling sensitive data. Civil servants operate in an environment based on close oversight, prescriptive procedures and rules. As the trusted custodians of that data, they need to take careful and necessary precautions to protect it, which can slow mission progress.
Businesses have many opportunities to improve, automate and streamline their data protection as the digital landscape continues to expand. However, with greater options, organizations face a multitude of challenges when it comes to IT and data management. Public cloud usage is rapidly increasing and IT professionals struggle with how to e-ciently migrate and manage data between environments. in addition, continued operational e-ciency and budget constraints make meeting recovery objectives in an increasingly distributed world harder than ever.
In 2017, the White House's American Technology Council advised federal agencies to move IT operations in the direction of shared services and cloud modernization. Congress provided funds for digital transformation through the Modernizing Government Technology Act, and many agencies took advantage of the opportunity to make upgrades.
Veeam Availability Suite is Veeam's flagship backup solution that enables modern data protection and is simple, flexible and reliable. This comprehensive enterprise suite empowers organizations with advanced capabilities and powerful tools to effectively achieve their goals of achieving complete data protection, with high availability and reduced downtime. Businesses of all sizes, from small startups to the largest enterprises, embark on similar journeys for keeping their data protected and available, and Veeam Availability Suite is the complete tool for the job.
Today with the growth of data exploding,it's difficult to keep track of all the systems it touches, especially with data spread across virtual, physical, hybrid and public cloud environments. How do you keep track of all the systems your data resides on and transports through? How do you ensure everything is running at peak performance, and how can you remediate data issues faster?
Microsoft provides a wide array of powerful services within Office 365 but a comprehensive backup of your Office 365 data is not one of them. Veeam Backup for Microsoft Office 365 eliminates the risk of losing access and control over your Office 365 data including Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams so that your data is always protected and accessible.
Availability Suite enables customers to achieve unparalleled data availability, visibility, automation and governance across data centers, at the edge and in the cloud. As modern IT organizations look to innovate faster, legacy backup and recovery infrastructure cannot support customers' forward-looking initiatives.
Application performance directly impacts business performance. If applications are not working properly, employees cannot work properly, collaboration cannot happen, customers and citizens cannot be served efficiently, and transactions cannot be completed effectively. RavenTek's guidance has made way for the agency's stakeholders to now have unified visibility into all possible pain points with Riverbed's SteelCentral solution. They also have a better understanding of how to solve key performance issues and the agency is now armed with critical information needed to mak ...
With legacy TDM equipment reaching end of life and, in many cases, end of support, the U.S. Department of Defense (DoD) has been given a tight timeframe to migrate to IP-based networking technologies. As it makes that transition, it can't afford to strand existing users of legacy TDM-based applications. Responding to the need to ensure operations continuity as the DoD moves from TDM to IP, Nokia offers a field-proven TDM-to-IP evolution solution, ensuring a smooth, seamless and future-proof migration.
Nokia Opt-In - By submitting this form, you agree to r ...
Cybersecurity is now a significant area of focus and concern for senior leaders of public and private organizations. Unfortunately, for too many organizations, cybersecurity continues to be a technically focused effort managed by the technical wizards. Instead, board of director discussions often zero in on describing the latest cyber threats, which are often unintelligible to leaders, counts of cyber attacks thwarted and recommendations for cybersecurity investments. Learn how to conduct enterprise risk management processes to benefit your organization to help all staf ...