Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Multi-Channel Link 16 Terminal
Author: ViaSat   Send Email to POC   View Content
Developed by ViaSat and Harris, the Small Tactical Terminal (STT) KOR-24A is a two-channel radio designed to meet the needs of users who have SWaP-C constraints, but also need simultaneous access to Link 16 and either wideband waveforms or legacy communications pathways, including Very High Frequency and Ultra-High Frequency (VHF/UHF). With the STT, it is now possible to consume tactical information from a ground network and pass that information over to Link 16 and vice versa, creating seamless SA and a Common Operational Picture (COP) between air and ground forces. It ...

IDC Report: The Business value of Red Hat Training
Author: Red Hat   Send Email to POC   View Content
IDC interviewed organizations using Red Hat® technologies and representing a variety of vertical industries. IDC asked these organizations how Red Hat Training courses improved IT operations and the ability to support business requirements and new technologies.

KEY FINDINGS:

IDC survey results confirm that Red Hat training courses offer key benefits to companies:

- Adding just 1.5% of project budget to include training can move the project success rate from 50% to 80%.
- 389% 3-year ROI
- 71% less unplanned downtime

Role of the Network in Creating a path to the cloud
Author: Juniper   Send Email to POC   View Content
Read this white paper to learn how federal agencies can create a tailored technology roadmap to support their eventual migration to the cloud, as well as the benefits of modernizing IT infrastructure to ease that transition. Government organizations can begin today by consolidating applications, simplifying IT operations, driving expanded automation, and
gaining greater management control of networks to ensure more agile and trusted computing environments in the future.

Securing APIs at Scale: A DevOps Perspective
Author: Peach Tech   Send Email to POC   View Content
API security issues have caught many large organizations off-guard. This white paper outlines the challenges to scaling API security along with understanding the complexity and why automated API Security during development matters.

The Importance of Partnerships to Securing the Homeland by: AFCEA Homeland Security Committee
Author: AFCEA   Send Email to POC   View Content
The importance of partnerships to securing the homeland can be seen every day. One of the most widely known partnerships is the "If You See Something, Say Something™" public awareness campaign. This campaign involves federal, state, local, tribal, territorial and private-sector partners to enhance the public's awareness of suspicious activity related to terrorism and terrorism-related crime.

Security By Design: Application Isolation & Containment
Author: Bromium   Send Email to POC   View Content
IT security teams within federal government agencies and their contractors face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions. Their networks and
infrastructures are prime targets for nation-states, political agitators, organized criminals, and other hackers eager for access to truly critical content, be it for espionage purposes, to cause political embarrassment, or to reap financial gain. Furth ...

Your Practical Guide to Threat Hunting (Includes checklist, scorecard, and examples)
Author: Sqrrl   Send Email to POC   View Content
This eBook will guide you through how to assess and improve your threat hunting capabilities, how to prioritize what to hunt for, and share with you proven methods to track advanced threats within massive datasets generated from large, complex networks.

FedRAMP: Certification of your CSP does not protect your data in the cloud
Author: Thales   Send Email to POC   View Content
FedRAMP certification provides a well-vetted selection of CSPs for all Federal Agencies to choose from and enables the individual Agencies to choose the functionality each requires. However, FedRAMP certification does not ensure data security. That remains the responsibility of the Federal Agency that owns the data and places it in the cloud.

Securing the Blurry Line between Classified and Unclassified Data
Author: Thales   Send Email to POC   View Content
Now more than ever, data transmissions are an increasingly prevalent part of every military mission. From Headquarters to Tactical Operations Centers to the individual warfighter, the amount of data is massive and clear distinctions between classified and unclassified data transmission methods are progressively blurred. Top Secret and Secret classifications of data are well established and the methods for transporting these data types are known. But new methods are required to protect classified data as a result of the sheer volume of data, the time sensitive nature of ...

PTS E-Kit™: Tactical Radio Communications Expeditionary Kit
Author: Perkins Technical Services, Inc. (PTS)   Send Email to POC   View Content
PTS supports Soldiers by providing tactical radio Expeditionary Kits (E-Kit™). PTS E-Kit™ offers the solution for expeditionary tactical communications by enabling Soldiers to install their tactical radios in a command post in under 20 minutes. PTS E-Kit™ components include tactical radio docking station, DC power supply and quick install antennas supporting the currently fielded Harris, Raytheon and SINCGARS tactical radios. E-Kit™ components are configurable based on unit needs. PTS is committed to providing reliable quality products to the Soldier.

Transforming Datacenter Operations at the Tactical Edge
Author: Nutanix   Send Email to POC   View Content
The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure information dominance and operational agility in the battlefield, the modern Warfighter requires innovative, lightweight, purpose-built infrastructure that supports mission-critical applications with rapid deployment, high availability, linear scaling and secure operations. Deploying such enterprise-grade data center solutions to the tactical edge with minimal physical footpr ...

Hub and Spoke Approach to Computer-Aided Dispatch
Author: Hexagon   Send Email to POC   View Content
Hexagon US Federal's hub and spoke approach to computer-aided dispatch *(CAD) provides an alternative to a standalone independent system. This solution enables installations to share information on a common platform and create a state of interoperability between the various participating individual U.S. Army Installations' Directorates of Emergency Service (DES), regionally and Army wide. This whitepaper provides an overview of our approach, identifies some of its advantages, and provides examples of where it is successfully working today.

Veeam Availability Suite: Providing 24.7.365 data center Availability for U.S. Federal Government
Author: Veeam   Send Email to POC   View Content
For most Federal Government institutions, budgets are tighter than ever. While short-staffed teams work to modernize their data centers by saving money through virtualization, the latest storage appliances and the cloud, their data volumes continue to explode and end users are demanding access to data 24.7.365. This places a heavy burden on IT, making it a challenge to meet SLAs and provide consistent availability to data and applications. Veeam® Availability Suite™ combines the award-winning data Availability and virtualization management expertise of Veeam Backup & R ...

Using the Risk Management Framework to Secure Covered Contractor Systems
Author: COACT   Send Email to POC   View Content
Federal requirements for nonfederal organizations to safeguard Controlled Unclassified Information (CUI) are changing. Many of the organizations affected by these changes may underestimate the scope of the requirements and the implications associated with nonconformities. COACT has identified the requirements associated with these specific changes and described how the National Institute for Standards and Technology (NIST) Special Publication (SP) 800-171, Revision 1, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, rel ...

Securing Your Government Agency’s Network
Author: Unisys   Send Email to POC   View Content
Every federal government agency faces serious and persistent threats from both inside and outside their digital networks. Yet mitigating risks and preventing breaches is challenging, as agencies are typically hampered by restricted budgets, legacy systems, and scarce resources.

Unisys steps into this gap with Unisys Stealth®, a software-defined security portfolio that delivers consistent, reliable security for global enterprises focused on protecting data in their data center, cloud, and mobile infrastructures. By substituting traditional hardware security techno ...

The ABCs of Network Visibility
Author: Ixia   Send Email to POC   View Content
The concepts of network visibility, network monitoring, and network blind spots help you understand what is happening on your network. While some of the terms can be intimidating at first, straightforward definitions eliminate the confusion. Read this book, which is a compilation of blog posts from Ixia network visibility experts, to get a quick and clear understanding of the terminology associated with network monitoring. Over 20 terms are explained. In addition, examples throughout the text provide ideas on how the concepts can be useful to IT networks. See for yourse ...

Why Government Projects Never Fail
Author: TwentyEighty Strategy Execution   Send Email to POC   View Content
In many agencies, there has been advancements in program improvement and process innovation. However, the threat to such initiatives lies in the failure to attain the targets and metrics for success. Often times, improving project management has as much to do with changing hearts and minds as it is with getting down to the business of putting actual programs and initiatives into action. If you're not claiming that your projects fail, then you've been re-setting the clock on your schedule and adjusting your costs and budget.

This article discusses:
- The "easy" ...

Metrics for Agile Projects: Finding the Right Tools for the Job
Author: TwentyEighty Strategy Execution   Send Email to POC   View Content
Agile project managers have a range of metrics from which to choose for tracking a project's progress. Understanding these metrics enables them to determine how and when to use them most effectively to perform one of the key functions of Agile: communicating progress to the customer. Because the sheer number of options can be daunting, TwentyEighty Strategy Execution boiled down the hundreds of metrics tracking approaches to offer you a comprehensive list-with explanations-of the most useful ones to project managers today.

Aligning with the Critical Security Controls to Achieve Quick Security Wins
Author: Carbon Black   Send Email to POC   View Content
Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions that tackle hacking, the Center for Internet Security Critical Security Controls for Effective Cyber Defense offers guidance for prioritizing security processes, and standardization and automation are among its 20 Critical Security Controls derived from frameworks such as NIST SP 800-53. Carbon Black experts describe some of the simple defense measures your organization eas ...

Network Visibility for Dummies
Author: Ixia   Send Email to POC   View Content
You are responsible for your organization's network security and performance management and the concept of network visibility has been introduced to you. But what is Network Visibility? How does it help you optimize performance and keep your network defenses strong? Download this e-book to learn how to use a visibility foundation to access all traffic, and protect and deliver the information you need for a great customer experience.