AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
FedRAMP certification provides a well-vetted selection of CSPs for all Federal Agencies to choose from and enables the individual Agencies to choose the functionality each requires. However, FedRAMP certification does not ensure data security. That remains the responsibility of the Federal Agency that owns the data and places it in the cloud.
Now more than ever, data transmissions are an increasingly prevalent part of every military mission. From Headquarters to Tactical Operations Centers to the individual warfighter, the amount of data is massive and clear distinctions between classified and unclassified data transmission methods are progressively blurred. Top Secret and Secret classifications of data are well established and the methods for transporting these data types are known. But new methods are required to protect classified data as a result of the sheer volume of data, the time sensitive nature of ...
Author: Perkins Technical Services, Inc. (PTS)
PTS supports Soldiers by providing tactical radio Expeditionary Kits (E-Kit™). PTS E-Kit™ offers the solution for expeditionary tactical communications by enabling Soldiers to install their tactical radios in a command post in under 20 minutes. PTS E-Kit™ components include tactical radio docking station, DC power supply and quick install antennas supporting the currently fielded Harris, Raytheon and SINCGARS tactical radios. E-Kit™ components are configurable based on unit needs. PTS is committed to providing reliable quality products to the Soldier.
Author: Red Hat
Ansible Essentials: Simplicity in Automation Technical Overview (DO007) is a series of on-demand, online videos that introduces you to Ansible automation and configuration management, provisioning, deploying, and managing compute infrastructure across cloud, virtual, and physical environments with Ansible.
The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure information dominance and operational agility in the battlefield, the modern Warfighter requires innovative, lightweight, purpose-built infrastructure that supports mission-critical applications with rapid deployment, high availability, linear scaling and secure operations. Deploying such enterprise-grade data center solutions to the tactical edge with minimal physical footpr ...
Hexagon US Federal's hub and spoke approach to computer-aided dispatch *(CAD) provides an alternative to a standalone independent system. This solution enables installations to share information on a common platform and create a state of interoperability between the various participating individual U.S. Army Installations' Directorates of Emergency Service (DES), regionally and Army wide. This whitepaper provides an overview of our approach, identifies some of its advantages, and provides examples of where it is successfully working today.
For most Federal Government institutions, budgets are tighter than ever. While short-staffed teams work to modernize their data centers by saving money through virtualization, the latest storage appliances and the cloud, their data volumes continue to explode and end users are demanding access to data 24.7.365. This places a heavy burden on IT, making it a challenge to meet SLAs and provide consistent availability to data and applications. Veeam® Availability Suite™ combines the award-winning data Availability and virtualization management expertise of Veeam Backup & R ...
Federal requirements for nonfederal organizations to safeguard Controlled Unclassified Information (CUI) are changing. Many of the organizations affected by these changes may underestimate the scope of the requirements and the implications associated with nonconformities. COACT has identified the requirements associated with these specific changes and described how the National Institute for Standards and Technology (NIST) Special Publication (SP) 800-171, Revision 1, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, rel ...
Author: TwentyEighty Strategy Execution
In many agencies, there has been advancements in program improvement and process innovation. However, the threat to such initiatives lies in the failure to attain the targets and metrics for success. Often times, improving project management has as much to do with changing hearts and minds as it is with getting down to the business of putting actual programs and initiatives into action. If you're not claiming that your projects fail, then you've been re-setting the clock on your schedule and adjusting your costs and budget.
This article discusses:
- The "easy" ...
The concepts of network visibility, network monitoring, and network blind spots help you understand what is happening on your network. While some of the terms can be intimidating at first, straightforward definitions eliminate the confusion. Read this book, which is a compilation of blog posts from Ixia network visibility experts, to get a quick and clear understanding of the terminology associated with network monitoring. Over 20 terms are explained. In addition, examples throughout the text provide ideas on how the concepts can be useful to IT networks. See for yourse ...
Every federal government agency faces serious and persistent threats from both inside and outside their digital networks. Yet mitigating risks and preventing breaches is challenging, as agencies are typically hampered by restricted budgets, legacy systems, and scarce resources.
Unisys steps into this gap with Unisys Stealth®, a software-defined security portfolio that delivers consistent, reliable security for global enterprises focused on protecting data in their data center, cloud, and mobile infrastructures. By substituting traditional hardware security techno ...
Author: TwentyEighty Strategy Execution
Agile project managers have a range of metrics from which to choose for tracking a project's progress. Understanding these metrics enables them to determine how and when to use them most effectively to perform one of the key functions of Agile: communicating progress to the customer. Because the sheer number of options can be daunting, TwentyEighty Strategy Execution boiled down the hundreds of metrics tracking approaches to offer you a comprehensive list-with explanations-of the most useful ones to project managers today.
Author: Carbon Black
Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions that tackle hacking, the Center for Internet Security Critical Security Controls for Effective Cyber Defense offers guidance for prioritizing security processes, and standardization and automation are among its 20 Critical Security Controls derived from frameworks such as NIST SP 800-53. Carbon Black experts describe some of the simple defense measures your organization eas ...
You are responsible for your organization's network security and performance management and the concept of network visibility has been introduced to you. But what is Network Visibility? How does it help you optimize performance and keep your network defenses strong? Download this e-book to learn how to use a visibility foundation to access all traffic, and protect and deliver the information you need for a great customer experience.
Author: TwentyEighty Strategy Execution
Although the Agile movement was the brainchild of the software development and IT world, it has grown and evolved. There is no question that today Agile project management can be, and has been, applied successfully to a broad range of projects. This mindset focuses on the delivery of value to the customer, rather than strict compliance to a rigorous set of procedures, and values inventiveness and innovation over predictability and unchanging processes. When implemented effectively, Agile drives a collaborative effort between the project team and end user where the focus ...
Today's IT staffs are challenged, dealing with the avalanche of big data and computing necessary to remain competitive. Uncompromised visibility, where the organization has end-to-end views of each and every critical packet, becomes a business imperative, with a best-in-class visibility platform enabling your security and performance tools to be much more effective.
In this paper, learn:
How to avoid "network blind spots" that increase the risk of security breaches and possible data loss with performance repercussions Which features on industry-standard networ ...
Author: Carbon Black
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to "go on the hunt." This guide introduces the concept of threat hunting and the role it plays in the protection of your organization's systems and information.
The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M. Gilday, USN, describes the challenges facing the sea service in cyberspace.
- Research into quantum security already is leading to applications in that esoteric area.
- A new commercial approach to cybersecurity effectively renders a network invisible to attackers.
- Cyber warriors must change their tactics on the fly as adversaries continue to innovate.
Author: IT Cadre
Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a networked world. However, this improved productivity comes with new risk. For many organizations, information is the most valuable asset they possess. Their existence is tied to their ability to both use and protect this vital information. Protecting that information has to span the complex environments of corporate owned storage networks, individual workstations, cloud se ...
Since the early days of World War I, forces have struggled with how to integrate air power to achieve decisive effects on the battlefield on the ground. The key issue that has remained constant for over one hundred years has been the difficulty in seamless communications between supporting aircraft and ground forces in order to establish a common understanding of the situation on the battlefield, locations of friendly and enemy forces, and the desired effects required by ground forces from their supporting aerial components.
With the advent of the Battlefield Awa ...