Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...


Automate the Data Fusion of Publicly Available Information (PAI) & Existing Authoritative Data with SAP HANA ®
Author: SAP NS2   Send Email to POC   View Content
Publicly Available Information is one form of non-traditional data that can offer a treasure trove of readily available data that can help analysts and mission planners across all of the battlespace domains. However, just getting additional raw data streams, when analysts are already overloaded with the massive amounts of data they already have, would only add to the problem.

The answer to this challenge is using automation to find the right data, validate its trustworthiness; then correlate with existing content. The outcome: a complete picture of all the releva ...

Today’s Insider Threat – It’s Real!
Author: Great Lakes Case and Cabinet Co., Inc.   Send Email to POC   View Content
As commercial corporations and government agencies continue to spend countless millions of dollars on protecting their most valued asset (data) from outside cyber-attacks and ever so increasing insider threat potential, not nearly enough attention has been given to physical security. There is typically little consideration for protecting and limiting the unmonitored access to the equipment housing the data. Over the last decade, a tremendous emphasis has been placed on the cyber security community to stand up to elaborate attacks; threat and security operation centers, ...

Why Ka-band has Emerged as the Best Path Forward for AISR
Author: Inmarsat Government   Send Email to POC   View Content
Global intelligence gathering operations are increasingly conducted from airborne platforms. Effectively employing these assets requires globally-portable, fully-connected and efficient beyond line of sight (BLOS) connectivity. As the military is evaluating its future data and communication technology to support these missions, Ka-band has emerged as the preferred path forward for the Airborne Intelligence, Surveillance and Reconnaissance (AISR) community.

Integrated Federal Security Solution For Connectivity, Mobility
Author: IMPRES Technology Solutions   Send Email to POC   View Content
One of the most common and difficult networking challenges agency's struggle with is IP address conflicts and limitations of moving IP-enabled devices. Ensuring that users across the business can simultaneously access network resources--wherever they are located and securely--is no easy task.

Identity-Defined Networking enables you to overcome IP addressing issues and conflicts, and can freely move IP resources, whether static or dynamic. IDN provides a modern networking architecture based on cryptographic identities that enable global mobility for any IP resour ...

TechNet Augusta 2018 Solutions Showcase Compendium
Author: AFCEA   Send Email to POC   View Content
As part of TechNet Augusta 2018, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the cyber electromagnetic activities arena. The association reached out to industry and received more than 40 potential solutions from a range of innovators with technical and thought-provoking approaches to addressing difficult problems. Read how entrepreneurs, pioneers and large companies recommend the Army solve some of their biggest challenges.

Securing Government Desktops from Cyber Threats with the Latest KVM Technology
Author: Belkin International   Send Email to POC   View Content
Foreign nations, terrorists, and cyber criminals see state and local government IT infrastructure as an extremely attractive target for data theft, attacks, and disruption. Attacks have taken down entire systems, destroyed valuable equipment, and left many government agencies repeatedly vulnerable in countries throughout the world. To combat threats, Federal agencies are looking for ways to enable employee productivity while ensuring air-tight seals between networks, protecting from both internal and external threats. Keyboard-Video-Mouse (KVM) switching devices can ass ...

Open Innovation Labs government e-book
Author: Red Hat   Send Email to POC   View Content
Red Hat Open Innovation Labs is an immersive residency for modernizing application development. Developing government applications can take years and cost millions, and security, compliance, and privacy requirements stall progress. Government IT teams are innovating faster and improving quality with DevOps. The approach is to make large-scale changes iteratively, instead of all at once-adjusting direction as you go. Learn how in this e-book about Red Hat Open Innovation Labs.

Building a Culture of Cybersecurity: A Guide for Corporate Executives and Board Members
Author: CompTIA   Send Email to POC   View Content
According to the World Economic Forum, a majority of business leaders indicated that cyberattacks are their top concern heading into 2018. For many organizations, there needs to be an important shift in mindset: Security can no longer be thought of as a technical problem with a technical solution; it must be treated as a critical business concern.

How to Find a Trusted Advisor for Your IT Modernization Projects
Author: IMPRES Technology Solutions   Send Email to POC   View Content
Government and military agencies are now dependent on commercial technologies ranging from the infrastructure, to the cloud, to security solutions. The challenge these agencies face is how to determine the right products and providers for specific and often complex needs when the number of options and the level of risk are overwhelming.

In this white paper, learn the best practices to follow and the pitfalls to avoid when upgrading existing hardware, migrating to the cloud, procuring security solutions or managing a range of information technology needs for both ...

Summer 2018 Technology Vectors Update by the AFCEA Technology Committee
Author: AFCEA   Send Email to POC   View Content
An annual presentation on current technology trends provided by the AFCEA International volunteer Technology Committee. Provides insights and expertise in emerging technology topics most relevant to Federal technology leaders.

Taking the Pain Out of Data Migration
Author: Commvault & Microsoft   Send Email to POC   View Content
From day-to-day backup and recovery to long-term archiving and disaster recovery, moving your data and workloads to and from the Microsoft Azure cloud should be easy. Commvault's industry-leading solution provides seamless backup and migration of on-premises workloads to the cloud, backup of cloud based workloads, and fast disaster recovery. This enables true workload portability between the leading cloud and virtual infrastructure platforms in the market today. This Case Study explains on how one customer leveraged Commvault to accelerate the move of 200,000 email user ...

Intelsat EpicNG: Realizing Resilient Tactical Networks with Maximum Government Control on an Open Architecture High-Throughput Satellite
Author: Intelsat General Corporation   Send Email to POC   View Content
High Throughput Satellites (HTS) have been the center of attention for the past five years, and for good reason - they have huge implications for communication, security and emergency response. While most SATCOM networks cannot migrate to a closed architecture, open architecture HTS systems are operational today and can be leveraged immediately by government users. Many potential users have been misled into believing that HTS systems only work in the Ka-band, but this is inaccurate - the significant benefits of HTS can be applied to any frequency band. The Intelsat Epic ...

Is Your Investment in Cybersecurity Training Paying Off?
Author: CompTIA   Send Email to POC   View Content
The modern world takes place in a largely digital space. Underneath the physical assets that drive our businesses are mountains of data and personal information. The digitizing of information has had a major impact on the business world, creating large, complicated systems. At the foundation of it all is the ability to create a secure network infrastructure; without proper security measures and controls in place, it is impossible for an organization to move forward with confidence. Security is at the foundation of an organization's ability to provide reliable, scalable ...

Accelerate Your Move to Microsoft Office 365 and Control Costs
Author: Commvault & Microsoft   Send Email to POC   View Content
From day-to-day backup and recovery to long-term archiving and disaster recovery, moving your data and workloads to and from the Microsoft Azure cloud should be easy. Commvault's industry-leading solution provides seamless backup and migration of on-premises workloads to the cloud, backup of cloud based workloads, and fast disaster recovery. This enables true workload portability between the leading cloud and virtual infrastructure platforms in the market today. This Case Study explains on how one customer leveraged Commvault to accelerate the move of 200,000 email user ...

Application Assurance Enables Mission Assurance
Author: Kemp Technologies   Send Email to POC   View Content
Network Centric Warfare requires access to timely, trustworthy information during all phases of operations. The most common way information is accessed is thru applications. This white paper addresses the critical need to address Application Assurance to ensure survivable, secure and timely delivery of information to the operator.

New waveforms and smart radios help warfighters communicate on today’s battlefield
Author: Domo Tactical Communications   Send Email to POC   View Content
Communications on modern battlefields present many challenges for warfighters, especially those operating at the tactical edge of their military networks. Bandwidth is limited, constraining the types of data streams troops can both send and receive; line-of-sight radio frequency networks may not work, or work in a very limited capacity in dense urban areas, jungles or mountains; and jamming and other types of electronic warfare may greatly limit communications capabilities. These challenges can be mitigated with advanced waveforms capable of transmitting data around rub ...

Enabling powerful real-time communications between your users, machines and IoT
Author: Blackberry   Send Email to POC   View Content
Communication Platform as a Service (CPaaS) is a cloud-based platform that allows developers to add communication functions such as messaging, voice and video to their applications. With CPaaS, there is no need to build back-end infrastructure and interfaces to enable rich communication features between users and IoT. The growing demand for CPaaS is extending the frontiers of enterprise and also IoT devices. Organizations of all sizes in almost every industry are choosing CPaaS as their solution for messaging, notifications to customers, location-sharing, video chat for ...

Cyber Threat Intelligence: Moving cyber security to the heart of our business
Author: KPMG   Send Email to POC   View Content
Cyber Threat Intelligence (CTI) is a collection of data points (e.g. Open source, Social media, Human, Deep Web) and ultimately boils down to three questions:
- What do you have of value or importance?
- Who wants to disrupt your Agency or take what you have?
- What mechanisms and environmental factors exist for attackers to be successful in their attack?

CTI is used to research & analyze trends and technical developments of actors who target a specific organizations. This capability has generally existed within the security operations and incident r ...

Solving the Cybersecurity Challenges of Federal Agencies
Author: Fortinet   Send Email to POC   View Content
Managing today's network infrastructures can present challenges for federal agency IT leaders-from demands for higher performance,
to compliance with new standards and regulations, to integrating emerging technologies as part of digital transformation (DX). While some
changes introduce new, dynamic features and IT capabilities, they can also make the network more vulnerable.

Fortinet Federal is focused on helping U.S. government agencies address the unique security requirements of their environments. A dedicated team based in the Washington, D.C., area, Fo ...

Conquering Complexity
Author: IT Cadre   Send Email to POC   View Content
Implementing enterprise level transformation is inherently a complex and challenging endeavor. Factors such as decentralized authority, scalability issues, operational demands,organizational dependencies, budgetary conditions, etc. intensify that complexity.
It is critical to establish a shared understanding of the organization's current state, (in enough detail to understand the impact on outcomes), form a shared agreement of the organization's future state, as well as a shared commitment on the roadmap to success. This enables the delivery required to make their st ...