Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Storing and Accessing Data at the Edge
Author: NetApp   Send Email to POC   View Content
To effectively carry out its mission and keep the nation safe, DoD networks must provide uninterrupted access to intelligence and data that is gathered globally. It must then deliver that data easily, transparently and securely to military personnel. This will empower them to better execute their missions both on and off the battlefield.
With the advent of faster mobile communications and cloud-based artificial intelligence capabilities, data can be moved from the user in the field up to a cloud for processing and the results can be sent back to the user in near real ...

Attivo Networks® ThreatDefend™ Platform and the MITRE ATT&CK Matrix
Author: Attivo Networks   Send Email to POC   View Content
The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Matrix provides a model for cyber
adversary behavior, reflecting various phases of an adversary's lifecycle and the platforms they are known to target. It is designed
to help determine which technologies work or fail, identify gaps to improve security posture and processes, prioritize work on
detecting and deterring techniques, and to evaluate new security technology. ATT&CK is useful for understanding security risk
against known adversary behavior, planning security improv ...

AFCEA 2019 Army Signal Conference Solutions Showcase
Author: AFCEA   Send Email to POC   View Content
2019 AFCEA Army Signal Conference Solutions Showcase Compendium
Prior to the conference, the U.S. Army identified opportunities for industry to offer potential solutions to problems the service and joint force must address both today and in the near future. The list included cloud and application migration/enterprise/hybrid cloud strategy; data cleansing; total army asset visibility/configuration management; risk management framework optimization; continuous cyber security compliancy monitoring; insider threat, zero trust environment; and protected data.

This ...

A Portable, Capability-Rich Data Center
Author: Tyto Athene   Send Email to POC   View Content
Introducing a new intelligent edge solution, designed for federal communication and engineering teams focused on the rapid deployment of mission-critical capabilities at the tactical edge.
Acuity™ Micro Data Center by Tyto Athene delivers critical communications, applications, and information to deployed personnel, anywhere in the world.
Acuity combines best-in-class technology with mobility and efficiency to ensure readiness in a single form factor portable enough to fit in a commercial airline overhead storage compartment. Together, with leading technology par ...

Link 16 Breaks New Ground
Author: ViaSat, Inc.   Send Email to POC   View Content
With the introduction of the next-generation of Link 16 terminals, air-to-ground operations are being looked at in an entirely new way and have opened up more and more uses for Link 16. With the majority of our last two decades of air operations now involving air-to-ground actions, a significant focus has been placed on target delivery accuracy, fratricide and collateral damage reduction, and speed of engagement for DaCAS. However, these advancements in technology also require additional thought in terms of leveraging different approaches to the sharing and managing of ...

A Beginner’s Guide to Link 16 Procurement
Author: ViaSat, Inc.   Send Email to POC   View Content
Link 16 has evolved as the modern battlefield needs have changed, first from coordinating Cold War air intercept missions to helping U.S. and allied forces maneuver in today's often complex operating environment. Since its development in the 1970s, it has become the most widely used, secure, jam-resistant line-of-sight waveform and continues to serve as the tactical data link of choice for air-to-air warfare. And with the new capabilities that are being delivered by the next-generation of Link 16 terminals, combined with the expansion of Link 16 into new domains, it is ...

Unlocking the True Value of Encryption and Key Management Modes for Military Data Storage Applications
Author: Mercury Systems   Send Email to POC   View Content
Guns and guards alone can be used to protect high-value data, but it
is only a matter of a time before a sufficiently skilled and determined
enemy will find a way around these physical defenses. This method
is also impractical in situations where data is unattended outside the
walls of physical protection. The military system architect must design
for the worst-case scenario by assuming a storage device will eventually
fall into the hands of an enemy. Once this assumption is accepted, it is
the system architect's duty to implement a strategy where u ...

Multi-domain Operations and the Future of Training and Simulation
Author: STS International, Inc   Send Email to POC   View Content
Successful training and simulation capabilities require integrated decision-making during tactical, operational, and strategic operations. The development of computer-based, interactive, and multi-media simulation training platforms must consider the impacts of decision-making at each echelon to achieve the desired training outcomes, ranging from the individual to large formations to joint staff. As the operational environment grows more complex with new technology and meta-data, the Joint Force simultaneously moves into Multi Domain Operations (MDO). MDO describes ...

O'Reilly Deep Learning Book
Author: Pure Storage   Send Email to POC   View Content
Although interest in machine learning has reached a high point, lofty expectations often scuttle projects before they get very far. How can machine learning-especially deep neural networks-make a real difference in your organization? This hands-on guide not only provides the most practical information available on the subject, but also helps you get started building efficient deep learning networks.

Dive into machine learning concepts in general, as well as deep learning in particular
Understand how deep networks evolved from neural network fundamentals
Exp ...

Modern Storage Accelerates Data Insights, Speeding Innovation
Author: Pure Storage   Send Email to POC   View Content
Deep learning opens up new worlds of possibility in AI, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up.

Read this MIT Technology Review custom paper to learn how advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics, helping to accelerate business outcomes.

AI, Analytics, and the Future of Your Enterprise
Author: Pure Storage   Send Email to POC   View Content
Is your organization capitalizing on the full potential of data analytics? In this big data primer, you will learn about the 3 key challenges facing organizations today: managing overwhelming amounts of data, leveraging new complex tools/technologies, and developing the necessary skills and infrastructure. However with a "tuned for everything" storage solution that is purpose-built for modern analytics, you can confidently harness the power of your data.

Intelsat-29e Interference Mitigation Testing
Author: Intelsat General Corporation   Send Email to POC   View Content
Cyber threats are growing more advanced, with networks constantly under attack from entities in search of critical data to deny transmission or steal information. Intelsat EpicNG delivers reliability, security, performance and the flexibility to keep pace with changing geographic and mission requirements. Intelsat EpicNG's advanced digital payload creates an enhanced environment for battling interference and for mitigating jamming, assuring government organizations have coverage and providing connectivity for any operation. Intelsat EpicNG satellites successfully provid ...

2018 Trends in Cybersecurity: Building Effective Security Teams
Author: CompTIA   Send Email to POC   View Content
As cybersecurity has become more complex, traditional methods do not account for the wide range of issues related to securing corporate data and handling privacy concerns. New technology, improved processes and broad workforce education are all required for a modern security posture. Adopting a new approach requires cultural change within an organization, but it also requires a diverse set of skills. A new report by CompTIA examines the ways that businesses are building security teams, using internal and external resources, to assemble the expertise needed for security ...

Turning Data into a Strategic Asset for the Warfighter
Author: A3 Missions   Send Email to POC   View Content
Federal agencies increasingly need data-derived insights to address complex challenges, deliver mission success, and optimize resources for maximum effectiveness and efficiency. Whether the challenge is to contain a fast-spreading disease, model and monitor network activity, rapidly assess a battlefield, uncover fraud, or efficiently maintain a fleet of ships, the rapid exploitation of data is essential to getting the job done and providing situational understanding.

Formed in 2015, A3 Missions is a Georgia based LLC that specializes in Data Center Infrastructur ...

Simplify the Secure Desktop
Author: Belkin International   Send Email to POC   View Content
Most secure KVMs are built to support a particular video standard while a large agency may have three or more different computing platforms with various video interfaces. This makes it extremely hard to properly manage secure KVM devices throughout their lifecycle, creating unnecessary burdens on IT departments and ultimately wasting time and budget. Deployment costs go up, IT managers lose the uniformity across their domain that they seek, and long-term maintenance costs become an unknown liability.

The Belkin Universal Secure KVMs have been engineered to solve ...

Best Practices in Enterprise Asset Management: How to Maintain Non-Intrusive Inspection Systems at a High Operational Availability Rate
Author: STS International, Inc   Send Email to POC   View Content
Over the past five (5) years STS International has developed EAM best practices to maintain Non-Intrusive Inspection Systems (NIIS) at a high operational availability rate with reduced costs. Specifically, STS highlights the following innovative EAM approaches to achieving mission success:
• Reliability Centered Maintenance approach
• Asset, logistics and reliability database
• Customized Logistics Information System (LIS) coupled with business analytics software

BIG DATA STRATEGIES: Protecting Information from Theft and Tampering
Author: Commvault   Send Email to POC   View Content
Cybercriminals have long profited by selling stolen financial and personal data. Of late, they've added another alarming technique: encrypting an organization's data where it's stored and demanding payment for the recovery key.

This type of cyberattack, called ransomware, is rising: One study indicates that a business is attacked every 40 seconds. The public sector is a target for ransomware because small agencies, local governments and educational institutions are less likely to have strong security measures and full data backups.

Many are also working w ...

Architecting a Hybrid Data Ecosystem
Author: Denodo Inc   Send Email to POC   View Content
One of the strongest trends in data architecture today is toward the hybrid data ecosystem.

This is a complex, multiplatform environment where data is physically distributed across many database servers and file systems, with storage both on premises and in the cloud.

Hybrid data ecosystems present many challenges. Users find it difficult to wrap their heads around the extreme complexity. Data moves from platform to platform relentlessly as users repurpose data for multiple use cases-making it difficult to govern data and track its lineage.

Despite ...

Building Cyber Resilient Technologies
Author: Envistacom   Send Email to POC   View Content
For a computing paradigm, "Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation". Resilience is related to survivability, which builds on the disciplines of security, fault tolerance, safety, reliability, and performance. This paper focuses on cyber security approaches to achieve cyber resilience when developing technologies, systems, networks, and platforms.

BIG DATA STRATEGIES: Ensuring Compliance, Business Continuity and Disaster Recovery
Author: Commvault   Send Email to POC   View Content
Data here, data there, data everywhere. This small rhyme captures a big concern for IT teams: Current fragmented data storage practices create complexity for meeting compliance requirements and assuring business continuity and disaster recovery.

Typically, government data is stored in many siloed locations and forms, including on-premises servers and storage systems, off-premises backup to tape services and cloud repositories. No single, holistic view exists across departments to truly know what data is available and where it resides. When it is difficult to trac ...