AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
As part of TechNet Augusta 2018, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the cyber electromagnetic activities arena. The association reached out to industry and received more than 40 potential solutions from a range of innovators with technical and thought-provoking approaches to addressing difficult problems. Read how entrepreneurs, pioneers and large companies recommend the Army solve some of their biggest challenges.
Author: Belkin International
Foreign nations, terrorists, and cyber criminals see state and local government IT infrastructure as an extremely attractive target for data theft, attacks, and disruption. Attacks have taken down entire systems, destroyed valuable equipment, and left many government agencies repeatedly vulnerable in countries throughout the world. To combat threats, Federal agencies are looking for ways to enable employee productivity while ensuring air-tight seals between networks, protecting from both internal and external threats. Keyboard-Video-Mouse (KVM) switching devices can ass ...
Author: Red Hat
Red Hat Open Innovation Labs is an immersive residency for modernizing application development. Developing government applications can take years and cost millions, and security, compliance, and privacy requirements stall progress. Government IT teams are innovating faster and improving quality with DevOps. The approach is to make large-scale changes iteratively, instead of all at once-adjusting direction as you go. Learn how in this e-book about Red Hat Open Innovation Labs.
According to the World Economic Forum, a majority of business leaders indicated that cyberattacks are their top concern heading into 2018. For many organizations, there needs to be an important shift in mindset: Security can no longer be thought of as a technical problem with a technical solution; it must be treated as a critical business concern.
Author: IMPRES Technology Solutions
Government and military agencies are now dependent on commercial technologies ranging from the infrastructure, to the cloud, to security solutions. The challenge these agencies face is how to determine the right products and providers for specific and often complex needs when the number of options and the level of risk are overwhelming.
In this white paper, learn the best practices to follow and the pitfalls to avoid when upgrading existing hardware, migrating to the cloud, procuring security solutions or managing a range of information technology needs for both ...
An annual presentation on current technology trends provided by the AFCEA International volunteer Technology Committee. Provides insights and expertise in emerging technology topics most relevant to Federal technology leaders.
Author: Intelsat General Corporation
High Throughput Satellites (HTS) have been the center of attention for the past five years, and for good reason - they have huge implications for communication, security and emergency response. While most SATCOM networks cannot migrate to a closed architecture, open architecture HTS systems are operational today and can be leveraged immediately by government users. Many potential users have been misled into believing that HTS systems only work in the Ka-band, but this is inaccurate - the significant benefits of HTS can be applied to any frequency band. The Intelsat Epic ...
The modern world takes place in a largely digital space. Underneath the physical assets that drive our businesses are mountains of data and personal information. The digitizing of information has had a major impact on the business world, creating large, complicated systems. At the foundation of it all is the ability to create a secure network infrastructure; without proper security measures and controls in place, it is impossible for an organization to move forward with confidence. Security is at the foundation of an organization's ability to provide reliable, scalable ...
Author: Kemp Technologies
Network Centric Warfare requires access to timely, trustworthy information during all phases of operations. The most common way information is accessed is thru applications. This white paper addresses the critical need to address Application Assurance to ensure survivable, secure and timely delivery of information to the operator.
Author: Domo Tactical Communications
Communications on modern battlefields present many challenges for warfighters, especially those operating at the tactical edge of their military networks. Bandwidth is limited, constraining the types of data streams troops can both send and receive; line-of-sight radio frequency networks may not work, or work in a very limited capacity in dense urban areas, jungles or mountains; and jamming and other types of electronic warfare may greatly limit communications capabilities. These challenges can be mitigated with advanced waveforms capable of transmitting data around rub ...
Communication Platform as a Service (CPaaS) is a cloud-based platform that allows developers to add communication functions such as messaging, voice and video to their applications. With CPaaS, there is no need to build back-end infrastructure and interfaces to enable rich communication features between users and IoT. The growing demand for CPaaS is extending the frontiers of enterprise and also IoT devices. Organizations of all sizes in almost every industry are choosing CPaaS as their solution for messaging, notifications to customers, location-sharing, video chat for ...
Cyber Threat Intelligence (CTI) is a collection of data points (e.g. Open source, Social media, Human, Deep Web) and ultimately boils down to three questions:
- What do you have of value or importance?
- Who wants to disrupt your Agency or take what you have?
- What mechanisms and environmental factors exist for attackers to be successful in their attack?
CTI is used to research & analyze trends and technical developments of actors who target a specific organizations. This capability has generally existed within the security operations and incident r ...
Managing today's network infrastructures can present challenges for federal agency IT leaders-from demands for higher performance,
to compliance with new standards and regulations, to integrating emerging technologies as part of digital transformation (DX). While some
changes introduce new, dynamic features and IT capabilities, they can also make the network more vulnerable.
Fortinet Federal is focused on helping U.S. government agencies address the unique security requirements of their environments. A dedicated team based in the Washington, D.C., area, Fo ...
Author: IT Cadre
Implementing enterprise level transformation is inherently a complex and challenging endeavor. Factors such as decentralized authority, scalability issues, operational demands,organizational dependencies, budgetary conditions, etc. intensify that complexity.
It is critical to establish a shared understanding of the organization's current state, (in enough detail to understand the impact on outcomes), form a shared agreement of the organization's future state, as well as a shared commitment on the roadmap to success. This enables the delivery required to make their st ...
AFCEA International is pleased to host this important forum for members of the military to openly discuss current and future requirements and the private sector to describe available and upcoming advances in technology solutions.
The U.S. Army is strengthening its relationship with technology providers to incorporate a new class ofcapabilities. Army leaders agree that the future state of the service must feature a network that is survivable, resilient, protected, intuitive, standards-based, interoperable, sustainable and highly mobile. The service plans
to ass ...
milCloud® 2.0, Powered by CSRA, connects commercial cloud service offerings to Department of Defense (DoD) networks, in a private deployment model to provide DISA Mission Partners the latest cloud technology at competitive prices without compromising security or performance. milCloud® 2.0 enables government organizations to consolidate infrastructure while improving continuity of operations; we focus on improved service, enhanced security, and unmatched value. Based on previous experience delivering federal cloud services, CSRA and DISA are working together to make acqu ...
Rugged power supplies capable of addressing industry unique specifications have become a critical design element in today's military electronics. Are the performance specifications of VPX power supplies the solution?
Government organizations that provide for and protect our citizens, like the DoD, must be able to innovate and operate on flexible IT platforms specifically designed to adapt and accelerate capability and deliver value.
As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile endpoints. And while almost every CIO knows how important mobile security is, getting a grip on it can be tough. There's a lot to consider, and new factors enter the equation all the time. On the pages that follow, you'll find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers. If you answer no to many of these questions, you may have some significant gaps in your approach to mobile secu ...
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...