Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...


Enabling powerful real-time communications between your users, machines and IoT
Author: Blackberry   Send Email to POC   View Content
Communication Platform as a Service (CPaaS) is a cloud-based platform that allows developers to add communication functions such as messaging, voice and video to their applications. With CPaaS, there is no need to build back-end infrastructure and interfaces to enable rich communication features between users and IoT. The growing demand for CPaaS is extending the frontiers of enterprise and also IoT devices. Organizations of all sizes in almost every industry are choosing CPaaS as their solution for messaging, notifications to customers, location-sharing, video chat for ...

Cyber Threat Intelligence: Moving cyber security to the heart of our business
Author: KPMG   Send Email to POC   View Content
Cyber Threat Intelligence (CTI) is a collection of data points (e.g. Open source, Social media, Human, Deep Web) and ultimately boils down to three questions:
- What do you have of value or importance?
- Who wants to disrupt your Agency or take what you have?
- What mechanisms and environmental factors exist for attackers to be successful in their attack?

CTI is used to research & analyze trends and technical developments of actors who target a specific organizations. This capability has generally existed within the security operations and incident r ...

Solving the Cybersecurity Challenges of Federal Agencies
Author: Fortinet   Send Email to POC   View Content
Managing today's network infrastructures can present challenges for federal agency IT leaders-from demands for higher performance,
to compliance with new standards and regulations, to integrating emerging technologies as part of digital transformation (DX). While some
changes introduce new, dynamic features and IT capabilities, they can also make the network more vulnerable.

Fortinet Federal is focused on helping U.S. government agencies address the unique security requirements of their environments. A dedicated team based in the Washington, D.C., area, Fo ...

Conquering Complexity
Author: IT Cadre   Send Email to POC   View Content
Implementing enterprise level transformation is inherently a complex and challenging endeavor. Factors such as decentralized authority, scalability issues, operational demands,organizational dependencies, budgetary conditions, etc. intensify that complexity.
It is critical to establish a shared understanding of the organization's current state, (in enough detail to understand the impact on outcomes), form a shared agreement of the organization's future state, as well as a shared commitment on the roadmap to success. This enables the delivery required to make their st ...

AFCEA Army Signal Conference Solutions Showcase
Author: AFCEA   Send Email to POC   View Content
AFCEA International is pleased to host this important forum for members of the military to openly discuss current and future requirements and the private sector to describe available and upcoming advances in technology solutions.

The U.S. Army is strengthening its relationship with technology providers to incorporate a new class ofcapabilities. Army leaders agree that the future state of the service must feature a network that is survivable, resilient, protected, intuitive, standards-based, interoperable, sustainable and highly mobile. The service plans
to ass ...

Ordering milCloud® 2.0 - Federal Acquisition of Secure Cloud Services Made Easy
Author: CSRA   Send Email to POC   View Content
milCloud® 2.0, Powered by CSRA, connects commercial cloud service offerings to Department of Defense (DoD) networks, in a private deployment model to provide DISA Mission Partners the latest cloud technology at competitive prices without compromising security or performance. milCloud® 2.0 enables government organizations to consolidate infrastructure while improving continuity of operations; we focus on improved service, enhanced security, and unmatched value. Based on previous experience delivering federal cloud services, CSRA and DISA are working together to make acqu ...

VPX Power Conversion Guide
Author: Milpower   Send Email to POC   View Content
Rugged power supplies capable of addressing industry unique specifications have become a critical design element in today's military electronics. Are the performance specifications of VPX power supplies the solution?

milCloud® 2.0 - Secure Commercial Cloud Solutions on the Department of Defense Information Network
Author: CSRA   Send Email to POC   View Content
Government organizations that provide for and protect our citizens, like the DoD, must be able to innovate and operate on flexible IT platforms specifically designed to adapt and accelerate capability and deliver value.

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today
Author: Blackberry   Send Email to POC   View Content
As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile endpoints. And while almost every CIO knows how important mobile security is, getting a grip on it can be tough. There's a lot to consider, and new factors enter the equation all the time. On the pages that follow, you'll find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers. If you answer no to many of these questions, you may have some significant gaps in your approach to mobile secu ...

The Truth About Micro-Segmentation
Author: Illumio   Send Email to POC   View Content
Micro-segmentation is fast becoming a foundational layer of the security
architecture for today's data center and cloud computing environments.
It has seen a big push by a range of vendors as well as growing
recommendations from leading analyst firms such as Gartner, ESG, and
the 451 Group. This paper outlines the reasons why organizations of all sizes are considering this technology in their data center and cloud security plans.

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Author: AFCEA   Send Email to POC   View Content
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...

It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management
Author: Skybox   Send Email to POC   View Content
Your approach to vulnerability management may be putting your organization at greater risk. Just dealing with vulnerabilities that a vendor said were "critical" isn't enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low-hanging
fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn't be tagged as a high priority in a purely vulnerability-centric ...

Automating Cloud Security to Mitigate Risk
Author: Skybox   Send Email to POC   View Content
As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks.

In February 2017, Tavis Ormandy of the Google Project Zero team exposed major memory leakage in Cloudflare's Content Delivery Network (CDN) web caching services. It exposed all sorts of sensitive data, including passwords, authentication tokens and cookies. Although this is just one example of a cloud-oriented service with a major security issue (which, for the record, the company responded to immediately and remediated quickly), it demonstrates that all of us may have ...

TCO Analysis Comparing Private and Public Cloud Solutions for Running Enterprise Workloads Using the 5Cs Framework
Author: Nutanix   Send Email to POC   View Content
The world of IT and the datacenter remains in the midst of a massive structural shift built on a foundation of mobile, social, big data, and cloud services. At the highest level, the two types of deployment models for cloud services are public and private:
▪ Public cloud services are shared among unrelated enterprises and consumers, open to a largely unrestricted universe of potential users, and designed for a market, not a single enterprise.
▪ Private cloud services are shared within a single enterprise or an extended enterprise, with restrictions on access and l ...

Multicloud Architectures Empower Agile Business Strategies
Author: Nutanix   Send Email to POC   View Content
Digital innovation harnesses emerging technologies that include modern development languages, DevOps collaboration, containers, open source, big data, online social engagement, and dynamic
software-defined multicloud infrastructure platforms. Although large organizations invest aggressively in developing new applications, they continue to rely on established databases, middleware, and
applications built for more reliable, tightly coupled architectures. Together, modern and traditional applications, databases, and infrastructure technologies must be well integrated ...

Nutanix Delivering Strong Value as a Cost-Effective, Efficient, Scalable Platform for Enterprise Applications
Author: Nutanix   Send Email to POC   View Content
The datacenter infrastructure market is undergoing a dramatic change. IT executives are increasingly turning to next-generation datacenter technologies that support extensive digital transformation projects while improving operational efficiencies. This is driving new infrastructure spending on solutions that are able to drive down costs, reduce complexity, and increase agility of IT staff. Sales of hyperconverged infrastructure (HCI) have increased dramatically over the past few years because of, in part, the ability of these solutions to collapse core compute, storag ...

U.S. Air Force ILS-S Re-Platform Standard Base Supply System (SBSS) Modernization Case Study
Author: TSRI   Send Email to POC   View Content
The United States Air Force Integrated Logistics Systems-Supply (ILS-S) is the definition of a mission critical system. It is used by over 18,000 users at 260 U.S. Air Force, Air Force Reserve, and Air National Guard fixed operating bases and forward operating locations, to provide daily supply and equipment support for wartime flying missions. The Air Force needed a low-risk solution to modernize the 50-year old Standard Base Supply System (SBSS, a key portion of the ILS-S system) to drive down operating costs, while retaining all of its functionality.

The ILS-S ...

Multi-Channel Link 16 Terminal
Author: ViaSat   Send Email to POC   View Content
Developed by ViaSat and Harris, the Small Tactical Terminal (STT) KOR-24A is a two-channel radio designed to meet the needs of users who have SWaP-C constraints, but also need simultaneous access to Link 16 and either wideband waveforms or legacy communications pathways, including Very High Frequency and Ultra-High Frequency (VHF/UHF). With the STT, it is now possible to consume tactical information from a ground network and pass that information over to Link 16 and vice versa, creating seamless SA and a Common Operational Picture (COP) between air and ground forces. It ...

IDC Report: The Business value of Red Hat Training
Author: Red Hat   Send Email to POC   View Content
IDC interviewed organizations using Red Hat® technologies and representing a variety of vertical industries. IDC asked these organizations how Red Hat Training courses improved IT operations and the ability to support business requirements and new technologies.


IDC survey results confirm that Red Hat training courses offer key benefits to companies:

- Adding just 1.5% of project budget to include training can move the project success rate from 50% to 80%.
- 389% 3-year ROI
- 71% less unplanned downtime

Role of the Network in Creating a path to the cloud
Author: Juniper   Send Email to POC   View Content
Read this white paper to learn how federal agencies can create a tailored technology roadmap to support their eventual migration to the cloud, as well as the benefits of modernizing IT infrastructure to ease that transition. Government organizations can begin today by consolidating applications, simplifying IT operations, driving expanded automation, and
gaining greater management control of networks to ensure more agile and trusted computing environments in the future.