The adoption of NIST’s Risk Management Framework marks a sweeping cultural shift in DoD’s approach to IT security, with risk management its primary approach and an emphasis on continuous monitoring.
©2016 Sightline Media Group. All rights reserved.
Wide-area motion imagery technology is enabling regional persistent surveillance to mature, delivering the close-up detail that drives pinpoint action while simultaneously offering the big picture view that encompasses a complex situation in its entirety.
The operations of physical networks are well-known, but virtual networks take a different kind of care and feeding. This whitepaper looks at management issues in virtual networks, especially as they affect military IT planners.
The insider threat is one of the hardest to defend against because, by definition, it involves people who are trusted and credentialed members of an organization. This whitepaper provides best practices to protect IT assets against untrustworthy insiders without impeding access to information.
The tablet PC is quickly becoming the preferred mobile device for combat personnel. This whitepaper will fill you in on their use in training and operations, and lay out the challenges that come with adoption.
Fresh approaches to cloud computing, such as open hybrid clouds, continue to unlock new savings and capabilities for military planners. By embracing open-source coding, open hybrid clouds offer a flexible and secure solution that ensures data and app portability.
Security remains a top priority as the Department of Defense transitions to a single, common global network known as the Joint Information Environment. This whitepaper explores how attribute-based access control could secure the JIE from threats such as the cross-pollination of data as well as malicious users.
The Navy's changing mission is driving an urgent need for visual intelligence (VI). As smaller vessels have become increasingly involved in the fight against piracy, for example, it's vital to get VI into the hands of the forward-deployed end user for timely, accurate decisions. This whitepaper examines the new and growing demand for VI, as well as the collection and exploitation of this data for maritime operations.
The Department of Defense’s rapid transition to an enterprise architecture requires streamlined ways to develop and deploy a variety of applications. Platform as a service, or PaaS, offers a solution. Our whitepaper explains how PaaS simplifies and accelerates application development while reducing costs.
In response to an increasingly unstable world and shrinking budgets, military planners are rethinking intelligence, surveillance and reconnaissance missions and systems. Legacy ISR and support infrastructures struggle to keep up with an increasingly mobile, information-driven military...
Situational awareness for troops in tactical environments is undergoing a renaissance with capabilities such as mission command on the move and development of a common operating picture. Now comes the introduction of mobility to the battlefield, and, more importantly, the development of secure, location-based....
One of the key enablers for cloud computing, virtualization and the next-generation desktop in the military is data storage and data management across public, private and hybrid clouds. Data storage capabilities are particularly important for intelligence tools such as the Distributed Common Ground System programs at the Army, Air Force and Navy.
The transition to next-generation telecommunications and IT infrastructure services is a complex and daunting task for both civilian and defense agencies. Technology is changing so rapidly that agencies need a portfolio of flexible contracts and services that will support smooth migration to future technologies while adhering to the major precepts of federal digital and IT reform strategies.
Technology is solving many of the challenges tocommunications interoperability that have long stymied military planners. It takes a certain approach, however, to bridge the gap between systems and to incorporate legacy technologies alongside newer arrivals. Download this white paper to learn more.
Everyone knows stovepipes are bad, but nobody is quite sure how best to eliminate them. Bringing in large systems integrators is a common solution, but that strategy brings its own problems, often including a proprietary approach that prevents easy interfacing with other vendors; solutions.
New products are becoming available to make sense of the vast amounts of geospatial intelligence data, but formidable challenges remain to be met.
The evolution of converged virtual architecture is an outgrowth of efforts to do away with desktops in favor of more efficient, consolidated arrangements. The transition, however, is not always smooth. This white paper explains the cultural change and technology needed to avoid common pitfalls.
War fighting in the enterprise age includes complex cyber and communications systems, but the tactical edge is not a place to learn technical skills. To ensure troops have operational competency before their boots hit the dirt, the U.S. military is exploring innovative training and simulation tools.
The U.S. military has been under tremendous pressure in recent years to streamline its often bloated buying processes. Now a new solution is coming to the fore. The emerging Joint Enterprise Licensing Agreement, or JELA, invites different branches of the Defense Department to...
The virtues of the cloud in general have been thoroughly praised: Flexibility, scalability, ease of maintenance and lower costs. Throw into the mix commercial cloud’s ready-made architecture, with crucial components already in place, and it’s not hard to understand what makes commercial solutions a tempting proposition to some.
Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and smarming techniques increasingly serve as a means for adversaries to distract, to disorient, and disrupt.
Positioning, navigation and timing are of paramount importance to military operations across the services: Whether in the air, on land or at sea, the ability to navigate and strike precisely are more critical than ever. It’s a challenge Pentagon leaders say they are taking seriously – but what steps are they taking to safeguard PNT? This whitepaper examines what’s being done in the Army, Air Force, Navy and Marine Corps to ensure troops can find their way and deliver on mission requirements.
Whitepapers are best viewed using Chrome, Firefox, or Safari.
The Internet of Things on the battlefield isn’t a new concept, but there are evolving ways of applying sensor connectivity to the military theater. So far IoT in warfare is largely centered on areas such as unmanned vehicles, troop health and energy management, but now military officials and leaders in industry are looking at ways to apply IoT in intelligence, surveillance and reconnaissance operations.
With a vast network of aging infrastructure and systems, the Defense Department is looking to harness cutting-edge, transformative technologies that can modernize communications and deliver mission success. Increasingly those technologies are coming from the commercial sector, where companies have invested billions in cybersecurity and IT infrastructure.
Across the Department of Defense, leaders are studying how to maximize the benefits of multi-domain operations. In other words, using assets in sea, air, space, land and cyber to best create an environment of information dominance. But to do this requires a high degree of interoperability and seamless communication. One key tool in this new environment is the Link 16 data link. Link 16 provides a secure, jam-resistant, high speed digital data link.
In this three-part tech brief, we will explain three ways the Department of Defense and the Intelligence Community can improve persistence. Part 1, Machine Learning: In this section, we will explore how analytics can help process information such as satellite imagery or flood maps at speeds orders of magnitude faster than traditional analysts and the advantage this brings. This piece will also explain how to train systems to improve their results.
In this three-part tech brief, we will explain three ways the Department of Defense and the Intelligence Community can improve persistence. Part 2, Data Management: The DoD is collecting scores of data at an unprecedented rate. But without the right systems is place, that data is of little value. In this section, we will discuss the importance of data management and the best practices to ensure that all of this information creates an opportunity for national security leaders.
Part 3, SAR & hyperspectral imaging: SAR and hyperspectral sensors are gaining interest from DoD users who see a value in adding them to their platforms. In particular, this imagery can provide a greater level of specificity of what it’s viewing – think building materials - and can be used to view objects through clouds or darkness. In this section, we will explain how these types of imagery can help lead to improved intelligence and help lead to greater persistence.
In this whitepaper, we explain the challenge the Army faces in the current data environment, especially on the battlefield, discuss how data management technology has led to improvements in other industries and explore the possibilities and benefits this could bring for the service and its troops.
U.S. military forces are facing a proliferation of GPS signal jamming and spoofing. GPS powers everything from precision guided weapons to navigation to timing. As such, the Pentagon wants to maintain this information advantage. Defense Department leaders need to take new steps to ensure position, navigation and timing capabilities are always available.
This whitepaper explores the Pentagon’s demand for faster software development, containerization and container management, kubernetes getting containers under control and enabling DevSecOps, how DoD is implementing DevSecOps and using kubernetes, putting kubernetes on F-16s, and more.
Learn more more about establishing the information advantage, the infrastructure necessary to support ISR, and the future of ISR Networks.