The adoption of NIST’s Risk Management Framework marks a sweeping cultural shift in DoD’s approach to IT security, with risk management its primary approach and an emphasis on continuous monitoring.
Wide-area motion imagery technology is enabling regional persistent surveillance to mature, delivering the close-up detail that drives pinpoint action while simultaneously offering the big picture view that encompasses a complex situation in its entirety.
The operations of physical networks are well-known, but virtual networks take a different kind of care and feeding. This whitepaper looks at management issues in virtual networks, especially as they affect military IT planners.
The insider threat is one of the hardest to defend against because, by definition, it involves people who are trusted and credentialed members of an organization. This whitepaper provides best practices to protect IT assets against untrustworthy insiders without impeding access to information.
The tablet PC is quickly becoming the preferred mobile device for combat personnel. This whitepaper will fill you in on their use in training and operations, and lay out the challenges that come with adoption.
Fresh approaches to cloud computing, such as open hybrid clouds, continue to unlock new savings and capabilities for military planners. By embracing open-source coding, open hybrid clouds offer a flexible and secure solution that ensures data and app portability.
Security remains a top priority as the Department of Defense transitions to a single, common global network known as the Joint Information Environment. This whitepaper explores how attribute-based access control could secure the JIE from threats such as the cross-pollination of data as well as malicious users.
The Navy's changing mission is driving an urgent need for visual intelligence (VI). As smaller vessels have become increasingly involved in the fight against piracy, for example, it's vital to get VI into the hands of the forward-deployed end user for timely, accurate decisions. This whitepaper examines the new and growing demand for VI, as well as the collection and exploitation of this data for maritime operations.
The Department of Defense’s rapid transition to an enterprise architecture requires streamlined ways to develop and deploy a variety of applications. Platform as a service, or PaaS, offers a solution. Our whitepaper explains how PaaS simplifies and accelerates application development while reducing costs.
In response to an increasingly unstable world and shrinking budgets, military planners are rethinking intelligence, surveillance and reconnaissance missions and systems. Legacy ISR and support infrastructures struggle to keep up with an increasingly mobile, information-driven military...
Situational awareness for troops in tactical environments is undergoing a renaissance with capabilities such as mission command on the move and development of a common operating picture. Now comes the introduction of mobility to the battlefield, and, more importantly, the development of secure, location-based....
One of the key enablers for cloud computing, virtualization and the next-generation desktop in the military is data storage and data management across public, private and hybrid clouds. Data storage capabilities are particularly important for intelligence tools such as the Distributed Common Ground System programs at the Army, Air Force and Navy.
The transition to next-generation telecommunications and IT infrastructure services is a complex and daunting task for both civilian and defense agencies. Technology is changing so rapidly that agencies need a portfolio of flexible contracts and services that will support smooth migration to future technologies while adhering to the major precepts of federal digital and IT reform strategies.
Technology is solving many of the challenges tocommunications interoperability that have long stymied military planners. It takes a certain approach, however, to bridge the gap between systems and to incorporate legacy technologies alongside newer arrivals. Download this white paper to learn more.
Everyone knows stovepipes are bad, but nobody is quite sure how best to eliminate them. Bringing in large systems integrators is a common solution, but that strategy brings its own problems, often including a proprietary approach that prevents easy interfacing with other vendors; solutions.
New products are becoming available to make sense of the vast amounts of geospatial intelligence data, but formidable challenges remain to be met.
The evolution of converged virtual architecture is an outgrowth of efforts to do away with desktops in favor of more efficient, consolidated arrangements. The transition, however, is not always smooth. This white paper explains the cultural change and technology needed to avoid common pitfalls.
War fighting in the enterprise age includes complex cyber and communications systems, but the tactical edge is not a place to learn technical skills. To ensure troops have operational competency before their boots hit the dirt, the U.S. military is exploring innovative training and simulation tools.
The U.S. military has been under tremendous pressure in recent years to streamline its often bloated buying processes. Now a new solution is coming to the fore. The emerging Joint Enterprise Licensing Agreement, or JELA, invites different branches of the Defense Department to...
The virtues of the cloud in general have been thoroughly praised: Flexibility, scalability, ease of maintenance and lower costs. Throw into the mix commercial cloud’s ready-made architecture, with crucial components already in place, and it’s not hard to understand what makes commercial solutions a tempting proposition to some.
Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and smarming techniques increasingly serve as a means for adversaries to distract, to disorient, and disrupt.