DoD Faces Risk

The adoption of NIST’s Risk Management Framework marks a sweeping cultural shift in DoD’s approach to IT security, with risk management its primary approach and an emphasis on continuous monitoring.

FREE: Download Now

©2016 Sightline Media Group. All rights reserved.

The big picture

Wide-area motion imagery technology is enabling regional persistent surveillance to mature, delivering the close-up detail that drives pinpoint action while simultaneously offering the big picture view that encompasses a complex situa­tion in its entirety.

FREE: Download Now

Embracing software-defined networking

The operations of physical networks are well-known, but virtual networks take a different kind of care and feeding. This whitepaper looks at management issues in virtual networks, especially as they affect military IT planners.

FREE: Download Now

Countering the insider threat

The insider threat is one of the hardest to defend against because, by definition, it involves people who are trusted and credentialed members of an organization. This whitepaper provides best practices to protect IT assets against untrustworthy insiders without impeding access to information.

FREE: Download Now

Rugged and Ready: Tablets are changing the way military trains and fights

The tablet PC is quickly becoming the preferred mobile device for combat personnel. This whitepaper will fill you in on their use in training and operations, and lay out the challenges that come with adoption.

FREE: Download Now

The brave new cloud

Fresh approaches to cloud computing, such as open hybrid clouds, continue to unlock new savings and capabilities for military planners. By embracing open-source coding, open hybrid clouds offer a flexible and secure solution that ensures data and app portability.

FREE: Download Now

Authorized personnel ONLY

Security remains a top priority as the Department of Defense transitions to a single, common global network known as the Joint Information Environment. This whitepaper explores how attribute-based access control could secure the JIE from threats such as the cross-pollination of data as well as malicious users.

FREE: Download Now

Seeing farther

The Navy's changing mission is driving an urgent need for visual intelligence (VI). As smaller vessels have become increasingly involved in the fight against piracy, for example, it's vital to get VI into the hands of the forward-deployed end user for timely, accurate decisions. This whitepaper examines the new and growing demand for VI, as well as the collection and exploitation of this data for maritime operations.

FREE: Download Now

The power of PaaS

The Department of Defense’s rapid transition to an enterprise architecture requires streamlined ways to develop and deploy a variety of applications. Platform as a service, or PaaS, offers a solution. Our whitepaper explains how PaaS simplifies and accelerates application development while reducing costs.

FREE: Download Now

Redefining ISR

In response to an increasingly unstable world and shrinking budgets, military planners are rethinking intelligence, surveillance and reconnaissance missions and systems. Legacy ISR and support infrastructures struggle to keep up with an increasingly mobile, information-driven military...

FREE: Download Now

Developing operational apps

Situational awareness for troops in tactical environments is undergoing a renaissance with capabilities such as mission command on the move and development of a common operating picture. Now comes the introduction of mobility to the battlefield, and, more importantly, the development of secure, location-based....

FREE: Download Now

Managing Massive Data

One of the key enablers for cloud computing, virtualization and the next-generation desktop in the military is data storage and data management across public, private and hybrid clouds. Data storage capabilities are particularly important for intelligence tools such as the Distributed Common Ground System programs at the Army, Air Force and Navy.

FREE: Download Now

Next-generation communications

The transition to next-generation telecommunications and IT infrastructure services is a complex and daunting task for both civilian and defense agencies. Technology is changing so rapidly that agencies need a portfolio of flexible contracts and services that will support smooth migration to future technologies while adhering to the major precepts of federal digital and IT reform strategies.

FREE: Download Now

Bridging the interoperability gap

Technology is solving many of the challenges tocommunications interoperability that have long stymied military planners. It takes a certain approach, however, to bridge the gap between systems and to incorporate legacy technologies alongside newer arrivals. Download this white paper to learn more.

FREE: Download Now

An enterprise enabler

Everyone knows stovepipes are bad, but nobody is quite sure how best to eliminate them. Bringing in large systems integrators is a common solution, but that strategy brings its own problems, often including a proprietary approach that prevents easy interfacing with other vendors; solutions.

FREE: Download Now

Collaborative GEOINT

New products are becoming available to make sense of the vast amounts of geospatial intelligence data, but formidable challenges remain to be met.

FREE: Download Now

Virtualization salvation

The evolution of converged virtual architecture is an outgrowth of efforts to do away with desktops in favor of more efficient, consolidated arrangements. The transition, however, is not always smooth. This white paper explains the cultural change and technology needed to avoid common pitfalls.

FREE: Download Now

Training digital warfighters

War fighting in the enterprise age includes complex cyber and communications systems, but the tactical edge is not a place to learn technical skills. To ensure troops have operational competency before their boots hit the dirt, the U.S. military is exploring innovative training and simulation tools.

FREE: Download Now

DoD's new acquisition model: Joint enterprise licensing

The U.S. military has been under tremendous pressure in recent years to streamline its often bloated buying processes. Now a new solution is coming to the fore. The emerging Joint Enterprise Licensing Agreement, or JELA, invites different branches of the Defense Department to...

FREE: Download Now

DoD embracing commercial clouds

The virtues of the cloud in general have been thoroughly praised: Flexibility, scalability, ease of maintenance and lower costs. Throw into the mix commercial cloud’s ready-made architecture, with crucial components already in place, and it’s not hard to understand what makes commercial solutions a tempting proposition to some.

FREE: Download Now

Countering the counter-UAS shortcomings

Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and smarming techniques increasingly serve as a means for adversaries to distract, to disorient, and disrupt.

FREE: Download Now

Assured PNT in a New Era of Warfare

Positioning, navigation and timing are of paramount importance to military operations across the services: Whether in the air, on land or at sea, the ability to navigate and strike precisely are more critical than ever. It’s a challenge Pentagon leaders say they are taking seriously – but what steps are they taking to safeguard PNT? This whitepaper examines what’s being done in the Army, Air Force, Navy and Marine Corps to ensure troops can find their way and deliver on mission requirements.

FREE: Download Now

Whitepapers are best viewed using Chrome, Firefox, or Safari.