DoD Faces Risk

The adoption of NIST’s Risk Management Framework marks a sweeping cultural shift in DoD’s approach to IT security, with risk management its primary approach and an emphasis on continuous monitoring.

FREE: Download Now

©2016 Sightline Media Group. All rights reserved.

The big picture

Wide-area motion imagery technology is enabling regional persistent surveillance to mature, delivering the close-up detail that drives pinpoint action while simultaneously offering the big picture view that encompasses a complex situa­tion in its entirety.

FREE: Download Now

Embracing software-defined networking

The operations of physical networks are well-known, but virtual networks take a different kind of care and feeding. This whitepaper looks at management issues in virtual networks, especially as they affect military IT planners.

FREE: Download Now

Countering the insider threat

The insider threat is one of the hardest to defend against because, by definition, it involves people who are trusted and credentialed members of an organization. This whitepaper provides best practices to protect IT assets against untrustworthy insiders without impeding access to information.

FREE: Download Now

Rugged and Ready: Tablets are changing the way military trains and fights

The tablet PC is quickly becoming the preferred mobile device for combat personnel. This whitepaper will fill you in on their use in training and operations, and lay out the challenges that come with adoption.

FREE: Download Now

The brave new cloud

Fresh approaches to cloud computing, such as open hybrid clouds, continue to unlock new savings and capabilities for military planners. By embracing open-source coding, open hybrid clouds offer a flexible and secure solution that ensures data and app portability.

FREE: Download Now

Authorized personnel ONLY

Security remains a top priority as the Department of Defense transitions to a single, common global network known as the Joint Information Environment. This whitepaper explores how attribute-based access control could secure the JIE from threats such as the cross-pollination of data as well as malicious users.

FREE: Download Now

Seeing farther

The Navy's changing mission is driving an urgent need for visual intelligence (VI). As smaller vessels have become increasingly involved in the fight against piracy, for example, it's vital to get VI into the hands of the forward-deployed end user for timely, accurate decisions. This whitepaper examines the new and growing demand for VI, as well as the collection and exploitation of this data for maritime operations.

FREE: Download Now

The power of PaaS

The Department of Defense’s rapid transition to an enterprise architecture requires streamlined ways to develop and deploy a variety of applications. Platform as a service, or PaaS, offers a solution. Our whitepaper explains how PaaS simplifies and accelerates application development while reducing costs.

FREE: Download Now

Redefining ISR

In response to an increasingly unstable world and shrinking budgets, military planners are rethinking intelligence, surveillance and reconnaissance missions and systems. Legacy ISR and support infrastructures struggle to keep up with an increasingly mobile, information-driven military...

FREE: Download Now

Developing operational apps

Situational awareness for troops in tactical environments is undergoing a renaissance with capabilities such as mission command on the move and development of a common operating picture. Now comes the introduction of mobility to the battlefield, and, more importantly, the development of secure, location-based....

FREE: Download Now

Managing Massive Data

One of the key enablers for cloud computing, virtualization and the next-generation desktop in the military is data storage and data management across public, private and hybrid clouds. Data storage capabilities are particularly important for intelligence tools such as the Distributed Common Ground System programs at the Army, Air Force and Navy.

FREE: Download Now

Next-generation communications

The transition to next-generation telecommunications and IT infrastructure services is a complex and daunting task for both civilian and defense agencies. Technology is changing so rapidly that agencies need a portfolio of flexible contracts and services that will support smooth migration to future technologies while adhering to the major precepts of federal digital and IT reform strategies.

FREE: Download Now

Bridging the interoperability gap

Technology is solving many of the challenges tocommunications interoperability that have long stymied military planners. It takes a certain approach, however, to bridge the gap between systems and to incorporate legacy technologies alongside newer arrivals. Download this white paper to learn more.

FREE: Download Now

An enterprise enabler

Everyone knows stovepipes are bad, but nobody is quite sure how best to eliminate them. Bringing in large systems integrators is a common solution, but that strategy brings its own problems, often including a proprietary approach that prevents easy interfacing with other vendors; solutions.

FREE: Download Now

Collaborative GEOINT

New products are becoming available to make sense of the vast amounts of geospatial intelligence data, but formidable challenges remain to be met.

FREE: Download Now

Virtualization salvation

The evolution of converged virtual architecture is an outgrowth of efforts to do away with desktops in favor of more efficient, consolidated arrangements. The transition, however, is not always smooth. This white paper explains the cultural change and technology needed to avoid common pitfalls.

FREE: Download Now

Training digital warfighters

War fighting in the enterprise age includes complex cyber and communications systems, but the tactical edge is not a place to learn technical skills. To ensure troops have operational competency before their boots hit the dirt, the U.S. military is exploring innovative training and simulation tools.

FREE: Download Now

DoD's new acquisition model: Joint enterprise licensing

The U.S. military has been under tremendous pressure in recent years to streamline its often bloated buying processes. Now a new solution is coming to the fore. The emerging Joint Enterprise Licensing Agreement, or JELA, invites different branches of the Defense Department to...

FREE: Download Now

DoD embracing commercial clouds

The virtues of the cloud in general have been thoroughly praised: Flexibility, scalability, ease of maintenance and lower costs. Throw into the mix commercial cloud’s ready-made architecture, with crucial components already in place, and it’s not hard to understand what makes commercial solutions a tempting proposition to some.

FREE: Download Now

Countering the counter-UAS shortcomings

Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and smarming techniques increasingly serve as a means for adversaries to distract, to disorient, and disrupt.

FREE: Download Now

Assured PNT in a New Era of Warfare

Positioning, navigation and timing are of paramount importance to military operations across the services: Whether in the air, on land or at sea, the ability to navigate and strike precisely are more critical than ever. It’s a challenge Pentagon leaders say they are taking seriously – but what steps are they taking to safeguard PNT? This whitepaper examines what’s being done in the Army, Air Force, Navy and Marine Corps to ensure troops can find their way and deliver on mission requirements.

FREE: Download Now

Whitepapers are best viewed using Chrome, Firefox, or Safari.

IoT and ISR

The Internet of Things on the battlefield isn’t a new concept, but there are evolving ways of applying sensor connectivity to the military theater. So far IoT in warfare is largely centered on areas such as unmanned vehicles, troop health and energy management, but now military officials and leaders in industry are looking at ways to apply IoT in intelligence, surveillance and reconnaissance operations.

FREE: Download Now

Modernizing Military IT

With a vast network of aging infrastructure and systems, the Defense Department is looking to harness cutting-edge, transformative technologies that can modernize communications and deliver mission success. Increasingly those technologies are coming from the commercial sector, where companies have invested billions in cybersecurity and IT infrastructure.

FREE: Download Now

A Closer Tie: Upgrades to Link 16


Across the Department of Defense, leaders are studying how to maximize the benefits of multi-domain operations. In other words, using assets in sea, air, space, land and cyber to best create an environment of information dominance. But to do this requires a high degree of interoperability and seamless communication. One key tool in this new environment is the Link 16 data link. Link 16 provides a secure, jam-resistant, high speed digital data link.

FREE: Download Now

Path to Persistence: Machine Learning


In this three-part tech brief, we will explain three ways the Department of Defense and the Intelligence Community can improve persistence. Part 1, Machine Learning:  In this section, we will explore how analytics can help process information such as satellite imagery or flood maps at speeds orders of magnitude faster than traditional analysts and the advantage this brings. This piece will also explain how to train systems to improve their results.  

FREE: Download Now

Path to Persistence: Data Management



In this three-part tech brief, we will explain three ways the Department of Defense and the Intelligence Community can improve persistence. Part 2, Data Management: The DoD is collecting scores of data at an unprecedented rate. But without the right systems is place, that data is of little value. In this section, we will discuss the importance of data management and the best practices to ensure that all of this information creates an opportunity for national security leaders.

FREE: Download Now

Path to Persistence: SAR & hyper spectral imaging


Part 3, SAR & hyperspectral imaging: SAR and hyperspectral sensors are gaining interest from DoD users who see a value in adding them to their platforms. In particular, this imagery can provide a greater level of specificity of what it’s viewing – think building materials -  and can be used to view objects through clouds or darkness. In this section, we will explain how these types of imagery can help lead to improved intelligence and help lead to greater persistence.

FREE: Download Now

SEEING CLEARLY: HOW IMPROVED DATA MANAGEMENT CAN DRIVE ARMY ISR


In this whitepaper, we explain the challenge the Army faces in the current data environment, especially on the battlefield, discuss how data management technology has led to improvements in other industries and explore the possibilities and benefits this could bring for the service and its troops.

FREE: Download Now

Protecting the U.S. Military From GPS Jamming and Spoofing

U.S. military forces are facing a proliferation of GPS signal jamming and spoofing. GPS powers everything from precision guided weapons to navigation to timing. As such, the Pentagon wants to maintain this information advantage. Defense Department leaders need to take new steps to ensure position, navigation and timing capabilities are always available.

FREE: Download Now

How DevSecOps and Kubernetes Can Help Transform the Pentagon

This whitepaper explores the Pentagon’s demand for faster software development, containerization and container management, kubernetes getting containers under control and enabling DevSecOps, how DoD is implementing DevSecOps and using kubernetes, putting kubernetes on F-16s, and more.

FREE: Download Now

Why powerful networks are essential to the U.S. military’s information advantage

Learn more  more about establishing the information advantage, the infrastructure necessary to support ISR, and the future of ISR Networks.

FREE: Download Now