In June 2007, DISA awarded Defense Connect Online (DCO), a two-part Adobe Connect solution for collaboration and engagement across DoD global operations. Two different systems comprise the Adobe Connect implementation, one for the unclassified network, and one for the classified network. A pre-release version of DCO was tested over a five-month period and went live in April 2008, enabling deployed troops, supporting personnel, and military leaders to collaborate effortlessly across locations worldwide.
Read more about how DISA enabled secure collaboration with Adobe Connect.
Sponsored By Adobe
From the aggressive telework program of the U.S. General Services Administration to Georgia’s tax credits for private sector telecommuting programs, agencies at all levels of government are embracing telework for a variety of reasons. By leveraging Adobe technologies government employees are enabled to work anywhere, anytime—plus it makes them more productive and efficient working in the agency’s office.
Downlaod this whitepaper for more on Adobe's telework solutions
Sponsored By Adobe
The Economist Intelligence Unit in June 2012 conducted a global survey of senior executives to explore how organizations can accommodate rising demands for mobile access to business information while minimizing the security risks to proprietary data.
Sponsored By Cisco
While agencies have made some progress in moving to the cloud, many have done so tentatively, focusing on “safe” applications such as email and public-facing websites. But the time to move other applications and infrastructure to the cloud is now. The best way to ensure a safe path forward is by working with an experienced provider of cloud-based services—one that understands the unique security, interoperability and portability challenges that government agencies face.
Download this informative whitpaper for more on the advantages of a cloud service provider.
Sponsored By CenturyLink
This paper serves as a how-to for organizations in various stages of implementing the controls and offers two real-world examples of CSC adoption.
Sponsored By Tripwire
As attacks on agency networks and assets become ever more divergent and sophisticated, continuous monitoring will be a critical element in an organization’s cybersecurity strategy. But it’s not an easy thing to implement. Download this Q&A report for industry perspectives on the various elements of effective continuous monitoring, and why it’s not just one more technology program.
Sponsored By Knowledge Consulting Group, Tripwire, SolarWinds
GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the government’s overall yearly IT budget. But it’s facing uncertain times as the overall fiscal climate squeezes the resources GSA can devote to it, and competing vehicles such as agency GWACs loom in its mirror. Changes are coming to the venerable IT contract, and both users and vendors need to prepare. Download the contract guide now.
Sponsored By PCMG
Government agencies are getting serious about online collaboration tools because they see the opportunity to improve enterprise-wide information sharing, support real-time communications during a crisis, and to reduce the money they spend on large in-person meetings or conferences. A recent survey conducted by the 1105 Government Information Group shows that these and other potential benefits are leading many agencies to deepen their investment in collaboration tools and to make collaboration part of their organizational culture. Download this exclusive research report for more on collaboration trends in government.
Sponsored By Adobe
It’s critical to intimately know an application and what it’s requirements are in order for it to perform well. To establish that kind of performance baseline, you’ll need to know such things as who uses the application, where they use it from, how much network bandwidth it needs,and so on. This kind of information is needed for each application, both from the administrator and user point of view.
To get there, you’ll have to monitor the legacy production environment so you know both what makes the application perform consistently well, and how to monitor it. Then you’ll have to continuously monitor the application as changes are made to it and the environment it runs in so you can measure any negative effects on its performance.
Download this whitepaper for a new approach to IT monitoring.
Sponsored By SolarWinds
This datasheet covers DLT Solutions Storage-as-a-Service (STaaS). STaaS is a NetApp hardware, software and services solution that combines secure, available, and dedicated on-premise infrastructure with a pay-as-you-go model that requires zero capital investment.
Sponsored By DLT Solutions
Evolve or die. That’s the imperative guiding the development of cybersecurity technologies and strategies across government and industry. The ongoing evolution of the federal IT enterprise, extended in all directions by advances in networking and mobile technology, must be matched to similar advances in information and network security. But above all, the nature of the current cybersecurity threats requires a new way of thinking. The old approach to cybersecurity, which was based on defending the perimeter, cannot hold up against the wide array of cyber threats that agencies now face.
Download this special report for in-depth articles on infrastructure security.
Sponsored By CDW-G, Symantec
The last decade has seen the rise of crowd-sourced, activist-driven hacker groups.1 The term hacktivist has been coined to describe this group and refers to the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. Most notable of these hacktivist groups is Anonymous, a loose collective of individuals borne out of a cybersubculture that has gone mainstream.The goal of this paper is to provide a glimpse into the world of hacktivism and, more importantly, the group known as Anonymous.
Sponsored By immixGroup