Configuresoft powers S.C. National Guard

Because spreading configuration changes through a network is one of the most time-consuming tasks administrators face, software that automates the process is a valuable item.

Officials at Configuresoft Inc., a small company in Woodland Park, Colo., hope federal agencies will find their offerings as compelling as commercial clients do. A few government agencies already use their Enterprise Configuration Manager and Security Update Manager.

"We're just getting our act together" with the government market, said Alex Goldstein, the company's chief executive officer.

Saved time is the value of both products, said Capt. David McNamee, secu-rity manager for the South Carolina Army National Guard. He bought Security Update Manager when there were no good tools for sending hot patches to machines on a network. Because the guard covers the whole state, sending technicians out to manually update each of its 2,000 computers takes about six weeks.

"That's the way we used to have to do it," he said.

After working with the security product, McNamee learned about Configuresoft's main offering: Enterprise Configuration Manager. The National Guard implemented the system and used it to upgrade the network servers from Microsoft Corp.'s Windows NT to XP. The system allowed network managers to assess computers on the network from a single location, even if the computer was located across the state.

"It helped us find which machines needed to be washed out," he said. "Some of the old machines didn't have enough memory to function properly with XP installed."

Businesses and agencies are likely to continue to demand configuration software for some time, said Dana Gardner, an analyst of application infrastructure and software platforms for the Yankee Group in Boston.

Manually updating systems can account for 80 percent of the cost of any upgrade project, he said. "A solution where you can configure and automate [the spread] makes a lot of sense."

Configuration errors account for many security weaknesses, said Randy Streu, Configuresoft's vice president of product development.

"The machine's not patched, or you've left services running that shouldn't be," Streu said. "People just do things to their machines that break them."

By definition, networked computers don't run in isolation, he added. The company's software can track gradual changes as computers interact with one another, and it can guide network administrators to keep the computers properly set.

"They know what they want on their machines," he said. "They spend a lot of time getting their machine ready, then they stick it out into the real world and it begins to change over time."

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group