Whitepapers


Blockchain: Distributed Ledger Holds Promise for Agencies

Blockchain is gaining traction among agencies as a way to create permanent, secure, and transparent transactions for numerous application beyond the original intent for which it was created. Blockchain is a shared, immutable, distributed ledger for recording transaction history. It is typically associated with the Bitcoin brand of digital currency, but it can be used for more than that. Download this informative report from a recent event titled "Blockchain Beyond Bitcoin: Transforming Government Security" to learn how some agencies such as the General Services Administration (GSA) have already reaped the benefits of a blockchain and other agencies such as the Department of Health and Human Services (HHS) and Customs and Border Protection (CBP) are still testing the waters as they iron out key management and privacy issues.


Security Execs, It's Time We Had The Integrity Talk

By nature of its definition, true integrity allows for no variance between something’s established value and its current state. For security executives, the meaning—and role—of integrity has been somewhat difficult to pin down and even more challenging to manage. Originally, integrity, as defined in the SANS Institute’s CIA Triad, was narrowly focused on organizational data and making sure that data remained unchanged by external sources. It was one of three components—Confidentiality, Integrity and Availability—viewed as critical to identifying and mitigating risk to the data. Unfortunately, most organizations tend to invest heavily in tools and processes that enable confidentiality and availability, while integrity is the least addressed component. Learn how to make the change in your organization and the benefits in this informative report.


Boost Cybersecurity with Identity as a Service

Agencies are starting to realize that identity and access management (IAM) is critical to the success of digital initiatives. In this enterprise outlook, we explore how to develop a strong IAM through cloud-based models and multi-factor authentication.


Millennials Compound Cybersecurity Concerns

Even as a more technologically savvy workforce is emerging at a time of digital innovation, the potential still exists for new and increased insider threats. Because of this cultural shift, government agencies are starting to adapt their views on security, and implementing new processes and solutions for mitigating evolving threats. Download this digital dialogue to learn more highlights from our recent cybersecurity webcast series.


The New Security Landscape: Identity-Driven Security

The traditional concept of security has changed dramatically and continues to change. Between the dissolving network perimeter, mobile devices, and running workloads on the cloud, the challenge of ensuring a consistent security posture requires a new approach. The focus has shifted to continuous monitoring of all network endpoints wherever they may exist and ensuring data protection by enforcing more thorough and consistent identity policies. Agencies must ensure people logging on to their network are truly who they claim to be. This Enterprise Outlook report “Identity-Driven Security” will help inform your choices and strategies as you navigate this changing security landscape.


The Case for Cloud WiFi

Over the years, the architecture of wireless local area networks (WLANs) has evolved to keep pace with changing wireless needs and updated 802.11 standards and amendments. As WLAN has become more critical and reliable, the concept of an all-wireless office is becoming a reality for many organizations.


The DMARC Challenge for Federal Agencies

On October 16, 2017 the Department of Homeland Security announced that it is requiring federal agencies to implement Domain-based Message Authentication Reporting and Conformance (DMARC) on their email-sending domains within 90 days. This directive is a step on the right track to help prevent email fraud, however agencies still have more progress to make.


Digital Transformation First, Then IT Modernization

Download this summary to access key highlights and takeaways from our recent event, “Digital Transformation: Laying the Foundation for IT Modernization” event in Washington, D.C., on Oct. 25, hosted by MetTel.


SD-WAN: Transform Your Agency

Many organizations across federal and state and local agencies are in need of a more reliable, more available and higher performing network. Download this whitepaper to learn about the benefits of SD-WAN powered by MetTel Federal and how it can provide an effective solution for your agency.


The Federal Cyber AI IQ Test

With the advent of cloud, IoT, and other next-gen technologies, the Federal government's digital footprint is growing at an exponential rate. But as the amount of data explodes, so does the number of cyber adversaries and vulnerabilities in our government’s networks. Read this report to learn more about cognitive security adoption trends and how it can help to protect your agency.


Take a Practical Approach to Modernization

As agencies modernize their IT systems to deliver better and more secure services, they must also devote equal attention to the management, workforce, and leadership aspects of modernization as they do the technology. Currently, there are several executive orders and reports motivating agencies to modernize their IT, beef up cybersecurity, and deliver improved mission results. Learn more about the practical approaches that can help agencies succeed with their IT modernization strategy.


Hybrid IT Supports Agency Modernization

As government agencies are looking to move their technology workloads to the cloud to bolster their security, they are still grappling with older legacy systems as well and the pressure to consolidate their data centers and improve security. Most are looking at a hybrid IT approach to enable them to move applications to the cloud while maintaining older legacy systems that are not yet ready to transition. The overall goal is to reduce infrastructure requirements to save money, exploit "as-a-service" capabilities, reduce application footprints and minimize its cyberattack surface.