What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download now...

CAC and PIV: Government Leading the Way into Mobile Security: Whitepaper

The Department of Defense has mandated that its Common Access Card (CAC), issued to military-connected personnel and contractors, be used to secure access to DoD networks and services from mobile devices such as smart phones and tablets. A similar directive could eventually come regarding the Personal Identity Verification (PIV) card issued to federal civilian employees. This leads to one very big question: what products and technologies are currently available to accomplish that goal? Read now to learn!

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

ITES-3H: The New Face of Defense Contracts: Whitepaper

The most recent iteration of the U.S. Army’s IT Enterprise Solutions contract—ITES-3H—is a notable step forward in the evolution of this contract. After the ITES-2H contract, originally award in 2014, was extended several times and had more than $1 billion added to its ceiling, it was time for a new format. Under ITES-3H, the contract is open to other defense agencies, although the Army is expected to account for the majority of the awards. This special report will present a series of articles explaining the evolution of ITES, the broad reaching impact of the new contract, its impact of cybersecurity, and what’s next for this contract format.


Mind the Gap Study - Oxford Economics: Asset

Discover how common application delays affect company performance in this study sponsored by Nimble Storage and produced in collaboration with Oxford Economics. Learn how to remove the frustration caused by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.