While data and device encryption is the first line of defense, it is not impervious to attack, so diligent IT departments should take a layered and persistent approach to security.
Leveraging cutting-edge tools and platforms can be part of the solution for achieving fast, secure and scalable interoperability within the mission-critical legacy system.
The administration’s U.S. Digital Services Playbook outlines 13 “plays,” or high-level practices for effective applications. Here’s how government IT managers can move those plays into the field.
Although platform-as-a-service offerings can support application delivery, cloud computing and data center consolidation, many agencies aren't even considering it. Are integrators holding back PaaS?
The hybrid approach to cloud adoption is likely to continue to expand as public cloud usage in government accelerates and more integrators build turn-key solutions from a mash-up of multiple cloud services.
With open-source Drupal as the foundation of a defense-in-depth strategy, agency IT managers can analyze and identify potential threat vectors, including internal and external threats.
Before making the jump to the cloud, IT managers need to lay the groundwork, ensuring the right technology and security protocols are in place as well as a complete understanding of the regulatory issues affecting the project.
One of the biggest challenges agencies face today, besides the skyrocketing volume of email, is how to effectively retain and manage email records based on regulatory and legal requirements.
Already in use among a range of private enterprises and service providers today, Layer 1, 100 gigabit/sec encryption can give government network managers the ability to transport enormous volumes of data in the most secure manner possible.
In recent years, some progressive companies have hired a chief collaboration officer to help guide joint projects, partnerships and shared services. A CCO is a great idea, one that government agencies are starting to explore.