FedTech - Technology Solutions That Drive Government https://fedtechmagazine.com/rss.xml en How Agencies Can Optimize Their Data Centers via Hybrid IT https://fedtechmagazine.com/article/2018/02/how-agencies-can-optimize-their-data-centers-hybrid-it <span>How Agencies Can Optimize Their Data Centers via Hybrid IT</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_F_Wong-Hero.jpg" width="1440" height="560" alt="David Rubin of DOJ " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/22/2018 - 08:15</span> <div><p>The <a href="https://www.justice.gov/">Justice Department</a> continues to own and manage its own data centers because of the sensitive nature of its work, but the agency is also <strong>taking advantage of the secure commercial cloud</strong>.</p> <p>DOJ has adopted public cloud services such as <a href="https://www.cdwg.com/content/cdwg/en/brand/microsoft.html">Microsoft</a> <a href="https://www.cdwg.com/content/brands/microsoft/office365.aspx">Office 365</a> (for email and collaboration) and <a href="https://www.cdwg.com/product/Box/3378789?enkwrd=Box">Box</a> (for online file storage and sharing).</p> <p>Some of the agency’s components have also <strong>migrated mission-critical applications to government-only cloud providers</strong> that meet stringent security and availability requirements.</p> <p><strong>Some applications and data are still kept in-house</strong>, however, because of the security level of the information.</p> <p><strong>“There’s no one-size-fits-all,”</strong> says David Rubin, the department’s director for service engineering. “We are continually evolving and assessing the best way to house data. Where it makes sense, we will move to the cloud.”</p> <p>The information that remains under agency control often lives on <strong>consolidated data centers that have been made as efficient as possible</strong>. That’s required by <a href="https://obamawhitehouse.archives.gov/sites/default/files/omb/memoranda/2016/m_16_19_1.pdf">the Data Center Optimization Initiative</a>.</p> <p>Federal IT leaders are deploying <strong>virtualization</strong> and technologies such as <a href="https://fedtechmagazine.com/article/2017/12/gsa-gives-agencies-more-options-modernize-data-centers-hyperconvergence">hyperconverged</a><a href="https://fedtechmagazine.com/article/2017/12/gsa-gives-agencies-more-options-modernize-data-centers-hyperconvergence"> IT infrastructure</a> to save space and reduce power and cooling costs.</p> <p>“We are constantly fine-tuning efficiencies and looking to <strong>increase virtualization density on our hardware to get the most performance and power efficiency out of the same space</strong>,” says Matt Conner, CISO for the National Geospatial-Intelligence Agency (NGA).</p> <p><a href="https://fedtechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP</strong>: Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Social Security Administration Embraces Hybrid Cloud </h2> <p>Federal IT leaders use different criteria to determine whether to move workloads to the cloud or keep them in-house. The decision depends on circumstances, such as an agency’s mission, performance requirements and economics, they say.</p> <p>The <a href="https://www.ssa.gov/">Social Security Administration</a>, for example, has <strong>fully consolidated into two main data centers, but it’s still trying to improve optimization</strong>. One way to do that is to implement a <strong>hybrid cloud</strong>, says CIO Rajive K. Mathur.</p> <p><img alt="FT_Q118_F_Wong-quote.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_F_Wong-quote.jpg" /></p> <p>Some SSA applications<strong> already run in a commercial cloud</strong>. But the department is also building <strong>a private, on-premises cloud and plans to begin using an additional commercial cloud provider</strong> and services (<a href="https://www.cdwg.com/content/brands/azure/default.aspx">Microsoft Azure </a>and Office 365) by the end of fiscal 2018, Mathur says.</p> <p>Many applications and data will stay in the SSA’s private cloud for better performance, he says.</p> <p>“The main driver for deciding which cloud an application fits in will be the <strong>proximity to the data</strong>,” Mathur says. “Many of our applications will continue to interface with legacy applications and data that may not tolerate the added latency of connecting to an off-premises cloud.”</p> <h2>NSA Aims to Make Its Clouds Secure</h2> <p>The National Security Agency has embraced the hybrid cloud and has no qualms about <strong>using a public provider for unclassified work when it’s complemented by </strong><strong>appropriate</strong><strong> network and security monitoring</strong>.</p> <p>For classified work, the NSA uses a combination of <strong>government-only variants of commercial clouds designed for the intelligence community’s secret and top secret information</strong>, such as one sponsored by the CIA, as well as <strong>unique NSA-built, secure private clouds.</strong></p> <p>These cloud variants are protected by <strong>high-grade cryptography and security solutions</strong> designed to isolate national security systems from the rest of the world, says NSA CIO Greg Smithberger.</p> <p>“We are trying to get the same benefits of leveraging the commercial technology as aggressively as we can while maintaining our security boundaries,” he says.</p> <p>The agency uses government-only variants of commercial utility clouds for applications, such as administrative and training modules, which spike in usage at certain predictable periods. The agency can <strong>spin capacity up or down when needed</strong>, Smithberger says.</p> <p><strong>But not everything can go off-premises.</strong> For example, the NSA has created <strong>private, secure cloud services that provide data analytics for itself and other agencies in the intelligence community</strong>. And sometimes it’s more affordable to keep apps and data in-house.</p> <p>“For applications that are running at full bore all the time with no down period, it may not be cost-effective to implement in an external cloud. When you operate at the scope and scale of the NSA, you can buy the hardware and run it as cheaply yourself,” Smithberger says.</p> <h2>Agencies Take Steps to Optimize Data Centers</h2> <p>Agency IT leaders say data center optimization is a continuous work in progress. The SSA, for example, is <strong>optimizing its two data centers beyond building a private cloud</strong>.</p> <p>The agency is currently deploying an <strong>all-flash, Tier 1 storage system</strong>, which will provide faster performance and <strong>reduce energy and cooling requirements by 30 to 40 percent </strong>compared with hard-disk systems, Mathur says.</p> <p><img alt="FT_Q118_F_Wong-elpunto_0.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_F_Wong-elpunto_0.jpg" /></p> <p>The agency also is implementing a data center infrastructure management tool to automatically collect and report data on power usage effectiveness, energy metering, facility utilization, virtualization and server utilization.</p> <p>To further boost efficiency, SSA is installing <strong>a hot-aisle containment solution and increasing the computer room air handler temperature to improve PUE</strong>. It also plans to raise the temperature of the chilled water it uses for cooling.</p> <p>“We feel we have made significant progress modernizing and optimizing our data center infrastructure,” Mathur says.</p> <h2>DOB Moves to Close Data Centers</h2> <p>The DOJ has made steady progress with its consolidation effort. The department, which <strong>started with 110 data centers</strong>, is on track to consolidate to <a href="https://fedtechmagazine.com/article/2017/11/fbi-wants-consolidate-its-data-centers-so-it-launching-new-one">three core enterprise data centers by fiscal 2019</a>. It has already <strong>closed 78 data centers and is working to eliminate the remaining 29</strong>, Rubin says.</p> <p>Today, most systems are virtualized. While closing data centers, the <strong>DOJ is making sure it’s not just moving hardware</strong>.</p> <p>An in-house DOJ team <strong>prioritizes cloud migration</strong> and makes an assessment to see if applications and data can go to <strong>a more secure, government-only cloud service</strong>. If not, the team makes sure servers and storage are fully utilized during the migration to a core data center.</p> <p>“The goal is not to forklift a rack of equipment and drop it in there,” Rubin says. “We want to maximize everything we can within a rack and not have a less utilized server sitting by itself. So, we explore ways to <strong>optimize through virtualization, moving it to the cloud or to a shared environment</strong>.”</p> <div class="sidebar_wide"> <h3>Going Cloud Is a Long-Term Effort at NGA</h3> <p>Federal IT leaders say moving applications to the cloud isn’t always an easy, seamless transition. It takes planning, and in some cases, engineering and development work.</p> <p>Two years ago, for example, the NGA wanted to further <strong>optimize its IT infrastructure by assessing which applications should stay in-house and which could transition to the cloud</strong>, says Percival Jacobs, NGA’s chief of data center services.</p> <p>The NGA takes advantage of <strong>commercial cloud services, including a government-only cloud for the intelligence community</strong>. It also has <strong>significantly consolidated the number of core data centers it runs</strong> and has other noncore data centers around the world to meet mission requirements.</p> <p>The first step in its cloud migration was to <strong>take inventory of its applications</strong>. NGA’s IT team discovered that traditional business apps could easily migrate to the cloud, Jacobs says. But they found that mission-oriented apps were more complex. One strategy is to <strong>modernize the applications and partially or completely rewrite their software for the cloud</strong>, says NGA CISO Matt Conner.</p> <p>“We will do more engineering and studies on this,” Jacobs says.</p> </div> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Data Center</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7446" hreflang="en">Engagement</a></div> </div> <div> <div>Content Length</div> <div>Over 1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/07/agriculture-department-uses-hybrid-it-model-speed-field-data-processing"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201707/FedTech--USDA2.jpg?itok=w0eum8zy" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2017/07/agriculture-department-uses-hybrid-it-model-speed-field-data-processing"><span>Agriculture Department Uses Hybrid IT Model to Speed Field Data Processing </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/07/hybrid-it-gives-agencies-options-they-streamline-data-centers"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201707/FedTech--DataCenterHybrid-.jpg?itok=1kZu5lLg" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2017/07/hybrid-it-gives-agencies-options-they-streamline-data-centers"><span>Hybrid IT Gives Agencies Options as They Streamline Data Centers</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/04/social-security-administration-hud-see-promise-hybrid-cloud"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/TechTrends-final.jpg?itok=FIaFlCBx" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/cloud">Cloud</a> </h2> <header class="link-node"> <a href="/article/2016/04/social-security-administration-hud-see-promise-hybrid-cloud"><span>Social Security Administration, HUD See Promise in Hybrid Cloud</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/how-agencies-can-optimize-their-data-centers-hybrid-it" data-title="For federal agencies like @TheJusticeDept and @NSAGov that have to keep some workloads in-house for #cybersecurity reasons, a #hybridIT approach delivers the best of both worlds:" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/how-agencies-can-optimize-their-data-centers-hybrid-it" data-title="For federal agencies like @TheJusticeDept and @NSAGov that have to keep some workloads in-house for #cybersecurity reasons, a #hybridIT approach delivers the best of both worlds:" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Ftaxonomy%2Fterm%2F810%2Ffeed" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/how-agencies-can-optimize-their-data-centers-hybrid-it" data-title="For federal agencies like @TheJusticeDept and @NSAGov that have to keep some workloads in-house for #cybersecurity reasons, a #hybridIT approach delivers the best of both worlds:" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>22</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/wylie-wong"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/wylie-wong.jpg?itok=gph_Y-uT" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/wylie-wong"> <div>Wylie Wong</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=WylieWong&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Wylie Wong is a freelance journalist who specializes in business, technology and sports. He is a regular contributor to the CDW family of technology magazines.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40426"></a></p> <p class='speaker'> </p> </div> </div> Thu, 22 Feb 2018 13:15:17 +0000 phil.goldstein_6191 40426 at https://fedtechmagazine.com Eye-Tracking Tech Delivers New Insights to TSA, NOAA and the VA https://fedtechmagazine.com/article/2018/02/eye-tracking-tech-delivers-new-insights-tsa-noaa-and-va <span>Eye-Tracking Tech Delivers New Insights to TSA, NOAA and the VA </span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_ITF_Shapiro-Hero.jpg" width="1440" height="560" alt="Airport security " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 02/21/2018 - 12:50</span> <div><p>During training, <a href="https://www.tsa.gov/">Transportation Security Administration</a> screeners watch images of baggage contents move across a computer monitor — as they do at airport checkpoints — to <strong>identify potential threats, such as a knife or explosive detonator</strong>.</p> <p>If the screeners miss something, TSA evaluators have to rely on them to recall where they were looking when the item passed by — <strong>but the screeners may not remember</strong>.</p> <p>Now, new <strong>eye-tracking technology</strong> implemented at eight airports this year <strong>gives trainers “the capability to view the previously unobservable,” </strong>says Darren Wilson, who oversees the program for the <a href="https://www.dhs.gov/">Department of Homeland Security</a>.</p> <p><a href="https://fedtechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP</strong>: Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <p>Called <a href="https://www.dhs.gov/publication/screenadapt-system-fact-sheet">ScreenADAPT</a>, the new technology <strong>monitors screeners as they scan for threats</strong>, letting TSA trainers know <strong>where the screeners were focused when the potential hazard appeared and helping them determine why it was missed</strong>. ScreenADAPT <strong>calculates a trainee’s errors and adjusts the images to hone those skills.</strong></p> <p>“The system automatically adapts to see the type of training needed,” Wilson says. “If they miss guns, they’re going to see more guns. If they miss knives, they’re going to see more knives.”</p> <p><img alt="FT_Q118_ITF_Shapiro-elpunto.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_ITF_Shapiro-elpunto.jpg" /></p> <p>The tracker, attached to the bottom of a computer monitor, <strong>uses a low-frequency beam to capture the image at the back of the eye</strong>. It then uploads that information to software that <strong>shows where the screener was looking, how long the screener’s eye was fixed on any item and how it scanned across the image</strong>.</p> <p>Eye-tracking technology offers a number of valuable uses. Federal agencies are implementing this technology for tasks as diverse as <strong>improving healthcare and boosting weather analysis</strong>.</p> <h2>A Wide Range of Uses for Eye-Tracking Tech </h2> <p>Such customized training has led to improved performance, Wilson says. One agency study found that screeners trained on the technology identified threats and cleared bags 45 percent faster than with previous programs.</p> <p>In the National Oceanic and Atmospheric Administration’s National <a href="https://www.nssl.noaa.gov/">Severe Storms Laboratory</a>, researchers <strong>added eye tracking to help analyze meteorologists’ attention patterns during weather events</strong>. The lab’s technology sampled 300 eye movements per second, says Katie Wilson, a scientist at the lab’s <a href="http://cimms.ou.edu/">Cooperative Institute for Mesoscale Meteorological Studies</a>.</p> <p>“When somebody fixates, that’s important. That’s when somebody is extracting information,” she says.</p> <p>Researchers with the <a href="https://www.va.gov/">Department of Veterans Affairs</a> found that eye tracking could <strong>identify brain injury by assessing patients’ eye movements during a short film</strong>. Swelling in an injured brain can cause abnormal eye movement.</p> <p>“Eye tracking enables us to detect brain injury that was previously not detectable,” says Dr. Uzma Samadani, head of traumatic brain injury research at <a href="https://www.hcmc.org/">Hennepin County Medical Center</a> in Minnesota.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>300-500 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node--view-mode-teaser"> <div class="content"> <a href="/article/2018/01/next-biometric-authentication-method-disa-your-gait"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201801/FedTech--Biometrics2018.jpg?itok=-s7bilvT" width="124" height="94" alt="Biometrics and iris scanning " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2018/01/next-biometric-authentication-method-disa-your-gait"><span>The Next Biometric Authentication Method for DISA? Your Gait</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/06/cbp-moves-ahead-biometric-exit-detection-technology"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201706/FedTEch--FacialRecognition.jpg?itok=Hf7SLVQD" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/06/cbp-moves-ahead-biometric-exit-detection-technology"><span>CBP Moves Ahead with Biometric Exit Detection Technology </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/08/fbis-biometric-center-excellence-peers-future-id-technology"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/Q0316-FT-Gittlen_hero.jpg?itok=Z4G7plWU" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/business-intelligence">Business Intelligence</a> </h2> <header class="link-node"> <a href="/article/2016/08/fbis-biometric-center-excellence-peers-future-id-technology"><span>The FBI’s Biometric Center of Excellence Peers into Future of ID Technology</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/eye-tracking-tech-delivers-new-insights-tsa-noaa-and-va" data-title="How eye-tracking #tech helps @TSA, @NOAA and @DeptVetAffairs innovate in their missions. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/eye-tracking-tech-delivers-new-insights-tsa-noaa-and-va" data-title="How eye-tracking #tech helps @TSA, @NOAA and @DeptVetAffairs innovate in their missions. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Ftaxonomy%2Fterm%2F8446%2Ffeed" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/eye-tracking-tech-delivers-new-insights-tsa-noaa-and-va" data-title="How eye-tracking #tech helps @TSA, @NOAA and @DeptVetAffairs innovate in their missions. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>21</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/carolyn-shapiro"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/Carolyn%20Shapiro%20headshot.jpg?itok=jAl8Kga-" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/carolyn-shapiro"> <div>Carolyn Shapiro</div> </a> </div> <div class="author-bio"> <p> <div><p>Carolyn Shapiro is a freelance journalist based in Burlington, Vt., with expertise in covering business and technology, health and science, consumer issues and the food industry.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40421"></a></p> <p class='speaker'> </p> </div> </div> Wed, 21 Feb 2018 17:50:12 +0000 phil.goldstein_6191 40421 at https://fedtechmagazine.com It's Time to Question Longstanding Password Security Best Practices https://fedtechmagazine.com/article/2018/02/its-time-question-longstanding-password-security-best-practices <span>It&#039;s Time to Question Longstanding Password Security Best Practices</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_SecSave_Chapple-Hero.jpg" width="1440" height="560" alt="A password in a vice " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 02/21/2018 - 12:05</span> <div><p><strong>Nobody likes password policies. </strong>IT leaders dislike reminding users to yet again change their passwords, then <strong>bracing for an onslaught of angry help desk calls</strong>. Users dread coming up with yet another <strong>obscure combination of uppercase and lowercase letters, symbols </strong><strong>and</strong><strong> digits</strong> that they can remember for the next 90 days. It’s an unpleasant experience all around.</p> <p>But there’s good news for those frustrated by unwieldy password practices. Cybersecurity professionals are now turning toward new<strong> policies that embrace the end user to make security a natural habit</strong>. These ideas are bolstered by <strong>recent changes in federal security guidelines related to password management</strong>.</p> <p><a href="https://fedtechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP</strong>: Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Rethink Password Expiration Policies</h2> <p>Cybersecurity professionals across the country are suddenly changing their tune when it comes to password security. After decades of requiring that individuals constantly change passwords, some organizations are <strong>abolishing password expirations altogether</strong>. This change in policy is often accompanied by the deployment of <a href="https://fedtechmagazine.com/article/2016/07/how-government-will-focus-multifactor-authentication">multifactor authentication systems</a>, which further bolster security. But regardless of other security measures,<strong> evidence suggests that agencies’ security posture may not be improved much by maintaining policies that require frequent password changes</strong>.</p> <p><a href="http://people.scs.carleton.ca/~paulv/papers/expiration-authorcopy.pdf">Computer scientists at Carleton University</a> studied password expiration policies and concluded that the security advantage is “relatively minor at best, and questionable in light of relative costs.” <a href="https://www.cylab.cmu.edu/_files/pdfs/tech_reports/CMUCyLab13013.pdf">A study of users at Carnegie Mellon University</a> reinforced this finding when it discovered that <strong>users who are annoyed by the institution’s password policy are 46 percent more likely to have guessable passwords than their counterparts</strong>.</p> <p>The research also revealed that users who are forced to change their passwords often do so by <strong>altering the existing password using a systematic method, such as adding a digit at the end</strong>. This technique is <strong>unlikely to fool an intelligent adversary</strong>.</p> <p><img alt="FT_Q118_SecSave_Chapple-elpunto.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_SecSave_Chapple-elpunto.jpg" /></p> <p>The first reaction of many IT managers facing the end of password expiration policies is to express concern about regulatory compliance. Agency staff may be surprised to learn that <strong>federal guidelines actually support this direction</strong>. In June 2017, the <a href="https://www.nist.gov/">National Institute of Standards and Technology</a> released <a href="https://pages.nist.gov/800-63-3/sp800-63b.html#reqauthtype">new digital identity guidelines</a> that dramatically alter federal thinking about passwords. The guidelines specifically address password changes, stating that <strong>agencies “SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically).”</strong></p> <h2>Reconsider What Makes a Password Strong</h2> <p>The NIST guidance on passwords also proposes other user-friendly password requirements. While stating that agencies should <strong>continue to require a minimum password length of eight characters</strong>, it suggests <strong>allowing a maximum length of at least 64 characters</strong>. It also requires that agencies check new passwords <a href="https://cry.github.io/nbp/">against lists of known bad passwords</a>, such as those involved in prior compromises.</p> <p>From there, it delivers advice that will be music to the ears of most users: <strong>Agencies “SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters).” </strong>Gone are the days of trying to find a way to cram uppercase letters, symbols and digits into short eight- character passwords.</p> <p>The guideline for maximum password length supports two important security practices. First, it <strong>encourages users to </strong><strong>adopt</strong><strong> easily remembered long passphrases in lieu of traditional short, complex passwords</strong>. Second, it <strong>encourages the use of password management software </strong>designed to allow users to easily create long, complex and unique passwords for each of their accounts.</p> <p><img alt="FT_Q118_SecSave_Chapple-quote.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_SecSave_Chapple-quote.jpg" /></p> <p>These software packages provide user-friendly features, such as<strong> allowing users to cut and paste passwords directly into applications and even providing automatic login capability for many web-based applications</strong>. The packages increase security by <strong>removing friction from the authentication process</strong>, making it easy for users to do the secure thing.</p> <p>Password security remains an important component of any agency’s security program. The new views held by <strong>cybersecurity experts make password security mechanisms more secure by being user-friendly</strong>. Agencies should consider moving away from the onerous practices that encourage users to find security-compromising work-arounds and adopt policies that make secure habits the natural and easy choice.</p> <div class="sidebar_wide"> <h3>Multifactor Authentication Adoption Grows</h3> <p>No matter how complex passwords become, they remain<strong> a security mechanism subject to social engineering, network eavesdropping </strong><strong>and</strong><strong> similar attacks</strong>. Multifactor authentication technology is gaining traction in the public and private sectors as a strong way to enhance security.</p> <p>Among federal agencies, <strong>2016 was a banner year for the adoption of multifactor authentication in the form of Personal Identity Verification (PIV) smart cards</strong>. According to <a href="https://www.hhs.gov/sites/default/files/fy_2016_fisma_report%20to_congress_official_release_march_10_2017.pdf#page=14">a presidential report</a>, adoption among federal employees <strong>grew from 62 percent in 2015 to 81 percent in 2016</strong>, nearing the governmentwide target of 85 percent adoption.</p> <p>Adding smart card capabilities to authentication systems enhances security by <strong>moving from a system that requires only knowledge of a fact (the user’s password) to possession of a physical item (the PIV card)</strong>. This shift dramatically reduces the effectiveness of social engineering and eavesdropping attacks and promises to significantly reduce security incidents.</p> </div> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/11/why-identity-service-might-make-remembering-passwords-thing-past"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201711/FT_Q417_F_Tech-Trends-Hero.jpg?itok=MyxWev-V" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/11/why-identity-service-might-make-remembering-passwords-thing-past"><span>Why Identity as a Service Might Make Remembering Passwords a Thing of the Past</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/07/doj-moves-get-rid-passwords-oktas-single-sign"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201707/FedTech--Password.jpg?itok=TGdzOjGi" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/cloud">Cloud</a> </h2> <header class="link-node"> <a href="/article/2017/07/doj-moves-get-rid-passwords-oktas-single-sign"><span>DOJ Moves to Get Rid of Passwords via Okta’s Single Sign-On</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2015/11/nist-considers-dropping-use-passwords"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/authentication2_0.jpg?itok=lQTM3vMn" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2015/11/nist-considers-dropping-use-passwords"><span>NIST Considers Dropping Use of Passwords </span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/its-time-question-longstanding-password-security-best-practices" data-title="As #phishing threats evolve, it’s time to rethink how we manage passwords. @usnistgov says #FedIT does not need to change them arbitrarily. #cybersecurity" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/its-time-question-longstanding-password-security-best-practices" data-title="As #phishing threats evolve, it’s time to rethink how we manage passwords. @usnistgov says #FedIT does not need to change them arbitrarily. #cybersecurity" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Ftaxonomy%2Fterm%2F8441%2Ffeed" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/its-time-question-longstanding-password-security-best-practices" data-title="As #phishing threats evolve, it’s time to rethink how we manage passwords. @usnistgov says #FedIT does not need to change them arbitrarily. #cybersecurity" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>21</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/mike-chapple"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/mike_chapple_updated.jpg?itok=PSiizevj" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/mike-chapple"> <div>Mike Chapple</div> </a> </div> <div class="author-bio"> <p> <div><p>Mike Chapple is associate teaching professor of IT, analytics and operations at the University of Notre Dame. </p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40416"></a></p> <p class='speaker'> </p> </div> </div> Wed, 21 Feb 2018 17:05:00 +0000 phil.goldstein_6191 40416 at https://fedtechmagazine.com Review: The Toshiba Portégé X20W Plays Many Roles for Feds https://fedtechmagazine.com/article/2018/02/review-toshiba-portege-x20w-plays-many-roles-feds <span>Review: The Toshiba Portégé X20W Plays Many Roles for Feds </span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_PR_Breeden_Toshiba-Hero.jpg" width="1440" height="560" alt="Toshiba Portégé X20W" typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 02/20/2018 - 11:18</span> <div><p>According to federal procurement data, the <a href="https://www.cdwg.com/content/brands/toshiba/default.aspx">Toshiba</a> Portégé line of laptops has maintained a presence within federal agencies, <strong>including the Army, State Department </strong><strong>and</strong><strong> NASA, for many years</strong>. Sturdy, portable and secure, the Portégé line has offered much to users. The new <a href="https://www.cdwg.com/shop/products/Toshiba-Portege-X20W-D1252-12.5in-Core-i5-7200U-8-GB-RAM-256-GB-SSD/4433043.aspx?pfm=srh">Toshiba Portégé X20W</a> takes that rich history and <strong>adds more functionality and features, enabling agencies to do more with fewer resources</strong>.</p> <p>A key addition to the X20W is a sturdy, 360-degree dual-action hinge. The screen doubles over and locks on the far side of the keyboard, <strong>creating a tablet</strong>. The Portégé is <strong>preconfigured to operate in tabletop and presentation mode</strong>, or to flip its display so PowerPoint presentations look correct to an audience.</p> <p>The Portégé’s display, a 12.5-inch multitouch LED configured in 16:9 wide-screen, looks great with its 2 million pixels and Full HD 1920x1080 native resolution. Testing revealed <strong>highly accurate colors</strong>, within 2 percent of true, unaffected by the Corning Gorilla Glass 4 composite that comprises and protects the clear part of the display.</p> <p><a href="https://fedtechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP</strong>: Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Portégé's Security Tools Prevent Intrusions</h2> <p>Toshiba has packed a lot of security into the tiny notebook. Out of the box, the X20W offers both<strong> facial recognition technology and a fingerprint reader</strong> — dual-factor authentication that can prevent unauthorized access. When coupled with traditional password protection, it <strong>makes for triple authentication that is easy and fast to set up and maintain</strong>. A Trusted Platform Module chip <strong>ensures internal components haven’t </strong><strong>been tampered</strong><strong> with each time the system boots</strong>.</p> <p>With an <a href="https://www.cdwg.com/content/cdwg/en/brand/intel-client.html">Intel</a> Core i5 processor (some models offer i7 chips) backed by 8 gigabytes of speedy Low Power Double Data Rate Synchronous Dynamic RAM,<strong> the Portégé can handle almost any app</strong>. It gains additional performance thanks to a solid-state storage drive, which minimizes disk read-and-write delays. Even when using government-approved encryption to protect stored data, there is <strong>no noticeable slowdown.</strong> The ports on the X20W are also fast, with a brand-new Type-C USB 3.0 ready to handle anything from driving a second screen to charging devices or Thunderbolt 3 peripheral connections.</p> <p>Instead of each employee lugging around a fleet of devices for different functions, government agencies can do more with one Toshiba Portégé X20W serving multiple roles as needed.</p> <p><img alt="FT_Q118_PR_Breeden_Toshiba-product.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_PR_Breeden_Toshiba-product.jpg" /></p> <h2>Thunderbolt Provides Single-Cable Docking Simplicity</h2> <p>The Toshiba Portégé X20W’s dual hinge allows it to <strong>twist into one of five configurations to serve as a laptop, tablet or various presentation devices</strong>. Having mastered consolidation in a portable format, it would be a step backwards if the X20W needed to attach multiple cables and peripherals to take advantage of network resources.</p> <p>Thankfully, the inclusion of <strong>a brand-new Type-C USB 3.0 port makes this unnecessary, once a Toshiba Thunderbolt 3 Dock is added</strong>.</p> <p>The <a href="https://www.cdwg.com/search/?key=Thunderbolt+3+Dock&amp;ctlgfilter=&amp;searchscope=all&amp;sr=1&amp;ln=0&amp;b=TOS">Thunderbolt 3 Dock</a> is designed to work with the new X20W but could serve most modern Portégé models.</p> <p>Testing involved first connecting the Thunderbolt to a desktop computer. Once set up, the X20W attaches to the dock with a single cable using the Type-C USB 3.0 port. Then, desktop users have full access to the X20W as if it were a peripheral of the desktop system, including full access to the notebook’s desktop environment. When connected like this, the X20W also <strong>gains full access to all desktop resources and network peripherals, such as printers, keyboards, projectors, gigabit ethernet, mice and </strong><strong>any</strong><strong> others</strong>.</p> <p>The new cable is so fast users won’t notice any slowdown when working with the notebook connected through the Thunderbolt 3 Dock. As a nice bonus, the cable also provides power, so the Portégé can <strong>charge while it’s in use or at rest</strong>.</p> <p>In a sense, adding the Thunderbolt 3 Dock gives the Toshiba Portégé X20W yet another configuration and role: that of <strong>a powerful host and content server hardwired into the internal network</strong>. Yet it can disconnect and become portable at a moment’s notice, whenever the need arises.</p> <div class="callout"> <h3>Toshiba Portégé X20W</h3> <p><strong>Processor: </strong>2.5GHz Intel Core i5 7200U<br /><strong>Memory:</strong> 8GB LPDDR3<br /><strong>Graphics: </strong>Integrated Intel HD Graphics 620<br /><strong>Hard Drive: </strong>256GB SSD<br /><strong>Dimensions: </strong>8.6x11.8x0.6 inches<br /><strong>Weight: </strong>2.43 pounds</p> </div> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Core</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7456" hreflang="en">Purchase</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2015/11/review-toshiba-portege-z20t"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/PR-Sheen_0.jpg?itok=6JUEPyb0" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/hardware">Hardware</a> </h2> <header class="link-node"> <a href="/article/2015/11/review-toshiba-portege-z20t"><span>Review: The Toshiba Portégé Z20t</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/11/review-hp-elitebook-folio-9480m-ultrabook-performs-desktop"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/Q0416-FT-_PRBreeden-EliteBook-Hero.jpg?itok=NoXRooxD" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/hardware">Hardware</a> </h2> <header class="link-node"> <a href="/article/2016/11/review-hp-elitebook-folio-9480m-ultrabook-performs-desktop"><span>Review: HP EliteBook Folio 9480m Ultrabook Performs Like a Desktop</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/09/review-dells-optiplex-7050-was-designed-feds-mind"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201709/FT_Q417_Breeden_Optiplex_product-Hero.jpg?itok=coGXNSAa" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/hardware">Hardware</a> </h2> <header class="link-node"> <a href="/article/2017/09/review-dells-optiplex-7050-was-designed-feds-mind"><span>Review: Dell’s OptiPlex 7050 Was Designed with Feds in Mind </span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/review-toshiba-portege-x20w-plays-many-roles-feds" data-title="#Review: New @ToshibaUSA #Portege X20W showcases enhanced security, performance and connection to peripherals." data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/review-toshiba-portege-x20w-plays-many-roles-feds" data-title="#Review: New @ToshibaUSA #Portege X20W showcases enhanced security, performance and connection to peripherals." data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fdestination%3D%2Ftaxonomy%2Fterm%2F1369%2Fdelete%26_exception_statuscode%3D403" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/review-toshiba-portege-x20w-plays-many-roles-feds" data-title="#Review: New @ToshibaUSA #Portege X20W showcases enhanced security, performance and connection to peripherals." data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>20</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/john-breeden-ii"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/john-breeden-ii.jpg?itok=qht_53sT" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/john-breeden-ii"> <div>John Breeden II</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=LabGuys&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>John Breeden II is an award-winning reviewer and public speaker with 20 years of experience covering technology.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40411"></a></p> <p class='speaker'> </p> </div> </div> Tue, 20 Feb 2018 16:18:22 +0000 phil.goldstein_6191 40411 at https://fedtechmagazine.com FAA, CMS and GSA Retool to Take Advantage of Big Data https://fedtechmagazine.com/article/2018/02/faa-cms-and-gsa-retool-take-advantage-big-data <span>FAA, CMS and GSA Retool to Take Advantage of Big Data</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_F_Joch-Hero.jpg" width="1440" height="560" alt="FAA’s Elliott Black" typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 02/20/2018 - 08:57</span> <div><p>Officials at the <a href="https://www.faa.gov/">Federal Aviation Administration</a> want to make the most strategic, well-informed capital planning decisions possible about airport facilities. But airport facility requirements change when the airline industry changes, ranging from mergers and acquisitions to changes in the size of aircraft they operate and their underlying business models.</p> <p>To improve their decision-making, FAA executives such as Elliott Black, director of the <a href="https://www.faa.gov/about/office_org/headquarters_offices/arp/offices/app/">FAA’s Office of Airport Planning and Programming</a>, are <strong>combing through terabytes of current and historical information that promise new insights for forecasting</strong>.</p> <p>“I love data,” Black says. “By taking an open and honest look at our information, we can identify trends or problems that we weren’t aware of previously.”</p> <p>Leaders at the FAA and counterparts at agencies such as the <a href="https://www.cms.gov/">Centers for Medicare and Medicaid Services</a> (CMS) and the <a href="https://www.gsa.gov/">General Services Administration</a> realize that <strong>to effectively harvest insights from their expanding volumes of diverse data, they must re-evaluate their underlying data management and analytics capabilities</strong>.</p> <p>“Agencies that want to take real advantage of Big Data, analytics and artificial intelligence will eventually need to upgrade their older systems,” says Shawn McCarthy, research director for IDC Government Insights.</p> <p><a href="https://fedtechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP</strong>: Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <p>It’s a good time to make a change. Steady innovation is bringing about <a href="https://www.servicenow.com/content/dam/servicenow/documents/whitepapers/wp-cio-global-pov.pdf">new analytics capabilities derived from emerging technologies such as machine learning</a>, as well as enhancements to open-source tools and commercial applications. “We’re seeing a number of new analytical tools out there that <strong>make it easier to build </strong><strong>customer</strong><strong> reports on the fly</strong>,” Black says. “This could <strong>reduce the workload for our people and enable them to spend more time doing the substantive analyses</strong> we need to do.”</p> <p>For the past 15 years, the FAA has been relying on its System of Airports Reporting to help manage and forecast capital improvement investments for the approximately 3,300 airports across the country that are eligible for federal grants. SOAR <strong>centralizes a wealth of information</strong>: 35 years of historical funding data, as well as current project activity and capital needs information provided by individual airports, regional offices and state aeronautical agencies.</p> <p>The FAA’s data management currently consists of <strong>government-developed technology with hardwired connections among the database, user interface </strong><strong>and</strong><strong> reporting modules, making it difficult to slice and dice the data</strong>. The agency is upgrading the system with connections created with industry-standard application programming interfaces and commercial technology that will replace the hardwiring. “By better integrating the modules and building in better business analytics, we want to make it easier to perform complex analyses,” Black says.</p> <p><img alt="FT_Q118_F_Joch-quote_0.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_F_Joch-quote_0.jpg" /></p> <p> </p> <p>The systems will include<strong> a commercial database management system as well as commercial business analytics and reporting applications</strong>. “Our goal is for the airport community to be able to enter their information directly, which will save them time and enhance data consistency,” Black says.</p> <h2>Numerous Infrastructure Choices for Processing Big Data </h2> <p>Innovation isn’t limited to analytics tools; CIOs also have new options for building out IT infrastructure to support the efficient processing of large data sets. For example, <strong>organizations can select processing that is optimized for specific database platforms</strong>.</p> <p>“<a href="https://www.cdwg.com/content/cdwg/en/brand/lenovo-servers.html">Lenovo</a> servers have long been the reference platform <a href="https://www.cdwg.com/search/?b=CRD">SAP</a> uses for developing HANA,” says Charles King, principal analyst at Pund-IT. “Plus, <strong>virtually every x86 server or system vendor has built solutions that can be applied to Big Data problems and workloads</strong>. <a href="https://www.cdwg.com/content/brands/emc/default.aspx">Dell EMC</a> offers tailored solutions for SAP HANA, <a href="https://www.cdwg.com/content/brands/oracle/default.aspx">Oracle</a> Database and <a href="https://www.cdwg.com/content/cdwg/en/brand/microsoft-interstitial.html">Microsoft</a> SQL Server data, as well as open-source data analysis platforms, such as Apache’s Hadoop and Spark.”</p> <p>In addition, <strong>storage vendors are delivering Big Data solutions that capitalize on all-flash and flash-optimized storage arrays</strong>, King says. Flash storage delivers much better performance than traditional spinning-disk drives, which can speed up data analysis.</p> <h2>CMS Crunches Numbers, Saves Lives</h2> <p>In the Office of Minority Health at CMS, it’s understood that <a href="https://data.cms.gov/mapping-medicare-disparities">gleaning new analytical insight from routinely collected data</a> can produce <strong>life-changing results for citizens</strong>. By sifting through large volumes of payment and demographic data, the office helps health officials <strong>better serve the unique needs of minority populations, people with disabilities and those in rural areas</strong>.</p> <p>For example, infant mortality rates for African-Americans are nearly double the nationwide average; Hispanics show disproportionately higher rates of diabetes than the national average; and deaths from opioids are greatest among non-Hispanic whites. “These disparities show why it’s important to <strong>disaggregate data to understand the specific challenges facing various population</strong>s,” says Director Cara James.<strong> “That helps us target limited healthcare resources to the areas of greatest need.”</strong></p> <p>Part of the outgrowth of this effort is the <a href="https://www.cms.gov/About-CMS/Agency-Information/OMH/OMH-Mapping-Medicare-Disparities.html">Mapping Medicare Disparities Tool</a>, which shows outcomes and other data for 18 chronic diseases, such as diabetes or heart disease.</p> <p><img alt="FT_Q118_F_Joch-elpunto.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_F_Joch-elpunto.jpg" /></p> <p>A collection of technologies support the map. Applications from various vendors, such as Microsoft,<strong> extract Medicare fee-for-service data and feed the results into a Microsoft Excel spreadshee</strong>t. An open-source JavaScript library and <strong>a cloud-based data analysis platform</strong> are then used to produce the final visualizations.</p> <p>“One of the biggest goals of the tool is to increase awareness and understanding of disparities at the state and local levels,” James says. “Local officials can then use that information to inform their decision-making.”</p> <h2>GSA Visualizes Data in the Cloud </h2> <p>As chief data officer for the General Services Administration, Kris Rowley and his team are <strong>developing a long-term strategy for an enterprise data management and analytics platform</strong>, which relies on Oracle and SAP solutions.</p> <p>To achieve that goal, Rowley plans to update the reporting tools the agency has implemented. “There’s been rapid development in visualization technology to make information more presentable and help executives more easily grasp insights from the data,” he says.</p> <p>The agency is <strong>moving much of its data to public cloud repositories to capitalize on the computing capabilities available with those models</strong>. As they do this, officials want latitude in choosing which analytical tools stakeholders can use. “I want to be able to plug any visualization application into cloud data sets and know there won’t be any migration costs,” Rowley says. “That means getting away from traditional solutions that integrate the reporting tool with where the data is stored.”</p> <p>The GSA evaluations also take emerging technology into account. “Everything we’re doing will create a foundation for moving to machine learning,” Rowley says.<strong> “Machine learning will support the enterprise by empowering the workforce with predictive modeling and the ability to forecast what may happen next.”</strong></p> <div class="sidebar_wide"> <h3>3 Ways to Jump-Start Modern Projects</h3> <p>What first steps can federal officials take to more effectively use data analytics and capture quick wins? McCarthy offers these suggestions:</p> <p>1. IT leaders should <strong>focus first on business cases that will have the most impact on citizens</strong>. Crime statistics, transportation/traffic flow analysis and economic indicators are all good starting points.</p> <p>2. Agencies that want to implement advanced capabilities such as Big Data analytics and artificial intelligence may need to <strong>upgrade their infrastructure</strong>.</p> <p>3. Technology that incorporates<strong> location intelligence</strong> can be particularly useful in government environments. Agencies also should consider solutions that include core reporting, dashboarding and ad-hoc visual discovery functionality.</p> </div> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Core</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>Over 1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/08/federal-government-can-use-analytics-save-lives"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech--publichealth2.jpg?itok=EBfrAqaG" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/business-intelligence">Business Intelligence</a> </h2> <header class="link-node"> <a href="/article/2016/08/federal-government-can-use-analytics-save-lives"><span>The Federal Government Can Use Analytics to Save Lives</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/04/fog-computing-brings-connectivity-analytics-agencies-network-edge"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FoggingUp.jpg?itok=M_wj9X6J" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/networking">Networking</a> </h2> <header class="link-node"> <a href="/article/2016/04/fog-computing-brings-connectivity-analytics-agencies-network-edge"><span>Fog Computing Brings Connectivity, Analytics to Agencies&#039; Network Edge</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_F_Hayes-Hero.jpg?itok=AWy6scEN" width="124" height="94" alt="GAO’s Dominic Prate" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers"><span>How Hyperconvergence Simplifies Agencies&#039; Data Centers</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/faa-cms-and-gsa-retool-take-advantage-big-data" data-title="Find out how @USGSA, @CMSGov and @FAANews are upgrading their #IT infrastructure to make use of #BigData. #FedIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/faa-cms-and-gsa-retool-take-advantage-big-data" data-title="Find out how @USGSA, @CMSGov and @FAANews are upgrading their #IT infrastructure to make use of #BigData. #FedIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Ftaxonomy%2Fterm%2F810%2Ffeed" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/faa-cms-and-gsa-retool-take-advantage-big-data" data-title="Find out how @USGSA, @CMSGov and @FAANews are upgrading their #IT infrastructure to make use of #BigData. #FedIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>20</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/alan-joch"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/jochphoto.jpg?itok=vT3N6nE7" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/alan-joch"> <div>Alan Joch</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=alanallegro&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Alan Joch has been an independent business and technology writer for more than a decade. His expertise includes server and desktop virtualization, cloud computing, emerging mobile applications, and cybersecurity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40406"></a></p> <p class='speaker'> </p> </div> </div> Tue, 20 Feb 2018 13:57:47 +0000 phil.goldstein_6191 40406 at https://fedtechmagazine.com Review: Barracuda Web Application Firewall 460 Delivers Broad Protection https://fedtechmagazine.com/article/2018/02/review-barracuda-web-application-firewall-460-delivers-broad-protection <span>Review: Barracuda Web Application Firewall 460 Delivers Broad Protection</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_PR_Breeden_Barracuda-Hero.jpg" width="1440" height="560" alt="Barracuda Web Application Firewall 460" typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 02/19/2018 - 09:33</span> <div><p>Government agencies have <a href="https://fedtechmagazine.com/article/2016/01/nsa-chief-warns-more-hacks-those-hit-opm">always been in the crosshairs of cyberattackers</a>. In fact, <a href="https://www.forbes.com/sites/stevemorgan/2016/05/13/list-of-the-5-most-cyber-attacked-industries/#18113517715e">according to most cybersecurity surveys</a>, government is ranked, with healthcare and finance, among the five most attacked sectors every year.</p> <p>The <a href="https://www.cdwg.com/product/Barracuda-Web-Application-Firewall-460-security-appliance/2765550?pfm=srh">Web Application Firewall</a> (WAF) from <a href="https://www.cdwg.com/content/brands/barracuda/default.aspx">Barracuda Networks</a> does an excellent job of covering the most important parts of that cybersecurity waterfront.</p> <p>Placed at the front of the data path, the <strong>WAF functions like a reverse proxy, intercepting all traffic and allowing only packets that comply with </strong><strong>policy</strong>.</p> <p>Its features include HTTP/S and FTP protocol validation; form field metadata validation; website cloaking; response control; outbound data theft protection; file upload control; logging, monitoring and reporting; high availability (active and passive); SSL offloading; authentication and authorization; vulnerability scanner integration; client IP reputation validation; caching and compression; and Lightweight Directory Access Protocol/Research and Development for Image Understanding Systems (LDAP/RADIUS) services. It can <strong>even handle load balancing and content routing</strong>.</p> <p><a href="https://fedtechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP</strong>: Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Security Rules Are Controlled via a Single Interface </h2> <p>The WAF 460 is designed to <strong>protect five to 10 back-end servers, though other models scale up to enterprise levels suitable for larger organizations</strong>. With any of the WAFs, new defensive capabilities are activated by spinning up services, a straightforward process that puts inbound and outbound traffic rules into one interface.</p> <p>Whenever a new service is activated, the WAF <strong>automatically applies a default security policy based on best practices</strong>. For example, when adding protection for a public-facing app through the WAF, the default policy limits the number of characters that users can type into each field. Administrators may modify default policies as needed, but this limit ensures that simplicity is the rule when generating new protections.</p> <p>The free Barracuda Vulnerability Manager is available for the WAF’s suite of tools by simply connecting. The WAF can <strong>scan new applications looking for vulnerabilities and then create rules to block them from the firewall, without changing any code</strong>.</p> <p>Consolidating defensive services into a single interface makes sense for larger government agencies struggling to fight more cyberbattles with fewer resources. The Barracuda WAF <strong>could become a secret weapon that tips the scales in the government’s favor</strong>.</p> <p><img alt="FT_Q118_PR_Breeden_Barracuda-product.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_PR_Breeden_Barracuda-product.jpg" /></p> <h2>How the WAF Fares Against DDoS Attacks </h2> <p><a href="https://fedtechmagazine.com/article/2018/01/dhs-commerce-identify-how-respond-botnets">Distributed denial of service (DDoS) attacks</a> can be extremely problematic, even for federal agencies that have invested heavily in cybersecurity. The attacks <strong>try to overload a website with so much junk data that real users can’t get through and use services</strong>.</p> <p>DDoS attacks are popular because they’re highly visible. When the botnet known as <a href="https://biztechmagazine.com/article/2016/10/dyn-ddos-attack-highlights-vulnerability-iot-devices">Mirai used millions of Internet of Things devices to temporarily shut down several of the world’s top websites</a>, it made news globally. DDoS attacks also require less sophistication than managing cutting-edge malware or an advanced persistent threat. There are quite a few plug-and-play tools available to launch basic DDoS attacks using known compromised clients and servers.</p> <p>Having DDoS protection makes sense, especially for high-profile organizations such as government agencies. <strong>Agencies face two main types of DDoS attacks: web-based and application-based.</strong> The most common are web-based attacks, where web traffic is sent to overload a server with junk data. To counter these attacks, the WAF must connect to the Barracuda traffic-scrubbing service. <strong>This requires an extra license, but it enables the WAF to forward suspected DDoS traffic through the service and then block the overloading requests.</strong></p> <p>An <strong>application-layer attack</strong> is a more advanced form of DDoS that takes even more research. It is intended to send long strings of junk data into valid forms on a website, perhaps overloading the application or even the server that is hosting it.</p> <p>We tested the WAF’s ability to fight application-layer DDoS attacks by <strong>sending more than 5,000 strings of junk data into the name field on a web form every second</strong>. Meanwhile, we attempted to use the form like a valid user. Our valid user was never inconvenienced by the ongoing attack, and services never dropped.</p> <p>The log files confirmed that the WAF <strong>easily caught the illegal traffic and blocked it because either the junk strings were too long or the user was attempting to fill out the form too quickly</strong>. It broke the WAF’s programmed rules and was dropped. From a user’s point of view, nothing was wrong. Because there was no disruption, administrators could take their time responding to the attack, confident that the WAF could handle it — which it did for more than an hour, when the testing ended.</p> <p>Most firewalls don’t have the level and variety of cybersecurity modules present in the Barracuda Web Application Firewall 460. Of those that include extra features, DDoS is rarely one of them. Its inclusion <strong>rounds out the protection offered by Barracuda, enabling it to provide many cybersecurity defenses</strong>.</p> <div class="callout"> <h3>Barracuda Web Application Firewall 460</h3> <p><strong>Back-End Services Protected: </strong>5 to 10<br /><strong>Maximum Traffic Throughput:</strong> 50Mbps<br /><strong>Maximum HTTP Traffic Scanned: </strong>15,000 HTTP transactions per second<br /><strong>Maximum Secure Traffic Scanned: </strong>4,000 SSL transactions per second<br /><strong>Dimensions: </strong>16.8x14x1.7 inches (with stand)<br /><strong>Weight: </strong>11.9 pounds</p> </div> </div> <div> <div>Content Subtype</div> <div>Review</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7456" hreflang="en">Purchase</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2013/05/next-generation-firewalls-simplify-security-agencies"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/trends_fed_300_1.jpg?itok=nUSlvpPw" width="124" height="94" alt="Next-Generation Firewalls Simplify Security for Agencies" title="Next-Generation Firewalls Simplify Security for Agencies" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2013/05/next-generation-firewalls-simplify-security-agencies"><span>Next-Generation Firewalls Simplify Security for Agencies</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2014/11/best-practices-selecting-next-generation-firewall"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/494480025.png?itok=KV1KFgcY" width="124" height="94" alt="Next-Generation Firewalls" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2014/11/best-practices-selecting-next-generation-firewall"><span>Best Practices for Selecting a Next-Generation Firewall</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2014/04/why-agencies-need-next-generation-firewall"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/2014/04/456034869.png?itok=KRT99L_K" width="124" height="94" alt="Next-Gen Firewall" title="Next-Gen Firewall" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2014/04/why-agencies-need-next-generation-firewall"><span>Why Agencies Need a Next-Generation Firewall</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/review-barracuda-web-application-firewall-460-delivers-broad-protection" data-title="#Review: In tests, @barracuda's WAF 460 stands up to #DDoS attacks. #cybersecurity #firewalls #FedIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/review-barracuda-web-application-firewall-460-delivers-broad-protection" data-title="#Review: In tests, @barracuda's WAF 460 stands up to #DDoS attacks. #cybersecurity #firewalls #FedIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fdestination%3D%2Ftaxonomy%2Fterm%2F1369%2Fdelete%26_exception_statuscode%3D403" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/review-barracuda-web-application-firewall-460-delivers-broad-protection" data-title="#Review: In tests, @barracuda's WAF 460 stands up to #DDoS attacks. #cybersecurity #firewalls #FedIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>19</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/john-breeden-ii"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/john-breeden-ii.jpg?itok=qht_53sT" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/john-breeden-ii"> <div>John Breeden II</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=LabGuys&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>John Breeden II is an award-winning reviewer and public speaker with 20 years of experience covering technology.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40401"></a></p> <p class='speaker'> </p> </div> </div> Mon, 19 Feb 2018 14:33:00 +0000 phil.goldstein_6191 40401 at https://fedtechmagazine.com 3 Tips to Get Your Network Under Control https://fedtechmagazine.com/article/2018/02/3-tips-get-your-network-under-control <span>3 Tips to Get Your Network Under Control</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_TechTips_Kerravala-Hero.jpg" width="1440" height="560" alt="Network sprawl " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 02/16/2018 - 10:38</span> <div><p>Networks serving federal agencies used to be tightly controlled environments where change happened infrequently. But then <a href="https://fedtechmagazine.com/article/2015/07/your-agency-ready-influx-hyper-mobile-employees">the mobile era arrived</a>, and<strong> the number of connected endpoints nearly quadrupled</strong>, bandwidth demands soared <a href="https://fedtechmagazine.com/article/2017/10/even-most-tight-lipped-agencies-need-wi-fi">and wireless became the norm</a>. This has forced network engineers to <strong>make more frequent changes, adding network switches and Wi-Fi access points at a furious pace</strong>.</p> <p>While this has allowed users to accomplish more in more places, it has also <strong>triggered significant network sprawl, a condition that can result in overspending on network infrastructure, poor application performance and longer change management cycles</strong>. Network engineers need to control sprawl <strong>before it starts to affect the productivity of the workers</strong> within the agency. Here are three ways to keep a network in line:</p> <h2>1. Prioritize End-to-End Network Visibility</h2> <p>How can a network engineer possibly combat network sprawl if he doesn’t even know what devices are on the network? As the saying goes, “You can’t manage what you can’t see.” It’s likely that agencies <a href="https://fedtechmagazine.com/article/2017/05/why-agencies-rely-network-monitoring-tools-more-ever">already have several management tools in place</a> to <strong>provide a partial view of the network, such as snapshots of the campus, wireless edge or data center</strong>. But a snapshot of the network does not provide end-to-end visibility. Network administrators who want to correlate data to assess network performance must do so manually.</p> <p>To create a more useful look at their networks, agencies should focus on<strong> integrating their various management platforms into a comprehensive dashboard that provides one view: from the data center, across the campus and out to the branches</strong>.</p> <h2>2. Inventory Devices on the Agency's Network</h2> <p>The faster a network expands, the more difficult it is for admins to keep track of what is connected to each node. It’s critical to<strong> inventory the network and identify every system and device, how they’re used and how they’re interconnected</strong>. Several tools are available — both hardware and software solutions — to help accomplish this objective.</p> <p><img alt="FT_Q118_TechTips_Kerravala-elpunto.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_TechTips_Kerravala-elpunto.jpg" /></p> <p>This can help IT teams make more informed decisions on whether to upgrade or add a new device. For example, if the Wi-Fi network performs poorly in certain spots, <strong>reconfiguring one access point might be a better option than adding additional APs</strong>. In addition to on-premises network inventory tools, cloud-based network management solutions often provide excellent reporting tools.</p> <h2>3. Adopt Software-Defined Networking</h2> <p>SDN enables network administrators to <a href="https://fedtechmagazine.com/article/2017/11/why-sdn-hot-pentagon">create virtual overlay networks</a>. Instead of having to provision new physical networks to accommodate a new application or department, <strong>SDN allows admins to build software-based virtual networks that look and act just like physical networks</strong>. This technology enables agencies to carve up a single physical network into several virtual ones, similar to the way server virtualization works.</p> <p>SDN also introduces <strong>network function virtualization for other network services, such as security and load-balancing, provisioning them as virtual workloads</strong>. Since these are managed through software, network resources can be created much more simply without adding new hardware, and that controls sprawl.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Data Center</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7446" hreflang="en">Engagement</a></div> </div> <div> <div>Content Length</div> <div>300-500 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/11/why-sdn-hot-pentagon"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201711/FedTech--SDN-2.jpg?itok=VdTOcciV" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/networking">Networking</a> </h2> <header class="link-node"> <a href="/article/2017/11/why-sdn-hot-pentagon"><span>Why SDN Is Hot at the Pentagon</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/09/will-federal-agencies-adoption-sdn-boost-security"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201709/Will-Federal-Agencies-Adoption-of-SDN-Boost-Security--cropped.jpg?itok=NobWZKHv" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/09/will-federal-agencies-adoption-sdn-boost-security"><span>Will Federal Agencies’ Adoption of SDN Boost Security? </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/08/will-eis-spur-agencies-truly-modernize-their-networks"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201708/FedTech--networks.jpg?itok=0iN5L9CY" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/networking">Networking</a> </h2> <header class="link-node"> <a href="/article/2017/08/will-eis-spur-agencies-truly-modernize-their-networks"><span>Will EIS Spur Agencies to Truly Modernize Their Networks?</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/3-tips-get-your-network-under-control" data-title="You can’t manage what you can’t see. @zkerravala on why #FedIT needs to inventory the contents of networks. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/3-tips-get-your-network-under-control" data-title="You can’t manage what you can’t see. @zkerravala on why #FedIT needs to inventory the contents of networks. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Ftaxonomy%2Fterm%2F825%2Ffeed" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/3-tips-get-your-network-under-control" data-title="You can’t manage what you can’t see. @zkerravala on why #FedIT needs to inventory the contents of networks. #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>16</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11296"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/zkerravala.jpg?itok=X-p5hg38" width="58" height="58" alt="Zeus Karravala " typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11296"> <div>Zeus Karravala </div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=zkerravala&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Zeus Karravala is the founder and principal analyst for ZK Research, and has covered communications and networking trends for more than 17 years.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40396"></a></p> <p class='speaker'> </p> </div> </div> Fri, 16 Feb 2018 15:38:10 +0000 phil.goldstein_6191 40396 at https://fedtechmagazine.com Cybersecurity Funding Would Jump in Trump's 2019 Budget https://fedtechmagazine.com/article/2018/02/cybersecurity-funding-would-jump-trumps-2019-budget <span>Cybersecurity Funding Would Jump in Trump&#039;s 2019 Budget</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FedTech-Cyber-2019.jpg" width="1440" height="560" alt="Federal cyber workers " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/15/2018 - 13:46</span> <div><p>The president's annual budget request almost never gets approved as is by Congress, something that is expected again this year given the two-year bipartisan budget blueprint President Donald Trump signed earlier this month that <a href="https://www.nytimes.com/2018/02/07/us/politics/budget-deal-trump.html">differs significantly from the administration's stances</a>. However, <a href="https://fedtechmagazine.com/article/2018/02/trump-calls-slight-it-spending-bump-2019-budget">the budget</a> serves as a way for the White House to signal its priorities, and when it comes to IT, the message is clear: <strong>cybersecurity is critical</strong>.</p> <p>The president's <a href="https://www.whitehouse.gov/wp-content/uploads/2018/02/budget-fy2019.pdf">fiscal year 2019 budget request</a>, prepared by the Office of Management and Budget, for the first time has <a href="https://www.whitehouse.gov/wp-content/uploads/2018/02/ap_21_cyber_security-fy2019.pdf">a separate breakdown of its cybersecurity funding proposals</a>, as Federal News Radio <a href="https://federalnewsradio.com/budget/2018/02/white-houses-management-agenda-to-help-with-deep-seated-transformation-effort/">reports</a>.</p> <p>Under the proposed budget, <strong>total cybersecurity funding would increase to $14.983 billion in </strong><strong>fiscal</strong><strong> year 2019</strong>, up from an estimated <strong>$14.4 billion </strong>in fiscal year 2018 and <strong>$13.1 billion</strong> in fiscal year 2017. That is not surprising given <a href="https://fedtechmagazine.com/article/2017/12/white-house-releases-final-it-modernization-report">how much emphasis</a> the administration has put on protecting federal networks <a href="https://fedtechmagazine.com/article/2017/12/4-largest-federal-it-trends-watch-2018">and high-value assets within agencies' networks and IT systems</a>.</p> <p>At the same time, as <a href="http://www.nextgov.com/cio-briefing/2018/02/trump-budget-gouges-non-defense-rd-19-percent/145928/">Nextgov</a> and <a href="https://www.fedscoop.com/mulvaney-touts-rd-increase-nist-nsf-take-cuts/">FedScoop</a> both report, <strong>the proposed budget would make significant cuts to research and development programs outside of the Defense Department</strong>, potentially impacting research into emerging technologies.</p> <p><a href="https://fedtechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Cybersecurity Funding Gets a Major Boost</h2> <p>Cybersecurity is an important component of the administration's IT modernization efforts, the budget notes. An assessment of the federal government's overall cybersecurity risk, as ordered by the administration's <a href="https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/">executive order on cybersecurity</a>, "found the federal enterprise to be at risk."</p> <p>As a result, the budget notes, <strong>"cybersecurity budgetary priorities will continue to seek to reduce this risk based on data-driven, risk-based assessments of the threat environment and the current federal cybersecurity posture."</strong></p> <p>The 2019 budget proposal includes $15 billion of budget authority for cybersecurity-related activities, representing a $583.4 million (4.1 percent) increase above the fiscal 2018 estimate.</p> <p>"Due to the sensitive nature of some activities, this amount does not represent the entire cyber budget," OMB notes. The Defense Department was the largest contributor to this total. In particular, the budget says, <strong>DOD reported $8.5 billion in cybersecurity funding in </strong><strong>fiscal</strong><strong> year 2019</strong>, a $340 million (4.2 percent) increase above the 2018 estimate.</p> <p>Overall, civilian cybersecurity spending increased 3.9 percent in the 2019 budget request, and most of this change was among the civilian CFO Act agencies, where cybersecurity spending increased 4.1 percent from the 2018 estimate. While some non-CFO Act agencies reported significant increases in their cybersecurity spending, non-CFO Act agencies as a whole reported a less than 1 percent change in cybersecurity spending from the 2018 estimate.</p> <p>The administration's <a href="https://www.whitehouse.gov/wp-content/uploads/2018/02/dhs-fy2019.pdf">budget request for the Homeland Security Department's</a> National Protection and Programs Directorate includes an <strong>increase in cybersecurity funding to $712 million</strong>, up from an estimated $665 million in fiscal year 2018 and $650 million in fiscal year 2017.</p> <p><a href="http://www.nextgov.com/cybersecurity/2018/02/trump-2019-budget-spikes-cyber-spending-cuts-research/145925/">According to Nextgov</a>, the budget includes $238 million for DHS' <a href="https://www.dhs.gov/cdm">Continuous Diagnostics and Mitigation program</a>, down from $279 million in last year's request. CDM allows agencies to <strong>monitor their IT systems and then respond almost instantaneously to vulnerabilities</strong>. The program enables agencies to prioritize the risks based on how severe they might be in an effort to let cybersecurity personnel mitigate the most significant problems first. <strong>CDM offers commercial off-the-shelf tools <span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">—</span></span> hardware, software </strong><strong>and</strong><strong> services <span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">—</span></span> that agencies can access via a central fund.</strong></p> <p>DHS is finalizing plans with agencies to have them feed cybersecurity threat information captured by CDM into a federal dashboard, which will give DHS a broader view about IT security threats across the government.</p> <p>The budget also commits<strong> $407 million</strong> for a governmentwide <a href="https://www.dhs.gov/einstein">intrusion detection program called Einstein</a>, Nextgov notes, up from $397 million in last year's request.</p> <h2>Research Outside of DOD Gets Slashed</h2> <p>Despite OMB Director Mick Mulvaney's comments that the budget request increased federal R&amp;D spending, FedScoop reports that <strong>some agencies charged with leading R&amp;D efforts could take a hit</strong>.</p> <p>For example, the National Institute of Standards and Technology <span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">—</span></span> which sets technical standards for civilian agencies for everything from <a href="https://www.nist.gov/cyberframework">cybersecurity</a> to <a href="https://www.nist.gov/itl/applied-cybersecurity/nist-initiatives-iot">Internet of Things</a> and <a href="https://pages.nist.gov/800-63-3/">identity management</a> <span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">—</span></span> <strong>would see its budget fall 25 percent, from $750 million in 2017 to $564 million next year</strong>. The National Science Foundation, which FedScoop notes supports a range of technology and cyberinfrastructure research, also would see its research funding cut by the request, <strong>falling 28 percent from $5.3 billion to $3.8 billion</strong>.</p> <p>Meanwhile, <a href="http://www.nextgov.com/cio-briefing/2018/02/trump-budget-gouges-non-defense-rd-19-percent/145928/">as Nextgov reports</a>, the Pentagon would get an additional <strong>$13.5 billion</strong> in R&amp;D spending under the budget proposal.</p> <p>Additionally, cybersecurity research that has been housed in DHS's Science and Technology Directorate, totaling, $41 million in the president's budget request, would be <strong>moved inside the National Protection and Programs Directorate</strong>, according to Nextgov.</p> <p>The shift was made so "operators on the ground have influence over research and development," a senior administration official told reporters during a call earlier this week, according to Nextgov. NPPD will work closely with the science and technology division on research priorities, the official said.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25505 </p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7446" hreflang="en">Engagement</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/trump-calls-slight-it-spending-bump-2019-budget"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FedTech--2019budget.jpg?itok=6Jd4Exyv" width="124" height="94" alt="Money, puzzle " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2018/02/trump-calls-slight-it-spending-bump-2019-budget"><span>Trump Calls for Slight IT Spending Bump in 2019 Budget</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/dhs-jeanette-manfra-turns-her-focus-ecosystem-government-networks"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_QA_Manfra-Hero.jpg?itok=l7uJ3Sqb" width="124" height="94" alt="DHS Assistant Secretary Jeanette Manfra " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2018/02/dhs-jeanette-manfra-turns-her-focus-ecosystem-government-networks"><span>DHS&#039; Jeanette Manfra Turns Her Focus to the &#039;Ecosystem&#039; of Government Networks</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/12/shared-services-can-improve-cybersecurity-it-security-leaders-argue"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201712/FedTech-CyberShared.jpg?itok=EVqVd7Pl" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/12/shared-services-can-improve-cybersecurity-it-security-leaders-argue"><span>Shared Services Can Improve Cybersecurity, IT Security Leaders Argue</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/cybersecurity-funding-would-jump-trumps-2019-budget" data-title="Under the @WhiteHouse 2019 budget, #cybersecurity funding would get a jolt but tech R&D funding outside of @DeptofDefense would be hit. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/cybersecurity-funding-would-jump-trumps-2019-budget" data-title="Under the @WhiteHouse 2019 budget, #cybersecurity funding would get a jolt but tech R&D funding outside of @DeptofDefense would be hit. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Frss.xml%3Fdestination%3D%2Ftaxonomy%2Fterm%2F1369%2Fdelete%26_exception_statuscode%3D403" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/cybersecurity-funding-would-jump-trumps-2019-budget" data-title="Under the @WhiteHouse 2019 budget, #cybersecurity funding would get a jolt but tech R&D funding outside of @DeptofDefense would be hit. #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>15</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40391"></a></p> <p class='speaker'> </p> </div> </div> Thu, 15 Feb 2018 18:46:57 +0000 phil.goldstein_6191 40391 at https://fedtechmagazine.com The Future of DOD's Plan to Defend Against IoT Threats https://fedtechmagazine.com/article/2018/02/future-dods-plan-defend-against-iot-threats <span>The Future of DOD&#039;s Plan to Defend Against IoT Threats </span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_F_Hennick-Hero.jpg" width="1440" height="560" alt="Air Force CTO Frank Konieczny " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/15/2018 - 11:03</span> <div><p>A glance at the hypothetical Internet of Things cybersecurity scenarios identified by the Department of Defense is enough to set off alarm bells.</p> <p>In one IoT scenario highlighted in <a href="https://www.gao.gov/assets/690/686203.pdf">a July 2017 report issued by the Government Accountability Office</a>, adversaries <strong>attack an electrical system linked to a smart meter, shutting down air conditioning systems and crashing DOD servers</strong>. In another, a malicious insider takes advantage of lax security to <strong>seize control of water systems and flood a ship in dry dock</strong>. The report even mentions the possibility of physical attacks on DOD leaders by hackers who <strong>exploit the systems of internet-connected vehicles</strong>.</p> <p>“It is really, really critical that we get this right,” says Bob Scollar, IoT enterprise functional team lead at the National Security Agency, of IoT security. “You can see the potential of the technology to have life-changing impacts. <strong>We want to be prepared in every way that we can</strong>.”</p> <p>The benefits that IoT solutions offer to the government are nearly limitless, but they come with challenges — some obvious, but others largely hidden. Agencies are <strong>exploring IoT deployments carefully, working to plug gaps that exist between security policies and IoT vulnerabilities</strong>. Federal IT leaders must strike a balance that <strong>addresses security risks while maintaining the utility of IoT systems</strong>.</p> <p><a href="https://fedtechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP</strong>: Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>IoT Systems Present a Diverse Set of Risks</h2> <p>Federal IT leaders have numerous security concerns about IoT.</p> <p>According to the GAO report, “<a href="https://www.gao.gov/assets/690/686203.pdf">Internet of Things: Enhanced Assessments and Guidance Are Needed to Address Security Risks in DOD</a>,” defense agencies have issued policies and guidance for IoT devices, <strong>but those policies have gaps</strong>. “There’s an emerging recognition of the perils, and there’s an emerging response to them,” says Joseph Kirschbaum, director of defense capability and management at <a href="https://www.gao.gov/">GAO</a> and lead author of the report. “The agencies are not quite there yet, but they want to get there.”</p> <p><img alt="FT_Q118_F_Hennick-elpunto.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_F_Hennick-elpunto.jpg" /></p> <p>Frank Konieczny, CTO for the <a href="https://www.airforce.com/">Air Force</a>, says the service’s mobility policies currently cover IoT, but he acknowledges it has more work to do.</p> <p><strong>“We probably need a broader and more expansive policy for IoT devices,”</strong> he says. “It’s a question of, what do we have to do to defend this part of the network, and what devices do we have to cut off?”</p> <p>According to Army spokesperson Wayne Hall, the GAO report is “generally in line with” Army IT officials’ experience and expectations. “Internet of Things is an emerging space,” he says. <strong>“We still have extensive research and testing to do with devices as a networked asset.”</strong></p> <h2>The Promise and Peril of IoT for Feds</h2> <p>Already, the Air Force uses IoT solutions for tasks such as <strong>monitoring vehicle engine wear, and it pilots a number of “smart base” tools</strong>. Konieczny acknowledges that these solutions leave the service’s physical assets vulnerable to a successful cyberattack.</p> <p>For example, he says, an adversary might attack monitoring systems to make it appear as though a fuel tanker’s tires have gone flat, temporarily taking the vehicle out of commission.</p> <p>The threat has agencies scrambling to tighten defenses before vulnerabilities are exploited. <strong>“We’re just trying to get ahead of the curve right now,”</strong> Scollar says.</p> <p>While the prospect of hackers taking over building systems or vehicles is alarming, <strong>new IoT connections could also open up agencies to </strong><strong>cyberattacks</strong><strong> on IT systems, as well as physical facilities</strong>. A hacker could gain access to the network through a weakly protected IoT device and potentially move on to more critical IT assets if the device is not segmented from the rest of the network.</p> <p>“There’s going to be so much more connectivity,” says Scollar. “The more interconnected and smart these devices are, the greater the challenge is going to become.”</p> <h2>How Agencies Can Address IoT Security Gaps</h2> <p>The GAO report notes that the Defense Department’s policies and guidance for IoT devices <strong>include wearables, portable electronic devices, smartphones and devices for industrial control systems</strong>. However, it also identifies three significant gaps:</p> <ul><li>The policies are “insufficient” for certain devices, such as smart televisions in unsecured areas.</li> <li>DOD policy and guidance on cyber-, operational, information and physical security do not currently address IoT devices.</li> <li>The department does not require that existing security procedures be implemented on industrial control systems.</li> </ul><p>“We don’t necessarily want to see guidance for a list of certain devices,” says Kirschbaum. “We want to look at concepts, like <strong>how to deal with devices, whether you can control them, and how to mitigate risks if you can’t control them.</strong> If you confine yourself to a device, your policies are obsolete from the second you write them.”</p> <p>Defense officials say that protecting IoT devices will be an ongoing effort that will require agencies to <strong>balance between securing their environments and allowing tools that support their missions and enhance service members’ quality of life</strong>.</p> <p><img alt="FT_Q118_F_Hennick-quote.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_F_Hennick-quote.jpg" /></p> <p>Much of this calculation will depend on the IoT solutions that come to market in the coming years, how vendors protect those solutions and how well (and for how long) vendors support their products, says Nicole Newmeyer, capabilities strategy lead for the IoT enterprise functional team at the NSA. She adds that <strong>DOD agencies should seek a seat at the table as vendors make those decisions</strong>.</p> <p>“Industry and academia are going to continue to be the leaders in how this technology evolves,” Newmeyer says. “We’re trying to understand where they’re going and figure out where we need to partner better and collaborate to get this technology where it needs to be.</p> <p>“IoT represents the next phase in the evolution of technology. The devices that are becoming available now are f<strong>orming the building blocks of how the technology is going to be shaped in the near future</strong>. If the government and Department of Defense aren’t involved in shaping the security of these devices, we’re going to find ourselves at a severe loss.”</p> <p>According to Hall, the Army already permits some consumer IoT devices, such as personal fitness trackers, at certain facilities and locations, and it’s working with DOD and NSA to determine what else should be permitted and where. The Army also is working to respond to the recommendations of the GAO report, including suggestions that <strong>DOD agencies should review and assess existing IoT security policies and identify where new guidelines may be needed</strong>.</p> <p>“We are deliberately taking steps to make sure we do not introduce any unknown or unmitigated risks or vulnerabilities,” Hall says. “The Army is leveraging IoT as a way to provide additional capability to the forces while minimizing risk.”</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7441" hreflang="en">Awareness</a></div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/10/nsa-dhs-and-doj-highlight-security-threats-posed-iot"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech--IoTSecurity1.jpg?itok=bfyCEO45" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2016/10/nsa-dhs-and-doj-highlight-security-threats-posed-iot"><span>NSA, DHS and DOJ Highlight Security Threats Posed by IoT </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/01/dhs-commerce-department-identify-how-respond-botnets"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/%5Bcurrent-date%3Acustom%3AYm%5D/DDoS_attack.jpg?itok=guiC7yaI" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2018/01/dhs-commerce-department-identify-how-respond-botnets"><span>DHS, Commerce Department Identify How to Respond to Botnets </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/09/feds-get-new-guidance-nist-protect-data-iot-devices"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201709/FedTech--IoTSecurity.jpg?itok=Xi6btEXM" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/09/feds-get-new-guidance-nist-protect-data-iot-devices"><span>Feds Get New Guidance from NIST to Protect Data on IoT Devices </span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/future-dods-plan-defend-against-iot-threats" data-title="#IoT presents both opportunity and risk for @DeptofDefense agencies like the @usairforce. #cybersecurity #FedIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/future-dods-plan-defend-against-iot-threats" data-title="#IoT presents both opportunity and risk for @DeptofDefense agencies like the @usairforce. #cybersecurity #FedIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Ftaxonomy%2Fterm%2F810%2Ffeed" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/future-dods-plan-defend-against-iot-threats" data-title="#IoT presents both opportunity and risk for @DeptofDefense agencies like the @usairforce. #cybersecurity #FedIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>15</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/calvin-hennick"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/calvin-hennick.jpeg.jpg?itok=xXXtEq5w" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/calvin-hennick"> <div>Calvin Hennick</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=calvinhennick&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40386"></a></p> <p class='speaker'> </p> </div> </div> Thu, 15 Feb 2018 16:03:25 +0000 phil.goldstein_6191 40386 at https://fedtechmagazine.com How Hyperconvergence Simplifies Agencies' Data Centers https://fedtechmagazine.com/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers <span>How Hyperconvergence Simplifies Agencies&#039; Data Centers</span> <img src="/sites/fedtechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/FT_Q118_F_Hayes-Hero.jpg" width="1440" height="560" alt="GAO’s Dominic Prate" typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 02/14/2018 - 10:13</span> <div><p>In 2016, the IT team at the <a href="https://www.gao.gov/">Government Accountability Office</a> was managing 500 legacy and virtual servers — and quickly running out of physical room in the agency’s data center. However, to address this problem, the team didn’t start planning for a facility expansion or major move.</p> <p>Instead, GAO’s IT officials decided to overhaul and streamline their operation by deploying a relatively new approach: <strong>hyperconverged infrastructure</strong>. <a href="https://biztechmagazine.com/article/2018/01/what-hyperconvergence-technology">HCI replaces the traditional, three-tier architecture</a> for computing, storage and networking, <strong>combining all functionalities into a single hardware box under one management console</strong>.</p> <p>“This is all about being more efficient,” says Dominic Prate, GAO’s director of engineering and operations, noting that the agency is nearly halfway through its migration and expects to complete the project by mid 2018.</p> <p>“We’ve already been able to replace six servers for every hyperconverged unit we install,” Prate says. “And we think we can definitely do even more than that, which will ultimately <strong>save us quite a lot </strong><strong>on</strong><strong> maintenance, heating and cooling, software licenses and other expenses</strong>.”</p> <p>GAO, which has implemented <a href="https://www.cdwg.com/content/brands/nutanix/default.aspx">Nutanix</a> hyperconverged solutions, is one of numerous agencies that are deploying HCI. In addition to the consolidation of IT systems and cost savings, these agencies also find that hyperconvergence has the power to greatly simplify data center operations and to improve management capabilities.</p> <p>Several manufacturers are bringing HCI solutions to the market, including Nutanix, <a href="https://www.cdwg.com/content/cdwg/en/brand/hpenterprise.html">Hewlett Packard Enterprise</a>, <a href="https://www.cdwg.com/content/cdwg/en/brand/emc.html">EMC</a>, <a href="https://www.cdwg.com/content/cdwg/en/brand/cisco.html">Cisco Systems</a> and <a href="https://www.cdwg.com/content/brands/commvault/default.aspx">Commvault</a>. As they gain maturity in the HCI deployments,<strong> agencies are finding that the technology also can help ease the migration to cloud environments</strong>.</p> <p><a href="https://fedtechmagazine.com/register?newsletter" target="_blank"><strong>SIGN UP</strong>: Get more news from the <em>FedTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Agencies Cut Costs, Gain Performance with HCI</h2> <p>HCI is on a trajectory to greater adoption across all sectors, including the federal government, says Eric Sheppard, research manager for IDC.</p> <p>A survey of 150 federal IT decision-makers <a href="http://ir.nutanix.com/company/press-releases/press-release-details/2016/Legacy-Infrastructure-Causes-Concerns-for-Federal-IT-Departments-Survey-Shows/default.aspx">conducted in 2016 by Market Connections and sponsored by Nutanix</a> found that <strong>more than one-third of respondents had already implemented HCI or were planning to do so in the near future</strong>.</p> <p>“This push is really being driven by the desire for operational simplicity,” Sheppard says.</p> <p><img alt="FT_Q118_F_Hayes-elpunto.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_F_Hayes-elpunto.jpg" /></p> <p>That was certainly true for the <a href="https://www.state.gov/">State Department</a>, which has been migrating enterprise data centers since 2015. The department invested in Dell EMC Vblock converged technology for larger scale data center operations and <a href="https://www.cdwg.com/product/VCE-VxRail-Manager-VxRail-HCIA-Appliance-v.-4.0-license-1-device/4352980?pfm=srh">VxRail </a><a class="gr-progress" href="https://www.cdwg.com/product/VCE-VxRail-Manager-VxRail-HCIA-Appliance-v.-4.0-license-1-device/4352980?pfm=srh">hyperconverged</a><a href="https://www.cdwg.com/product/VCE-VxRail-Manager-VxRail-HCIA-Appliance-v.-4.0-license-1-device/4352980?pfm=srh"> technology</a> where appropriate.</p> <p>“We had gone through some of the same pain points as other federal agencies<strong> in terms of being technologically stovepiped, especially with our critical applications</strong>, resulting in a lack of coordination and communication,” says Michelle Sparrow-Walker, director of the State Department’s Systems Integration Office. “We really felt that the converged technology was going to give us an environment where we could streamline the data center service.”</p> <p>With this approach, <strong>data center personnel can manage the entire infrastructure through a single, comprehensive dashboard </strong>rather than individually managing computing and storage devices and networking components in isolation.</p> <p>“We expect <strong>improvements in our time to deliver service</strong>s because we can provision a lot more quickly through automation in this environment than we could before,” Sparrow-Walker says.</p> <p>She adds that the converged infrastructure helps reduce the overall administrative burden in several ways, including maintenance and management. “For example, we can now apply patches all the way from the firmware through to the virtual operating system environment, and that allows us to <strong>keep all of our systems across all data centers patched at the current level, which significantly reduces our security vulnerabilities</strong>,” she says.</p> <p>What’s more, the agency will be able to <strong>shut down one of its four enterprise data centers</strong>, giving it a much smaller data center footprint.</p> <h2>A Path to Better, Simpler VDI</h2> <p><a href="http://www.sandia.gov/">Sandia National Laboratories</a> decided to move its virtual desktop infrastructure (VDI) from legacy hardware to a hyperconverged solution in 2014, says Nicole Ballard, manager of infrastructure computing.</p> <p>“I needed my team to <strong>focus on the user experience of the virtual desktop as opposed to spending a whole lot of time on the back-end piece</strong>,” she says. “As a result of this, we’re now able to look at providing additional value-added serv­ices, including higher-end graphics and more integration with mobility, which before we wouldn’t have had the resources to even think about.”</p> <p>She agrees that the <strong>ease of management and maintenance is one of the biggest benefits of HCI</strong>. The technology can be scaled up quickly and easily, and it has built-in self-correcting and failover capabilities, which makes it much more resilient than other architectures. Troubleshooting is simplified by the fact that team members can manage and view everything on a single management console. And HCI takes up a lot less rack space, leaving room for other IT solutions within the data center.</p> <p>“My goal is that my users never have to worry about anything that happens behind the monitor,” Ballard explains. “Hyperconverged infrastructure helps us to make that happen.”</p> <h2>Hyperconvergence Spurs a Cultural Shift in IT</h2> <p>Despite the many benefits they gain, agencies also <strong>may face challenges in adopting converged infrastructure, the most difficult being the cultural shift</strong>.</p> <p>With the converged model, for example, system owners who are used to having full control must learn to share resources and cede some administration and decisions to the data center team.</p> <p><img alt="FT_Q118_F_Hayes-quote.jpg" data-entity-type="" data-entity-uuid="" src="/sites/fedtechmagazine.com/files/FT_Q118_F_Hayes-quote.jpg" /></p> <p>Data center personnel also have to<strong> adjust to new processes, service delivery and a new technology</strong> that requires generalized knowledge across all three functionalities, while supporting and maintaining a disparate and specialized legacy environment during migration.</p> <p>The simplicity of the approach also makes it simple to use, according to Ballard: “It’s a relatively quick thing for team members to pick up. It doesn’t take years and years of training, like it might have in the past.”</p> <p>The flexible and extensible nature of hyperconverged infrastructure has other benefits too. At Sandia, Ballard and her team <strong>have brought 2,000 of Sandia’s 12,000 users into the VDI environment</strong>. But as the technology evolves, and as she and her team replace and add new nodes over time, she expects to <strong>eventually have as much as 75 percent of the user base on VDI</strong>.</p> <p>“There are a lot of users that we can capture today that we would not have been able to capture when we started our VDI solution,” she says. “I anticipate that that will continue to be the trend.”</p> <h2>Make Federal Cloud Migrations Easier</h2> <p>At GAO, officials also see hyperconverged infrastructure as <strong>critical as they prepare to move to the cloud</strong>. “By being virtualized already, it will definitely put us in a position then to be able to move from on-premises to an off-premises Platform as a Service,” says Prate.</p> <p>Sparrow-Walker agrees that converged infrastructure puts the State Department in a prime position to fulfill the <a href="https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/egov_docs/federal-cloud-computing-strategy.pdf">federal Cloud First policy</a>, even if the transition doesn’t happen immediately. The department, she says, will soon begin <strong>consolidating more than 100 nonenterprise data centers</strong>. Systems that aren’t immediately moved to the public cloud will move into enterprise data centers and onto converged infrastructure.</p> <p>“We’ll have the ability to offer our customers high availability and disaster recovery, and we’ll be able to<strong> implement a software-defined data center solution on that converged infrastructure, all of which will allow us to speed up our provisioning and </strong><strong>deprovisioning</strong><strong> and deliver services more quickly</strong>,” Sparrow-Walker says. “Because we will have centralized those workloads onto virtual infrastructure, it will make it easier to migrate into a virtual environment in the cloud, if and when we’re ready to do that.”</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P523</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Data Center</div> </div> <div> <div>CDW Segment</div> <div>Federal</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/taxonomy/term/7446" hreflang="en">Engagement</a></div> </div> <div> <div>Content Length</div> <div>Over 1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/12/gsa-gives-agencies-more-options-modernize-data-centers-hyperconvergence"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201712/FedTech--Hyperconvergence.jpg?itok=25by4ZZV" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2017/12/gsa-gives-agencies-more-options-modernize-data-centers-hyperconvergence"><span>GSA Gives Agencies More Options to Modernize Data Centers via Hyperconvergence</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/09/7-reasons-why-hyperconvergence-makes-sense-feds"><img src="/sites/fedtechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/FedTech/201709/FedTech--Hyperconvergence_0.jpg?itok=3I2VuqNx" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://fedtechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2017/09/7-reasons-why-hyperconvergence-makes-sense-feds"><span>7 Reasons Why Hyperconvergence Makes Sense for Feds</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers" data-title="How #hyperconverged infrastructure can help agencies such as @StateDept streamline their data centers. #HCI #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://fedtechmagazine.com/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers" data-title="How #hyperconverged infrastructure can help agencies such as @StateDept streamline their data centers. #HCI #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Ffedtechmagazine.com%2Ftaxonomy%2Fterm%2F810%2Ffeed" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://fedtechmagazine.com/article/2018/02/how-hyperconvergence-simplifies-agencies-data-centers" data-title="How #hyperconverged infrastructure can help agencies such as @StateDept streamline their data centers. #HCI #FedIT #GovIT" data-via="FedTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>14</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/heather-b-hayes"> <div>Heather B. Hayes</div> </a> </div> <div class="author-bio"> <p> <div><p>Heather B. Hayes has been covering technology, business and education topics for more than 20 years and has written more than 2,000 published articles. She lives in Virginia.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40381"></a></p> <p class='speaker'> </p> </div> </div> Wed, 14 Feb 2018 15:13:55 +0000 phil.goldstein_6191 40381 at https://fedtechmagazine.com