TIC 3.0 Is Shaping Government Network Security to the Edge

By Jessica Parks, Market Intelligence Analyst

In an increasingly interconnected world, we often take for granted the availability and security of networks whenever we sign on to our devices. Agencies are now taking a closer look at the bandwidth and security of their networks and the Department of Homeland Security has been ahead of that curve — working on updating its Trusted Internet Connection (TIC) policy.

Draft guidance on TIC 3.0 is in process, with new documents expected to be published this spring. TIC policy aims to standardize security rules for networks, so you can bet federal agencies will be paying close attention to this guidance as it is released. Here is a look at TIC 3.0 and what it means for you.

Security Moving Out

With more agencies moving away from traditional network perimeters and into complex cloud environments, TIC 3.0 is defining where to secure these networks. One thing is for sure, as TIC 3.0 Program Manager Sean Connelly pointed out at the FCW Cloud Security Workshop in February, TIC 3.0 is moving security tools towards the users and applications themselves.   Read more of this post

New IoT Opportunities to be Found at DoD Facilities

Mark Wisinger_100x135Internet of Things

By Mark Wisinger, senior analyst

Facilities management continues to be the strongest use case for IoT solution sales, especially at the Department of Defense, which maintains thousands of facilities both within and outside the continental U.S. Each individual building contains a wide variety of sensors and devices that need to be actively monitored.

A single building may have systems for fire alarm reporting, closed-circuit TV, HVAC, lighting control, smart grid and physical access control and may include water management and power management devices. The massive amounts of data collected by these systems could help drive better decision making to help the DOD operate more efficiently, protect its assets and personnel, and save money.

Access to HVAC, utility and security system data can provide enormous benefits, but there is inevitable risk too. The DOD is trying to get beyond just worrying about data security compliance and instead wants to focus on managing an acceptable amount of risk.

Read more of this post

%d bloggers like this: