Accelerate cloud sales to the SLED market | Uniform Guidance

Using a contract that was procured in accordance with Uniform Guidance, 2-C.F.R. Part 200, allows state and local (SLED) customers to bypass the traditonal request for proposals (RFP) process. The RFP process is often necessary to execute a deal; it is time consuming and labor intensive. The process can often be bypassed. 

immixGroup recently earned a publicly procured, competitively solicited contract award for Equalis Group Cloud Solutions contract with the Cooperative Council of Governments (CCOG). This contract allows IT suppliers and IT resellers to provide, through EC America, cloud products and services to public sector entities across the country through a legal and compliant exemption to the traditional RFP process. This contract was procured and awarded in accordance with the requirements of the Uniform Guidance.

It’s the perfect time to advise customers about the benefits of using this legal and compliant exemption

Read more of this post

Top 3 Cloud Security Priorities in the Federal Government

By Jessica Parks, Market Intelligence Analyst

The last year of teleworking has caused an uptick in hybrid and multi-cloud environments, due to the flexibility, scalability and cost efficiencies that these environments offer dispersed teams. As federal agencies look to their futures within these increasingly complex environments, you can bet security is top of mind. When talking with your customers about how you can help provide peace of mind, keep in mind they are likely prioritizing one (or all!) of the following:

1) Baking security into products during the development process

As more federal software development teams embrace DevOps and DevSecOps, they recognize that developing applications on cloud platforms can further shorten timelines for spinning up new solutions. With this recognition comes an increased focus on baking security into these solutions during the development process.

Read more of this post

TIC 3.0 Is Shaping Government Network Security to the Edge

By Jessica Parks, Market Intelligence Analyst

In an increasingly interconnected world, we often take for granted the availability and security of networks whenever we sign on to our devices. Agencies are now taking a closer look at the bandwidth and security of their networks and the Department of Homeland Security has been ahead of that curve — working on updating its Trusted Internet Connection (TIC) policy.

Draft guidance on TIC 3.0 is in process, with new documents expected to be published this spring. TIC policy aims to standardize security rules for networks, so you can bet federal agencies will be paying close attention to this guidance as it is released. Here is a look at TIC 3.0 and what it means for you.

Security Moving Out

With more agencies moving away from traditional network perimeters and into complex cloud environments, TIC 3.0 is defining where to secure these networks. One thing is for sure, as TIC 3.0 Program Manager Sean Connelly pointed out at the FCW Cloud Security Workshop in February, TIC 3.0 is moving security tools towards the users and applications themselves.   Read more of this post

%d bloggers like this: