Federal Insights

Security Starts with Visibility and Automation

by walkerj on ‎09-26-2017 06:32 AM (1,037 Views)

When federal agency CIOs discuss the challenges that keep them up at night, there’s no lack of topics to explore. However, there’s one issue that is constantly bubbling to the top. According to Professional Services Council and Grant Thornton’s annual CIO study, cybersecurity is the top concern for federal IT leaders. This is likely to only increase, as 81 percent of CIOs in CIO Magazine’s annual study noted a greater involvement in cybersecurity in the most recent survey than in the past.

 

While there are new, increasingly advanced cybersecurity solutions constantly introduced, cyber criminals are nimble and have many resources at their disposal. It’s too easy for cyber criminals to stay a step ahead given misaligned incentives. In such an environment, it’s critical that agency approaches to cybersecurity start with a solid baseline that lies within the agency’s network. Just like network performance and reliability, security starts with visibility and automation, and successful efforts cannot exist in silos.

 

Network visibility can reveal a lot about an agency’s systems, from where the majority of traffic flows originate to the times of most activity. Similarly, network insights are valuable from a security perspective. Just as network visibility can identify when traffic flows require a change in network configuration, they can also point to anomalous traffic patterns that likely indicate a security breach. For example, if an agency typically sees most activity coming from within the United States during normal work hours, an influx of activity from Europe at 2:00 a.m. may be enough to trigger concern.

Read more...

It is no surprise that cybersecurity is a growing concern for the federal government. The most recent FISMA report reflects 77,000 successfully executed cyber incidents occurring in 2015, a number that has increased each year. Part of the growing challenge is due to the diverse and ever-expanding number of endpoints and data sources for agencies to secure, especially on government campuses. With this landscape as a backdrop, campus environments require a tailored approach to security and encryption due to their varied department needs and multiple physical locations. Here are traits to look for:

Read more...

At Brocade’s Federal Forum, government and industry will come together to discuss how new, innovative technologies will change the way the federal government serves citizens and warfighters through network modernization and the concept of the New IP. Many of the conversations at Federal Forum will focus on the possibilities modernization enables, but what does this mean in action? What does the technology look like?

 

To answer these questions, keynotes, breakouts and panel sessions will be coupled with a series of demonstrations in the Technology Pavilion. The Technology Pavilion will showcase advancements in network management and data visibility and provide an interactive experience that can be tailored to fit specific interests and questions from visitors to the Pavilion. Those who attend can expect to explore various aspects of software-defined networking (SDN), network security, high-performance analytics technology and much more.

Read more...

Cybersecurity Awareness Month – Don’t Ignore the Network

by walkerj on ‎10-26-2015 07:29 AM (10,423 Views)

After this summer’s high profile OPM breach, there’s no question that cyber attacks are affecting the federal government with an alarming frequency. According to the Government Accountability Office, data breaches at government agencies involving personal data have jumped 91 percent over the past eight years. This Cybersecurity Awareness Month, it’s time to consider all elements of a secure environment – starting with the network.

Read more...

Last month at the Federal Forum in Washington, D.C., I joined Brocade’s industry partners and the government’s leading IT decision makers to discuss how new, exciting technologies are changing the way our government serves the American citizenry, enables warfighters and meets the demands of a growing list of stakeholders.

Read more...

Budget Constraints, Network Performance Top Government’s List of Security Barriers

by walkerj ‎04-27-2015 08:37 AM - edited ‎04-27-2015 10:24 AM (6,673 Views)

With breaches affecting government entities from the White House to the Department of State, high profile security incidents have dominated headlines over the past year. According to a Government Accountability Office (GAO) report, the U.S. Computer Emergency Readiness Team (CERT) recognized more than 46,000 security incidents in 2013. With these issues in mind, it comes as no surprise that a recent Market Connections survey of federal IT decision makers and influencers found that only 26 percent of agencies feel their network data is fully protected. 

Read more...

Announcements
We are excited to announce that the vADC, vRouter, vEPC and SDN Controller Acquisitions from Brocade are complete!
Download FREE NVMe eBook
Gen6 Downloads and Videos
Labels