by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : May 2016
The Ar my, for exa mple, is giving the IoT a lot of thought. Speaking on Jan. 29 at the Institute of World Politics in Washington, D.C., Lt. Gen. Edward Cardon, head of the Army Cyber Command , said that the Defense Department is looking for ways to leverage the military’s countless IoT assets, while also think ing hard about the security. “People are connecting stuff to the Internet that we never thought would be connected,” Cardon said. “You know people are worki ng on hacking your Fitbit.” This is a familiar dilemma for federal agencies. More often than not, the emergence or evolution of key technologies inevitably increases the complex ity of the federal IT enterprise, raising new concerns about both security and performa nce. But there is no going back to simpler times, because the benefits of innovation are worth the extra work involved. The task now is to leverage other new or evolving technologies to manage that complexity. Here is a look at some of the tools that are mak ing this possible. THE FEDERAL IT ENTERPRISE TOOLKIT NETWORK VIRTUALIZATION By now, just about every agency has invested in ser ver virtualization, recognizing how it improves the manageability and scalability of the data center. Now they are realizing the value of network virtualization, which allows them to treat their physical network as a pool of transport capacity. STORAGE VIRTUALIZATION Like ser ver and network vir tualization, storage virtualization puts the intelligence at the virtual machine level. This simplifies the management of storage resources, while also providing storage managers with an unprecedented ability to define service levels. ADVANCED ANALYTICS Agencies might not realize it, but they already have a wealth of data on the security and performance of their enterprise. This is data generated by their various networks and systems. Given the right tools, IT managers can gain unprecedented visibility into inefficiencies, performance bottlenecks, and hidden vulnerabilities or cyber threats. APPLICATION DELIVERY AND SECURITY When it comes to enterprise performance and security, people often focus on the infrastructure. But it is also critical to optimize operations at the application layer for both availability and security. This is especially important as agencies look to mobilize the workforce. DIGITAL RIGHTS MANAGEMENT Video and other rich media will play a vital role in the new generation of digital ser vices. The question becomes how to manage and protect that content across various platforms. A new generation of digital rights management software is rising to the challenge. CLOUD AUTOMATION As agencies begin to shift applications and services to the cloud, they will see immediate benefits in terms of the adaptability, agility and efficiency of the enterprise. But to make the transition really pay off, they need to invest in pervasive automation, as a way to both reduce the workload on IT administrators and to enforce consistent, effective processes. S-13 SPONSORED CONTENT SECURING THE ENTERPRISE
March and April 2016
June and July 2016