Voices of Government IT

  • If zero trust is a mindset, here’s how to get into it

    In this interview, Mat Newfield goes in depth in the zero trust idea and what cyber people need to do to achieve a zero trust state.

  • Fresh advice for successful hybrid cloud deployments

    Federal agencies are no longer adopting cloud computing simply because of cloud-first policies or the need to reduce data centers.

  • Turn biometrics into full identity intelligence

    Unisys defines identity intelligence like this: The compilation of digital knowledge and trust on an entity with biometric, biographic and relevant publicly available data about that entity.

  • How micro-segmentation is securing the nation’s high-value critical assets

    Unisys Stealth is a leader in the emerging micro-segmentation field and built it for a unique DoD and Intel Community requirement.

  • Join the Modernization Revolution: The Way Forward

    When it comes to protecting the government’s IT infrastructure from cyberattacks, conventional wisdom has long held that modernization of outdated legacy systems can be a key driver of improved security. The results of a survey released Sept. 6 challenged that conventional wisdom. The poll, conducted by Unisys found that a majority of federal IT leaders believe modernization efforts have increased, not decreased, their overall security challenges

  • Building the Federal CIO Resume: Keys to Digital Government

    Changing roles and governance models affect CIOs at all levels of government.

  • Border Technology and Immigration Reform

    Immigration Reform is not a new topic but, is expected to become one of the top priorities when President-elect Donald Trump takes office in 2017. While all of the aspects of this new focus on…

  • The Path to Digital Government

    The path to digital transformation is inherently different for government organizations. Many government agencies are traditional “brick and mortar,” with huge infrastructure investments in hard assets such as buildings and legacy information technology (IT) systems. Government organizations are engaged in vital missions, and disruptions could seriously damage national interests and public trust. The transition to Digital Government is not an all-or-nothing proposition. Agencies will continue to optimize and leverage their legacy environments while they identify opportunities to implement new hosting models; strengthen data collection, integration, and analytics; and expand their digital capabilities throughout the enterprise.

  • The Rising Cyberthreats in Government

    2015 was known as “The Year of Cybersecurity Incidents.” However, this isn’t much different from what we saw in 2014, and 2013 and 2012. It’s just getting worse. Each time the public is exposed to a “massive breach,” it is bigger and more destructive than the last.

  • Law Enforcement in the Cloud: Providing an Integrated and Secure Solution

    Law enforcement agencies are faced with the challenges of securely storing and managing ever-increasing volumes of data while keeping up with the growing demand for technology that can improve public safety. To address these challenges, law enforcement agencies are looking at moving to the cloud.

  • Trends in Federal Security

    Government agencies are continually facing security threats both physical and cyber by insider and external sources. Separate physical and cyber security responses are no longer adequate to protect against increasingly sophisticated attacks. The convergence of physical and cyber security solutions and organizations is critical to stopping current and preventing future threats. Hear how advanced technology is being used to identify threat indicators and prevent security breaches.

  • The IT Vision of the Future and the Path to Get There

    IT budget pressures and the need for agility and efficiencies are forcing government agencies to adopt a modern IT vision of the future. While many agencies have a clear vision of where they want to go, the path to get there is often clouded. In this interview, hear about the transformational path that the Commonwealth of Pennsylvania (CoPA) is taking to host and operate what is expected to be one of the largest secure, cloud-based, on-demand IT implementations by a U.S. state government.

  • Transform to Modern Mission Critical: Modernizing Your SAP Landscape

    Many federal agencies recognize the need to modernize their mission-critical data centers to gain greater agility for more interdependent real-time applications while addressing the proliferation of anytime-anywhere mobile data access. To do so, organizations must find a way to move their current SAP applications from dedicated, legacy environments. However, for many, this means sacrificing mission-critical security and reliability to achieve the benefits of flexibility and cost efficiency. Learn how agencies can achieve the best of both worlds as Unisys and SAP experts discuss key strategies and solutions for transitioning SAP environments.

  • Achieving FISMA – High Compliance With Public Clouds

    Security concerns remain a major hurdle for federal agencies considering public clouds, especially when it comes to migrating mission-critical workloads. Agencies that have invested in their existing infrastructure still want to leverage the benefits of cloud utility-based services while meeting the compliance requirements of FISMA-High. How can government use public clouds to manage costs and improve IT service delivery to end users while overcoming security concerns and meeting FISMA- High?