4 ways to move from stovepipes to shared IT infrastructure

ROB STEIN | April 26, 2016

article image
Stovepipe is one of those words in the government vernacular that simply refuses to fade away. While agencies have made great strides moving from private networks and proprietary systems to the cloud and shared services, IT infrastructure in many places remains walled off within individual agencies, between agencies, and even between bureaus and commands. There have been legitimate reasons IT infrastructure remains stovepiped, and unsurprisingly, the way agencies are funded is front and center. If funding flows to an agency program, the natural process is for the agency to take the money and build something specific to that need or mission. For that reason, there was little incentive for an agency program to carve out budget to share those services with others.

Spotlight

OneSource Virtual

As a partner and customer since 2008, OneSource Virtual is dedicated exclusively to Workday and is one of the most experienced service providers in the ecosystem. Using an innovative Business Process as a Service (BPaaS) model, we are able to operate within your Workday application to deliver services and support as an extension of your team. Our Workday Experts have performed more than 380 initial Workday deployments, and include more than 320 Workday certified consultants holding over 860 total certifications.

OTHER ARTICLES

Why we need more 5G cyberhacks

Article | February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Read More

How to Rapidly Scale IT Infrastructure For Remote Workers

Article | April 13, 2020

Rapid IT infrastructure scaling is always challenging. In March 2020, the coronavirus caused a surge in remote workers as organizations switched overwhelmingly to work-from-home policies. Scaling IT infrastructure to support this sudden shift proved to be a struggle for IT teams, resulting in a migration to cloud-based applications and solutions, a rush on hardware that can support a remote environment, and challenges scaling VPNs to support remote worker security. Here are some of the insights and lessons learned from IT professionals.

Read More

New Ransomware Targets Critical Infrastructure in 2020

Article | March 31, 2020

Critical infrastructure, like power and water systems, face a number of cyber-security threats. Traditional ransomware variants can bring these systems down by encrypting files that are vital to their operation. However, a new variant poses an even greater risk to critical infrastructure. The Ekans ransomware is designed specifically to take down critical services, making anti-ransomware protection even more important in these environments. Ransomware is a well-known threat made famous by the WannaCry worm. The success of the 2017 WannaCry outbreak has inspired a rash of attacks and new ransomware variants in recent years.

Read More

5 TIPS TO ENSURE NETWORK SECURITY OF INTERNAL IT INFRASTRUCTURE

Article | May 3, 2021

What Is IT Infrastructure Security? If you are reading this blog, we would like to assume that you are either an aspiring cybersecurity professional or a business owner looking for ways to improve their network security. A business IT infrastructure includes networks, software, hardware, equipment, and other facilities that make up an IT network. These networks are applied to establish, monitor, test, manage, deliver, and support IT services. So, IT infrastructure security describes the process of safeguarding the core networking infrastructure, and it is typically applied to enterprise IT environments. You can improve IT infrastructure security by installing protective solutions to block unauthorized access, theft, deletion, and data modification.

Read More

Spotlight

OneSource Virtual

As a partner and customer since 2008, OneSource Virtual is dedicated exclusively to Workday and is one of the most experienced service providers in the ecosystem. Using an innovative Business Process as a Service (BPaaS) model, we are able to operate within your Workday application to deliver services and support as an extension of your team. Our Workday Experts have performed more than 380 initial Workday deployments, and include more than 320 Workday certified consultants holding over 860 total certifications.

Events