April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

January 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Three trends that will dominate government IT

Walker White

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.

IT leaders are quickly learning that application rationalization is a clear path toward shrinking their data center footprint, allowing them to remediate legacy applications and identify duplicative solutions. Coupled with additional data to create a comprehensive deployment profile -- software support dates, end of life information, licensability -- rationalization can not only improve efficiency, but has the potential to dramatically reduce spending. To do this, however, organizations need a solution that can rapidly provide visibility into their environment’s entire IT profile. It’s impossible to rationalize without knowing exactly what you have.

Virtualization, on the other hand, is also fast becoming a necessity with the welcome result of getting more out of your existing infrastructure and minimizing your environmental footprint. Virtualization can be used to run multiple applications -- or even multiple operating systems -- off the same hardware. And, rather than sending data into the cloud, virtualization can put you in charge of your own environment. But the key to successful virtualization is doing it securely, with strong support and with the ability to normalize hardware data to a common standard for easy analysis and inventory.

Lastly, cyber security is an aspect of IT that must constantly evolve to meet increasingly sophisticated threats -- and often, holes in an enterprise’s defenses are only visible after it’s too late. More than ever, organizations need to proactively identify and mitigate security vulnerabilities, which can run into the millions. Fortunately, security automation is improving at lightning speed. Today there are solutions that can automatically catalog an enterprise’s entire software inventory, instantly identifying risks that would take months of manual effort to see.

An upfront investment to modernize and secure the government IT data will ultimately yield untold savings and ensure the integrity of the enterprise. By focusing on these three key areas as they prioritize their initiatives for the coming year, IT leaders will reap the rewards of leaner, more efficient and more secure organizations.

Walker White is President of BDNA, a Data as a Service company whose industrialized approach to delivering clean data enriched with the right market intelligence helps solve the challenge enterprise IT has faced for years in wasteful spending -- recognizing risk, improving IT processes and unlocking new value streams.


Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...