In response to the global need to work from home, we’ve seen many government agencies put a renewed focus on equipping their workforces with modern, mission-critical technologies.
Posts Tagged: tic 3.0
This roundtable discussion covered topics, from the continued relevance of the original TIC vision to the uncertainty and excitement about its evolution.
In theory, a cloud-based security solution should provide the necessary flexibility and scalability. However, many so-called cloud solutions were not designed for the cloud but instead retrofitted for it, relying on script languages to provide automated capabilities.
Any discussion about improving the security of the federal IT enterprise sooner or later comes around to the topic of network visibility.
The federal government’s sudden, widespread transition to a remote work environment has highlighted the importance of its decision to make policy decisions that remove barriers to cloud adoption.
When the COVID-19 crisis forced many federal employees to start working from home, agency IT leaders found themselves in a new environment — employee living rooms. They quickly realized that while their business continuity plans address key issues around connectivity, security at this scale has proven to be something of an afterthought.
The rise of cloud, mobility and related applications effectively have undermined the concept of perimeter-based security. That is why the Trusted Internet Connection (TIC) 3.0 addresses the need to address security when users, applications and data reside outside the perimeter.
The evolution of the Trusted Internet Connection (TIC) program – from TIC 1.0 more than 10 years ago to TIC 3.0 today – reflects how technology often moves in unexpected ways.
The hope now is that agencies won’t have to bend backwards to satisfy TIC. The hope is that TIC will instead be flexible enough for agencies to adopt modern solutions tailored to their needs.
Learn best practices for better visibility across workload and data hosting environments to help your agency realize the true potential of cloud.