Unified Communications Manager Cloud for Government (UCM) – Formerly Hosted Collaboration Solution for Government (HCS-G)

Iron Bow’s UCM (formerly HCS-G), powered by Cisco, is a FedRAMP Authorized cloud-based collaboration service built to help you improve communication capabilities, empower your mobile workforce, meet cloud-first mandates and maintain stringent security standards. Check out this video and see how we can help your agency overcome key IT and business challenges.

See what VDI can do for your agency.

The case for Virtual Desktop Infrastructure (VDI) has never been stronger. Agencies are looking for better approaches to securing and managing end-user devices. Check out this infographic and see what’s driving the interest in VDI solutions—and what concerns are slowing agencies down.

About TechSource

Welcome to Iron Bow's TechSource, a blog about the issues facing the government and industry today and the technologies being adopted to help overcome them.

Category: Cyber Security

Woman professional in front of her desktop securing the hybrid workforce

A Better Approach to Securing the Hybrid Workforce

The shift to remote work has been dramatic in its scope. According to Pew Research, 71 percent of Americans were working from home by December 2020, versus 20 percent pre-pandemic. Most people would like it to stay that way. A Gallup poll found 60 percent of respondents say they’d prefer to continue working remotely in […]

Keep Reading

Rob Chee, Director of Cybersecurity Practice, Iron Bow & Peter Romness, Cybersecurity Principal, U.S. Public CTO Office, Cisco

February 3, 2022

Cloud  •  Cyber Security

HP Sure Click Enterprise

How HP Sure Click Enterprise is Supporting Productivity in Today’s Age of Cyber Security

Every day now, we’re seeing headlines of more organizations succumbing to ransomware attacks. With the FBI recently reporting an increase of 300,000 complaints of suspected internet crime and expected losses exceeding $4.2 billion, it is absolutely essential for organizations to protect themselves against cyber threats in order to maintain business continuity. Knowing that productivity hinges […]

Keep Reading

James Dobra and Andy Levitt

June 8, 2021

Cyber Security

Microsoft Surface Secure

5 Reasons Why Microsoft’s Surface Family is Secure for the Mobile Federal Worker

Because Microsoft has been a household name for decades, the expanse of their product portfolio can understandably be difficult to choose from when the software company has so much to offer under its umbrella. Their Surface product line of personal computers and interactive whiteboards, however, stands out not only because it makes the software company […]

Keep Reading

Tyler Ross

April 27, 2021

Cyber Security  •  IT Modernization

Business Resiliency

3 Questions to Ask Yourself to Determine Your Business Resiliency

We’ve seen more change in the past year than we have in any other time in recent history. Words like “agility,” “pivot,” “remote workforce” and “unprecedented” became the new buzz words. But these phrases came from a necessity as businesses started to recognize just how strong their Business Continuity plans actually were.  Nothing better than […]

Keep Reading

Bill Saltenberger

March 16, 2021

Collaboration  •  Cyber Security  •  Networking

LG Partners logo

Part 3 of 3: Security in Any Space: LG and the Power of Partnership

Anyone can tell you that security is important these days but this is especially true for the federal government. With security standards constantly evolving to keep up with required mandates and ever increasing cyber threats, the federal government having confidence in secure technology in order to accomplish missions is more important now than ever. LG […]

Keep Reading

Jennifer Eley

Technology trends

Top Tech Trends for 2021

If you’re like most organizations, you are emerging from the uncertainty of 2020 wondering what to expect next and how to best prepare your organization for the future by utilizing the best technology available today. Here are the top tech trends for 2021 and what you can expect in the months to come. Remote workforce […]

Keep Reading

Jim Smid

Top 5 Blogs 2020

Top 5 TechSource Blogs from 2020

As we (gratefully) close the chapter on 2020, here’s a roundup of your favorite TechSource blogs from this past year. We’re looking forward to the thought provoking topics that 2021 has in store. Iron Bow’s National Sales Conference Top 3 Takeaways Being held virtually this year didn’t stop Iron Bow Technologies’ annual National Sales Conference […]

Keep Reading

TechSource Editor

Data Loss Prevention | Cisco | Dell Technologies

Keeping Your Data on the Straight and Narrow: How Data Loss Prevention Supports Digital Transformation

Digital transformation means more data is spending more time traveling from point to point. It’s not possible and certainly not operationally effective to keep all data within the confines of an on-premises network. There really is no guarantee that any network is truly completely locked up from outside access. So with the security posture shift […]

Keep Reading

John Odey

December 1, 2020

Cyber Security  •  IT Modernization  •  Networking

Cisco Partner Summit 2020

Key Takeaways from Cisco Partner Summit 2020

Just because Cisco held their Partner Summit in a digital format for the first time this October 28 and 29 did not mean that any quality or value was compromised. With 19,000 registrants attending, Cisco did not disappoint with the delivery of their company updates, roadmap for the future and product announcements across their $50 […]

Keep Reading

TechSource Editor

October 30, 2020

Cyber Security  •  From TechSource Editor  •  IT Modernization

Zero Trust Architecture | Cisco

Zero Trust: Enabling the Move from Trust No One to Trust the Known Ones

The DoD cyber landscape is ever-changing with more remote users, greatly expanding IoT, mobile devices and innovative new applications. Zero Trust Architecture (ZTA) begins with the premise that all networks, internal and external, should be treated as untrusted. Users connecting to the network have to prove valid authorization before being allowed access.  It defines a […]

Keep Reading

Rob Chee

October 21, 2020

Cyber Security  •  IT Modernization

VMworld Takeaways

VMworld 2020: The Headlining Topics You Should Write Home About

VMworld is an annual conference put on by Iron Bow’s partner company, VMware. The 2020 conference from September 29 – October 1 was the first time the company has taken its annual event completely virtual. In addition to the slick interface and user-friendliness of the virtual event platform, VMware also brought a tsunami of content […]

Keep Reading

Troy Massey

October 6, 2020

Cloud  •  Cyber Security  •  Data Center  •  IT Modernization  •  Networking

Information Technology

Programmability: 5 Parts of a Whole Lot of Efficiency

In today’s culture of personalized solutions and immediate gratification, no piece of enterprise technology is perfect straight out of the box. Each workplace has its own unique processes, challenges and requirements.  How many times have you said or heard, “It’s great but…” or “I really wish it could also do…” Organizations heavily invest money and […]

Keep Reading

Ryan Wolfe

September 29, 2020

Cyber Security  •  IT Modernization  •  Networking

cloud technology | Dell Technologies | Intel | VMware

Key Takeaways from ‘Putting Cloud Smart into Practice: Lessons from the Frontlines’ Webinar

As federal agencies work to fulfill their critical missions from home during the COVID-19 pandemic, the cloud, with its scalability, reliability and security, has become increasingly important in allowing government to in a cost effective manner. On May 20, Iron Bow Technologies, in collaboration with Intel, Dell, and VMware, hosted a webinar titled “Putting Cloud […]

Keep Reading

Troy Massey & Rob Chee

June 23, 2020

Cloud  •  Cyber Security