See what VDI can do for your agency.

The case for Virtual Desktop Infrastructure (VDI) has never been stronger. Agencies are looking for better approaches to securing and managing end-user devices. Check out this infographic and see what’s driving the interest in VDI solutions—and what concerns are slowing agencies down.

@Iron_Bow
About TechSource

Welcome to Iron Bow's TechSource, a blog about the issues facing the government and industry today and the technologies being adopted to help overcome them.

Category: Cyber Security


Connectivity is Key: Three Takeaways from Cisco Live 2018

Emerging technologies are redefining what’s possible for government. Not just the technologies themselves, but also their interconnected capabilities and the analytics they can provide. Collaboration and connectedness emerged as the central themes during this year’s annual Cisco Live in Orlando. Attendees got a look into how connected tech can enable organizations, including federal agencies, to […]

Keep Reading

Josh Finke

July 5, 2018

Collaboration  •  Cyber Security  •  Managed Services

Tangled: Figuring Out Where Wireless Fits

Wireless networks that stretch through hundreds or even thousands of square feet of agency office space can be complicated at best and downright baffling at worst. When federal workers require access to information quickly or need a solid connection to video conference with a colleague, a properly set up and managed wireless network can mean […]

Keep Reading

Greg Gordon

June 20, 2018

Cyber Security  •  IT Modernization  •  Networking  •  Wireless

Industry Can Bridge the IT Gap Between Intelligence and Defense Communities

As cyber missions become a routine part of our military strategy, the intelligence community (IC) and warfighters need to find common ground in order to produce the strongest cyber force in the world. The federal government doesn’t have to take on this task alone. The private sector can play a big role in bridging that […]

Keep Reading

Chris Cleary

May 22, 2018

Cyber Security  •  IT Modernization

The Theory of Everything: IT Environments in a Connected World

Every spring, Iron Bow gathers for its Annual Engineering Summit, where all technical and engineering staff are brought together along with leading OEMs to present, discuss and share best practices on newest products, programs and cutting-edge solutions. Although our core capabilities are are tackled and managed in what we all our Practice Teams. After three […]

Keep Reading

Rob Chee & Greg Stemberger

Security is Critical, but Compliance is Required: How Agencies Can Address Both

Last year, the National Institute of Standards and Technology (NIST) released an updated set of digital identity guidelines called Special Publication (SP) 800-63-3. The updates provide recommendations to agencies for preventing fraud, unauthorized network access and, most importantly, cyber risk. By June 2018, agencies are expected to increase and enhance their use of multi-factor authentication among […]

Keep Reading

George DeLisle

May 11, 2018

Cyber Security

VDI: Bringing the Workspace to Workplace

At Iron Bow’s recent Engineering Summit, I extolled the virtues of virtual desktop infrastructure (VDI). From faster IT deployment to lower maintenance costs, VDI is driving workplace transformation in the private and public sectors. To the uninitiated, VDI can seem daunting. It’s easy to get lost in the tech terminology and difficult to understand a […]

Keep Reading

Troy Massey

May 3, 2018

Cyber Security

Micro-segmentation: The Path to More Efficient and Effective Network Security

With the cyber security threat landscape getting bigger by the second, every security professional wants to limit their network’s attack surface. Current physical networks and traditional firewalls may prove that task difficult as bad actors find more and more ways to exploit the legacy technology. Fortunately, if you’re deploying a software-defined network or working with […]

Keep Reading

TechSource Editor

Proliferation of IoT Continues to Shape Cyber Security Best Practices

Anybody who’s set up a home router has an opinion on the future of cyber security. From state-sponsored threats to bad workplace cyber hygiene, there are a million ways to explain why 2018 will be a trying year for cyber security experts. With all the predictions undoubtedly swirling in your head, we’d like to offer […]

Keep Reading

Rob Chee

March 30, 2018

Cyber Security  •  Digitization + IoT

Interoperability is Key to Managing Government Cyber Security

While cyber attacks are getting more complex, with both rogue actors and nation states looking for ways to breach government security, federal agencies—similar to the private sector—are facing a shortage of cyber security talent. Agencies are dealing with this reality every day, and that makes it incredibly difficult for them to fill in the talent […]

Keep Reading

Will Ash

March 14, 2018

Cyber Security

Collaboration is Key to Developing the Modern Worker’s Notebook

Notebooks are not a one-size-fits-all product. With the workforce becoming increasingly mobile, the need for a portable device that can collaborate with different systems and communications applications is greater than ever. These realities are especially true for federal agencies whose workers service specific missions not only across the country but also all over the world. […]

Keep Reading

Larren Kingsford

With New Technology Comes New Cyber Security Responsibilities

Cloud computing has revolutionized the way we do business. There’s no doubt that how we work now is built around the efficiencies and mobility afforded by the cloud. While the adoption of cloud has brought incredible benefits to government, like any new technology it comes with shifting standards for cyber security. Because of this, it’s […]

Keep Reading

Rob Chee

March 5, 2018

Cloud  •  Cyber Security  •  Digitization + IoT  •  Managed Services  •  Mobility + End User Devices  •  Wireless

Confused By the Federal Government’s Risk Management Framework?

The rules and regulations of federal IT contracting can be confusing, to say the least. From the Federal Risk and Authorization Management Program (FedRAMP) to the Defense Federal Acquisition Regulation Supplement (DFARS) to the Code of Federal Regulations (CFR), it’s easy to inadvertently leave a box unchecked. At Iron Bow, we work within these guidelines […]

Keep Reading

Brent White

February 21, 2018

Cyber Security

Fearful of Losing Your Private Data? Check Out These Tips For Safeguarding Your Most Important Information

Thirty-seven years ago, well before the internet and decades prior to the millions of connected devices we use today, 50 countries got the idea to make sure private data wasn’t being used for malicious purposes. The countries sat together on that day in January 1981 and signed Convention 108—the first to protect the right to privacy […]

Keep Reading

TechSource Editor

February 21, 2018

Cyber Security  •  Data Center