Unified Communications Manager Cloud for Government (UCM) – Formerly Hosted Collaboration Solution for Government (HCS-G)

Iron Bow’s UCM (formerly HCS-G), powered by Cisco, is a FedRAMP Authorized cloud-based collaboration service built to help you improve communication capabilities, empower your mobile workforce, meet cloud-first mandates and maintain stringent security standards. Check out this video and see how we can help your agency overcome key IT and business challenges.

See what VDI can do for your agency.

The case for Virtual Desktop Infrastructure (VDI) has never been stronger. Agencies are looking for better approaches to securing and managing end-user devices. Check out this infographic and see what’s driving the interest in VDI solutions—and what concerns are slowing agencies down.

@Iron_Bow
About TechSource

Welcome to Iron Bow's TechSource, a blog about the issues facing the government and industry today and the technologies being adopted to help overcome them.

Category: Cyber Security


Cyber Security: The Eggs in the Cake Batter, Not the Frosting on Top

Imagine a scenario where an employee at an information-rich agency like the IRS or DOJ opens an email that looks like it’s from their manager or a colleague, but instead of taking them to a safe website, when they click on the link it downloads malware onto their laptop. The infected computer, running on an […]

Keep Reading

Juergen Bayer

September 5, 2019

Cyber Security

Automation, Networking and Software-Defined Everything: Three Takeaways from Cisco Live

The Cisco Live event in San Diego last month provided incredible insight into the evolution of networking technology and how it’s moving forward. The event provided an opportunity to not only experience the most cutting-edge technologies, but also talk with incredibly smart people about what innovative solutions are now available for our federal clients. From […]

Keep Reading

Ryan Wolfe

July 24, 2019

Cyber Security  •  Networking  •  Software-defined Networking

Art of War 2.0: Internet of “Battlespace” Things Demand World-Class Security from Trusted Partners

Though never envisioned by Sun Tzu in The Art of War, our nation’s enemies are now turning to advanced cyber security threats as one of their latest weapons targeting Internet of “Battlefield” Things (IoBT), defined as nearly everything connected to a network within our military’s defense arsenal. On this front, “choose your partners carefully” is […]

Keep Reading

Donald Rye

June 18, 2019

Cyber Security  •  Data Center  •  IT Modernization

Industry Must Step Up to Help Secure DoD Technology

More than any other agency in the federal government, the Department of Defense (DoD) faces incredible challenges when it comes to cyber security. The problem: our warfighters should be able to use the most cutting-edge technology, but they need to make sure systems and devices are protected against bad actors and nation states. In February, […]

Keep Reading

Rob Chee

May 7, 2019

Cyber Security

What Did 2018 Teach Us About Cyber Security?

Cyberattacks in 2018 ran the gamut. We saw threats hiding out in compromised systems to steal computing power and information, and we saw them on an international stage, taking down the opening ceremony of the Olympic Games. Some of last year’s most impactful cyber threats, as outlined in Cisco’s February 2019 Threat Report, offer us […]

Keep Reading

Rob Chee

April 23, 2019

Cyber Security

Tech Trends 2019: Software-Defined Everything, Collaboration and Security

In 2019, agencies will be looking for efficiency and flexibility as they take the next step in modernizing their IT infrastructure. While previous years have seen the federal government warm up to digital transformation, this year it will begin to reap the benefits of those investments, making it easier for federal employees to collaborate and communicate […]

Keep Reading

Jim Smid

Agencies Need Continuous, Automated Monitoring to Tackle Future DNS Attacks

In late January, the Department of Homeland Security (DHS) issued an emergency directive to mitigate the effects of a domain name system (DNS) hijacking campaign. DHS’ Cybersecurity and Infrastructure Security Agency noted in a letter to agencies that it was aware of multiple executive-branch domains targeted by the attacks, which redirected and intercepted web and […]

Keep Reading

Rob Chee

March 15, 2019

Cyber Security

How Standardizing RMF Will Create Value for the Military

Imagine you work at a manufacturing company. The company is divided into four separate divisions that produce different products, using the same equipment. The CEO develops a set of controls to make sure that each piece of equipment used in manufacturing products is safe and efficient. One division decides to modernize its processes before the […]

Keep Reading

Brent White

January 3, 2019

Cyber Security  •  Networking

Automation: Redefining Cyber Protection

According to Gartner’s Innovation Insight for Security Orchestration, Automation and Response report, organizations struggle to keep up with the vast number of new cyber security attacks because they’re too often utilizing manual processes to combat breaches. In the United States alone, cyber security incidents skyrocketed over the last five years. In 2012, about 419 million […]

Keep Reading

Ryan Wolfe

November 26, 2018

Cyber Security

AI Will Power the Future—Are You Ready?

By 2019, 40 percent of all digital transformation initiatives will be enabled by AI. AI is already a part of most people’s daily lives; from dynamically pricing Uber trips and making Google maps route decisions to tagging friends on Facebook and setting FICO scores to determine our credit worthiness. While there are many applications of […]

Keep Reading

Steve Heibein

October 23, 2018

Big Data & Analytics  •  Cyber Security

RMF and the Evolution of Cyber Security Frameworks

Government cyber security regulation isn’t new, but it is constantly changing. Nearly a decade after the first relatively static cyber security standards were introduced in 2006, the National Institute of Standards and Technology (NIST) set out to develop a continuous process for networks security with the Department of Defense  (DoD) Information Assurance Certification and Accreditation […]

Keep Reading

Rob Chee

October 18, 2018

Cyber Security  •  IT Modernization

Don’t Ignore the Cryptominer in the Coalmine: What You Need to Know About the Biggest Cyber Threat Trend of 2018

While the market value of cryptocurrencies has recently experienced a downturn, there’s no denying its exponential growth, peaking at over $700 billion in early 2018. While investors have seen the value in cryptocurrency, so have bad actors and cyber criminals looking to take advantage of this emerging trend. Cryptomining attacks are relatively lucrative, simple to […]

Keep Reading

Rob Chee

October 16, 2018

Cyber Security

Transforming Legacy Systems: Where Cloud and Processing Power Intersect

The “Journey to the Cloud” describes a wholesale shift in the technology, operation, and administration of the modern data, in ways not seen since server architectures were fundamentally redrawn with the introduction of the microcomputer, in the 1980s. This change means that the traditional three tier data center era, of separately managed server, storage and […]

Keep Reading

Jason Lamb

September 12, 2018

Cloud  •  Collaboration  •  Cyber Security  •  Data Center