See what VDI can do for your agency.

The case for Virtual Desktop Infrastructure (VDI) has never been stronger. Agencies are looking for better approaches to securing and managing end-user devices. Check out this infographic and see what’s driving the interest in VDI solutions—and what concerns are slowing agencies down.

@Iron_Bow
About TechSource

Welcome to Iron Bow's TechSource, a blog about the issues facing the government and industry today and the technologies being adopted to help overcome them.

PODCAST: Life After Heartbleed: Combating The Next Vulnerability

Every day, federal agencies are plagued with the most advanced cyber threats to their network environments that also impact the commercial sector and citizens.  For example, the Department of Homeland Security (DHS) announced that due to major security flaws in most versions of Internet Explorer, the web browser was not safe for users. Heartbleed has also captured […]

Keep Reading

TechSource Editor

May 28, 2014

Cyber Security

TechSource

Everything You Need to Know About SDN

In a time when government agencies are looking to maximize cost savings and reduce budgets, there’s a growing buzz around SDN – Software Defined Networking. This innovating approach to networking allows agencies to meet growing application and user demands without the need to replace, or purchase, physical devices. Cost savings, operational efficiencies, network flexibility, and […]

Keep Reading

TechSource Editor

Vulnerable to Heartbleed?

The significance of CVE-2014-0160, aka Heartbleed, an attack against the transport layer security protocol (TLS/DTLS) heartbeat extension, is well documented. What could use more discussion is what it really takes to find all vulnerable systems impacted by Heartbleed in today’s networks. The vulnerability exists in the OpenSSL library, widely used by Linux operating systems, embedded […]

Keep Reading

TechSource Editor

May 21, 2014

Cyber Security

Software Defined Networks: Are We There Yet?

There is a lot of discussion about software defined networks (SDN), and while it is a promising technology, it has yet to take off in the adoption stage. In this panel discussion, Jim Smid, CTO of Iron Bow Technologies, sits down with Josh Finke, Managing Director for Iron Bow Consulting, and Eric Oberhofer, Director of […]

Keep Reading

TechSource Editor

Cloud computing

Getting Rational about Apps

The benefits of application rationalization are well-known. Eliminating redundancy and removing outdated software saves money and storage space. There are other benefits as well, and the current migration to the cloud that so many federal agencies are engaged in serves as a reminder of those benefits and other emerging issues that require careful consideration. My […]

Keep Reading

Mike Wallace

May 8, 2014

Cloud  •  IT Modernization

DHS Warns Users to Stop Using Internet Explorer due to Security Issues

Microsoft Internet Explorer (IE) tends to be the standard web browser used today, especially in the federal government.  However, the U.S. Department of Homeland Security (DHS) recently urged users to find alternatives to IE versions 6 to 11 due to serious security issues. The U.S. Computer Emergency Readiness Team (US-CERT), which is a part of […]

Keep Reading

Jon Kim

May 6, 2014

Cyber Security

Dell Ad

Keep Reading

TechSource Editor

PODCAST: Deploying Secure Wireless Networks in Government

There are a number of misconceptions about deploying a federal secure wireless network. Some believe that wireless networks are inherently not secure, while others fear potential compromises due to guest-level access or that they will need to set up a separate security policy. Security is paramount when deploying a wireless network, and it can be […]

Keep Reading

TechSource Editor

April 30, 2014

Mobility + End User Devices  •  Wireless

When Will the Federal Government Truly Embrace Mobility?

Federal government agencies are having difficulties establishing effective mobile strategies. From ensuring reliable connectivity to defining effective and viable security policies, even the most forward thinking agencies are facing stumbling blocks as they attempt to mobilize their workforce. Despite these obstacles, there’s a near constant demand for agencies to embrace mobility to enhance productivity. 70 […]

Keep Reading

TechSource Editor

April 28, 2014

Collaboration  •  Mobility + End User Devices  •  Wireless

Enhancing Productivity with Secure Wireless

Mobile devices have become a critical tool for the workplace. The most common example is the use of personal smart phones to check email and calendars. This has grown to encompass personal mobile devices managed by enterprise mobility management (EMM) solutions to enhance the security of the devices. EMM managed personal devices are no longer […]

Keep Reading

Rob Chee

April 17, 2014

Cyber Security  •  Mobility + End User Devices  •  Wireless

Playing on the Mobility Course: Plan Before You Tee Off

Whether you’re a soldier on the battlefield or a field agent providing support after a natural disaster, agency officials are embracing mobile computing. Par for the course these days, mobile computing allows government employees to be more proactive outside the limits of a traditional office environment. Motivated by the availability of more powerful mobile devices, […]

Keep Reading

Ken Liska

April 14, 2014

Cloud  •  Collaboration  •  Mobility + End User Devices  •  Wireless

Solving for the ‘Bring Your Own Device’ Demand in Government Organizations

Bring Your Own Device (BYOD) is not a new concept to government organizations. Some people have been bringing their own computer or laptop to work for years. What has changed is how many personal devices people want to bring to work, that a majority of those devices are wireless and that people are increasingly bringing […]

Keep Reading

TechSource Editor

April 11, 2014

Collaboration  •  Cyber Security  •  Mobility + End User Devices  •  Wireless

Five Steps to Mitigating CryptoLocker

Cyber crime is becoming more targeted to achieve specific, often brazen, outcomes. Lately, we are seeing more incidents of cyber espionage where cyber criminals (a.k.a. cyber gangs) are launching ransomware Trojan horses that come from various sources but are disguised as legitimate email attachments. When the attachment is opened, it releases the malware that will […]

Keep Reading

Jon Kim

April 8, 2014

Cyber Security