MicroHealth, a NITAAC CIO-SP3 Contract Holder, has deployed and is managing some of the largest enterprise virtual care programs in the world. When the U.S. Coast Guard (USCG) identified the need for a telehealth capability to provide remote delivery of healthcare via landline communications, cellular service and the internet, MicroHealth sprang into action to provide USCG's first-ever telehealth…
Type: Article
With over 31,000 cybersecurity incidents affecting government agencies in 2018 alone, it is no surprise that government and industry come together for National Cybersecurity Awareness Month (NCSAM) every October to inform Americans about the importance of cybersecurity. And while this year’s NCSAM is over, the need for cybersecurity solutions is not. As highlighted by the 2018 Annual Federal…
Type: Article
Unisys is a global information technology company that specializes in providing industry-focused solutions integrated with leading-edge security to the federal government. Our offerings include application services, systems integration and consulting services, high-end server technology, cybersecurity and cloud management software, and maintenance and support services that can easily be procured…
Type: Article
Federal agencies today are operating in some of the most challenging financial climates in decades, with ever expanding expectations around accountability and performance. Many agencies struggle to balance the need for immediate action with taking a more long-term strategic approach. The National Academy of Public Administration (NAPA) stated that information linking budget, costs, and…
Type: Article
Type: Article
Strategic Communications is a NITAAC CIO-CS contract holder and a Women Owned Small Business technology company based in Louisville, KY. Founded in 1994, Strategic has provided an array of IT, Audio Visual and Cloud solutions for hundreds of federal, state and local government agencies as well as corporate businesses. Strategic has won a multitude of awards for its rapid growth. Strategic…
Type: Article
iGov, a Federal Systems Integrator (FSI) and Value Added Reseller (VAR), headquartered in Reston, VA, together with NIKSUN, an industry leader in providing a suite of scalable, forensics-based cyber security and network performance monitoring solutions, are pleased to announce that we are supporting the Defense Information Systems Agency (DISA) and the Department of Defense (DoD) by providing a…
Type: Article
With the rapid change and disruption inherent in the tech landscape, the transition to a Cloud and/or Hybrid Cloud solution is imperative for IT innovation and optimization, not only in the commercial space, but also in the federal government. If you are like most federal agencies, you are in the process of migrating your Commercial-Off-The-Shelf (COTS) applications. You might also be working on…, Legacy infrastructure consumes more budget with an ever-decreased benefit impact -- time to revenue, Legacy systems pose significant challenges in transitioning to the COTS platforms residing in the flexible cloud data centers of today. Federal government IT organizations that successfully transition their legacy systems to the cloud will dramatically increase performance, decrease CapEx and operational expenses (OpEx) and extend their delivery capabilities. In order for a federal agency to…
Type: Article
Antiquated systems and a lack of infrastructure are just some of the issues the U.S. Customs and Border Protection (CBP) faced when it came to collection of duty on imported goods, merchandise processing fees, or user fees. With millions of passengers and pedestrians passing through every global CBP point of entry, whether it be from air, sea or land, CBP realized it had to put measures in place…
Type: Article
In the age of ever-evolving technology, cyber criminals are constantly looking for new strategies to infiltrate and exploit agency technology infrastructures. Agencies are constantly facing new and emerging threats. A report done in 2019 by Threat Horizon revealed that agencies will be tasked with facing future cyber threats under three key themes: disruption, distortion and deterioration.…
Type: Article