by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : March 30, 2014
Co o o or g Br g g ll g c o cy r c r y Protecting federal networks against threats continues to be top priority, and the best way to do so effectively is by continuously monitoring network continuous monitoring of federal information systems is a cross-agency priority area for improving federal cybersecurity. Continuous monitoring is a critical component of an agency's cybersecurity strategy; not only does it identify vulnerabilities and abnormalities, but it can help agencies anticipate and mitigate future threats. The technology works by collecting data continuously, ensuring that network managers are aware of impending threats and vulnerabilities in real time. With this type of advanced, persistent monitoring system, it's very effective at identifying security gaps quickly so they can be addressed immediately. A comprehensive continuous monitoring strategy includes both processes and technology to provide a continuous feedback loop on both the effectiveness of security controls and potential risk. With this information, agencies can prioritize their actions based on the data at any given time. The Department of Homeland Security recently teamed with the General Services Administration to offer agencies easy access to key continuous monitoring tools. The Continuous Diagnostics and Mitigation program was initially launched with products in four functional areas: • Hardware inventory management • Software inventory management • Vulnerability management Eventually, CDM will cover 15 continuous monitoring capabilities. Ga Cha g r GAME CHANGING ECHNOLOG O MEE AGENC MI ION SPONSORED REPORT THE INTELLIGENT NETWORK SDN BRINGS AGILITY TO THE NETWORK If yo hav ' y h ard h r of war - d fi d work g (SDN), ' pro a ly o ly a a r of . H r ' wha yo d o k ow W DN It is di erent way of designing, building and running networks that run in a data center---one that greatly increases network agility. It makes networks less expensive to build, faster, more e cient and easier to configure. How doe work In the DN architecture, the control and data planes are separate and the network infrastructure is decoupled from network applications and features. An DN environment also uses open application programming interfaces (APIs) to support all the services and applications running over the network. W doe me n for my ne work he DN approach enables network administrators to shape tra c and deploy services in response to changing needs without interrupting individual switches or routers. It is scalable and provides automatic provisioning. Because it is programmable, it is easy to connect other components within a data center to improve tra c throughput and routing. It also improves Quality of ervice and security while helping organizations quickly deploy new applications, services and infrastructure. SMARTER NETWORKS WITH ANALYTICS oday's networks are far from static. Everything from tra c flow to unanticipated demand can have a significant e ect on network performance. he best way to keep pace with changing network demands is by using an analytics tool specifically designed for networks. hese tools help network administrators identify and resolve issues before they become real problems. Most network analytics tools use the dashboard approach, providing both standard reports and customized reports. tandard metrics include performance thresholds, packet loss, quality-of- service queue usage, interface errors and latency variations. here are many valuable ways in which network administrators can use network analytics tools, including: • rack key performance indicators (KPI) • Analyze congestion periods • Analyze peak period usage • Evaluate routing e ciency • Analyze network outages • Analyze long-term data on network connections • Analyze wireless use With this information, network administrators can improve network performance and troubleshoot more e ectively. For example, they can use the data to develop more e ective policies for optimizing wide area network tra c, use wireless use data for capacity planning, fine-tune network access policies, avoid potential bottlenecks, develop optimized tra c routing plans, consolidate nodes, ensure better reliability and speed, reduce costs and improve overall tra c management.
March 15, 2014
April 15, 2014