UTSA Becomes a Beacon of Digital Access

The University of Texas at San Antonio is a Tier One research university and a Hispanic Serving Institution specializing in cyber, health, fundamental futures, and social-economic transformation. With more than 34,000 students, it is the largest university in the San…

Optimize Application Performance for Federal Mission Success

Fill out the form below to learn how Cisco AppDynamics helps government agencies proactively manage and optimize application performance in real-time and provides full-stack observability with mission context to advance critical agency objectives. In this Solution Brief, you’re learn how…

Datasheet: Foglight® for Databases

With more on your plate than ever – from massive data volumes and multiple database platforms, to DevOps and the cloud – cross-platform database monitoring is critical. You can’t afford any database downtime or performance degradation. It’s easy to get…

Accelerate Database Efficiency with SQL Performance Investigator (PI)

According to recent surveys, DBAs spend about 60-70 percent of their workdays troubleshooting issues. And while resolving performance issues is critical, investigating problems after they’ve affected systems and end users is a time- and resource-intensive approach. But what if you…

Using STIGs to Accelerate CDM Compliance

As part of the Executive Order on Improving the Nation’s Cybersecurity (Executive Order), Federal Civilian Executive Branch (FCEB) Agencies need to establish or update their Memoranda of Agreement with CISA for the CDM (Continuous Diagnostics and Mitigation) program ensure that…

STIGs For Dummies

For both government organizations and their mission partners, addressing STIG compliance for RMF, FISMA, DevSecOps, FedRAMP, and now the new CMMC mandates, has always been challenging, especially when these organizations depend on tedious manual processes. Kenneth Hess, the author, funnels decades…

eMASS Automation – The Search for a Solution to Unite and Automate Security Compliance Data

eMASS, or the Enterprise Mission Assurance Support Service, was developed by the DoD, in part, as a repository that unites technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel. Imagine a 1,000 workstation environment that quickly…

King County Uses Azure to Help Secure Resident Health Data

King County is Washington State’s most populous county, with more than 2.2 million residents. For the Department of Community and Human Services, ensuring that these residents have access to critical social and health services is top of mind. Hampered by…

City of Frisco Modernizes its Technology Landscape to Drive Collaboration

It’s not easy managing the evolving technology needs of one of the fastest-growing cities in the United States. But over the past decade, the City of Frisco, Texas, has transformed its digital approach from a disjointed set of products to…

User Identities Are the Keys to the Kingdom

While perimeter security remains important, the routers, firewalls, and intrusion detection systems that protect network access are no longer sufficient against bad actors. In this Whitepaper, MeriTalk – in partnership with DLT and Quest – reviews how One Identity can…