̽»¨ÊÓÆµ

Catch up on the latest news from ̽»¨ÊÓÆµ and our partner ecosystem.

News

From The Trusted IT Solutions Providerâ„¢ & Our Partners

dell tech logo

May 30, 2017

̽»¨ÊÓÆµ., ̽»¨ÊÓÆµ., the trusted government IT solutions provider, today announced that it will proactively market and sell Dell EMC VxBlock Systems through its reseller partner ecosystem to the public sector market.


DATUM Data Governance Platform Now Available on ̽»¨ÊÓÆµ GSA Schedule

May 24, 2017
DATUM, the leading provider of data governance and stewardship software, and ̽»¨ÊÓÆµ., the trusted government IT solutions provider, today announced a partnership. Under the agreement, ̽»¨ÊÓÆµ will be a premier reseller of DATUM's industry-leading Information Value Management® solution via ̽»¨ÊÓÆµ's GSA schedule and ̽»¨ÊÓÆµ's NASA Solutions for Enterprise-Wide Procurement (SEWP) contract.

̽»¨ÊÓÆµ., the trusted government IT solutions provider, is proud to host the seventh annual Citizen Engagement Seminar. This one-day event will discuss how agencies are utilizing technology, communication channels, online portals and social media to bridge the gap between agency missions and today’s expectation of citizen service, information delivery and public involvement.


CloudPassage Partners With ̽»¨ÊÓÆµ to Deliver Automated Security Solutions to the Public Sector

May 16, 2017

CloudPassage, the leading cloud infrastructure security provider, today announced a partnership with ̽»¨ÊÓÆµ., the trusted government IT solutions provider. Under the agreement, ̽»¨ÊÓÆµ will serve as CloudPassage’s master government aggregator, offering the company’s FedRAMP-Ready and on-demand server and workload security solution to the public sector via ̽»¨ÊÓÆµâ€™s GSA schedule and NASA SEWP contracts.


Cyber Threat Basics

May 12, 2017

For a cybersecurity expert, the Oxford Dictionary definition of cyberthreat is a little lacking: "the possibility of a malicious attempt to damage or disrupt a computer network or system." This definition is incomplete without including the attempt to access files and infiltrate or steal data.

In this definition, the threat is defined as a possibility. However, in the cybersecurity community, the threat is more closely identified with the actor or adversary attempting to gain access to a system. Or a threat might be identified by the ...