Modernizing Federal Networks: How to Align with DHS’ Updated TIC 3.0

Presented by

AD Blanchette, Sales Engineering Manager, Forcepoint & David Hermann, Account Manager, Forcepoint

About this talk

The U.S. government is urging its defense and civilian agencies to prioritize digital transformation to ensure reliable and secure digital experiences anytime, anywhere. But just building on to legacy networks often can’t support the emerging technologies that help meet growing cyber demands. Since the M-08-05 Implementation of the Trusted Internet Connection policy in 2007, the technology landscape has changed dramatically. Private-sector cloud offerings, software-defined networks, and increased workforce mobility have all led to these TIC 3.0 updates, which provide more flexibility to help agencies keep pace. This webinar will cover: - What TIC 3.0 updates mean for agencies - How updates map to federal IT modernization efforts - Ways that Forcepoint technologies can aid in compliance and modernization efforts
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (66)
Subscribers (2252)
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions. Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.