Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

Technology | Resources and Insight

Progress on Data Center Consolidation Initiative

By: Kevin Lancaster
September 3rd, 2012

As part of the Federal Data Center Consolidation Initiative, federal agencies have been working hard to close data centers and move to a virtualized environment. According to FedScoop, in the past 90 days, agencies have closed 50 data centers. That is definitely a step in the right direction- bringing the government’s total to 318 since the launch of the initiative. In talks with Civilian and Defense agencies, we have seen great pressure that is coming down on enterprise IT staff to close these data centers. The definition of data center is any room that is devoted to data processing servers, i.e., including server closets (typically < 200 sq. ft.) and server rooms (typically < 500 sq.ft.) within a conventional building is considered a Data Center, just like larger floor spaces or entire buildings dedicated to housing servers, storage devices, and network equipment.

Read More

Share

Blog Feature

Technology | Resources and Insight

VA Announces Increased IT Spending for FY2013

By: Kevin Lancaster
August 23rd, 2012

The Department of Veterans Affairs (VA) recently announced that they will be increasing their spending in several areas of information technology. The increase is set to take place in FY2013, and will be directed towards cyber security, network security, and privacy. According to Washington Technology, the VA is planning “to spend $123.2 million in fiscal 2013, an increase from $109.5 million in 2012 and $121.4 million in 2011.” The increase in spending is due to the high demand of computer network privacy. In today’s world, privacy comes at a high price. As technology evolves and becomes easier to access, the concept is becoming less concrete and harder to sustain. Therefore, companies are taking painstaking strides to make sure their sensitive information is kept away from unauthorized individuals. Both the GSA and the VA Office have noticed the increase in the number of contractors specializing in IT security over the last few years.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

Technology | Resources and Insight

U.S. Cyber Command Chief says the US gets a Failing Grade in Cyber Security

By: Kevin Lancaster
August 20th, 2012

Cyber security is a pervasive concern that is growing in threat level every day, especially for the US government, and now the director of the National Security Agency and U.S. Cyber Command Chief, Gen. Keith Alexander, has deemed the US as unready for these severe cyber assaults.

Read More

Share

Blog Feature

Technology | Resources and Insight

Criminal Justice IT Compliance

By: Kevin Lancaster
August 16th, 2012

Criminal Justice organizations make up a large part of our Federal, State and Local Governments. As such, they are also a large consumer of IT. But do they have the same security standards as other agencies for IT services?

Read More

Share

Blog Feature

Technology | Resources and Insight

Cyber Security & Social Media – Understanding the Connection

By: Kevin Lancaster
August 13th, 2012

With 20% of the world’s population using social media, and that number is expected to increase rapidly over the next five years, the need for cyber security is becoming imperative. Social media networking websites like Twitter, Facebook, LinkedIn, and Google+ enable users to communicate in a moment’s notice. However, this instantaneous communication also allows for the people who want to attack/harm others to get their message to a much bigger audience in even quicker time. For example, take the hacktivist group “Anonymous.” When they launch a DDoS attack on a government agency they can secretly plan and grow the attack without being noticed. They can create hundreds of fake accounts and communicate using them and they can go unnoticed. Once they launch these attacks it’s too late unless the agency has something in place to protect them.

Read More

Share

Blog Feature

Technology | Resources and Insight

Tier 1 Helpdesks – To Outsource or Not To Outsource?

By: Kevin Lancaster
August 9th, 2012

As customer service demands rise and organizations constantly need to achieve more with less, many IT Helpdesk departments are faced with this question: “To outsource or not outsource?” IT departments offloading their tier 1 support has become a more frequent trend in today’s public and private sector. Tier 1 Helpdesks allow your team to focus solely on complex issues that require desk side assistance. By specializing in IT and end user support service, Helpdesks can aid in delivering three main mission-oriented goals: Employees gain access to the help they need, when they need it. In-house IT staff can offload the headaches of day-to-day tier 1 support and focus complicated support issues that need hands on assistance. Organizations complement and extend IT resources without adding head count.

Read More

Share