Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

GSA Schedule | Government | Technology | Resources and Insight

Department of Defense Mobile Device Strategy

By: Kevin Lancaster
June 19th, 2012

n a recent mobile strategy document released by the Department of Defense (DoD), they addressed the need to strengthen the efficiency of its workforce and operations and construct its business to be more relatable to today’s modern workplace and clientele. The document went on to explain this implementation would involve addressing 3 major goals for the department; “Advance and evolve the DoD Information Enterprise infrastructure to support mobile devices, institute mobile device policies and standards, and promote the development and use of DoD mobile and web-enabled applications.” This strategy “identifies the vision and goals for capitalizing on the full potential of mobile devices and supports the end-user services approach in DoD Information Technology Enterprise Strategy and Roadmap,” states Chief Information Officer, Teri Takai. In order to evolve into this developing strategy, the Department has stated that it must better familiarize itself with management methods of better utilizing available spectrum and also “develop mechanisms for rapidly transitioning technologies into programs of record.” DoD’s new enterprise infrastructure and wireless networks must have the capability to support both unclassified and classified high-bandwidth traffic, a critical up kept stream of wireless coverage to in-building and terrestrial locations, and also various networking architectures. This architecture must maintain a security between the interface of DoD networks and commercial networks by empowering a proper management of mobile devices, applications, and network connections.

Read More

Share

Blog Feature

GSA Schedule | Technology | Resources and Insight

FedRAMP Launches New Certification Process

By: Kevin Lancaster
June 11th, 2012

Wednesday, June 6th marked the launch of the Federal Risk and Authorization Management Program (FedRAMP) application process for cloud service providers. As required by the Office of Management and Budget, all cloud service offerings must meet FedRAMP requirements when working with Federal agencies.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

Technology | Resources and Insight

The Internet - A Low Cost Channel for Fraud

By: Kevin Lancaster
June 6th, 2012

The days of identity thieves digging through your trash can or calling you requesting your personal information are long gone. Those methods took up their time and resources with limited results. Now, fraudsters can reach millions of people in a day with a click of a button, or create a webpage that is similar to a target agency in content and URL for just a few dollars. Malware can be downloaded just by clicking on these websites and will lay dormant until key words are inputted into your PC.

Read More

Share

Blog Feature

Technology | Resources and Insight

BYOD: Security Focus Shifts From Device to Data

By: Steve Young
May 31st, 2012

Federal agencies are getting more comfortable as they transition to a mobile landscape. As this transition progresses discussions have become more focused on securing actual data rather than securing devices as the concept of Bring-Your-Own-Device (BYOD) fits into the architecture.

Read More

Share

Blog Feature

Technology | Resources and Insight

Big Data Commission to Provide Guidance to Public and Private Sector

By: Kevin Lancaster
May 24th, 2012

“Big Data” has been the buzz word floating around federal, state, and local agencies this year. Big Data is a loose term used to describe mass amounts of structured and unstructured digital data flooding government agencies, and it is proving to be problematic. Expanding legacy data combined with growing real-time data requires agencies to devote manpower, funding, and new technology to address changing needs. The FY12 fiscal cycle has been a feeding frenzy for private sector IT giants all battling for a piece agency IT budgets devoted to data management. In response to the Obama Administration’s March announcement of a $200 million Big Data R&D Initiative, the non-profit TechAmerica recently announced the launch of a new Commission. The Big Data Commission, chaired by Steven Mills, Senior Vice President at IBM, is comprised of industry IT leaders, academics, and government advisors and will focus on providing recommendations on how to secure data, how to do more with less, and the relationship between cloud and Big Data.

Read More

Share

Blog Feature

Technology | Resources and Insight

DDoS Attacks: Coming to a Network Near You

By: Kevin Lancaster
May 16th, 2012

Over the past few years, the increase in Distributed Denial-of-Service (DDoS) attacks has become mainstream media topics. Hostile Foreign Government, Terrorists, and Hacktivists are using these attacks to cause major problem for the U.S. government. The attacks have been successful against the CIA, DOT, FTC along with other agencies. DDoS attacks are not only a major headache but also can be very costly. A DDoS attack is regarded as an unequivocal attempt by hackers to thwart authentic users of a service from using that service.

Read More

Share