Blog Articles

Blog Articles2019-04-09T06:08:07-04:00

Encounter Management in Biometrics Screening

More Effective DoD Encounter Management in Biometric & Identity Screening The DoD employs biometric collection and screening to enhance security at U.S.-controlled military installations around the world. Like all DoD biometric collection capabilities, they depend on the Automated Biometrics Identification System (ABIS) to process, store and report on collected biometric data acquired from foreign nationals requesting access to U.S. and allied installations overseas; and latent [...]

Color Outside the Lines: Departure from Proposal Tradition

Introduction: Who de nes the “best” in best prac ce? How long is a best prac ce appropriate? Should professionals con nue to embrace the virtues of business tradi ons without challenging their validity and applicability? Taking me to ask these ques ons will yield answers that reveal underlying assump ons and provide the opportunity for business development professionals to evolve and nd new ways [...]

Building Cyber Resilient Technologies

The U.S. government has played a pivotal role throughout history in advancing technological capabilities, which has spurred economic growth and development as well as enhanced national security. As technologies rapidly evolve, the Department of Defense (DoD) will continue to research and develop the most modern and technologically advanced weapon systems, capabilities, and platforms.  

CROSSING THE GENERATIONAL CHASM IN CYBERSECURITY VIEWS

Protecting critical information and infrastructure is not a new concept. In 1900 BC an Egyptian scribe used non-standard hieroglyphs, marking the first documented example of written cryptography. In the Middle Ages we had wax seals, coded messages and moats; and during WWII, the Enigma machine and the phrase “Loose lips sink ships.” All of these tools, methods, and tropes were meant to protect institutions from the [...]

Envistacom Named Top 10 Fastest-growing Georgia Company for Third Consecutive Year

The Atlanta Chapter of the Association for Corporate Growth® names Envistacom the fifth-fastest growing company in Georgia’s upper-middle-market. ATLANTA, Ga., June 25, 2018 – Envistacom today announced that the company was named the fifth-fastest growing company in Georgia’s upper-middle-market by the Atlanta Chapter of the Association for Corporate Growth’s® (ACG) 2018 “Fast 40 Awards”, marking the third-consecutive year that Envistacom has been recognized as a [...]

Envistacom Named Military Outreach Partner of Atlanta United FC

ATLANTA, Ga., May 14, 2018 – Envistacom is proud to announce that the company has been selected as the military outreach partner of Atlanta United for the 2018 – 2020 Major League Soccer (MLS) seasons. Cultivated from a shared commitment and passion for serving the military community, Envistacom’s three-year partnership with Atlanta United includes outreach programs designed to support and honor active duty and deployed [...]

The Single Integrated Operating Plan (SIOP) Concept applied to Cyber Defense How would we respond to a full-on cyber-attack?

The Single Integrated Operating Plan (SIOP) Concept applied to Cyber Defense How would we respond to a full-on cyber-attack?   In the early 1960’s, the United States implemented the Single Integrated Operating Plan (SIOP) at the request of then President John F. Kennedy, and in response to the imminent possibility and threat of a nuclear attack from the former Soviet Union. The purpose of this [...]

Resiliency and recovery after a cyber-attack

Resiliency and recovery after a cyber-attack How quickly and completely can we get to normal after an attack? By Nelson Santini, Envistacom LLC   In late 2017 three hurricanes wreaked havoc on the U.S. mainland and territories. Our social media and news feeds were flooded with headlines and snippets about three million U.S. citizens in Puerto Rico who had been sent to the middle ages [...]

Cloud Computing Versus Virtualization

Cloud Computing Versus Virtualization By John Lucas, Domain Administrator, Envistacom Is virtualization right for your business? How about cloud computing? Don’t know the difference? That’s ok – most non-IT folks don’t either. The word “cloud” is often thrown around as an umbrella term, while “virtualization” is often confused with cloud computing. Although the two technologies are similar, they are not interchangeable, and the difference is [...]

Systems Integrators: The General Contractors of the Technology World

You have decided to build your next home on a beautiful spot up in the mountains. It’s really a great location - there’s a lake nearby, a general store six miles away, and a generous view of the sunset to the west. You and your spouse are pretty handy, and both of you have experience as project managers. You use houses all the time and [...]

Betting Against Downtime

It’s not a question of “if”, but a certain “when”. Your network will be attacked. It will likely experience downtime, and restoring it to normal operation will most certainly be costly. Worst yet; it could be persistently hacked without your knowledge and provide rogue entities a direct line to all your corporate operations. Bare metal, colocation, managed hosting, on-premises or cloud based? Fully vs. partially [...]

The Art of War: A cybersecurity take

October 16, 2016 - "Sun Tzu said..." “With these words begins a timeless study of warfare strategy, The Art of War.” I’m sure Sun Tzu never imagined a battlefield where enemies appear, disappear and regenerate faster than the human eye can blink. Eons away from smartphones, iPads and laptops, his words are “on point” and as relevant to cybersecurity today, as they were to foot soldiers and generals waging wars in antiquity.