More Effective DoD Encounter Management in Biometric & Identity Screening The DoD employs biometric collection and screening to enhance security at U.S.-controlled military installations around the world. Like all DoD biometric collection capabilities, they depend on the Automated Biometrics Identification System (ABIS) to process, store and report on collected biometric data acquired from foreign nationals requesting access to U.S. and allied installations overseas; and latent [...]
Introduction: Who de nes the “best” in best prac ce? How long is a best prac ce appropriate? Should professionals con nue to embrace the virtues of business tradi ons without challenging their validity and applicability? Taking me to ask these ques ons will yield answers that reveal underlying assump ons and provide the opportunity for business development professionals to evolve and nd new ways [...]
Kalonji Soccer Academy: An Innovative Way to Instill Confidence Through Discipline, Health & Education
I was first introduced to Kalonji Soccer Academy (KSA) when I had the wonderful opportunity to help coordinate a company gift drive with Envistacom in 2017. My team and I worked with Bruno Kalonji, the founder of KSA, and his incredible team to provide a fun-filled holiday event. This event was eye-opening for me. I met several of the underprivileged kids involved in the Academy, [...]
The U.S. government has played a pivotal role throughout history in advancing technological capabilities, which has spurred economic growth and development as well as enhanced national security. As technologies rapidly evolve, the Department of Defense (DoD) will continue to research and develop the most modern and technologically advanced weapon systems, capabilities, and platforms.
Protecting critical information and infrastructure is not a new concept. In 1900 BC an Egyptian scribe used non-standard hieroglyphs, marking the first documented example of written cryptography. In the Middle Ages we had wax seals, coded messages and moats; and during WWII, the Enigma machine and the phrase “Loose lips sink ships.” All of these tools, methods, and tropes were meant to protect institutions from the [...]
The Atlanta Chapter of the Association for Corporate Growth® names Envistacom the fifth-fastest growing company in Georgia’s upper-middle-market. ATLANTA, Ga., June 25, 2018 – Envistacom today announced that the company was named the fifth-fastest growing company in Georgia’s upper-middle-market by the Atlanta Chapter of the Association for Corporate Growth’s® (ACG) 2018 “Fast 40 Awards”, marking the third-consecutive year that Envistacom has been recognized as a [...]
ATLANTA, Ga., May 14, 2018 – Envistacom is proud to announce that the company has been selected as the military outreach partner of Atlanta United for the 2018 – 2020 Major League Soccer (MLS) seasons. Cultivated from a shared commitment and passion for serving the military community, Envistacom’s three-year partnership with Atlanta United includes outreach programs designed to support and honor active duty and deployed [...]
The Single Integrated Operating Plan (SIOP) Concept applied to Cyber Defense How would we respond to a full-on cyber-attack?
The Single Integrated Operating Plan (SIOP) Concept applied to Cyber Defense How would we respond to a full-on cyber-attack? In the early 1960’s, the United States implemented the Single Integrated Operating Plan (SIOP) at the request of then President John F. Kennedy, and in response to the imminent possibility and threat of a nuclear attack from the former Soviet Union. The purpose of this [...]
Resiliency and recovery after a cyber-attack How quickly and completely can we get to normal after an attack? By Nelson Santini, Envistacom LLC In late 2017 three hurricanes wreaked havoc on the U.S. mainland and territories. Our social media and news feeds were flooded with headlines and snippets about three million U.S. citizens in Puerto Rico who had been sent to the middle ages [...]
Present Solutions to Meet Mission Requirements Early in the Government Procurement Process to Improve Win Probability
Mission Requirements Government Acquisition Process
Cloud Computing Versus Virtualization By John Lucas, Domain Administrator, Envistacom Is virtualization right for your business? How about cloud computing? Don’t know the difference? That’s ok – most non-IT folks don’t either. The word “cloud” is often thrown around as an umbrella term, while “virtualization” is often confused with cloud computing. Although the two technologies are similar, they are not interchangeable, and the difference is [...]
You have decided to build your next home on a beautiful spot up in the mountains. It’s really a great location - there’s a lake nearby, a general store six miles away, and a generous view of the sunset to the west. You and your spouse are pretty handy, and both of you have experience as project managers. You use houses all the time and [...]
It’s not a question of “if”, but a certain “when”. Your network will be attacked. It will likely experience downtime, and restoring it to normal operation will most certainly be costly. Worst yet; it could be persistently hacked without your knowledge and provide rogue entities a direct line to all your corporate operations. Bare metal, colocation, managed hosting, on-premises or cloud based? Fully vs. partially [...]
[date] - "Sun Tzu said..." “With these words begins a timeless study of warfare strategy, The Art of War.” I’m sure Sun Tzu never imagined a battlefield where enemies appear, disappear and regenerate faster than the human eye can blink. Eons away from smartphones, iPads and laptops, his words are “on point” and as relevant to cybersecurity today, as they were to foot soldiers and generals waging wars in antiquity.