TIC 3.0 and the Future of Government Networks
Owned by Caitlin Reedy + 4
As Federal agencies have adopted cloud, mobile, and SaaS technologies as well as supported a larger remote workforce, their end users, applications, and data increasingly live outside of the traditional agency network boundary. TIC 2.0 and previous iterations of network architectures have focused on securing a physical, hub-and-spoke agency network perimeter leading to network bandwidth constraints, lack of agility, a degraded end user experience, and increasing costs. The TIC 3.0 initiative aims to provide a more modern approach to network security and a better end user experience, giving agencies more flexibility to enforce security capabilities outside the traditional agency perimeter in these dispersed environments.
In order to access the TIC 3.0 Architecture Lab, make sure to log in to your wwt.com account. If you do not already have an account, creating one is easy!
- Click "Login / Register" in the upper right corner.
- From there, click "Create account" and enter your first name, last name and email address.
- Helpful hint: Make sure to use a work email to gain access to this lab and all of the resources available to you on wwt.com.
- Enter the pin number you receive via email to verify your email address.
- Create a password for your account.
- Start exploring!
TIC 3.0: Ensuring Agency Readiness for Network Modernization
Mar 3, 2021
2 min read
The Transition to TIC 3.0: Ensuring Agency Readiness for Network Modernization
Feb 2, 2021
1 min read
Simplifying the Path to Zero Trust for Public Sector Security
Apr 5, 2021
7 min read
Many organizations are unsure of how to approach implementing a TIC 3.0 security architecture. Our team of experts can help every step of the way – from understanding key concepts to selecting the right technology – no matter the starting point. Explore below how our phased approach to adopting TIC 3.0 allows organizations to establish a global strategy and technical roadmap.
The first step is solidifying a TIC 3.0 strategy and assessing the risks and maturity of your current approach. Our team can help your organization lay the foundation for a successful adoption through our lab experiences, briefings, assessments, workshops and consulting offerings.
Agency/Branch Office Use Cases
Remote User Use Case
Next, it's important to determine what's needed to support your organization's TIC 3.0 strategy. Our technical design experts can help identify the scope, key technologies and investments needed for a solution. A strategic roadmap will identify the key activities and stakeholders required for a successful journey.
Solution implementation is the next step in order. Agencies often struggle to implement TIC 3.0 because of the amount of complexity, the limitless number of technical variables present in brownfield environments, and a lack of staffing and resources. Our experts can help simplify this complexity by developing a plan that allows for more agile workflows, leading to shorter implementations.
After implementing your TIC 3.0 plan and architecture, it's crucial to continue optimizing. Our experts can help operationalize, automate, monitor and manage your investment. A properly designed TIC Architecture must include key lifecycle elements -- from automation to run books -- that ensure operational efficiencies.
Public Sector Virtual Roundtable: Best Practices for Securing Modern Apps & Microservices
Dec 13, 2022 • 1 pm (CST)
WWT Experts: Jack French on Cloud
Dec 08, 2022 • 1 pm (CST)
We did Zero Trust before it was cool (It's basic security 101)
Nov 30, 2022
7 min read
Cisco SD-WAN (Viptela) Sandbox (20.9)
How the Security Enterprise Agreement on GEMSS Secures the Army
Nov 28, 2022
8 min read
Cisco Secure Firewall FTD
Nov 14, 2022
Protecting Your Workforce with Secure Access by Cisco Duo
Nov 11, 2022