As Federal agencies have adopted cloud, mobile, and SaaS technologies as well as supported a larger remote workforce, their end users, applications, and data increasingly live outside of the traditional agency network boundary. TIC 2.0 and previous iterations of network architectures have focused on securing a physical, hub-and-spoke agency network perimeter leading to network bandwidth constraints, lack of agility, a degraded end user experience, and increasing costs. The TIC 3.0 initiative aims to provide a more modern approach to network security and a better end user experience, giving agencies more flexibility to enforce security capabilities outside the traditional agency perimeter in these dispersed environments.
In order to access the TIC 3.0 Architecture Lab, make sure to log in to your wwt.com account. If you do not already have an account, creating one is easy!
- Click "Login / Register" in the upper right corner.
- From there, click "Create account" and enter your first name, last name and email address.
- Helpful hint: Make sure to use a work email to gain access to this lab and all of the resources available to you on wwt.com.
- Enter the pin number you receive via email to verify your email address.
- Create a password for your account.
- Start exploring!
Many organizations are unsure of how to approach implementing a TIC 3.0 security architecture. Our team of experts can help every step of the way – from understanding key concepts to selecting the right technology – no matter the starting point. Explore below how our phased approach to adopting TIC 3.0 allows organizations to establish a global strategy and technical roadmap.