TIC 3.0 and the Future of Government Networks
Owned by Caitlin Reedy + 4
As Federal agencies have adopted cloud, mobile, and SaaS technologies as well as supported a larger remote workforce, their end users, applications, and data increasingly live outside of the traditional agency network boundary. TIC 2.0 and previous iterations of network architectures have focused on securing a physical, hub-and-spoke agency network perimeter leading to network bandwidth constraints, lack of agility, a degraded end user experience, and increasing costs. The TIC 3.0 initiative aims to provide a more modern approach to network security and a better end user experience, giving agencies more flexibility to enforce security capabilities outside the traditional agency perimeter in these dispersed environments.
In order to access the TIC 3.0 Architecture Lab, make sure to log in to your wwt.com account. If you do not already have an account, creating one is easy!
- Click "Login / Register" in the upper right corner.
- From there, click "Create account" and enter your first name, last name and email address.
- Helpful hint: Make sure to use a work email to gain access to this lab and all of the resources available to you on wwt.com.
- Enter the pin number you receive via email to verify your email address.
- Create a password for your account.
- Start exploring!
TIC 3.0: Ensuring Agency Readiness for Network Modernization
Mar 3, 2021
2 min read
The Transition to TIC 3.0: Ensuring Agency Readiness for Network Modernization
Feb 1, 2021
1 min read
Simplifying the Path to Zero Trust for Public Sector Security
Apr 5, 2021
7 min read
Many organizations are unsure of how to approach implementing a TIC 3.0 security architecture. Our team of experts can help every step of the way – from understanding key concepts to selecting the right technology – no matter the starting point. Explore below how our phased approach to adopting TIC 3.0 allows organizations to establish a global strategy and technical roadmap.
The first step is solidifying a TIC 3.0 strategy and assessing the risks and maturity of your current approach. Our team can help your organization lay the foundation for a successful adoption through our lab experiences, briefings, assessments, workshops and consulting offerings.
Agency/Branch Office Use Cases
Remote User Use Case
Next, it's important to determine what's needed to support your organization's TIC 3.0 strategy. Our technical design experts can help identify the scope, key technologies and investments needed for a solution. A strategic roadmap will identify the key activities and stakeholders required for a successful journey.
Solution implementation is the next step in order. Agencies often struggle to implement TIC 3.0 because of the amount of complexity, the limitless number of technical variables present in brownfield environments, and a lack of staffing and resources. Our experts can help simplify this complexity by developing a plan that allows for more agile workflows, leading to shorter implementations.
After implementing your TIC 3.0 plan and architecture, it's crucial to continue optimizing. Our experts can help operationalize, automate, monitor and manage your investment. A properly designed TIC Architecture must include key lifecycle elements -- from automation to run books -- that ensure operational efficiencies.
Inside the ATC Networking: SSE - Security Service Edge
Jun 30, 2022 • 1 pm (CDT)
InfoSecurity Europe 2022 Recap
Jun 27, 2022
5 min read
Gigamon Cloud Overview Video
Jun 22, 2022
WWT Experts: Brianna Sideris on SSE
Jun 21, 2022 • 11 am (CDT)
Cisco Live! Shorts: Ryan Makelky on Cisco SD-WAN, DNAC and SASE
Jun 20, 2022
Cisco Live! Shorts: Drew Kaiser on SASE, Cisco Secure X and Firepower
Jun 20, 2022
Key Takeaways From VMware EMPOWER 2022
Jun 20, 2022
12 min read