Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Navy Marine Corps Intranet - Wikipedia

    en.wikipedia.org/wiki/Navy_Marine_Corps_Intranet

    Navy Marine Corps Intranet. The Navy/Marine Corps Intranet ( NMCI) is a United States Department of the Navy program which was designed to provide the vast majority of information technology services for the entire Department, including the United States Navy and Marine Corps .

  3. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System. Host Based Security System ( HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer ...

  4. eMASS - Wikipedia

    en.wikipedia.org/wiki/EMASS

    eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). [1] The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the ...

  5. CUSTOMER SUCCESS: U.S. Navy Simplifies Service Desk Access ...

    www.aol.com/2013/02/27/customer-success-us-navy...

    CUSTOMER SUCCESS: U.S. Navy Simplifies Service Desk Access and Leverages Analytics with BMC Software BMC Remedy IT Service Management Suite streamlines Navy non-tactical support requests and ...

  6. Naval Information Warfare Systems Command Program Executive ...

    en.wikipedia.org/wiki/Naval_Information_Warfare...

    The Naval Information Warfare Systems Command is organizationally aligned to the Chief of Naval Operations. As part of its mission, NAVWAR provides support, manpower, resources, and facilities to its aligned Program Executive Offices (PEOs). The Program Executive Offices are responsible for the execution of major defense acquisition programs.

  7. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with ...

  8. CENTRIXS - Wikipedia

    en.wikipedia.org/wiki/CENTRIXS

    The Combined Enterprise Regional Information Exchange System ( CENTRIXS) is a collection of classified coalition networks, called enclaves, that enable information sharing through the use of email and Web services, instant messaging or chat, the Common Operational Picture service, and Voice over IP. CENTRIXS supports combatant commands ...

  9. Defense Technical Information Center - Wikipedia

    en.wikipedia.org/wiki/Defense_Technical...

    discover .dtic .mil. The Defense Technical Information Center ( DTIC, / ˈdiːtɪk / [2]) is the repository for research and engineering information for the United States Department of Defense (DoD). DTIC's services are available to DoD personnel, federal government personnel, federal contractors and selected academic institutions.