TIC 3.0 and the Future of Government Networks
Public community
Owned by Caitlin Reedy + 4
What's Driving the Need for TIC 3.0?
As Federal agencies have adopted cloud, mobile, and SaaS technologies as well as supported a larger remote workforce, their end users, applications, and data increasingly live outside of the traditional agency network boundary. TIC 2.0 and previous iterations of network architectures have focused on securing a physical, hub-and-spoke agency network perimeter leading to network bandwidth constraints, lack of agility, a degraded end user experience, and increasing costs. The TIC 3.0 initiative aims to provide a more modern approach to network security and a better end user experience, giving agencies more flexibility to enforce security capabilities outside the traditional agency perimeter in these dispersed environments.
Featured Lab
In order to access the TIC 3.0 Architecture Lab, make sure to log in to your wwt.com account. If you do not already have an account, creating one is easy!
- Click "Login / Register" in the upper right corner.
- From there, click "Create account" and enter your first name, last name and email address.
- Helpful hint: Make sure to use a work email to gain access to this lab and all of the resources available to you on wwt.com.
- Enter the pin number you receive via email to verify your email address.
- Create a password for your account.
- Start exploring!
The Roadmap to TIC 3.0: A Podcast Series
TIC 3.0, the latest iteration of the Trusted Internet Connection framework, aims to improve how users can tap cloud, leverage emerging technology, such as SD-WAN, and secure federal networks. Why should agencies adopt these recommendations and how can they get started? Listen to the three episodes below to learn more from our industry experts.
Episode 01
The Basics of TIC 3.0
Episode 02
TIC 3.0 and the Telework Transformation
Episode 03
Moving Modernization Forward with TIC 3.0
Featured Content
Getting to Know TIC 3.0: An Overview
TIC 3.0: Ensuring Agency Readiness for Network Modernization
The Transition to TIC 3.0: Ensuring Agency Readiness for Network Modernization
Simplifying the Path to Zero Trust for Public Sector Security
How do I get started?
Many organizations are unsure of how to approach implementing a TIC 3.0 security architecture. Our team of experts can help every step of the way – from understanding key concepts to selecting the right technology – no matter the starting point. Explore below how our phased approach to adopting TIC 3.0 allows organizations to establish a global strategy and technical roadmap.
The first step is solidifying a TIC 3.0 strategy and assessing the risks and maturity of your current approach. Our team can help your organization lay the foundation for a successful adoption through our lab experiences, briefings, assessments, workshops and consulting offerings.
Lab Resources
Agency/Branch Office Use Cases
Remote User Use Case
Next, it's important to determine what's needed to support your organization's TIC 3.0 strategy. Our technical design experts can help identify the scope, key technologies and investments needed for a solution. A strategic roadmap will identify the key activities and stakeholders required for a successful journey.
Solution implementation is the next step in order. Agencies often struggle to implement TIC 3.0 because of the amount of complexity, the limitless number of technical variables present in brownfield environments, and a lack of staffing and resources. Our experts can help simplify this complexity by developing a plan that allows for more agile workflows, leading to shorter implementations.
After implementing your TIC 3.0 plan and architecture, it's crucial to continue optimizing. Our experts can help operationalize, automate, monitor and manage your investment. A properly designed TIC Architecture must include key lifecycle elements — from automation to run books — that ensure operational efficiencies.