Digital Transformation: Cloud-First Programs
Digital Transformation: Cloud-First Programs
Strategic Communications offers State, Local and Education (SLED) agencies an avenue for streamlined cloud procurement and digital transformation through NASPO ValuePoint! Through Strategic’s NASPO ValuePoint Cloud Catalog, SLED agencies have the capability to order and deploy a multitude of cloud solutions in supporting their IT infrastructure, platforms, and applications. These solutions cover a very broad range of services such as cloud-based phone systems, unified communications, enterprise resource planning (ERP) modules, network and email security, and desktop as a service.
To learn more about NASPO ValuePoint Cloud Solutions contract and how your agency can participate please visit https://www.yourstrategic.com/naspo-valuepoint/.

CAPEX vs OPEX with Buy-Back of On-Premises Assets
Both CIOs and CFOs are looking at performance, security, and long-term financial impact of migrating to a cloud-first strategy. In partnering with Tech Data, Strategic Communications transforms your CAPEX into OPEX with our IT Asset Disposition Services! It’s really simple, we buy-back your existing on-premises data center equipment, maximize product life value, and re-purpose the funds in going toward your cloud-first initiatives.

Our IT Asset Disposition Services include:
Pre-Build Solutions (AWS and Microsoft)
Strategic’s AWS and Microsoft Azure Cloud Pre-Build solutions are part of Tech Data’s Cloud Solutions Factory which includes a broad set of IT and business solutions practices. These solutions leverage leading cloud providers, including Microsoft Cloud and Amazon Web Services, and its vast ecosystem of independent software vendors (ISVs), and aggregate additional solutions, components, and licensing. Our Pre-Build solutions help scale public and private businesses seamlessly to support their rapidly growing cloud needs, streamline services with provisioning, management, support tools and deliver business outcomes, enabling valuable long-term relationships.
Strategic’s Pre-Build Solutions include:
End of Support for Windows Server 2008 / 2008 R2 and SQL Server 2008 / 2008 R2
In 2020, Microsoft ended support for SQL and Windows 2008 and 2008 R2 servers. Microsoft granted customers taking part in Software Assurance or Server Subscription services with Extended Security Updates (ESUs) for those servers covering only “critical” or “important” security updates. In migrating SQL and Windows 2008/2008 R2 into Cloud, customers gained 3 additional years of “critical” and “important” security patches, even after the End-of-Support (EoS) deadline.
Strategic’s team of cloud engineers roadmap lifecycle management of your Microsoft Servers in performing seamless migrations of on-premise servers into the cloud! Extend the life of your on-premises EoS Microsoft Servers while mitigating critical security breaches of your data.
RiverMeadow Cloud Migration Services
Workload Placement and Cost Analysis Assessment
Most IT organizations are increasingly involved in determining optimal workload placement.
Should workloads stay on premise? Move to a public or private cloud or be deployed in a
hybrid environment? The top three criteria for deciding which workloads to deploy, where
and at what time are – security, performance requirements and cost. Strategic Communications offers Workload Placement and Cost Analysis Assessment services as a great starting point for understanding your “as-is” environment. Also, our services address your concerns for migrating a workload that will reduce costs and increase business agility.
How the assessment service works:
- Conduct comprehensive workload analysis to discover system elements and
- Leverage best practices and proprietary/ 3rd party tools to simplify the process.
- Document the migration project specifications.
- Analyze costs based on migration options and determine the right destination.
- Gain newfound perspective and next steps for achieving goals.
Well Architected Reviews with CloudCheckr
Compliance Audits & Remediation in Preparation for New CMMC Requirements
The Cybersecurity Maturity Model Configuration (CMMC) framework is a unified standard for implementing cybersecurity across the defense industrial base (DIB), which includes over 300,000 companies in the supply chain. The CMMC is the DoD's response to significant compromises of sensitive defense information located on contractors' information systems. Strategic Communications provides products and solutions (both on-premises and cloud-hosted) meeting CMMC requirements for DoD agencies.
The CMMC framework consists of 5 cumulative certification levels:
Level One
Basic Cyber Hygiene
Level One: Basic Cyber Hygiene:
Includes basic cybersecurity appropriate for small companies utilizing a subset of universally accepted common practices. The processes at this level would include some performed practices, at least in an ad hoc manner. This level has 35 security controls that must be successfully implemented.
Level Two
Intermediate Cyber Hygiene
Level 2: Intermediate Cyber Hygiene
Includes universally accepted cybersecurity best practices. Practices at this level would be documented, and access to CUI data will require multi-factor authentication. This level includes an additional 115 security controls beyond that of Level 1.
Level Three
Good Cyber Hygiene
Level Three: Good Cyber Hygiene:
Includes coverage of all NIST SP 800-171 Rev. 1 controls and additional practices beyond the scope of current CUI protection. Processes at this level are maintained and followed, and there is a comprehensive knowledge of cyber assets. This level requires an additional 91 security controls beyond those covered in Levels 1 and 2.
Level Four
Proactive
Level Four: Proactive:
Includes advanced and sophisticated cybersecurity practices. The processes at this level are periodically reviewed, properly resourced, and are improved regularly across the enterprise. In addition, the defensive responses operate at machine speed and there is a comprehensive knowledge of all cyber assets. This level has an additional 95 controls beyond the first three Levels.
Level Five
Advanced / Progressive
Level Five: Advanced / Progressive:
Includes highly advanced cybersecurity practices. The processes involved at this level include continuous improvement across the enterprise and defensive responses performed at machine speed. This level requires an additional 34 controls.
Contact Us!
