Cyberspace Warrior Vice Adm. Michael S. Rogers. Commander, U.S. Fleet Cyber Command Commander, U.S. 10th Fleet

Size: px
Start display at page:

Download "Cyberspace Warrior Vice Adm. Michael S. Rogers. Commander, U.S. Fleet Cyber Command Commander, U.S. 10th Fleet"

Transcription

1 The Voice of Military Communications and Computing Cyberspace Warrior Vice Adm. Michael S. Rogers Commander, U.S. Fleet Cyber Command Commander, U.S. 10th Fleet C4 February 2013 Volume 17, Issue 1 Mobile Device Management O Data Center Consolidation DoD Timekeeper O Capability Set 13 O Mobile File Sharing

2 First Gen SIEM: Costly, Complex, Deficient SIEM 2.0 See what you re missing. Compromised credentials? Systems hacked? Data breached? In today s IT environment, it s a question of when, not if. LogRhythm s SIEM 2.0 security intelligence platform provides a certified solution for Federal and classified environments that is as easy to deploy as it is to use at a price that fits within your budget. It s time to see what you ve been missing. Call to learn more or schedule a demo. Or visit Certifi cate of Networthiness FIPS Certifi ed Common Criteria Certifi ed A 2012 LEADER SIEM Magic Quadrant

3 military information technology February 2013 Volume 17, Issue 1 Features Cover / Q&A 4 Lighthouse of the Skies As DoD s official timekeeper, the Naval Observatory plays a critical role in a wide range of military technologies, from battlespace awareness to GPS. By Geoff Chester 16 8 Stepping Stone to Change The emergence of cloud computing has the potential to make data center consolidation a stepping stone toward a radical change in how DoD provides and consumes IT services. By Peter Buxbaum 11 Wanted: Mobile Traffic Cop Seeking a traffic cop to enforce policies for both the network and mobile devices, the Defense Information Systems Agency recently issued a call to industry for mobile device management and mobile application stores capabilities. By Henry Canaday 21 Agility Test In November, the Army completed Network Integration Evaluation 13.1, as 3,800 soldiers of the 2nd Heavy Brigade Combat Team, 1st Armored Division tested the Capability Set 14 Integrated Network Baseline. By Adam Baddeley 24 Mobile File Sharing Security By leveraging secure mobile file sharing technology, military IT decision-makers can streamline processes and cut costs. By Yorgen Edholm Vice Admiral Michael S. Rogers Commander, U.S. Fleet Cyber Command Commander, U.S. 10th Fleet Departments 2 editor s Perspective 3 Program notes/people 14 data bytes 20 small business spotlight 26 COTSacopia 27 Resource Center Industry Interview Ken Kartsen Vice President Federal McAfee

4 Border Threat Prevention and CBRNE Response Administration Wide Area Aerial Surveillance O Hazmat Disaster Response Tactical Communications O P-3 Program SPECIAL SECTION: June 2012 Volume 1, Issue 1 Leadership Insight: Robert S. Bray Assistant Administrator for Law Enforcement Director of the Federal Air Marshal Service Transportation Security Military Information Technology Volume 17, Issue 1 February 2013 The Voice of Military Communications and Computing Editorial Managing Editor Harrison Donnelly Online Editorial Manager Laura Davis Copy Editor Sean Carmichael Laural Hobbes Correspondents Adam Baddeley Peter Buxbaum Cheryl Gerber Karen E. Thuermer Art & Design Art Director Jennifer Owers Senior Graphic Designer Jittima Saiwongnuan Graphic Designers Amanda Paquette Scott Morris Eden Papineau Kailey Waring Advertising Account Executive Cheri Anderson Dustin Roath KMI Media Group Publisher Kirk Brown Chief Executive Officer Jack Kerrigan Chief Financial Officer Constance Kerrigan Executive Vice President David Leaf Editor-In-Chief Jeff McKaughan Controller Gigi Castro Marketing & Communications Manager Holly Winzler Operations Assistant Casandra Jones Trade Show Coordinator Holly Foster Operations, Circulation & Production Circulation & Marketing Administrator Duane Ebanks Data Specialists Tuesday Johnson Summer Walker Raymer Villanueva Donisha Winston EDITOR S PERSPECTIVE Given its massive scope, the defense authorization bill for fiscal year 2013 naturally contains many significant provisions that don t get much media attention. To cite just one example, the 681-page measure includes a whole subsection devoted to cyberspace issues related to the Department of Defense. The recently enacted legislation calls on DoD to: Develop a strategy for implementing the Joint Information Environment. Set in motion the acquisition of next-generation host-based cybersecurity tools and capabilities. Implement a baseline software assurance policy for the entire lifecycle of DoD-acquired systems. Inventory the department s tactical data link programs and find ways to encourage competition in contracting. Harrison Donnelly Editor Study ways to develop and demonstrate collection, processing and storage technologies for network flow data that save money and are potentially scalable to the volume used by Tier 1 Internet service providers. Analyze the need for large-scale software database and data analysis tools, and foster competition in their acquisition. Inventory software licenses held by DoD and manage them as cost effectively as possible. Provide regular congressional briefings on the work of U.S. Cyber Command. Report to Congress on penetrations into the networks of DoD contractors. Public opinion polls show that Americans currently hold Congress in lower regard even than in past years. As a former Capitol Hill reporter, this saddens me, but it s hard to argue with the assessment. I don t know if any of the above provisions represent unwarranted interference in executive branch affairs, or would lead to disastrous policy consequences, although most seem reasonable enough on their face. But amid all the negative publicity, on this point at least you have to give lawmakers credit for trying. KMI MedIa Group LeadershIp MaGazInes and WebsItes Border & CBRNE Defense Ground Combat Technology Geospatial Intelligence Forum Military Advanced Education Military Information Technology Integrated Fixed Towers A Proud Member of Subscription Information Military Information Technology ISSN is published 11 times a year by KMI Media Group. All Rights Reserved. Reproduction without permission is strictly forbidden. Copyright Military Information Technology is free to qualified members of the U.S. military, employees of the U.S. government and non-u.s. foreign service based in the U.S. All others: $65 per year. Foreign: $149 per year. Corporate Offices KMI Media Group Crabbs Branch Way, Suite 300 Rockville, MD USA Telephone: (301) Fax: (301) Web: Border Protector Michael J. Fisher Chief U.S. Border Patrol U.S. Customs and Border Protection Military Logistics Forum Military Medical & Veterans Affairs Forum Military Training Technology Special Operations Technology Tactical ISR Technology U.S. Coast Guard Forum

5 Program NOTES Enterprise Licensing Pact Offers Major Software Savings Leveraging the buying power of more than 2 million IT users, the Department of Defense has awarded a three-year, $617 million joint enterprise license agreement for Microsoft products. By entering into a transformative three-year Joint Enterprise Licensing Agreement for enterprise licenses and software assurance, the Army, Air Force and Defense Information Systems Agency (DISA) will expand access to Microsoft solutions while also attaining the best pricing DoD has received to date for Microsoft desktop and server software licenses. The agreement provides all three organizations with a single vehicle for accessing the latest Microsoft technologies in support of such IT priorities as datacenter consolidation, collaboration, cybersecurity, mobility, cloud computing and big data. This is the most comprehensive licensing agreement Microsoft has ever established with DoD, covering nearly 75 percent of all department personnel. The new contract was awarded to Insight Public Sector, a division of the Microsoft reseller Insight Enterprises. As part of the agreement, all three organizations can begin using the newest versions of Microsoft products, including Microsoft Office 2013, SharePoint 2013 Enterprise and Windows 8. The ability to standardize on SharePoint 2013 Enterprise will enhance cross-agency informationsharing through improved enterprise search and social communications features while powering advanced business intelligence and reporting capabilities. The package has been customized to meet DoD security standards. The Army Network Enterprise Technology Command and Air Force Program Executive Office for Business and Enterprise Systems have been working closely with Microsoft to achieve Army Golden Master and Air Force Standard Desktop Configuration compliance for Windows 8. Department officials estimate savings could run into the tens of millions over the course of several years through lower license and software assurance costs. This effort is a significant pathfinder on how to do major contract awards for DoD, said Air Force Lieutenant General Michael J. Basla, Air Force chief information officer and chief of information dominance. This contract award culminates over a year s worth of great teaming between the Air Force, Army and DISA, and ultimately the Air Force will see a cost avoidance of about $50 million a year. The Army will save more than $70 million each year for the span of the agreement, according to Deputy CIO Michael E. Krieger. The Army Contracting Command negotiated terms that met the complex technical and security requirements for the Army, Air Force and DISA in a single agreement, Krieger said. The spirit of collaboration between the services enables unprecedented opportunities for improvements in efficiency and productivity for DoD, and the Army is proud to have led the effort. Navy Rear Admiral David G. Simpson, DISA s vice director and senior procurement executive, said the agreement gives us a good way of bringing the volume of the government s purchase to bear and reducing the time and effort that Microsoft needs to spend negotiating across different agencies. [The agreement] recognizes the shift to mobility, Simpson added. Microsoft is committed to making sure that the technology within the Lt. Gen. Michael J. Basla Compiled by KMI Media Group staff agreement has a mobile-first focus, and we expect to begin to take advantage of Microsoft s mobile offerings as part of our enterprise mobility ecosystem. We were able to coalesce the requirements and strategies for the majority of DoD in a single contract, and by doing so being able to ensure that they have a standard solution that enables interoperability from the joint perspective across the organizations. In addition, cost efficiency was one of the main driving factors that DoD was looking for, which we were certainly willing to support as they made the decision to standardize even further on Microsoft technologies, said Tim Solms, general manager of Microsoft s DoD business. Although the agreement does not cover the Department of the Navy, which signed its own Microsoft contract last year, Solms raised the prospect of further contract consolidation in the future. PEOPLE Col. Peter A. Gallagher The list of Army colonels recently nominated for the rank of brigadier general includes the following: Colonel Christopher S. Ballard, who is currently serving as director, Army Cyber Operations Integration Center/G-3, Second Army/Army Cyber Command, Fort Meade, Md.; and Colonel Peter A. Gallagher, who is currently serving as deputy commander, Army Network Enterprise Technology Command, Fort Huachuca, Ariz. The Network Centric Operations Industry Consortium (NCOIC) has announced that Carl G. O Berry its 2004 founding chairman now serves as its Compiled by KMI Media Group staff first chief executive officer. In this new role, O Berry will lead NCOIC s outreach to potential global government customers and liaise closely with the consortium s council of advisors. Vice Adm. P. Stephen Stanley (Ret.) Northrop Grumman has appointed Vice Admiral P. Stephen Stanley (Ret.) as vice president of cybersecurity/ C4 in the company s government relations organization. Stanley s military career included service as the principal deputy director of cost assessment and program evaluation, Office of the Secretary of Defense. MIT

6 As DoD s official timekeeper, the Naval Observatory plays a critical role in a wide range of military technologies, from battlespace awareness to GPS. By Geoff Chester The phrase timing is everything has never been more true than it is today. Virtually every facet of our day-to-day lives in the 21st century is touched by time. Most of us either own or have used a Global Positioning System (GPS) unit to navigate city streets. We communicate with cell phones and use the Internet. These technologies, which most of us now take for granted, simply cannot function without a precise time-scale reference. In the modern world of digital technology and interconnectivity, precise time is the critical element that binds everything together. Nowhere is this more important than in the field of battlespace awareness, where near-instantaneous knowledge of the positions of assets and targets, precise command and control, and real-time remote sensing of the changing environment dictate the success or failure of an operation. Fortunately, the Department of Defense supports an activity which provides the most precise timing in the world: the U.S. Naval Observatory (USNO). Tucked away in a quiet residential area of Washington, D.C., the USNO has the outward appearance of a museum in a park. Perhaps best known as the location of the official residence of the U.S. vice president, the USNO is actually one of the oldest scientific organizations in the nation, where a staff of about 100 highly dedicated specialists perform fundamental research into precise timing and reference frames and their practical applications, providing the linchpin in the digital domain of modern warfare. Originally envisioned by President John Quincy Adams as a lighthouse of the skies, the observatory was founded in 1830 as the U.S. Navy Depot of Charts and Instruments under the command of a single officer, Lieutenant Louis M. Goldsborough. Established to clean, repair and rate marine chronometers and other navigational instruments, USNO s singular focus throughout its long history has been to provide the best astronomical reference and timing products to the fleet, DoD and the nation to support positioning, navigation and timing (PNT). Today the observatory is an Echelon IV command, part of the naval oceanography community reporting to the commander, Naval Meteorology and Oceanography Command, Rear Admiral Brian Brown. USNO is also a key player in the Navy information dominance community via its resource sponsor, the Oceanographer and Navigator of the Navy, Rear Admiral Jonathan White. The USNO superintendent, Captain Tim Gallaudet, is designated 4 MIT 17.1

7 as DoD s precise time and time interval manager, reporting in this capacity directly to the department s chief information officer, Teresa M. Takai. Master Clock The earliest time-scales were inextricably tied to the motions of the sun, moon, planets and stars. These astronomical bases of timing have survived to the present day, but as technology has developed, the requirements for determining and disseminating precise time now demand accuracies that are far more critical than those that can be provided by the stars. USNO has been at the forefront of embracing new technologies to develop better timing systems throughout its history. That legacy has led to today s USNO Master Clock system, designated by DoD instruction to be the sole timing reference for all timing-related activities within the department. The practical realization of time is done through clocks, which essentially consist of an oscillator and a counter. Some sort of sustainable, periodic variation is used to define a time-scale, and the counter ticks off the units of that scale. The physical unit of time is the second, and as clocks have evolved over history, they have used various methods to produce seconds. These seconds, in turn, are related to a fundamental reference frame that is commonly available to timekeepers everywhere. Up until 1967 this reference frame was defined by various motions of the Earth in relation to astronomically derived parameters. Capt. Tim Gallaudet Clocks have evolved from devices that counted drops of water to mechanical systems using cyclical mechanisms such as the verge, foliot and pendulum escapements. The first practical pendulum clock, invented by Dutch astronomer Christiaan Huygens in 1655, represented a technology that changed comparatively little until the 20th century. During the post-world War I years, breakthroughs in theoretical physics revolutionized our understanding of the nature of space, matter and time. The desire to prove these new theories drove the development of new types of clocks that could resolve the second into ever-smaller increments. Quantum theory also led to the development of today s state-of-the-art clocks in the MIT

8 form of atomic frequency standards. However, the second itself was still defined by the motions of the Earth. By the 1950s physicists and engineers realized that the stability of atomic frequency clocks far exceeded the longterm stability of the Earth s motions. In 1967 the world s scientists adopted a new definition of the second: the duration of 9,192,631,770 cycles of radiation corresponding to the transition between two hyperfine levels of the ground state of cesium 133. USNO astronomers were instrumental in relating this definition to the astronomical time-scales then in use, ensuring a smooth transition for practical users of precise time. Central to USNO s mission is the requirement to take this definition of precise time and to reproduce and disseminate it for practical use throughout the DoD enterprise. Practical Time As the old saying goes, A person with one clock knows what time it is, but a person with two clocks is never sure. Even in today s era of atomic clocks, this statement still holds true. Individual clocks will vary with respect to one another, but a time-scale derived from an ensemble of many clocks will be very stable over the long term. USNO s Master Clock is thus not a single device but an ensemble mean of over 100 individual devices, which together satisfy a specified precision requirement. That requirement is currently better than one nanosecond (one billionth of a second) per day. What impact does a nanosecond of timing error mean in the real world? Let s take the example of GPS, which uses the differential measurement of timing signals from satellite-borne clocks to determine a position on the ground. Radio signals travel at the speed of light, just under 300,000 kilometers (186,200 miles) per second. In one nanosecond that radio signal travels about 30 centimeters (1 foot), so a clock error of just one nanosecond means a built in uncertainty of 30 centimeters of position. Each clock on each GPS satellite is compared on a daily basis to USNO s Master Clock, much as chronometers of the past were compared to an astronomical time-scale defined at the observatory. While the clocks themselves are never adjusted, their drift rates against the Master Clock are carefully measured and incorporated into the timing data downlinked to a receiver on the ground. As long as the drift rates of the satellite clocks remain constant the system will function; clocks with anomalous drift rates must be quickly detected and removed from service. It follows that the more precise the Master Clock is, the better GPS will perform. USNO is committed to developing the best and most precise clock technology to support this goal. Its Navy The Navy Rubidium Fountain Clock is the Naval Observatory s newest and best clock. Designed and built in-house, these devices use the principle of laser trapping and cooling of rubidium atoms before tossing the atoms into a long high-vacuum microwave cavity, where their hyperfine resonances can be measured to the femtosecond level. [Photo courtesy of U.S. Naval Observatory] 6 MIT 17.1

9 The clock vault contains a bank of COTS Symmetricom HP-5071A Cesium Beam Frequency Standards in the racks against the back wall; the boxes in the front are COTS Sigma-Tau Hydrogen Masers. [Photo courtesy of U.S. Naval Observatory] Rubidium Clock development program has devised, designed, built and implemented the most accurate clock system in the world, capable of resolving short-term time-scales to the femtosecond (10-15 second) level. Four of these devices, all built in-house by staff members of the Observatory s Instrument Shop, have been continuously operating in Washington for two years. Three more are being constructed for service at the USNO s Alternate Master Clock facility, co-located with the Master GPS Control Center at Schriever Air Force Base, Colo. In addition to determining and disseminating precise time, the USNO also determines the Earth s instantaneous rotation and orientation parameters with respect to a master Celestial Reference Frame. Utilizing a radio-astronomy technique known as Very Long Baseline Interferometry (VLBI), the small variations in the planet s rotational motion and the angles describing the direction of its rotational axis can be tracked in near real time and predicted for several months in advance. Knowing these parameters is vital to position determination via GPS. Without these Earth Orientation Parameters (EOPs), GPS positioning errors can accumulate to about two meters in a week and up to 400 meters in six months. To carry out these observations, individual stations along the continent-spanning network of radio telescopes need to observe a celestial source simultaneously, so they are synchronized by the USNO Master Clock. The data from each individual station is then sent to USNO, where it is processed on a VLBI Correlator, one of three such installations in the world. In addition to EOPs, data from these observations produces a fundamental reference frame to which all other reference systems can be tied. This enables the smooth transition from the position of a target measured in a terrestrial spatial reference frame to one described by the GPS satellite constellation, which in turn is tied to the master celestial reference frame. A weapon deployed to strike the target can then easily transition between the satellite reference frame to the terrestrial one, ensuring an accurate hit. Celestial Reference Optical star catalogs derived from observations made with telescopes in Washington and at USNO s Flagstaff, Ariz., dark sky station are also tied to the master celestial reference frame and provide a navigational asset to strategic weapons systems designed to function despite the possible absence of GPS. These catalogs also provide a backdrop for space-situational awareness, enabling optical tracking systems to identify unannounced satellite launches from potential adversaries, track space debris that might endanger friendly space-based assets, or even detect asteroids that may potentially impact the Earth. Finally, USNO scientists have developed practical applications for astronomical data. Software designed by the observatory is used to plan special operations based on the illumination provided by natural sources. Software is also available that vastly simplifies the old tried-and-true method of positioning based on celestial navigation with sextant and almanac. This is still one of the few viable navigation systems available should GPS be denied in the field. Despite its small size and low profile, the USNO is more relevant now to the DoD enterprise than at any time during its 182-year history. It is living up to the motto bestowed on it by Rear Admiral Charles Henry Davis in 1867: Pervenit in astra, et pontum caelo coniunxit The stars are scaled, and sky with ocean joined. O Geoff Chester is the public affairs officer for the USNO. For more information, contact MIT Editor Harrison Donnelly at or search our online archives for related stories at MIT

10 Data center consolidation efforts could transform how DoD provides and consumes IT services. By Peter Buxbaum MIT Correspondent The Department of Defense s data center consolidation program, which was originally aimed at money on the maintenance and upkeep of physical server space and was closely related to the base realignment and closure effort, has been transformed into a program with much broader and deeper implications. The emergence of cloud computing and the department s strategic embrace of that phenomenon has the potential to make data center consolidation a stepping stone toward a radical change in how DoD provides and consumes information technology services. Similarly, many opportunities to modernize military networks have come about since DoD first embarked on data center consolidation. The question now becomes whether the savings the department will generate through consolidation will be plowed back into IT, making networks more robust and more responsive to warfighter needs. Alternatively, looming budget constraints could motivate DoD to save the money, pushing out modernization to some future date. The short answer, industry experts acknowledge, is that these are not the best of times to be pushing for transformational IT changes. Nevertheless, those involved in military and other federal data center consolidation initiatives say the opportunities are worth the challenges. DoD has several goals with data center consolidation, said Rich Campbell, chief technologist at EMC. The department can save Rich Campbell resources by maintaining fewer sites. By consolidating infrastructure, DoD will be able to break down a lot of the existing information stovepipes and promote better information sharing. Reducing costs will also give DoD the ability to leverage newer technologies. Campbell has advised the Air Force, Army, and Navy on their data center consolidation efforts. The historical tendency within DoD has been to put up servers, but that leaves a lot of inefficiencies, said David Egts, principal architect at Red Hat. One inefficiency is in purchasing power. Another is in the lack of standardization. When you don t have standardization, it is hard to swap technologies and people have to be retrained when they move form one place to another. Network Modernization Data center consolidation could be a jumping-off point for the modernization of military networks as a whole, according to Anthony Robbins, vice president of federal for Brocade. DoD has one of the most complex networks on the planet, he said. The network is full of products at the end of their service lives and at the end of their sales lives. There are way too many applications supported by the department. All commercial companies go through a rigorous process of application modernization. We have been advocating the use of new technologies to modernize, refresh 8 MIT 17.1

11 and simplify government networks, to get hold of costs and improve performance. In addition to spending reductions, data center consolidation also presents DoD with improved information security possibilities as well as operational improvements, said Pat Tracey, vice president, homeland security and defense, U.S. public sector, HP Enterprise Services, Hewlett-Packard Co. The attractive feature to keeping information inside the infrastructure is that it is not resident on individual laptops or desktops, Tracey explained. But the question of how information in a shared data center will be protected still needs to be addressed. Consolidating data centers means fewer ingress points to data, noted Campbell. That means a better ability to rein in rogue users. For Tracey, the potential for operational advantages represents the most important aspect of data center consolidation. You are able to establish single sources of verified and validated information, applied across all of DoD. It provides the opportunity to enable more modern approaches to processes and decision support, to standardize, modernize and rationalize applications and databases and to take a more structured approach to IT and infrastructure, she said. By structured, Tracey means a centralized approach that could change radically how DoD organizes IT, as well as how the department s IT entities do business. DoD elements have grown up being very decentralized, she said. Local functional and command priorities held sway. But this caused interoperability issues and information sharing problems. It also caused problems as warfighters moved from their garrisons to preparedness mode, and then to deployment. The focus for the last five years has been to get to a place where there is a more predictable level of support and consistency across this spectrum, said Tracey. The services have been pursuing strategies to make access to information seamless. The challenge remains for IT organizations to balance centralization and standardization initiatives with local priorities, she added. Other challenges will confront DoD IT organizations and change how they operate. Data center consolidation will break down barriers and force IT departments to talk more and work together, said Campbell. Whenever people move to a shared data center, they give up control of the budget and also control of the service provider, said Egts. Relationships with vendors will change. Vendors will need to maintain relationships with end-users and establish new relationships with the data centers. They still need to win the hearts and minds of users and also make sure their products fit within the data center s specs. Cloud Computing DoD s data center consolidation started without cloud computing in mind, but the advent of the cloud has made the implications of the consolidation all the more profound. DoD is taking an approach to cloud computing that begins with data center consolidation, said Tracey. That makes a lot of sense to me. DoD is making the transition into the cloud to better support missions and to promote the flexibility required to support military organizations in the dynamic nature of today s mil operations. Getting a handle on infrastructure is an essential first step to that process. The adoption of cloud computing will accelerate consolidation, said Egts. Consolidation by itself can create a lot of organization friction because some people have to surrender a degree of budgetary and operational control. The way to encourage this to happen is to replace the existing situation with something David Egts compelling. With the self-service aspects of the cloud, instead of standing up a virtual machine in a data center, which may take months, it can be provisioned in minutes or even seconds. With consolidation of data centers comes consolidation of applications. As the military services have consolidated their servers, Quest Software has been working with them to consolidate their active directories and to virtualize their server management. Various data centers and different branches were running different instances of their directories, said Pat Tracey Paul Christman, president and chief executive officer of Quest Software Public Sector. This was remarkably inefficient and expensive and did not provide good service quality. As data centers are consolidated, the services are creating larger and more unified systems that provide better service. Christman envisions an end state in which each service will eventually consolidate into its own unified system. Consolidating 10,000 or 100,000 users is challenging, he said. When you add another zero it becomes even more so. We have found that once you get past a million users, the returns tend to diminish. Paul Christman Quest is supplying products and services that provide for interoperability between the old and new systems for a seamless transition. We also work with our clients to implement new tools to manage consolidated data centers, said Christman. You need different approaches, tools and metrics to manage virtualized environments. Instead of measuring things like resource usage, our tools take a transactional approach from the user standpoint. Our tools measure how efficiently the system performs user tasks. While consolidating servers may reach a point of diminishing returns, Robbins believes that DoD is not being aggressive enough in consolidating its inventory of data centers. DoD is starting out with around 1,500 data centers, he said. Commercial best practices dictate the consolidated number should be less than 100, possibly less than 50. By these standards, DoD s efforts fall short of commercial best practices. DoD documents indicate a disparity of goals for consolidation among various DoD components. The Air Force expects to reduce the number of its data centers by 47 percent by The Navy plans a reduction of 50 percent, while the Defense Logistics Agency s goal is a 90 percent reduction, and the military health system is seeking a 70 percent reduction. As an industry partner I can say that data center consolidation is an obvious and correct thing to do, Robbins added. But it is a work in progress and there is a lot of progress yet to be made. MIT

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Back to the Future: Securing your Unwired Enterprise

Back to the Future: Securing your Unwired Enterprise Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

Practical Enterprise Mobility

Practical Enterprise Mobility Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Four Virtual Meeting Room Deployment Strategies for Technology Companies: Which Strategy is Best for You?

Four Virtual Meeting Room Deployment Strategies for Technology Companies: Which Strategy is Best for You? WHITE PAPER Four Virtual Meeting Room Deployment Strategies for Technology Companies: Which Strategy is Best for You? Firms can use the guidance offered in this paper to better understand four available

More information

A CIO s Guide To Mobility Management

A CIO s Guide To Mobility Management The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202

More information

Five Steps to Android Readiness

Five Steps to Android Readiness Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and

More information

EDITORIAL WHITEPAPER. The power of PaaS. How cloud computing can standardize DoD app development

EDITORIAL WHITEPAPER. The power of PaaS. How cloud computing can standardize DoD app development EDITORIAL WHITEPAPER The power of PaaS How cloud computing can standardize DoD app development How cloud computing can standardize DoD app development BY JOHN EDWARDS AND EVE KEISER The Department of Defense

More information

Contact Center Security: Moving to the Cloud

Contact Center Security: Moving to the Cloud white paper Contact Center Security: Moving to the Cloud Table of Contents Executive Overview 2 A Critical Attribute of a Cloud Provider: Proven Security 2 How Do Well-established Companies Chose a Cloud

More information

Best Practices for Leap Second Event Occurring on 30 June 2015

Best Practices for Leap Second Event Occurring on 30 June 2015 Best Practices for Leap Second Event Occurring on 30 June 2015 26 May 2015 Sponsored by the National Cybersecurity and Communications Integration Center in coordination with the United States Naval Observatory,

More information

Why a Server Infrastructure Refresh Now and Why Dell?

Why a Server Infrastructure Refresh Now and Why Dell? Why a Server Infrastructure Refresh Now and Why Dell? In This Paper Outdated server infrastructure contributes to operating inefficiencies, lost productivity, and vulnerabilities Worse, existing infrastructure

More information

CA Enterprise Mobility Management MSO

CA Enterprise Mobility Management MSO SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.

More information

Helping the Military Integrate, Innovate and Secure Networks across the Enterprise

Helping the Military Integrate, Innovate and Secure Networks across the Enterprise JANUARY 2016 AGILE AND OPEN C4ISR SYSTEMS Helping the Military Integrate, Innovate and Secure Networks across the Enterprise The U.S. military is tasked with protecting our nation, putting the lives of

More information

Securing Mobile Apps in a BYOD World

Securing Mobile Apps in a BYOD World SAP Thought Leadership Paper Mobile App Security Securing Mobile Apps in a BYOD World Protecting Apps Makes You More Responsive to Demands for Enterprise Mobility Table of Contents 4 The Mobile App Tsunami

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

Protect Your Enterprise by Securing All Entry and Exit Points

Protect Your Enterprise by Securing All Entry and Exit Points SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

The Bring Your Own Device Era:

The Bring Your Own Device Era: The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era

More information

Mobile Checklist: Preparing for Building an Enterprise App

Mobile Checklist: Preparing for Building an Enterprise App Mobile Checklist: Preparing for Building an Enterprise App Unlike fleeting consumer apps, enterprise mobile applications for a business are transformative. Forward-thinking organizations are eager to take

More information

Mobile Security Without Barriers

Mobile Security Without Barriers SAP Mobile Secure Mobile Security Without Barriers Securing your enterprise for all the new and expanding mobile use cases is similar to protecting your home. Merely locking your doors won t suffice. You

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Flexible, Life-Cycle Support for Unique Mission Requirements

Flexible, Life-Cycle Support for Unique Mission Requirements Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,

More information

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Chairman Johnson, Ranking Member Carper, and Members of the committee: UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION Executive Summary Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities

More information

Report on App, Platform and Device Preferences from the Leader in Secure Mobility

Report on App, Platform and Device Preferences from the Leader in Secure Mobility RESEARCH REPORT GOOD TECHNOLOGY TM MOBILITY INDEX REPORT Q3 2014 Report on App, Platform and Device Preferences from the Leader in Secure Mobility This report is part of the Good Technology TM Mobility

More information

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Breaking Through the Virtualization Stall Barrier

Breaking Through the Virtualization Stall Barrier Overview... 2 What is the Virtualization Barrier?... 3 Why Should Enterprises Care... 4 Repeatable Practices for Moving Virtualization Forward... 4 Use Case: Running Your Database in the Cloud... 6 Conclusion...

More information

MANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS

MANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS MANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS THE SITUATION MANAGING ALL DEVICES UNDER THE SUN. As your staff uses more mobile

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Compliance Management for Mobile Devices

Compliance Management for Mobile Devices Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration

More information

CUSTOMER KEYNOTE Hal Buddenbohm

CUSTOMER KEYNOTE Hal Buddenbohm CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,

More information

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device

More information

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013 WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest

More information

Iowa State University Proposal for HR-01 ISU HR Operating Model

Iowa State University Proposal for HR-01 ISU HR Operating Model Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and

More information

2012 North American Mobile Device Management Customer Value Enhancement Award

2012 North American Mobile Device Management Customer Value Enhancement Award 2012 2012 North American Mobile Device Management Customer Value Enhancement Award 2012 Frost & Sullivan 1 We Accelerate Growth Customer Value Enhancement Award Mobile Device Management North America,

More information

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring

More information

CLOUD COMPUTING SERVICES CATALOG

CLOUD COMPUTING SERVICES CATALOG CLOUD COMPUTING SERVICES CATALOG... Including information about the FedRAMP SM authorized Unclassified Remote Hosted Desktop (URHD) Software as a Service solution CTC Cloud Computing Services Software

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Network Systems Integration

Network Systems Integration Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology

More information

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase White Paper Architecting the security of the next-generation data center A White Paper by Bloor Research Author : Fran Howarth Publish date : August 2011 teams involved in modernization projects need to

More information

Contact Center Security: Moving to the True Cloud

Contact Center Security: Moving to the True Cloud White Paper Contact Center Security: Moving to the True Cloud Today, Cloud is one of the most talked about trends in the IT industry. It s a paradigm many believe will have a widespread business impact.

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Network Consulting Services Lead Enterprise Transformation Sponsored by: HP Leslie Rosenberg February 2011 Curtis Price Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200

More information

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality

More information

WHITE PAPER Five Steps to Successful Integrated Cloud Management

WHITE PAPER Five Steps to Successful Integrated Cloud Management WHITE PAPER Five Steps to Successful Integrated Cloud Management Sponsored by: HP Mary Johnston Turner May 2011 Robert P. Mahowald IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA

More information

Sprint making business agility real with reliable cloud computing solutions

Sprint making business agility real with reliable cloud computing solutions Sprint making business agility real with reliable cloud computing solutions Partnership with CSC enables enterprise-class cloud services SUMMARY Ovum view Customers of all sizes and in ever-increasing

More information

CompleteCare+ Enterprise Voice

CompleteCare+ Enterprise Voice There s more to communications than email: Unified communication and collaboration, information sharing and team productivity services Contents 1. Executive Summary 2. Introduction Enterprise-level communications

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

White Paper Assured PNT Inside Military Ground Vehicles Using D3

White Paper Assured PNT Inside Military Ground Vehicles Using D3 White Paper Assured PNT Inside Military Ground Vehicles Using D3 Brian Paul December 2013 Introduction Global Positioning System (GPS) technology has become an integral part of Mission Command systems

More information

SMALL BUSINESS. the basics. in telecommunications solutions

SMALL BUSINESS. the basics. in telecommunications solutions SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses

More information

Preparing your network for the mobile onslaught

Preparing your network for the mobile onslaught IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing

More information

The Cloud for Productivity and Mobility

The Cloud for Productivity and Mobility The Cloud for Productivity and Mobility A Guide for Small and Midsize Business As mobile work becomes the norm, turn to cloud-based solutions to extend productivity, collaboration, and business management

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

THE CONNECTED WORKPLACE A strategy for making the most of mobile devices while protecting your enterprise.

THE CONNECTED WORKPLACE A strategy for making the most of mobile devices while protecting your enterprise. THE CONNECTED WORKPLACE A strategy for making the most of mobile devices while protecting your enterprise. Enterprises are realizing a new vision where CONSTANT CONNECTIVITY AND COMMUNICATION Plays a major

More information

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

MAM + MDM = BMS. (Bada$$ Mobile Strategy) MAM + MDM = BMS (Bada$$ Mobile Strategy) Table of Contents 3 Introduction 4 What is Mobile Device Management? 5 What is Mobile Application Management? 6 Why Should You Use Both MDM and MAM? 7 MAM Lifecycle

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

Three simple steps to effective service catalog and request management

Three simple steps to effective service catalog and request management Three simple steps to effective service catalog and request management Prepare for cloud initiatives and get incremental ROI with self service catalog and request management Business white paper Executive

More information

www.fedtechmagazine.com/article/2012/05/locking-down-byod

www.fedtechmagazine.com/article/2012/05/locking-down-byod CASE STUDIES TACTICAL ADVICE RESOURCES Infrastructure Optimization Security Storage Networking Mobile & Wireless Hardware & Software Management CURRENT ISSUE Subscribe 1/8 5 Next Level Data Consolidation

More information

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

The Maximum Security Marriage:

The Maximum Security Marriage: The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile

More information

Remote Management Services Portfolio Overview

Remote Management Services Portfolio Overview Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On

More information

Apple and IBM Forge Global Partnership to Transform Enterprise Mobility

Apple and IBM Forge Global Partnership to Transform Enterprise Mobility Apple and IBM Forge Global Partnership to Transform Enterprise Mobility Mobility is a major business priority Executives plan to invest more in mobile Mobile impacts how organizations conduct business

More information

Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud?

Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud? White Paper Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud? Sponsored by: Cisco Denise Lund April 2014 IDC OPINION The use of mobile devices across job levels and functions

More information

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o

More information

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER The BYOD Opportunity Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER Table of Contents Abstract.... 3 Introduction.... 3 A New Approach to BYOD... 3 Positive Results....

More information

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion

More information

Leveraging the Cloud for Your Business

Leveraging the Cloud for Your Business Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and

More information

2011 NASCIO Recognition Award Nomination State of Georgia

2011 NASCIO Recognition Award Nomination State of Georgia 2011 NASCIO Recognition Award Nomination State of Georgia Nomination Category: Enterprise IT Management Initiatives Title of Nomination: Georgia Enterprise Technology Services Nomination Submitted By:

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

The Future of Census Bureau Operations

The Future of Census Bureau Operations The Future of Census Bureau Operations Version 1.0 April 25, 2013 The Future of Census Bureau Operations Page ii [This page intentionally left blank] The Future of Census Bureau Operations Page iii Document

More information

FLEXIBILITY AGILITY AVAILABILITY BOLSTER YOUR BANK S I.T.

FLEXIBILITY AGILITY AVAILABILITY BOLSTER YOUR BANK S I.T. CDW FINANCIAL SERVICES WE GET IT BOLSTER YOUR BANK S I.T. FLEXIBILITY of financial institutions are planning to outsource the same or additional IT services in the next 12 to 18 months.* AGILITY AVAILABILITY

More information

THE 7 STEPS TO A SUCCESSFUL CRM IMPLEMENTATION DEPLOYING CRM IN THE NEW ERA OF CONNECTED CUSTOMERS

THE 7 STEPS TO A SUCCESSFUL CRM IMPLEMENTATION DEPLOYING CRM IN THE NEW ERA OF CONNECTED CUSTOMERS THE NEW ERA OF ABOUT THE AUTHOR Paul Rogers is the Head of Customer Experience and CRM within HCL s Applications Division. Based in London, Paul is responsible for leading HCL s CRM consulting and technology

More information

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information