Communication and Information Systems (CIS) Interoperability: Examples and Lessons Learned from Multi-National Projects and NATO Experience
|
|
- Collin Andrews
- 8 years ago
- Views:
Transcription
1 Communication and Information Systems (CIS) Interoperability: Examples and Lessons Learned from Multi-National Projects and NATO Experience Luigi Bella, Director of Production NC3A, 28 March 2011, Rome 1
2 (CIS) Interoperability Concept The issue: ensure that multiple entities (e.g. different physical/security domains) can effectively work together to achieve the desired global effect. Ensure encompasses various aspects: Define operational needs, federated open architectures, interfaces and success metrics Implement and validate, including compliance with established timelines Maintain and operate, including cyber-defence Evolve and upgrade (e.g. scope/coverage, functionalities/performances) until end-of-life Overall governance Work together encompasses various levels of interaction: Physical/Network layer (e.g. all-over-ip) Sharing of Core Information Services (e.g. , Web-Access) Sharing of Applications, Cross-Access to Data Bases (e.g. Service-Oriented Architecture) Sharing of Tactics, Techniques and Procedures (TTPs) Sharing of Operational Objectives 2
3 (CIS) Interoperability: Myth or Reality? Interoperability is essential: can this Sacred Graal be found anywhere? Dogmatic approach : Define interoperability scope/entities at concept level, abstract environment and model Identify and gather decision making authorities of the concerned entities Propose/discuss standards, TTPs, validation/certification methods and tools Implement and validate, including verification of reciprocal protection/security Overall governance, including upgrade, by the designated authorities Pragmatic approach : Detect specific scope/application areas (e.g. convergence of interest or political mandate) Deduce expected concrete results (not all the wishful set), timelines and metrics Validate by rapid implementation; cross-protection by verifiable mutual trust Quick-wins -> springboard for scope increase; lessons learned -> better performances Governance by practical rules: what is needed to join? World is not black-and-white...nor is it dogmatic-or-pragmatic. 3 examples: Tactical communications, Intelligence Sharing, Afghanistan Mission 3
4 Tactical Communications (TACOMS) Multi-National Project, governed through a Memorandum of Understanding (MOU), with 15 participating Nations delivering standards for robust Traffic Federated Network (TFNs), Technology-Independent interconnection of Network Elements (NEs) Protected, Highly Available and Federated IP network Converged, High-Speed Interoperability Points (IOP1s) IP and ISDN External Network Access Points (ENAPs) Connection of various Security Domains (Connected Clouds) Controlled Exchange Boundaries (CEBs) 4
5 TACOMS Standards 7 standards accepted by NATO (STANAGs) 12 nations ratified 10 stated plans to implement TACOMS is based on a range of civil communication standards TACOMS specifies interaction and configuration for service interoperability Communications protocols, directory, addressing, numbering, etc Quality of service structure Infrastructure security and management Capabilities: Ability to federate communications networks, beyond current developments System agnostic, i.e. specifies boundaries and not internals Standards can and should also be evolved to: Provide a universal interface for wider range of transmission media Enrich Quality of Service structure, mobility management Exploit developments in end to end and IP encryption Accommodate commercial standards evolution Accommodate lessons from Afghanistan NATO/ EAPC 5
6 MAJIIC 1 (Multi-sensor Aerospace/ground Joint ISR Interoperability Coalition) Multi-National Project governed by a MOU 9 nation coalition applied the R&D project established to develop, implement, demonstrate and validate an interoperable, coalition Joint ISR capability Information sharing principle - Post for external access before internal processing Provides operational interoperability based on the use of NATO processes and agreed NATO Standardization Agreements (STANAG) MAJIIC addressed Mission Effectiveness: ability to collaboratively plan and use a wide variety of networked Coalition JISR sensors and exploitation systems to improve the operational commander s situational awareness Proof of Concept demonstrated at Exercise Trial Quest 2007, basis for the development of JISR Concept approved by NATO Military Committee in 2009 Today: MAJIIC deployed to ISAF by NATO and Nations Paris Interoperability Experiment
7 Evolution to MAJIIC 2 (Multi-intelligence All Source Joint ISR Interoperability Coalition) Enhance existing capabilities Additional intelligence products (multi-int) Cross Community of Interest (COI) interoperability Operational process effectiveness and efficiency enhancements Evolve to use NATO Network Enabled Capabilities / Service Oriented Architecture Core Services MAJIIC as a scalable capability within the NATO Service Framework MAJIIC 2 Service Orientation Proof of Concept to be demonstrated at TIE 12 (Feb 2012) Ensure compatibility with Cross Domain Solutions Support transition to operations Integrate resulting feedback Support Configuration Management of MAJIIC Systems Information Assurance Paris Interoperability Experiment
8 Afghanistan Mission Network (AMN) The AMN is defined as a core CIS component administered by NATO with fully trusted National Network Extensions to establish a single federated common domain The AMN concept and design were generated since mid 2009 by a major operational imperative: move from a decentralized conduct of operations (different Nations pursuing tactical campaigns in different Regions) to a centralized conduct of operations (set up of a central ISAF Joint Command IJC). Now implemented, the AMN is the primary Coalition Command, Control, Communications and Computers Intelligence, Surveillance, and Reconnaissance (C5ISR) network in Afghanistan for all ISAF forces and operations. 8
9 AMN shall provide Unity of effort. AMN: Tenets* AMN shall enable immediate end-to-end operational effect. Management of AMN shall be aligned with operational chain of command. Management of AMN shall provide awareness and visibility of Federated Networks to the Commander. Management of AMN shall enable Commander to affect the behaviour of the Federated Networks. AMN Federated Networks shall adhere to One set of standards; one set of Tactics, Techniques and Procedures (TTP). *principle, belief, or doctrine generally held to be true 9
10 AMN: Principles Nations retain full control and responsibility over their National Network Extensions. Nations are responsible to resource and execute all required actions within their national extensions. NATO standards, including security and accreditation, applies throughout the AMN. Nations may choose to apply national standards in addition to NATO standards within their national extension. NATO funding policy applies. 10
11 Afghanistan Mission Network Initial Operational Capability (IOC) All nations participating in AMN must comply with NATO IA and Security policies, to include agreed upon labelling of data and information. CaesarNet (ITA) Key Core Capabilities : Such as (with attachments) Web browsing Video Tele-Conferencing etc CX-I (USA) (AUS) LCSS (CAN) Other Nations Overtask (GBR) ISAF Secret (NATO) JCCIS (DEU) SICF (FRA) FISBasis (NOR) NATO SECRET Information Exchange Gateway COM ISAF: IOC was achieved at the Tipping Point where the AMN became the primary network of choice for the majority of ISAF ops Requirement 11 in January Initial Operational Capability reached in July
12 AMN : Growth of User Accounts on the Shared Domain NATO Releasable to ISAF 12
13 AMN Next Phases - Concept Structure AMN primary C5ISR network for all ISAF forces AMN has replaced the national networks as the primary network at all levels All information systems are fully operational on AMN Integrated AMN Operations Centres are operational SIPRNET (US Nat Ext) CAN National Networks CENTRIX- ISAF (USA) (AUS) Inside shaded circle No restrictions on information exchange LCSS (CAN) CaesarNet (ITA) ISAF Secret (NATO) Other Nations Overtask (GBR) GBR National Networks DEU ECIS (DEU) NORAX (NOR) FR AMN (FRA) FISBasis NS SICF (FRA) NATO SECRET Information Exchange Gateway The AMN will be a federation of networks, independently resourced and populated but all operated and managed in compliance with NATO standards 13 NATO
14 (CIS) Interoperability: Conclusion and General Recommendations Perfect, all-encompassing solutions are a laudable ambition, but very rarely happen and may divert from the art of the possible. Better choice is implementing a little, get quick wins, take stock, implement more... Ensure buy-in and commitment of key stakeholders by: Moving from well recognized operational needs, with evident collective advantages and/or Focussing on areas where stakeholders see advantages for themselves and/or Being prepared to accept initial limited results provided wide scalability is achievable Defining simple and tangible metrics for success Accepting temporary compromise in performances rather than slippage in time Ensure commitment by decision-makers: Clarify what can be expected according to realistic plan (mostly less than wished for...) Be ready to recognize problems and escalate back for support Make clear that it is likely some elements will still be discontent...no matter what! Consider CIS cross-protection from the outset: leaving cyber-defence as after-thought, may bring failures and also fatal tensions across stakeholders 14
15 Questions? Luigi Bella Director of Production (NC3A) NATO
"Nowa Technika Wojskowa" Nr 12/2011 AS A READY, PROVEN AND COMPREHENSIVE C3I SYSTEM TO SUPPORT LAND FORCES ACTIVITIES The Network Centric Data Communication Platform is a modular, completely prepared according
More informationThe key to C4ISR Interoperability. Partnering with Nations to achieve Connected Forces and NATO 2020 goals more efficiently
The key to C4ISR Interoperability Partnering with Nations to achieve Connected Forces and NATO 2020 goals more efficiently At a Glance An integral part of the Alliance structure, the NATO Communications
More informationFuture J-ISR. Big Data Processing. CASD Roma 10 Ottobre 2013. Filippo Gemma - GMSPAZIO
CASD Roma 10 Ottobre 2013 Big Data Processing Filippo Gemma - GMSPAZIO NATO's Joint Intelligence, Surveillance and Reconnaissance Concept (JISR) UV12 Joint Intelligence, Surveillance and Reconnaissance
More informationMission Partner Environment DISA Multinational Information Sharing
Mission Partner Environment DISA Multinational Information Sharing Col Roman Hund, USAF PM DISA MNIS 13 May 2014 1 JIE MPE Tier 1 and Tier 2 Persistent CCDR level US Centric Bi-lateral /Multi-lateral Specified
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
More informationThe IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
More informationForecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationDepartment of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
More informationCENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION
CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION Gabriel Grenon, Dr.Alain Maguer Per Arne Sletner Head, Autonomous Unmanned Vehicles Section Dronitaly Slide 1 Mission CMRE organises and conducts scientific
More informationMarine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
More informationVideo Communications Management Software:
Video Communications Management Software: Critical Success Factors for Technology Decision Makers As next generation video and audio communications technologies come to market, organizations have the potential
More information2007 Magnus.net All rights reserved. Next Generation Enterprise Network Architecture
2007 Magnus.net All rights reserved. Next Generation Enterprise Network Architecture Global Enterprise Business undergone major transformations Global enterprise is no longer Fortune 500 company Commoditization
More informationThis Conference brought to you by www.ttcus.com
This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army
More informationEnterprise Capabilities Descriptions
1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018
More informationDoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
More informationTABLE OF CONTENTS. Section 5 IPv6... 5-1 5.1 Introduction... 5-1 5.2 Definitions... 5-1 5.3 DoD IPv6 Profile... 5-3 5.3.1 Product Requirements...
, Table of Contents TABLE OF CONTENTS SECTION PAGE IPv6... 5-1 5.1 Introduction... 5-1 5.2 Definitions... 5-1 5.3 DoD IPv6 Profile... 5-3 5.3.1 Product Requirements... 5-4 i , List of Figures LIST OF FIGURES
More informationEfficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
More informationIFB Invitation for Bids
DIRECTORATE INFRASTRUCTURE SERVICES 2015-2017 Core Enterprise Services 93.9M Network Infrastructure Services 2117.3M Cyber Security Services 68.7M IT Modernization 178M Total 2457.9M Core Enterprise Services
More informationTactical Targeting Network Technology and Connectivity. Provided by Rockwell Collins
Tactical Targeting Network Technology and Connectivity Provided by Rockwell Collins Tactical Targeting Network Technology (TTNT) is a waveform technology based on the Joint Airborne Network-Tactical Edge
More informationSecure information exchange
www.thales.no Secure information exchange 2 together. Safer. Everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,
More informationReference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
More informationWilhelmenia Ravenell IT Manager Eli Lilly and Company
Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience
More informationCLOUD COMPUTING IN PRIVATE DEFENCE NETWORKS
Romanian Military Thinking ~ 3/2015 CLOUD COMPUTING IN PRIVATE DEFENCE NETWORKS Colonel Dr D`nu] }IG~NU{ The author describes the general context of cloud computing in defence networks and the principles
More informationCisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable
More informationwww. thalesgroup. com Network Management Systems
www. thalesgroup. com Network Management Systems NETWORK MANAGEMENT SYSTEMS FROM THALES Based on Thales' highly successful dynamic management software, the NMS family of Link 16 products provides fully
More informationActive Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
More informationThe rise of the hybrid network model
The rise of the hybrid network model Hybrid networks offer the promise of greater flexibility and capacity, improved application performance and cheaper price points than traditional Wide Area Networks
More informationCPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT
26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment
More informationFive best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
More informationhoneywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management
honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management As an industry leader and single source expert, Honeywell can deliver fully integrated
More informationSynopsis Cyber Situation Awareness Package
Synopsis Cyber Situation Awareness Package Contents Executive Summary 1. Introduction 1.1 Background 1.2 Aim 1.3 Scope 1.4 Assumptions 2. Mission Need 2.1 Main Characteristics 2.2 Threat Analysis 2.3 System
More informationCisco Dynamic Workload Scaling Solution
Cisco Dynamic Workload Scaling Solution What You Will Learn Cisco Application Control Engine (ACE), along with Cisco Nexus 7000 Series Switches and VMware vcenter, provides a complete solution for dynamic
More informationDigital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
More informationUoD IT Job Description
UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management
More informationThe German interagency approach to SSA
Lieutenant Colonel (GS) Karsten Auras, German Air Force Headquarters, 1 I b Space Concepts Presentation for the 2015 Japan Space Forum SSA Symposium, Tokyo, Japan The German interagency approach to SSA
More informationBandwidth Management Equipment & PABX Technician Post Number: AF RESCST 0310 Application Closing Date: 11 May 2012
Bandwidth Management Equipment & PABX Technician Post Number: AF RESCST 0310 Application Closing Date: 11 May 2012 International Security Assistance Force (ISAF) Location: Kabul, Afghanistan Post - International
More informationCisco Services for IPTV
Cisco Services for IPTV Cisco Services for IPTV help service providers efficiently launch IPTV services while mitigating risk and providing service assurance. Opportunity The media services landscape is
More informationC4ISR - Secure Information Infrastructure and Services (CSIIS)
C4ISR - Secure Information Infrastructure and Services (CSIIS) Info Version 3 URL http://com.mercell.com/permalink/38387687.aspx Ekstern udbuds ID 79288-2014 Udbudstype Tildeling af kontrakt Dokumenttype
More informationSecure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
More informationSome Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
More informationBest Practices for deploying unified communications together with SIP trunking connectivity
An Allstream White Paper Best Practices for deploying unified communications together with SIP trunking connectivity An Allstream White Paper 1 Table of contents Correct identification and maximization
More informationFortune 500 Medical Devices Company Addresses Unique Device Identification
Fortune 500 Medical Devices Company Addresses Unique Device Identification New FDA regulation was driver for new data governance and technology strategies that could be leveraged for enterprise-wide benefit
More informationCisco Video Surveillance Services
Cisco Video Surveillance Services Accelerate the deployment of your flexible, scaleable video surveillance solution while lowering operating costs and managing risk CHALLENGE To access surveillance video
More informationBSCI Chapter 1. 2006 Cisco Systems, Inc. All rights reserved.
BSCI Chapter 1 This lesson starts by introducing the network as the platform for the Information age. The Cisco vision i of the future Intelligent t Information Network (IIN) and the Service-Oriented Network
More informationGETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationSystems Engineering and Integration Efforts. 11 Dec 2013
Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;
More informationHubspan White Paper: Beyond Traditional EDI
March 2010 Hubspan White Paper: Why Traditional EDI no longer meets today s business or IT needs, and why companies need to look at broader business integration Table of Contents Page 2 Page 2 Page 3 Page
More informationHow to Design a Communication Network over Distribution Networks
How to Design a Communication Network over Distribution Networks Overview. Key issue: IP technology. Design rules. GAD Project. Experience. Conclusions. Acknowledgments. Overview Increase of the energy
More informationIntelligent Data Center Solutions
Intelligent Data Center Solutions Panduit s Unified Physical Infrastructure (UPI): a Guiding Vision A unified approach to physical and logical systems architecture is imperative for solutions to fully
More informationHow To Make An Integrated System For An Unmanned Aircraft System
Insitu Unmanned Aircraft Soars to New Heights with PTC Integrity Insitu Inc. Demand for Insitu unmanned aircraft systems (UAS) is soaring due to their portability, small size and customizability. This
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1400.25, Volume 1100 January 3, 2014 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Civilian Human Resources Management Information Technology Portfolio
More informationDEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY
More informationReMilNet Service Experience Overview
ReMilNet Service Experience Overview ReMilNet s knowledge across all functional service areas enables us to provide qualified personnel with knowledge across the spectrum of support services. This well
More informationGet the best performance from your LTE Network with MOBIPASS
Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network
More informationDEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
More information> SOTAS The world class multimedia vehicle intercom system. www.thalesgroup.com/netherlands
> SOTAS The world class multimedia vehicle intercom system www.thalesgroup.com/netherlands >> Optimal Solutions for the Battlefield Today, armed forces are involved in a wide spectrum of operations, from
More informationGuiding principles for security in a networked society
ericsson White paper Uen 307 23-3230 February 2014 Guiding principles for security in a networked society The technological evolution that makes the Networked Society possible brings positive change in
More informationAvaya Strategic Communications. Consulting. A Strong Foundation for Superior Business Results. Table of Contents. Taking Business Vision to Reality
Avaya Strategic Communications Consulting Table of Contents Taking Business Vision to Reality... 1 Section 1: The Technology Contribution Challenge..... 1 Section 2: A Systematic Approach for Ensuring
More informationTactical Service Bus: The flexibility of service oriented architectures in constrained theater environments
Tactical Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Edge in NATO Context Tactical still very much under control of national forces: Zone of Operations
More informationFederal Aviation Administration
Federal Aviation Administration Current Contract Security Capabilities Prepared by: FAA Telecommunications Infrastructure (FTI)-2 Program Office, AJM-3170 Date: October 5, 2015 1 Table of Contents 1.0
More informationNAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
More informationNational Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications
OPERATIONAL REQUIREMENTS DOCUMENT National Cyber Security Framework and Protocol Contents for securing digital information in networked critical infrastructures and communications 1. General Description
More informationTransition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing
White Paper Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing What You Will Learn With the exhaustion of IPv4 addresses, businesses and government agencies
More informationDepartment of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
More informationIBM Data Security Services for endpoint data protection endpoint encryption solution
Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such
More informationEMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care
EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing
More informationProtecting your information
Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost
More informationDepartment of Defense Net-Centric Services Strategy
Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion
More informationData Centre Networks Overview
TELECOMMUNICATIONS TRANSFORMATION PROGRAM Data Centre Networks (DCN) Industry Day Data Centre Networks Overview Michel Fortin Director General, Telecommunications Transformation Program Transformation,
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Converged Business Networks: Simplifying Network Complexity Sponsored by: Level 3 Melanie Posey November 2010 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationNetwork Assessment Services
Network ment Services Information networks are arguably your most important IT assets, their speed and reliability are the foundations upon which your critical business systems and applications run. Ensuring
More informationMaking Machines More Connected and Intelligent
White Paper Making Machines More Connected and Intelligent Overview It s no secret that technology is dramatically transforming the manufacturing arena. We re witnessing a new industrial revolution, led
More informationCONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5
#924, 5 A The catchy phrase Internet of Things (IoT) or the Web of Things has become inevitable to the modern world. Today wireless technology has reached its zenith making it possible to interact with
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationIn an ERP implementation how the entire organization works changes forever
Whether you re upgrading from a legacy based system or automating from scratch, selecting and deploying the right ERP solution is something organizations must get right. An ERP pervades through the entire
More informationConvergence: The Foundation for Unified Communications
Convergence: The Foundation for Unified Communications Authored by: Anthony Cimorelli, Senior Product Marketing Manager Onofrio Norm Schillaci, Principal Sales Engineer Michelle Soltesz, Director, Marketing
More informationInfor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
More information1.0 VOLUME 2, SECTION 2.13
1.0 VOLUME 2, SECTION 2.13 (CONTINUED): Networx Operational Support Systems 1.1 2.13.1.4.5 Respond to technical support. The (3)Enterprise portal will provide a link to respond to technical support questions
More informationTerms of Reference of the SEPA Cards Certification Management Body (SCCMB)
Terms of Reference of the SEPA Cards Certification Management Body (SCCMB) Draft V1.0.1 2 nd June 2015 1 DEFINITIONS A Card Payment Scheme/Approval Body is an organisation that is subject to Oversight
More informationThe changing face of global data network traffic
The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This
More informationService Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
More informationHigh-Performing Information Systems Aligned With Utility Business Strategy [Project #4316]
High-Performing Information s Aligned With Utility Business Strategy [Project #4316] ORDER NUMBER: 4316 DATE AVAILABLE: June 2013 PRINCIPAL INVESTIGATORS: David W. Harris, Esteban Azagra, Rod van Buskirk,
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationAssessment of Software for Government
Version 1.0, April 2012 Aim 1. This document presents an assessment model for selecting software, including open source software, for use across Government, and the wider UK public sector. 2. It is presented
More informationwww.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)
www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It
More informationTHE EVOLUTION OF DATA CENTER MANAGEMENT WITH BUSINESS SERVICE MONITORING & ITIL
THE EVOLUTION OF DATA CENTER MANAGEMENT WITH BUSINESS SERVICE MONITORING & ITIL SUMMARY The infrastructure in a modern corporate data center manages critical business information for the enterprise. In
More informationSuccession Solutions. Voice over IP enabled Meridian
Succession Solutions Voice over IP enabled Meridian Evolution with Continuity With Nortel Networks Succession Internet-enabled Solutions for Meridian, you can evolve to Internet Telephony at a pace in
More informationWhite Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.
White Paper The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. - 1 - Executive Summary The era of mobility and consumerization has fundamentally
More informationNATO UNCLASSIFIED. 27 February 2012 DOCUMENT C-M(2012)0014 Silence Procedure ends: 16 Mar 2012 16:00
27 February 2012 DOCUMENT Silence Procedure ends: 16 Mar 2012 16:00 Directive on the Management of Records Generated on Operational Deployment Note by the Secretary General 1. In June 2011 the NATO Records
More informationCloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
More informationCOMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) INFRASTRUCTURE MANAGEMENT POLICY
Commandant United States Coast Guard 2100 Second Street, S.W. Washington, DC 20593-0001 Staff Symbol: CG-6 Phone: (202) 267-2767 Fax: (202) 267-2598 COMDTINST 5230.70 FEB 11 2005 COMMANDANT INSTRUCTION
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationDepartment of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
More informationFederal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
More informationUnified Communications in a Nutshell. beronet. communication without borders
Unified Communications in a Nutshell beronet communication without borders Table of Contents 03 Introduction Introduction to selling mobydick, beronet & Snom 04 05 06 09 1 0 Who Why UC? Understanding UC,
More informationCloud Fabric. Huawei Cloud Fabric-Cloud Connect Data Center Solution HUAWEI TECHNOLOGIES CO.,LTD.
Cloud Fabric Huawei Cloud Fabric-Cloud Connect Data Center Solution HUAWEI TECHNOLOGIES CO.,LTD. Huawei Cloud Fabric - Cloud Connect Data Center Solution Enable Data Center Networks to Be More Agile for
More informationSecurity in Space: Intelsat Information Assurance
Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,
More information