Space Ground Services in the Joint Information Environment (JIE)
|
|
|
- Lucas Lang
- 9 years ago
- Views:
Transcription
1 Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation
2 Space Ground Services in the Joint Information Environment Agenda What is the JIE? JIE Operational Evolution Approach to Achieving the Anticipated Outcomes Current Implementation Status How Will Space Ground Systems Leverage JIE? Potential JIE Ground Systems Impacts and Benefits Evolving Ground System Acquisitions Next Steps for Ground System Developers 2
3 What is the JIE? The Joint Information Environment (JIE) is a secure and flexible datacentric information environment based on commercial information technology (IT) Shared network infrastructure Common enterprise services Single security architecture Its objectives are to: improve mission effectiveness decrease cyber attack surface realize IT efficiencies JIE is operated and managed per the Unified Command Plan (UCP) using enforceable standards, specifications, and common tactics, techniques, and procedures (TTPs) 3 Adapted from Charter for The Joint Information Environment Management Construct, 4-Star JCS TANK approved definition 6 August 2012.
4 JIE Operational Evolution EOC Enterprise Operations Center CNDSP Computer Network Defense Service Provider GEOC Global Enterprise Ops Center COP Common Operational Picture 4 Figure reprinted courtesy of DoD
5 Approach to Achieving the Anticipated Outcomes Single Security Architecture (SSA) Network Normalization Identity and Access Management (IdAM) Enterprise Services Data Center Consolidation Cloud Computing Adapted from the DoD Strategy for Implementing JIE 5
6 Current Implementation Status Common infrastructure and services, combat support applications EUCOM implemented first Networks, Operations Centers, JRSS JRSS implementation in CONUS Joint Regional Security Stacks (JRSS) first in place in Joint Base San Antonio (JBSA) JRSS are beginning to be operational in CONUS Monitoring and testing effectiveness, impacts Implementing services Software Application Rationalization and Server Virtualization Desktop Virtualization and Thin-Client Environments Mobility Services Figure reprinted courtesy of DoD 6
7 How Will Space Ground Systems Leverage JIE? Notional Evolution of Infrastructure Figure by Sky Troyer, The Aerospace Corporation. 7
8 Potential JIE Ground Systems Impacts and Benefits Common Infrastructure / Services Developers can focus less on IT, more on the mission Agile development environment, allows quick transition to operations Use of Software Defined Networking Improve sustainability, scalability, maintainability Reduce procurement time and cost Joint Regional Security Stacks Automated security monitoring, Defensive Cyberspace Operations Reduce time and effort spent on Assessment and Authorization (formerly known as Certification & Accreditation) Improve vulnerability management, reduce time spent on patch management Reduce required staffing, training costs Common data access Shared data can be located on a common platform and common namespace Scalability, security concerns can be addressed jointly Help with load balancing, redundancy, resource availability Joint Governance Every application and system must meet the same rules and standards 8
9 Joint Regional Security Stack Proactive Management Figure reprinted courtesy of DoD 9
10 Joint Regional Security Stacks "As a key component of the Joint Information Environment's (JIE), the Joint Regional Security Stack (JRSS) will consolidate network transport and security boundaries across the DoD. JRSS brings a Single Security Architecture (SSA) to JIE by providing enhanced: Centralized Network Management; the ability to manage the network proactively; controlling, monitoring, and analyzing network activity and events Centralized Network Defense; offering focused defensive capabilities; detecting, analyzing, and containing intrusions Network Command and Control; providing enhanced situational awareness (SA); improving the speed and quality of command decisions The JRSS will connect AF and Army network resources at permanent installations and in forward operating locations to the JIE via gateways managed under DISA oversight... Installation Service Nodes will provide network services for an individual installation to operate in a disconnected state. The gateways will provide managed and protected connection to Core Data Centers (CDC), providing warfighters and their support organizations secure access to services and information. From JRSS Architecture Development Update, Air Force Network Integration Center, AFNIC / NAS, Mr. Steve Stoner, 15 Jul
11 Evolving Ground System Acquisitions Identify unique information technology needs Define performance requirements Define criticality of components and mission threads Consider JIE services first Cloud Computing Services: Application Licensing, virtualization Consolidated Data Centers: Configuration and Data Management Collaboration Services: DCO/Unified Capabilities Defensive Cyber Operations: Joint Regional Security Stacks (JRSS) Leverage common infrastructure, focus on truly mission-unique requirements 11 Ground Services Will Be an Integral Part of Consolidated Enterprise Services
12 Next Steps for Ground System Developers What GS developers should do now Keep current on JIE, engage JIE POCs Architect systems to take advantage of common resources (JRSS, enterprise services, consolidated data centers, etc.) Provide ground system requirements to JIE use cases/scenarios and enterprise services Volunteer to be pathfinders to ensure the JIE meets programs' needs Share information from prototypes, pathfinders, and pilots SMC/ENP is working with AFSPC, AFLCMC, and SAF/CTO on: Space-focused and JIE-integrated Enterprise Security Architecture Guides and plans to leverage Joint Regional Security Stacks Prototypes and SMC-wide implementation plan for JIE services JIE-integrated Enterprise Knowledge Management System Programs should establish communications with POCs on JIE SMC programs should work with SMC/ENPM Space Ground Systems Can Be at the Forefront of the Transition to JIE 12
13 13 QUESTIONS?
14 Backup Slides 14
15 JIE OV-1 15
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
Advanced Systems & Development
Advanced Systems & Development Transitioning to an Enterprise Ground System Lt Col Matt Kimsal SMC/ADY Envisioning and Shaping the Future of Space BLUF SMC/AD is generating a plan for the transformation
Cyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
DISA and the Evolving DoD Enterprise
1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing
The Department of Defense Strategy for Implementing the Joint Information Environment
The Department of Defense Strategy for Implementing the Joint Information Environment September 18, 2013 The estimated cost of report or study for the Department of Defense is approximately $27,000 for
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
Joint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
DoD Joint Information Enterprise
DoD CIO DoD Joint Information Enterprise Mr. David DeVries DoD Deputy Chief Information Officer For Information Enterprise (IE) May 21, 2013 DoD s Cyber Footprint How Big? DoD IT User Base ~1.4 million
IT Service Management in the JIE and the DoD Enterprise Service Management Framework
IT Service Management in the JIE and the DoD Enterprise Service Management Framework Office of the Chief Information Officer/ Defense Information Systems Agency Office of the Chief Information Officer
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015
Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority Overview A5/8 Organization Where We Were/Are Way Forward Challenges
Cyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Core Data Center Reference Architecture
Core Data Center Reference Architecture DoD Enterprise Architecture Conference 2012 Office of the Chief Information Officer Topics Background DoD CIO Vision for Core Data Centers Core Data Center Reference
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
Future Multi-Mission Satellite Operations Centers Based on an Open System Architecture and Compatible Framework
Future Multi-Mission Satellite Operations Centers Based on an Open System Architecture and Compatible Framework GSAW 2014 Thomas J. Sullivan, Aerospace Ground Systems Lab Rico Espindola, MMSOC Flight Operations
AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration
Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss
NGEN Re-compete Industry Day Navy Data Center Consolidation
NGEN Re-compete Industry Day Navy Data Center Consolidation Mr. John Pope Director, DCAO 17 November 2015 Multiple independent data centers grew up organically to support the warfighter. Lack of configuration
SUBJECT: Joint Information Environment Implementation Guidance
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 SEP 2 6 2013 CHIEF INFORMATION OFFICER MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF
Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop
Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop Shannon Lawson Command IAM SSC Pacific Distribution Statement A. Approved for Public Release;
Defining a Secure Mobile Framework Architecture at DHA
Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA
DoD s Efforts to Consolidate Data Centers Need Improvement
Inspector General U.S. Department of Defense Report No. DODIG-2016-068 MARCH 29, 2016 DoD s Efforts to Consolidate Data Centers Need Improvement INTEGRITY EFFICIENCY ACCOUNTABILITY EXCELLENCE INTEGRITY
Building Assurance Into Software Development Life- Cycle (SDLC)
Application Software Assurance Center of Excellence (ASACoE) Building Assurance Into Software Development Life- Cycle (SDLC) James Woody Woodworth Operations Chief, ASACoE & Sean Barnum, Principal Consultant
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Army Cloud Computing Strategy
Army Cloud Computing Strategy MARCH 2015 Enterprise Architecture Division Army Architecture Integration Center HQDA CIO/G-6 Version 1.0 This page intentionally left blank. TABLE OF CONTENTS FOREWORD...
Forecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
AFCEA JIE Mission Partner Symposium
AFCEA JIE Mission Partner Symposium Success with JIE Industry Contracts in DoD Enterprise Services Lessons Learned and Tips for Future Success Victor Akinnagbe [email protected] 425-704-9149 Defense
Cloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 This page intentionally left blank EXECUTIVE SUMMARY In the current political, economic, and technological landscape,
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information
DISA Acquisition Opportunities
DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov
US Army Network Security Reference Architecture
US Army Network Security Reference Architecture (Aligned to the DoD Enterprise) Version 1.0 1 August 2013 Executive Summary The objectives of this Network Security Architecture are to reduce network complexity,
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
Cloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is
What s What Ahead For Architectures in the DoD? Mr. Dav Da e v DeVr DeV ies Mr. Martin Westphal
What s Ahead For Architectures in the DoD? Mr Dave DeVries Mr. Dave DeVries Mr. Martin Westphal What Has Happened Organization changes and declining budgets Progress made in Electronic Health Record Data
SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT
SAM Benefits Overview SAM SAM is critical to managing an IT environment because effectiveness is seriously compromised when an organization doesn t know what software assets it has, where they are located,
CAPABILITY FOR DEFENCE IN TURKEY
NETWORK ENABLED CAPABILITY FOR DEFENCE IN TURKEY Mr. Mete ARSLAN, [email protected] Presentation Plan Introduction of SSM SSM point of view for NEC concept and National motivation NEC Technical Feasibility
How To Use Cloud Computing For Federal Agencies
Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2014 2019 VERSION 2
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2014 2019 VERSION 2 A COMBAT SUPPORT AGENCY D E F E N S E I N F O R M A T I O N S Y S T E M S A G E N C Y Director s Intent Two years ago, I stated in
Cloud Computing and Enterprise Services
Defense Information Systems Agency A Combat Support Agency Cloud Computing and Enterprise Services Alfred Rivera Technical Program Director 29 July 2010 Peak of Inflated Expectations You Are Here Plateau
Infrastructure Development Forecast to Industry
Infrastructure Development Forecast to Industry Mr. Jack Wilmer Executive, Infrastructure Directorate 2 November 2015 51 Infrastructure Development Mission & Vision Mission Vision Slogan Enabled by We
From Early Adopter to Enterprise Private Cloud: One Company s Virtualization Evolution. Ken Peck Director of IT DaVita
From Early Adopter to Enterprise Private Cloud: One Company s Virtualization Evolution Ken Peck Director of IT DaVita Agenda Introduction About DaVita DaVita s Virtualization History Where we are today
How To Cloud Compute At The Cloud At The Cyclone Center For Cnc
Cloud Computing at CDC Current Status and Future Plans Earl Baum March, 2014 1 Background Current Activities Agenda Use Cases, Shared Services and Other Considerations What s Next 2 Background Cloud Definition
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
MHS Health Information Technology Transformation March 1, 2016
MHS Health Information Technology Transformation March 1, 2016 Colonel Richard Chip Terry Acting Military Health System Chief Information Officer Defense Health Agency Conflict of Interest Richard N. Terry,
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
Practical Applications of Software Security Model Chris Nagel
Practical Applications of Software Security Model Chris Nagel Software Security Consultant Fortify Software Introductions About Me: Chris Nagel Software Security Consultant With Fortify for 2+ Years Before
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
JTIMS Working Group 27 Aug 2014 1300-1700
JTIMS Working Group 27 Aug 2014 1300-1700 LTC Brian Hittner Mr. Gregg Martin Agenda JTIMS Program Management JTIMS Policy and User Requirements CJCSM 3500.03E Status JTIMS Force Requests Using JTIMS Lite
Delivering Cost Effective IT Services
M2 Technology Delivering Cost Effective IT Services Defense agencies have been directed to move towards cloud and shared service models by the Federal Data Center Consolidation Initiative (FDCCI), the
Estimating Cloud Computing Costs: Practical Questions for Programs
Estimating Cloud Computing Costs: Practical Questions for Programs Kathryn Connor RAND Corporation June 2014 In 2010, the OMB proposed Federal Agencies consolidate data centers to save money. In 2013,
Network Operations (NetOps)
Network Operations (NetOps) COL Debbie Theall Project Manager, PM I3C2 22 May 2013 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 1 UNCLASSIFIED Agenda UNCLASSIFIED Context NetOps
Microsoft Private Cloud
Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
Optimos Enterprise Helpdesk Automation Solution Case Study
Optimos Enterprise Helpdesk Automation Solution Case Study IT Help Central National Science Foundation Optimos Incorporated 4455 Brookfield Corporate Drive Chantilly, VA 20151 Telephone: (703) 488-6900
Information Technology Asset Management
Information Technology Asset Management HARDWARE SOFTWARE AND SERVICES AUBREY P. JONES, PMP DATA SYSTEMS ANALYSTS, INC SUMMARY Management of government/defense IT assets is an increasing target for cost
DoD s Strategic Mobility Vision: Needs & Challenges
DoD s Strategic Mobility Vision: Needs & Challenges Greg Youst DISA Chief Mobility Engineer October 22, 2014 Agenda DoD Mobility Strategy Overview End-State Visions Implementation Challenges: A Reality
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
Empowering IT Acquisitions
Empowering IT Acquisitions Public Release 66ABG-2015-0081 Tim Rudolph, Ph.D. AFLCMC Chief Technology Officer AF Tech Advisor, Integrated Information Capabilities 21 May 2015 The Point Value Deployed Rapidly
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
Application Overhaul. Key Initiative Overview
Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an
Product Framework. Products must use a common suite of infrastructure Support Services
DISA Platform as a Service (PaaS) And RACE May 2012 Version 1.0 Product Framework A Combat Support Agency Overview Enterprise Services must be Product focused with: Discrete retail based boundaries for
WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod
WWT View Point Journey to the Private Cloud: Take the First Steps with FlexPod TABLE OF CONTENTS 1...EXECUTIVE OVERVIEW 2...SECTION 1: THE ROAD TO PRIVATE CLOUDS 3...SECTION 2: START WITH A STABLE INTEGRATED
HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES STATEMENT
NOT FOR PUBLICATION UNTIL RELEASED BY HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES STATEMENT OF DR. JOHN ZANGARDI ACTING DEPARTMENT OF THE NAVY CHIEF INFORMATION OFFICER
United States Department of Defense
Defense.gov News Release: DOD Releases Cloud Computing Str... http://www.defense.gov/releases/release.aspx?releaseid=15435 1 of 3 7/11/2012 3:57 PM United States Department of Defense TOP LINKS Subscribe
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Company Overview. Enterprise Cloud Solutions
2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing
Virtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING
BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 [email protected] PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,
Data Consolidation and Application Optimization (DCAO) Organization
Data Consolidation and Application Optimization (DCAO) Organization 11 February 2015 Presented to: DON CIO IT Conference San Diego Convention Center Mr. John Pope DCAO Director Space and Naval Warfare
AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Operations and Network Center (CORE)
Operations and Network Center (CORE) Get to know us The Operations and Network Center (CORE) is the cornerstone in Informatica ECI's strategy for the provision of managed information technology services.
DoD IT Service Management Initiatives Implications and Opportunities for Industry
AFCEA JIE Mission Partner Symposium Success with JIE Industry Contracts in DoD DoD IT Service Management Initiatives Implications and Opportunities for Industry Bill Powell Cross Program ITSM and Governance
This Conference brought to you by www.ttcus.com
This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32
Audit Capabilities: Beyond the Checklist Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32 Agenda Beyond the Checklist Visa Overview Visa Internal Audit Overview
CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi
CenturyLink IT Consulting Services G-Cloud 6 - SCS REFERENCE NUMBER RM1557vi Overview of the Service (functional and non-functional) IT Consulting Services CenturyLink's Solutions Consulting delivers customised
U.S. Army - Network Security Enterprise Reference Architecture
U.S. Army - Network Security Enterprise Reference Architecture (Aligned to the DoD Enterprise) Version 2.0 29 September 2014 UNCLASSIFIED Executive Summary The scope of this document includes all network
