JUNE Driving mission success. Modernizing the Navy Marine Corps Intranet
|
|
- Erika Skinner
- 5 years ago
- Views:
Transcription
1 JUNE 2018 Driving mission success Modernizing the Navy Marine Corps Intranet
2 It is with great pleasure that I introduce you to our new company, Perspecta. Perspecta Inc., the new combination of DXC Technology s U.S. Public Sector business with Vencore and KeyPoint, creates a leading enterprise IT and mission services provider able to support the breadth and depth of the government s mission Perspecta and business requirements. Notably for the Department of the Navy (DoN), we will continue to provide the Navy Marine Corps Intranet. Perspecta s commitment is to ensure continuity and high performance for the Navy and Marine Corps and to build upon our long-standing teamwork. We have delivered on the Department s priority for NGEN, which was to deliver high quality, mission essential services at reduced cost. As a mission-led, mission-united company, Perspecta brings clear and focused thinking with bold ideas that will support your IT modernization objectives. With a keen focus on innovation and a deep understanding of our customers, we will passionately pursue smart, creative and collaborative approaches to solving the Navy s most complex challenges. This report provides an update on relevant NMCI projects. It includes significant milestones from both recent and upcoming activities. Please comments or suggestions to me at: NavyandMarineCorpsComms@perspecta.com. Very respectfully, Ted Branch, Senior Vice President and General Manager, Navy and Marine Corps Group Perspecta
3 NMCI takes a fresh approach to data integration Ensuring access to the most up-to-date software Navy NMCI server farm consolidation efforts to yield substantial cost savings New service manager upgrade means more visibility, easier access New tool provides real-time view for cybersecurity Transitioning mobile device management Enhanced security through network access controlintegration The Navy Marine Corps Intranet (NMCI) is the first-of its-kind, enterprise IT platform and has matured over the past 10 years into a stable, flexible, cost-effective and secure IT platform for more than 700,000 Sailors and civilians in the continental United States, Hawaii and Japan. In building NMCI, Perspecta and the Department of the Navy (DoN) have transformed DoN IT infrastructure, combining a myriad of disconnected and dissimilar networks into one of the largest intranets in the world. Through the Next Generation Enterprise Network (NGEN) contract Perspecta provides comprehensive IT services to the Navy and staffing support to the Marine Corps. NMCI is the foundation that underpins the DoN s enterprise IT capability, raising it to new levels of functionality, mobility, flexibility, adaptability, reliability and security.
4 NMCI takes a fresh approach to data integration Together with the Navy, Perspecta is taking a fresh approach to data integration on NMCI. Perspecta recently implemented Informatica s PowerCenter solution to help integrate the varied packaged applications, custom software, and legacy programs that live together on NMCI. This solution facilitates the movement and integration of data between the many diverse solutions the Navy relies on every day. The Integration and Data Movement (IDM) solution based on PowerCenter takes an innovative integration hub approach to integrating data sources and targets. It uses a publish-and-subscribe delivery model as well as loosely coupled interface techniques that provides integration flexibility to both data set publishers and consumers. Additionally, the solution increases the operational efficiency of the NMCI environment by: Eliminating existing custom pointto-point integrations. Centralizing and standardizing data management to reduce the cost of storing and managing data. Allowing end-to-end monitoring. Next steps for this project include an upgraded solution to be set in motion mid-2018.
5 Ensuring access to the most up-to-date software To continue to ensure Sailors have access to the most up-to-date software and security on the network, Perspecta recently completed an upgrade of the NMCI software delivery system, Radia to support the ongoing Windows 10 deployment. Radia is the primary means for administrators to push new software and security patches to the network and allows the end user the ability to easily access and download software for their computer. This new upgrade will ensure compatibility with Windows 10 and continued functionality for software delivery to end users.
6 Navy NMCI server farm consolidation efforts to yield substantial cost savings Together with the Navy, Perspecta has collaborated to consolidate 21 data centers into 14. This effort is part of Navy s Data Center Consolidation (DCC) strategy to maximize cost savings and avoidance, increase efficiency and standardization of Navy data center operations, and increase the Navy s data center cybersecurity posture. To minimize impact to users, local services remain on local micro server farm servers, while the bulk of the data and services have been consolidated to centralized locations. Reducing the Navy s physical data center footprint allows them to reduce maintenance costs, while maintaining performance levels and user experience for local services. Additionally, by introducing virtualization in the remaining data centers, the Navy is able to realign resources according to requirements, which saves money in terms of space optimization and computing power to run systems efficiently. This seven-site consolidation effort completed in July 21, 2017, with all targeted data and services successfully migrated to new locations. Cost savings achieved through: Reduced maintenance and equipment requirements Decreased power and cooling costs Reducing the Navy s physical data center footprint allows them to reduce maintenance costs.
7 New service manager upgrade means more visibility, easier access Throughout 2017, NMCI Operations Services completed a multiphase migration to a newer version of Micro Focus Service Manager software. The new version offers an improved user interface across modules, enables order to payment (OTP) capabilities, and updates the Service Catalog module. NMCI contract technical representatives (CTRs) also have an enhanced request fulfillment experience with more visibility into ticket status. Service Manager is an Information Technology Infrastructure Library version 3 (ITILv3)-based resource that gives NMCI users and CTRs tools to manage their computers for better effectiveness and efficiency. It also provides IT personnel with details about important IT practices and provides comprehensive checklists, tasks and procedures that can be tailored to meet NMCI needs. Next steps for this project include an upgrade to version 9.41, which is scheduled to complete in Benefits at a glance: Improved user interface Order to payment (OTP) capabilities Better ticket status visibility
8 New tool provides real-time view for cybersecurity A new security solution will soon help the Navy better discover exposure to immediate cyber threats. The Tanium solution provides a real-time view that allows cybersecurity teams to see what s happening, as it s happening, allowing them to make better decisions and quickly take corrective action. After a successful proof of concept in 2016, the Navy ordered Tanium into production, which reached full operational capability in December 2017
9 Transitioning mobile device management To provide Navy personnel with new and enhanced mobile capabilities while continuing to provide data security, Perspecta is implementing the BlackBerry Enterprise Mobility Suites (BEMS) Unified Endpoint Manager (UEM) MDM solution for use with ios and Android devices. The new mobile management solution enables users to access a host of new applications that deliver enhanced functionality. The new mobile management solution continues to feature a secure container, which is designed to keep Navy data secure. However, users can also use the devices for personal communication and activities, as long as they remain within Navy guidelines. Target completion date for the MDM transition and migration of users is August Benefits at a glance: Access to new mobile applications, enhanced functionality Secure container keeps Navy data secure, while allowing for personal communications use
10 Enhanced security through network access control NMCI will soon have an additional layer of security with the Enhanced Network Access Control (ENAC). ENAC is a suite of collective technologies that provide three functions for the Navy. These three functions of access control consist of device authentication, device policy assessment, and device policy remediation. Collectively, the suite will provide greater visibility and additional details about what devices are connecting to the network. ENAC hardens the network wall plate; that is, it checks that devices connecting to the network are authenticated and compliant with policy prior to allowing access to network resources. Non-compliant devices are remediated leveraging existing tools. In other words, if a user who hasn t connected to the network in a while tries to do so, this tool will check their device to ensure it s up to date with any system updates that are required before the user can access sensitive systems. This tool will improve the Navy s overall security posture by preventing non-authenticated devices from connecting to the network and identifying and remediating approved devices that have a weakened security profile. It also provides a tool to assist with identification and eradication of operating systems and applications no longer approved for use. Benefits at a glance: Tool will provide device authentication, device policy assessment, and device policy remediation Greater visibility and additional details about what devices are connecting to the network Identification and remediation of approved devices that have a weakened security profile Improved network security posture Phase 1 of implementation began in December 2017.
11
12 perspecta.com
SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationWhy This Major Energy Company Surged Back to BlackBerry After Trying AirWatch
Case Study Why This Major Energy Company Surged Back to BlackBerry After Trying AirWatch At a Glance Industry Energy Employees 8000+ Location North America Products BlackBerry Enterprise Mobility Suite
More informationNext Generation Enterprise Network- Recompete (NGEN-R) Industry Day
Next Generation Enterprise Network- Recompete (NGEN-R) Industry Day CAPT Michael Abreu Program Manager Naval Enterprise Networks (PMW-205) 25 January 2017 Topics Network as Mission Enabler Delivering Capability
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationTHE AUTOMATED TEST FRAMEWORK
2017 THE AUTOMATED TEST FRAMEWORK Test More. Test Consistently. Test Faster. Secure Results. Delivered. xceleratesolutions.com TABLE OF CONTENTS CONCEPT...3 BENEFITS...4 TRANSFORMING FROM TRADITIONAL TO
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationCYBER ASSISTANCE TEAM OVERVIEW BRIEFING
CYBER ASSISTANCE TEAM OVERVIEW BRIEFING By Mr. Derek Fleischmann Cyber Assistance Team Missile Defense Agency May 16, 2018 Agenda Introduction MDA CAT Operations MDA CAT Deployment Expectations Administrative
More informationVulnerability Assessments and Penetration Testing
CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze
More informationNaval Enterprise Networks Industry Day #2 NGEN Re-compete Acquisition Approach
Naval Enterprise Networks Industry Day #2 NGEN Re-compete Acquisition Approach Philip M. Anderson Deputy Program Manager, PMW 205 25 May 2016 Agenda NGEN NGEN Re-compete (NGEN-R) Shaping the NGEN-R Industry
More informationTHE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD
OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationA Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface
A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface ORGANIZATION SNAPSHOT The level of visibility Tenable.io provides is phenomenal, something we just
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationInformatica Data Quality Product Family
Brochure Informatica Product Family Deliver the Right Capabilities at the Right Time to the Right Users Benefits Reduce risks by identifying, resolving, and preventing costly data problems Enhance IT productivity
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationCisco Identity Services Engine (ISE) Mentored Install - Pilot
Cisco Identity Services Engine (ISE) Mentored Install - Pilot Skyline Advanced Technology Services (ATS) offers Professional Services for a variety of Cisco-centric solutions. From inception to realization,
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationFrom the eyes of a customer
From the eyes of a customer Customer Success Panel Aneel Jaeel SVP Customer Success Group, McAfee Speaker Aneel Jaeel Senior Vice President Customer Success Group McAfee Speakers Major General Chartchai
More informationMAXIMIZE SOFTWARE INVESTMENTS
MAXIMIZE SOFTWARE INVESTMENTS with eplus and Cisco ONE Today s Software Challenges Numerous, complicated options for software licensing Unpredictable IT spending Achieving predictable business outcomes
More informationIT Risk & Compliance Federal
Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19,
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationMicrosoft IT Leverages its Compute Service to Virtualize SharePoint 2010
Microsoft IT Leverages its Compute Service to Virtualize SharePoint 2010 Published: June 2011 The following content may no longer reflect Microsoft s current position or infrastructure. This content should
More informationBad Idea: Creating a U.S. Department of Cybersecurity
December 2018 Bad Idea: Creating a U.S. Department of Cybersecurity Suzanne Spaulding and Mieke Eoyang A lack of cybersecurity can have serious consequences the theft of money or data, an interruption
More informationTEL2813/IS2621 Security Management
TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationIT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
More informationDesign and deliver cloud-based apps and data for flexible, on-demand IT
White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to
More informationFramework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams
More informationThe Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan
Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationThe Oracle Trust Fabric Securing the Cloud Journey
The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationSecuring Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection
Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection Azure Active Directory 3 rd Party IaaS IaaS Rights Management Services
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationVirtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services
Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as
More informationOPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith
OPUC Workshop March 13, 2015 Cyber Security Electric Utilities Portland General Electric Co. Travis Anderson Scott Smith 1 CIP Version 5 PGE Implementation Understanding the Regulations PGE Attended WECC
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationImmigration IT Solutions ENHANCED SYSTEMS INCREASED SECURITY IMPROVED PROCESSES
Immigration IT Solutions ENHANCED SYSTEMS INCREASED SECURITY IMPROVED PROCESSES A Nation Built on Immigration lmmigration has been essential to the development of the United States by bringing together
More informationJBoss Enterprise Middleware
JBoss Enterprise Middleware Making software from the open source community ready for the enterprise DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171 Web: www.dlt.com Phone: 703-709-7172
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationUnofficial Comment Form Project Modifications to CIP Standards Requirements for Transient Cyber Assets CIP-003-7(i)
Unofficial Comment Form Project 2016-02 Modifications to CIP Standards Requirements for Transient Cyber Assets CIP-003-7(i) Do not use this form for submitting comments. Use the electronic form to submit
More informationPlant Security Services Protecting productivity in the digital era October
Plant Security Services Protecting productivity in the digital era October2017 Restricted www.siemens.com/plant-security-services Internet of (hacked) Things Page 2 Use case - No OT cybersecurity company
More informationCollege of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, Information Technologies
College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, 2009 Information Technologies UNIT STRATEGIC PLANNING UPDATES MARCH 2, 2009 Information Technologies Executive Summary Challenges
More informationDIMETRA X CORE DATA SHEET DIMETRA X CORE
DIMETRA X CORE FOR GOVERNMENT ORGANISATIONS, PUBLIC SAFETY AGENCIES AND LARGE ENTERPRISES, MOBILE BROADBAND IS ON THE WAY. AND WHILE YOU DON T KNOW WHEN THAT CHANGE IS COMING YOU CAN BE READY FOR IT WITH
More informationTransformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018
Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More information5 Steps to Government IT Modernization
5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationSTRATEGY STATEMENT OF QUALIFICATIONS
STRATEGY STATEMENT OF QUALIFICATIONS STOK IS YOUR VALUES- ALIGNED PARTNER IN THE DISCOVERY, CO-CREATION, AND DELIVERY OF HIGH- PERFORMANCE SPACES Salesforce Tower San Francisco, CA SERVICES LEED Platinum
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationCyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.
Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationOffice of Acquisition Program Management (OAPM)
Office of Acquisition Program Management (OAPM) Ron Gallihugh Assistant Administrator Airport Consultants Council July 18, 2017 Acquisition Reform Historically, Transportation Security Administration (TSA)
More informationNORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives
NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information
More informationTransforming Security Part 2: From the Device to the Data Center
SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation
More informationIT Consulting and Implementation Services
PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from
More informationTotal Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationSecurity Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
More informationCloud for Government: A Transformative Digital Tool to Better Serve Communities
Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital
More informationAZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments
AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new
More informationBUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology
BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology ebook BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS
More informationForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.
Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do
More informationWhy Information Architecture is Vital for Effective Information Management. J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix
Why Information Architecture is Vital for Effective Information Management J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix J. Kevin Parker, CIP, INFO CEO & Principal Architect, Kwestix
More informationUpdate on the Government of Canada s Information Technology Transformation Plan
Update on the Government of Canada s Information Technology Transformation Plan Presentation to the Information Technology Infrastructure Roundtable June 27, 2016 Peter Bruce, Senior Assistant Deputy Minister,
More informationAzure DevOps. Randy Pagels Intelligent Cloud Technical Specialist Great Lakes Region
Azure DevOps Randy Pagels Intelligent Cloud Technical Specialist Great Lakes Region What is DevOps? People. Process. Products. Build & Test Deploy DevOps is the union of people, process, and products to
More informationConsolidation Committee Final Report
Committee Details Date: November 14, 2015 Committee Name: 36.6 : Information Security Program Committee Co- Chairs: Ren Flot; Whitfield Samuel Functional Area: IT Functional Area Coordinator: Phil Ventimiglia
More informationData Governance Quick Start
Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry
More informationIBM Internet Security Systems Proventia Management SiteProtector
Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and
More informationDatacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education
Datacenter Management and The Private Cloud Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education System Center Helps Deliver IT as a Service Configure App Controller Orchestrator Deploy
More informationThat Set the Foundation for the Private Cloud
for Choosing Virtualization Solutions That Set the Foundation for the Private Cloud solutions from work together to harmoniously manage physical and virtual environments, enabling the use of multiple hypervisors
More informationCheck against delivery
Check against delivery Report of the Secretary-General on Status of Implementation of the Information and Communications Technology Strategy for the United Nations (A/70/364) Statement to the Fifth Committee
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Media Activity Overview
Mission Area Department of Defense Overview Business System Breakout Appropriation BMA 0.163 Total 24.846 Defense Business Systems 0.163 All Other Resources 24.683 EIEMA 24.683 FY 2014 ($M) FY 2014 ($M)
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationVom PoC zur IT-Transformation Cloud Adoption in der Praxis. Constantin Gonzalez Solutions Architect, Amazon Web Services Deutschland
Frankfurt Vom PoC zur IT-Transformation Cloud Adoption in der Praxis Constantin Gonzalez Solutions Architect, Amazon Web Services Deutschland Changes in IT Mainframes Client/Server Virtualization Cloud
More informationChallenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9
HAWK Overview Agenda Contents Slide Challenges 3 HAWK Introduction 4 Key Benefits 6 About Gavin Technologies 7 Our Security Practice 8 Security Services Approach 9 Why Gavin Technologies 10 Key Clients
More informationOptimizing IT: Toward Modern Workplace Management With Windows 10
POINT OF VIEW DYNAMIC WORKPLACE SERVICES Optimizing IT: Toward Modern Workplace Management With Windows 10 JULY 2018 JON CONRAD, SENIOR DIRECTOR, INFRASTRUCTURE, CLOUD AND SECURITY SERVICES, NTT DATA SERVICES
More informationGuide Series. How to upgrade to Microsoft Windows 10? Guide Series
How to upgrade to Microsoft Windows 10? Acuutech All rights reserved 2016 1 Contents Introduction... 2 Why use Windows 10?... 3 What are the advantages of Windows 10?... 4 Windows 10 editions comparison...
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST
More informationData Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016
Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data
More informationeplus Managed Services eplus. Where Technology Means More.
eplus Managed Services We Believe Managed Services Broker IT Innovation Superior IT Solutions IT Service Excellence Clear Business Outcomes Exceed Customer Expectations Customers tell us they need managed
More informationFDIC InTREx What Documentation Are You Expected to Have?
FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the
More informationIn 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.
REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationWhite Paper. View cyber and mission-critical data in one dashboard
View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More information