Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Game Changing IT Solutions


Published on

  • Be the first to comment

  • Be the first to like this

Game Changing IT Solutions

  1. 1. GAME-CHANGINGIT SOLUTIONSFOR THE ENTERPRISETaking Advantage of the New RealityIn the current era of economic malaise, increasingly austere federal budgets, global uncertainty,and daunting cyber threat environment, it’s easy to take the few CIO dollars you have and retrench,focusing on what HAS to be done rather than on what SHOULD be done. But as Forbes Magazinewrote in July, 2008, just as our last recession was getting underway, “…curtailing innovation effortsin tough times is a long-term strategic mistake.” Innovation is the only way to reach new, loftiermission objectives, which all of us have been given.So, let’s look at these tough economic times as an opportunity to catapult the enterprise forward,to transform it so it runs leaner, operates faster, and delivers better results. Below, we’ve assembleda few (and by no means all) of the technology game changers worth considering as you plan thefuture of your enterprise in this most dynamic and challenging era. Some of these concepts mayseem new, others may seem like motherhood and apple pie, but each of them can forever changethe way you do business.GAME-CHANGING IT SOLUTIONS FOR THE ENTERPRISE WHITE PAPER 1
  2. 2. Taking Advantage of the New RealityThe Emergence of the Extended EnterpriseOperations Center (EEOC)Most large enterprises have had a Network Operations Center (NOC) for ten or 20 years. This isthe pulsing heart of your IT infrastructure—the central place where you monitor and manage yournetworks, servers, and endpoints. But the NOC is no longer sufficient. Today, enterprises need toaccommodate a dizzying array of mobile devices which everyone uses at home and expects to beable to use at work. The cybersecurity implications are complicated, but assuming you can weaveyour way through that morass (which, in many cases, you can—see below), then you needa Mobility Operations Center (MOC) to accommodate this newly empowered mobile workforce.Cybersecurity has also caught us off guard. In the last five years alone, unique malware signatureshave increased exponentially, from less than 2 million in 2005 to over 50 million in 2010, makingsignature-based malware detection a losing game. Concurrently, the number of security incidentsreported to US-CERT has rocketed from less than 3,000 in 2006 to over 45,000 today, a 12-foldincrease in five years. If 2011 taught us one thing, it was that no enterprise is secure. Not Lockheed.Not Sony. Not RSA. Not Google. Not the U.S. Government. Not your enterprise. And that meansthat the traditional static approaches to cybersecurity – including Certification and Accreditation(C&A) and virus detection – are both outmoded. A more proactive and ongoing approach tomonitoring security is required to even have a hope of keeping up with the cyber threat andkeeping your enterprise data secure. Enter the Security Operations Center (SOC), a place whereyou can continuously monitor and address cyberthreats—reactively, or better yet, proactively.FISMA compliance then becomes an artifact of good security, rather than an objective in andof itself.And then there’s the cloud. With a federal Cloud First strategy, every agency is headed to thecloud. But with private clouds, hybrid clouds, and public clouds, where do you draw your enterpriseboundaries for operational monitoring? The lines are blurry. From an operations perspective, younow have to consider your Extended Enterprise—the enterprise that goes beyond the networksand devices that you manage directly and include the infrastructure, platforms, and applicationsyou have incorporated from other organizations that you entrust with portions of your businessand assets.Thus will evolve the Extended Extended Enterprise Operations CenterEnterprise Operations Center (EEOC), (EEOC)a place where the NOC, MOC, SOC,and Cloud Monitoring Service (CMC)all come together into a unified NOC MOC SOC CMCoperations center. The EEOC willintegrate, automate, and anticipatenetwork, mobility, cyber, and cloud Enterprise Network Cloud(s)operations for a far more efficient,adaptive and secure enterprise.GAME-CHANGING IT SOLUTIONS FOR THE ENTERPRISE WHITE PAPER 2
  3. 3. Taking Advantage of the New RealityEnterprise Performance ManagementBusiness process automation has been around since Henry Ford created the assembly line.However, in the last ten years, service-oriented architectures (SOA) and evolutionary advances inweb application architecture, workflow management, and portal technology have all converged toyour transformational benefit. Standards like SOAP and IF-MAP enable you to integrate disparatecomponents, data feeds, applications, and sensors and tie physical and logical systems together,automating operations with unprecedented speed and flexibility. Meanwhile, portal technologieslike Microsoft’s SharePoint have matured to offer the power to integrate, route, and displayinformation for a modern look and an efficient operation. Add some smart data visualization andyou have compelling dashboard decision support views of nearly every facet of your enterprise.Manage performance—for you, your employees, and your customers.These platforms allow an array ofcapabilities, including automating theFOIA process; audit tracking, managingworkflow and suspense items; performingEnterprise Content Management;delivering training in a video-on-demandenvironment; and executing high-volumee-commerce activities.Graphical dashboards with filtering anddrill-down capabilities provide additionalintelligence tools for management. Trendanalysis tools provide intelligence onhow the enterprise has been managingperformance over time.GAME-CHANGING IT SOLUTIONS FOR THE ENTERPRISE WHITE PAPER 3
  4. 4. Taking Advantage of the New RealitySecure Mobility and the Long-awaitedEnterprise AppStoreWhile our enterprises were asleep, the world has gone mobile. As of July 2011, the AppleAppStore had over half a million apps available for download. Amazingly, every single one wasbuilt in just the last three years. Is it any wonder that our enterprises can’t keep up with personalexpectations set by the consumer electronics market?How many mobile apps does your enterprise have? If it’s fewerthan the number of non-mobile apps you have, there’s work todo (and you’re not alone). Unfortunately, trying to play mobilecatch-up has been (rightfully) hampered by the cybersecurityrisks, which have tempered the rollout of mobile applicationsacross government. Fortunately, new tools and technologies onthe market are addressing the mobile cybersecurity challengesand today it’s possible to deploy, provision, and manage mobiledevices with applications that are sufficiently secure for mostenterprise purposes. This means FIPS 140-2 certification, AESencryption, and secure VPN—all that good stuff.What does this mean? It means the foundation has been laid for the creation of your very ownEnterprise AppStore, a place where employees and partners can download and use the enterpriseapps they need on their mobile devices, which you can safely provision and allow them to use. Andall this can be done in a secure fashion to your CISO’s satisfaction and configuration managed theway your IT department wants it done (in the MOC, which is part of your EEOC).The question now is, what have those mobile apps people been so desperately clamoring for?It’s time to start putting some serious creative thought behind how users of all shapes and size—both inside your enterprise and out—can optimize their productivity through the use of mobileapplications. And these aren’t just applications you already have that you can mobile-enable;they’re applications you don’t have yet andcan’t yet fathom. Remember, in 2008, therewas no Apple AppStore and no one wascomplaining, but today we can’t imagineliving without it (or its Blackberry or Androidequivalent). You probably don’t need 500,000apps, but don’t be surprised if you need 500to realize the true power of secure mobilecomputing. Be careful not to underestimatethis mobility trend.GAME-CHANGING IT SOLUTIONS FOR THE ENTERPRISE WHITE PAPER 4
  5. 5. Taking Advantage of the New RealityThe Necessary Migration to a Trusted Enterprise(using Trusted Computing)The cyber threat is increasing exponentially. What’s causing this ominous trend? The equallyexponential explosion in networked devices, growing from less than 1 billion in 2005 to over10 billion in 2010. Each of these devices is like an open door that malware threats are walkingthrough with impunity. What’s worse, growth of the number of networked devices is only expectedto accelerate, reaching 20 billion in the next four years. One of the biggest threats to enterprisenetworks is the un-trusted nature of these devices.Traditional defenses are clearly no longer viable. So, how do we address this pervasive andaccelerating problem? Trusted Computing technologies alone hold the promise to enableenterprises to be sure of the identity, configuration, and health of every device on their networks,closing the vast majority of the doors that threats enter through. Trusted Computing technologiesuse hardware-based security to establish trust in the devices we use every day.Many of the standards and technologies for Trusted Computing exist today, developed over thelast ten years by members of industry’s Trusted Computing Group (TCG). Moreover, NSA hasproven the validity of these standards and technologies and is openly promoting the adoption anduse of commodity-based Trusted Computing to protect National Security Systems. In September2010, at the first annual NSA Trusted Computing Conference, NSA’s Michael Lamont, Chief ofNetwork Solutions, said it bluntly, “…broad implementation of Trusted Computing technologies willdramatically improve cybersecurity. … Our new goal for government systems is to work to mandatethe use of Trusted Computing technologies to harden commercial products, thus creating trusteddevices.”With Trusted Computing we are able to close the open doors—the devices we use every day—that are together the greatest threat to the network and the security of our data. With TrustedComputing we are simultaneously able to open a new world of possibilities, where information canbe separated based on its sensitivity and access can reliably be granted based on trust.Trusted Computing is a paradigm shift incybersecurity and network, hardware, andsoftware design. As you consider the computingdevices you purchase, the network architecture TRUSTED COMPUTING TENETSyou design and implement, and the future of your Hardware Root of Trustcybersecurity operations (the SOC, which will be Device Measurementpart of your EEOC), consider the possibilities that Measurement MonitoringTrusted Computing offers: Defeat threat vectors, Long-term Protected Storageenable unprecedented operational flexibility, be Process Separationmore compliant, and save money all at the sametime. Five years from now, the Trusted Enterprise Program Isolationwill be reality, but will you have one?GAME-CHANGING IT SOLUTIONS FOR THE ENTERPRISE WHITE PAPER 5
  6. 6. Taking Advantage of the New RealityClient-side Virtualization: A New WorldMost enterprises are cutting costs and creating efficiencies with data center consolidation,server virtualization, and migration to the cloud. At the edge of the enterprise lies another pot ofproverbial gold: the client machine. Desktop (or laptop) virtualization creates a far more secureand flexibly configurable user platform. Anyone who uses two computers at their desk will tell youthe potential efficiencies in virtualization are huge, and anyone who has paid for the duplicatemachines or the electric bill will tell you there’s money to be had in client-side virtualization.Coupled with Trusted Network Connect (TNC) and secure virtual LANs—both components of aTrusted Enterprise—secure virtualization also offers a newfound ability to dynamically configuresecure virtual networks on the fly. No cables to run. No hardware to install.Imagine a world in which a new virtual network for a community of interest could be securelyconfigured and deployed in seconds, and torn down just as fast. That’s all possible today.GAME-CHANGING IT SOLUTIONS FOR THE ENTERPRISE WHITE PAPER 6
  7. 7. Taking Advantage of the New RealityAbout DMIDMI is a leading IT solutions and business strategy consulting firm. DMI provides services andsolutions in Strategic Consulting, Desktop Management, Network Management, EnterpriseApplications, and Cybersecurity. We are one of the fastest growing companies in the industry, withover 500 employees and 50 civilian, defense, and intelligence agency clients. The hallmark of ourbusiness is dedication to exceptional customer service and we’re proud of our Dunn and BradstreetOpen Ratings quality and satisfaction rating of 94/100. Our record of repeat business is enviable byany standard. DMI is headquartered in Bethesda MD, with satellite and project offices throughoutthe world.At DMI, we focus on “enterprise transformation”—the strategic application of innovation to createnewfound economies, efficiencies, savings, and value for our government and commercial clientsand their customers. We offer market-making thought leadership and the proven ability to deliversolutions to the most vexing problems facing enterprises today.We have a dedicated Innovation Office designed to seek and bring new concepts and technologiesto our clients. In the summer of 2011, we opened a state-of-the-art DMI Innovation Center in theheart of Washington, D.C. At the DMI Innovation Center you can learn, experience, and get yourhands dirty with an increasing array of new technologies and solutions like many of those describedabove. See secure mobility in action. Learn what’s possible with Trusted Computing. And soon,experience the future of integrated, automated cybersecurity monitoring operations. You arecordially invited.For more information, contact DMI: Andy Musliner, Chief Technology & Innovation Officer,, 240.223.4809.DMIOne Rock Spring Plaza6550 Rock Spring DrBethesda, MD©2012 Digital Management, Inc. All right reserved.GAME-CHANGING IT SOLUTIONS FOR THE ENTERPRISE WHITE PAPER 7