Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • IT Management

    U.S. Army CIO: We’re in the Market for New IT Solutions

    Written by

    Chris Preimesberger
    Published April 22, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      MOUNTAIN VIEW, Calif.—A clear, salient message emanated from the Hahn Auditorium stage at the Computer History Museum April 20: The CIO of the U.S. Army is actively seeking new data center management tools to get its far-flung IT systems working together more efficiently and to tighten up security.

      During a panel discussion titled, “Moving Past Conventional IT,” at the SINET (Security Innovation Network) IT Security Entrepreneurs Forum, Lt. General Robert Ferrell told about 60 invited Silicon Valley executives that the military is in the market for some new-gen IT tools and services and that it’s actively looking for solutions now.

      In moving beyond conventional IT—which includes LANs and WANs— the military encounters different issues associated with securing and protecting real-time control systems. For example, in the case of a weapons/control system, the traditional security attributes of confidentiality, integrity and availability often must be inverted in importance. Availability becomes preeminent because a real-time control system usually cannot be disturbed while in operation.

      This has real implications for activities such as scanning, patching and continuous monitoring, with which latency is an issue, Ferrell said.

      Army Systems Bogged Down with Legacy IT

      Ferrell said the Army IT teams are bogged down with legacy hardware and software that comprise about 80 percent of all their global systems. Security, naturally, is one of the top-priority pain points, along with centralized and automated control systems.

      “We’re finding that about 95 percent of our security effort has to do with the regular hygiene of taking care of users regarding PKI (public key infrastructure) or two forms of authentication. We find that by looking at our systems, that we really have lot of work to do across the global fabric within the Army [to modernize],” Ferrell said.

      Public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public key encryption.

      “For example, we don’t have an automated tool that will allow us to go engine-to-engine to provide us with the analysis of what we have, the status of the health and welfare of the network, and how to do automatic patching required for the enterprise. So that’s a big opportunity out there that I think is open for all,” Ferrell said.

      A Clear and Present Opportunity

      An opportunity for Silicon Valley? Yes, that would be safe to say. Are you listening, Dell, CA, IBM, VMware, HashiCorp, BMC, nLyte, Microsoft, Brocade, HPE Opsware, Emerson Avocent—and all the dozens of other competent IT orchestration software companies that could help the Army out?

      “The next area where we are challenged is within our workforce,” Ferrell said. “Recruiting, training and maintaining a cyber workforce that’s needed to operate these systems and to assist us with guidance to mitigate security problems. We typically bring kids on, we train them, they get experience, then they see other opportunities industrywide. So that’s a big challenge on our part, to try and maintain a quality workforce.”

      Ferrell said that the Army is working on a list of initiatives to help move to a more secure environment.

      “You’ve probably heard of the term Joint Information Environment—that’s where the entire Department of Defense is working toward one single infrastructure, built on common standards,” Ferrell said. “We’re all committed to doing that, and the effort within the Army—we’re starting with the (National) Guard, then the Corps of Engineers—is just starting.”

      Army ‘Collapsing’ Systems Together

      “We’re collapsing their environments onto the Army network. When that is completed, that’ll mean 60 percent of the Army enterprise will be on one platform. That should be accomplished this year,” he noted.

      As the DOD develops the Joint Information Environment, the lines between components will blur. The matrixed organization evolving the JIE illustrates the department’s technological strategy. The current organization includes the Joint Chiefs of Staff (JCS), Office of the Deputy Chief Management Officer (DCMO), DOD CIO, Joint Staff J6, CYBERCOM, military services, intelligence community, and National Guard.

      This is no simple undertaking—especially in security, Ferrell said.

      “We’re also installing what we call joint regional security stacks. (There are) lots of backdoors to the enterprise—in the Army’s last count, over 1,500. We’re going to replace those 1,500 with only 55 stacks,” Ferrell said. “This will reduce the attack surface, if you will, for any intrusions in the network.

      “What we need is your innovation, when it comes to tools—helping us from a DOD level to a service-unique level that allows us to see ourselves (in a centrally controlled manner) and to identify those anomalies that are in the network, isolate them and destroy them in a timely fashion.”

      SINET is a security consultancy based in San Francisco. Go here for more information.

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.