The Department Of Defence Meets The Cloud

Beginning of an Overcast Era: The Department of Defence Meets the Cloud

The United States Department of Defence has recently endorsed the (long awaited) shift to the cloud. The cloud computing strategy, as the feds calls it, expounds the departments’ intention to relocate the existent network applications from the whirlpool of conventionally burdensome, overly expensive in-house application set to a light-weight, secure out-bound cost-effective eco-system.

The responsibility for choreographing the cloud transition has been entrusted to Defence Information Systems Agency. Teri Takai, Chief Information Officer at Department of Defence, publicized the said information. In addition, a note has been published to inform the higher ups at Pentagon of the cloud broker’s final selection.

“We are moving to an enterprise cloud environment that provides tangible benefits across the department by supporting the delivery of the joint information environment,” announced Takai.

Takai explained the core mission of the DISA’s Enterprise Cloud – bringing to the front cloud computing services aimed at providing exceptional information technology competence, and that as well, at the lowest incurred expenses and the highest echelon of consistency and protection.

Takai believes that “This strategy lays the groundwork, as part of the Joint Information Environment framework, for achieving cloud adoption within the department.” She is a strong advocate of the said strategy and hopes that it will function to streamline the information theory effectiveness programme, the data centre integration and the overall cloud computing efforts.

The specific responsibilities of DISA as a Cloud Service Broker were also highlighted in the published note – the first and foremost of them being improvement in cloud service safety and efficacy. The second important task handed over to DISA is the fusion of cloud services within the operational dynamics of the Department of Defence. The third vital responsibility is to provide on-going assistance to the Department of Defence in custom tailoring the cloud services for their technical and mission critical needs.

DISA’s lead on the strategy has been intended not only to stress on the achievement of the above mentioned objectives, but also to shape up the department to comply with the guidelines crafted by FedRAMP as well as to fit seamlessly in the U.S Cyber Command defence operations. As per chalked out plan, constituents under the Department of Defence will be required either to acquire cloud services via DISA or to attain a waiver from a nominated evaluation authority as per agency stipulations. DISA’s role, intrinsically as a broker, has been formulated by the National Institute of Science and Technology’s cloud computing reference architecture.

The strategy is primarily motivated by its promising cost cut-down and smooth operation features – something the Department of Defence is in dire need of. A few months time will reveal the consequences of the cloud shift, hopefully positive and fruitful.

By Humayun Shahid

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

View All Articles

Sorry, comments are closed for this post.

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…