Enterprise User Enabling Warfighter Capability

Slides:



Advertisements
Similar presentations
Mobile Devices in the DoD
Advertisements

Network Systems Sales LLC
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
DoD Information Enterprise Architecture v2.0
MULTI-LEVEL SECURITY for NATO 1. OUTSIDE MARKET FORCES DELL CONFIDENTIAL 2 There are 3.4 identities stolen every 12 seconds and produces an average loss.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
A Combat Support Agency 1 Mission Assurance FY12 Opportunities Mission Assurance FY12 Opportunities.
United States DoD Public Key Infrastructure: Deploying the PKI Token
Keeping the War Fighter Informed
Spring 2013 ICAM Day Value of ICAM Breakout Session Paul D. Grant Director of Cybersecurity Policy, DoD CIO Co-Chair, Federal Identity, Credential &
UNCLASSIFIED National Senior Leadership Decision Support Service (NSLDSS JCTD) DISA Customer Conference Lt Col Kevin Nyberg
Know the Earth…Show the Way NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY Approved for public release NGA # Gregory Black Director, eGEOINT Management.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Connecting People With Information Conclusions DoD Net-Centric Data Strategy (DS) and Community of Interest (COI) Training For further information .
A Combat Support Agency. Vision & Mission ServicesAgenciesCOCOMS NATO & Coalitions 2 Industry.
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
DISA’s Transformation to a Platform Service Provider A Combat Support Agency Defense Information Systems Agency DISA Computing Services August 2011.
Enterprise SharePoint Service (ESPS) 17 August 2011 A Combat Support Agency Defense Information Systems Agency.
Public Key Infrastructure from the Most Trusted Name in e-Security.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED Program Executive Office GIG Enterprise Services (PEO-GES) 101 Briefing As of October.
Web Platform as a Service (PaaS) A Combat Support Agency Defense Information Systems Agency 17 August 2011.
 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
Effectively Explaining the Cloud to Your Colleagues.
A Combat Support Agency Defense Information Systems Agency Unified Capabilities Requirements (UCR) Overview Joint Interoperability Test Command.
9/11/ SUPPORT THE WARFIGHTER DoD CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC: V1.0.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
9/15/ SUPPORT THE WARFIGHTER DoD CIO 1 (U) FOUO Conclusions Version 1.2 DoD Net-Centric Data Strategy (DS) and Community of Interest (COI) Training.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Enterprise Services & Integration What do we do?? Ron Kelly Dep Director, Enterprise Services and Integration Office of ASD(NII)/DoD CIO.
1 DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY WARFIGHTER SUPPORT.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Headquarters U. S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e © 2008 The MITRE Corporation. All rights reserved From Throw Away.
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED UNCLASSIFIED Spectrum Access: The Tools to Connect GEMSIS 15 Aug 2011.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
UNCLASSIFIED 1 Authorization and Attribute Service Tiger Team (AATT) Update & Status January 13, 2008
A Combat Support Agency Defense Information Systems Agency Rising to the Net-Centric Challenge … Delivering Core Enterprise Services to the DoD and IC.
Defense Information Systems Agency A Combat Support Agency E3 Engineering Division 13 December 2011 Defense Information Systems Agency A Combat Support.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
UNCLASSIFIED NCES Net-Centric Enterprise Services Lynda D Myers DISA, Center for Enterprise Capabilites February 2003.
A Net-Centric DoD NII/CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC:
Paul A. Strassmann, Copyright Stevens Institute of Technology The Structure of I.T. Spending as Measure of Organizational Disorder Paul A. Strassmann,
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
C4ISR for the Military: Development and Implementation Presentation to the Security Network’s C4ISR, Robot Platforms, and Sensor Conference Greg Collins,
Connecting People With Information Transforming the Way the DoD Manages Data M. David Allen OASD(NII)/DoD CIO May 23, 2006 “The.
Enterprise Engineering Directorate (EE)
Composing FORCEnet Science & Engineering Technology Conference 22 April 2004 RADM Ken Slaght, USN Commander Space and Naval Warfare Systems Command.
4/26/2017 JSC Operations July 20, 2010 UNCLASSIFIED.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Patrick Ortiz Global SQL Solution Architect Dell Inc. BIN209.
OFFICE OF INFORMATION AND TECHNOLOGY SERVICE DELIVERY AND ENGINEERING Briefing to Industry DEPARTMENT OF VETERANS AFFAIRS Charles De Sanno TAC APBI, Eatontown,
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
SAM Baseline Review Engagement
Conclusions DoD Net-Centric Data Strategy (DS) and
Program Executive Office GIG Enterprise Services (PEO-GES)
SAM Server Optimization Engagement
Quick Comparison of workspaces
DoD Identity & Access Management (IdAM) Portfolio Overview
OneCloud Talking Points October 2015.
DISN Evolution Mr. Charles Osborn
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Presentation transcript:

Enterprise User Enabling Warfighter Capability 16 August 2011 UNCLASSIFIED

Disclaimer The information provided in this briefing is for general information purposes only. It does not constitute a commitment on behalf of the United States Government to provide any of the capabilities, systems or equipment presented and in no way obligates the United States Government to enter into any future agreements with regard to the same. The information presented may not be disseminated without the express consent of the United States Government. UNCLASSIFIED UNCLASSIFIED 2 2

Agenda Overview Capability Availability UNCLASSIFIED 3

Enterprise User Enterprise User – DoD-wide implementation initiative Concept of Operations (CONOPS) defines the end-state set of capabilities required for secure net-centric information sharing: On-Demand Global Access Assured Identity Management Adaptive Virtual Workspace Enterprise User increments increase maturity Near Term (FY2011-12): Enterprise-wide access using DoD PKI hard token credentials from connected DoD End User Devices Mid Term (FY2013-15): Enterprise-wide access via connected and wireless networks to fully functional virtual workspaces End State (FY2016+): Device and location independent access to cloud computing, personal data stores and full collaborative tools Enterprise User Integrated Master Plan – Orchestrates the integrated/synchronized delivery of Enterprise User UNCLASSIFIED

Secure Net-Centric Information Sharing Capabilities Secure Net-Centric Information Sharing Enterprise User Capabilities – Foundation for Mission Success Enterprise User - Increasing Warfighter Enablement Adaptive Virtual Workspace Connected Warriors accessing data and applications for mission Application and Data Services Assured Identity Management Verified Warriors accurately identified, individually authorized Infrastructure Services On Demand Global Access Mobile Warriors accessing secure networks globally Networking Services “… go anywhere in the DoD, login, and be productive” ~ VCJCS ~ UNCLASSIFIED

“…go anywhere in the DoD, login, and be productive.” DoD Visitor Overview DoD Visitor Supports Enterprise User Concept Enables DoD users to access NIPR when away from home station using local organization resources DoD Visitor designed to work on existing systems and capabilities. No software or hardware purchases required. Supports DoD objectives for PK enablement Consistent with DoD Policies and Doctrine Supports both user needs and local organization mission “…go anywhere in the DoD, login, and be productive.” 6 UNCLASSIFIED

Accessing Enterprise Services “. . . enable secure net-centric information sharing” Enterprise Collaboration Machine-to-Machine Messaging Data Services Environment Enterprise Search/Enterprise Catalog Enterprise Email Enterprise SharePoint UNCLASSIFIED 7

Concept of Operations – Capabilities that enable Warfighters Operational Concept Concept of Operations – Capabilities that enable Warfighters UNCLASSIFIED

Candidate Initiatives DoD-wide synchronization initiative enabling Warfighters to “…go anywhere in the DoD, login, and be productive.” Current: DoD Visitor Candidates: Non-DoD Visitor Traveling Devices – Enterprise Mobile & Wireless Access Pilot Multi-level Security (MLS) End-User Device Pilot Enterprise Attribute Delivery Service – Tactical Edge Current: Enterprise Email Candidates: Universal Web 2.0 Interface for Legacy Application Hosting Environment for Enterprise Services Validation Virtual Workspace Pilot Current: PKI Authentication Enterprise Identity Attribute Service (EIAS) Identity Synchronization Service (IdSS) Candidates: Integrated DEERS/Global Force Management Enterprise Attribute Service Identity and Access Management/Attribute Based Access Control Reference Implementation

Implementation Approach Operational Concept Required Capabilities Enterprise-level Increments and Milestones Driven by Tactical Edge (GIG 2.0; DISA Campaign Plan / GIG Convergence Master Plan) Capabilities Generation Incremental Implementation Engineered Solution Aligned Development Synchronized Implementation Capability Development Measured Success PEO-GES Objective Capabilities Deliverable Timelines Enterprise User Capability Maturity Increments Integrated Implementation Roadmap Key Enablers Enterprise Policy and Standards Requisite Operating Environment (network connectivity, PKI, cloud computing, etc) Partnership – DoD CIO, VCJCS, DMDC, NSA, DoD Components Current Capabilities: (DoD Visitor, NCES, PKI, etc) ENTERPRISE USER Operational Concept DoD Partnership Near-Term Capabilities Mid-Term Capabilities End State Capabilities DoD scale, system dependencies add complexity UNCLASSIFIED