8 août 2018 | International, C4ISR

Here’s a look at the Army’s new enterprise cloud strategy

By:

The Army, after an intense public focus on the tactical network, is beginning to set its sights on the enterprise network, specifically enterprise cloud.

The Army's CIO/G-6 office has been working to update its cloud strategy, as the last strategy was published in 2015.

One of the reasons for the update, according to Thomas Sasala, director of operations and architecture and chief data officer within the CIO/G6, is a lot has changed in the private sector in terms of new technologies and solutions.

Sasala was presenting the enterprise cloud strategy to members of industry during an Aug. 1 tactical cloud industry day in Raleigh, N.C.

At a top level, Sasala explained the Army is moving toward a hybrid cloud environment, noting no one solution will meet all the requirements.

Full Article: https://www.c4isrnet.com/it-networks/2018/08/07/heres-a-look-at-the-armys-new-enterprise-cloud-strategy/

Sur le même sujet

  • How many users were affected by the DISA breach?

    21 février 2020 | International, C4ISR, Sécurité

    How many users were affected by the DISA breach?

    Andrew Eversden A breach of a system hosted by the Defense Information Systems Agency, the Department of Defense's primary IT support agency, affected “approximately 200,000” users after a malicious actor may have gained access to names and Social Security numbers, according to a Pentagon spokesman. Chuck Prichard, a DoD spokesman, said there is “no evidence to suggest that any of the potentially compromised [personally identifiable information] was misused.” DISA is sending letters notifying potentially affected users, in line with agency policy. He added that affected individuals “will subsequently receive additional correspondence with information about actions that can be taken to mitigate possible negative impacts.” The news of the breach was first reported by Reuters. Prichard said the breach was discovered during summer 2019. According to Reuters, which viewed a copy of the letter sent out to DISA officials, the breach occurred between May and July 2019. Affected users will also receive free credit monitoring, Prichard said. Prichard declined to specify what network was breached, only that it was hosted by DISA. He also declined to comment on how long the actor was in the network. “DoD and DISA take the security of our people, information (or data) and operations very seriously and actively monitor potential threats," Prichard said. “For operational security reasons, the department does not comment on the actions taken to mitigate risks or vulnerabilities.” He did add that “DISA ... conducted a thorough investigation of this incident and taken appropriate measures to secure the network.” According to its website, DISA employs over 8,000 military and civilian employees. The agency's mission includes protecting the Department of Defense Information Network, a global DoD network used for sharing and storing information. DISA runs a variety of other systems, including combat support, DoD enterprise email and other communication networks. https://www.fifthdomain.com/dod/2020/02/20/how-many-users-were-affected-by-the-disa-breach/

  • Poland to launch military satellites in 2025, deputy defence minister says
  • AeroVironment pitches Army drone for quick battlefield changes

    17 octobre 2024 | International, Aérospatial

    AeroVironment pitches Army drone for quick battlefield changes

    AeroVironment says its P550 drone will be able to be adapted in less than five minutes by popping old units out and putting new ones in.

Toutes les nouvelles