Federal Government “From the Data Center to the Hybrid Cloud, Our Public Sector Customers Rely on Netapp to Help Them Succeed in Their Critical Missions
Total Page:16
File Type:pdf, Size:1020Kb
To learn more, please visit www.netapp.com & ecs.arrow.com ROB STEIN VICE PRESIDENT, NETAPP U.S. PUBLIC SECTOR NETAPP is the #1 PROVIDER of STORAGE SOLUTIONS * to the FEDERAL GOVERNMENT “From the data center to the hybrid cloud, our public sector customers rely on NetApp to help them succeed in their critical missions. Our team is dedicated to deliver innovation and partnership, so our customers can evolve their technology environment to move their mission forward.” *Market Connections’ Federal Storage Market Appraisal FY2013. april 30, 2015 • VOLUME 29 NUMBER 6 No Shadow 100M, 100Y, 12K No Shadow 100M, 100Y, 12K What can NetApp offer you? Over two decades OUR SOLUTIONS of experience in the Clustered Data ONTAP provides the data control customers Federal market need in a single platform that spans the local office to the data center to the cloud. Our broad flash portfolio Innovative products includes hybrid and ultra-high performance flash arrays that and services that enable accelerate business operations and improve our customers’ agencies to unleash the experience. Our big data solutions simplify the management power of their data of massive, fixed-content storage systems. Our E-Series Exclusive reseller program systems help customers meet the demanding performance and capacity requirements of dedicated workloads. NetApp Clustered Data ONTAP professional services experts help customers simplify their IT is the #1 operating system infrastructure, boost efficiency and flexibility and advance IT to support business goals. World class partners such as Arrow Electronics, a loyal NetApp distributor NetApp Data Management and Storage for over a decade Shared Storage Infrastructure Dedicated Storage Solutions FlashFlash ArraysArrays for ultra-high performance Corporate Data Centers for ultra-high performance ClusteredClustered Date Data O ONTAPNTAP E-SeriesE-Series for price/performance at scale for sharedfor shared infrastructure infrastructure for price/performance at scale StorageGRIStorageGRIDD®® for web-scale object storage Cloud Data Centers for web-scale object storage To learn more, please visit www.netapp.com & ecs.arrow.com BIG DATA GOES MAIN- STREAM Agencies are beyond the buzzwords and bringing analytics to everyday missions PAGE 16 APRIL 30, 2015 • VOLUME 29 NUMBER 6 0430fcw_0c1.indd 1 4/7/15 1:49 PM TDWI is your source for in-depth education and research on all things data. EARLY REGISTRATION DISCOUNT Register by June 26 and save up to $345 USE PRIORITY CODE BOS7 Boston 2015 The Analytics Experience July 26–31, 2015 The Analytics Experience provides comprehensive, end-to-end analytics training on everything you need to build and execute a high-value analytics program. Six action-packed days filled with classes, peer-to-peer sessions, case studies, hands-on training, and networking offer an accelerated learning experience for business and technical leaders and implementers. Core Tracks Hot Topics KEYNOTES // BI & Analytics Foundations // Big Data Analytics Data to Profit: Revenue Growth From data to technologies to business value through Analytics and Monetization // Big Data & Data Management Barbara Wixom, Ph.D. // Data Visualization // Data Visualization & Presentation Principal Research Scientist, MIT Center for The language of images Information Systems Research // Advanced Analytics Techniques // Advanced Analytics Predictive, simulation, streaming, social, // Big Data & Analytics Technologies Internet of things, and more The New BI/Analytics Synergy: Leadership & Management // // The Changing World of Data How to Align Business and IT around Data // Analytics in Action Ecosystems, modeling, technologies Wayne Eckerson // Data Science Principal Consultant, Eckerson Group, LLC Algorithms, techniques, working with data scientists New! HANDS-ON TRAINING LEARN HOW TO USE ALL THE LATEST ANALYTICS TOOLS AND TECHNOLOGIES PEER-TO-PEER LEARNING GAIN TIPS AND TECHNIQUES FOR HIGH-IMPACT AND HIGH-VALUE ANALYTICS is the reported investment IBM $3B is making in an Internet of Things Trending business unit Piecing together the insider threat puzzle The federal government is showing security, suitability and credential- ing counterintelligence, law enforce- mixed results on its goal of imple- ing by the end of last year was also ment, human resources departments menting policy to reduce data leaks missed. and IT access logs. and other risks posed by govern- There are bureaucratic and practi- However, designing an insider ment insiders and contractors hold- cal obstacles. To cite just one exam- threat program involves more than ing security clearances, according to ple, the process to add mental health developing rules-based monitoring the most recent updates posted on questions to the information collected and flipping a switch. And there are Performance.gov. on standard personnel security and risks to relying on automation to fer- The leaks from former National suitability forms is taking longer than ret out insider threats. Security Agency contractor Edward planned. But it’s clear that the over- “The unintended consequence that I Snowden and the Navy Yard shooting all objective of preventing leaks and often worry about as we add more and drew attention to efforts to improve sabotage is a high priority for insti- more technological measures for mon- and automate processes by which tutions that collect and guard secret itoring data and data access is that clearances are granted and how information. people will start to think it’s not their access to classified information and The Defense Department issued job anymore to stop anomalies,” said networks is monitored. a directive establishing an insider Neal Ziring, technical director at NSA’s A big piece of the effort is develop- threat program in September 2014, Information Assurance Directorate. ing systems for continuously evaluat- and DOD reports that it is on track There is also the risk of tuning ing the activities and risks posed by to have a continuous evaluation capa- threat detection to be overly sensi- the population of 5.1 million Ameri- bility extended to 225,000 personnel tive to single anomalies. cans with access to classified informa- by December. Ziring said that like any intelligence tion and working on IT strategies to As it stands, the government is work, insider threat detection requires support acquisition and development. scheduled to deploy an initial govern- a mosaic approach, where data is cor- According to the latest update on mentwide insider threat program by roborated and fused to shape a larg- Performance.gov, the Office of the the end of the year, with final operat- er picture that takes into account Director of National Intelligence ing capacity achieved by the end of employee activities on IT networks missed a December 2014 goal to roll 2016. and around classified information, out an initial continuous evaluation The ultimate goal, which is partially financial pressures or sudden unex- capability for individuals with the complete, is to have regular — ideally plained changes in income, among most sensitive clearances. A goal to electronic — access to insider threat other factors. develop an enterprise IT strategy for data from a range of sources, includ- — Adam Mazmanian FCW CALENDAR Commerce IT Innovation 5/13 Washington Technology 5/17-19 ACT-IAC’s annual presents an industry day to explore Management of Change conference fiscal 2016 priorities at the Commerce will dig into continuous delivery, Department’s key component workforce development and the NOMINATIONS NOW OPEN agencies. Tysons, Va. Internet of Things. Cambridge, Md. Nominations for the 2015 Rising Star is.gd/FCW_commerceIT is.gd/FCW_MOC2015 awards are now being accepted. Learn more at fcw.com/2015risingstars. April 30, 2015 FCW.COM 3 0430fcw_003-011.indd 3 4/8/15 2:23 PM Contents TRENDING 3 WORKFORCE Piecing together the insider threat puzzle FCW CALENDAR Where you need to be next 8 OVERSIGHT FBI wants ‘legislative fix’ on device encryption, and GAO says the Library of Congress is rudderless on IT 9 SECURITY Obama declares foreign cyberthreats a ‘national emergency.’ Plus, Editor’s Note: Good management or measurement make-work? 10 PEOPLE Commerce aims to lead feds in data, and an FCW Insider news roundup 22 11 INNOVATION What exactly does a digital service team do? BIG DATA Big data goes mainstream 16 Agencies have moved beyond the buzzword and are making DEPARTMENTS big data part of their everyday missions 12 COMMENTARY Why it’s time for a town BY SARAH LAI STIRLAND hall meeting BY TOM BAYBROOK RECORDS MANAGEMENT What’s wrong with tying feds’ pay to the economy Reeling in digital records 22 BY STEVE KELMAN The Fish and Wildlife Service’s Jason Duke transformed Sanctions are a good step a jumble of files on a variety of media into a searchable toward cyber offense database BY PETER HARRELL BY CHAD HUDNALL 28 DRILL DOWN ‘A tale of two contracting methods’ EXEC TECH BY MARK ROCKWELL Cloud brokers, the sequel 24 30 BOOKSHELF The broker definition continues to evolve as new roles When search knows emerge and cloud deployments become more complex what you need BY TROY K. SCHNEIDER BY JOHN MOORE 33 FCW INDEX 34 BACK STORY The future according to DARPA 4 April 30, 2015 FCW.COM 0430fcw_004.indd 4 4/8/15 2:35 PM Editor-in-Chief Troy K. Schneider Vice President, Art and Brand Design SALES CONTACT Executive Editor John Bicknell Scott Shultz INFORMATION Managing Editor Terri J. Huck Creative Director Jeff Langkau MEDIA CONSULTANTS Senior Staff Writer Adam Mazmanian Assistant Art Director