Twitter Feed
The Endpoint Imperative: Global Security Compliance. Are you ready?
China has its Cybersecurity Law. Next May, the General Data Protection Regulation – or GDPR –goes into effect for the European Union. Research shows most organizations just aren’t…
The Endpoint Imperative: IT Spending: Setting Priorities in a Volatile World
Fast-evolving trends are changing the way IT thinks about security. To stay secure and productive, IT operations must excel at the fundamentals: PC refreshes for security, and optimizing end-user…
Top 1000 Tech Bloggers
The Rise “Top 1000 Tech Bloggers” leaderboard recognizes the most inspiring Tech journalists and bloggers active on social media. They use Klout scores (50%) and the blogger’s twitter conversations on…
IBM – The Power of Cloud Brokerage
Hybrid cloud adoption is now mainstream and you are making decisions every day about how to transform application and infrastructure architectures, service delivery, DevOps, production operations and governance. With Cloud…
More SMB Love Needed
In a recent post, titled “10 Surprising Facts About Cloud Computing and What It Really Is”, Zac Johnson highlighted some interesting facts about cloud computing in the SMB…
ATMs Are IT Too!
That world of homogenous IT technology managed entirely by the internal IT organization has long disappeared. Operations today require efficient and global management of technologically heterogeneous environments. The challenges and…
Digital Transformation Asset Management
Today’s businesses run in the virtual world. From virtual machines to chatbots to Bitcoin, physical has become last century’s modus operandi. Dealing with this type of change in business even…
The Game of Clouds 2017
The AWS Marketplace is growing at breakneck speed, with 40% more listings than last year! This and more insights were revealed when CloudEndure used their custom tool to quickly scan the…
Managing Your Hybrid Cloud
Photo credit: Shutterstock Runaway cloud computing cost may be causing an information technology industry crisis. Expanding requirements, extended transition schedules and misleading marketplace hype have made “Transformation” a dirty word. …
American Airlines Adopts Public Cloud Computing
Did you know that the reservations systems of the biggest carriers mostly run on a specialized IBM operating system known as Transaction Processing Facility (TPF). Designed by IBM in the…
“The government-industry collaboration demonstrated by this study serves as an important model for us all. I thank everyone involved for their individual contributions in support of the whole.”
The white paper, “Cloud Computing: Risks, Benefits and Mission Enhancement for the Intelligence Community,” was developed by Jackson and other members of INSA’s Cloud Computing Task Force: Bob Gourley, task force chairman, Crucial Point, LLC founder and chief technology officer; Maureen McGovern, KSB Solutions president; and John Totah, task force team leader and Oracle National Security Group technical director.
Based on information collected from more than 50 interviews with cloud thought leaders and policy makers in the public and private sectors, the white paper found:
- IC decision-makers are focused on the business model implications of cloud computing, which represents a new approach in the provisioning and consumption of IT.
- For the IC, the decision to move to the cloud must be focused on “mission enablement” on a case-by-case basis. Cost savings must also consider the entire IT lifecycle, not periodic budget cycles.
- Information security must be baked into the cloud computing architecture from the very beginning.
- The type of cloud model adopted by an IC agency is directly related to the sensitivity of its data.
- IC agencies looking to migrate to the cloud must also consider “impacts on organizational culture.”
- Adoption of cloud computing may improve the way IC agencies procure IT services, software and hardware.
- “Thoughtful federal input” about emerging cloud computing standards (e.g., FedRAMP) can contribute to the cloud’s security and cost efficiencies. An IC-based cloud architecture also must be able to support multiple standards.
- Sharing lessons learned from the IT industry, private sector and academia is essential to reducing cloud computing risk in the IC.
“NJVC is proud to be a member of the INSA Cloud Computing Task Force and to have contributed to the organization’s new white paper on cloud computing for the IC,” Jackson said. “This study provides important contributions to both IC mission requirements and the Director of National Intelligence’s fiscal goals.”
“The expertise of Kevin Jackson and NJVC in the IC market was hugely beneficial to the INSA white paper development team,” Gourley said. “The government-industry collaboration demonstrated by this study serves as an important model for us all. I thank everyone involved for their individual contributions in support of the whole.”
The whitepaper is available for download at https://www.slideshare.net/kvjacksn/insa-cloud-computing2012final
About NJVC®
With a focus on information technology automation, NJVC® specializes in supporting highly secure, complex IT enterprises in mission-critical environments, particularly for the intelligence and defense communities. We offer a wide breadth of IT and strategic solutions to our customers, ranging from strategic consulting to managed flexible services in five business areas: Cloud Services, Cyber Security, Data Center Services, IT Services and Print Solutions. Our global workforce includes dedicated and talented employees with 94 percent holding security clearances located at more than 170 customer sites. We partner with our customers to support their missions. To learn more, visit www.njvc.com.
About INSA
The Intelligence and National Security Alliance is the premier intelligence and national security organization that brings together the public, private and academic sectors to collaborate on the most challenging policy issues and solutions. As a non-profit, non-partisan, public-private organization, INSA’s ultimate goal is to promote and recognize the highest standards within the national security and intelligence communities. INSA has more than 160 corporate members and several hundred individual members who are leaders and senior executives throughout government, the private sector and academia. To learn more about INSA visit www.insaonline.org.
Contacts
Michelle Snyder, 703-893-7609
[email protected]
or
5StarPR
Audra Capas, 703-437-9301
[email protected]
( Thank you. If you enjoyed this article, get free updates by email or RSS – KLJ )
1 Comments
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes
Currently I work for Dell and thought your article about cloud computing is very impressing. I think Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. A simple example of cloud computing is Yahoo email or Gmail etc.