SAP/HANA Does Big Data for National Security

Cloud Acquisition Strategy, Customized to the Right Cloud Model

By G C Network | March 17, 2015

by Melvin Greer Managing Director, Greer Institute  This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing…

Women leading us to the cloud

By G C Network | March 14, 2015

By Jodi Kohut Government Cloud Computing Professional   By Jodi Kohut Government Cloud Computing Professional March is Women’s History Month. As we celebrate women and their role in our history, our…

CSCC Cloud Privacy Summit – Reston, VA March 26th

By G C Network | March 12, 2015

Please join the Cloud Standards Customer Council in Reston, Virginia on Thursday, March 26th for the Cloud Privacy Summit. This all day symposium will stimulate lively, interactive discussion and deliver…

Bangladesh: A country transforms with IT

By G C Network | March 9, 2015

Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of…

Introducing CloudTek University

By G C Network | March 5, 2015

Visit us at https://www.CloudTekU.com Cloud Computing Basics https://sqz.co/Fs34AaX Cloud Technologies https://sqz.co/s2ACt68 Cloud Security https://sqz.co/Mp7m3TE Business Innovation https://sqz.co/j4NZb37 Cloud Computing Pilots https://sqz.co/e5HFy24 Cloud Operations https://sqz.co/p5CJo24 CloudTek Overview https://sqz.co/k9S4Ewt ( This content…

The Emerging Science of Digital Forensics

By G C Network | February 24, 2015

By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains…

African-Americans and STEM careers: Getting a foot in the door

By G C Network | February 16, 2015

By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the…

U.S. Department of Defense sets its cloud security guidelines

By G C Network | February 12, 2015

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines…

Circles are good for the economy

By G C Network | February 9, 2015

Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout…

2015 National Chief Information Security Officer Survey

By G C Network | February 4, 2015

Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The…


Carmen Krueger, SAP NS2 SVP & GM

While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives responsible for the company’s work in that clandestine marketplace.

SAP National Security Services, Inc.™ (SAP NS2™) is an independent U.S. subsidiary of the company and offers a full suite of SAP enterprise applications, analytics, database, cyber security, cloud, and mobility software solutions. These offerings, however, are endowed with specialized levels of security and support needed to meet the unique mission requirements of US National Security Agencies and critical national infrastructure customers. SAP NS2 also provides secure consulting and support services from experts that hold current credentials in the national security space. Carmen Krueger, Senior Vice President & General Manager, Cloud Operations, focuses on the critical security requirements of national security clients that adopt and deploy SAP technologies.  Joining her in our discussion was Hunter Downey, NS2 Cloud Solutions Director.
Hunter Downey, NS2 Cloud Solution Director
Kevin: Carmen, Hunter, thank you both for spending the time to talk with me.  Just to set a level playing field for my readers, what is SAP?
Carmen: SAP is a global enterprise software company that offers a full suite of world-class enterprise applications, analytics, database, cyber security, cloud, and mobility software solutions. Corporately our goal is to make a material impact on making the world better.
Kevin: Why is cloud computing so important to public sector organizations?
Carmen: Cloud computing is critical because it combines convenience with speed and delivers the innovation needed for addressing the public sector’s current inability to leverage leading edge technologies. It enables resource pooling that drives efficiencies, cost savings and improved resource allocations. The various cloud computing service and deployment models also provide flexibility to organizations while allowing them to remain within their specific mission limits and requirements.
Hunter: With cloud computing organizations are able to extract physical resources and give them to agencies as needed.  These resources can grow and contract over time, adapting to the users. IT infrastructure is now morphing into a platform that give agencies an ability to focus dollars towards more strategic needs.
Kevin: How are public sector policies when it comes to cloud computing?
Carmen: The cloud computing adoption process has matured significantly. DoD’s new policy has set in motion a re-interpretation of current policies that actually favor cloud. There are, however, still some open questions on the policy, change management and organizational risk management processes. The new policy has put a “set of guardrails” around the cloud computing decision making process. Although procedural backlogs remain, things are moving forward and enablers are now in place.
Kevin: How should agencies approach the adoption of cloud computing?
Carmen: In adopting cloud, decision makers must clearly understand the goals of the organization and see cloud computing as an enabler and strategic underpinning of specific business outcomes. Cloud computing enables collaboration between functional owners, information technology leads and the information assurance organization. All too often functional owners run ahead of other organizational stakeholders.  This leads to organizational misalignment and adoption missteps. It is also vitally important to get the organizations “cloud jargon” in line. The mixing of marketing terms and technical descriptions often leads to serious misunderstandings during the cloud computing adoption process.
Kevin: SAP provides ERP software which is typically considered a difficult application to move to the cloud. Why is this? Has this changed?
Carmen: ERP applications are not more or less difficult to move to the cloud than other applications. ERP is, however, mission critical so organizations normally assign higher levels of risk to such a transition. These risks are not typically associated with technical barriers but are mostly organizational change management issues.
Hunter: The value in transitioning ERP to the cloud is often much more substantial because it gives the organization news ways of accessing and using information. It is also often easier to try out new capabilities.
Kevin: SAP’s cloud portfolio has really expanded over the past couple of years. Are you leading your customers to the cloud or following them there?
Hunter: We are side-by-side with our customers as they move to the cloud. We are not being presumptive in any way but work closely with hem in defining technical requirements and strategies.
Kevin: What are the nuances in the selection of an appropriate cloud deployment model?
Carmen: A community cloud, like IC ITE (Intelligence Community Information Technology Environment) is always a viable option for national security organizations. Private cloud environment are also a popular choice. Over the next two years SAP’s ability to offer NIST, FedRAMP and Trusted Internet Connection (TIC) compliant environments will expand. Today we currently have a secure HANA cloud offering in place as a PaaS (Platform-as-a-Service). It complies with all export and FedRAMP requirements. A Human Resource Management (HRM) SaaS (Software-as-a-Service) offering that meets all DoD requirements is also being built.
https://hana.sap.com/abouthana/what-is-hana.html
 
Kevin: What is HANA and how does it relate to cloud computing?
Hunter: HANA is an in-memory, column-oriented, relational database management system. Its architecture is designed to handle both high transaction rates and complex query processing on the same platform. This approach has completely transformed the database industry by combining database, data processing, and application platform capabilities in a single in-memory platform. The platform also provides libraries for predictive, planning, text processing, spatial, and business analytics.
HANA has been adopted to support many national security use cases. It is being used as a platform for data analytics, situational awareness, digital documents and geospatial analysis. Since the database is stored in RAM (Random Access Memory) it provides the easiest known method for accessing and using information. When you combine HANA and the cloud in a national security focused PaaS, there is no need for agencies to procure and incorporate any new hardware.
Kevin: What’s next for agencies after they’ve adopted a cloud infrastructure?
Carmen: Decision makers should make the adoption of cloud computing risk free. They should also look across all their different programs in order to identify where cloud can deliver strategic value to the enterprise. Also highlight your successes in cloud. Cloud computing shortens the timeline between understanding an information gap and addressing these gaps. It does this by eliminating programmatic silos that prevent the free flow of information. Embrace this new approach and don’t be so prescriptive when addressing information shortfalls. Learn how to listen to the data and how to learn from it.

( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network