240 likes | 309 Views
Streamlined Application Management The Intersection of Cloud and Mobility. Anil Karmel Deputy Chief Technology Officer National Nuclear Security Administration. There is a perfect storm of disruptive technology on the horizon that will enable a leaner, smarter government. . .
E N D
Streamlined Application ManagementThe Intersection of Cloud and Mobility Anil Karmel Deputy Chief Technology Officer National Nuclear Security Administration
There is a perfect storm of disruptive technology on the horizon that will enable a leaner, smarter government . leaner, smarter government
People Technology Processes Architecture Cybersecurity Operations Policy
A Cloud of Clouds approach brokering any organization, through any device, to any service respectful of site autonomy; powered by the innovation of the National Labs Other Gov’t Agency Cloud • INSIGHT • Green & Business IT Smart Meters • PortfolioStat • Enterprise Architecture • Data Center Consolidation • FEATURES • Virtual Desktops & Servers • Enterprise Application Store • Enterprise Certification & Accreditation Services Broker * Powered by developed by LANL On-Premise Cloud NNSA Cloud DOE Cloud Public Cloud DOE Federal Users General Public Users Other Gov’t Agecy Users Support Contractors Laboratory & Plant Users
Services Broker Enclaves Organization: DOE Customer SITES Public Websites CFO Hypervisor Shared Services Open Science On Premise Cloud Public Cloud DOE Cloud Network VDI Compute Remediation Storage
Delivering a comprehensive platform for on-the-go worker capabilities Mobility
Challenge • Deploying modern wireless technology is incredibly difficult within government • Multiple federal approvals are required that slow speed to impact or block progress all together • Customers demand devices they are most familiar with yet show little interest in devices we are comfortable with securing • True wireless automation and a connected government are years, if not decades away
Data must be available everywhere To make mobilityreal… while limiting where it goes
Rethink Mobility • There are two main strategies for data security: Virtualization and Containerization. Secure the data not the device. • Employees must be able to work how they want, where they want, on the device of their choosing. • You don’t truly understand your risk until you understand your transport.
National Lab Case Study • Why Enterprise Mobility? • Problems we need to solve • RIM Blackberry • Security Posture • Accomplishments and Statistics • Apple iPad and Google Android • Good Mobile • Other Use Cases • Key Takeaways & Considerations
Why Enterprise Mobility?Where’s the right balance? • Key Issues • Malware • Application Architecture • Mobile Content Delivery • Key Considerations • Corporate vs. Personally owned devices • Help Desk Support
National Lab Case Study: BlackberryCurrent Environment • Security • Secured with DISA/DoD Secure Technical Implementation Guide • Transmissions & Data fully encrypted (FIPS 140-2 compliant) • Devices • Blackberry with no camera or WiFi • Ability to remotely wipe a Blackberry if it is lost or stolen
National Lab Case Study: Blackberry Deployment Security Posture • Blackberry can’t connect to a foreign wireless network (no WiFi) • Only a Lab-supplied SIM can be used on the device • No third party applications allowed • USB port and microSD card slot disabled • Blackberry “Home” Screen locked on all smartphones • Web Traffic routed through Lab infrastructure • 24/7 phone number to call if Blackberry is lost or stolen
Apple iPad and Google AndroidConsumer-Oriented devices in the Enterprise End users demand functionality – IT requires security How does IT deliver solutions and yet secure consumer-oriented devices?
National Lab Case Study: Good MobileApple iPad and Google Android • Enterprise-class Email, Calendar & Contacts • Consistent feature set across all platforms • Message indicators for reply/forward, high importance, meeting invites, etc. • Accept/Decline meeting requests from Inbox and view conflicts • Access to Global Address List (GAL) • Launcher Bar • Provides quick access to apps
National Lab Case Study: Good MobileSecurity Posture • Security • Secured with DISA/DoD Secure Technical Implementation Guide • Transmission & data fully encrypted (FIPS 140-2 compliant) • Devices • Android and Apple iOS Devices • Secure Enterprise Container • IT keeps corporate data secure • End users get to keep their personal apps • Ability to remotely wipe the application / data if it is lost or stolen
Apple iPadAdditional Use Case Remote access to your Desktop Virtual Desktop Interface availability Remote Desktop Client for iPad (Physical Desktops)
People Processes Technology • Bring Your Own Device • Mobile/Virtual Worker • Collaboration • Mobile Applications • Change How People Behave • Enterprise Mobility Policy • Risk Management Framework • Enterprise C&A and Procurements • Change How We Do Things • 802.11 everywhere • VDI and Containerization • App Store • Mobile App Management • Evolve our Capabilities
Key Takeaways & Considerations • What’s Your Security Posture? • Create Cross-FunctionalTeams • Technical • Customer • Manage User Expectations • Give users new features rather than take them away • Start small, scale quickly
Deputy Chief Technology Officer NNSA Anil.Karmel@nnsa.doe.gov Anil Karmel