Risk
7/28/2011
02:58 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Navy CIO Details IT Cost Cuts

The Navy will consolidate applications and data centers, mandate enterprise licensing, improve IT governance, pursue cloud computing, and take other steps to cut IT costs 25% over five years.

14 Most Popular Government Mobile Apps
Slideshow: 14 Most Popular Government Mobile Apps
(click image for larger view and for slideshow)
In order to meet an order to cut its business IT budget by 25% over the next five years, the Navy will look to application consolidation, data center consolidation and optimization, mandated enterprise licensing, improved IT governance, and perhaps cloud computing, according to Navy CIO Terry Halvorsen.

Halvorsen had said in June that Navy IT managers would see "ruthless" internal cost cuts due to orders from the top, and Navy undersecretary Robert Work earlier this month revealed that the plan was to cut IT spending by a quarter in the coming years. Such a drastic cut, Halvorsen said, will require that the Navy do IT in a fundamentally different way than it has in the past, and to take risks where previously it may have been risk averse.

"We will not hit that target by doing the same things we do today more efficiently," Halvorsen wrote in a blog post published Wednesday. "A cut of this magnitude requires a fundamental shift in our IT business model. It will require taking risks and doing things that would have been considered too risky or too controversial in the past."

Consolidating and optimizing the Navy's data center and software strategies and improving governance, Halvorsen wrote, will reduce complexity and cut costs.

All told, the Navy is now running more than 2,000 applications on its current enterprise networks, including multiple versions of the same software. For example, the Navy has between seven records management systems alone. "We must look at these applications and question whether a unique requirement is worth the cost of multiple applications performing the same function, or whether an application is worth keeping if it's not widely used," Halvorsen wrote. A number of those apps, he added, will be eliminated.

Along with the app consolidation effort, the Navy also will mandate enterprise licensing. The Navy has set up enterprise contracts for Microsoft software, and more are on the way. "We must require purchasing via enterprise licenses with no waivers granted," he wrote. "Allowing waivers led us to where we are today with multiple versions of software." In concert with the enterprise-licensing mandate, the Navy also will look to prevent customization of software and even possibly change business processes rather than customizing software to fit pre-existing processes.

Apps aren't the only thing that will be consolidated and managed better under the Navy plan: Data center and storage consolidation and optimization will form a key part of the savings. Currently, the Navy has between 140 and 150 data centers that Halvorsen said "are not optimally located." The Navy has closed seven data centers this year, and plans by the end of 2013 to have fewer than 100 data centers, with more cuts planned after that.

Earlier this year, Halvorsen said that the first data centers likely to go would be mid-sized data centers that service only one command or function. Improvement of the Navy's data standards will be another piece of this effort.

In order to make that happen, though, the Navy will have to stop data center growth. Last week, Halvorsen placed a moratorium on the purchase of new data storage capacity with limited exceptions, building on the White House's Federal Data Center Consolidation Initiative and an earlier order from the deputy chief of naval operations for naval dominance to stop spending on new data centers and servers.

Halvorsen wrote that he'll also be placing increasing emphasis on improved and more centralized IT governance in order to "enable the department to act more like an enterprise," but he admitted that this plan might run up against some cultural resistance. "Not everyone will like the result," he wrote.

The four prongs of Halvorsen's strategy don't stand alone, and the Navy is looking for other savings opportunities as well. For example, it's considering commercially provided email, creating a public-private venture to operate Navy data centers, client virtualization, and increased use of cloud computing.

At the 2011 InformationWeek 500 Conference, C-level executives from leading global companies will gather to discuss how their organizations are turbo-charging business execution and growth--how their accelerated enterprises manage cash more effectively, invest more wisely, delight customers more consistently, manage risk more profitably. The conference will feature a range of keynote, panel, and workshop sessions. St. Regis Monarch Beach, Calif., Sept. 11-13. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Why else would HR ask me if I have a handicap?"
Current Issue
The Changing Face of Identity Management
Mobility and cloud services are altering the concept of user identity. Here are some ways to keep up.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.