Partnerships for Public Sector Solutions

Systems integrators have evolved to simplify and streamline the process of deploying complex solutions to complex agency challenges. SIs have years of experience working with agencies on the kinds of systems that have many moving parts. Therefore, they have a clear understanding of agency missions and know how to navigate the government’s procurement process. However, SIs don’t work alone. They thrive by partnering with companies that have transformative new approaches for addressing the government’s needs, such as providing innovative digital services, supporting a hybrid workforce and protecting government networks from cyberthreats. In a recent report, research firm Quadintel states that the global systems integration market was valued at $327 billion in 2021 “and is anticipated to grow with a healthy growth rate of more than 13% over the forecast period 2022-2028.” SIs are well-suited to helping agencies make that shift in thinking. Learn how Sis can help your agency thrive by partnering with innovative companies in Carahsoft’s Innovation in Government® report.

 

The Power of Embracing a Partner Mindset 

FCW March FSIs Blog Embedded Image 2023“Success for integrators and their partners is delivering secure solutions that provide meaningful and impactful mission outcomes. Leidos invests heavily in testing and building relevant solutions for public-sector customers to ensure that innovative technologies are cost-effective, resilient, compliant with government requirements and best positioned to solve mission problems. Investing in a continuous innovation cycle is critical. Leidos and Red Hat recognize that we are in the business of continuous modernization. When Red Hat and other key partners offer innovative new solutions, our partnerships enable us to move fast in testing and proving that the technology works and can scale to meet the government’s needs. Leidos leverages innovative technology to drive great mission outcomes in our Aviation Security Product business unit (Security Enterprise Solutions). By using cloud-native AI/ML modeling solutions, Leidos had been able to achieve significant performance gains in our process for developing algorithms for security detection products, ultimately improving travelers’ experiences at airports.”

Read more insights from Peter O’Donoghue, CTO of the Civil Group at Leidos, and Adam Clater, chief architect of the North America Public Sector at Red Hat.

 

A Collaboration That Far Exceeds the Sum of its Parts

“In 2020 KMPG and ServiceNow recognized that a large and newly formed Defense Department agency was facing a number of challenges in its efforts to transform its business, consolidate systems and processes, and modernize its technology. We began having conversations with the executive leadership and department heads across different lines of business to gain a clear understanding of their mission, current challenges and desired outcomes. As the ServiceNow program was being established at the agency, the customer required a robust governance and platform team to ensure utilization of development best practices and policy generation, platform management activities (e.g., upgrades) and a secure, scalable, federated development model. This technical rigor and governance structure supported the creation of a stable environment in which application development teams could configure and deploy new, unique applications rapidly.”

Read more insights from Kyle McKendrick, senior enterprise account executive at ServiceNow, and Daniel Gruber specialist managing director at KPMG.

 

Driving Modernization with Deep Strategic Partnerships

“In response to the challenges agencies face, Leidos has been focused on building deep strategic partnerships that help us create at-scale solutions for our government customers. These partnerships are characterized by a commitment to open lines of communication and transparency in terms of strategy and investments. We also operate in what we describe as a badgeless environment in which experts from different companies work side-by-side to engineer new capabilities and solutions.”

Read more insights from Derrick Pledger, senior vice president and CIO at Leidos.

 

Why Success in Zero Trust Requires a Team Effort  

“Zero trust focuses on the connection between users and the data, applications, networks and systems they want to access. In zero trust architectures, new administrative tools continually evaluate whether allowing an individual user to have a certain level of access privileges is the right thing to do. The approach gives agencies much more flexibility as they modernize because they can make decisions at a granular level that enable them to secure data and entire IT ecosystems.”

Read more insights from Meghan Good, vice president and director of the Cyber Accelerator at Leidos.

 

How Multi-Domain Operations Accelerate Modernization

“By design, multi-domain operations must involve a broad range of partners to achieve the desired mission outcomes, particularly as threats continue to rapidly evolve. Making such a shift allows military and civilian agencies to far more rapidly add new capabilities to individual systems. The approach also enhances agencies’ ability to partner with industry to harness the power of cross-domain, cross-agency and even cross-company digital synergies.”

Read more insights from Chad Haferbier, vice president of multi-domain operations solutions at Leidos.

 

Balancing Speed and Security with SecDevOps

“As one of the largest systems integrators, Leidos understands the government’s mission domain and individual agencies’ unique challenges. We also know where they are in their evolution. Some are still easing toward agile and SecDevOps, whereas others have fully embraced those approaches. Our partners in the commercial world are some of the fastest, most forward-leaning technologists.”

Read more insights from Paul Burnette, vice president and director of the Software Accelerator at Leidos.

 

Download the full Innovation in Government® report for more insights from SI cloud thought leaders and additional industry research from FCW.

States Can Build Economic Efficiencies Into Complex, Sophisticated IT Environments

Modernizing IT is a priority for all levels of government. Despite its importance, a recent National Association of State Technology Directors study found only 50% of the 38 states surveyed have “budget mechanisms for specifically addressing IT modernization.” At the same time, 84% reported they had increased cloud services—and 76% increased their network infrastructure and bandwidth—because of the pandemic. To put it mildly, growing and scaling services without a budget isn’t ideal. However, building economic efficiencies into an increasingly complex, sophisticated IT environment is possible.

One way to approach cost containment is to build it into the approach taken when developing cloud-native applications and instilling the management of these applications with this mindset. This will likely pose challenges—developers are rarely responsible for the decisions about how their apps are implemented, used, or scaled. Likewise, those responsible for making decisions about infrastructure resources, maintenance, and operations may not understand or account for how much it costs to keep these cloud-native apps going. Here’s a look at how developers and operations management teams can better understand and manage the cost of application modernization programs:

SolarWinds Economic Efficiency Blog Embedded Image 2023The Relationship Between Cost Containment and the Modern Developer

The application development phase offers an opportunity to lay the foundation for cost containment and is a vital part of developer maturity.

An easy way to move toward cost-effective, sustainable applications is to adopt the underpinning of reliable operations—monitoring and observability. When developers ensure new and modernized applications include monitoring from the outset, DevOps and site reliability engineering (SRE) teams can better understand the state of their systems and proactively debug systems in production. This benefits the organizations who own these applications in the long run.

Here’s an example: suppose an application relies on platform-managed serverless or orchestrated containerization. There’s no shortage of opportunities to provide rich performance data for both developers and operations using commercial cloud-native or open-source monitoring options.

Through monitoring, developers can quickly get a sense of application durability and develop more sustainable applications to support cost containment. Considering sustainable cost containment during the dev phase isn’t best left to IT leaders; agency leaders will greatly appreciate the developer who builds the foundation into their apps.

Keys to Containing Cost

It’s also crucial to address agency leaders’ responsibility for ensuring the high performance of cloud-native applications once deployed. As much as we’d like them to, cloud-enabled technologies don’t maintain a minimum latency or uptime on their own. IT and network operations teams continuously monitor the health of cloud applications, infrastructure, and the networks they rely on to ensure a quality user experience and an uninterrupted mission.

They need full-stack observability without added costs for procuring and managing multiple monitoring tools and accommodating new reporting, alerting, and automation needs as time progresses. IT leaders can control costs in a cloud-native future by ensuring their developers and IT operations teams utilize the same centralized and automated monitoring tools—from launch to sunset.

By consolidating tools and achieving observability across services and agencies from a single integrated pane of glass, these teams can occupy the same monitoring domain and ensure peak performance of the entire application, infrastructure, and network environment while saving time and containing costs.

The cost-containment advantages of automation also can’t be overstated. Instead of IT pros spending hours trying to identify, diagnose, and fix hard-to-find performance issues, modern monitoring tools run in the background, automatically identifying performance issues and recommending optimization fixes.

As new systems and cloud-native applications come online, these systems allow agencies to quickly and easily scale their monitoring capabilities without additional expense, no matter how complex their cloud, multicloud, or hybrid environment becomes.

The results? A pathway for states without the budget for cloud and IT modernization to create economic efficiencies.

To learn more about SolarWinds’ observability platform, click here.

Best Practices for Implementing DevSecOps

It’s not surprising that the development, security and operations approach to building software is the darling of IT teams across the government. It’s essential given the current mandate that agencies move toward zero trust environments. Having secure software is fundamental, and DevSecOps helps agencies get there and deliver user-tailored applications faster. Less clear is the best path for implementing DevSecOps. That’s in part because the missions and goals of agencies vary. No matter where your agency is on adopting DevSecOps, it’s critical to realize that — like most things IT — moving to a methodology for software that integrates development, security and operations is not just a matter of making the right technology choices. There’s a major people and workflow component that requires people teaming up and collaborating in new ways. Download the guide to learn how the lessons learned by federal agency and industry experts will help you as your agency embraces DevSecOps.

 

5 Essential Ingredients to Make DevSecOps the Heart of Your Agency’s Digital Transformation

“There’s no denying the value of a development, security, operations approach to creating software and applications. Here’s why: ‘The government is building better quality software. They are getting it deployed faster. Security teams are involved in the beginning, middle and end — every step along the way,’ said Adam Clater. But beyond the blending of an agency’s development, security and operations teams, what are those must-haves to make DevSecOps succeed and drive digital transformation? Clater identified five critical elements necessary to DevSecOps and establishing a continuous integration and continuous deployment pipeline. That CI/CD pipeline serves as the agile workflow conduit for DevSecOps, he said.”

Read more insights from Adam Clater, Chief Architect for North America Public Sector at Red Hat.

 

FFN Expert Edition November DevSecOps Blog Embedded Image 2022 How Effective DevSecOps Enables More Secure Software Development

“The legacy model of software development is one of the biggest roadblocks to delivering secure applications at the speed that modern consumers and citizens expect. Taking a manual approach to security after the initial development build can leave teams with a remediation timeline measure in weeks, if not months. That’s why it’s important for federal agencies to adopt a development, security and operations (DevSecOps) approach, which weaves security into every step of software development from design to build and beyond. Unifying development and security processes while also automating scanning throughout the application lifecycle — not just during development — can help agencies deliver more secure software faster and at a lower cost, better positioning themselves to adopt a zero trust architecture.”

Read more insights from Ted Rutsch, Federal Sales Manager at Invicti Security.

 

Embracing DevSecOps Requires a Mindset Shift and Simple (Not Simplistic) Tools

“DevSecOps — development, security and operations — is the new standard for delivering secure software at the pace that customers and citizens expect from their government today. This is accomplished by integrating security with development and operations teams at the start of the process. But despite its focus on delivering technology-enabled solutions that ensure security is considered from the very beginning rather than an afterthought, what often gets lost in the shuffle is that technology is only one component. DevSecOps requires a mindset shift that revolves around people and processes just as much as technology.”

Read more insights from Joe Bleich, Director of Sales at Datadog.

 

Lesson Plan for Accelerating Adoption of DevSecOps in Your Agency

“DevSecOps teams have a reputation for being able to ship secure software quickly, and that has a lot to do with software being assembled from open source libraries and not built from scratch. A recent Gartner report shows 70% of software is built using open source packages, and an average of 75% of these packages have vulnerabilities at any point in time. Teams that don’t prioritize continuous visibility on their security posture are at risk. And they could be building on top of vulnerable systems with unresolved day zero vulnerabilities. But it’s possible to mitigate the risk by leaning into continuous transparency throughout the development stack.”

Read more insights from Atlassian’s Senior Designer, Nupur Aggarwal, and Senior Product Manager, Andrew Pankevicius.

 

How to Structure a Successful Software Factory

“One of the best ways government can begin to facilitate this mindset shift is to cultivate the right leadership. Oti said the first step is to hire leadership based off capabilities rather than career field. It doesn’t matter if a software development team is led by an engineer, data scientist or program manager. What matters is that person has the vision and skill sets to lead a cross-functional team. If delivering high-quality software is the highest priority for a development team, then a proven ability to deliver needs to be the highest priority in choosing its leadership. And because DevSecOps requires the integration of multiple (traditionally stove-piped) job functions, cross-disciplinary empathy and understanding is also an important metric in gauging potential leadership for a development team. Degrees and seniority are irrelevant, Oti said. In the Air Force, successful software development teams are led by officers, enlisted Airmen, civilians and even contractors.”

Read more insights from Enrique Oti, Chief Technology Officer at Second Front Systems.

Download the full Expert Edition for more insights from these DevSecOps thought leaders and additional government interviews, historical perspectives and industry research.

3 Ways Federal Agencies Can Make the Most of Microservices

To keep up with the current state of IT modernization, more and more federal agencies are turning to microservices to help them innovate faster and create a better end-user experience. Microservices are a development architecture that breaks down applications into their core functions, or services, allowing each to be deployed independently. The utilization of microservices has traditionally been applied alongside DevOps to allow for more simultaneous development and faster, more efficient deployment of upgrades and new features.

By utilizing microservices, agencies can update code more easily without impacting other applications. And while many agencies continue to turn to microservices because of their efficiencies, perhaps the most significant shift in the development process is a cultural one. After all, this is where DevOps comes into play, which embodies a culture of openness and collaboration. To reap the full benefits of microservices, we have put together some best practices for federal IT pros to follow. Here they are:

  • Shift from a traditional monitoring mindset to one of observability. The high number of moving pieces and additional services created by microservices can add significant complexity to an agency’s IT environment and among teams. While continuous monitoring throughout the application development process is still essential, agencies cannot gain precise insights into their infrastructure without an observability solution. Observability solutions combine network, cloud, system, application, services, and database metrics into a single source of truth, so users can investigate performance analytics at a deeper level and uncover where issues may be occurring.
  • Consider a mesh architecture, and ensure it aligns with your container infrastructure. Once you start running more than ten microservices at a time, a service mesh architecture is recommended, as it provides policy-based networking and describes the behavior of the network in the face of constantly changing conditions. Service mesh architecture uses sidecar proxies to help IT security and observability efforts keep up with the complex connections between distributed apps. With a mesh architecture, DevOps teams can get quick metrics, logs, and tracing without making application code changes.
    • When deciding which service mesh to leverage, look to your agency’s infrastructure and deployment use cases to help inform your choice. For example, some infrastructures work well with Kubernetes® or Docker, but specific use cases may require a highly-capable service mesh like Istio or more straightforward tooling like Linkerd 2.0.

SolarWinds Federal Microservices Blog Embedded Image 2022

  • Build an understanding of the network’s criticality. Understanding the criticality of each workload in your agency’s IT portfolio is the first step toward establishing mutual commitments to cloud management. Some applications are mission-critical and must not fail. Others may go months without being used. While poor performance or outages for those lesser-used workloads is not desirable, the impact is isolated and limited with microservices. Federal IT pros should create scales for each application to determine the effort required to meet certain levels of criticality. Starting development with the proper observability framework and using a cloud-native approach to design scalable, independently delivered microservices can be hugely beneficial, especially when considering mission-critical activities.

Microservices can provide many benefits to agencies, particularly when applied alongside DevOps. But to reap the benefits, agencies need to take an intelligent approach to implementation and ensure they have taken steps to incorporate observability to monitor and secure their IT environments effectively.

 

For a deeper dive on SolarWinds® Hybrid Cloud Observability offering and how it can help agencies gain end-to-end IT operations visibility, click here.

Next-Generation DevSecOps for the Public Sector

The cyberthreat landscape is constantly shifting at a time when government agencies face a growing demand for digital services. Agencies can balance those competing priorities by embracing a methodology that speeds and strengthens every aspect of software development, including security. Known as DevSecOps, the methodology allows agencies to create, deploy and maintain apps that are targeted to users’ needs, easily updated and continuously monitored for security purposes. In a recent survey of FCW readers, 68% of respondents said the changing cybersecurity landscape is driving the adoption or evolution of DevSecOps at their agencies. With security concerns expanding at all levels of government, DevSecOps is a prerequisite for achieving digital transformation. Learn how your agency or municipality can adopt DevSecOps to balance to manage all aspects of developing and deploying secure, modern apps, they will build trust between the government and the people it serves, while also boosting employee engagement and productivity in Carahsoft’s Innovation in Government® report.

 

Accelerating Secure App Development for Low-Code SaaS Platforms

“Unlike traditional DevSecOps, a low-code DevSecOps platform offers a user-friendly experience through built-in security and governance controls that make it easy for nontechnical administrators to handle automated testing. Agencies can respond faster, achieve higher levels of software quality, deliver more digital services and scale to meet unprecedented demands — all while reducing the need for coding experience. Such platforms maximize the value of low-code/no-code software as a service and let agencies focus on and accelerate building experiences that drive citizen trust and engagement.”

Read more insights from Copado’s Senior Director of Product Line Management, Andrew Storms, and Radiant Infotech’s Director of the Salesforce Practice, Sarvinder Sandhu.

 

Automation: The Key to Secure App Development

IIG FCW DevSecOps July Blog Embedded Image 2022“Application software is front and center in the drive to provide high-quality services to citizens and organizational customers. That, in turn, is fueling the need for a different culture, method and tooling capability within agencies. Those realities are accelerating the adoption of DevOps, which helps organizations be agile in determining what to deliver, how to deliver it and then delivering it. The primary strategic benefit is a significant increase in change/transformation velocity. However, that velocity amplifies the opportunity for human errors that result in security vulnerabilities.”

Read more insights from CloudBees’ CISO, Prakash Sethuraman.

 

 Building Better Data Pipelines for DevSecOps

“Building data pipelines from scratch and managing all the integrations can take a significant amount of effort and time, perhaps as long as a year. By contrast, agencies can buy a product from a trusted partner and be up and running in days or weeks, with the added benefits of built-in observability tools and ongoing expert support. In digital transformation, there are no prizes for second place. All government agencies should have the ability to move forward quickly and securely to provide the apps and digital services their users need.”

Read more insights from Cribl’s Senior Director of Market Strategy, Nick Heudecker.

 

Achieving a More Secure Software Supply Chain

“There is a lack of transparency in how much open-source software is being used throughout the federal government. A disconnect between developers and security teams makes it difficult to rectify this. But in today’s world, understanding what’s in the supply chain is critical to national security. All government and contractor software developers need to think critically and not only ask themselves “does the code have vulnerabilities?” but “could it have vulnerabilities?” and “how do we know either way?” Developers can’t answer those questions if they don’t know what code they’re using, which is why software bills of materials are critical to managing any software supply chain. An SBOM is a comprehensive list of a given product’s software components, open-source licenses and dependencies. It offers valuable insight into the software supply chain and potential risks.”

Read more insights from Sonatype’s Vice President of Product Innovation, Stephen Magill.

 

 The Benefits of Automated, Risk-Based Testing

“Agencies must be able to quickly identify vulnerabilities and mitigate any risks in their applications. Adding static application security testing (SAST) and dynamic application security testing (DAST) to software development workflows can help. SAST, also called white box testing, involves scanning an application for security vulnerabilities before the code is compiled. Those vulnerabilities include SQL injection, cryptographic failures, security misconfigurations and others in the Open Web Application Security Project’s list of the top 10 security risks. DAST, also known as black box testing, is used to identify certain vulnerabilities while an application is running in a production environment.”

Read more insights from Tricentis’ Vice President of Public Sector, John Phillips.

 

Incorporating Security into Mobile Apps

“As a first step, agencies should require a software bill of materials (SBOM) for the mobile applications they build and the applications employees use on agency-issued mobile devices. Furthermore, a dynamic SBOM can show the geolocations of API and network connections, which can help agencies know when an application connects or shares data with foreign countries. Agencies should also embrace modern software development practices and incorporate continuous security testing into their mobile DevSecOps environments to identify issues and fix them in the fastest way possible. This complex process boils down to a few key strategies.”

Read more insights from NowSecure’s Vice President of Public Sector, Jeff Miller.

 

Download the full Innovation in Government® report for more insights from DevSecOps thought leaders and additional industry research from FCW.

Using Modern, Agile Dashboards to Power Today’s Government Programs

Nearly every federal agency is currently tackling a major IT modernization project. The need for functional, transparent, and user-friendly project management systems has never been higher. But tracking, managing, and overseeing these projects can be difficult for the agencies involved. Projects like the Federal IT Dashboard that the General Services Administration (GSA) successfully relaunched in March 2022 is an example of how a unified, user-friendly, and cost-effective dashboard can give agencies the tools they need to manage an expanding portfolio of projects. This ambitious project, taken after the previous dashboard had aged and become too costly to maintain, is a big step forward for the agency.

The GSA wanted to create a one-stop, accessible version of the resource, which gave agencies the insight they needed to understand and better manage their IT portfolios and investments. Their investment in a contemporary, easy-to-use dashboard is a testament to the role that a powerful, modern dashboard system plays in government program management. A well-built dashboard delivers an overview of the agency or program’s state of affairs, giving agencies the visibility they need to make informed decisions.

Atlassian Dashboards Management Blog Embedded Image 2022The Value of a Single View Across Complex Programs

One of the biggest advantages a dashboard can bring to an agency is the ability to zoom in and out of complex, multi-faceted programs and projects. This interactivity lets agencies gain insight into their project and program structures at multiple levels.

Dashboards also help with project tracking, transparency, and accountability across internal and external stakeholders. The dashboard becomes an interactive map, allowing users to dive into the details at each level of the projects they contain, giving leaders the big-picture view they need to see the impacts of a multi-faceted project.

Custom dashboards are built for an agency with a specific use in mind. While these solutions offer incredible levels of customization, they can often be costly to develop and maintain. Fortunately, there are other options that are easy to use, quick to implement, and more cost-effective than their custom counterparts. Powerful enterprise dashboard platforms are one such option. They deliver a secure, easy-to-use, simple-to-understand viewpoint that can scale from the 10,000-foot view across the program portfolio to individual tasks in a single project.

The ideal platform can bi-directionally integrate with one or more instances of the agency’s favorite project management tool to deliver an aggregated, strategic, enterprise view of everything happening across those projects and programs. It’s also important to have native integration on top of a preferred project management platform. This can bring visibility to the work being done across multiple projects and programs and delivers insights that a standalone project management tool couldn’t, such as tracking overall operational performance and measuring risk.

Working with modern commercial software can help agencies of all sizes use informative, easy-to-use dashboards, helping teams connect strategies with their technical execution at a glance. As a strategic portfolio management tool, powerful dashboard platforms that integrate with a world-class project management tool let agencies see the bigger picture without having to invest in costly tools that are built from scratch and outdated as soon as they are deployed.

Here at Atlassian, we’re celebrating the modern, agile approach to project dashboards, and we encourage agencies to consider adopting similar solutions in the spirit of financial and developmental efficiency. Our mission is to help unleash the potential of every team. We believe effective dashboards can be a key component in bringing agency teams together to help them achieve their missions. 

Download our whitepaper “Jira Align: Key Steps Toward an Adaptive, Efficient, and Effective Government” to learn how Atlassian is helping agencies meet their mission requirements!

Five Benefits Federal Agencies Gain From Observability

More than ever before, federal agencies are responsible for managing increasingly complex, diverse, and distributed IT infrastructures. While traditional monitoring methods allow for insights into specific network activities, IT teams still face challenges viewing all the interdependencies between the various network, cloud, and IT functions. The overload of alerts and disjointed analytics from disparate tools make it challenging to provide the actionable insights necessary to identify and resolve mission-critical activities rapidly. Multiple tools can become cost-prohibitive to maintain and scale, creating operational risks. So, what’s the solution to all of this?

SolarWinds Benefits of Observability Blog Embedded Image 2022More agencies are implementing observability solutions, taking traditional monitoring an important step further. By using data and insights from monitoring, observability provides a holistic understanding of your infrastructure, including health and performance. With layers of data and immediately-synthesized analysis, IT pros can spot inconsistencies before they become issues. These functions give IT teams single-pane-of-glass visibility with actionable intelligence to expedite problem resolution and enable proactive management. Of course, it provides much more, and below are the top five benefits federal agencies can gain from observability.

Holistically observe end-to-end service health, security quality, and availability. Observability gives agencies deep visibility into their IT infrastructure and services so they can focus on critical issues without a flood of telemetry data to sift through. It allows agencies to make better decisions and do more, creating efficiencies and freeing time to focus on mission-critical activities.

Predict and prevent user experience degradation and service outages. Observability provides unified on-premises, hybrid, and multi-cloud visibility, giving agencies the insights needed to reduce outages, improve recovery time, and ensure service levels are where they should be across complex and distributed infrastructures. IT teams can quickly pinpoint component changes degrading service performance and more accurately predict and plan resource capacity to prevent issues and unplanned downtime.

Identify and resolve anomalies, issues, and incidents. Observability provides actionable intelligence about complex environments by visualizing data in an easy-to-understand format. With observability, agencies can identify and diagnose compliance issues and potential security threats, streamline data sets through aggregation, and bring cross-team collaboration to a single source of truth (SSOT).

Reduce compliance, threat, and data breach risks. Observability offers a comprehensive and cost-effective solution to consolidate toolsets, break down information silos, and reduce remediation time across multi-cloud, on-premises, and hybrid environments.

Offer deep service-level actionable insight to determine which components can best scale performance and capacity. Observability helps federal IT pros understand interdependencies in network infrastructure and apps with full-stack data correlation. It also allows agencies oversight into on-premises and cloud costs in one solution to help simplify cloud migration efforts. Finally, network bandwidth analysis and performance monitoring give insights into where there may be opportunities to scale performance and capacity.

 

In short, observability solutions can help fortify the mission-critical services relied on by federal agencies. For more information on how observability can help your agency achieve optimum IT service performance, compliance, and resilience, visit https://www.solarwinds.com/solutions/hybrid-cloud-observability.

Why Artificial Intelligence Is Key to a High-Performing, Data-Centric Joint All-Domain Command and Control (JADC2) Strategy

Few entities collect as much data as the Department of Defense (DoD). From the Air Force to the Navy, each branch of the military draws on sensor and other intelligence data to gain actionable information in near real time.

Yet even as these branches collaborate strategically and tactically in training and theater, a lack of system and data interoperability limits intelligence-sharing efforts such as those led by the Joint All-Domain Command and Control (JADC2) program.

JADC2 is the DoD’s concept to connect sensors from all the military services—Air Force, Army, Marine Corps, Navy, and Space Force—into a single network based on a zero-trust architecture, machine learning (ML), and artificial intelligence (AI). Envisioned as a single cloud-like environment for the Joint Forces to share intelligence, surveillance, and reconnaissance data for faster decision-making, the effort has been anything but smooth sailing.

Speaking in late 2021, Army Col. Corey L. Brumsey, a member of the JADC2 cross-functional team, cited interoperability—or a lack thereof—as the biggest challenge to the team.

Solarwinds AI JADC2 Blog Embedded Image 2022It’s not surprising. Given the stove-piped and complex nature of DoD systems, getting systems to work together to facilitate data transmission quickly and seamlessly is no small feat. To tackle the challenge, the team is launching a new effort—dubbed the “Interoperability 2.0 Challenge”—that may also incorporate the Five Eyes allies, namely the U.K., Canada, Australia, and New Zealand.

But even as these partners find ways to fix JADC2’s system interoperability issues and larger allied coordination efforts, challenges remain. For warfighters to detect potential threats and improve decision-making, the Joint Forces staff’s cross-functional team must also ensure rapid data processing and analysis and high-performance connectivity across JADC2.

AI and ML technologies will power this effort in two critical ways:

  1. Cutting Through the Noise With AI and ML

The JADC2 strategy is designed to create a combined command and control system for all DoD (and potentially Five Eyes) data sources. But with more devices connected to the system, the amount of data requiring processing and analysis is unfathomable. Indeed, cutting through the noise to understand and clarify critical threats in cross-domain warfare—in the shortest possible time frame—is beyond the scope of any group of humans. Hence the JACD2 push to adopt AI-powered systems.

Though some analysts raise questions about whether it’s appropriate to reduce the amount of human involvement in military-related decisions, others see AI as “absolutely essential” to JADC2. For example, Brig. John Olson of the Space Force told a panel at the 2021 American Institute of Aeronautics and Astronautics ASCEND space conference for JADC2 to work, AI and ML are enablers that “…make us able to react, and respond, and…make sense of the information, then act upon it.” While others comment AI and ML software is a must “to help prune the data” for users.

Though humans will still have the final say, AI and ML can automate and normalize multi-domain data from disparate sources and branches of the DoD, stitch those data points together, and ask complex questions of the data—all in near real time. JADC2 also intends to use AI and ML to identify targets and recommend the optimal weapon (both traditional and cyber) to engage the target.

With these insights, analysts and operators gain a more complete and near real-time common operating picture. At the same time, commanders get the actionable intelligence they need for more informed decision-making (both tactical and strategic) about simultaneous and sequential operations across all domains.

  1. AIOps—Ensuring Observability of Data in Transit

Data is mission-critical, and JADC2 can’t lose access to it. But as information moves across a single discrete system combining domain networks, the cloud, and legacy systems—each architected through a different lens—network and application performance issues are inevitable.

To overcome this problem, JADC2 network professionals will require continuous visibility to properly understand data movement; observe the connections between devices, applications, and connections; and automatically identify bottlenecks before data availability is impacted.

AI and ML are key enablers of this. Using AIOps, which deploys AI and ML to digest and analyze large volumes of data from across the IT environment, network administrators can automate critical network monitoring and management tasks, a necessity in hybrid infrastructures and environments built to interlace data sources.

Furthermore, with AIOps-powered observability, teams can predict the unpredictable. They can anticipate network issues or security threats before they arise, detect anomalies, gain the context they need to remediate, and act ahead of performance impacts. And because AIOps relies on ML, it will continuously improve over time, learning about the JADC2 environment, providing more insight into the probable root cause of issues, and even triggering mitigation workflows so network teams can focus on continuous network optimization.

JADC2 Is Just the Beginning of AI-Powered Multi-Domain Operations

JADC2 is only the beginning of the DoD’s mission to provide secure information sharing across multiple domains. The U.S. Central Command (CENTCOM) is also working to establish a data-centric architecture to share information with more than 50 nations, leveraging AI and ML. With both efforts evolving from planning and exercise to reality, these technologies will loom large as the Joint Forces staff look to turn disparate data sets into highly available and actionable intelligence.

 

Visit our website for more information on enhancing connectivity and interoperability across systems.

Key Factors for Enhanced Database Performance

Data is the most valuable resource a federal agency can own. It’s currently being generated at an astonishing rate of 1.145 trillion MB per day, and market intelligence firm IDC predicts we’ll generate as much as 463 exabytes of data each day by 2025. This massive rise in data collection introduces new challenges in how agencies design, manage, and monitor databases to ensure they run at peak performance and can meet the mission-critical needs of end users.

Simultaneously, the technology landscape is also getting more complex. Technology professionals must navigate distributed workloads in a hybrid IT environment, manage database migrations as workloads move to the cloud, and understand database specialization spanning relational and NoSQL platforms—all on top of their day-to-day responsibilities.

Though the stakes and complexity of the role of IT professionals is increasing, the solution doesn’t have to be difficult or complex. Agencies can realize a dramatic difference through enhanced database management—a concept that is comprehensive of both database performance monitoring and DataOps.

In fact, there are several things agencies can do to enhance database management, performance, and speed, even in light of a dramatically increasing data load. One of the most important aspects is database performance tuning.

Optimizing Your Database Performance

How can you do this? There are several opportunities for database performance tuning capable of having a dramatically positive impact.

SolarWinds Database Performance Blog Embedded Image 2022Let’s start with response time analysis—the database optimization piece of the equation. Response time analysis helps database administrators (DBAs) identify and measure an end-to-end process, starting with a query request from the end user, ending with a query response, and including the time spent at each discrete step in between. This helps identify bottlenecks, pinpoint root causes, and prioritize actions based on the impact poor database performance has on end users.

Response time analysis is a pragmatic approach to tuning and optimizing database performance, allowing the database team to more easily identify issues and deliver measurable results.

Once the team has committed to implementing response time analysis, next up is ensuring indexes are implementing a logical data structure to make the data retrieval process more efficient—a key component of database performance monitoring. An indexing strategy is one of the toughest problems a DBA can face. The tendency is to index an object instead of indexing for how it’s going to be queried. This often leads to too many indexes on the underlying objects, which can cause regression. A database performance management solution can help you identify missing and duplicate indexes faster so you can improve database performance.

Other tasks the IT team can perform to help enhance database performance include the following:

  • Reallocate the computing system’s memory reserves. When there’s not enough memory available, databases are often hit hardest.
  • Ensure the team is using the latest version of MySQL or Oracle. Sometimes, keeping the database up-to-date is all it takes to improve database performance.
  • Avoid common SQL index pitfalls like coding loops and correlated SQL sub-queries.
  • Defragmenting data might help speed up the database. Make sure there’s enough disk space.
  • When preparing for cloud migrations, understand how your agency’s data environment is visually structured. A database solution can help the team compare, synchronize, script, and navigate data and schemas to drive efficiency and productivity.

Database performance tuning helps re-optimize a database system from top to bottom—and from software to hardware—to improve overall performance. The process can involve reconfiguring operating systems according to how they’re best used, deploying clusters, and working toward optimal database performance to support system function and end-user experience. No matter how many of these tasks your team implements, every little bit will help as our data demands continue to increase exponentially.

 

Try a free trial of the SolarWinds® Database Performance Analyzer to learn more about optimizing your database performance.

Powering Transformative Solutions

In a recent survey of FCW readers, respondents’ top priorities were modernizing cybersecurity (71%), improving data capture and analysis (66%), managing a mix of on-site and remote employees (65%), improving customer experience (63%) and expanding cloud (61%). Successfully combining those priorities requires identifying and then integrating best-of-breed solutions. 72% of respondents said their agencies rely on SIs for complex IT projects. Those large, established contractors often have decades of experience building government IT systems, and they understand how agencies work. They also understand the value of modernizing those systems to take advantage of the latest technology and keep pace with mission goals. Learn how SIs play a key role as a conduit for innovations developed by private companies, and how they are evolving to meet the government’s need for digital transformation, in Carahsoft’s Innovation in Government® report.

 

Driving Modernization with Deep Strategic Partnerships

“There are three key challenges that are driving demands for digital transformation. First, a tremendous explosion of data has made it extremely difficult for government agencies and mission owners to make sense of all the information that is being generated across their IT environments. Second, cyber-threats and hacking campaigns are becoming more frequent and significantly more sophisticated. In addition to the well-publicized Colonial Pipeline and SolarWinds-based attacks in 2021, the FBI reported a 300% increase in cybercrimes and security breaches since the start of the pandemic, and officials expect those efforts to continue. Third, agencies are running hybrid IT environments that include on-premises legacy infrastructure, cloud-based technology, and any number of fog and edge computing devices such as mobile phones, laptops, 5G-enabled devices and smart sensors. That means agency systems are becoming more complex and harder to manage.”

Read more insights from Leidos’ Vice President and Director of the Digital Modernization Accelerator, Derrick Pledger.

 

Why Success in Zero Trust Requires a Team Effort

IIG FCW March Transformative Solutions Blog Embedded Image 2022“Although it has recently been getting a lot of attention, zero trust is actually the evolution of a security philosophy that has been building for years. It starts by giving users the least amount of privileges to perform their jobs and operating under the assumption that systems have already been breached. Zero trust focuses on the connection between users and the data, applications, networks and systems they want to access. In zero trust architectures, new administrative tools continually evaluate whether allowing an individual user to have a certain level of access privileges is the right thing to do. The approach gives agencies much more flexibility as they modernize because they can make decisions at a granular level that enable them to secure data and entire IT ecosystems. President Joe Biden’s executive order on cybersecurity mandates the use of zero trust, which puts a lot of weight behind a consistent and coordinated adoption of the approach.”

Read more insights from Leidos’ Vice President and Director of the Cyber Accelerator, Meghan Good.

 

How Multi-Domain Operations Accelerate Modernization

“True modernization requires a fundamental shift in how the government constructs its core systems, from IT to weapons to command and control. Agencies must switch from old-school, bespoke, closed architectures to the more agile, open, nonproprietary frameworks that enable rapid, iterative improvements. Open architectures also enable agencies to prioritize interoperability and data sharing between systems in an approach known as multi-domain operations. By design, multi-domain operations must involve a broad range of partners to achieve the desired mission outcomes, particularly as threats continue to rapidly evolve. Making such a shift allows military and civilian agencies to far more rapidly add new capabilities to individual systems. The approach also enhances agencies’ ability to partner with industry to harness the power of cross-domain, cross-agency and even cross-company digital synergies.”

Read more insights from Leidos’ Vice President of Multi-Domain Operations Solutions, Chad Haferbier.

 

Balancing Speed and Security with SecDevOps

“Agile development and delivery, while paramount, cannot come at the expense of security. At Leidos, we believe security isn’t a checkbox exercise after software is built. The only way to overachieve on security is to make it first and central to everything we do. That’s why we say SecDevOps instead of DevSecOps. That approach gives us the ability to rapidly and reliably deploy software, operate it and understand how it’s working so that we can enhance and update it in a secure way. In other words, we’re not just pushing out new software. We are refactoring and maintaining software, proactively adjusting our security posture because adversaries never stop trying to get in. They’re constantly evolving, and our software has to evolve and outpace those threats.”

Read more insights from Leidos’ Vice President and Director of the Software Accelerator, Paul Burnette.

 

Bringing Secure Cloud Technology to Government

“Many agencies have already embraced cloud technology and now work with multiple providers to access software as a service, platform as a service and infrastructure as a service while also managing multiple on-premises data centers. Unfortunately, agencies typically do not have centralized visibility into all those resources, which makes it extremely challenging to manage existing applications and infrastructure, let alone develop new applications. The situation becomes even more complex when agencies start adding policy enforcement, security services, compliance management and container orchestration.”

Read more insights from ManTech’s Senior Vice President and CTO, Srini Iyer.

 

Download the full Innovation in Government® report for more insights from these digital transformation and emerging technology thought leaders and additional industry research from FCW.