What Agencies Need For More Agile Networks

The evolution of IT as a service and other forces are fundamentally changing how agencies need to think about the next generation of networks.

Michael A. Davis, CTO of CounterTack

July 11, 2013

4 Min Read

InformationWeek Green -  July 2013

InformationWeek Green - Mar. 4, 2013

InformationWeek Green

InformationWeek Green


Download the entire July 2013, issue of InformationWeek Government, distributed in an all-digital format (registration required).


Next Gen Networks

Next Gen Networks

Intense budgetary pressures are changing the federal government IT environment from one in which individual agencies buy products and services to one in which agencies must work with one another, as well as with contractors and other partners, in new and innovative ways. This new approach will fundamentally change how agencies architect their networks. It will also likely change the career path for many government IT professionals.

The demand for next-generation networks gained new momentum last year when the Office of Management and Budget (OMB) released the Digital Government Strategy, tasking all agencies "to unlock their data sets and services to the public" and function more like data service providers. Since then, the Centers for Medicare and Medicaid Services (CMS), the Department of Homeland Security, the Defense Department and other agencies have been developing new ways -- and new network architectures -- to make their data accessible to the public, industry and other agencies.

The Digital Government Strategy in particular requires agencies to ultimately separate their data from their presentation layers.

For example, CMS supports all Medicare and Medicaid services for 98 million beneficiaries. The initiative to separate the presentation and data layers led the agency to develop a business rules engine that's shared by developers within CMS and industry partners. By implementing a set of business rules as a service, separate from the data, CMS system users can access a single source of truth rather than different permutations. That common rules engine also makes it easier to develop applications.

Implementing such a business rules shared service completely changes the way the network must be structured. The bifurcation of the presentation and data requires a bifurcation of the network as well.

For instance, a network architected to handle client and server communications, where the business logic resides within the application, requires a much different architecture than a network where every application is requesting data from a central core business rules engine. The latter will transmit many thousands -- or millions, potentially -- of small, simple requests across the network from almost any endpoint (contractor, partner or secondary data center). Scale is important. CMS expects to process about 700 TB of claims data by 2015, data accessed via requests from many different end users who can be anywhere within or outside CMS's networks.

Gone are the days of a single network with hub-and-spoke architecture and a single core. The next-generation network is split into two: core and business. We'll discuss business networks later.

But start thinking of dedicated networks using software-defined networking (SDN) and "network functions virtualization," which is the term used for describing the collapsing of switches and routers into virtualized switches and routers.

OMB's Shared Services Strategy, and the follow-on document titled "Common Approach To Enterprise Architecture," requires agencies to separate line-of-business systems (e.g., for financial management) from core mission systems. It also tasks agencies to further separate commodity IT (such as infrastructure and email). That requirement will move agencies more toward virtualized applications, platforms and infrastructure. But it also means that government networks must be easy to modify based on changing directives, interfacing agencies and end user demands. The essence of the new federal architecture is agility.

Because the core network supports many stakeholders, it must be secure, scalable, high bandwidth and reliable while meeting compliance requirements. It's likely to stay somewhat physical, as it will link a variety of third parties: partners, contractors and remote locations. It will require custom processors and code to perform high-efficiency routing and switching.

To read the rest of the article,
download the July 2013 issue of InformationWeek Government.

Read more about:

20132013

About the Author(s)

Michael A. Davis

CTO of CounterTack

Michael A. Davis has been privileged to help shape and educate the globalcommunity on the evolution of IT security. His portfolio of clients includes international corporations such as AT&T, Sears, and Exelon as well as the U.S. Department of Defense. Davis's early embrace of entrepreneurship earned him a spot on BusinessWeek's "Top 25 Under 25"
list, recognizing his launch of IT security consulting firm Savid Technologies, one of the fastest-growing companies of its decade. He has a passion for educating others and, as a contributing author for the *Hacking Exposed* books, has become a keynote speaker at dozens of conferences and symposiums worldwide.

Davis serves as CTO of CounterTack, provider of an endpoint security platform delivering real-time cyberthreat detection and forensics. He joined the company because he recognized that the battle is moving to the endpoint and that conventional IT security technologies can't protect enterprises. Rather, he saw a need to deliver to the community continuous attack monitoring backed by automated threat analysis.

Davis brings a solid background in IT threat assessment and protection to his latest posting, having been Senior Manager Global Threats for McAfee prior to launching Savid, which was acquired by External IT. Aside from his work advancing cybersecurity, Davis writes for industry publications including InformationWeek and Dark Reading. Additionally, he has been a partner in a number of diverse entrepreneurial startups; held a leadership position at 3Com; managed two Internet service providers; and recently served as President/CEO of the InClaro Group, a firm providing information security advisory and consulting services based on a unique risk assessment methodology.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights