The Changing Face of Infrastructure and The Operational Agility Needed to Manage It Darrell Graddy, Vice President Mahesh Kalva, CTO Lockheed Martin Enterprise IT & Data Solutions August 16, 2010
Why We are Here: An Executive Perspective Background: NASA is experiencing a rapidly changing environment Situation: IT Infrastructure and Operations »Facing Challenges/Opportunities »Demanding Results and Outcomes Direction: Evolution of IT Infrastructure »Cloud Computing »Cyber Security »Mobile Technologies The Changing Face of Infrastructure —2— June 25, 2010
Challenges/ Opportunities Budget Pressures Innovation Cyber Security Green IT Telecommuting & Travel Industry Response Standardization and consolidation of IT services Creating Flexibility & Scalability through cloud computing Cyber Situational Awareness and Command and Control Virtualization & data de-duplication Mobile Workforce Solutions Technology Results Solutions-as-a-Service lowers costs & increases expandability Shifting from O&M fixed costs to variable costs Self Defense of the Enterprise from Cyber Attack Lower costs & compliance Secure remote computing Outcomes More budget for mission and research Secure Infrastructure Reduced carbon footprint Attracting and retaining talent & increased productivity Addressing NASA Challenges… The Changing Face of Infrastructure —3— June 25, 2010 … Through An Outcomes-Based Approach
Response to Budget Pressures Through Innovation: Cloud Computing INFRASTRUCTURE-AS-A-SERVICE (IAAS) Social Media FOIA PLATFORM-AS-A-SERVICE (PAAS) Grants Tools ITSM Data Solutions White Label Apps SECURITY Dashboard Logistics BILLING Solutions-as-a-Service More Budget for Mission and Research SOFTWARE-AS-A-SERVICE (SAAS) The Changing Face of Infrastructure —4— June 25, 2010
Cyber Security: More Important Than Ever 60% of all US Companies have been compromised -US Department of Justice ‘08 Report 60% of all US Companies have been compromised -US Department of Justice ‘08 Report 165% growth in new malicious code from ‘07 to ‘09 -Symantec 165% growth in new malicious code from ‘07 to ‘09 -Symantec 90% of all compromises can be stopped through proper configuration and patch management -Gartner 90% of all compromises can be stopped through proper configuration and patch management -Gartner 500% increase in ‘08 in the number of malware attacks that used hostile code to infiltrate or damage a computer system -- equal to the combined total for the five years prior - McAfee 500% increase in ‘08 in the number of malware attacks that used hostile code to infiltrate or damage a computer system -- equal to the combined total for the five years prior - McAfee Drives Need for End-to-End Cyber Situational Awareness and Command and Control to Self-Defend the Enterprise The Changing Face of Infrastructure —5— June 25, 2010
Telecommuting and Travel: Mobile Solutions Challenges Less control outside your network What’s lurking on home PCs? Less control outside your network What’s lurking on home PCs? Security Lost or stolen laptop = $50K to clean up Complexity of managing multiple devices Lost or stolen laptop = $50K to clean up Complexity of managing multiple devices Costs Incomplete access to data, specialized apps How do you create a true “home office?” Incomplete access to data, specialized apps How do you create a true “home office?” Productivity Entire Desktop on a Secure 3-inch Flash Drive The PC-on-a-Stick Solution Plug into just about any PC or laptop Carry the OS, data, apps in your pocket Plug into just about any PC or laptop Carry the OS, data, apps in your pocket MOBILE MOBILE 256-bit AES hardware encryption “White Listing” and Application Wrapping 256-bit AES hardware encryption “White Listing” and Application Wrapping SECURESECURE Heat, cold, water, sand resistant NIST FIPS Level 3 certified Heat, cold, water, sand resistant NIST FIPS Level 3 certified TOUGHTOUGH The Changing Face of Infrastructure —6— June 25, 2010
Getting There from Here: A Technologist Perspective The Changing Face of Infrastructure —7— June 25, 2010
Agency’s Network Cloud Computing: Infrastructure-as-a- Service… …Addressing Budget Pressures Through Innovation —8— June 25, 2010
Expressed Interest Public Impact LOW HIGH Technology Complexity Cost FOIA Manager Situational Landscape Health Terminology Management Grants Mgmt Data Visualization Call Center Management Broad solution targeted at a specific function Specialized solution targeted at specific activity or problem Low Complexity, Low Cost, High Interest, High Impact Low Complexity, Low Cost, Low Interest, Low Impact High Complexity, High Cost, High Interest, High Impact High Complexity, High Cost, Low Interest, Low Impact Asset Management Security-As-A- Service Compute-As- A-Service IT Service Mgmt Storage-As-A- Service Social Collaboration ERP Cloud Computing: Software-as-a-Service The Changing Face of Infrastructure —9— June 25, 2010 Logistics
Increasing Security Threats… Expanding Motivation Status * Economic * Military * Nation States * Politics * Globalization Expanding Motivation Status * Economic * Military * Nation States * Politics * Globalization Increased Sophistication of Players * Hackers * Organized Crime * Nation States Increasingly Targeted & Complex Attacks An Ever Increasing Challenge Due to Complexity of Attacks & What Is Being Attacked An Ever Increasing Challenge Due to Complexity of Attacks & What Is Being Attacked SOCIAL Engineering SOCIAL Engineering The Changing Face of Infrastructure —10— June 25, 2010
…Requires a New Approach to Defense Detect Deny Disrupt Degrade Deceive Reconnaissance Weaponization Delivery Exploit Compromise C2 Exfiltration Courses of Action Completeness = Resiliency Courses of Action Completeness = Resiliency Attack Defense Against the Cyber Kill Chain The Changing Face of Infrastructure —11— June 25, 2010
Innovations to Address Mobile Workforce On Travel Disaster Response In the Office Home PC On-A-Stick Mobility: Desktop Travels with You on a Flash Drive Tiered Security: Application White Listing and Wrappers, Hardware Encryption Enterprise Management: Complete Centralized Control PC On-A-Stick Mobility: Desktop Travels with You on a Flash Drive Tiered Security: Application White Listing and Wrappers, Hardware Encryption Enterprise Management: Complete Centralized Control The Changing Face of Infrastructure —12— June 25, 2010
Mobile Solutions Incident Management – Aids Field Tech Investigation, Diagnosis, Resolution, Problem ID Expert Help Knowledge Base Access Rich Capture Asset Management – Integration with scanner technology By year-end 2010, 1.2 billion people will carry handsets capable of rich, mobile commerce providing a rich environment for the convergence of mobility and the Web (Gartner) By 2012, 70% of all workers will be mobile and 90% of all enterprises will develop at least one mobile application (Forrester & IDC) By year-end 2010, 1.2 billion people will carry handsets capable of rich, mobile commerce providing a rich environment for the convergence of mobility and the Web (Gartner) By 2012, 70% of all workers will be mobile and 90% of all enterprises will develop at least one mobile application (Forrester & IDC) The Changing Face of Infrastructure —13— June 25, 2010
Summary: Outcomes for NASA More Budget for Mission and Research Secure Infrastructure Reduced Carbon Footprint Attracting and Retaining Talent & Increased Productivity The Changing Face of Infrastructure —14— June 25, 2010