1 / 11

Enterprise User Enabling Warfighter Capability

Enterprise User Enabling Warfighter Capability. 16 August 2011. UNCLASSIFIED. Disclaimer.

erica-dale
Download Presentation

Enterprise User Enabling Warfighter Capability

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enterprise User Enabling Warfighter Capability 16 August 2011 UNCLASSIFIED

  2. Disclaimer The information provided in this briefing is for general information purposes only. It does not constitute a commitment on behalf of the United States Government to provide any of the capabilities, systems or equipment presented and in no way obligates the United States Government to enter into any future agreements with regard to the same. The information presented may not be disseminated without the express consent of the United States Government. UNCLASSIFIED 2 2 UNCLASSIFIED

  3. Agenda • Overview • Capability • Availability UNCLASSIFIED 3

  4. Enterprise User • Enterprise User – DoD-wide implementation initiative • Concept of Operations (CONOPS) defines the end-state set of capabilities required for secure net-centric information sharing: • On-Demand Global Access • Assured Identity Management • Adaptive Virtual Workspace • Enterprise User increments increase maturity • Near Term (FY2011-12): Enterprise-wide access using DoD PKI hard token credentials from connected DoD End User Devices • Mid Term (FY2013-15): Enterprise-wide access via connected and wireless networks to fully functional virtual workspaces • End State (FY2016+): Device and location independent access to cloud computing, personal data stores and full collaborative tools • Enterprise User Integrated Master Plan – Orchestrates the integrated/synchronized delivery of Enterprise User UNCLASSIFIED

  5. Capabilities Enterprise User Capabilities – Foundation for Mission Success Secure Net-Centric Information Sharing Adaptive Virtual Workspace Enterprise User - Increasing Warfighter Enablement • Application and Data Services Connected Warriors accessing data and applications for mission Assured Identity Management • Infrastructure Services Verified Warriors accurately identified, individually authorized On Demand Global Access Mobile Warriors accessing secure networks globally • Networking Services • “… go anywhere in the DoD, login, and be productive” ~ VCJCS ~ UNCLASSIFIED

  6. DoD Visitor Overview • DoD Visitor Supports Enterprise User Concept • Enables DoD users to access NIPR when away from home station using local organization resources • DoD Visitor designed to work on existing systems and capabilities. No software or hardware purchases required. • Supports DoD objectives for PK enablement • Consistent with DoD Policies and Doctrine • Supports both user needs and local organization mission “…go anywhere in the DoD, login, and be productive.” 6 UNCLASSIFIED

  7. Accessing Enterprise Services “. . . enable secure net-centric information sharing” • Enterprise Collaboration • Machine-to-Machine Messaging • Data Services Environment • Enterprise Search/Enterprise Catalog • Enterprise Email • Enterprise SharePoint UNCLASSIFIED 7

  8. Operational Concept Concept of Operations – Capabilities that enable Warfighters UNCLASSIFIED

  9. Candidate Initiatives DoD-wide synchronization initiative enabling Warfighters to “…go anywhere in the DoD, login, and be productive.” • Current: • DoD Visitor • Candidates: • Non-DoD Visitor • Traveling Devices – Enterprise Mobile & Wireless Access Pilot • Multi-level Security (MLS) End-User Device Pilot • Enterprise Attribute Delivery Service – Tactical Edge • Current: • Enterprise Email • Candidates: • Universal Web 2.0 Interface for Legacy Application • Hosting Environment for Enterprise Services Validation • Virtual Workspace Pilot • Current: • PKI Authentication • Enterprise Identity Attribute Service (EIAS) • Identity Synchronization Service (IdSS) • Candidates: • Integrated DEERS/Global Force Management Enterprise Attribute Service • Identity and Access Management/Attribute Based Access Control Reference Implementation

  10. Implementation Approach Operational Concept • Required Capabilities • Enterprise-level Increments and Milestones • Driven by Tactical Edge (GIG 2.0; DISA Campaign Plan / GIG Convergence Master Plan) Capabilities Generation Incremental Implementation • Objective Capabilities • Deliverable Timelines • Enterprise User Capability Maturity Increments • Integrated Implementation Roadmap PEO-GES Engineered Solution Aligned Development Synchronized Implementation Capability Development Measured Success Key Enablers • Enterprise Policy and Standards • Requisite Operating Environment (network connectivity, PKI, cloud computing, etc) • Partnership – DoD CIO, VCJCS, DMDC, NSA, DoD Components ENTERPRISE USER Operational Concept DoD Partnership Current Capabilities: (DoD Visitor, NCES, PKI, etc) Near-Term Capabilities Mid-Term Capabilities End State Capabilities DoD scale, system dependencies add complexity UNCLASSIFIED

More Related