hp • issue 022 • spring 2014 industry edge public sector view point pap… · are being driven...
TRANSCRIPT
1U.S. Public Sector edition
Industry EdgeU.S. Public Sector Edition
Feature stories
How the New Style of IT is a fundamental enabler for the next generation of government
How IT innovations are transforming the way public sector agencies do business
Cloud: defining the secure pathway to deliver results at lower costs
Actionable analytics: using data to optimize decision- making and outcomes
HP • Issue 022 • Spring 2014
HP’s commitment to the public sectorAs one of the world’s largest technology companies, HP takes particular pride in delivering technology products, software, services and solutions to the public sector.
Our customers are passionate about choosing
partners that enable them to improve their
ability to deliver accountable, cost-efficient,
and citizen-centered services amidst budget
constraints, rising expectations, and profound
shifts in the technology industry. These shifts
are being driven by trends such as cloud,
mobility, big data, and security, and they are
fundamentally changing the way technology
is consumed, delivered, and paid for. They
demand what we call a “New Style of IT,”
which is a new style of business powered by IT.
HP is the only company with the breadth and
depth of innovative products and services to
help you succeed in this new reality. We can
help you transform operating and business
models, expand services, and improve service
delivery so you can fulfill your mission,
streamline and simplify processes, and
facilitate citizen interaction.
In this publication, HP and industry experts
provide insights, best practices, and examples
of how we are helping to enable the next
generation of government and education, where
IT-led transformations are delivering real results.
No other organization is better positioned to be
your partner in navigating the New Style of IT
and helping you achieve your goals.
We are excited to partner with you to help you
better serve your constituents and employees.
Meg WhitmanPresident, CEO
Hewlett-Packard
In this issue 5 How the New Style of IT is a
fundamental enabler for the
next generation of government
10 How IT innovations are
transforming the way public
sector agencies do business
15 Cloud: defining the secure pathway
to deliver results at lower costs
21 Actionable analytics: using data to
optimize decision-making and outcomes
26 Risk and threat mitigation for
cyber-dependent operations
33 Empower your mission with mobility
41 The New Style of IT in action:
customer successes
46 HP Enterprise Services quick facts
48 Take the next step
5U.S. Public Sector edition
How the New Style of IT is a fundamental enabler for the next generation of governmentToday, governments operate in a globalized world and issues such as economic growth, economic downturns, and security ripple across national boundaries. Businesses’ willingness to relocate also has a profound impact on national and regional labor markets. At the same time, the expectations that citizens and businesses have of governments are very high. It probably comes as no surprise that consumers who have grown accustomed to the speed and convenience offered by commercial firms now demand the same of their governments. They want governments to be relevant, agile, responsive, and secure. They expect transparency to ensure public trust, and they expect the taxes they pay to bring discernible value.
Across the board, governments are
encountering pressure to reduce costs,
improve their service delivery, and overhaul
their business models. They are expected to
reallocate scarce resources to the front line to
meet demanding organizational challenges
and to shift budgets from “business as usual”
to transformation and innovation. Constituents
now expect to interact with governments across
a range of channels, from traditional brick and
mortar offices to online and mobile devices.
Governments must make decisions based on
insights gleaned from data sources that now
include social media, audio, video, and sensors
in addition to the traditional data sources. This
requires a massive rethink, not only of business
processes, but also of the key enabler of this
transformation—information technology.
6 U.S. Public Sector edition
Nonetheless, this turbulent and fluid
environment—a perfect storm of global
forces, constituent expectations, and
organizational challenges—creates many
opportunities for government to radically
transform to the “next generation” of
government, specifically in the way services
are designed and delivered and in the
ecosystems that will make these next-
generation government services a reality.
In particular, what we call the “New Style
of IT”—cloud, mobility, security, and big
data—presents breakthrough opportunities
to develop new, higher-quality products and
services at far lower costs and with greater
security and significantly reduced time to
market. These technological advances enable
new public sector delivery models, moving
from a past and present focus on silos,
passivity, and reactive cures to a future focus
on early insight, proactive intervention, and
government-wide response and collaboration.
The New Style of IT enables better decisions
to allocate scarce resources, identify citizen
and business segments, personalize services
for those segments, and respond with
unprecedented speed during times of crisis.
In helping government organizations weather
these changes, CIOs and public sector leaders
face a number of challenges, both short and
long term. They need to deliver mission-critical
IT services while simultaneously creating next-
generation platforms. This requires them to
balance the following demands on resources
and management focus:
7U.S. Public Sector edition
• Deliver flawless IT services to meet current operational needs. Given the
critical nature of government services,
the entire range of programs and business
operations needs to work without a hitch.
At the same time, shorter-term changes
need to be made to allow for growth in
volumes, changes in regulations, and the
adoption and rollout of new services.
• Create the platforms and internal capabilities for next-generation government. This is where CIOs, in their
efforts to maximize the potential of their IT
and business transformation, need to create
IT platforms and upgrade organizational
capabilities to enable a flat government
where agencies operate in an integrated
manner; where the government is agile
and responsive to crises and changes in
the environment (for example, the economy
and national security); where operations are
streamlined and more secure; and where
operations are more efficient and transparent
in terms of costs and resources used.
• Minimize risk during transition and transformation, while experiencing flat, if not shrinking, budgets. A shift to a
holistic view is needed to ensure security
and privacy are maintained during the
transition to a digital service delivery model,
which demands complex synchronization
of various programs and projects, partners,
and vendors, and often has to accommodate
rapidly changing requirements and deadlines
driven by political mandates.
So how can CIOs shift from coping with all these
conflicting demands to getting the upper hand?
Based on our extensive experience in working
with public sector customers worldwide,
we believe there are five areas where IT-
led initiatives can focus to deliver radical
transformation in government and real results:
1. Maximize cost savings in the existing/legacy IT applications and infrastructure and redeploy savings toward transformation and innovation. In addition to the current set of initiatives
(consolidation and shared services) being
implemented by government agencies
around the world, the following key
principles need to be incorporated to
deliver exponentially improved results:
• Use citizen-centric and lean design
principles and incorporate best practices
from other industries to drive new digital
service delivery models. For example,
Singapore looked at the hospitality
industry as a best practice in designing
its new, efficient, customer-oriented
government service centers.
• Identify opportunities for automation
and consolidation in the often
overlooked “long-tail” of processes.
For example, it may make sense for
government documents to be emailed
or printed much closer to the centers
of consumption to optimize assets and
reduce logistics costs and waste.
8 U.S. Public Sector edition
2. Accelerate your transition and IT transformation. Most governments have
initiated cloud pilot programs. However,
these programs now need to be expanded,
and emphasis should be placed on building
scalable and flexible infrastructure.
Accelerated adoption will depend on self-
service and automation, along with a rich
portfolio of service offerings complemented
by business rules that mandate “cloud-first”
deployment strategies. Similarly, priority
should be accorded to making citizen-facing
applications available on mobile devices.
For example, the U.S. Government has made
open data content and web-APIs the new
default. In parallel, strong pan-agency IT
governance processes should be put in place.
3. Create platforms and incentives for leverage. Standardization and reuse of
common enterprise application components
can help streamline costs, eliminate
redundant projects, free up funds and scarce
resources, improve service quality, and reduce
risks via the adoption and implementation
of best practices. They can also help “join
up” government through sharing of data,
standardization of processes, and connected,
cross-government service delivery.
4. Create capacity, capability, and culture in the people and the IT organization. The customer interactions, internal business
processes, and enabling IT platforms that
will drive next-generation government will
require continuous innovation. Solutions
to governments’ complex problems will
require governments to share high-value
data with external entities in the form of
expanded open government strategies that
include open data, open information, and
open collaboration. The IT organization,
therefore, needs to build the capability and
culture to drive changes and ensure that
the human dimension of the changes can
be absorbed in the larger organization.
Business processes have to be upgraded,
a new customer-centric organization
9U.S. Public Sector edition
needs to be built, and new business and
procurement models will have to be
implemented. Government IT shops will
have to be extremely good at fostering
innovation, managing complex programs,
and learning how to shift from output-based
paradigms to outcome-based measures
with reasonable service level agreements
and a culture that balances risk with
flexibility and resilience.
5. Develop and nurture ecosystems. Collaboration will be a key attribute of
governments powered by the New Style of
IT and the capabilities delivered by mobility,
security, cloud, and big data. Joint design
and collaborative delivery will be the norm,
bringing together governments, citizens, and
external entities ranging from IT firms, non-
governmental organizations, and academic
institutions. The ever-expanding ecosystems
should also include other governments.
Developing the capabilities to create and
nurture these ecosystems to deliver public
value will be the keys to success for both
governments and the IT industry.
At HP, we believe that the New Style of IT is a
fundamental enabler for the next generation
of government. We believe governments
can be both FAST (flat, agile, streamlined,
and information technology enabled) and at
the center of a collaborative effort to solve
society’s most complex challenges. We believe
design and delivery of services can meet the
requirements and expectations of all citizen
segments. We believe governments can be
among the most innovative in the use
of information technology.
HP works with government agencies and
education institutions across the world to
leverage the New Style of IT to radically
transform services and deliver results that
matter for our customers. We bring the
broadest portfolio of technology solutions,
scale, and worldwide experience, along with
a vast repository of lessons learned and
innovations —both from the public sector
and diverse global industries—to help
governments optimally deliver enhanced
digital services to their constituents.
Suparno BanerjeeVice President
Worldwide Public Sector, Office of the CEO
10 U.S. Public Sector edition
HP’s Point of View
How IT innovations are transforming the way public sector agencies do business In recent years, government agencies have shifted toward a more integrated approach to public service delivery. They are facing new demands and expectations for accessible services from digitally empowered citizens, and government organizations are in different stages of their enterprise transformation, each with their own distinct concerns and challenges. The business challenges facing the public sector are primarily centered around budget constraints and the ability to optimize IT spending to deliver mission-critical services.
Doing more with less is more important than
ever before. CIOs in the government today
are striving to rationalize and grow their IT
portfolios, consolidate data centers and assets,
move to more consumption-based IT, deliver new
types of services, protect assets and information,
and cut costs, all while complying with newly
enacted legislative and policy mandates.
Innovative uses of IT can help the public sector
manage resources, improve workplace efficiency,
and provide constituent services that are secure
at the core —services that protect access,
networks, data, systems, and facilities. As part
of this New Style of IT, leveraging big data can
deliver crucial insights for better decision-
making and drive economic growth.
Global public sector best practicesIn light of the many challenges that exist today,
the following are best practices that enable
CIOs to put more knowledge and information
into the hands of constituents, citizens, and the
11U.S. Public Sector edition
workforce so they can make informed decisions
in the safest, most efficient way possible.
Migration to consumption-based servicesGovernment agencies are beginning the
complex migration to shared or consumption-
based services to deliver new capabilities and
optimize IT spending. There’s a movement to
adopt consumable infrastructure, platform,
and software services, especially as agencies
consolidate their mission workloads.
Consumption-based services are traditional
cloud services. Cloud computing enables
organizations to share computing resources
and pay only for what they use. Data, thus,
can reside across a shared pool of storage
devices. For example, there has been wide-
scale adoption of email as-a-service for
agency personnel (leading to lower price points
for email on demand). HP is supporting the
Defense Information Systems Agency (DISA) in
their hosting of the 1.6 million mailboxes that
make up the Department of Defense (DOD)
enterprise email. Critical information that needs
to be accessed frequently can be sent to high-
performance storage, while other data can go
to lower-cost devices.
Centralizing the environment allows a pay-
for-use model and provides ubiquitous access
when and where it’s needed and through any
channel. Cloud deployment models facilitate
demand-based, mission-critical systems. In fact,
as part of the new Cloud First Initiative1, U.S.
Government agencies are required to consider
cloud options before making new IT investments
to achieve savings and service improvements.
1 Vivek Kundra, U.S. Chief Information Officer; The White House; February 8, 2011. https://cio.gov/wp-content/uploads/downloads/2012/09/Federal-Cloud-Computing-Strategy.pdf
12 U.S. Public Sector edition
Human capital change managementOne of the most overlooked areas vital for
successful transformation is people, both
the employees responsible for delivering
services as well as citizens ability to access
them. Governments are placing emphasis on
consumer expectations, sentiment, and citizen-
centric design, which implies an understanding
of the specific needs of different segments of
society and their capacity to benefit from digital
services. IT can help drive fiscal or productivity
efficiencies, but end users—constituents,
citizens, and the workforce—need to know
how to use this technology.
Any IT transformation needs to take into
account the impacts on end users. There’s a
massive citizen-centric services trend around
eliminating the four walls of agencies with one-
stop government, meaning the integration of
public online services via a centralized portal
or single point of entry. Portals are being
implemented by governments that include a
clear structure across the whole of government,
easy-to-find resources, and a comprehensive
navigation system. Governments are focusing
on informing users of what happens with their
data and how it is protected, creating confidence
in and acceptance of the portal or site.
As the IT organization migrates into
consumption-based cloud services, the ability
to gain on-demand access to information is
changing the way people interact with agencies.
Agencies will need to communicate changes
to constituents as IT services evolve and are
consolidated. Workers, in turn, will need to
understand the impact of the job, business
processes, and/or role-based changes that need
to take place. The ability to make end users part
of the change process is critical to success.
Furthermore, governments should proactively
increase awareness of and promote e-service
usage; otherwise, despite the availability
of e-services, usage levels may fall below
expectations. Constituents need to know
where to get information, how to use it, and
the benefits that information brings. Simply put,
users will reject what they don’t understand.
Secure cloud and mobile solutionsA third vital consideration is cybersecurity.
While mobile solutions in the marketplace can
enable agencies to reach different constituents
through any number of channels, including
PCs, websites, mobile phones, tablets, and
on-demand information, it’s important to
focus on ensuring that these channels are
trustworthy and secure and that people have
the right credentials to access the information
distributed to them. Secure mobility can also
enable the public sector workforce to access
the information they need anytime, anywhere,
to perform their job functions.
Within the marketplace today, automated
real-time information and analytics enable
agencies to continuously monitor and bolster
the security posture of IT environments (end-
user devices or data center services) and
make informed decisions based on their risk
posture. Automated business rules and events,
automated decision-making, and continuous
monitoring solutions enable agencies to shut
down threats, quarantine or isolate intrusions
13U.S. Public Sector edition
within the environment, and send alerts,
all without human intervention.
The new technology can be used to increase
efficiencies and create transparency between
public administration and citizens. Prevention
of unauthorized data access includes protecting
premises and equipment; protecting software
applications used to process personal data;
ensuring effective methods of blocking,
destroying, and anonymizing personal data; and
determining when personal data was entered,
used, and processed.
HP is the public sector’s global partnerHP enables customers to leverage the New Style
of IT—technologies like cloud, mobility, security,
and big data analytics—to better serve digital
citizens and the workforce. While disseminating
information in a more digitized way helps to
reduce overall costs, a consistent experience
across channels is critical.
Technology is the enabler of the automation
that needs to take place. Our customers want to
know how to use new technology, adopt it, and
communicate it to the workforce. We manage that
effective change as agencies transform to the New
Style of IT, working with agencies and stakeholders
to ensure they recognize and understand the
short- and long-term impacts of how their IT
consumption will change in the future.
In the U.S., HP offers a FedRAMPSM authorized
managed cloud solution for the public sector,
which makes us well-positioned to support
U.S. Federal Government procurement with
flexible purchasing vehicles. From a security
standpoint, we have been protecting government
assets and information for over 50 years, we’ve
used our knowledge, expertise, and lessons
learned to offer secure digital channels—secure
tablets, laptops, and mobile devices—for the
public sector marketplace. Most importantly,
our continuous monitoring solution supports
cybersecurity and the ability to apply automation
to the security posture within agencies.
Learn moreHP is committed to the public sector. Through
our broad portfolio of products, services,
and software, in addition to our global
experience, we can enable governments and
academic institutions to securely meet mission
objectives, improve citizen engagement,
provide consolidated government-specific data
to constituents to create new and emerging
markets, and increase efficiency and innovation
to improve citizen services, all while saving
taxpayer dollars.
To learn more about HP Labs/innovations
we bring, visit hp.com/go/usgov.
Jeff BergeronChief Technologist
HP Enterprise Services, U.S. Public Sector
and the Americas
15U.S. Public Sector edition
Cloud: defining the secure pathway to deliver results at lower costs Government agencies and educational institutions are expected to provide access and service levels consistent with those available in the commercial sector. Technology-savvy program owners have high expectations. Organizations struggle with budgets amid needs for modernization, consolidation, and other projects. Cloud solutions can reshape how agencies operate and accomplish missions—making cloud a fundamental part of how the New Style of IT supports the public sector.
That said, simply buying cloud services may not
deliver desired benefits. A cloud roadmap can
help by taking a modular approach and
establishing policies that correlate workload
types with the appropriate platform
(traditional, private, public and hybrid clouds).
This can help public sector organizations meet
their toughest challenges and navigate with
a holistic plan to the desired end state.
Cloud service selection criteriaIn assessing various cloud options, here are
points to consider:
• What are the requirements of the workloads
you are considering placing in the cloud?
• What are the security requirements
of the workloads?
• Are there restrictions on where
the data can be located?
• What limitations are there on
who may support the systems?
• What are the requirements for system
availability and performance? How
confident do you need to be that
these standards will be met?
• How willing are you to adjust requirements
to achieve the financial benefits of a standard
service as often customization adds cost?
16 U.S. Public Sector edition
Armed with an understanding of
requirements, agencies are ready to evaluate
cloud services that provide for the purchase
and delivery of secure cloud solutions that
can be scaled up and down quickly and
easily. It can, however, still be difficult to sort
through and compare the offerings available.
Public sector cloud buyers can ask pointed
questions of potential cloud providers to
better evaluate them:
• How do you secure your cloud?
• Have you achieved all required regulatory
certifications to date? Have you
implemented those controls in
compliance with regulations as well?
• Can you run an enterprise-class application?
• What levels of transparency can you offer?
• What service-level agreements (SLAs)
do you offer as to how that application,
system, and cloud are performing?
• What SLAs can you offer in the
context of business outcomes?
• What comes standard with your
offering, and what is optional?
• How will price be affected as services
are scaled up or down over time?
• How can you help preserve pre-existing
technology investments?
• How can we establish a relationship based
on critical business and mission metrics?
The ultimate goal is to ensure that you can
effectively match your workload requirements
to the cloud service you need, support the
mission and deliver the desired outcomes.
Optimal cloud outcomesGovernment agencies and educational
institutions that want to position themselves
for future migration of workload to the cloud
can incorporate enterprise cloud services as a
strategic service delivery or sourcing option to
meet specific needs. Cost savings, efficiency
and data center reduction goals are usually
major drivers of this effort. The security,
scalability, and reliability of the solution, the
ease of adoption, and the ability to meet core
mission objectives determine ultimate success.
17U.S. Public Sector edition
The implemented solution should be able to:
• Support mission-critical workloads within a multi-supplier IT environment
• Provide a reliable IT infrastructure that supports capacity on demand
• Supply a flexible and scalable delivery model to keep up with growth and accommodate evolving IT operations and shifting resources
• Offer assured security and compliance
• Standardize tools and processes and include an integrated dashboard to drive consistency and transparency
• Mitigate infrastructure overinvestment risks by increasing cost control and paying only for services consumed from a range of sources
• Reduce overall cost through lower operational expenses and capital spending
• Improve IT efficiency through consolidation and virtualization
• Offer high availability (99.9%) or higher and robust disaster recovery, if needed
• Include a plan for adoption of the solution
HP Helion—Our portfolio of cloud products and services that enable organizations to build, manage, and consume workloads in hybrid IT environments
Build and operate Consume
Private cloud Public cloud and SaaS
Managed private cloud
Managed virtual private cloud
HP Helion OpenStack common architecture
SLAs: Availability security performance compliance cost
Open
• Portable, interoperable, and heterogeneous
• Based on open source to accelerate innovation
• Deploy applications on multiple deployment models
Agile
• Speed time to innovation
• Scale with the right economics
• Planning, building, and managing expertise
Secure
• Enterprise-grade security
• Visibility, control, and governance for hybrid IT
• Reliable, predictable services
18 U.S. Public Sector edition
Hybrid cloud approach and deliveryThe migration to cloud-based services may occur
over time to accommodate fiscal pressures and
competing priorities for the typical public sector
enterprise. Many organizations have worked
hard to consolidate physical locations and
initiate migration to virtualized environments.
The challenge of rationalizing and modernizing
applications means that most enterprises
will live in a hybrid world for many years.
The most successful enterprises establish a
comprehensive roadmap that guides their
“journey to the cloud,” helping them to manage
the transition through an increasingly hybrid
compute environment.
A hybrid approach means taking advantage
of the capabilities offered across private cloud,
community cloud, public cloud, and traditional
IT, placing workload on the appropriate
platform in stages—resulting in a cloud
computing solution that balances speed,
security, agility and cost efficiency. Such a
“multi-stack” approach can assure the desired
results by managing across multiple pre-
existing providers and contracts.
At the forefront of the hybrid cloud worldTo support the public sector’s journey to the
cloud and embrace the convergence of cloud,
mobility, security and big data, HP offers HP
Helion—a comprehensive hybrid portfolio of
flexible and integrated solutions. Using our
extensive expertise and innovation, HP develops
and offers solutions that are adapted to public
sector standards and built from the core to meet
the security levels required.
19U.S. Public Sector edition
Today, hundreds of customers are using HP’s
managed cloud offerings to access mission-
critical, highly secure, high-performance
enterprise-class services. In addition, we have
established over 130 Cloud Centers of Excellence
around the globe. These partner facilities
showcase the HP cloud portfolio and partner
offerings and deliver optimal value to customers.
HP provides relevant public sector solutions
through the most complete portfolio in the
industry, the knowledge of our experts and the
public sector experience we have acquired over
50 years of providing services to hundreds of
government and education clients worldwide.
Simply put, we’re experts at running enterprise-
class workloads in complex, multi-provider
environments. That’s why so many customers
view us as business and mission partners, not
just technology suppliers.
Learn moreWe at HP believe that it’s going to be a hybrid
world where enterprises maximize agility by
leveraging the best of private cloud, managed
cloud and public cloud—as well as traditional
IT. In such a world, it is critical to map out and
embrace the journey to the New Style of IT. To
learn more about public sector cloud computing
as a pathway to lowering IT costs, increasing
efficiencies and enhancing security, visit
hp.com/govcloud or email
Stacy ClevelandDirector, Workload and
Cloud Practice
HP Enterprise Services,
U.S. Public Sector
1 The Forrester Wave™: Private Cloud Solutions. Q4 2013. Forrester Research, Inc., November 25, 2013.
Judy DouglasClient Industry Executive
HP Enterprise Services,
U.S. Public Sector
The HP offering and market presence in a private cloud solution evaluation achieved the highest scores by Forrester Research in 2013, which noted that “HP leads the pack,” and was the sole “leader” in its private cloud study.1
21U.S. Public Sector edition
Actionable analytics: using data to optimize decision-making and outcomesActionable analytics is about managing data, leveraging information, and creating insights.
The data landscape has changed. We are in
a new era of accelerated innovation where
powerful processors are embedded into almost
every kind of device. Operating systems for
such devices have become small and powerful
enough to facilitate a wide range of functions
and interactions—and almost anything can be
connected to the Internet. In previous decades,
government and education organizations made
decisions by analyzing their transactional
business data and using this historic view, along
with the insights from key personnel to make
daily decisions as well as projections about the
future. With the rise of technologies and new
platforms in social media, cloud, and mobility,
decision-makers are hindered unless they can
access and benefit from all relevant information
in the data landscape, which now includes:
Business data—structured data typically
stored in rows and columns in applications—
think enterprise resource planning (ERP) and
customer relationship management (CRM)—
as well as databases and data warehouses.
Machine data—high-velocity data from
sensors in transportation systems, noise,
climate, and pollution monitoring to name
a few, as well as web feeds, web blogs,
application logs, event monitors, stock
market feeds, networks, and security
intelligence systems.
Human information—including email,
social media, documents and records,
video, audio, and images.
In the public sector, changing priorities,
protection of assets, the safety of citizens and
country, citizen-centric services, and the need
for ever more transparency in governmental
agencies dictates the need to maximize the
potential of big data. The volume, variety,
velocity, and complexity of big data are
22 U.S. Public Sector edition
increasing as more and more connectivity and
devices enable us to generate and consume data,
overwhelming existing systems and processes
The unstructured data (human information)
has a ten-times higher growth rate than
structured information. This shift in the data
landscape creates an enormous opportunity—
but only to organizations that can harness
valuable insight from their data.
Intelligence derived from disparate sourcesNew technologies are making it much easier
to sift through and gain an understanding
of “human” information through automated
means. It is now economically feasible to
capture, store, and analyze volumes and types
of data that were previously too expensive to
manage, both in terms of infrastructure and
development costs.
Collection and analysis of a vast array of data
types gives agencies a real opportunity to
harness the potential of big data within their
enterprises. In particular, decision-makers can
gain increased situational awareness, as well
as increased capabilities to make fast, accurate
situational assessments and the informed
command decisions required in today’s digital,
always-on environments. The ability to derive
intelligence from disparate sources also
resolves many issues that ultimately improve
collaboration and information sharing across
entities and establish common protocols and
standards to integrate IT systems.
By leveraging analytic capabilities to automate
information flows and interrogate data elements
in order to discover patterns and anomalies,
actionable analytics platforms can bring this
information forward for easy consumption
and ready use. Along those lines, social media
sites can be monitored for sentiment analysis
and trends, along with automated video
forensics, to identify deviations from normal,
defined patterns, further providing decision-
makers with the kinds of
timely information and
intelligence they need.
Use case examplesOne example is leveraging
clickstream analysis
to improve citizen
engagement. Today’s
“digital citizen” expects
23U.S. Public Sector edition
to be able to get information and services
online. How do you get information to improve
the constituent experience? Government
agencies have leveraged HP’s Vertica Analytics
Platform and Hadoop to support faster, more
flexible analytics of their citizen interactions on
websites. This solution easily accommodates
the billions of rows of clickstream data
generated by site visitors. Agencies are better
equipped to make decisions to improve their
website functionality and architecture and tailor
website interactivity to the needs of individual
visitors, delivering a more precise constituent
experience. This, in turn, enhances constituent
satisfaction and improves public trust.
In public safety, police departments have
leveraged big data analytic solutions to
better understand and use social media to
improve police operations and better engage
the community. Cameras, live video feeds,
sensors, and social media data are combined
and analyzed to enable informed choices for
how to deploy resources and adjust to changing
conditions. Police can also more effectively
engage the community by accurate analysis of
social media sentiment and emerging issues.
HP helped the City of Anaheim, California bring
together critical information from the city’s fire,
police, and other departments into a modern,
active portal. Authorized decision-makers have
anywhere, anytime access to the information
in a visually rich interface that enables them
to make actionable decisions in applying
assets and resources to manage and respond
to critical events.
When a state public health organization
needed up-to-date information on the
potential for pandemics that would affect
their citizens and visiting tourists, HP helped
them to utilize technologies that enabled
them to correlate atypical data sources, such
as elementary school health records, with
pharmacy information to predict outbreaks
of serious illness. Health officials could get
ahead of the situation by communicating
with citizens on healthcare directives.
They could proactively issue public health
recommendations and direct resources to
minimize impact on the population.
Where to startThe key is to understand what information can
be brought together and analyzed to achieve
better outcomes. This does not mean that
expansive programs need to be designed,
developed, and implemented before you
can derive insights from your data. Rather,
consider piloting analytics through a data
discovery process. Data discovery allows you
to focus on a few smaller areas in which to
test out hypotheses and gain insights using
available information whether it is machine
friendly or human information, like social
media or call center conversations.
HP has helped customers understand how
citizens are reacting to newly proposed
legislation by looking at public response and
feedback in interactive forums. We are helping
public entities to identify and prevent fraud
and abuse in public health programs, saving
24 U.S. Public Sector edition
millions to programs and taxpayers. Our
data scientists use a wide range of detection
capabilities, including predictive modeling
and complex data mining, by applying the big
data tools best suited to derive insights. This
type of discovery can then become part of
the ongoing process to inhibit abuse and can
increase profitability through recovery of past
overpayments and reducing the risk of issues
through strengthened policies.
HP is the world leader in actionable analytics HP has dedicated practice for Analytics and
Data Management, which is a services center
of excellence that is part of HAVEn, the
industry’s first comprehensive, scalable
open, and secure platform for big data.
The HAVEn technology stack includes
proven technologies from HP Software,
including Autonomy, Vertica, and ArcSight.
HAVEn also extends HP technologies with
key industry constructs such as Hadoop.
Within HP Enterprise Services, there is a
broad range of services and workshops like
the Big Data Discovery Experience (BDDE)
offering which helps you know where to
start as well as accelerate your ability to
derive value from big data to reduce costs,
improve efficiencies, and reduce risk. With
BDDE, you can use our market-leading HAVEn
platform as a service, and combine that with
25U.S. Public Sector edition
our expertise in analytics in order to test
hypothesis right away to reach actionable
insights quickly. In addition, HP maintains
a use case library that gives customers a
way to start, to see what is possible with
big data. Together these modular solutions
provide the capability to handle 100 percent
of enterprise data-structured, unstructured
and semi-structured-and securely deliver
actionable intelligence from that data in real
time. Only HP has the breadth of portfolio
across infrastructure, software, services and
partnerships to provide you with the right
choice of offerings to enable you to harness
the value of your information.
Learn moreHP has helped government and education
organizations across the globe to leverage
big data analytics to make informed decisions
to maximize results, conserve resources,
and prevent fraud and abuse. Our team has
evolved infrastructures, provided training to
expand skills, and delivered services so that
governments can successfully include big
data analytics to yield insights to drive better
decision-making. The data landscape will
only continue to grow and become even more
complex, and leveraging big data analytics is
widely understood as a new imperative.
For more information, visit hp.com/go/bigdata.
Diana M. ZavalaDirector, Information
Management & Analytics
HP Enterprise Services, U.S. Public Sector
26 U.S. Public Sector edition
Risk and threat mitigation for cyber-dependent operationsMany of our government, military, and commercial enterprises have leveraged Internet and communications technology efficiencies to the point where we have transitioned our operations from cyber-enabled to cyber-dependent. This era of cyber-dependency presents many advantages; however, it brings not only a host of vulnerabilities, but an increasingly severe set of operational, financial, and privacy risks for the organization.
Up to now, most organizations have aimed for
100% security solutions through cybersecurity
regulation, periodic compliance monitoring, and
devoted efforts to block, patch, and mitigate
exploitations within increasingly tight timelines.
While these maintenance and administrative
activities provide a solid foundation, the reality
is that every risk cannot be eliminated. In view
of these residual risks, organizations must also
conduct operational cybersecurity activities to
assure essential enterprise functions in the face
of ongoing and potent malicious activity. Today’s
most proactive enterprises are employing
advanced security technologies to deliver
adaptive perimeter controls, advanced warning
about threats and attacks, and intelligence
about the extended cyber-threat landscape.
In this new IT landscape, it is increasingly critical
to correlate cybersecurity efforts directly to core
business processes. Simply put, government
and academic institutions need to implement
trustworthy cybersecurity solutions to enable
them to mitigate operational risk and develop
an operational plan that prioritizes what to
protect and how to operate if portions of their
protection capabilities are breached. HP is a
leader in building, protecting, and operating
resilient enterprise networks for the world’s
most complex environments.
Integrating security into everyday operationsCyberspace has developed into a domain of
operational concern for public sector leaders
and their information security practitioners.
The risks in these environments often outstrip
27U.S. Public Sector edition
fundamental efforts to standardize operations
and detect/prevent threats to data, systems,
and facilities. Accordingly, public sector
enterprises with large-scale cyber-dependent
missions have additional requirements for
mission-integrated cyberspace planning,
governance, execution, and control processes.
Command centers charged with monitoring
operations often fall short in these areas
because current solutions do not provide
sufficient insight into the comprehensive
operational picture, which includes and
depends upon cyberspace. It is no longer
enough to demand “built-in” vs. “bolted-
on” security; today’s built-in security must
integrate with everyday operations to address
persistent threats in the context of essential
enterprise functions. Some of the biggest
challenges today’s organizations face involve
understanding current security investments in
relation to their business or mission outcomes,
objectively monitoring the effectiveness of their
cybersecurity programs, and implementing
mechanisms to fluidly control their security
posture relative to the value of the business
operations they are protecting.
Taking a piecemeal vs. holistic view of cybersecurityA common mistake many organizations make
is approaching security in a piecemeal fashion.
There’s a breach, they fix it; they are told
they need another firewall, and they buy one.
Overlapping, reactionary purchases without an
underlying plan for operations can be costly at
best, dangerous at worst. Given the evolving,
dynamic nature of today’s threat, organizations
can’t possibly shield themselves solely through
reactive operations and additional security
investment. Instead, they must move beyond
a strong foundation of compliance and provide
holistic capabilities to dynamically protect what
truly matters in the mission/business context
of that organization.
We can’t protect what matters until we
first identify what matters. Organizations
can take proactive measures to align their
security program with business objectives
by understanding the information produced
and available through systems they already
have, then planning and implementing the best
mission-integrated security possible for that
28 U.S. Public Sector edition
environment. To leverage their information for
improved operational situational awareness,
organizations need to be able to answer
questions such as:
• What resources do I have, what’s their
status, and how are they connected?
• What contractual, logistical, and cyber
connections between customers,
partners, and suppliers do I need to
understand and protect?
• How can I recognize active developing issues
before they impact my critical operations?
• What combination of internal and external
information sources will provide proactive
insight to the nature and business impact
of probable attacks, vulnerabilities, or failures?
• How does the organization know if
my critical processes are under attack
or operating in failure modes?
• When critical processes are affected:
When did the problem start? Who or what
is causing the problem? What are my options
to operate through disruption? How are my
remaining resources impacted?
Leveraging a framework for situational awareness, information sharing, and controlOrganizations can use their knowledge of
cyberspace to make sound operational decisions
about their critical business functions. When
a natural disaster or malicious attack occurs
in cyberspace, these organizations have
enough awareness of the internal and external
environment to recognize that a change has
occurred and to implement alternative courses
of action for critical enterprise functions.
The proactive approach to mitigating process
risk requires an awareness of your own assets,
any partners’ assets, and the cyberspace
environment at large. These operational insights
enable organizations to understand their security
investments and how best to deploy them toward
protecting critical mission processes. Information
sources—internal (your own network) and
external (information feeds purchased from
HP Leadership• Gartner Magic Quadrant leader for Security Information and Event Management
• Gartner Magic Quadrant leader for Application Security Testing
• Gartner Magic Quadrant leader for Intrusion Prevention Systems
29U.S. Public Sector edition
commercial providers or accessed as shared
information from government partners)—can
be integrated into an operational picture of the
enterprise environment. Decision-makers
can then see beyond their own boundaries,
enabling them to proactively engage as
situations change.
Proactive organizations seeking to evolve
their practice of operational cybersecurity may
employ a simple maturity framework to guide the
development of their systems, processes, and
personnel. Starting with tracking the deployed
enterprise configuration in real time, this
framework drives the development of resources
and skills to fully understand the environment in
which the enterprise operates. Finally, applying
an integrated set of business rules and resources,
leaders can manipulate dynamic components of
the enterprise to proactively mitigate internal and
external circumstances before they disrupt cyber-
dependent processes. Operational milestones
in the framework include:
• Enumeration: Accounting for the
components, configuration, and
connections within the enterprise.
• Visualization: Providing a static
visual representation of assets and
their logical/physical relationships
to critical mission resources.
• Cognizance: Understanding the real-time
cyberspace environment (both internal and
external) to gain insight into usage patterns,
general malfunctions, and malicious activity
as it impacts the deployed critical enterprise.
• Situational awareness: Applying mission/
business data as an additional overlay to
cyberspace cognizance. This prepares the
organization to make mission-informed
decisions in the context of relevant physical,
topological, and administrative boundaries.
• Decision support: Monitoring business and
mission-planning activities and enabling
business rules to enforce operational policy
and enterprise configuration toward
full mission assurance.
HP is the world leader in delivering trustworthy networksHP partners with clients every step of the
way to ensure they have a comprehensive
understanding of the capacity, readiness,
stability, and flexibility of both their internal
and external cyberspace environment. We
take our clients through a process of building a
roadmap to develop and understand the security
posture of their enterprise. By taking a holistic
view, we help you establish priorities, figure out
where to start, and decide what investments
are required to gain the highest level of security
specific to your objectives, all while minimizing
duplication. Then we operate that environment
alongside you.
From the chip to the cloud, HP delivers a
comprehensive portfolio of cybersecurity
products and services enabling your enterprise
to prevent, detect, analyze, and mitigate the
cyber-threat. Whether designing your next
30 U.S. Public Sector edition
generation enterprise architecture or defending
critical infrastructure in the face of determined
adversaries, HP leverages powerful technology
to protect what matters to your mission.
• HP Atalla network security processors protect
sensitive data and prevent fraud in critical
financial transactions around the world.
• HP Fortify addresses application security
issues across the software development
lifecycle from static analysis to real-time
application protection.
• HP ArcSight provides a platform for
effective management and analysis
of cybersecurity at scale.
• HP Assured Identity enables value beyond
security by integrating trust through and
beyond the enterprise.
• HP TippingPoint next generation intrusion
prevention systems leverage advanced
research from DVLabs to protect your
enterprise boundary.
• HP Threat Central provides a collaborative
security intelligence platform that enables
community members to share threat data
and analysis.
Customer Example: Navy Marine Corps Intranet (NMCI)Through the Continuity of Services Contract
(CoSC), HP provides comprehensive IT services
to the Department of the Navy through the Navy
Marine Corps Intranet (NMCI), one of the largest,
most secure intranets in the world. We provide the
best assets possible, expertise on the IT operation
of those assets, industry-best software installation
and integration, regulatory compliance, and
monitoring and defense against network attacks.
In fact, we have implemented “fight-through”
operations that enable the Navy to perform
critical functions in the presence of ongoing
malicious activity.
NMCI provides an interoperable command and
control network needed for transitioning to a
net-centric environment. Today, the Department
of the U.S. Navy receives IT services via NMCI for
more than 800,000 military and civilian employee
accounts at more than 2,000 locations. NMCI
consolidated and standardized network operations
services, security, and user
assistance across every level
of command. Information
assurance compliance is
now enforceable. Users with
unique IT service needs are
accommodated by smart
customization of standard
components to generate
tailored solutions.
Results include:
31U.S. Public Sector edition
• The prevention of more than 80 million
network connection attempts per month
• The detection of an average
of 850 new viruses per month
• The blocking of approximately 35
million spam messages per month
• Integrated operation of NMCI network
operations centers, service desks, and server
farms enabling off-site storage, rapid service
and data restoration, and rapid response to
service delivery requirements in the event
of a real or potential disaster.
NMCI has helped the Department of the U.S. Navy
to sustain mission capability through real-world
challenges—and through it all HP has been there:
• 9/11 Pentagon reconstruction
• Hurricanes Isabel, Katrina,
Rita, Dolley, Gustav, and Ike
• 2004 Indian Ocean tsunami
• California wildfires
• 2009 Presidential Inauguration
• 2010 Haiti earthquake
• 2010 Tennessee floods
• 2011 Japan earthquake and tsunami
Learn moreHP helps organizations become better prepared
to execute their cyber-dependent enterprises
by operating alongside them. With the New
Style of IT, our innovation agenda and our
customers’ strategic agenda align so we can
create the most value and become your most
experienced partner. We’re with you every step
of the way.
To learn more about risk and threat mitigation,
visit hp.com/go/cybersecurity.
The U.S. Navy chose HP for cybersecurity and IT management solutions, including:• IT Asset Management
• Information Assurance
Asset Management
• Information Security
Compliance Monitoring
• Cybersecurity Operations
• Enterprise-scale Analytics
• Cyber Situational Awareness
• Business Process Analysis & Control
Al KinneyDirector, Cybersecurity
HP Enterprise Services, U.S. Public Sector
33U.S. Public Sector edition
Empower your mission with mobilityMany government leaders yearn for a connected world with user-friendly, personalized, seamlessly integrated, and secure mobile applications (apps) that provide ubiquitous and trusted access from any device. Mobility systems are the collection of IT services that can get you there. They enable end-user productivity from anywhere, allowing people to quickly and easily access information that helps them operate effectively and make business decisions.
When considering your mobility strategy,
it is important to look beyond the limitations
of individual devices. While all mobile devices
are good at the collection and dissemination
of information, the optimization of the mobile
experience occurs when you factor in the user,
their context, and the device they are utilizing.
In this article, we will review key issues,
considerations, and best practices to help
you successfully implement mobility
throughout your enterprise and further
empower your mission.
First and foremost, considerations around
mobility should be outcome-driven and focused
on the mission priorities. A mobile ecosystem
can help:
• Increase workforce productivity
• Improve citizen engagement and satisfaction
• Improve workflow automation and decision
support by providing relevant information
when teams need it, wherever they are
• Enable agencies to make informed decisions,
reduce service costs, and provide business
insight from analysis of interactions
It’s about the user experienceAt a basic level, mobility can extend
public services and transactions to reach
constituents and citizens wherever and
whenever they need these services to foster
public trust and relationships. Further,
smartphones and tablets enable richer, more
personalized government interaction. For
example, smartphone imaging capabilities
can help constituents more accurately convey
information to an agency, and geolocation
capabilities can provide precise coordinates
for enabling quick and effective service
fulfillment. Smartphone apps can enable
34 U.S. Public Sector edition
citizens to get up-to-the minute status of their
service requests, transactions, and even check
the current wait-time.
Where challenges and opportunities connectWith the introduction of new technology comes
a new opportunity. A great deal of data can
be generated through mobile transactions.
A common problem many government agencies
face revolves around how to transform this
data into actionable information and securely
disseminate it to the right people, at the right
time, in the right context. HP helps our clients
harness critical insights from their data.
Mobility is also no longer the sole domain of IT.
Through clickstream analysis and sentiment
analysis from the use of applications, mobile
apps can be designed to anticipate user behavior,
needs, and wants to provide a more efficient,
personalized experience. That means that
mission and communications teams today need
to now both be heavily involved in designing
systems or in defining system requirements
Mobility considerationsThere are several key questions to consider
when developing a mobile experience for
your organization:
• For whom are you designing
a mobile experience?
• What do they need to accomplish?
• How should the application look and feel?
• What features will most enhance
the service?
• How can you make the application
intuitively easy to use?
• How will you effectively support
a multitude of devices?
• How will you implement, manage, and
enforce compliance and policies as the
number and form of devices continue
to grow?
• How will you support a variety of
mission needs across the organization?
• How will you ensure the end-to-end
security of your mobile application,
your connection, and your back-end
infrastructure?
• How will you ensure the functional
quality and performance of your mobile
applications?
• How will you ensure user adoption
of your applications through effective
software craftsmanship and new
analytics required for these modern
applications?
• How will you transform your
organizational processes to effectively
operate at mobile speed?
35U.S. Public Sector edition
to automate processes, drive employee
productivity, and satisfy citizen-facing mobility
interactions. It is increasingly important to
establish clear workforce roles and processes to
ensure that your mobility systems meet those
requirements and expectations.
The growing variety of devices, smartphones,
and tablets, along with the operating systems
that run them, also introduce a high degree
of complexity in making the “everything,
everywhere” mobility context possible. In
addition, users’ desire to “bring your own
device” (BYOD) to work places tremendous
strain on organizations. Many agencies have
significant policy and legal barriers, along with
enforcement procedures for their workforce
to securely access their networks via their
chosen mobile devices. Employees want
increased access and connectivity whether
their organization embraces BYOD policies
or not. And these devices, along with the data,
require sound policy and security guidelines.
Lastly, workforce mobility is moving beyond
simply offering access to email and calendars
to address workflow and productivity
components, including key enterprise
36 U.S. Public Sector edition
applications and organizational data. These
can be more challenging to address within
the mobility ecosystem due to the potential
for greater exposure across devices or cloud
services, and are often more difficult to secure.
Mobility dramatically increases the sum of
the different points of attack—the so-called
“attack vectors”—where an unauthorized user
or attacker can try to enter data or extract
data from an enterprise. To avoid exposure
from unsecured access or other vulnerabilities,
agencies must implement effective security
solutions that not only control mobile channels,
such as mobile phones, laptops, and tablets,
but also address:
• Data (who is accessing
what and from what device)
• What medium is being used (cell, Wi-Fi)
• Location (where access is being attempted)
37U.S. Public Sector edition
Recommendation: Eliminate random acts of mobilityMobility initiatives sometimes lack
coordination, with different teams moving
ahead with mobility initiatives on their own.
Uncoordinated strategies not only impact IT,
but can also result in poor user experiences.
For this reason, employees abandon nearly 60%
of mobile enterprise apps1, making it hard to
realize real business and mission value. Without
an organization-wide coordinated approach to
mobility, you may face similar challenges.
Recommendation: Start with the users and work backwardInstead of trying to wrap users around your
systems, start wrapping systems around the
users. The challenges are to:
• Set aside assumptions
• Work to understand what
users expect and need
• Ensure the ability and willingness of your
team/culture to quickly adapt to evolving
expectations and needs over time
The gathering and analysis of real data
can provide visibility into your users’ needs and
enable your organization to respond
to them quickly.
Recommendation: Understand mobility will push your architecture to the brinkInformation and content in the cloud is inherently
mobile and easily distributed across multiple
computing platforms, phones, tablets, laptops,
and anything else the network touches. However,
mobile interaction requires very different types
and sources of data and formats. The challenge
is enabling mobile initiatives while recognizing
that the patterns, standards, and platforms
that drive web interactions won’t work for a
mobility system. Many organizations try to push
a digital transformation and promote innovation
by opening access to mobility application
programming interfaces (APIs). The challenge
is to understand how to do this securely and
effectively, something that can be achieved by
letting data live through a managed approach
of mobile applications support.
Result: Making digital government a realitySome government agencies have
begun implementing successful digital
transformations, while others are now
beginning to strategize their course.
1 Mobiquity, Press Release, November 6, 2013, mobiquityinc.com/news/press-releases/2013/new-research-reveals-poor-user-experience-drives-nearly-60-percent-employee.
38 U.S. Public Sector edition
Throughout this process those who have
begun the transformation have often learned
to engage their users throughout design,
managing their data, thinking beyond the
device, and providing secure, seamless,
context-aware mobile experiences. This
paradigm shift includes:
• Cloud-enabled services
accessed by mobile devices
• Context-aware mobile applications that
interpret profile, preference, sentiment, location,
and history from social media and big data
• Integration across multiple layers
of technology from device to people,
applications, and data
• Security across all layers of technology
including devices, applications, services,
storage, servers, and networks
For the enterprise to gain access to the real
advantages of the next generation of end-user
computing, it will not only need to rethink how
devices are employed to transform business
transactions, but also how the organization
must transform to enable the next-generation
mobile enterprise. The process should be more
revolutionary than evolutionary.
Why customers choose HP for mobility systemsHP offers the devices, infrastructure, network,
software, and service excellence to help you
create connected mobile environments for
improved business outcomes, workforce
productivity, and citizen engagement. We offer
platform-agnostic and integrated solutions
for the development and deployment of
mobile systems designed to optimize your IT
performance across both traditional and IT
mobile environments.
39U.S. Public Sector edition
Learn moreTo learn more, visit hp.com/go/usps-mobility.
Bryan CoapstickDirector, Mobile Innovation
HP Enterprise Services, U.S. Public Sector
41U.S. Public Sector edition
The New Style of IT in action: customer successesHP works with government organizations and education institutions across the world to leverage the New Style of IT to radically transform services and deliver results that matter. We bring the broadest portfolio of technology solutions, scale, and worldwide experience, along with a vast repository of lessons learned and innovations, both from the public sector and diverse global industries, to help you optimally deliver innovative and enhanced digital services to constituents. Below are a few examples that illustrate our commitment and results we delivered to several public sector clients.
Innovating and enforcing U.S. Department of Defense (DoD) cybersecurity in hostile environments and beyondFor more than a decade, DISA (the Defense
Information Systems Agency) Field
Security Operations (FSO) and HP have
partnered to ensure mission-critical military
communications flow securely for the DoD.
In this capacity, HP executes critical security
measures for DISA, ensuring DoD networks
are protected and compliant in both theaters
of combat and peacetime operations around
the globe. These security exercises include
network certification and accreditation and
Command Cyber Readiness Inspections (CCRIs).
HP also supports the Security Technical
Implementation Guides (STIGs) and Security
Requirements Guides (SRGs) that are used
as guidelines for CCRIs. In support of DISA’s
information assurance mission, HP continually
evolves the FSO security review program to
augment reviewer productivity, reduce costs
and deliver more comprehensive, impactful
review results.
Recently, HP security experts volunteered to
travel to hostile areas to perform key cyber-
readiness inspections on behalf of DISA. The
first part of this task order involved a CCRI
at an Army base in Afghanistan. While HP
performs hundreds of CCRIs a year for DISA,
this inspection posed unique challenges as the
base came under hostile fire during the visit.
Despite this challenge, the objectives of the
Cyber Command Task Order were successfully
42 U.S. Public Sector edition
met. Next, the team traveled to Kuwait, where
they performed certification and accreditation
on behalf of DISA for another Army installation.
Here, HP assisted the resident Army command
in its first steps toward the goal of operating on
a military network. To do so, the team provided
guidance on how to ensure the proper DoD
policies and procedures were followed. This
exercise was included in a DoD Information
Assurance Certification and Accreditation
Process (DIACAP) scorecard that is required
before a new location can receive the authority
to operate on a DoD network. HP also supports
the DISA security mission with the Assured
Compliance Assessment Solution (ACAS). This
innovative tool enhances the DoD’s ability to
detect IT system vulnerabilities, identify and
mitigate risk, and ensure improved and efficient
network security.
Cybersecurity support and mobile applications deliver efficiency for U.S. Army recruiters The U.S. Army and HP have partnered to
develop key applications and data center
services for Army personnel charged with
providing human resources management of
soldiers. These mission-critical applications
and services deliver capabilities that include
recruiting support, personnel management
and strength accountability, and real-time
personnel location data around the globe and
in theater. HP also provides cybersecurity
support to protect the Army’s network,
LandWarNet. HP has supported the Army
for over 25 years, delivering IT innovation to
ensure the Army achieves its mission.
To aid recruiters with better efficiency and
productivity while on the road, HP is also
working with the Army to develop a mobile
recruiting application. This mobile application
optimizes Army personnel readiness. In addition,
the Army and HP have partnered to develop a
mobile leads collection application that saves
money and ensures Army recruiters can
efficiently collect recruit data.
City of Anaheim engages HP to develop innovative mobile applicationsThe City of Anaheim needed a visionary
Internet solution to make government more
transparent and accessible to any resident
or business in order to stimulate economic
development, improve public safety, and
enhance quality of life while meeting a
budget reduction of $15 million.
Anaheim partnered with HP to transform
how the city operates and communicates.
The city’s Emergency Virtual Operations Center
(EVOC) is a first-of-its-kind, integrated, web-
based solution that set a national standard for
The public/private partnership between HP and the city of Anaheim delivers innovative, cost-efficient collaborative services to enhance public safety and quality of life.
43U.S. Public Sector edition
situational awareness tools for public safety.
Together, HP and Anaheim also developed two
mobile applications, one for real-time, integrated
emergency response to the field, and another for
bidirectional mobile communications.
HP’s long-term public/ private partnership with
Anaheim enables the city to do more with less.
The benefits of mobile applications include
better communication among city employees
and with citizens, less red tape, and a more
business-friendly environment for fostering
economic development.
Electronic records system transforms San Diego County court case recordsTo enable more efficient, cost-effective
management of juvenile court case records,
San Diego County collaborated with HP to design
an electronic records management system to
replace unwieldy paper-based processes.
System development was an enormous
undertaking. It had to accommodate over 1.3
million documents from numerous sources and
in numerous file formats. Multiple organizations
also needed their own unique portals with their
44 U.S. Public Sector edition
own secure document repositories. To address
usability concerns, HP took an iterative approach
that allowed attorneys to provide input. The
attorneys embraced the opportunity to partner
on the software’s design.
The resulting Justice Electronic Library System
(JELS) eliminates paper, supports more effective
case management, streamlines courtroom
proceedings, and enhances document security.
Another benefit is financial: it helps the county
allocate its budget dollars in ways that better
serve the community and has reduced annual
paper purchasing costs by $50,000.
HP team develops proof of concept to address the U.S. Department of Veterans Affairs (VA) need for medical appointment schedulingHP has a long history of supporting the VA
and its efforts to improve Veterans access
to care and quality of service. When the VA
challenged the technology industry with
developing innovative concepts for its complex
medical appointment scheduling needs,
HP answered with a winning architectural
proof-of-concept implementation. The
objective of the solution is to make it easy
for veterans to make appointments in order
to receive outpatient and ambulatory care. It is
engineered to help manage multi-site care and
support diverse care teams. It is also designed
to integrate with existing legacy VA systems
so it could be implemented efficiently into the
VA’s existing framework. We leveraged our
expertise maintaining and modernizing the
VA’s Electronic Health Record System (known
45U.S. Public Sector edition
as VistA), the innovative thinking of our HP
labs and our open source community expertise
to come up with a solution that optimizes
the coordination of people, resources and
capabilities in order to deliver better patient
encounters. In winning this challenge, HP was
able to provide valuable thought leadership to
the VA as they contemplate modernizing their
medical appointment scheduling capabilities.
For more information about HP’s solutions for
Public Sector and more customer references,
please visit, hp.com/go/usgov.
HP has a long history of supporting the VA and its efforts to improve Veterans access to care and quality of service. When the VA challenged the technology industry with developing innovative concepts for its complex medical appointment scheduling needs, HP answered with a winning architectural proof-of-concept implementation.
46 U.S. Public Sector edition
HP Enterprise Services quick factsHP helps governments and education organizations at all levels deliver superior public value by enabling them to:• Successfully achieve policy and mission outcomes
• Control costs and do more with less
• Meet quality expectations for citizen service
• Maintain the public’s trust
HP understands your unique mission, and can help address your key priorities and challenges. Leveraging our expertise in the public and private sectors, HP delivers innovative solutions that help you achieve critical outcomes.
95Providing security credentialing for 95+ federal agencies, boards and commissions.
80MNMCI (Navy Marine Corps Intranet) prevents more than 80 million unauthorized intrusion attempts per month.
47U.S. Public Sector edition
800,000The Navy Marine Corps Intranet (NMCI) interconnects more than 800,000 active servicemen, servicewomen and civilians at more than 2,000 locations in the continental United States, Hawaii and Japan, making it one of the largest intranets in the world.
40MHP-deployed voter registration and election management systems provide service to more than 40 million voters in the United States.
1MCustomers use HP’s retirement systems to generate more than 1 million benefit checks per month.
30 yearsThe Defense Information Systems Agency (DISA) and HP have collaborated for more than 30 years, delivering IT innovation and advanced capabilities to ensure DISA achieves its mission.
Take the next stepHP offers workshops and guidance on
comprehensive technologies and solutions
to enable you to fulfill your mission, leveraging
our best practices and global experience. We
stand ready to partner with you to navigate the
New Style of IT and help you achieve your goals.
Join our Communities:
Follow HP Enterprise Services on Facebook
Follow HP Enterprise Services on Twitter
Connect with HP Enterprise Services bloggers
Learn moreFor more information, visit hp.com/go/usgov.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft is a U.S. registered trademark of Microsoft Corporation.
4AA5-1311ENW, June 2014, Rev. 1
Rate this documentShare with colleagues
Sign up for updates hp.com/go/getupdated