Navy, Marines to Analyze Pentagon’s Cloud Email System

Navy CIO Terry Halvorsen speaking during a panel on cyber warfare

U.S. Naval Institute

AA Font size + Print

Navy CIO Terry Halvorsen speaking during a panel on cyber warfare

The service's top tech official says that his office plans to undertake an analysis before moving Navy and Marine Corps emails to the cloud. By Bob Brewin

The Navy plans to conduct a cost, security and performance analysis before it complies with a Pentagon directive to use a Defense Department email system, Chief Information Officer Terry Halvorsen told Nextgov.

In September, Defense CIO Teri Takai designated the Defense Enterprise Email cloud service operated by the Defense Information Systems Agency  as an enterprise service,  and directed all Defense components to develop a plan by January to shift email to the DISA cloud in October 2014.

Halvorsen, in an email statement to Nextgov, said he will conduct a business case analysis before he moves Navy and Marine Corps email to the DISA cloud. The two services treated email as a core service on their existing Navy Marine Corps Intranet, or NMCI, and the follow-on Next-Generation Enterprise Network. NGEN is slated to replace NMCI and serve 800,000 users in the spring of 2014.

 “The Navy adheres to the practice of requiring a business case analysis before making investment decisions,” Halvorsen said.

The service will explore “available alternatives — including DISA Enterprise Email — to find the most cost-effective means to provide email service. The business case analysis will consider cost, mission, security and system performance related to the various solutions to determine which offers the necessary security and service at the best price.”

Warren Suss, president of Suss Consulting, said “this seems like a reasonable approach to me, as the Navy needs to determine the costs of a transition [to the DISA cloud]. There is no question that it will be costly and painful.”

The Army moved 1.43 million unclassified email accounts and 115,000 classified accounts to DEE in August. Service officials said they expected to save $76 million this year and $380 million through 2017 from the shift.

The Navy built email into the $3.5 billion NGEN contract awarded to HP Enterprise Services in June The contract is back on track after the Government Accountabilty Office denied a protest by Harris Corp. Suss said the Navy will need to negotiate a change order with HP if it moves email from NGEN to the DISA cloud, yet another cost.

Cultural factors and “branding” issues also play a role in the shift to the DISA cloud as users end up with a plain “mail.mil” email address rather than a “navy.mil” or “marines.mil” address, Suss said. But these factors pale in comparison to the potential savings from enterprise email, Suss said.

The Air Force also has concerns about the price of enterprise email. The Air Force said on Oct. 2 that it planned to move 150,000 classified email accounts to the DISA cloud as it will provide “significant operational efficiencies,” but Gen. William L. Shelton, who heads the Air Force Space Command, said the service still has concerns about the cost of moving unclassified email to the cloud.

DISA started work on a Defense-wide e-mail cloud in June, 2011 when it signed a contract with Microsoft for Army email software “scalable to support the 4.5 million DoD user personas, which are actual user accounts and other defined entities such as group email addresses, which are required by Exchange.” 

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download
  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Top 5 Findings: Security of Internet of Things To Be Mission-Critical

    As federal agencies increasingly leverage these capabilities, government security stakeholders now must manage and secure a growing number of devices, including those being used remotely at the “edge” of networks in a variety of locations. With such security concerns in mind, Government Business Council undertook an indepth research study of federal government leaders in January 2017. Here are five of the key takeaways below which, taken together, paint a portrait of a government that is increasingly cognizant and concerned for the future security of IoT.

    Download
  • Coordinating Incident Response on Posts, Camps and Stations

    Effective incident response on posts, camps, and stations is an increasingly complex challenge. An effective response calls for seamless conversations between multiple stakeholders on the base and beyond its borders with civilian law enforcement and emergency services personnel. This whitepaper discusses what a modern dispatch solution looks like -- one that brings together diverse channels and media, simplifies the dispatch environment and addresses technical integration challenges to ensure next generation safety and response on Department of Defense posts, camps and stations.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download

When you download a report, your information may be shared with the underwriters of that document.