recommended reading

Shared Services Can Be a Money Maker for Some Agencies

J Duggan/Shutterstock.com

Sharing services isn’t just a good way for federal departments to lower information technology costs, it’s also a way for underfunded agencies to scratch back some of their dwindling budgets by providing services to their peers, a Customs and Border Protection official said Monday.

CBP’s technology division has lost more than $600 million or about half its operating budget over the past four years as money has been shifted to pay for more border patrol officers, CBP Chief Technology Officer Wolfe Tombe said.

The only way Tombe’s office could absorb those cuts and continue to perform its mission was to ramp up shared services it could offer to other Homeland Security Department divisions for a “charge back” fee, he said.

CBP has developed infrastructure as a service and email as a service products for other Homeland Security divisions to purchase, he said.

Tombe was speaking during a panel discussion at the American Council for Technology and Industry Advisory Council’s annual Management of Change conference in Cambridge, Md.

Federal Chief Information Officer Steven VanRoekel launched a shared services strategy in May 2012. He has cited shared infrastructure for commodity IT -- such as computer storage, email and wireless services -- as one of the easiest ways for the government to cut IT costs.

Agencies also may be able to cut costs and earn revenue by managing community clouds, Tombe said.

He is especially interested in developing a shared law enforcement cloud, similar to an intelligence cloud being developed by the CIA and National Security Agency, he said. The cloud would be open to federal state and local law enforcement he said.

Storing information in computer clouds run by Amazon and other companies is typically cheaper for government agencies than storing information in on-site data centers because corporately run clouds can pack information more tightly and achiever larger economies of scale. Government-run clouds use essentially the same principle but at a smaller scale and can make it easier to share information between agencies.

Among the easiest ways to launch a shared service is with a newly adopted tool such as a learning management system that the Bureau of Alcohol Tobacco, Firearms and Explosives purchased to track training and education programs, ATF Chief Information Officer Rick Holgate said during the same panel discussion Monday.

A general lack of learning management systems across the Justice Department made it easier for other divisions to pick up the ATF system, he said.

“Those of us in DoJ who don’t have a strong capability can foresee moving to a shared capability much more readily than if we had something today we were heavily invested in, felt very strongly about or that was a highly capable environment,” Holgate said.

In other cases, Justice has divvied up shared services among divisions with specialized knowledge in a particular service such as ATF with email or the U.S. Marshall’s Service with property management systems, he said.

When the department tried to impose shared financial services tools from the top down, the effort was less successful, Holgate said.

“In an attempt to be accommodating to bureau-level or component-level differences the department allowed some of us to approach financial management in a way that didn’t necessarily maximize the benefit of the shared environment,” Holgate said. “We still retained a little bit of our distinct ways of doing financial management across bureaus which means that inherently the shared service is not quite as shared as it could otherwise be.”

(Image via J Duggan/Shutterstock.com)

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.