recommended reading

Agencies saving one-fifth of IT budget through virtualization, survey finds

More than 80 percent of federal information technology leaders say their agencies have implemented some manner of server virtualization and, overall, the government is saving nearly 20 percent of its IT budget through virtualization, according to a recent survey.

The majority of federal agencies also plan to virtualize some desktop applications, but less than 10 percent expect to do so with all desktop components for all employees, according to the survey conducted by MeriTalk, a government IT industry group. The survey was sponsored by Microsoft and NetApp, a computer storage and software provider.

Virtualization essentially allows users to complete computer tasks with Web-based tools rather than physical ones. In the case of virtualized servers it means those servers are able to use deceptively simple hardware to do complex tasks. For virtualized desktops, workers can access Web-based versions of their desktop tools from a home computer, tablet or smartphone.

Server virtualization is a major component of the government's transition to cloud computing storage, which IT leaders say will save about $5 billion annually by 2015. It's also critical to a related plan to shutter or consolidate about 40 percent of the government data centers during the next several years.

Cloud-based computing systems will allow for virtual desktops, which telework advocates say will help employees be as productive at home as they are in the office.

About 37 percent of the federal IT workload today is done on virtualized servers and technology managers expect that to grow to about 63 percent by 2015, the survey found.

Among the greatest challenges to virtualization in the federal government are legacy systems that can't easily be worked into a virtualized network and a lack of available funds, respondents said.

The MeriTalk survey included about 300 federal, state and local government IT leaders. It had a margin of error of about 6 percent. Margins of error are notoriously difficult to calculate in federal IT surveys because the pool of respondents is small and responses can vary widely among different types of agencies.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.