recommended reading

From the Cloud to Your Pentagon-Issued Phone


Defense officials are in the process of figuring out how to adapt Web-based collaboration tools into apps that can be accessed from any computer, including tablets and smartphones. 

The department is partnering with vendors so that as they develop cloud services, those programs can be accessed from mobile devices, Jennifer Carter, the top acquisition executive at the Defense Information Systems Agency, told Nextgov.

DISA already has begun to merge cloud and mobile with, for example, a cloud-based email service that can be accessed from smartphones. An app store in the works is expected to propel the convergence, Carter said. 

The idea is that, in the future, it should only take "a little bit more effort" to turn cloud offerings into mobile apps. Providers “are thinking about it ahead of time and then we can quickly house that into the mobile infrastructure that we’ve developed," she said. 

"We haven’t quite figured out exactly how that’s going to work, but want to do it in a way that allows us to leverage the DoD application development that stresses support for sharing -- so everybody doesn’t have to go in and develop their own app for something," Carter added. 

As of January, Defense's departmentwide mobile device program supported 16 apps and was in the process of screening more than 90 others. 

The Army and even some intelligence agencies are among the organizations that have switched to the Defensewide webmail service, Carter said. The application provides professional contact information, calendar sharing and secure mail exchanges.

More than 1.6 million military users, including, most recently, Air Force members, have access to the service, DISA officials said in February. At the time, officials intended to transition about 150,000 classified Air Force email accounts during the next several months. All military components must start shifting to the departmentwide mail service by the first quarter of 2015.

Nextgov earlier this year reported that the Marine Corps might use a commercial cloud service provider instead of the DISA cloud to host its version of the Global Combat Support System.

(Image via 3Dstock/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.