Showing results for 
Search instead for 
Did you mean: 
Create Post

What’s Needed to Monitor and Secure Mobile Military Networks?

Level 13

By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering

Here’s an interesting article by my colleague Mav Turner. He explores aspects of maintaining performance and security of the Army’s Command Post Computing Environment.

The modern military landscape requires a network portable enough to be deployed anywhere, but as reliable as a traditional network infrastructure. As such, the Department of Defense (DoD) is engaged in an all-out network modernization initiative designed to allow troops everywhere, from the population-dense cities in Afghanistan to the starkly remote Syrian Desert, to access reliable communications and critical information.

The Army’s Command Post Computing Environment (CP CE), designed to provide warfighters with a common computing infrastructure framework regardless of their location, is a perfect example of mobile military network technology in action. The CP CE integrates a myriad of mission command capabilities into, as the Army calls it, “the most critical computing environment developed to support command posts in combat operations.”

Modern warfighters can’t take their entire network operations with them into theater, but they want to feel like they can. Increasingly, the armed forces are leaving their main networks at home and carrying smaller footprints wherever the action takes them. These troops are expecting the same quality of service that their non-tactical networks deliver.

Beyond Traditional Network Monitoring

The complexity of networks like CP CE can make network monitoring for government agencies more critical, but it also poses significant troubleshooting and visibility challenges. Widely distributed networks can introduce an increased number of elements to be monitored, as well as servers and applications. Administrators must be able to have an unfettered view into everything within these networks.

Monitoring processes must be robust enough to keep an eye on overall network usage. Soldiers in the field attempting to use the network to communicate with their command can find their communications efforts hampered by counterparts using the same network for video streaming capabilities. Administrators need to be able to quickly identify these issues and pinpoint their origination points, so soldiers can commence with their missions unencumbered by any network pain points.

Securing Distributed Mobile Networks

Security monitoring must also be a top priority, but that becomes more onerous as the network becomes more distributed and mobile. Soldiers already use an array of communications tools in combat, and the number of connected devices is growing, thanks to the Army’s investment in the Internet of Battlefield Things (IoBT). Distributed networks operating in hostile environments can be prime targets for enemy forces, which can focus on exploiting network vulnerabilities to interrupt communications, access information, or even bring the network itself down.

Traditional government cybersecurity monitoring tools must also be scalable and flexible enough to cover the unique needs of the battlefield. Security and information event management (SIEM) solutions need to be able to detect suspicious activity across the entire network, however distributed it may be. Administrators should have access to updated threat intelligence from multiple sources across the network and be able to respond to potential security issues from anywhere at any time. Wherever possible, automated responses should be put in play to help mitigate threats and minimize their impact.

Soldiers in combat require immediate access to information, which in turn requires a dependable and secure network. To achieve that objective, administrators must have a system in place that allows them to quickly address problems and bottlenecks as they occur. It can mean the difference between making right or wrong decisions. Or, in the most extreme cases, the difference between life and death.

Find the full article on C4ISRNET.

The SolarWinds trademarks, service marks, and logos are the exclusive property of SolarWinds Worldwide, LLC or its affiliates. All other trademarks are the property of their respective owners.

Level 16

Thanks for the write up.


Thanks for the write up.

Level 14

Thanks for the article! 

Level 20

I know a little about the command posts... we make something called CPOF- Command Post of The Future!  We've been doing it for years.

Level 15

Interesting article.  Enjoyed reading it and it did make me think about how things situations can translate into our mobile workforce and our mobile solutions.

Level 12

thanks for the writings