By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering
Here’s an interesting article by my colleague Mav Turner. He explores aspects of maintaining performance and security of the Army’s Command Post Computing Environment.
The modern military landscape requires a network portable enough to be deployed anywhere, but as reliable as a traditional network infrastructure. As such, the Department of Defense (DoD) is engaged in an all-out network modernization initiative designed to allow troops everywhere, from the population-dense cities in Afghanistan to the starkly remote Syrian Desert, to access reliable communications and critical information.
The Army’s Command Post Computing Environment (CP CE), designed to provide warfighters with a common computing infrastructure framework regardless of their location, is a perfect example of mobile military network technology in action. The CP CE integrates a myriad of mission command capabilities into, as the Army calls it, “the most critical computing environment developed to support command posts in combat operations.”
Modern warfighters can’t take their entire network operations with them into theater, but they want to feel like they can. Increasingly, the armed forces are leaving their main networks at home and carrying smaller footprints wherever the action takes them. These troops are expecting the same quality of service that their non-tactical networks deliver.
Beyond Traditional Network Monitoring
The complexity of networks like CP CE can make network monitoring for government agencies more critical, but it also poses significant troubleshooting and visibility challenges. Widely distributed networks can introduce an increased number of elements to be monitored, as well as servers and applications. Administrators must be able to have an unfettered view into everything within these networks.
Monitoring processes must be robust enough to keep an eye on overall network usage. Soldiers in the field attempting to use the network to communicate with their command can find their communications efforts hampered by counterparts using the same network for video streaming capabilities. Administrators need to be able to quickly identify these issues and pinpoint their origination points, so soldiers can commence with their missions unencumbered by any network pain points.
Securing Distributed Mobile Networks
Security monitoring must also be a top priority, but that becomes more onerous as the network becomes more distributed and mobile. Soldiers already use an array of communications tools in combat, and the number of connected devices is growing, thanks to the Army’s investment in the Internet of Battlefield Things (IoBT). Distributed networks operating in hostile environments can be prime targets for enemy forces, which can focus on exploiting network vulnerabilities to interrupt communications, access information, or even bring the network itself down.
Traditional government cybersecurity monitoring tools must also be scalable and flexible enough to cover the unique needs of the battlefield. Security and information event management (SIEM) solutions need to be able to detect suspicious activity across the entire network, however distributed it may be. Administrators should have access to updated threat intelligence from multiple sources across the network and be able to respond to potential security issues from anywhere at any time. Wherever possible, automated responses should be put in play to help mitigate threats and minimize their impact.
Soldiers in combat require immediate access to information, which in turn requires a dependable and secure network. To achieve that objective, administrators must have a system in place that allows them to quickly address problems and bottlenecks as they occur. It can mean the difference between making right or wrong decisions. Or, in the most extreme cases, the difference between life and death.
SolarWinds solutions are rooted in our deep connection to our user base in the THWACK® online community.
More than 150,000 members are here to solve problems, share technology and best practices, and directly
contribute to our product development process.