Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Department of Defense Projects to Use More Open Source Cloud Technologies

Red Hat Partners with SAIC to Deliver Open Source Cloud Computing Solutions for U.S. Department of Defense

The U.S. Department of Defense will soon be running more projects on open source cloud computing technologies, thanks to a partnership between Red Hat and Science Applications International Corporation (SAIC), a technology contractor with many government and defense agency customers.

Red Hat Partners with SAIC to Deliver Open Source Cloud Computing Solutions for U.S. Department of Defense

The U.S. Department of Defense will soon be running more projects on open source cloud computing technologies, thanks to a partnership between Red Hat and Science Applications International Corporation (SAIC), a technology contractor with many government and defense agency customers.

Red Hat LinuxSAICOpen source giant Red Hat recently teamed up with SAIC to increase the use of open source cloud computing technologies in projects for the Department of Defense, in an effort to deliver solutions that maximize security, scalability, interoperability and portability. Overall, the collaboration aims to help DoD customers overcome the barriers to cloud adoption, reduce infrastructure and provide increased capabilities.

SAIC will utilize a number of solutions from Red Hat in DoD related projects, including Red Hat Enterprise Linux, JBoss Enterprise Middleware, Red Hat Enterprise Virtualization, and Red Hat CloudForms. Additionally, Red Hat’s OpenShift Platform-as-a-Service (PaaS) will be deployed in SAIC’s Advanced Computer Engineering (ACE) Laboratory located in North Charleston, South Carolina.

SAIC’s ACE Laboratory will serve as the foundation for an open community, providing physical and virtual environments for hands-on collaboration between SAIC, other contractors, small businesses, information technology vendors and government employees.

The ACE Lab aims to foster collaboration and information sharing, promote cloud computing best practices and deliver low-cost, enterprise-scale “create once, optimally manage and reuse often” solutions.

The ACE Laboratory will help collaborators learn how to integrate Red Hat’s open technology portfolio across physical servers, virtual platforms and private and public cloud architectures.

Organizations working to develop and implement a cloud strategy can gain the knowledge and practical experience needed to select open source components for private Infrastructure-as-a-Service (IaaS), develop applications using PaaS and achieve mission and business objectives by delivering and consuming Software-as-a-Service (SaaS).

Advertisement. Scroll to continue reading.

“Red Hat has a longstanding relationship with SAIC to provide open source technologies and methodologies on large programs in the federal government, dating back to our first master marketing agreement in 2006,” said Paul Smith, Red Hat’s vice president and general manager of public sector. “This most recent iteration capitalizes the widespread use by cloud providers of open source architectures to deliver services. Red Hat is a leading provider of supported, secure and scalable products for both IaaS and PaaS.”

“Using our ACE Lab, SAIC experts work with customers to develop advanced engineering solutions for some of our nation’s most significant cyber and software challenges,” said Jim Thigpen, SAIC senior vice president and business unit general manager. “With Red Hat on our team, we’re continually finding ways to use our expertise to help keep customers a step ahead of the curve when it comes to cloud computing.”

In March 2009, Vivek Kundra, the first-ever United States CIO, was tasked with improving efficiency while also making government data more available and useful to the public. Though he recently departed Washington to accept a fellowship at Harvard University, Kundra has left behind a legacy of IT reform, and initiatives like this and other cloud computing projects are a critical factor in improving efficiencies in government IT across all sectors.

With over 41,000 employees, SAIC provides services to all branches of the U.S. military, agencies of the U.S. Department of Defense (DoD), the intelligence community, the Department of Homeland Security and other government agencies.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...