Government Technology

New York Saves $30 Million With Statewide Security Solution


Solid State
Solid State

September 22, 2009 By

It's been said that a budget crisis is IT's time to shine. On the surface it may seem counterintuitive. But many argue that when the chips are down, technology solutions, if deployed appropriately, can drive efficiency and cut costs. However, as any public-sector IT veteran can attest, such a strategy can be a tough sell -- or, worse yet, the legislature has bought into technology as a viable solution to budget woes and starts issuing unfunded mandates to "do more with less."

Such was the situation in New York -- a state that, like most others, is in the midst of a budget meltdown. But even with severe financial woes, the business of government must go on. One job New York Deputy CIO Rico Singleton had before him was to improve the state's IT security. The challenge was to do it with a fraction of the money they'd spent on security in years past.

Securing a Deal

One approach many state agencies are taking to trim expenses is growing their mobile work force. Employees who work remotely don't need state vehicles, offices and a lot of the things that cost employers money. One thing they do need, however, is security for their mobile devices. So when Singleton was tasked with improving statewide IT security while also cutting costs, he had to factor in the mobile work force too.

Singleton started looking across the state at purchasing patterns that could be aggregated for enhanced buying power and economy of scale. During the state's annual technology planning process -- when agencies submit technology plans for the ensuing year -- IT security became the leading candidate for an enterprisewide overhaul, thanks in part to the New York State Office of Cyber Security and Critical Infrastructure Coordination having issued a requirement for encryption on all mobile endpoints.

According to Singleton, more than half the state's agencies had already standardized on McAfee security software. "So if you look at leveraging your current install base, and you see that they've already deployed in more than 50 percent of the agencies, then obviously there is a prime opportunity there to potentially leverage that value and savings," he said.


View Full Story


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers