Government Technology

New York State Cuts Costs by Consolidating McAfee Contract



April 30, 2009 By

New York state consolidated all state and county IT security contracts with McAfee Inc. into one contract today. The move slashed costs, enabling compliance with mobile device encryption requirements from the New York State Office of Cyber Security and Critical Infrastructure Coordination. Agencies were supposed to have installed encryption on all mobile devices by Dec. 31, 2008. However, once that date passed, the New York State Office for Technology noticed a low compliance level.

"We discovered a lot had to do with the cost; agencies couldn't afford it. It was one of those unfunded mandates. Encryption was an expensive commodity," said Rico Singleton, deputy CIO of New York.

The state had already begun exploring a potential McAfee consolidation of antivirus software in September 2008. After December, IT leaders rolled encryption software into the consolidated contract it was developing.

"It was to put a contract in place to give the agencies the ability to acquire and deploy software that they had already made a decision to utilize to protect their infrastructure at a lower cost, while also giving them the ability to expand the use of it into other products," Singleton explained, offering encryption as an example.

New York purchased two software suites from McAfee called McAfee Total Protection for Endpoint Advanced and McAfee Total Protection for Data. The new contract cost $5.7 million for three years of service, representing a 75 percent "cost of ownership" savings, compared to the cumulative costs of the various independent contracts with McAfee, Singleton said. His team got the 75 percent figure by calculating how much this current crop of services would have cost if purchased through the numerous prior contracts.


View Full Story


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
View All

Featured Papers