U.S. Public Sector/State and Local Government
State and local governments are turning to as-a-Service (aaS) consumption models for many of the same reasons as the Private Sector. Cloud technologies and architectures empower agencies to:
● Enable more agile achievement of agency missions
● Address technical debt and gain access to ongoing commercial innovation
● Unlock additional IT value by integrating IT efforts and investments to deliver needed mission-impacting capabilities
● Handle and analyze growing volumes of data to support data-driven policies and operationalization of data
When dealing with cloud applications, the leading metric for success and productivity is user experience. So it’s not surprising that while 30 percent of IT Departments say they have hit roadblocks with their cloud efforts in delivering business and mission value, even more are concerned about delivering a quality cloud user experience. Now, more than ever, your agency’s network is critical to your organizational and mission success.
At the state and local level, agency networks must also be able to support the growing number of hyper-distributed applications provisioned across Virtual Machines (VM), containers, and bare-metal hardware throughout data centers and clouds. Applications, Internet of Things (IoT) sensors, and Artificial Intelligence/Machine Learning (AI/ML) engines all generate hyper-distributed data that needs to be processed in the cloud, on the premises, and at the edge. So agencies are leveraging multicloud deployment models (private, public, community, and hybrid) to deliver best-fit services for their users and accelerate their digital transformation journey.
A key prerequisite for enabling successful cloud adoption is a network’s readiness to support architectural shifts, driven by cloud and other disruptive technology vectors (including IoT, AI/ML, and big data). Cloud-ready networks enable state and local governments to deliver innovations to meet the evolving expectations of citizens and businesses.
Today’s network requirements for state and local governments are experiencing a fundamental shift as the traditional model of accessing highly centralized resources is coupled with the need for a distributed, decentralized architecture. This shift is driven by two key factors:
● Centralized cloud computing models where IaaS, PaaS, SaaS, and other Cloud Solution Provider (CSP) hosted services are consumed from public and community clouds
● Rapid growth of edge devices and the distributed architectures that enable them to process data locally as well as communicate and share resources with other edge devices
The upsurge of edge devices and the distributed architecture to support them has given rise to a distributed architecture that brings the core building blocks of cloud (computing, storage, and networking) closer to the edge. Where latency and bandwidth constraints exist, agencies will leverage edge computing. In some cases, they leverage both an edge computing model (for real-time data processing) and a centralized cloud computing model (for heavy processing).
To facilitate their cloud journey and reduce risks, state and local government agencies will need a cloud-ready network able to support both centralized cloud and distributed architectures comprised of private, community, public, and hybrid clouds. This cloud-ready network must ensure access to the cloud across an agency’s existing campus, Local Area Networks (LAN), Wide Area Networks (WAN), and data centers as well as over broadband and 4G/5G environments.
Traditional hub-and-spoke network architectures are designed to support applications and services hosted at centralized “Demilitarized Zones” (DMZs) and data centers. This layout forces the backhaul of internet traffic through the DMZ, creating inefficient traffic routes that increase the distance between the end user and application. Today, most agencies still rely on this approach, backhauling traffic destined for off-premises IaaS, PaaS, and SaaS services through a trusted, central connection point.
But the reality of today’s state and local government network landscape, with an ever-growing influx of data and devices, is pushing the limits of hub-and-spoke networks. Traditional network designs are increasingly unable to support the edge-to-cloud shift of internet traffic, making it nearly impossible for networks to keep up. This is especially true in areas like transportation and public safety.
Agency branch office or mobile users are increasing online collaboration through the use of SaaS applications like Webex and Office 365, or other cloud services. Branch-based end users are also consuming more and more bandwidth-intensive cloud-hosted applications. In this scenario, two common approaches are available to address IaaS, PaaS, and SaaS performance challenges:
● Decentralize and deploy multiple internet exits
● Provide high bandwidth connectivity directly from the branch sites
However, the combination of security, complexity, and cost arising from the rigidity of traditional WAN technologies make these solutions impractical to implement on a large scale.
By providing an architecture that integrates routing, security, centralized policy, and orchestration, Software-Defined Wide-Area Networks (SD-WANs) enable agency branch offices and remote users operating government-furnished equipment to securely connect to applications by leveraging any combination of internet transport services (MPLS, cellular, or broadband). SD-WAN provides agencies the following advantages:
● Predictable application experience using multiple hybrid links with real-time steering based on Service Level Agreement (SLA) policies
● Zero Trust network security and segmentation
● Integrated security composed of enterprise firewall, intrusion prevention, advanced malware protection, DNS-layer enforcement, URL filtering, and antivirus
● Seamless public-cloud expansion and SaaS optimization
● Centralized management, zero-touch provisioning, and a high degree of automation
● Rich analytics for visibility, troubleshooting, and planning
● Highly scalable solution able to scale to 10,000+ locations
With SD-WAN, state and local agencies can build a scalable, carrier-neutral WAN infrastructure while also reducing WAN transport costs and network operational expenses. The technology provides a predictable end-user experience for cloud-hosted applications and supports a seamless, multicloud architecture with simplified operational experience, integrated security, and rich analytics.
Poor end-user experience is one of the top complaints when an agency adopts SaaS. This is often due to unpredictable SaaS performance when confronting the many dynamic changes in internet connectivity. SD-WAN solves these problems and enables an optimal SaaS user experience across all agency branches. It does this by creating multiple internet exit points and dynamically steering around bandwidth and latency issues in real time.
The SD-WAN fabric continuously measures the performance of designated SaaS applications through all permissible paths. For each path, the fabric computes a Quality-of-Experience (QoE) score that gives network administrators visibility into application performance. SD-WAN technology also takes into account when making real-time decisions about the best-performing path between the end users and the cloud SaaS application. State and local government agencies have the flexibility to deploy this capability in multiple ways based on their mission needs and security requirements.
Option 1: Direct Cloud Access from a Remote Branch
Agencies using single or multiple inexpensive broadband internet circuits at remote sites, can direct select traffic destined to a designated SaaS to break out directly to the Internet. Only trusted and critical traffic to the designated SaaS will be allowed through a secure local breakout, while all other Internet-bound traffic will follow its usual path.
Option 2: Cloud access through most Optimal Regional Hub/Carrier-Neutral Facility
For agencies that want their SaaS to employ a regional hub egress architecture, SD-WAN can help ensure the best possible path through the available regional hub infrastructure. For example, SD-WAN capabilities can be deployed to dynamically choose the optimal regional gateway for the agency’s Office 365 application traffic.
Option 3: Local Internet Access through Secure Web Gateways
Agencies can connect remote branches to the SD-WAN fabric using inexpensive broadband internet circuits and can apply differentiated security policies depending on the types of services to which users are connecting. Instead of sending all branch traffic to a Secure Web Gateway (SWG) or Cloud Access Security Broker (CASB), an organization may wish to enforce its IT security policies in a targeted manner by routing regular internet traffic through a SWG, while allowing performance-optimal direct connectivity for a limited set of sanctioned SaaS applications.
SD-WAN offers the capability to inject intelligence in the path selection based on applications, but more importantly, based on how well the application is performing over a given path in the WAN. State and local governments can leverage multiple benefits of SD-WAN as agency applications continue to shift to SaaS. Maximizing SD-WAN brings several key benefits:
● Multiple WAN transport paths, including cost effective Internet paths, to the regional data center
● With SaaS application intelligence at the agency branch, the SD-WAN edge router can make intelligent forwarding decisions, over those WAN paths that meet the applications’ Quality of Experience (QoE) requirements (Office 365, Amazon Web Services, Google G Suite, and others), improving overall end-user experience
● Application aware probing, to the cloud application, to measure loss/latency and application reachability from the various exit points
The application awareness that SD-WAN offers completely transforms the WAN from forwarding IP packets based on destination IP address/domain names, to forwarding based on application performance in the private data center, public cloud (AWS, Azure, Google, and others), and SaaS providers (Google, Cisco Webex, Microsoft Office 365, and more).
Applications are more dynamic and complicated than ever, with many parsed into services and microservices, often deployed across on-premises and off-premises cloud environments. Delivering an exceptional digital experience in a blended workload environment requires application and IT infrastructure teams to focus on what matters most: making certain that applications always perform, whether they’re deployed in traditional data centers or in complex multicloud environments.
Dynamic Workload Optimization
Agencies must be able to develop and deploy applications on the infrastructure that makes sense for their programmers, their users, and their budget. Agentless workload optimization management technologies can detect elements in an agency’s environment, from applications to individual components, and deliver a topological map of that environment and its interdependent relationships. This can empower agencies to quickly model “what-if” scenarios based on the real-time environment in order to forecast capacity needs accurately and make the right deployment decisions. Workload optimization management technologies can also automate the scaling of workloads, storage, and databases based on the level of comfort among IT personnel:
● Recommend (view only)
● Manual (select and apply)
● Automated (executed in real time by software)
Automated workload optimization can eliminate human error and free IT staff to focus on higher-value initiatives.
Learn more about Cisco’s Workload Optimization Manager Solution
Application Performance Visibility
In order to deliver consistently positive digital experiences, agencies will need to connect end-user experience and application performance to mission outcomes. A solution that can monitor, correlate, analyze, and act on application and mission performance data in real time, regardless of where the application is hosted (on-premises private, hybrid cloud, or off-premises CSP cloud) can enable developers, IT operations, and line of business owners to gain the insights needed to make mission-critical and strategic improvements.
Application performance monitoring solutions that leverage AI and ML to enable AI operations and cognitive operations can offer automated insights that allow agencies to avoid mission-impacting performance issues before they occur. In addition, they can perform automated root-cause analysis that expedites Mean Time to Repair (MTTR).
By leveraging workload optimization and application performance visibility solutions, agencies can replace sizing guesswork with real-time analytics and modeling, so they know how much infrastructure is needed for applications to keep pace with mission demand. Gaining insights through these solutions will allow agencies to adopt a proactive approach to IT operations and stay focused on citizen experience and mission impact.
Software-defined networking can facilitate the application agility and data center automation required to accelerate cloud adoption. An application-centric infrastructure enables simplified operations, automated network connectivity, consistent policy management, and visibility for multiple on-premises data centers and for public clouds or multicloud environments. This infrastructure also offers agencies the flexibility to move applications seamlessly to any location or cloud while maintaining security and high availability.
Furthermore, an application-centric infrastructure captures mission and user intents and translates them into native policy constructs for applications deployed across bare-metal, virtualized, containerized, or multicloud domains. This common policy and operating model can drastically reduce both cost and complexity associated with managing multicloud deployments.
DevSecOps and Containers
IT is now moving towards shorter and more iterative application development cycles, with a focus on delivering mission needs. This is leading agencies to adopt Development, Security, and Operations (DevSecOps) methodologies that enable development, security, and IT teams to work more closely and collaboratively. In parallel with DevSecOps models, containers and microservices are being adopted as the building blocks of today’s software development. This is the preferred path for both new application development and application modernization projects.
Containers, which encompass the operating system, libraries, and anything else that the application needs, offer a lightweight, portable way to bundle applications. This isolation brings portability, standardization, and flexibility to development environments; applications are decoupled from the platform, so containers can move from platform-to-platform or from cloud-to-cloud without modification to the application. With containers, developers can spend less time debugging and assessing differences between environments and more time on development.
The benefits of cloud increase exponentially when organizations bring together containers and DevSecOps (a lightweight means of virtualizing applications with a methodology to join siloed IT teams). For organizations making this transition, one of the biggest challenges is maintaining common and consistent environments throughout an application’s lifecycle, from development through deployment.
To address this challenge, agencies will need hybrid-cloud architectures that deploy applications across on-premises and cloud environments in a secure, consistent manner. The supporting hybrid architectures must be tested and validated, as well as deliver consistent container clusters both on-premises and in the cloud, leveraging the best attributes of each.
Agencies that can extend on-premises capabilities and resources to the cloud, and that can also utilize services and resources from the cloud on-premises, will reduce the burden on their IT teams with respect to people, processes, and skill sets. This can then accelerate the application deployment cycle, resulting in faster innovation and increased agility.
Zero Trust Architecture
To better protect government’s networks, infrastructure, and data from growing digital threats, state and local agencies are moving toward a Zero Trust network architecture based on a “verify and never trust” approach. Tenacious attackers and malicious insiders can penetrate perimeter-centric defenses, so the Zero Trust model is centered around one guiding principle: security must extend throughout the network, not just at the external perimeter.
Effective security depends on total visibility of your agency’s network environment. To enable this, Zero Trust focuses on five key elements.
● Eliminating unauthorized network trust: Assume all traffic, regardless of location, is a potential threat until it is verified (inspected, authorized and secured)
● Segmenting network access: Adopt a least-privileged strategy and strictly enforced, granular controls so users have access only to the resources needed to perform their job
● Gaining visibility and analytics: Continuously inspect and log all traffic both internally and externally, using real-time protection capabilities, to monitor for malicious activity
● Acting, ideally in real time: When anomalous activity is detected in order to limit threat impact and optimally manage risk
Network segmentation and visibility remain critical, yet users also access workloads hosted outside of an agency’s network. As a result, agencies must take a holistic approach and extend their Zero Trust approach to their workforce, workloads, and entire workplace.
● Zero Trust Work Force: Users and devices must be authenticated. Plus, access and privileges must be continuously monitored and governed. Users must be protected as they interact with the internet
● Zero Trust Workplace: Access must be controlled across the entire workplace, including the cloud and edge. This is critically important as greater use of IoT and machine-to-machine sensors are becoming increasingly critical to successful agency mission and business outcomes
● Zero Trust Workloads: Granular access control must be enforced across the entire application stack, including connections between containers or hypervisors in the cloud as well as traditional agency data centers
In addition to your current Cisco networking infrastructure, we offer security capabilities that can be leveraged to help your agency achieve Zero Trust, including:
As state and local governments push forward with digital transformation, cloud-ready networks are essential to enabling improved citizen experiences, increased productivity, and better mission outcomes.
Cloud-ready networks provide simplicity, adaptability, automation, security, and application-awareness. These capabilities are key to supporting the new world of government IT, where applications are deployed across multi-cloud environments and data is created and processed across the edge to cloud continuum.
Building on a solid Cisco architecture that leverages government’s broad existing investments can help your agency accelerate citizen-facing innovation and enhance security as you move to a Cloud Native, Zero Trust world.