SYS-CON MEDIA Authors: Carmen Gonzalez, Sean Houghton, Glenn Rossman, Ignacio M. Llorente, Xenia von Wedel

News Feed Item

IDC Government Insights Examines IT Spending at Department of Homeland Security

IDC Government Insights today announced a new report, Perspective: Department of Homeland Security – A Detailed Look at IT Spending, Key Contracts and Trends (Doc #GI247148), designed to provide a detailed look at the U.S. Federal Department of Homeland Security (DHS), including the department's many levels of information technology spending and IT project priorities. This new document provides details on how both mandatory and discretionary spending passes through the various DHS sub-agencies, and what impact this budgeting will have on IT planning and spending.

The Department of Homeland Security's spending jumped from roughly $5.5 billion in FY2012 to almost $5.7 billion in FY2013, with nearly $6.1 billion projected for FY2014. The FY2014 budget jump is marked by bringing some new systems online related to the department's Infrastructure Transformation Program, plus some increased investments related to the National Cybersecurity & Protection System (NCPS).

The new report examines how the DHS's budgeted information technology funds for this time period are spent on addressable markets (hardware, software, IT services) and non-addressable markets (staff salaries, data center operations, space and equipment rental, and more).The report also investigates:

  • How IT spending is targeted on specific systems and projects at the DHS;
  • What the major IT investment areas are across the department, especially related to specific programs; and
  • Where the IT investments fall from an enterprise architecture standpoint.

The report also includes a set of tables that highlight which IT vendors are the top contract winners both for IT and telecom solutions and for all types of purchased products and services. These tables also list which specific IT solutions are the biggest dollar targets within the DHS, and how this money is spent across old and new IT.

Highlights from the report include:

  • On average, most agencies spend roughly 75% of their IT dollars operating and maintaining existing systems. The other 25% is spent on installing or developing new systems or modernizing existing systems. However, DHS spends about 16.4% of its annual $6 billion IT budget on new systems and modernization – significantly below the federal government average. The department spends 83.6% of its IT budget on operation and maintenance of existing systems, which is above the federal average.
  • DHS has shown an ongoing willingness to adapt new technologies, such as mobile solutions and business process outsourcing. Yet, its IT progress has been slow in other ways, such as moving some solutions to the cloud. Of note, DHS currently spends about 1.2% of its IT budget on cloud computing, slightly lower that other agency averages, which hover around 2.3%.
  • DHS is a leader in integrating big data solutions. The agency collects and analyzes data from multiple resources and does significant data drilling related to pattern matching and entity analytics.
  • With an annual investment of nearly $2.2 billion, "IT Infrastructure Maintenance" is the department's top investment area. The next highest investment area, at over $743 million, is IT solutions focused on "Border and Transportation Security."
  • The top DHS IT contractor for FY 2013 was CSC, with contracts totaling $80.8 million. Many of those individual agreements are focused on CSC providing emergency priority telecommunications services and general cybersecurity services.
  • DHS spends much more money on guards (over $1 billion) than it does on most IT solutions.

"DHS has billions to spend on IT solutions. However, much of that money is already being dedicated to existing IT projects. This makes it difficult to identify the department's new spending opportunities," said Shawn McCarthy, Research Director, IDC Government Insights. "Vendors looking to sell to DHS need to review the difference between the agency's mandatory spending and its discretionary spending and the wide variety of program-level investments. Many vendors find that a quick way to approach DHS is to start doing business with a large systems integrator that already holds contracts with the department, giving vendors an immediate sales channel via the SI."

For additional information about this report or to arrange a one-on-one briefing with Shawn McCarthy, please contact Sarah Murray at 781-378-2674 or [email protected]. Reports are available to qualified members of the media. For information on purchasing reports, contact [email protected]; reporters should email [email protected].

About IDC Government Insights

IDC Government Insights assists government policy, program, and IT leaders, as well as the suppliers who serve them, in making more effective technology decisions by providing accurate, timely, and insightful fact-based research and consulting services. Staffed by senior analysts with decades of government and IT industry experience, our global research analyzes and advises on business and technology issues facing the Federal/Central and local/provincial Governments. International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology market. IDC is a subsidiary of IDG, the world’s leading technology, media, research, and events company. For more information, please visit www.idc-gi.com, email [email protected], or call 703-485-8300. Visit the IDC Government Insights Community at http://idc-community.com/government.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...