Welcome!

Government Cloud Authors: Elizabeth White, Liz McMillan, Gopala Krishna Behara, Raju Myadam, Kevin Jackson

News Feed Item

IDC Government Insights Examines IT Spending at Department of Homeland Security

IDC Government Insights today announced a new report, Perspective: Department of Homeland Security – A Detailed Look at IT Spending, Key Contracts and Trends (Doc #GI247148), designed to provide a detailed look at the U.S. Federal Department of Homeland Security (DHS), including the department's many levels of information technology spending and IT project priorities. This new document provides details on how both mandatory and discretionary spending passes through the various DHS sub-agencies, and what impact this budgeting will have on IT planning and spending.

The Department of Homeland Security's spending jumped from roughly $5.5 billion in FY2012 to almost $5.7 billion in FY2013, with nearly $6.1 billion projected for FY2014. The FY2014 budget jump is marked by bringing some new systems online related to the department's Infrastructure Transformation Program, plus some increased investments related to the National Cybersecurity & Protection System (NCPS).

The new report examines how the DHS's budgeted information technology funds for this time period are spent on addressable markets (hardware, software, IT services) and non-addressable markets (staff salaries, data center operations, space and equipment rental, and more).The report also investigates:

  • How IT spending is targeted on specific systems and projects at the DHS;
  • What the major IT investment areas are across the department, especially related to specific programs; and
  • Where the IT investments fall from an enterprise architecture standpoint.

The report also includes a set of tables that highlight which IT vendors are the top contract winners both for IT and telecom solutions and for all types of purchased products and services. These tables also list which specific IT solutions are the biggest dollar targets within the DHS, and how this money is spent across old and new IT.

Highlights from the report include:

  • On average, most agencies spend roughly 75% of their IT dollars operating and maintaining existing systems. The other 25% is spent on installing or developing new systems or modernizing existing systems. However, DHS spends about 16.4% of its annual $6 billion IT budget on new systems and modernization – significantly below the federal government average. The department spends 83.6% of its IT budget on operation and maintenance of existing systems, which is above the federal average.
  • DHS has shown an ongoing willingness to adapt new technologies, such as mobile solutions and business process outsourcing. Yet, its IT progress has been slow in other ways, such as moving some solutions to the cloud. Of note, DHS currently spends about 1.2% of its IT budget on cloud computing, slightly lower that other agency averages, which hover around 2.3%.
  • DHS is a leader in integrating big data solutions. The agency collects and analyzes data from multiple resources and does significant data drilling related to pattern matching and entity analytics.
  • With an annual investment of nearly $2.2 billion, "IT Infrastructure Maintenance" is the department's top investment area. The next highest investment area, at over $743 million, is IT solutions focused on "Border and Transportation Security."
  • The top DHS IT contractor for FY 2013 was CSC, with contracts totaling $80.8 million. Many of those individual agreements are focused on CSC providing emergency priority telecommunications services and general cybersecurity services.
  • DHS spends much more money on guards (over $1 billion) than it does on most IT solutions.

"DHS has billions to spend on IT solutions. However, much of that money is already being dedicated to existing IT projects. This makes it difficult to identify the department's new spending opportunities," said Shawn McCarthy, Research Director, IDC Government Insights. "Vendors looking to sell to DHS need to review the difference between the agency's mandatory spending and its discretionary spending and the wide variety of program-level investments. Many vendors find that a quick way to approach DHS is to start doing business with a large systems integrator that already holds contracts with the department, giving vendors an immediate sales channel via the SI."

For additional information about this report or to arrange a one-on-one briefing with Shawn McCarthy, please contact Sarah Murray at 781-378-2674 or [email protected]. Reports are available to qualified members of the media. For information on purchasing reports, contact [email protected]; reporters should email [email protected].

About IDC Government Insights

IDC Government Insights assists government policy, program, and IT leaders, as well as the suppliers who serve them, in making more effective technology decisions by providing accurate, timely, and insightful fact-based research and consulting services. Staffed by senior analysts with decades of government and IT industry experience, our global research analyzes and advises on business and technology issues facing the Federal/Central and local/provincial Governments. International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology market. IDC is a subsidiary of IDG, the world’s leading technology, media, research, and events company. For more information, please visit www.idc-gi.com, email [email protected], or call 703-485-8300. Visit the IDC Government Insights Community at http://idc-community.com/government.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
"The Striim platform is a full end-to-end streaming integration and analytics platform that is middleware that covers a lot of different use cases," explained Steve Wilkes, Founder and CTO at Striim, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...