Welcome!

News Feed Item

IDC Government Insights Examines IT Spending at Department of Homeland Security

IDC Government Insights today announced a new report, Perspective: Department of Homeland Security – A Detailed Look at IT Spending, Key Contracts and Trends (Doc #GI247148), designed to provide a detailed look at the U.S. Federal Department of Homeland Security (DHS), including the department's many levels of information technology spending and IT project priorities. This new document provides details on how both mandatory and discretionary spending passes through the various DHS sub-agencies, and what impact this budgeting will have on IT planning and spending.

The Department of Homeland Security's spending jumped from roughly $5.5 billion in FY2012 to almost $5.7 billion in FY2013, with nearly $6.1 billion projected for FY2014. The FY2014 budget jump is marked by bringing some new systems online related to the department's Infrastructure Transformation Program, plus some increased investments related to the National Cybersecurity & Protection System (NCPS).

The new report examines how the DHS's budgeted information technology funds for this time period are spent on addressable markets (hardware, software, IT services) and non-addressable markets (staff salaries, data center operations, space and equipment rental, and more).The report also investigates:

  • How IT spending is targeted on specific systems and projects at the DHS;
  • What the major IT investment areas are across the department, especially related to specific programs; and
  • Where the IT investments fall from an enterprise architecture standpoint.

The report also includes a set of tables that highlight which IT vendors are the top contract winners both for IT and telecom solutions and for all types of purchased products and services. These tables also list which specific IT solutions are the biggest dollar targets within the DHS, and how this money is spent across old and new IT.

Highlights from the report include:

  • On average, most agencies spend roughly 75% of their IT dollars operating and maintaining existing systems. The other 25% is spent on installing or developing new systems or modernizing existing systems. However, DHS spends about 16.4% of its annual $6 billion IT budget on new systems and modernization – significantly below the federal government average. The department spends 83.6% of its IT budget on operation and maintenance of existing systems, which is above the federal average.
  • DHS has shown an ongoing willingness to adapt new technologies, such as mobile solutions and business process outsourcing. Yet, its IT progress has been slow in other ways, such as moving some solutions to the cloud. Of note, DHS currently spends about 1.2% of its IT budget on cloud computing, slightly lower that other agency averages, which hover around 2.3%.
  • DHS is a leader in integrating big data solutions. The agency collects and analyzes data from multiple resources and does significant data drilling related to pattern matching and entity analytics.
  • With an annual investment of nearly $2.2 billion, "IT Infrastructure Maintenance" is the department's top investment area. The next highest investment area, at over $743 million, is IT solutions focused on "Border and Transportation Security."
  • The top DHS IT contractor for FY 2013 was CSC, with contracts totaling $80.8 million. Many of those individual agreements are focused on CSC providing emergency priority telecommunications services and general cybersecurity services.
  • DHS spends much more money on guards (over $1 billion) than it does on most IT solutions.

"DHS has billions to spend on IT solutions. However, much of that money is already being dedicated to existing IT projects. This makes it difficult to identify the department's new spending opportunities," said Shawn McCarthy, Research Director, IDC Government Insights. "Vendors looking to sell to DHS need to review the difference between the agency's mandatory spending and its discretionary spending and the wide variety of program-level investments. Many vendors find that a quick way to approach DHS is to start doing business with a large systems integrator that already holds contracts with the department, giving vendors an immediate sales channel via the SI."

For additional information about this report or to arrange a one-on-one briefing with Shawn McCarthy, please contact Sarah Murray at 781-378-2674 or [email protected]. Reports are available to qualified members of the media. For information on purchasing reports, contact [email protected]; reporters should email [email protected].

About IDC Government Insights

IDC Government Insights assists government policy, program, and IT leaders, as well as the suppliers who serve them, in making more effective technology decisions by providing accurate, timely, and insightful fact-based research and consulting services. Staffed by senior analysts with decades of government and IT industry experience, our global research analyzes and advises on business and technology issues facing the Federal/Central and local/provincial Governments. International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology market. IDC is a subsidiary of IDG, the world’s leading technology, media, research, and events company. For more information, please visit www.idc-gi.com, email [email protected], or call 703-485-8300. Visit the IDC Government Insights Community at http://idc-community.com/government.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
CIOs and those charged with running IT Operations are challenged to deliver secure, audited, and reliable compute environments for the applications and data for the business. Behind the scenes these tasks are often accomplished by following onerous time-consuming processes and often the management of these environments and processes will be outsourced to multiple IT service providers. In addition, the division of work is often siloed into traditional "towers" that are not well integrated for cro...
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.
SYS-CON Events announced today that FalconStor Software® Inc., a 15-year innovator of software-defined storage solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. FalconStor Software®, Inc. (NASDAQ: FALC) is a leading software-defined storage company offering a converged, hardware-agnostic, software-defined storage and data services platform. Its flagship solution FreeStor®, utilizes a horizonta...
In most cases, it is convenient to have some human interaction with a web (micro-)service, no matter how small it is. A traditional approach would be to create an HTTP interface, where user requests will be dispatched and HTML/CSS pages must be served. This approach is indeed very traditional for a web site, but not really convenient for a web service, which is not intended to be good looking, 24x7 up and running and UX-optimized. Instead, talking to a web service in a chat-bot mode would be muc...
SYS-CON Events announced today that Column Technologies will exhibit at SYS-CON's @DevOpsSummit at Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Established in 1998, Column Technologies is a global technology solutions provider with over 400 employees, headquartered in the United States with offices in Canada, India, and the United Kingdom. Column Technologies provides “Best of Breed” technology solutions that automate the key DevOps principal...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today that AppNeta, the leader in performance insight for business-critical web applications, will exhibit and present at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. AppNeta is the only application performance monitoring (APM) company to provide solutions for all applications – applications you develop internally, business-critical SaaS applications you use and the networks that deli...
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud Security Alliance (CSA), developed the Certified Cloud Security Professional (CCSP) certification to address the increased demand for cloud security expertise due to rapid growth in cloud. Recently named “The Next...
The Art of DevOps provides a fun overview to help teams understand DevOps. Written in the style of the famous 6th century Chinese manuscript “The Art of War,” this eBook describes DevOps in the form of a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. It’s a fun read with valuable insights.
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...