Cutting Costs Cutting CostsCutting Costs
Inside the effort to improve the efficiency of federal operations.

VA Plans to Move 600,000 Employees to Cloud Email

ARCHIVES
Jozsef Bagota/Shutterstock.com

The Veterans Affairs Department plans to move 600,000 employees and contractors to Microsoft’s cloud-based email and calendar system over the next five years, the vendor managing the transition said Tuesday.

VA will pay HP Enterprise Services $36 million to manage the transition to Microsoft’s Office 365 for Government, HP said in a press release. The first phase of the transition will involve moving 15,000 employees to the cloud-based system, HP said.

“VA is moving to cloud-based email and collaboration as part of a broader effort to leverage emerging technologies to reduce costs, increase efficiencies and, most importantly, improve service delivery to our nation’s veterans,” Charles De Sanno, executive director of VA’s Enterprise Systems Engineering group, said in a statement.

VA will join numerous other agencies that have already begun or completed the move to cloud email, including the General Services Administration and the Agriculture and Labor departments.

GSA established blanket purchase agreements with 17 cloud email vendors in August, hoping to save time and money for future agencies making the transition. Those vendors mainly offer email systems managed by Microsoft and Google. They also offer Domino Web, an IBM system, and Zimbra, an open source system.

Email has been a popular item for agencies to move to the cloud because it presents comparatively low security concerns and cloud storage makes it easier for employees to access email, calendars and collaboration tools from personal computers, smartphones and tablets. The government expects to ultimately save $5 billion annually by moving about one-fourth of its information technology to more nimble cloud computing. 

--

This story has been updated to clarify that employees and contractors will be using VA's cloud email system

--

Discuss the future of Federal IT with experts, innovators and your peers on Dec. 3 in Washington at Nextgov Prime, the defining event in the federal technology landscape. Learn more at nextgov.com/prime.

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.