- Leverage enterprise defensive capabilities with standardized security suites at optimal locations
- Remove redundant IA protections
- Definitively control user data flows and provides global SA down to the B/P/C/S via centralized Computer Network Defense data repository
- Protect the enclaves after the separation of server and user assets
- Provide the tool sets necessary to monitor and control all security mechanisms throughout DoD's Joint Information Environment from designated Enterprise Operations Centers.