Sacramento, 95814, CA,
United States
California Department of Water Resources Technographics
Discover the latest software purchases and digital transformation initiatives being undertaken by California Department of Water Resources and its business and technology executives. Each quarter our research team identifies on-prem and cloud applications that are being used by the 1800 California Department of Water Resources employees from the public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources.
During our research, we have identified that California Department of Water Resources has purchased the following applications: McAfee Endpoint Threat Protection for Endpoint Detection and Response (EDR) in 2015, Zebra Gas and Electric Utilities for Field Service Management in 2021, Esri Arcgis for Geographic Information System in 2016 and the related IT decision-makers and key stakeholders.
Our database provides customer insight and contextual information on which enterprise applications and software systems California Department of Water Resources is running and its propensity to invest more and deepen its relationship with McAfee , Zebra Technologies , Esri or identify new suppliers as part of their overall Digital and IT transformation projects to stay competitive, fend off threats from disruptive forces, or comply with internal mandates to improve overall enterprise efficiency.
We have been analyzing California Department of Water Resources revenues, which have grown to $500.0 million in 2024, plus its IT budget and roadmap, cloud software purchases, aggregating massive amounts of data points that form the basis of our forecast assumptions for California Department of Water Resources intention to invest in emerging technologies such as AI, Machine Learning, IoT, Blockchain, Autonomous Database or in cloud-based ERP, HCM, CRM, EPM, Procurement or Treasury applications.
CyberSecurity
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
Insight Source |
|---|---|---|---|---|---|---|---|---|---|
| McAfee | Legacy | McAfee Endpoint Threat Protection | Endpoint Detection and Response (EDR) | CyberSecurity | n/a | 2015 | 2015 | In 2015 California Department of Water Resources implemented McAfee Endpoint Threat Protection and classified the deployment under Endpoint Detection and Response (EDR) to centralize endpoint security and threat detection across its operations. The DWR information security team initially rolled out McAfee Endpoint Security version 10.5 across all 4,000 end user physical devices within DWR, with plans to deploy the same protection across the remaining CNRA departments in the coming months and to extend coverage to virtualized servers in a subsequent phase. McAfee Endpoint Threat Protection was configured to use agent-based endpoint protection combined with centralized management, policy enforcement, telemetry collection, and automated detection and remediation workflows typical of Endpoint Detection and Response (EDR) platforms. Configuration work focused on uniform agent deployment, console-driven policy baselines for endpoint hygiene, and telemetry aggregation for security operations visibility. Operational governance was led by the DWR information security team through a phased rollout, starting with physical desktops and laptops, then expanding to other California Natural Resources Agency departments and later to virtual server estates. The implementation scope explicitly covered endpoint management and security operations functions, and the rollout strategy emphasized staged coverage expansion rather than immediate enterprise-wide activation. |
ERP Services and Operations
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
Insight Source |
|---|---|---|---|---|---|---|---|---|---|
| Zebra Technologies | Legacy | Zebra Gas and Electric Utilities | Field Service Management | ERP Services and Operations | Mirata | 2021 | 2021 | In 2021, the California Department of Water Resources deployed Zebra Gas and Electric Utilities as a Field Service Management solution to digitize field maintenance across the State Water Project in the United States. The rollout provisioned Zebra L10 rugged tablets for field crews and engaged Mirata as the implementation partner to deliver digital forms and mobile workflows. The implementation focused on mobile field data capture using Mirata digital forms, on-device SAP mobile access for work orders and confirmations, and an offline-capable rugged tablet architecture to support remote sites. Zebra Gas and Electric Utilities was configured to integrate in real time with SAP, enabling thousands of field updates to flow into backend systems while supporting standard field service capabilities such as work order updates, maintenance reporting, and mobile task orchestration. Deployment scope was statewide across the State Water Project, covering field maintenance and operations and extending governance to field-to-backoffice workflows, form version control, and technician training. According to the case study, the program delivered thousands of field updates, saved administrative hours, and improved real-time integration with SAP. | |
|
|
|
|
Field Service Management | ERP Services and Operations |
|
2017 | 2019 |
|
|
PLM and Engineering
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
Insight Source |
|---|---|---|---|---|---|---|---|---|---|
| Esri | Legacy | Esri Arcgis | Geographic Information System | PLM and Engineering | n/a | 2016 | 2016 |
Content Management
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
Insight Source |
|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
Web Content Management | Content Management |
|
2021 | 2021 |
|
|
| First Name | Last Name | Title | Function | Department | Phone | |
|---|---|---|---|---|---|---|
| No data found | ||||||
| Date | Company | Status | Vendor | Product | Category | Market |
|---|---|---|---|---|---|---|
| No data found | ||||||