This paper investigates the requirements, technologies and risk mitigation techniques for securely sharing information with the tactical Mobile users while protecting the data and the information systems from intruders and malware. The systems engineering concepts applied to the design and development of the Enterprise need to include the security criteria and mitigating techniques to handle Mobility, and reliance on Cloud services to obtain the required data and services. A strong emphasis is placed on analyzing secure data sharing outside its security domain with services, agencies, coalition partners and state/local authorities. There has been an increased demand for multiple levels of secretive data at the tactical edge; however the threat level at that point has been increasing dramatically compared to the enterprise environment. The next generation information systems need to eliminate the stovepipe architectures and open the doors to share information across traditional and non-traditional domain boundaries, while dealing with the increased threats stemming from wireless attacks, virtualized resources, and limited investment. This leads the sponsoring organization to think in terms of System of Systems when developing independent capabilities that needs to operate as consumers or producers with other systems. Agility in development is also paramount in today's budget sensitive and fluid requirements environments. © 2011 The Authors.