Back to news

November 2, 2020 | International, C4ISR

Pentagon re-awards multibillion-dollar office tools contract to CSRA

WASHINGTON ― The Pentagon re-awarded its Defense Enterprise Office Solutions contract to CSRA on Friday, nearly 14 months after it awarded it to the General Dynamics Information Technology subsidiary last year.

The award to CSRA was delayed several times after the General Services Administration twice took corrective action after protests by Perspecta, the other contractor in the competition.

According to the announcement from the General Services Administration and Department of Defense, the blanket purchasing agreement is estimated to be worth $4.4 billion over a decade, with a five-year base. The contract was estimated to be worth $7.6 billion when the award was made last year.

The DEOS contract will provide the DoD with productivity tools such as word processing and spreadsheets, email, collaboration, file sharing, and storage across the enterprise.

“DEOS is a key part of the Department's Digital Modernization Strategy and its fit-for-purpose cloud offering will streamline our use of cloud email and collaborative tools while enhancing cybersecurity and information sharing based on standardized needs and market offerings,” DoD Chief Information Officer Dana Deasy said in a statement. “The last six months have put enormous pressure on the Department to move faster with cloud adoption. All across the Department there are demand signals for enterprise wide collaboration and ubiquitous access to information.”

The DEOS environment is intended to meet DoD Impact Level 5 and Impact Level 6 cloud security standards that allow access to unclassified and classified work, respectively.

"“We were determined that the Department could achieve faster department-wide adoption of cloud collaboration capabilities by moving forward in a federated manner to the DoD 365 (IL 5) cloud environment while ensuring the individual components efforts work together to create an enterprise capability,” Deasy added. “This approach required the government team to assume a greater responsibility up front to shape the enterprise standards. With the award of DEOS, the Department will be able to transfer a significant part of the ongoing technical and management load to the integrator and free up strained resources to execute other priority missions.”

The DEOS contract award was marred by several errors, detailed by NextGov, including issues with the statement of work, requirements and a subsequent incident in which proprietary information about Perspecta's bid was shared with GDIT.

CSRA is partnered with Dell Marketing and Minburn Technology Group for the DEOS contract.

DoD components have waited a long time for delivery of the DEOS solution. When the original award was made last year, the Marine Corps deputy director of command, control, communications and computers, Kenneth Bible, said the service was looking forward to the “promise and substantial benefits” of DEOS capabilities in “disconnected, degraded, intermittent and low bandwidth [DDIL] environments that are anticipated in 21st century conflicts.”

The DEOS re-award comes nearly two months after the department confirmed its other long-delayed enterprise cloud, the Joint Enterprise Defense Infrastructure, to its original winner, Microsoft. That contract has a $10 billion ceiling.

https://www.c4isrnet.com/it-networks/2020/10/30/pentagon-re-awards-multibillion-dollar-office-tools-contract-to-csra/

On the same subject

  • The next cybersecurity concern for NATO? Space

    July 31, 2019 | International, Aerospace, Security

    The next cybersecurity concern for NATO? Space

    By: Kelsey Reichmann A new report warns that the cybersecurity vulnerabilities related to military space systems, specifically terminals and command-and-control systems, deserves renewed attention from NATO countries. The report, titled “Cybersecurity of NATO's Spaced-based Strategic Assets,” was produced by Chatham House, which is part of the Royal Institute of International Affairs, a policy institute in London. The paper, by Beyza Unal, was released July 1. “There is an urgent need to study and address cyber-related challenges to strategic assets within NATO and its key member countries, particularly the cyberthreat to space-based command and control systems,” the report read. “The increasing vulnerability of space-based assets, ground stations, associated command and control systems, and the personnel who manage the systems, has not yet received the attention it deserves.” The report highlights cybersecurity vulnerabilities to space systems used by countries in the NATO alliance, notably singling out commercial products used in military operations as a particular risk. These vulnerabilities can come from back-door encryption, supply chain security, and personnel and procedural practices, according to the report. NATO uses space assets to defend territory, peacekeeping missions, humanitarian assistance and disaster relief, counterterrorism, and conflict prevention. “There is an increasing need to apply higher-grade military hardening and cyber protection specifications to civilian capabilities that have the potential to be used in support of military applications,” the report read. “If military standards are not met, items procured from commercial industry with design flaws may expose NATO's systems to additional vulnerabilities." The report also points to the importance of securing satellite terminals. “Terminals located in ground stations constitute a critical vulnerability, as a terminal is an access point to a satellite and is usually not protected by authentication in order not to hinder operational actions,” the report said. “Terminals house software systems that can be compromised and require patching and upgrading.” Data flowing between satellites, especially ground stations, can become vulnerable, according to the report. “Adversaries infiltrating ground- or space-based systems could exploit weak software implementation, or the incompatibility of network or data transfer protocols in the chain,” the report read. “While the absence of data is easy to detect, the manipulation of data or erosion of confidentiality at such an interface is potentially more difficult to discern.” Among the report's recommendations is that NATO strengthen its cyber defense through increased collaboration between the public and private sector. This would allow for more timely information sharing of cyberthreats. The report also urges NATO to emphasize that commercial manufacturers meet basic cybersecurity standards and possibly more stringent military protection standards. “In the future, military systems will be increasingly connected to non-military systems,” the report stated. “This has important implications for the laws of armed conflict, as the combination of civilian, commercial and military capabilities in the cyber domain and space raises the risk that civilian capabilities used for military purposes qualify as legitimate military targets.” https://www.fifthdomain.com/international/2019/07/30/the-next-cybersecurity-concern-for-nato-space/

  • Army to work with satellite radar imagery provider ICEYE

    November 24, 2021 | International, Aerospace, C4ISR

    Army to work with satellite radar imagery provider ICEYE

    Because SAR isn't dependent on visibility, it can be used to produce imagery at any time of day or night and through cloud cover.

  • NATO hunger for info driving deals for commercial satellite imagery

    May 23, 2023 | International, C4ISR

    NATO hunger for info driving deals for commercial satellite imagery

    The U.S. and U.K. are leading contributors to NATO joint ISR, with “everybody else” tailing, an official said at the GEOINT Symposium.

All news