Skip to main content

Cybersecurity

The federal government faces daily cyber attacks. Even in a resource-constrained environment, departments and agencies need to implement cost-effective and efficient cybersecurity controls for federal information systems. 

Our contracts help you comply with mandates and guidelines for cybersecurity products, services, and solutions. We offer a customizable suite of products and services, including shared services, helping government enhance security while bringing systems into the 21st century. We continually improve how we deliver the best value in technology services to government.

COMMERCIAL IT PRODUCTS AND SERVICES CONTRACTS

Risk Management Framework (RMF) cybersecurity services

The Risk Management Framework (RMF) services blanket purchase agreement (BPA) replaces the static C&A process with a process providing the National Institute of Standards and Technology's (NIST) recommended security controls for federal information systems. 

SmartBUY software

The SmartBUY blanket purchase agreements (BPAs) offer commodity software and services at deep discounts, including:

State, local, and tribal governments

State, local, and tribal governments can use the Cooperative Purchasing Program to buy from IT Schedule 70, the Risk Management Framework BPA, and certain SmartBUY BPAs.

HSPD-12 Products and Services

Get PIV Credentials or purchase other identity and credential management products and services to secure your facilities and control access to networks, email, documents, and laptops:

Federal Public Key Infrastructure (FPKI)

Federal Public Key Infrastructure (FPKI) is the government's common infrastructure that administers digital certificates and public-private key pairs. It can also issue, maintain, and revoke public key certificates.

TRUSTED INTERNET CONNECTIONS

The Office of Management and Budget (OMB) mandates that all agencies use Trusted Internet Connections (TIC). We provide access to Trusted Internet Connections (TIC) providers through the Managed Trusted Internet Protocol Services (MTIPS) program.

END-TO-END IT SOLUTIONS CONTRACTS

 Telecommunications service

Networx allows federal agencies to build seamless, secure operating environments through customized telecommunications solutions. 

 Telecommunications infrastructure

Connections II offers secure telecommunications equipment, labor, services, and solutions for federal infrastructure, buildings, and campuses. 

Cross-Agency Priority Goal: Cybersecurity

As established by the Government Performance and Results Modernization Act of 2010, we work toward improving cybersecurity performance through ongoing awareness of information security, vulnerabilities, and threats impacting the operating information environment; ensuring that only authorized users have access to resources and information; and implementing technologies and processes that reduce the malware risk.

Information Security Continuous Monitoring Mitigation (ISCM) – Provide ongoing observation, assessment, analysis, and diagnosis of an organization’s cybersecurity: posture, hygiene, and operational readiness.

Use GSA's Risk Management Framework (RMF) services blanket purchase agreement (BPA) to establish your agency's ISCM capability.

The Continuous Diagnostics and Mitigation (CDM) Program provides specialized information technology (IT) tools, and Continuous Monitoring as a Service (CMaaS) to combat cyber threats in the civilian .gov networks.

Identity, Credential, and Access Management (ICAM) – Implement a set of capabilities that ensures users must authenticate to use information technology resources and can access only those resources required for their job. GSA's Homeland Security Presidential Directive 12 (HSPD-12) products and services help agencies implement their ICAM capability:

Anti-Phishing & Malware Defense – Implement technologies, processes and training that reduce the risk of malware introduced through email and malicious or compromised web sites.

Use GSA's Cloud Email-as-a-Service (EaaS) blanket purchase agreements (BPAs) to implement your agency's Anti-Phishing & Malware Defense capability.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



 

 

 

 



The shortcut to this page is www.gsa.gov/cybersecurity.


Security,authentication,access,control,data,integrity,confidentiality,disaster,recovery,firewall,malware,spoofing,hacking,worms,virus,trojan,cso