in ,

Air Force Eyes Software Task Order Award to Raytheon-Led Cyber Venture

Air Force Eyes Software Task Order Award to Raytheon-Led Cyber Venture - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png

Air Force Eyes Software Task Order Award to Raytheon-Led Cyber Venture - top government contractors - best government contracting eventThe U.S. Air Force has announced its plan to award a task order to Forcepoint to provide a software platform for the service’s warrior preparation center.

Raytheon operates Forcepoint as a cybersecurity joint venture with investment firm Vista Equity Partners.

A FedBizOpps notice posted Monday says the Air Force Europe’s WPC will use the Trusted Thin Client software offering to enable exercise participants access several networks and domains through a single device in an effort to cut the time needed to prepare exercise areas for various networks.

Trusted Thin Client is designed to support enterprise deployments and works to provide administrators with a centralized tool to add networks and facilitate monitoring and management operations.

The military branch intends to award the firm-fixed-price order under the General Services Administration’s Schedule 70.

ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Industry News

mm

Written by Jane Edwards

is a staff writer at Executive Mosaic, where she writes for ExecutiveBiz about IT modernization, cybersecurity, space procurement and industry leaders’ perspectives on government technology trends.

Boeing's Insitu Subsidiary Demos UAS Situational Awareness System - top government contractors - best government contracting event
Boeing’s Insitu Subsidiary Demos UAS Situational Awareness System
Amazon, Google, Microsoft Take Steps to Address Newly-Discovered Processor Vulnerabilities - top government contractors - best government contracting event
Amazon, Google, Microsoft Take Steps to Address Newly-Discovered Processor Vulnerabilities