AttackIQ to Offer Cybersecurity Products on RockITek’s Federal Supply Schedule Contract

AttackIQ has been authorized by the General Services Administration to market its cybersecurity offerings to federal government clients through RockITek’s Federal Supply Schedule contract.

AttackIQ said Tuesday its suite of products is designed to support government agencies’ cybersecurity objectives and provide customized reporting and standardized assessments to validate an organization's security posture.

The platform also houses an interactive dashboard that helps users prioritize activities through the visualization of real-time information.

John Sobczak, CEO at RockITek, said the firm has submitted a request to include AttackIQ on the Department of Homeland Security's approved products list under the Continuous Diagnostic and Mitigation program.

“We were just notified that they were approved and are now able to be ordered via the CDM contract,” added Sobczak.

RockITek is a distributor firm that develops and manages consortiums in efforts to speed up the government's adoption of various technologies.

Check Also

John Cooney

Former ITA Official John Cooney to Lead SkyWater’s Government Engagements

John Cooney, a former official at the Department of Commerce's International Trade Administration, has joined semiconductor foundry services provider SkyWater Technology as director of U.S. government relations.

Ellen Lord

DoD Launches Pilot Programs for Software Procurement; Ellen Lord Quoted

The Department of Defense (DoD) has made continued efforts to transform software procurement across the military,  FedScoop reported Thursday. Ellen Lord, undersecretary of defense for acquisition and sustainment and four-time Wash100 Award recipient, has developed pilot programs to test the acquisition.

Analyst1

Analyst1 to Help DoD’s Innovation Org Develop Cyber Threat Intell Platform

Analyst1 has been selected help the Defense Innovation Unit transform cybersecurity operations through the development of an enterprise-grade technology that will work to automatically process threat intelligence data.