New cybersecurity services available to agencies

QinetiQ North America will offer training, risk identification, and malware prevention and response

Federal agencies now have four new services available to help address cybersecurity issues.

QinetiQ North America will offer several services to agencies, including training, risk identification, and malware prevention and response. The services are available under a range of contract vehicles, including the General Services Administration’s Alliant and Defense Information Systems Agency’s Encore II.

These services are:

  • Staff training and education. Cyber Safety 101: An Introduction to Cyber Threats and Internet Risk. The class is available on site or remotely.
  • Cyber Risk and Vulnerability Assessment service. Using a “red team” approach, the service identifies threats, risks and vulnerabilities.
  • Prevent access to dangerous URLs and Web sites: Malware Discovery. Information delivered includes details of the malware ecosystem, distribution chain, actors, providers and IP spaces.
  • Analysis of origin and nature of malware: Comprehensive Malware Awareness. The analysis identifies present threats to an organization, including what it does and how it affects infected systems. The service also provides testing results from more than a dozen industry-leading security products to classify the newest and previously unknown threats.
  • Cyvelliance, a QinetiQ North America wholly owned subsidiary and provider of open-source, cyber-intelligence products, will be delivering the services. QinetiQ North America acquired Cyvelliance in July.

About the Author

Kathleen Hickey is a freelance writer for GCN.

inside gcn

  • federal blockchain

    How blockchain can transform the public sector

Reader Comments

Thu, Sep 10, 2009 Randy Williams Columbia, Maryland

I'm the Director of BD for an SDVOSB that specializes in Certification & Accreditation of Networks and Systems for the Federal Government. I've been very proactive in my education of Cybersecurity, IT Security, C&A, FIPS-140-2, SCAP and so on. While our company has been relatively successful in selling our IT Security Services into the Federal Government, I've found many problems within the IT Security World that makes it almost impossible to have a systems that's totally secure. For example: without naming names, we work with several agencies that when that go out to look for someone to perform security checkups...they haven't been trained on how to write a solid "Statement of Work" to ensure that they get the best services possible when they have no idea on how to write the SOW in the first place. Pretty Scary. The first thing that needs to happen before all these changes are made with, say for example, FISMA 2002...we need to figure out how the contracting departments for the various agencies have a template to help them answer questions to put a good SOW together along with internal training on IT Security and how, what, why certain requirements are manatory in an SOW. I can speak on this one subject for a long time, however, for now, lets move on. Another problem is that contractors/vendors aren't qualified by the Federal Agencies as a vendor that does know what the hell they're doing. Therefore, when you get a contracting officer that can't write a GOOD SOW for IT Security coupled with the fact that they don't really know what type of vendor they're getting....that in my mind sends a real clear message of "HOW SECURE ""REALLY" ARE OUR SYSTEMS"....this is a very scary thought...In closing, we're putting the cart before the horse. If your Federal Government infrastructure can't or doesn't support a solid base of understanding of what they're looking for then the whole process breaks down before it begins.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group