Army extends deadline for Tactical Data in Use Security RFI

On February 27, the U.S. Army extended the due date for the request for information (RFI) for Tactical Data in Use Security. Responses are now due by March 19.

The U.S. Army Combat Capabilities Development Command (DEVCOM), Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center is surveying the market to locate/identify interested Business Concerns.

For this RFI, the U.S. Army C5ISR Center, Engineering & Systems Integration (ESI) Directorate is interested in receiving information from companies that have solutions to integrate concepts of the Department of Defense’s (DoD’s) Zero Trust (ZT) capabilities, which are focused on the Data Pillar of the DoD ZT model (specifically on incorporation of data protection into tactical network architectures).

The solutions should integrate seamlessly into our existing infrastructure while providing enhanced security for data in use protections against potential threats and vulnerabilities, and need to operate within a denied, degraded, intermittent, or limited (DDIL) contested communications, logistics, and information environment. This constrained, highly dynamic, and adversarial-susceptible tactical environment will be a challenge to implement ZT solutions that meet mission needs.

Traditional network security models, which provide entities with implicit trust once inside the perimeter, are increasingly inadequate given the sophisticated nature of modern cyber threats. To address these challenges, ZT as a concept has gained prominence. ZT operates on the principle of “never trust, always verify,” emphasizing continuous risk assessment and real-time monitoring to ensure access to network resources is based on up-to-date information, and that trustworthiness is continually reevaluated.

Our goal is to identify cutting-edge technologies that can offer robust security measures for data in use protections. This includes, but is not limited to, leveraging advancements in encryption, anomaly detection, and secure communication protocols to protect against both current and emerging threats.

Review the updated Tactical Data in Use Security RFI.

Source: SAM

IC News brings you business opportunities like this one each week. If you find value in our work, please consider supporting IC News with a subscription.