TOP

 

Applied Insight (AI), a market leader in solving complex technology challenges for federal government customers, and DV United, a small business joint venture serving federal government IT requirements, together secured a five-year, $6.5 million cybersecurity contract with the US Army.

The AI and DV United team will be responsible for managing, maintaining and enhancing the Army Cyber Command (ARCYBER) User Activity Monitoring Program (UAM) for insider threats. The team’s proven depth of experience supporting cyber weapon systems and insider threat and computer network defence efforts across the US Department of Defense and intelligence community was key in helping to secure the contract.

AI and our colleagues at DV United are excited and honored to be working with the army’s Cyber Command,” Greg Walker, President of Applied Insight, said. “We have a strong record of performance with the army, which has given us a deep understanding of their cyber mission and systems. This, together with our ability to aggregate and provide actionable information from millions of disparate cyber data sources, will be key to our success on the program. We look forward to delivering on this vital mission for our customer.”

DV United is a model joint venture company, providing the Army the diversity in capability and approach necessary to meet the multifaceted demands of their complex cybersecurity environments,” Thomas R. Dalton, COO of DV United, continued. “Our deep experience providing cyber and information security mission solutions to the government has assisted in securing federal networks, combating cybercrime and protecting critical infrastructure. We are proud to be teamed with AI and honored to have this opportunity to once again support the Army’s critical missions.”

 

To support this programme, the AI and DV United team will provide insider threat detection and mitigation, data loss prevention, security information and event management (SIEM) support, cyber data analytics and visualization, cyber behaviour heuristics analysis, cyber trend analysis, insider threat best practices and policy integration, and insider threat case management and incident reporting. (Image: Applied Insight)

We use cookies to improve our website and your experience when using it. Cookies used for the essential operation of the site have already been set. To find out more about the cookies we use and how to delete them, see our privacy policy.

I agreeMore Information