The US Army has named Iron Bow Technologies as the prime contract holder under Assess Only Authority to Operate (ATO) for AttackIQ’s Security Optimisation Platform.
The three-year award was granted as part of the Army’s Defensive Cyber Operations Threat Emulation programme.
In a statement, Iron Bow said it collaborated with cybersecurity analysis provider KAIROS to launch the process.
Iron Bow president and chief executive officer Rene LaVigne said: “Department of Defense (DoD) information technology leaders and the warfighters they serve require break-through cybersecurity solutions in an ever-evolving threat landscape.
“Our ability to deliver agile, flexible, and modular solutions like AttackIQ allows us not just to help DoD leaders meet their objectives, but exceed cyber outcomes for the future.”
Following a multi-phase evaluation process that began in 2021, AttackIQ’s ATO received a Moderate/Moderate/Low classification.
How well do you really know your competitors?
Access the most comprehensive Company Profiles on the market, powered by GlobalData. Save hours of research. Gain competitive edge.
Your download email will arrive shortly
Not ready to buy yet? Download a free sample
We are confident about the unique quality of our Company Profiles. However, we want you to make the most beneficial decision for your business, so we offer a free sample that you can download by submitting the below formBy GlobalData
As the first breach and attack simulation (BAS) platform to receive ATO designation, AttackIQ will enable the US Army to use its Security Optimisation Platform.
This platform will help the Army build a strategic defence posture across key assets to support its soldiers deployed in various countries.
US Army lieutenant colonel Dakota Steedsman said: “With the Assess Only ATO accreditation, AttackIQ will allow the US Army to deploy a threat emulation capability across various production networks in support of critical mission objectives.
“The AttackIQ platform’s continuous security control validation gives our security teams real-time, data-driven visibility into whether their controls are working as intended, enabling uninterrupted verification of programme health at scale and in an automated fashion.”