EMERGING TECHNOLOGY

Klas Government to Support Increasing Number of Military Programs

Klas Government | November 21, 2020

Klas Government to Support Increasing Number of Military Programs
Established in 1991, Klas Telecom first associated understudies in quite a while utilizing, ISDN and satellite innovation. The organization has developed to work across various areas from Government and Public Safety, to transportation and self-sufficient vehicles.

For more than thirty years, Klas has been making forefront innovation. In later occasions, Klas Government with their Voyager equipment, modules and programming, has taken this to the extraordinary - the outrageous edge of the organization.

Klas Government's Voyager product line takes the world's most powerful and reliable technology to the extreme, tactical edge of the network. "We go to extremes to make sure it works where nothing else will," says Chris Ericksen the company's CRO. "With value, simplicity and integrity built in, it gives our partners the power to do much more, much faster," he adds.

"As a company, Klas Government has evolved, our tech has become much more advanced and its capability has exponentially increased. Telecom no longer defines us as we continue to expand our offerings.  We wanted to update our branding to reflect that, so we're now Klas Government," said Ericksen, "We looked at an incremental tweak of our branding, but it just wasn't reflective of the leaps we've made with our work."

Klas Government has assembled their business on being by a wide margin the best tech to use in unforgiving conditions. They accept there are no awful conditions, you simply need better gear. They likewise accept no one approaches what they can do in this space. They state they give total arrangements that work in a way that is better than all else, faster than any other individual, and at a superior worth. Intense cases that are currently wearing a strong new brand character.

Given their most recent deliveries on the tech front, and their ongoing new business wins, it appears to be a decent an ideal opportunity for them to reevaluate their contribution and support it with another look. Initially, the new character appears to be less difficult, more grounded and more powerful, much like their unit.

About Klas Government

Klas Government provides rugged, low size, weight and power (SWaP) deployable communications solutions to meet the needs of government and military communicators in any operational environment. The company enables customers to communicate in extreme environments by delivering tactical and executive communications systems specifically designed for ultimate flexibility, scalability and portability.

Spotlight

More than 31,000 people a year in the United States die from gunshot wounds.Because victims are disproportionately young, gun violence is one of the leading causes of premature mortality in the U.S. In addition to these deaths, in 2010, there were an estimated 337,960 nonfatal violent crimes committed with guns, and 73,505 persons treated in hospital emergency departments for non-fatal gunshot wounds.

Related News

GOVERNMENT BUSINESS

Defense Digital Service Announced the Launch of DDS’s 11th Bug Bounty Program with HackerOne

HackerOne | January 07, 2021

The Defense Digital Service (DDS) and HackerOne today announced the dispatch of DDS's 11th bug abundance program with HackerOne and the third with the U.S. Branch of the Army. Hack the Army 3.0 is a period bound, programmer controlled security test pointed toward surfacing weaknesses so they can be settled before they are abused by foes. The bug abundance program is available to both military and regular citizen members and will run from January 6, 2021 through February 17, 2021. Bug abundance programs, similar to Hack the Army 3.0, boost security examination and announcing of genuine security weaknesses in return for money related awards for qualified weaknesses and members. These projects are an industry best practice utilized by the most full grown associations across the world. By unveiling weaknesses to security groups, regular citizen and military programmers will help the U.S. Armed force secure digital resources and guard against cyberattacks. Hack the Army is one illustration of the Army and DoD's ability to seek after imaginative and nontraditional ways to deal with guarantee the capacity and security of individuals, organizations, and information. "Bug bounty programs are a unique and effective 'force multiplier' for safeguarding critical Army networks, systems and data, and build on the efforts of our Army and DoD security professionals," said Brig. Gen. Adam C. Volant, U.S. Army Cyber Command Director of Operations. "By 'crowdsourcing' solutions with the help of the world's best military and civilian ethical hackers, we complement our existing security measures and provide an additional means to identify and fix vulnerabilities. Hack the Army 3.0 builds upon the successes and lessons of our prior bug bounty programs." “We are proud of our continued partnership with the Army to challenge the status quo in strengthening the security of military systems and shifting government culture by engaging ethical hackers to address vulnerabilities,” says Brett Goldstein, Director, Defense Digital Service. “We’re calling on civilian and military hackers to show us what they’ve got in this bug bounty and to help train the future force.” Participation in the Hack the Army 3.0 bug abundance challenge is open by greeting just to regular citizen programmers and dynamic U.S. military individuals. Bug bounties might be offered to regular citizen programmers for substantial security weaknesses as indicated by the program strategy. Military and temporary worker staff are not qualified to get monetary prizes. “We are living in a different world today than even just a year ago,” said Marten Mickos, CEO of HackerOne. “Amidst disinformation and a global health crisis, citizens are increasingly wary of how, when, and where their information is used. For years, the U.S. Department of Defense and respective military branches have successfully strengthened their cybersecurity posture and protected precious data by enlisting the help of ethical hackers on HackerOne. Years later, hacker-powered security is not only a best practice in the US military, but it is now a mandated requirement among civilian federal agencies. There is only one way to secure our connected society, together, and the U.S. Army is leading the charge with this latest challenge.” DDS has been a harbinger in programmer fueled security testing since the time the dispatch of "Hack the Pentagon" in 2016. DDS's Hack the Pentagon group has executed 14 public bounties on outside confronting sites and applications, and ten private bounties on a scope of delicate, inside frameworks in the U.S. Branch of Defense (DoD). Instances of past private bounties incorporate coordinations frameworks, actual equipment, and faculty frameworks. In partnership with DDS, HackerOne has launched more federal programs than any other hacker-powered security provider and is the only bug bounty platform that is FedRAMP authorized. Previous bug bounty challenges and results include: Hack the Pentagon, Hack the Army, Hack the Air Force, Hack the Air Force 2.0, Hack the Defense Travel System, Hack the Army 2.0, Hack the Air Force 3.0, Hack the Air Force 4.0, Hack the Proxy and Hack the Marine Corps. DDS also launched a Vulnerability Disclosure Program (VDP) for the DoD in 2016, which is now one of the most successful programs of its kind with hackers reporting over 20,000 security vulnerabilities to date. Hackers who become aware of any vulnerabilities can safely disclose them to the DoD at any time through this ongoing VDP with HackerOne. About HackerOne HackerOne empowers the world to build a safer internet. As the world’s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Intel, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Slack, Starbucks, Twitter, and Verizon Media. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020. Headquartered in San Francisco, HackerOne has a presence in London, New York, the Netherlands, France, Singapore, and over 70 other locations across the globe. About Defense Digital Service The Defense Digital Service was established by the U.S. Secretary of Defense in November 2015 as a SWAT team of nerds that provides the best in modern technical knowledge designed to bolster national defense. We are primarily based in the Pentagon, but we also have satellite offices in Augusta, Georgia and co-located at the Defense Innovation Unit in Mountain View, California. Our range of talent includes world-class software developers, designers, product managers, digital experts and bureaucracy hackers from both the private sector and within government.

Read More

GOVERNMENT BUSINESS

IGEN Networks Corporation secures GSA Multiple Award Schedule Contract with State and Federal Governments

IGEN Networks Corporation | December 03, 2021

IGEN Networks Corporation a leading innovator of cloud-based and Internet of Things (IoT) solutions for the protection and management of mobile assets, today announced its qualification for GSA Multiple Award Schedule Contract with selected states and federal government markets. The GSA/VA status enables IGEN to market its products and services directly to governments including Counties, States, and the Federal Government. The GSA/VA Schedule contract status is a Preferred Vendor Status with local, state, and federal governments from which qualified companies are considered to be responsible and reputable to these governments. According to the GSA/VA Solicitation Services, there are only .003% of companies in the United States that are GSA or VA Federal Supply Schedule Contract qualified. According to The Authority in Government Contracts the Federal Government spends over $40B exclusively with GSA/VA Schedule Contract holders on an annual basis. From this GSA/VA Schedule contract status, IGEN will market its Medallion GPS Fleet Platform initially to Counties located in six states that include Pennsylvania, Michigan, New York City, New York, Tennessee, and California. Additional states will be added to IGEN's contract status as opportunities grow across the US. The Medallion GPS Fleet Platform will offer compelling features and services at lower costs with emphasis on ease-of-use. The system is organized around both asset and driver with dispatch capabilities, automated reporting, maintenance, diagnostics reporting, driver behavior scoring, and video tutorials on demand that are built on AWS Cloud-based infrastructure. The Medallion GPS Fleet Platform incorporates the patented "Digital Telematics Signature", which offers greater accuracy in measuring and scoring driver behavior across diverse fleets providing a powerful tool for assessing actuarial risk of assets and their drivers. "Combined with our GSA/VA contract status, we now have the process to facilitate transactions with the Counties across all US government markets. In preparation we have increased our inventory levels to 2500 hardware activation units for the next quartile period. The diversity of government assets along with the self-insurance of these assets creates an excellent fit with the capabilities of our Medallion GPS Fleet Platform." Neil G Chan, CEO of IGEN Networks Corp About IGEN Networks Corporation IGEN Networks Corporation provides peace-of-mind to automotive consumers and their families through direct access to Internet-of-Things (IoT) cloud-based services that include Stolen Vehicle Protection, Real-time updates on asset health and Driver Behavior. IGEN is a fully reporting company in both Canada and the United States. It is publicly traded on the OTCQB under the symbol IGEN, and listed on the CSE under the symbol IGN.

Read More

GOVERNMENT BUSINESS

Owl Cyber Defense Acquires Trident Assured Collaboration Systems to Enhance Advanced Network Security Capabilities

Owl Cyber Defense Solutions | January 06, 2021

Owl Cyber Defense Solutions, LLC ("Owl"), a worldwide market pioneer in cybersecurity solutions and administrations for safeguarding network limits and empowering secure information sharing across spaces, reported today the acquisition of the Trident Assured Collaboration Systems ("ACS") product offering. ACS has the lone U.S. government-endorsed Voice over IP ("VoIP") and Video Teleconference ("VTC") Cross Domain Solution ("CDS") just as the business' most progressive Full Motion Video ("FMV") separating capacity – usefulness basic to CDS tasks in a period of robots and cameras. The acquisition gives Owl a more extensive scope of affirmed network edge defense solutions than any rival on the lookout. Owl, supported by private venture firm DC Capital Partners, has been a main supplier of CDS to the U.S. Branch of Defense ("DoD") and Intelligence Community for over 20 years. Owl is additionally the worldwide pioneer in cybersecurity security for basic foundation, offering the lone U.S. government tried and licensed CDS accessible for arrangement inside and outside the U.S to both government and business customers. Owl's Cross Domain Solutions offer the most elevated level of organization border security, far surpassing the capacities of firewalls and other typical organization defenses. Owl's items are the decision for ensuring the country's most touchy organizations and frameworks against assault. Late episodes have exhibited the failure of inheritance firewalls to forestall cyberattacks against basic business and working frameworks and cloud-based applications. The blend of Owl and ACS's innovation offers a full continuum of CDS items that give equipment upheld space detachment and layers of information separating confirmation as opposed to a solitary organization line checkpoint with negligible substance sifting. Thomas J. Campbell, Chairman of Owl and Founder and Managing Partner of DC Capital, said, "This is another step in executing our strategic vision. The acquisition of ACS not only places Owl ahead of other Cross Domain Solution providers, but it also plays a pivotal role in our larger strategy to offer true cybersecurity protection. The future requires solutions that are cost effective and easy to implement, use, and maintain." "The explosion of the Internet of Things ("IoT") demands cyber-secure devices, from those that control our critical infrastructure, to our homes and cars," said Campbell. "The technology Owl pioneered 20 years ago is now available in form factors small enough to be embedded inside devices. Owl has always been an early mover, the first to develop hardware-enforced network protection and now the first to offer a hardware-enforced CDS that can be embedded." "Owl has been rapidly moving towards this number one position for the last couple of years," commented Robert Stalick, President and CEO of Owl. "With the addition of ACS, the last piece has fallen into place. Owl is now the clear leader in accredited Cross Domain Solution offerings, with the widest range of capabilities and products – solving problems from tactical to enterprise in data, voice, and video; for government, critical infrastructure and commercial enterprises." Solutions like firewalls that worked 25 years prior as an organization security approach are not, at this point viable against country state quality assaults. As country state assaults increment, the methodologies utilized by state entertainers start to saturate the criminal side of cyberattacks. Viable cybersecurity presently requires an incorporated, multi-layered framework with information diode equipment parts in gatekeepers which perform escalated information assessment and confirmation. The up and coming age of insurance, coming out now and based on a mix of Owl and ACS innovation, inserts CDS usefulness in incredibly low-inertness, unmodifiable equipment. Jerry B. Chernock, Partner at DC Capital, added, "It is obvious that we need to address the inadequacy of firewalls. There is a reason why our clients insist on Cross Domain Solutions and not solely on firewalls. Recent attacks, including a security breach at a prominent U.S. based cybersecurity firm and several U.S. Government agencies, have punctuated the need for intelligence, military, critical infrastructure and corporate clients to quickly evolve how they protect their networks." "The sophistication of these technologies cannot be overstated," said Ken Walker, Chief Technology Officer at Owl. "The U.S. Government continues to set the standards for the most rigorous operational requirements and testing regimes globally, setting expectations that very few companies can meet. Owl is one of a handful of elite companies that satisfies the government-established 'Raise the Bar' requirements." About Owl Cyber Defense Solutions Owl has been serving the cybersecurity needs of the U.S. government since inception – providing hardware-enforced cybersecurity controls, industry leading expertise in operating system hardening, extensive device and network-based assessment services and thought-leadership in filtering/data processing disciplines. Owl Cross Domain Solutions are operating broadly in missions across both the DoD and the U.S. intelligence agencies. Globally Owl is the leader in perimeter protection for nuclear power plants, oil and gas operations, renewables and power generation and transmission, with aggressive growth occurring in the data center and cloud provider sectors. Owl continues to innovate and is bringing to market the world's first embeddable cybersecurity to serve the Internet of Things ("IoT").

Read More

Spotlight

More than 31,000 people a year in the United States die from gunshot wounds.Because victims are disproportionately young, gun violence is one of the leading causes of premature mortality in the U.S. In addition to these deaths, in 2010, there were an estimated 337,960 nonfatal violent crimes committed with guns, and 73,505 persons treated in hospital emergency departments for non-fatal gunshot wounds.