Sean Lyngaas writes the program’s initial phase offered government agencies a range of tools for identifying devices across their networks.
The next phase will see vendors providing network boundary security and identity management tools for customer agencies to prevent unauthorized system access, and phase 3 will focus on incident response approaches, according to FCW.
âEach of the phases is an add-on to what was previously there,â Jim Piche, group manager at GSA’s Federal Systems Integration and Management Center, told audience at the Federal IT Acquisition Summit in Washington.
Lyngaas reports GSA is building a database system that contracting officers can use to search cybersecurity products and services that are available through the CDM blanket purchase agreement.