Click here to close now.

Welcome!

Cloud Expo Authors: Elizabeth White, Marty Puranik, AppDynamics Blog, Ken Fogel, Liz McMillan

News Feed Item

SRA International Awarded $21.4 Million Contract from Department of Justice

SRA International, Inc., a leading provider of technology and strategic consulting services and solutions to government organizations, today announced it was selected by the U.S. Department of Justice (DOJ) to continue supporting the agency’s Joint Biometric Data Exchange Hosting Environment (JBDEHE) operations and maintenance infrastructure. The Information Technology Support Services 4 (ITSS-4) contract is valued at $21.4 million if all options are exercised. Under the contract, SRA will continue managing, operating and maintaining the entire JBDEHE infrastructure.

Under DOJ JBDEHE, SRA will provide system operations, maintenance and help desk support, system development, government furnished equipment inventory/distribution management and system security.

“SRA is proud of our partnership with the DOJ and our long history of supporting the law enforcement community,” said SRA Senior Vice President Pat Burke for the Intelligence, Homeland Security and Special Operations group. “We are eager to continue applying our innovative infrastructure support methodology and management expertise to ensure this real-time, mission-critical law enforcement program is always ready for 24x7 operations.”

JBDEHE consists of two primary components. The Joint Automated Booking System (JABS) facilitates data dissemination and real-time information sharing between federal law enforcement agencies located in more than 1,100 sites across the nation. It interfaces with the Federal Bureau of Investigation’s (FBI) Integrated Automated Fingerprint Identification System and enables law enforcement to effectively identify individuals in federal custody based on their fingerprints. The second component, the Civilian Applicant System (CAS), enables users to capture civilian application fingerprints and biographical data electronically and transmit them to the FBI as part of the background investigation process for current and new employees, political appointees and contractor personnel.

About SRA International, Inc.

For more than 30 years, SRA International has been dedicated to solving complex mission and efficiency challenges for the U.S. government. From our headquarters in Fairfax, Va., and from offices and locations around the globe, our approximately 5,800 employees support government clients in civilian, defense, health, intelligence, law enforcement and homeland security agencies by delivering IT solutions and professional services in such areas as information technology lifecycle services; cloud and mobile computing; cyber security; solutions development and integration; and, strategy development and organizational change management. We also provide mission-specific domain expertise in areas such as energy and environmental consulting; intelligence analysis; advanced research; and bioinformatics. Our employees’ deep commitment to offering real value to our clients and serving our communities is rooted in our ethic of Honesty and Service®.

For more information on SRA International, please visit us at www.sra.com.

Any statements in this press release about future expectations, plans, and prospects for SRA, including statements about the estimated value of the contract and work to be performed, and other statements containing the words “estimates,” “believes,” “anticipates,” “plans,” “expects,” “will,” “could,” “intend,” “may,” “potential,” “should,” “would” and similar expressions, constitute forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. You should read statements that contain these words carefully because they discuss our future expectations, contain projections of our future results of operations or of our financial position, or state other forward-looking information. Factors or risks that could cause our actual results to differ materially from the results we anticipate include, but are not limited to: (i) reduced spending levels and changing budget priorities of our largest customer, the United States federal government, which accounts for more than 98% of our revenue; (ii) failure of the customer to fund a contract or exercise options to extend contracts, or our inability to successfully execute awarded contracts; (iii) the failure of congressional leaders to agree upon further budget reductions as required by the debt ceiling compromise triggering automatic across-the-board cuts beginning in 2013 to civil and defense programs; (iv) failure to comply with complex U.S. government procurement-related laws and other regulations, including but not limited to, punitive damage liabilities under the False Claims Act and other laws, and financial incentives under so-called “whistleblower” statutes, awarding the whistleblower with a percentage of the recovery if the claims are successfully waged; (v) possible delays or overturning of our government contract awards due to bid protests by competitors or loss of contract revenue or diminished opportunities based on the existence of organizational conflicts of interest; (vi) failure to comply with laws such as the Foreign Corrupt Practices Act or regulations on government gratuities; (vii) failure to comply with Federal Acquisition Regulations and Cost Accounting Standards or the Fair Labor Standards Act; (viii) security threats, attacks or other disruptions on our information infrastructure, and failure to comply with complex network security and data privacy legal and contractual obligations or to protect sensitive information; (ix) any violation of third party intellectual rights; (x) adverse changes in federal government practices; (xi) delays in the U.S. government adopting appropriations necessary for program funding and future appropriation uncertainties adversely impacting customer spending plans; (xii) intense competition to win U.S. government contracts or recompetes and commoditization of services we offer; (xiii) failure to obtain option awards, task orders or funding under contracts, or inability to successfully execute awarded contracts; (xiv) any adverse results of audits and investigations conducted by the Defense Contract Audit Agency or any of the Inspectors General for various agencies with which we contract, including, without limitation, any determination that our contractor business systems or contractor internal control systems are deficient; and (xv) difficulties accurately estimating contract costs and contract performance requirements; (xvi) challenges in attracting and retaining key personnel or high-quality employees, particularly those with security clearances.

Although we believe that the expectations reflected in the forward-looking statements are reasonable, we cannot guarantee future results, levels of activity, performance or achievements. You should not place undue reliance on these forward-looking statements. In addition, the forward-looking statements included in this press release represent our views as of Nov. 13, 2012. We anticipate that subsequent events and developments will cause our views to change. While we may elect to update these forward-looking statements at some point in the future, we specifically disclaim any obligation to do so. These forward-looking statements should not be relied upon as representing our views as of any date subsequent to Nov. 13, 2012.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Cryptography has become one of the most underappreciated, misunderstood components of technology. It’s too easy for salespeople to dismiss concerns with three letters that nobody wants to question. ‘Yes, of course, we use AES.’ But what exactly are you trusting to be the ultimate guardian of your data? Let’s face it – you probably don’t know. An organic, grass-fed Kobe steak is a far cry from a Big Mac, but they’re both beef, right? Not exactly. Crypto is the same way. The US government require...
The speed of product development has increased massively in the past 10 years. At the same time our formal secure development and SDL methodologies have fallen behind. This forces product developers to choose between rapid release times and security. In his session at DevOps Summit, Michael Murray, Director of Cyber Security Consulting and Assessment at GE Healthcare, examined the problems and presented some solutions for moving security into the DevOps lifecycle to ensure that we get fast AND ...
Docker is becoming very popular--we are seeing every major private and public cloud vendor racing to adopt it. It promises portability and interoperability, and is quickly becoming the currency of the Cloud. In his session at DevOps Summit, Bart Copeland, CEO of ActiveState, discussed why Docker is so important to the future of the cloud, but will also take a step back and show that Docker is actually only one piece of the puzzle. Copeland will outline the bigger picture of where Docker fits a...
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
Software Defined Storage provides many benefits for customers including agility, flexibility, faster adoption of new technology and cost effectiveness. However, for IT organizations it can be challenging and complex to build your Enterprise Grade Storage from software. In his session at Cloud Expo, Paul Turner, CMO at Cloudian, looked at the new Original Design Manufacturer (ODM) market and how it is changing the storage world. Now Software Defined Storage companies can build Enterprise grade ...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS soluti...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what th...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness,...
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and ex...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
Dale Kim is the Director of Industry Solutions at MapR. His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science f...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice, will review the Federal Risk and Authorization Management Program (FedRAMP) process and provide advice on overcoming common compliance obstacles.
The cloud is now a fact of life but generating recurring revenues that are driven by solutions and services on a consumption model have been hard to implement, until now. In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, will discuss how a top European telco has leveraged the innovative recurring revenue generating capability of the consumption cloud to enable a unique cloud monetization mod...
Are your applications getting in the way of your business strategy? It’s time to rethink your IT approach. In his session at 16th Cloud Expo, Madhukar Kumar, Vice President, Product Management at Liaison Technologies, will discuss a new data-centric approach to IT that allows your data, not applications, to inform business strategy. By moving away from an application-centric IT model where data integration and analysis are subservient to the constraints of applications, your organization will b...
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed...
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will disc...