Network security
Army Awards Contract for Tactical Identity Security as Part of Zero Trust Push
The U.S. Army has awarded Akamai Technologies an other transaction agreement contract to develop software prototypes supporting its Tactical-Identity Credential and Access Management project, a critical step in achieving its zero trust network security goals.
Part of the Army’s Unified Network Operations program, T-ICAM implements a security paradigm that continuously evaluates user and device permissions, ensuring that only authorized personnel can access sensitive data and systems, the Army said.
The capability is also key for maintaining secure operations within potentially compromised or resource-limited networks.
Mark Kitz, program executive officer for command, control, communications-tactical, emphasized the importance of T-ICAM in defending against cyberthreats and ensuring secure access for authorized users in future large-scale combat operations.
Lt. Col. Keith Jordan, product manager for tactical cyber and network operations, said ICAM is a foundational element of the service’s zero trust architecture strategy as it provides essential visibility into network activity and data access for enhanced cybersecurity.
The contract was awarded after a thorough selection process and will follow the DOD’s Software Acquisition Pathway, incorporating rapid software development and soldier feedback for swift improvements.
The Army plans to field-test prototypes in 2024, with a broader rollout anticipated in the next 12 to 18 months.
Category: Defense and Intelligence