Skip to main content
U.S. flag

An official website of the United States government

FedRAMP Marketplace

About FedRAMP Marketplace

The FedRAMP Marketplace is a searchable and sortable database of CSOs that have achieved a FedRAMP designation, a list of federal agencies using FedRAMP Authorized CSOs, and FedRAMP recognized assessors/auditors (3PAOs) that can perform a FedRAMP assessment.

Learn more about Marketplace

Click Below to Filter Marketplace by List Type:

Provider
Service Offering
Service Model
Impact Level
Status
Authorizations
Reuse

Abnormal AI
Abnormal AI for Government

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Abnormal AI for Government (Abnormal Gov) is a cloud-native, API-based offering that provides holistic email security for cloud email platforms – Microsoft365 and Google Workspace, against the full spectrum of email attacks including advanced phishing, fraud, account compromise, supply chain compromise, user-reporting phishing, and more. The platform connects via API to analyze thousands of signals from multiple data sets and precisely baseline known behavior of every employee within an organization and every vendor within the supply chain. Autonomous AI models enable Abnormal Gov to detect anomalous activity and stop never-before-seen attacks quickly and accurately. The platform also serves as an AI Security Co-worker by fully automating the triage and remediation of user-reported emails. AI models judge user-reported emails as safe, spam, or malicious and automatically remediate malicious emails across all affected users using AI, eliminating any manual intervention by security analysts. Additionally, AI models automatically learn the behavioral preferences of every employee through their folder movements of graymail and autonomously declutter inboxes from unwanted mail thereby boosting employee productivity. Abnormal Gov’s cloud email security product suite includes Inbound Email Security, Email Account Takeover Protection, AI Security Mailbox, Email Security Posture Management, and Email Productivity. The platform leverages a multi-tenant government cloud computing environment and is available for public, federal, state, local, and tribal governments.
Absolute Security
Absolute Secure Endpoint Product Suite

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Absolute Secure Endpoint offers an agent-based endpoint resilience solution powered by Absolute Persistence®; a patented technology embedded in the firmware of over 600 million devices. This unique technology ensures an unbreakable connection between endpoints and the Absolute Secure Endpoint SaaS platform, serving as a trusted source of truth for device and application health. It automates self-healing for mission-critical applications and security controls while providing a robust lifeline for protecting at-risk devices and data. Organizations can locate, freeze, and wipe lost or stolen devices in accordance with NIST standards, enabling IT and security teams to enhance cyber resilience, strengthen security posture, and maintain compliance. Key Capabilities: The Absolute Secure Endpoint suite allows customers to remotely manage their endpoint devices through a Web UI (Customer Center (CC) Console) or Public APIs, delivering the following features: • Track Hardware: Monitor and manage device inventories. • Measure Device Usage: Analyze usage patterns to optimize resources. • Monitor Installed Software: Streamline compliance and software audits. • Assess Security Posture: Gain insights into endpoint security. • Monitor Critical Application Health: Ensure mission-critical applications run optimally. • Detect Unauthorized Device Movement: Prevent unauthorized access and data breaches. • Remotely Freeze Devices: Lock devices to prevent misuse. • Remotely Delete Data: Securely wipe sensitive information when necessary. • Enable Firmware Protection: Safeguard devices at the firmware level. • Make Critical Applications Self-Healing: Automatically restore essential applications. • Identify Sensitive Information on Devices: Detect and classify sensitive data. • Remotely Query & Remediate Devices at Scale: Address issues across large device populations. • Comply Module for Secure Endpoint: Strengthen endpoint compliance with advanced tools. Supported Use Cases: The suite addresses a wide range of operational and security challenges: • Device Lifecycle Management: Simplify provisioning, maintenance, and decommissioning of devices. • Automate Hardware Audits: Improve audit accuracy while reducing manual effort. • Automate Software Audits: Ensure software compliance across endpoints. • Improve Help Desk Efficiency: Speed up the resolution of device issues. • Find and Fix Vulnerabilities: Detect and remediate endpoint weaknesses. • Enforce Security Standards: Apply consistent security policies across the organization. • Detect Endpoint Risks: Monitor and respond to emerging threats. • Respond to Endpoint Risks: Execute rapid, effective countermeasures. • Provide Evidence of Compliance: Demonstrate adherence to regulatory standards. • GDPR Compliance: Protect personal data and meet privacy requirements. • Next-Generation Cyber Resilience: Defend against evolving cyber threats with advanced protection. • Enterprise Security and Compliance: Meet rigorous security and regulatory requirements. • Firmware-Embedded Resilience: Protect devices persistently at the firmware level. • Validation of Secure and Compliant Devices: Ensure only compliant devices access corporate networks. • Optimized Remote Work Security: Strengthen security for remote and hybrid work environments. • Automated Remediation for Incidents: Automatically address critical errors and system issues to ensure seamless operation and stability. With its innovative technology, advanced remediation capabilities, and comprehensive features, Absolute Secure Endpoint empowers organizations to build stronger, more resilient endpoint security ecosystems tailored to modern challenges.
Accellion USA, LLC.
Kiteworks Federal Cloud

Authorizations

18

Reuse

18

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Kiteworks Private Data Network is a FedRAMP Authorized service at the Moderate Impact Level that provides data security, governance, and compliance capabilities. The service consists of the following core components and functions: System Components - Virtual private cloud (VPC) environment with dedicated servers for each customer - Encrypted file storage system - Data transfer protocols including SFTP, HTTPS, and SMTP - Authentication and authorization services - Audit logging and monitoring systems - Security scanning and threat detection services Core Functions - File transfer and sharing capabilities via web interface, email, SFTP, MFT, and APIs - Role- and attribute-based access control and user authentication - File encryption at rest and in transit using FIPS 140-3 validated cryptographic modules - Audit logging of all system and user activities - Integration with customer directory services (LDAP/Active Directory, etc., see below) - Multi-factor authentication support - DLP integration - Embedded antivirus Possessionless Editing (SafeEDIT) System Components and Functions - File streaming service for secure remote data access and collaboration - Data rendering system for file type conversion - Audit logging system for data interactions - Versioning system for file changes - Authorization validation service - File integrity verification system - Session management service - Access revocation controls - Activity monitoring system Security Features - Customer-managed encryption keys - Single-tenant deployment providing data isolation between customers - Continuous security monitoring and scanning - File-level role- and attributed-based access controls - Remote device management capabilities - Security event logging and reporting - Integration with customer SIEM systems Compliance Capabilities - Audit log generation and retention - Policy enforcement mechanisms - Compliance reporting tools - Data locality controls - Access tracking and monitoring - Chain of custody documentation Integration Interfaces - REST APIs for system integration and SCIM authentication support - SMTP interface for email services - SFTP/FTPS/CIFS/SMB interfaces for file transfer - LDAP/AD, SAML 2.0, Kerberos, PIV/CAC, time-based one-time password (TOTP) authenticators, SMS, and SFTP certificate connectors for authentication - SIEM integration for security monitoring - DLP and CDR system integrations - The system operates within a defined authorization boundary and undergoes continuous monitoring and regular security assessments in accordance with FedRAMP requirements. To learn more about what Kiteworks can do for government agencies, please visit: https://www.kiteworks.com/solutions/government/
Acquia Inc.
Acquia Cloud

Authorizations

27

Reuse

28

Service Model
PaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Acquia provides the leading cloud platform for building, delivering, and optimizing digital experiences. Acquia is the enterprise platform behind Drupal, the leading open-source content management system, recognized as a Magic Quadrant Leader by Gartner two years in a row. Our platform enables agencies to foster greater digital engagement with citizens and securely deliver mission essential information and services with greater speed, agility, and resiliency. The City of LA, State of New York, FEMA, Department of Homeland Security and many other government agencies rely on the Acquia platform to build websites and digital experiences that meet the needs of their citizens, internal users and IT teams while moving their missions forward. These agencies know that a citizen-centric government requires more than simply taking the existing physical structure and making it digital. Today the term "digital" has taken on a new meaning. In the private sector, consumers can shop, pay bills, and even conduct banking online, and now they're expecting to conduct government business online in the same way. The most forward-thinking government IT managers are finding ways to meet expectations set by the private sector, and then going above and beyond to serve citizens. With the Acquia Platform governments and agencies can use limited taxpayer dollars efficiently to build sites and experience that meet the needs of IT, deliver on the mission and give citizens crucial information they need.
Acuant, Inc.
Connect, Ozone, & Facial Recognition System (COFRS)

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions. Acuant's Trusted Identity Platform is powered by AI and human assisted machine learning to deliver unparalleled results and operational efficiency. Acuant Connect, Ozone and Facial Recognition System (COFRS) combines four product lines to fulfill the need to authenticate an individual against an identity document they present to establish a trusted relationship. COFRS is a Software as a Service (SaaS) solution that provides an extremely robust basis for identity proofing. The products together authenticate the physical and digital information protecting the authenticity and integrity of the document, provide an assessment of the degree of match of the individual to the photo(s) stored on the document, and perform presentation attack detection via liveness assessment of the individual performing the transaction. - AssureID Connect SaaS authenticates the physical security features of the document - Ozone eMRTD Authentication SaaS ensures the electronic data is cryptographically intact and digitally bound to a trusted issuing authority - Once the document has been determined to be authentic and unmodified from its initial issuance, Acuant FaceID Government SaaS performs a facial recognition match of the photo(s) from the document with the individual presenting the document - Acuant Passive Liveness SaaS performs presentation attack detection to thwart fraud Document authentication is vital part of confirming the identity of an individual. Authenticating a document requires reviewing the physical document for the presence of known security features;features which are specific to each document type and series from a given issuer. The security features that are found on the presented document then need to be compared against the expected/known security features for the specific document and its issuer. Additionally, with the advent of electronic identity documents, the electronic data stored on the document must be authenticated and validated using Public Key Infrastructure (PKI) components to cryptographically assess the data encoded in the chip of the document and their binding to the Issuer. Finally, to ensure the document belongs to the individual presenting the document, a biometric match comparing the image from the document to the individual should be made, and the liveness of the individual must be determined - especially in remote vetting situations.
Aqua Security Software Inc.
Aqua Platform for Government

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
The Aqua Platform for Government is a Cloud Native Application Protection Platform (CNAPP) comprised of fully integrated security and compliance capabilities that visualize, prioritize, and eliminate risk in minutes across the full software development lifecycle. Automated policies for shift-left prevention and runtime detection and response reduce your attack surface and mitigate active attacks—before damaging losses can occur. Aqua empowers customers to unleash the full potential of their digital transformation and accelerate innovation with the confidence that their cloud native applications are secured from start to finish, at any scale. The Aqua Platform is a full-suite cloud service offering that provides customers with the capability to scan, monitor, and manage applications, containers, virtual machines, and workloads, as well as to validate applicable compliance controls and regulations. The Aqua Platform comprises six different service modules, listed below, that provide various scanning and monitoring functionalities: Supply Chain: The Supply Chain module allows customers to perform container image and registry scanning, as well as to scan customer code, images and artifacts as a part of their build pipeline. Workload Protection: Deploys sensors and agents within a customer’s cloud environment to provide protection on customer-defined components via Enforcer functionality. CyberCenter: The CyberCenter service monitors scans and uses comparison against a database aggregated from multiple threat intelligence sources to identify vulnerabilities and malware within container images. Cloud Security Posture Management (CSPM): The CSPM module provides customers the ability to integrate with one or more cloud infrastructure accounts to scan the entire account, correlate events across the account, provide account-wide remediation, and monitor and write compliance controls across the account. From these scans, Aqua Platform for Federal provides customers with an overall score based on identified vulnerabilities and compliance with defined configuration policies. The CSPAAS service acts to allow interfacing between the USE and CSPM services within Aqua Platform for Government.
Armis Federal LLC
Armis FedRAMP Edition (AFE)

Authorizations

5

Reuse

4

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Armis, FedRAMP Edition (AFE) is an agentless, enterprise-class security platform purpose-built to help organizations discover and secure managed, unmanaged, and IoT devices, including medical devices and industrial control systems (ICS). Armis discovers every managed, unmanaged, and IoT device in any environment, analyzes device behavior to identify risks, vulnerabilities or attacks, and protects critical business information and systems. Armis easily integrates with existing security products. AFE passively monitors wired and wireless traffic in the environment to identify every device and to understand its behavior without disruption. AFE analyzes this data in the AFE Risk Engine which uses device profiles and characteristics from the AFE Device Knowledgebase to identify each device, assess its risks & vulnerabilities, detect threats, and recommend remediation actions. Visibility: AFE closes the Continuous Diagnostic and Mitigation Dashboard visibility gap with unmanaged and IoT devices. AFE discovers and classifies every managed, unmanaged, and IoT device in the environment including servers, laptops, smartphones, VoIP phones, smart TVs, IP cameras, printers, 5G, HVAC controls, medical devices, industrial controls, and more. AFE can even identify off-network devices using Wi-Fi, Bluetooth, and other protocols in any environment. The comprehensive device inventory that AFE generates includes critical information such as device manufacturer, model, serial number, location, username, operating system, installed applications, and connections made over time. In addition to discovering and classifying a device, AFE calculates its risk score based on factors such as vulnerabilities, known attack patterns, as well as the behaviors observed of each device in the environment. This risk score helps security teams understand their attack surface and meet compliance with regulatory frameworks that require identification and prioritization of vulnerabilities. Insights: The AFE Risk Engine continuously monitors the behavior of every device in the environment for behavioral anomalies. Working with the AFE Device Knowledgebase, AFE compares the real-time behavior of each device with: - Historical device behavior - Behavior of similar devices in the Customer's environment - Behavior of similar devices in other environments - Common attack techniques - Information from threat intelligence feeds Actions: With these types of critical device and behavioral insights, AFE is able to identify threats and attacks. When AFE detects a threat, it can alert security teams and trigger automated action to stop an attack. Through integrations with network infrastructure, as well as the Customer's existing security enforcement points like Cisco and Palo Alto Networks firewalls, and network access control (NAC) products such as Cisco ISE and Aruba ClearPass, AFE can restrict access or quarantine suspicious or malicious devices. Easy Integration: AFE requires no agents or additional hardware to deploy. AFE integrates with existing firewalls or NAC, security management systems such as SIEM, ticketing systems, and asset databases. These integrations allow AFE to leverage existing investments to achieve greater value and more automated response.
Autodesk
Autodesk for Government

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Autodesk for Government is a SaaS offering hosted in a multi-tenant cloud computing environment. It includes two specialized solutions for Architecture, Engineering, and Construction (AEC) projects: Autodesk Docs for Government and Autodesk BIM Collaborate Pro for Government. These solutions are available to federal, state, local, and tribal governments, government contractors, U.S. Public Education, Federally Funded Research Development Centers, and Department of Homeland Security PPD-21 Critical Infrastructure entities, addressing shared concerns about compliance and security. Autodesk Docs for Government is built on top of Autodesk Platform Services (APS) and provides document storage, management, and file sharing; model viewing; and communication among and across teams. Autodesk Docs for Government simplifies collaboration and data management from design to construction and streamlines document review and approval workflows. Access to APS APIs is also available with this offering. Autodesk BIM Collaborate Pro for Government includes Autodesk Docs for Government capabilities, except for API access, in addition to powerful co-authoring and design collaboration tools through two key modules: Revit Cloud Worksharing (RCW) and Design Collaboration. Teams can co-author cloud models, centralize all project design data, and improve collaboration. The Design Collaboration module includes issues tracking, design timelines, and design packages.
Automattic, Inc.
WordPress VIP

Authorizations

7

Reuse

6

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Built on WordPress, the Content Management System (CMS) that powers 43% of the web, WordPress VIP provides a secure, compliant platform for management for government entities. With industry-leading security protocols, expert support, flexible architectures, plus 99.99% SLA, hourly backups, and reliable uptime, WordPress VIP takes the heavy lifting out of digitizing citizen services and modernizing legacy infrastructure. WordPress VIP is built on top of WordPress, an intuitive, easy-to-use CMS that many government employees already know. By adopting WordPress VIP, IT and technical staff can reduce the amount of support and training required to support their agency. But maintaining WordPress and ensuring the security of a WordPress setup can be challenging, and many solutions built on WordPress do not meet the exacting requirements of federal agencies. Security is WordPress VIP's chief priority. Our data security best practices include end-to-end encryption from edge to origin, resource and data isolation, and encrypted offsite backups. We address physical security through an independently owned and operated network of industry-certified global data centers. Every origin server meets the International Organization of Standardization (ISO), International Electrotechnical Commission (IEC) 27001 certification, Standards for Attestation Engagements (SSAE) No. 18 (SOC1) and SOC2 Type 2, and includes ongoing surveillance reviews. At the application level, every instance is protected with Single Sign-On, SSL/HTTPS/HSTS, required 2FA, and logging and auditing at the application, web server, load balancing, database, and operating system layers. WordPress VIP also fully manages updates and version and responds to any potential security issues immediately, easing the burden of ongoing security and maintenance and lowering total cost of ownership. While our stringent security protocols protect sensitive information, our intuitive and easy-to-use content management workflows make it easy to provide citizens with up-to-date, accessible, and accurate information. Even those with little technical knowledge can successfully navigate WordPress VIP's editing interface with minimal training.
Avaya, Inc.
Avaya Government Cloud

Authorizations

5

Reuse

4

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Avaya OneCloud for Government is a government community cloud, FedRAMP Moderate authorized Unified Communications & Collaboration as a service (UCaaS) plus Contact Center as a service (CCaaS) cloud offering the following to government agencies: Government Community Cloud (GCC) - The Government Community Cloud is a preferred characteristic for Government wide solutions and it comes with less risk to Government agencies than other forms of cloud models (e.g. public). Better customization and security - The Service is a dedicated (not multi-tenant) Unified Communication (UC)/Contact Center (CC) cloud offering. Each agency is provided their own individual software stack/instance on a virtual platform that provides a highly customizable, reliable and secure environment. The Service is monitored and managed 365 x 24 x 7. Industry recognized Avaya Unified Communications (UC) software is at the heart of the Service providing enterprise quality UC features including telephony, unified messaging, mobility, instant messaging & presence plus audio, web and video collaboration. Secure full featured collaboration provides a reservation-less "Meet-me" audio, video and web collaboration virtual room with security code access and the ability to launch the bridge from any phone anywhere. Industry recognized Avaya Contact Center/Customer Experience applications are at the core of the CCaaS offer with composability via myriad Avaya ecosystem partners to deliver rich and effective customer experience solutions including, skills-based routing, CC reporting/management, call recording, quality monitoring, analytics, workforce management, workforce optimization, self-service with natural language speech recognition, proactive outbound calling, callback assistance, AI, chatbots, digital channels, etc. Emergency Calling Compliance - Kari's Law and Ray Baum’s Act compliance via optional emergency calling solution all authorized by FedRAMP. Predictable Operational Expense (OPEX) billing model underpins the Avaya OneCloud for Government service.
AvePoint Inc.
AvePoint Online Services for US Government (AOS-UG)

Authorizations

7

Reuse

6

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
AvePoint Online Services for US Government provides centralized management, governance, backup, migration, reporting, information lifecycle management, and more for your multi-SaaS workloads all in one platform. When collaborating across workplace technologies, proper governance, security, and resilience approaches are critical. Native capabilities often fall short, leading to operational inefficiencies, increased risk, and difficulty assuring compliance. As AvePoint’s Confidence Platform for the Public Sector, AvePoint Online Services for US Government supplements these native capabilities to achieve comprehensive data management and governance, and ensure your organization is prepared for AI while driving usage, adoption, and maximizing return on investment. With AvePoint Online Services for US Government, public sector organizations can leverage the functionalities below to confidently navigate the complexities of modern digital collaboration, ensuring their data is secure, compliant, and efficiently managed. AvePoint Opus – Optimize cloud storage & manage information lifecycles for Microsoft 365 AvePoint tyGraph – Workforce analytics for Microsoft 365 AvePoint Virtual Assistant (AVA) - data recovery and AI chatbot Cense – License Management for Microsoft 365 Cloud Backup – Backup and protection for services in Microsoft 365, Microsoft Dynamics 365, Azure, Google Workspace, Google Classroom and Salesforce Cloud Governance – Structured cloud workspace control for Microsoft 365 Cloud Management – Automated Microsoft 365 administration Confide – Secure internal and external collaboration for complex projects Curricula – Corporate Learning Management System Elements – Mult-tenant management for Microsoft 365, Dynamics, Azure, Salesforce, and Google Workspace EnPower – Access management for Microsoft 365 Examena – Digital Assessment management Fly (SaaS) - SaaS based tenant-to-tenant migration solution to or within Microsoft 365 Insights – Security reporting for Microsoft 365 MyHub – Centralized collaboration Hub for Microsoft 365 Policies - Microsoft 365 security management and enforcement. ReCenter – End-user file restore for Microsoft 365 and Google Workspace
Avue Technologies
Avue Digital Services

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Avue is a web-based, outsourced, digital service delivery system offered by Avue Technologies Corporation; remotely-hosted in the Amazon GovCloud, and remotely-managed by Avue Technologies Corporation in Tacoma, Washington. The Avue service is provided through a single interface to handle all aspects of human capital management. Avue is a Software-as-a-Service (SaaS) cloud-based Human Capital Management and Operations Management platform. Avue is the leader in federal talent acquisition, talent management, talent science, and human capital technology solutions. The platform serves include a diverse array of agencies that include Title 5 and alternative personnel systems such as Title 38, Title 10, Title 32, and FIRREA. Avue is a native-federal HCM platform offered as a SaaS/cloud solution, with 99.9% uptime, since 2001. Avue's offering includes a five component solution: (1) the native federal enterprise SaaS platform, (2) highly expert Avue staff available online and onsite to ensure the platform is responsive to the client's operational needs, (3) embedded IT services that ensure all elements of the technology and data flow and operate seamlessly with the client's IT environment, (4) social media, communications, and marketing services for online-, mobile-, and social-media based talent acquisition, and (5) on-demand HR staff augmentation to add capacity and assist agency HR staff with Avue HR experts, in any location at any time. Avue's database contains job duties, skills, and competencies, developmental activities, training courses, performance standards, recruitment criteria and applicant assessment criteria, along with a range of other associated content. This database and its companion rules engines allow Avue to deliver services in a rapid and efficient manner while at the same time ensuring compliance with statutes and regulations, notably the Uniform Guidelines on Employee Selection Procedures, governing OPM and delegated examining regulations, and the federal Merit System. Avue's services are bundled with the database and technology platform in a manner that ensures delivery of the services are not only compliant but responsive to managemen'’s needs, quick, and superior in quality and result. Avue is HRLOB certified by OPM, OMB, and GSA for both Core and Non-Core HR services including Classification, Staffing and Recruitment, Performance Management, Enterprise Learning Management, Worker Compensation, Payroll, Time and Attendance, Benefits and Retirement Management, Organization Optimization, and Workforce Planning and Management - a total of 15 modules. Avue Technologies is currently interconnected to electronically post vacancies to USAJOBs and receive online application and with the National Finance Center (NFC) for personnel actions and workforce management activities.
Axon
US Axon FedCloud - High

Authorizations

18

Reuse

17

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
US Axon FedCloud enables cloud-based workflows for digital evidence management, situational awareness, and records management to support the operational needs of agencies. The system operates as an isolated region of Axon Cloud Services that is dedicated to the US Federal community. US Axon FedCloud offerings include Axon Evidence, Axon Respond, and Axon Records while also acting as the core control center over Axon devices and client applications. These devices and client applications include in-car camera systems, body-worn cameras, TASER devices, Axon Interview Room, and Axon Upload XT. Axon Evidence acts as a central repository for customers' digital evidence and a central management console for Axon products and devices. With expansive ingest, smooth playback, and intuitive search, Axon Evidence makes it simple to connect and manage growing stores of data—video, photos, documents and more—in a single, secure system. Axon Respond is a real-time operations platform which integrates real-time situational awareness and unified communications within a modern incident management solution. Gathering data from sensors in the field, agencies are empowered to know when events occur before it's voiced through traditional contact methods and rapidly coordinate responses with a unified communications platform. Axon Records harnesses the power of automation to save countless hours in the report writing, submission, and review process, helping agencies get more efficiency by breaking down data silos. With direct access to body-worn camera, in-car and citizen-captured video footage, documents, images, and more, reports can be created faster. Critical evidence can be easily shared to remove the wall between digital evidence and reports.
Axonius Federal Systems
Axonius Asset Cloud

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Axonius Platform is a SaaS offering using a single-tenant Public Cloud computing environment to provide customers with a comprehensive solution for managing their assets, both on-premises and in the cloud, optimizing their IT operations, and ensuring the security and compliance of their assets. Axonius Platform benefits any organization that manages its IT operations, such as government customers, including federal, state, local, and tribal governments, as well as research institutions, federal contractors, government contractors, and other commercial customers. With Axonius Platform, organizations can discover and track their hardware and software assets, including servers, laptops, desktops, mobile devices, and cloud-based applications. The software automatically collects data from a variety of sources, including network devices, operating systems, and third-party applications, and presents it in an easy-to-use dashboard. In addition to asset management, the platform offers SaaS management capabilities, allowing organizations to monitor and control their cloud-based applications and services. With Axonius Platform, organizations can gain insights into their SaaS usage, track license compliance, and optimize their cloud spend. Moreover, the platform provides advanced security features, including continuous monitoring and compliance checks, to ensure that assets are secure and compliant. It also integrates with existing security tools and workflows, making it easy to manage and remediate security issues. This platform enables organizations to gain extensive visibility into their assets, both on-premises and in the cloud, and manage them effectively.
BeyondTrust
Secure Remote Access

Authorizations

5

Reuse

4

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The SRA application is a remote access management solution that is composed of two services: Privileged Remote Access (PRA) and Remote Support (RS). BeyondTrust’s SRA system allows organizations to apply the principle of least privilege through granular access management and extensive audit capabilities to their employees, vendors, and service desk personnel. PRA provides organizations the ability to control, manage, and audit the privileged access to sensitive systems and data without the use of a traditional virtual private network (VPN). PRA also allows for an enhanced approach to privilege session management to platforms in all environments, as well as secure password management and web access. RS provides service desk personnel secure access to fix remote devices, running on different platforms, through one solution. Common use cases include supporting multiple operating systems (OSs), like MAC, Windows, Linux, Mobile iOS, and Android devices. Additionally, RS allows organizations to extend the help desk perimeter while increasing security. Both RS and PRA have 3 main components that are associated with each individual instance of the product: 1) Representative Console (referred to as Access Console in PRA) - this executable is installed on the remote person connecting to a remote device. There are native binaries for Windows, Mac, Linux, iOS, Android, and HTML5 based version of this component. 2) JumpClient - this executable is installed on the remote device being connected to. There are native binaries for Windows, Mac, Linux, iOS and Android. When doing an ad-hoc session in Remote Support this executable is also referred to as the Customer Client. 3) Jumpoint - this executable acts as a gateway into remote networks and can broker connectivity using other protocols such as RDP and SSH and does not require the use of JumpClient. There are native binaries for Windows and Linux.
BlackBerry
BlackBerry Cloud - AtHoc Services for Government (High)

Authorizations

22

Reuse

21

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
BlackBerry's AtHoc is a networked crisis communication platform enabling corporations and government agencies to communicate and collaborate securely with their personnel and with other organizations through multiple devices during times of crises. BlackBerry's AtHoc platform addresses critical communications needs including: Account: AtHoc Account enables real-time visibility into location and status for effective personnel accountability and crisis handling before, during, and after emergencies. This integrated approach to personnel accountability enables inputs from managers about their team, call center operators, data streams from HR and travel systems, as well as self-reporting by individuals. Alert: AtHoc Alert provides a comprehensive crisis communication solution that unifies all channels and devices, empowering organizations, people, and communities to collaborate during critical events. AtHoc's flexible deployment options safeguards important personal information and enables enterprise-level command and control. Connect: AtHoc Connect empowers organizations to create their own permission-based network to establish interoperable communication and information sharing with organizations in their community. Collect: AtHoc Collect empowers your personnel in the field to be the "eyes and ears" of the operations center. AtHoc Collect enables on-scene personnel to report events, work progress, along with rich geo-tagged media that are worth a thousand words.
BLINK CHARGING
BLINK GOV

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
LI-SaaS
Status
FedRAMP Authorized
Blink Network provides a comprehensive solution for electric vehicle (EV) charging, employing a container-based, microservices architecture to allow for the management of charging stations, as well as a wide array of host and driver services. Charger Services The core of the Blink Network revolves around its charger services, which include: Access Control and Billing: Users are authenticated and billed based on their usage. The system supports detailed billing that can differentiate between driver pricing and other billing factors. Charging Session History: Each charging session is logged, capturing details such as duration, energy consumed, and cost, enabling precise tracking and management. Charging Station Configuration: Administrators can configure charging stations remotely, setting parameters such as maximum output and scheduling. Customer Services To enhance the EV driver experience, Blink Network offers several customer-oriented services: Station Locator: Drivers can find available public charging stations via the network, ensuring they can charge their vehicles conveniently. Session Management: Drivers can start and pay for charging sessions directly through the platform, supported by a seamless payment gateway. Notification Alerts: Users receive notifications about their charging status and other relevant alerts, enhancing communication and user engagement. Station Management Station management is critical for operational efficiency and includes: Pricing Policy Management: Administrators can set and adjust pricing based on duration or kWh used, allowing for flexible and dynamic pricing strategies. Access Policy Settings: Stations can be configured for public, private, or mixed use. Public stations can be integrated with popular mapping services like Google and Apple Maps for easy accessibility. Reporting: Comprehensive reports are available, detailing transactions, energy usage, revenue, station utilization, and environmental impact metrics. Real-time Monitoring: Continuous monitoring of station status with alerts ensures high uptime and prompt response to issues. Driver Mobile App The driver-facing component of the Blink Network includes: Account Management: Drivers can manage their profiles, set notification preferences, and enter payment information for automated billing. Charging Management: The app provides functionalities to find stations, check availability, initiate, and pay for charging sessions, all in real-time. API Integration API capabilities are central to the system, facilitating: Charging Operations (OCPI): Supports authentication and control of charging sessions. Charger Information (OCPI): Delivers real-time data on charger status, tariffs, and locations. CDR and Reports (OCPI): Provides detailed reports on energy consumption, parking duration, and costs for effective management. Data Security Data integrity and security are prioritized with stringent measures for data at rest and in transit, including: Host Information: Only essential details are stored, ensuring privacy and compliance. Driver Information: Sensitive information such as credit card details are tokenized; actual card numbers are never stored. Charging Station and Session Details: Comprehensive logging includes all transactional data without compromising user privacy.
BMC Software
BMC Helix

Authorizations

6

Reuse

5

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
BMC Helix in the AWS cloud accelerates agencies on their enterprise modernization journey. Organizations that are migrating to the cloud require a process that is seamless, successful, and uncompromising on security. This is particularly important to federal agencies that are experiencing ever-changing and demanding missions. Some highlights of the BMC solution include but are not limited to: * BMC Helix Portfolio Management – A comprehensive graphical tool that seamlessly connects Project and Portfolio Management with idea sourcing, idea management, and demand generation * BMC Helix Operations Management with AIOps – Predictive IT with AIOps, with service-centric monitoring, advanced event management, root cause isolation, and intelligent automation to improve performance * BMC Helix Continuous Optimization – Predictive analytics to manage IT resources with support for Kubernetes and pods, microservices, containers, and multi-cloud * BMC Helix Discovery – Discovery and dependency modeling delivers instant visibility into hardware, software, and services across multi-cloud, hybrid, and on-premises environments * BMC Helix ITSM (with Digital Workplace) – The gold standard in service management (previously authorized – now updated to v21.3) BMC Helix empowers organizations to: * Enable proactive service resolution, providing the ability to monitor, service, and remediate events as they occur * Accelerate agency enterprise modernization * Drive innovation as part of their digital transformation * Reduce costs and increase efficiencies * Deliver the industry-leading enterprise service management SaaS solution from the AWS cloud * Deliver the industry-leading enterprise operations management with AIOps SaaS solution from the AWS cloud * Leverage a modern persona based UX optimized across devices * Manage with powerful, stunning reports and visualizations allowing data driven insights Optimized for ITIL® 4, a leader in the Gartner Magic Quadrant for IT Service Support Management Tools and optimized specifically for government agencies, BMC Helix is hosted in the FedRAMP compliant Amazon Web Services (AWS) cloud and can be tailored to the needs of any agency with rapid implementations, flexible configuration, huge scalability and easy upgrades. Agencies using this service * Corporation for National & Community Service (CNCS) * Department of Agriculture * Office of Personnel Management * United States Forest Service
Bonterra
Apricot for Government

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
Bonterra Apricot for Government is a comprehensive case management solution designed to help agencies improve program outcomes, simplify complex workflows, and showcase their success — all while ensuring data security and compliance. Core capabilities Increase program efficiency • Optimize processes and boost efficiency: Standardize and automate key steps and tasks to simplify workflows, reduce administrative burden, and keep programs on track — without any extra work for your team. • Enhance participant engagement and support: Quickly and easily communicate with participants to boost engagement and provide the support they need. • Securely, easily manage data: Empower your team with real-time access to the data they need, while ensuring strict security and confidentiality of participant information. Measure and improve impact • Measure impact with data-driven insights: Develop a comprehensive framework for measuring program impact using our intuitive reporting tools and impact dashboards so you can continuously improve programs based on data. • Simplify data collection and management: Utilize customizable templates and tools to standardize data intake to consistently collect high-quality, accurate data. • Demonstrate impact and meet compliance: Easily create custom reports rooted in best practices to meet compliance standards and demonstrate program impact to funders
Boomi
AtomSphere

Authorizations

2

Reuse

6

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Boomi AtomSphere is a cloud-native integration Platform-as-a-Service (iPaaS) technology that lets you connect everyone to everything. As a SaaS - based technology it is faster, easier to use, less costly, and more flexible than legacy integration tools and techniques. As a pioneer and leader in Gartner's Enterprise iPaaS Magic Quadrant for 8 years in a row, the Boomi SaaS AtomSphere Platform has been solving the needs of government customers with end-to-end capabilities by integrating applications, systems, and connecting people. Boomi delivers in three key areas for our customers: - Modernization and Digital Transformation: Boomi is a key part of any modern IT foundation and enables the transformation of operations, ensuring proper connectivity and smooth data exchange when applications and infrastructure are migrated and consolidated. - Accelerating Cloud Smart Adoption: Speeding up cloud adoption to boost operational efficiency and implement shared services to foster collaboration and increase engagement. - Improving Constituents' Experience: Bringing together workforce processes and workflows from across organizations for a streamlined approach to customer experience and serve employees, partners, contractors, and citizens better. Covered by our FedRAMP Authorization are the following cloud products: - Integration: Overcome IT complexity and break down data silos by integrating on-premises and cloud application, various data sources and devices with Boomi Integration. Create a fabric of connectivity to unlock productivity and thrive within your digital technology foundation. Boomi Integration accelerates time to value leveraging a drag and drop UI, data mapping tools, and a comprehensive library of connectors, coupled with support for various integration patterns enable you to build any integrations with exceptional speed. - Master Data Hub (MDH): Boomi Master Data Hub is a cloud-native master data management (MDM) solution that sits at the center of the various data silos within your organization - including your existing MDM solution, to provide you an easy to implement, scalable, flexible, and secure master data management hub as a service. - API Management (APIM): Boomi API Management supports the full lifecycle of APIs in a hybrid environment. Configure APIs and expose real-time integrations effortlessly. Centrally test and deploy APIs and enforce contracts and policies with an API gateway. Monitor the health of APIs with usage dashboards and engage API developers using the catalog and developer portal. - B2B/EDI Management: Effectively integrate with your vendors, suppliers, distributors, partners, and marketplaces to simplify processes and trade smarter. Built-in support for a wide variety of traditional and modern EDI standards including XML, X12, EDIFACT, HC7, RosettaNet, Tradacoms, as well as the ability to define custom standards. - Flow: The drag-and-drop interface simplifies how agencies connect data across systems, replace manual processes, and collaborate cross-functionally. Flow allows you to build applications at scale, easily connect your data and flexibly deploy apps anywhere they are needed. - Boomi Managed Cloud Services (MCS) leverages the Boomi Public Cloud solution and provides further isolation and ancillary services in support of a Boomi Private Cloud. The service has been engineered to address security at three distinct points: network, application, and data; this three-tiered security approach is designed to protect data from unauthorized parties, keep it safe in transit and at rest, and allow customer access as needed. Boomi manages all aspects of MCS runtime instances, sparing MCS customers any work involved in configuring, monitoring, and managing hardware and software for Boomi processes.
Bridge Intelligence LLC. dba AssetIntel
Asset Management Suite (AMS)

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP In Process
Asset Management Suite (AMS) is a multi‑tenant Software‑as‑a‑Service platform operated in Microsoft Azure Government Cloud and authorized at the FedRAMP Moderate impact level. It supports the full inspection and lifecycle management of transportation assets—bridges, tunnels, culverts, and related structures—through three in‑boundary modules: - inspectX – inventory, scheduling, field data collection, review, and PDF report generation for bridges and tunnels. Includes SNBIX, a module purpose-built for SNBI-compliant inspections and data formatting. - emergencyX – event monitoring, incident logging, and post‑event inspection tracking. - manageX – enables prioritization of maintenance and capital projects and supports long-term planning based on asset condition, risk, and funding. AMS follows a micro‑services, hub‑and‑spoke architecture. Core components (Login Service, Application Hub, Core Services) run on Windows Server VMs behind Azure Application Gateway and Web Application Firewall. Data is stored in Azure SQL (structured data) and Azure Blob Storage (multimedia) and exchanged via Azure Service Bus. All traffic is protected with TLS 1.2+ using FIPS 140‑validated cryptographic modules; secrets are managed in Azure Key Vault. User authentication and RBAC are handled through Azure Active Directory (IAL2/AAL2/FAL2). Audit and performance logs are forwarded to Datadog for continuous monitoring. Only these components and services are included within the FedRAMP authorization boundary; no external customer‑managed services are in scope.
Broadcom
Clarity

Authorizations

3

Reuse

2

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Broadcom Clarity offers US government agencies a highly secure and scalable platform to manage their entire project and portfolio lifecycle to better deliver services, projects and financials. Clarity provides customers the confidence they need on a highly secure and compliant platform. Clarity is a single platform that lets you manage multiple project portfolios and make data-driven investment decisions. The solution gives you modern project management tools to help you prioritize requirements, maximize resources and optimize portfolios with ease. * One platform. Collect, prioritize, assess and deliver projects, portfolios and products, and empower people enterprise-wide, with a single system of record. * Complete solution. Manage your entire innovation lifecycle, including project and portfolio management, demands and resources, and financials and time tracking. * Persona-based user experience. Flattening the learning curve drives adoption and boosts staff productivity. Modules are specifically designed for project managers, resources managers and project coordinators to support anything from ad hoc work to complex programs. * Team collaboration. New tools let team members collaborate within the context of their current work, such as resource or financial management. At the portfolio level, the quality of planning and execution increases significantly when employees can crowdsource ideas and decisions. * Delivery. Clarity PPM SaaS. Reduce cost and accelerate time to benefit, drive adoption and ensure you’re always on the latest release with a user-based subscription service delivered across a secure, scalable infrastructure.
Casepoint LLC
Casepoint Government

Authorizations

7

Reuse

6

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
Casepoint is a data discovery platform for legal, investigatory, compliance, and IT teams who struggle to get actionable insights for data-centric business processes like eDiscovery, investigations, and information requests. Casepoint empowers leading corporations and government organizations to reduce costs, lower risk, and improve time-to-insight. Casepoint’s easy-to-use AI-powered platform is purpose-built for organizations that require the highest level of security and scalability to meet the evolving demands of the modern data landscape. Casepoint Government is delivered as a SaaS offering using a multi-tenant government-only cloud computing environment and is used by government agencies to meet their complex needs, including: Legal Holds Regulatory Enforcement / Investigations Litigation (eDiscovery) FOIA / PRR Congressional Inquiries Legal Data Storage Task / Case Strategy and Management The Casepoint Government platform includes Casepoint Legal Hold, Casepoint eDiscovery, Casepoint FOIA, Casepoint Filestore, APIs for cloud collections, task management, and an app builder. Casepoint Government provides agencies with the capabilities needed to manage large volumes of data in litigation, investigations, congressional inquiries, and FOIA requests, including cloud-based collections, processing, culling, review, and highly customizable productions. It also offers built-in artificial intelligence and analytics with advanced tools for predictive analysis, search, and data visualization.
Check Point Software Technologies, Inc.
Check Point Infinity Platform for Government

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP In Process
Check Point Infinity Platform for Government is designed to provide a robust, unified cybersecurity solution tailored to meet the stringent security and compliance requirements of federal agencies. This platform integrates advanced threat prevention, secure email, and centralized management capabilities to safeguard federal data and systems against evolving cyber threats. The initial package includes the following components: Harmony Email: This solution provides advanced protection for email such as Microsoft 365 and GMail, against phishing, malware, ransomware, and account takeover attacks. It ensures secure communication and collaboration for federal agencies by leveraging AI-driven threat detection and prevention. ThreatCloud AI: ThreatCloud AI serves as the backbone of Check Point's threat intelligence ecosystem. It aggregates and analyzes global threat data in real-time, enabling proactive identification and mitigation of threats. ThreatCloud ensures that federal systems are continuously updated with the latest threat intelligence to prevent zero- day attacks and other sophisticated cyber threats. Infinity Portal: The Infinity Portal acts as a centralized management console, providing federal agencies with a single pane of glass to manage their cybersecurity posture. It enables streamlined policy enforcement, real-time monitoring, and comprehensive reporting, ensuring compliance with federal security standards. System Functionality and Use Case The Check Point Infinity Platform for Government is designed to: Protect Federal Systems and Data: By integrating advanced threat prevention and real-time threat intelligence, the platform safeguards federal systems against known and emerging cyber threats. Enhance Collaboration Security: Harmony Email and Collaboration ensures secure communication and collaboration within and across federal agencies, reducing the risk of data breaches and unauthorized access. Simplify Security Management: The Infinity Portal provides centralized visibility and control, enabling federal IT teams to efficiently manage their cybersecurity infrastructure and maintain compliance with federal regulations. Support Cloud-First Initiatives: The SaaS-based architecture aligns with federal cloud adoption strategies, providing scalability, flexibility, and cost efficiency. Federal Data Stored, Processed, or Transmitted: The "Check Point Infinity Platform for Government" is designed to handle various types of federal data, including: Personally Identifiable Information (PII): Such as employee or citizen data processed through email and collaboration tools. Sensitive But Unclassified (SBU) Data: Including internal agency communications, reports, and operational data. Controlled Unclassified Information (CUI): Such as data related to federal programs, contracts, or research that requires safeguarding. Threat Intelligence Data: Aggregated and analyzed within ThreatCloud to enhance the security posture of federal systems. The platform ensures that all data is stored, processed, and transmitted in compliance with federal security standards, including encryption in transit and at rest, access controls, and continuous monitoring to detect and respond to potential threats.
Cisco Systems Inc.
Cisco Unified Communications Manager Cloud for Government (Cisco UCM Cloud for Government)

Authorizations

8

Reuse

7

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Cisco Unified Communications Manager Cloud for Government (Cisco UCM Cloud for Government) is a complete unified communications service from the Cisco Cloud. It is built to provide government-level security so that organizations can collaborate with anyone, anywhere, on any device. The service is hosted by Cisco, sold by Cisco Powered partners. Cisco UCM Cloud for Government provides these core services: Voice and Video Calling:Simplify with industry-leading voice and video as a service. Cisco UCM Cloud for Government provides voice and video call control and supports Cisco's newest voice and video endpoints ranging from desktop phones, immersive video rooms and mobile and desktop clients. Voicemail and Integrated Messaging:Access messages the way you prefer from your desk phone, mobile phone, or desktop client. Instant Messaging and Presence:Cisco Jabber lets you find the right people, see if and how they are available, and collaborate using your preferred method. Use Cisco Jabber for presence, instant messaging (IM), voice and video calling, voice messaging, desktop sharing, and conferencing. Single App Experience:Webex for Government and Webex App allows customers to call, meet, and message on any device with a single unified application from Webex. Webex App brings together Cisco UCM Cloud for Government call control along with market leading Webex Meetings technology and advanced team collaboration capabilities including persistent messaging and file sharing. Conferencing:Use Cisco conferencing solutions to meet and manage meetings and projects in real time, to present, share, or collaborate from anywhere, anytime, on any device. Mobility:Cisco UCM Cloud for Government gives your mobile and remote users the freedom to be productive from anywhere, on any device. Give users one number to dial, redirect incoming calls to designated phones, move calls between a Cisco desktop and mobile phones, create personalized access lists, and give access to all your corporate collaboration features from mobile phones using Webex App or Cisco Jabber.
Cisco Systems Inc.
Cisco Cloudlock for Government

Authorizations

1

Reuse

35

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Cisco Cloudlock is the cloud-native Cloud Access Security Broker (CASB) that helps accelerate use of the cloud. Cisco Cloudlock secures your cloud users, data, and apps, combating account compromises, data breaches, and cloud app ecosystem risks, while facilitating compliance through a simple, open, and automated API-driven approach. Cisco Cloudlock is a simple, open, and automated solution that combats cloud account compromises, malicious insiders, data breaches, compliance violations, and cloud app ecosystem risks. With crowd-sourced security analytics across billions of data points, advanced machine learning, and the data scientist-led CyberLab, Cisco Cloudlock provides actionable cybersecurity intelligence that provides visibility and control over the most critical cloud security risks. Cloud User Security: Cross-platform User and Entity Behavior Analytics (UEBA) for SaaS, IaaS, PaaS, and IDaaS environments leverages advanced machine learning algorithms to detect anomalies. Cloudlock can also detect activities outside of whitelisted countries and actions across distances at impossible speeds. **Cloud Data Security:** Cloud Data Loss Prevention (DLP) continuously monitors cloud environments to detect and secure sensitive information through countless out-of-the-box policies as well as highly-tunable custom policies. Automated response actions can remediate risk in the event of a policy violation, including end-user notifications, encryption, transfer of ownership, quarantine, and more. Cloud App Security: The Cisco Cloudlock Apps Firewall discovers cloud apps connected via OAuth to your corporate environment, and provides a crowd-sourced Community Trust Rating for individual apps, as well as the ability to ban or whitelist them based on risk profile and access scope, increase employee awareness with email alerts, and revoke apps in bulk across the entire user base.
Cisco Systems Inc.
Cisco Meraki for Government

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Cisco Meraki for Government provides a secure and efficient way to support your networking transformation within budget. Our cloud-managed platform simplifies networking to make it easier to deploy, manage, and optimize networks – driving IT modernization and enabling hybrid work. Meraki helps future proof networks and allows agencies to stay ahead of changing citizen and regulatory demands while improving employee productivity.​ Meraki has developed the most sophisticated platform in the industry based on cloud-first operations, network intelligence (AI), and open APIs to better integrate and automate processes, while providing a way to customize the monitoring and management of a network. The Meraki platform is built with a modern cloud-managed architecture that is able to quickly scale to meet the needs of customers worldwide. ​ We have taken that knowledge and technical sophistication to create a tailored solution for the U.S. Government. Our solution gives government agencies the ability to quickly deploy, scale and manage cloud networks anywhere in the world in an effort to help meet their cloud-first initiatives. Security is a high priority of our solution, which is why we created a separate platform that stores data on U.S. soil and includes FIPS to further protect government telemetry data from device to cloud. ​Meraki will offer certain MS (Switching), MR (Wireless) and MX (Security and SD-WAN) devices as part of the offering.
Cisco Systems Inc.
Webex for Government

Authorizations

35

Reuse

34

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Webex for Government addresses the U.S. public sector’s collaboration needs in a single, secure package, relieving customers of the complexity of managing multiple point products from different vendors. The Webex for Government Suite provides a core set of capabilities that enable a hybrid workforce to collaborate securely and effectively from anywhere, on any device, and with anyone. Those core capabilities include: • Webex for Government Meetings simplifies your company’s workflows at scale. Equip your team with the most powerful tool to meet and exceed your agency’s goals. • Webex for Government Messaging keeps work flowing in between meetings with rich messaging and secure file sharing for continuous teamwork. • Webex for Government Calling is a proven cloud calling solution that delivers enterprise-grade calling functionality, enabling you to replace your on-premises PBX network with a globally trusted cloud calling solution. Webex Calling also provides powerful tools like voice queues and call routing to strengthen customer relationships. • Webex for Government Webinars simplifies webinar delivery and drives engagement with immersive content and interactive audience experiences. • Webex for Government Control Hub provides a centralized and comprehensive administrative portal for all your collaboration services. Whether you need to collaborate with remote colleagues, reach hybrid users, host webinars, address customer complaints, or offer technical support remotely, the Webex for Government Suite is the secure, compliant, collaboration solution. With Webex for Government Suite, you can reimagine your work by optimizing collaboration through AI-enabled software and hardware. It also helps you to reimagine your workspaces through collaboration devices that are purpose-built for your diverse needs and spaces. This collaboration solution can take your hybrid work setup from “good enough” to one that empowers your teams to collaborate seamlessly and securely so that you can focus on delivering additional business outcomes.
Cisco Systems Inc.
Cisco Umbrella for Government

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Cisco Umbrella for Government is a Cloud driven Secure Internet Gateway that provides protection from Internet based threats, for users wherever they go. Umbrella’s network is capable of processing billions of requests per day, analyzing and learning internet activity to determine where attacks are being staged, so it can block requests to unwanted and malicious destinations before a connection is even established. Cisco Umbrella for Government is a SaaS environment hosted on AWS GovCloud providing Cisco Umbrella services to government customers. Umbrella services hosted within Cisco Umbrella for Government are based on Cisco product lines available to end customers. The Cisco Umbrella for Government environment is designed and operated based on security compliance and operations best practice by automating the build and operational processes as much as possible using Infrastructure as Code (IaC), CIS benchmarks, vulnerability scanning, continuous monitoring of critical security controls and a managed system development process to obtain initial and continuous FedRAMP Moderate Approval to Operate (ATO). With the initial ATO, Cisco will be launching DNS-layer-security initially, GovDNS: DNS-layer security helps protect customers users on and off the network by stopping threats over any port or protocol before they reach customer network or endpoints. This will be followed by Secure Web Gateway, Cloud delivered Firewall, CASB, and DLP features. Cisco Umbrella for Government is hosted within AWS GovCloud as the Cloud Service Provider (CSP) which assures product lines are maintained in a secure and trusted environment. Umbrella for Government boundary includes the Production environment consisting of virtual compute, storage, databases, and internal management web applications. Umbrella for Government’s external Identity Provider (IdP) Okta (IDaaS Regulated Cloud) is used in tandem with AWS IAM supporting Single Sign-on (SSO) services. Duo Federal is used for multifactor authentication (MFA). Cisco Umbrella for Government meets GovCloud Moderate requirements with specific categorization of Moderate Confidentiality, Moderate Integrity, Moderate Availability (M-M-M) with no privacy data overlay based on the FedRAMP Federal Information Processing Standard (FIPS) 199 Categorization Template. Cisco Umbrella for Government is designed with defense-in-depth protection for hosted applications and workloads using network filtering, multifactor authentication, transport layer security, data-at-rest protection, near real time audit collection and analysis, intrusion detection, vulnerability analysis and system backups.
Cisco Systems, Inc.
Cisco Catalyst SD-WAN for Government (SDWAN-G)

Authorizations

4

Reuse

3

Service Model
IaaS
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Cisco Catalyst SD-WAN for Government (SDWAN-G), powered by Cisco Viptela/IOS XE, is a highly secure, cloud-scale architecture that is open, programmable, and scalable. All vetted and monitored through the rigorous FedRAMP authorization process. Use it to connect data centers, branches, campuses, and colocation facilities to improve network speed, security, and efficiency. Cisco Catalyst SDWAN-G is a cloud-delivered overlay WAN architecture connecting branches to data centers and multi-cloud environments through a single fabric and single pane of glass. Cisco Catalyst SDWAN-G helps ensure a predictable user experience for applications optimized for SaaS, IaaS, and PaaS connections. Comprehensive on-premises and cloud-based security protect against cyberthreats while enabling IT teams to accelerate the transition to a Secure Access Service Edge (SASE) architecture where and when it is needed. Cisco Catalyst SD-WAN Government (SDWAN-G) is owned, operated, and supported directly by Cisco for use in government offerings, providing the following capabilities: - Enhanced Visibility: Extend your network visibility and observability with our core government self-service portal. You'll gain actionable insights to help you transform network operations from reactive to highly proactive model. - Right Security, Right Place: On-premises or cloud-based security with secure SDWAN-G helps to accelerate the transition to a secure access service edge (SASE) architecture where and when it's needed. - Operational Simplicity: With a highly visualized interface and intuitive user experience for simplified configuration, management, operation, and monitoring across the Cisco Catalyst SDWAN-G fabric. The Cisco Catalyst SDWAN-G solution comes with pre-configured templates to automate and expedite the deployment of most common use cases. Guided step-by-step configuration designed to intelligently expedite onboarding of new devices, and full integration of unified communication, and security into Cisco Catalyst SDWAN-G. The Cisco Catalyst SDWAN-G solution is segregated into four planes with four key components: Manager - In the management plane, the Cisco Catalyst SD-WAN Manager is the centralized network management system and represents the user interface of the solution. Network administrators and operators can configure, provision, troubleshoot, and manage the entire overlay network from a simple graphical dashboard. Validator - In the orchestration plane, the Cisco Catalyst SD-WAN Validator automatically orchestrates connectivity between edge devices and Controllers. The Validator is largely responsible for the provisioning process as well as first-line authentication, control/management information distribution, and facilitating Network Address Translation (NAT) traversal. Controller - In the control plane, the Cisco Catalyst SD-WAN Controller is the component responsible for enforcing policies centrally. When branches come online, their routing information is exchanged with the Controller and not directly with other branches. The Controller works with the Validator to authenticate edge devices as they join the network and to orchestrate connectivity among the edge devices. Edge Devices - In the data plane, the Edge devices are responsible for establishing the network fabric and handle the transmission of data traffic. Edge devices come in multiple forms, virtual and physical, and are selected based on the connectivity, throughput, and functional needs of the site. The operating system of the Edge devices is securely developed and tested as part of Cisco’s Secure Development Lifecycle (CSDL) prior to releasing a version for the customer to deploy. In-boundary scanning of the operating system deployed with Edge devices for Cisco Catalyst SDWAN-G are scanned as part of Cisco’s continuous monitoring strategy. Collectively, the architecture of the Cisco Catalyst SDWAN-G fabric simplifies IT operations with automated provisioning, unified policies, streamlined management to help ensure rapid updates and resolutions, advanced network functionality, resiliency, and security. From a single pane of glass, Cisco Catalyst SDWAN-G helps organizations avoid complex configurations and frequent policy changes that lead to uneven user experiences, thereby increasing overall network efficiency and reliability.
Cloudera Government Solutions, Inc
Cloudera for Government

Authorizations

1

Reuse

0

Service Model
PaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Cloudera for Government is a secure and governed cloud service platform that offers a broad set of enterprise data cloud services with data analytics and artificial intelligence functionality. With Cloudera for Government, users can create and manage secure data lakes, self-service analytics, and machine learning services without installing and managing the data platform software. Cloudera for Government services are managed by Cloudera, but the customer’s data remains under their control in their AWS cloud account. Cloudera for Government lets customers: • Control cloud costs by automatically spinning up workloads when needed, scaling them as the load changes over time and suspending their operation when complete. • Isolate and control workloads based on user type, workload type, and workload priority. • Combat proliferating silos and centrally control customer and operational data across multi-cloud and hybrid environments. Cloudera for Government contains several layers of infrastructure, operations software, networks, and the CDP services. The two primary components of the solution are the CDP Control Plane and the Customer Workload Environment. The CDP Control Plane provides a set of core services that perform several functions across the platform. Control Plane services are implemented in a microservice architecture running on Kubernetes. These services can be configured and scaled independently based on their function. Each service performs a specialized function, and services can also communicate with other services within the Control Plane. Each set of microservices that performs a specific function is isolated from other sets of microservices. This segregation permits each set of microservices to have its own identity, allowing for differentiation of access between system components. The Workload Environment is a cloud account that has been associated with a customer tenant inside the Control Plane. A tenant is a group of users that share access to a specific set of resources and a billing relationship with Cloudera. In general, each Cloudera for Government customer is a single tenant, but large organizations may have multiple tenants. When a CDP service, such as a data lake, gets created, it gets created within a Workload Environment. The customer Workload Environment is separate from the Control Plane and resides within the customer’s AWS account outside the system authorization boundary.
Cocoon Data
SafeShare (SFS)

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
System Functionality: SFS is a zero-trust data security, sharing, and collaboration web platform that uses Cocoon Data-patented technology called Secure Objects to apply the principles of least privilege to the document level. SFS is a system similar to services such as Google Drive or Box. It enables the customer to securely share files and collaborate on them within the SFS web app. The difference is in how SFS implements encryption and the concept of zero-trust security with these files by encapsulating them in Cocoon Data-patented technology called Secure Objects. Each file has a unique encryption key tied to identity and access controls attributes such as clearance and classification. The SFS SaaS solution allows customers to securely store, share, and control access to encrypted files and folders within the customer’s organization, outside the authorization boundary, and from mobile devices through a self-contained unit called an “organization.” An organization (deployed customer tenant) is self-contained, meaning that the sharing and manipulation of content is handled solely within the scope of the organization itself; therefore, any SFS user’s ownership of content (including permissions to access the customer’s content/data) is specific to each organization. Through the implementation of Secure Objects, the identity of the user is validated through the identity provider (Lightweight Directory Access Protocol [LDAP], Personal Identity Verification [PIV], etc.) that ties the identity of the data owner to its associated encryption keys. Secure Objects must be associated with a key (for encryption) and an originator (data owner). Customers have the option to designate collaborators, metadata, and apply extensive access controls to their data. SFS is available to customers with two options for tenancy: Customers may use the shared tenancy option where they receive their own Organization within the SFS application. This option logically separates customers within the SFS application but each file is encrypted using Cocoon Data’s proprietary Secure Objects technology and the Cocoon Data Content Crypto Service cryptographic module (CMVP# 4307). Customers may opt for the private tenancy option where they receive their own instances of the SFS Application. The customer would have their own custom URL for logging into the system and their own dedicated infrastructure. This option allows the customer to set up multiple Organizations as they see fit to further control which of their users can access what files they’ve uploaded to SFS. The private tenancy option is the recommended option for Federal Agencies as it offers the strongest separation measures from other customers. The services/functions provided to the customer by SFS are delivered via containerized services. Containerization is used across multiple availability zones for redundancy. The containers that run the service are the Content Service, Access Service, GeoFence Service, Notification Service, Web Service, Office Server Service, API Server, etcd, Controller and Scheduler. Content Service The Content Service contains the FIPS validated Cocoon Data Content Crypto Service (Certificate #4307). This service is responsible for handling the encryption keys, content encryption, version control, integrity checks and overall management of the data. Access Service The Access Service contains the Cocoon Data Access Service. This service is responsible for the access control to the Cocoon Data system, internal authentication, external LDAP authorizations, and SAML 2.0 authentications. It is also responsible for determining if a user has access to files or not based on a multitude of factors including but not limited to; clearances and classification, geographic location of the user and geofencing, user security roles, and security permissions. The scope of access to documents can also be further restricted so that users with access will only be able to perform specific actions on the file. An example would be giving a user view, but not download permissions.
Cofense
Cofense PhishMe

Authorizations

7

Reuse

6

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Cofense PhishMe enables organizations to improve employee resiliency to phishing attacks through real-life simulated phishing scenarios. Thousands of the world's largest organizations in both public and private sector rely on PhishMe to condition employees to recognize and report phishing attacks. PhishMe enables trained awareness and compliance personnel to run simulated attacks using email templates that look like actual phishing attacks and includes on-the-spot educational content that displays when recipients click on one of the simulated phishing emails. For example, a scenario email might alert recipients that their (e.g. banking) credentials were compromised and ask the recipients to click a link in the email to reset their password. If a recipient does click the link, PhishMe displays educational content to help that individual recognize the characteristics of a phishing email. Through these safe examples, PhishMe customers can help their employees develop an awareness of the risks that real phishing emails pose and reduce their susceptibility of engaging with such emails in the future. To maximize the effectiveness of simulation campaigns and reduce the burden on awareness teams, Cofense PhishMe provides a combination of unique capabilities: - Content is based on real phishing attacks gleaned from real threat intelligence. That means that the scenarios you run are as realistic as possible, ensuring your organization is conditioned to the latest threats. - Responsive Delivery allows simulation operators to deliver phishing simulations while the user is active in their inbox, which drives higher scenario engagement. - Predefined playbooks with scenario recommendations based on user behavior and best practices. - PhishMe helps organizations transform their employees into the last line of active defense against phishing attacks - the leading cause of data breaches - through education, ongoing simulations, and an easy to use reporting tool, Cofense Reporter, so organizations can swiftly detect, respond to and thwart phishing attacks in their tracks.
Commvault Systems, Inc.
Commvault Cloud for Government

Authorizations

5

Reuse

4

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
Commvault Cloud for Government delivers a fully automated cyber resilient SaaS data backup and recovery solution, with automated deployment, reduced overhead, automated patching and upgrades, continuous security monitoring, and requiring no Agency maintenance. Fully differentiated storage enables the move to cloud by providing the option to leverage cloud or on-premises storage within the web console for hybrid cloud workloads that require synchronization to sustain operational readiness and mission delivery. Commvault Cloud for Government capabilities include the following workloads: -Microsoft 365 - For Exchange, Teams, SharePoint, and OneDrive -Dynamics 365 - For CE applications + Power Platform -Salesforce - For Salesforce -Active Directory - For Entra ID and Active Directory -VM & Kubernetes – Azure VM, Kubernetes, Microsoft Hyper-V, VMWare, AWC EC2, VMWare Cloud -Endpoint – For Laptops and Desktops -File & Object – For Windows Server, Azure Blob & Files, OCI Object Storage, Amazon S3, Linux/Unix -File & Object Archive – For compliance ready archiving -Database – For Microsoft SQL, Oracle, SAP HANA -Air Gap Protection (AGP) – secure and scalable cloud storage from Azure in minutes, delivering against your organization’s hybrid cloud strategy is available for Commvault Complete™ and HyperScale™ X deployments. The web-based console, called Command Center, provides a holistic customer data platform with both default and customizable configurations, -automated procedures for critical data protection and recovery tasks. Command Center delivers fully automated alerts on pre-set data anomalies, integrated audit reports, key word search (e.g., identifying PII or potential data spillages) and the ability remediate data issues at the granular level (e.g., file, specific email) using integrated indexing and metadata tags designed to protect data at IL4 & IL 5.
Concur Technologies, Inc.
Concur Cloud for Public Sector

Authorizations

19

Reuse

18

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Concur Cloud for Public Sector is a multi-tenant government-community cloud environment that hosts SAP Concur’s extensive suite of travel and expense cloud solutions, hosted on AWS GovCloud Infrastructure. Concur Cloud for Public Sector is designed for the U.S. Public Sector, managed by SAP Concur personnel on U.S. soil, and ensures data security, confidentiality, and availability without compromising usability standards of travel and spend management solutions. SAP Concur U.S. soil requirements do not necessarily extend to external services leveraged by Concur Cloud for Public Sector. Customers can be federal, state, local, tribal, territorial, federally funded research centers (FFRDCs), contractors working on behalf of the government, or lab entities. Concur Cloud for Public Sector provides a comprehensive environment the complex processes of government travel and expense. Users are able access the Federal Travel Regulation (FTR) and the Joint Travel Regulation (JTR) compliant Concur Cloud applications via standard web browsers or on smartphone with our SAP Concur mobile app. Concur Cloud for Public Sector brings commercial functionality and scalability to government agencies while still meeting government-mandated security and regulatory needs. Concur Travel and Expense: Includes a web application portal to communicate with system users and provide access to all services. The web application gives users the ability to facilitate travel booking services, change travel reservations, and authorize travel. From expense reports to pre trip approvals and expense reimbursements, the web application provides accurate accounting to government systems in compliance with the Federal Travel Regulation (FTR) and the Joint Travel Regulation (JTR). Users access applications within Concur Cloud for Public Sector by using standard web browsers via a URL or by using SAP Concur mobile applications for supported smart phone and tablet computer platforms. All data collected by SAP Concur applications is made available to customers via reporting enabled by the Cognos reporting tool that provides reports and the ability to create and/or manage new reports. ConcurGov: SAP Concur's travel and expense solution provided to US Federal Civilian customers under the ETS2 contract. ConcurGov includes a few additional services from CTE, such as GovPay, within Concur Cloud for Public Sector. Global Distribution Systems (GDSs): Travel content aggregators that sell content on behalf of airlines, hotels, rail, and rental car companies. Many organizations that provide travel services sell their content only through one or more GDS. Direct Connect Providers: Travel providers (airlines, hotels, rail, and rental car companies) that do not use GDSs but instead sell their travel content directly. Travel Management Companies (TMCs): Travel management companies that book travel on behalf of agency users, provide reservation fulfillment, reporting, and mid- and back-office systems as part of the entire end-to-end travel reservation process. E-Receipt Providers: Travel providers (airlines, hotels, rail, and rental car companies) that electronically transmit electronic receipts to SAP Concur for inclusion in travel voucher requests. Other Services: The following SAP Concur CTE products and services are available in CCPS: Advanced Care Budget Central Reconciliation Client Web Services Company Bill Statements Consultative Intelligence Custom Connector - Expense Detect by Oversight Concur Travel (Direct and Indirect) Essential Care Concur Expense ExpenseIt Extract Services Intelligence Production Sandbox Environment Concur Request SAP Integration Select Care Concur Travel & Expense TripLink User Support Desk for Public Sector
Consensus Cloud Solutions
Enterprise Cloud Fax Government (ECFax)

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
ECFax® is a unified, secure, cloud-based managed service solution that modernizes manual or semi-automated faxing processes and eliminates the need for multiple faxing solutions. Built with a human-centered design approach, ECFax® simplifies fax services, improves the user experience, provides secure data transfer for PHI/PII, and reduces administrative costs. The solution gives agencies more control over their fax data transfer processes, eliminates the need to manage multiple vendors, and offers 24/7 state-of-the-art faxing capability and help desk support. ECFax® delivers faxes digitally across multiple endpoints, including multifunction devices, shared folders, distribution lists, and inboxes: yielding operational efficiencies and reducing the need for standalone hardware. The solution is: ● Scalable: Hosted on Amazon Web Services GovCloud, ECFax® scales on- demand to hundreds of millions of pages per month through auto-scaling and elastic load balancing. ● Transparent: Performance dashboards provide visibility into service usage and operational status, which allows for near real-time production metrics. ● Secure: ECFax and add on components are FedRAMP High certified and meet the most important security and quality assurance protocols for data protection—including FIPS 140-2. ECFax® Services was developed specifically for the cloud, government agencies benefit from rapid scaling, efficiency and speed. ECFax® is: ● Accessible via AWS GovCloud; ● Section 508 Compliant ● Designed to meet the highest security standards required by government agencies In addition, the solution: ● Integrates with other applications via Restful API ● Supports IDP-initiated SSO for authentication ● Facilitates standardization across multiple locations
Contegix
Valiantys Federal (Formerly Contegix)

Authorizations

4

Reuse

11

Service Model
PaaS
Impact Level
Moderate
Status
FedRAMP Authorized
SecureCloud is provided by Valiantys Federal as a FedRAMP moderate Platform as a Service (PaaS) offering. The solution offers a multi-tenant, cloud-based, environment, with the option for deployment of single-tenant environments if required. Valiantys Federal solutions are designed to provide end-to-end managed hosting that empowers customers to retain complete control over the application environment, while dramatically reducing the time and cost associated with in-house administration. SecureCloud supports and deploys a variety of technologies based on tenant requirements. Valiantys also offers a cadre of US-based personnel specializing in deployment, configuration, and management of Atlassian tools, as well as optimizing DevSecOps workflows. Managed hosting services include performance monitoring and troubleshooting, Operating System management and patching, managed backups, and managed firewalls. Valiantys Federal also manages system owner approved configuration changes supporting the tenant’s environment. Providing a secure operating environment is at the forefront of SecureCloud and with that focus, Valiantys Federal provides a variety of services to meet tenant requirements for NIST, CMMC, and 800-171 requirements including audit capabilities, disaster recovery, and incident response support. These services include DoD STIG hardened servers, vulnerability scanning, a dedicated SIEM server, and the option for Disaster Recovery as a Service to meet agency specific RTO/RPOs for mission critical applications.
Continuum GRC, Inc.
ITAM

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Auto-mapped standards, automated documentation, real-time status, risk & maturity. When it comes to Compliance Cartography, no one is more comprehensive, secure and automated saving you time, trouble and money. Serving the enterprise to the start-up community. Continuum GRC is a software as a service (SaaS) product that is purpose build for users who perform audit & compliance assessments, risk assessment & risk management, governance & policy development, and all other manner of audits and assessments. Continuum GRC modules include support for the world’s frameworks including NIST 800-53. DoD SRG, CMMC, 800-171, 800-66, 800-30, FedRAMP, StateRAMP, CJIS, DFARS, HIPAA, ITRM, AICPA SOC 1, SOC 2, GDPR, ISO 27001, NERC CIP, EUCS, C5, PCI DSS, LADMF and hundreds of others. In addition to pre-configured questionnaires, assessment modules, and forms, the Continuum GRC ITAM SaaS application has creation tools that provide drag-n-drop easy custom creation for system administrators to construct their own assessment modules in 26 languages. Real time reports on Compliance Status, Risk Scores, Maturity Scores, workflows, tasking records, evidence management, and historical performance helping you stay proactive; not reactive. Use Continuum GRC to replace existing tools, templates, and manual processes in place to support internal compliance and GRC requirements. The automation of Continuum GRC reduces manual labor, complexity of and between frameworks, produces reports, SSPs, POA&Ms, graphics, dashboards, and related outputs all sustained over the entire lifecycle of the program all within a single view with a unified source for governance, risk and compliance that supercharges performance and eliminates complexity. For a complete list of features and capabilities, please visit https://continuumgrc.com/subscription-options/.
Cora Systems
Project Portfolio Management (PPM)

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
Cora PPM provides US Government agencies and DoD with a single Enterprise solution to manage all projects, programs, and initiatives, across their entire portfolio. By providing a single solution, Cora PPM ensures that all aspects of Project execution, from CIO to the Project Manager and any Contractors in support, have a single experience to ensure that their projects are on-time and on budget. Cora PPM enables organizations and agencies the ability to manage: Workforce Planning, Enterprise and Project Financials, Scheduling, Project Controls, Risks and Opportunities, Timesheets, Forecasting, Contractor Portal, and more all with embedded Workflow, Smart Forms and Registers all in a single experience. With more Agencies looking to execute their Mission’s with fewer resources or strained Staff, Cora PPM enables quicker decision making and execution by ensuring that all Project management data is within reach with the right context. The platform supports both dynamic as well as locked down Role creation to ensure the right data is available to the right staff. Embedded Audit controls ensure that as Projects iterate, all changes and versions are available for quick recall to ensure that information is never lost. Supporting both Project management execution, as well as ideation and innovation in a single Enterprise platform with Click to Config controls, ensures both a high ROI and lower TCO from other solutions in the marketplace. With both on-prem and cloud utilization, Cora PPM ensures Agencies with Classified Programs and Projects can leverage PPM excellence regardless of Mission parameters.
CORAS
CORAS Federal

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
CORAS Federal is a multi-tenant cloud offering of the CORAS NODES commercial offering for Federal, State and Local Government customers. CORAS Federal is a SaaS offering with a set of natively integrated Enterprise Decision Management Applications designed to solve the unique requirements of the Federal management and reporting processes. Our application enables federal organizations to make critical decisions rapidly and efficiently by utilizing Natural Language Processing, Artificial Intelligence, and Machine Learning-based decision management applications. CORAS NODES, through its platform and vast data discovery toolset, brings data and users together to collaborate on tasks, perform processes, and report in real-time. CORAS Federal is hosted on AWS GovCloud and utilizes AWS services to ensure both availability and scalability of the SaaS to meet its customers' demands. CORAS Federal system features align with cloud computing essential characteristics described in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-145. CORAS is dedicated to the unique needs of the federal government. We believe in providing off-the-shelf software flexible enough to be configured to meet the specific, information-based decision-making challenges of the federal government. As decision management is migrating away from spreadsheets, presentations, and email messages, it is critical for federal agencies to make fast decisions based on accurate data and transparency throughout the organization.
Cority Software Inc.
CorityOne

Authorizations

8

Reuse

7

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Cority gives every employee from the field to the board room the power to make a difference, reducing risks and creating a safer, healthier, and more sustainable world. Cority's people-first software solutions were built by EHS and sustainability experts who know the pressures businesses and agencies face. Time-tested, scalable, and configurable, CorityOne consists of a comprehensive suite of solutions for managing environmental, health, safety, sustainability, and quality programs. The responsible business platform combines datasets from across the organization to enable improved efficiencies, actionable insights, data-driven decisions, and more accurate reporting on performance. Trusted by over 1300 organizations globally, Cority deeply cares about helping people work toward a better future for everyone.  - Waste Management, Water Management, Air Management, Chemical Management - Impact Management, Sustainability Performance, ESG Management - Occupational Health, Employee Health, Industrial Hygiene, Industrial Ergonomics, Healthcare Systems, Office Ergonomics, COVID-19 Response - Incident Management, Audit & Inspections, Compliance Management, Mobile Solutions, Risk Management, Management of Change - Injury and Illness, Behaviour-Based Security, Contractor Safety - Data Quality, Benchmarks, CorInsights, CorAnalytics - Supplier Management, Quality Management, Product Management Cority's iterative deployment methodology and ability to integrate easily with other optional third-party services result in painless data migrations, software aligned to business processes, and low project risk. When agencies choose to join the Cority Community, they will benefit from the collaboration of thousands of other users and be supported by Cority software and EHS experts committed to Agency customer success. Cority leads the way in application and data center security, with certifications for ISO27001, ISO270017, ISO20018, SOC Type 2, and HIPAA
CoSo Cloud, LLC.
Knox Systems

Authorizations

6

Reuse

5

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Knox provides a comprehensive FedRAMP Moderate Authorized cloud platform that offers a distinguished record of secure and compliant operational performance. This robust and mature environment is specifically engineered to streamline the FedRAMP authorization journey for SaaS providers, enabling them to achieve their compliance objectives with efficiency and confidence. Our unwavering commitment is to deliver a highly secure and exceptionally reliable foundation for government agencies and their partners to host mission-critical applications and execute high-consequence operations, leveraging the infrastructure of leading hyperscalers such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). On this platform, we host a variety of services designed to meet diverse federal agency needs: Adobe Connect is designed for immersive synchronous online meeting experiences for training, large-scale webinars, and virtual classroom meetings for a distributed workforce. Adobe Learning Manager (ALM) is an asynchronous Learning Management System that enables Learning and Development teams to drive personalized learning experiences across multiple devices. Class Technologies Inc. (class.com) is the next generation virtual learning environment that enables active learning, collaboration, and engagement in online classes and virtual instructor-led training. Spacelift delivers a FedRAMP-compliant IaC automation platform for secure and efficient cloud infrastructure management. It streamlines OpenTofu, Terraform, Pulumi, and Kubernetes workflows with robust policy enforcement and secret management for government agencies. Multiple Federal agencies rely on the Knox platform to facilitate interagency crisis-communications and manage complex eLearning programs amongst multiple distributed stakeholders.
Creative Veteran Productions
Federal Immersive Learning Management System (FED-ILMS)

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP In Process
The Federal Immersive Learning Management System (FED ILMS) is an Immersive Learning Management System (ILMS) which allows for training to occur in multiple modalities. Includes: - Live Meeting (Webinar Capabilities) - eLearning (SCORM, xAPI, CMI5, etc.) - On-Demand Video content - Documents - Immersive Learning (3D based serious gaming, in multi-player or single player mode) User interactions are tracked for the purposes of determining when the user has met requirements of various courses. In addition, the application has the following features: Accreditation System: Application has a complete accreditation system, which allows for the tracking of certificate requirements for any content in the system and puts the user through a number of requirements in order to achieve certification. This includes pre/post tests, evaluations, confirmation of acceptance, etc. Event Registration System: System has a complete registration system to manage Live Webinar registration as well as course registration. Exhibit Hall Capabilities: Create the ability to create templated “Spaces” or content areas that can be edited by “space editors” which includes a complete capability for the delegation of editing content in the space to the right department or person that manages that space. Spaces create an area where the “exhibitor” can share documents, live chat, provide contact information, display videos, and have “Ad-Hoc” live meetings. Open AI: Application will, through the use of Cognitive Search, index the content in the application tagging it to a particular space, exhibit space, webinar, eLearning course, etc. This indexed content is then integrated with Open AI using the RAG pattern to feed the LLM to have a conversation within the content, which is context based (within a space, related to a course, etc.) Game API: External immersive learning experiences (serious Games) use the Game API to manage the user’s session, which includes the ability to set and get user progress, mark objectives as met, etc. In addition, the Game API allows for the management of VoIP in the case of multi-player games, and also for the real-time communications using Sockets over https for presence management and other real-time multi-player communication needs. Search Capabilities: Application has a comprehensive search feature which allows users to search the system across all content types and one click open the content from the search results, whether this content is a Webinar, an Exhibit Space, a Serious Game, or a Document. Rating and Favorites: System has the ability for the user to rate (providing this is enabled), and mark any content or space in the system as favorite, and this shows up in the user’s favorites as well “My Office” My Office: This is the space within the application where the user sees all of the training they have done, can print certificates, finish any certificate requirements they have not completed on any of the course or content they have consumed, access their favorites, edit their profiles, etc. Social Features: Application has real-time group chat and real-time one-on-one chat available throughout the application for real-time chat scenarios. This is useful within the context of spaces, live webinars, etc. The application also has a simple moderated Forums capability to allow the user to participate in forums which can be scoped to a space, content, or general in nature. CMS: The application has an administrative interface, called the “CMS” which allows the client administrator to manage all aspects of the platform. Access can be granularly assigned to only the features required, through which elevated access can be made available to manage system settings which are sensitive in nature.
CyberArk Software LTD
CyberArk Identity for Government

Authorizations

3

Reuse

5

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
CyberArk Identity is a cloud-based identity and access management solution that unifies many of the essential identity and access management services such as single sign-on (SSO), multi-factor authentication (MFA), and automation of user lifecycle management (LCM) (on-boarding and off-boarding). Using CyberArk Identity, Government Organizations can secure access to all the critical resources (applications, devices, IaaS, PaaS, VPNs etc.) across on-prem, in the cloud or hybrid. CyberArk Identity Standard and Adaptive SSO and Application Gateway - The CyberArk Identity App Catalog comes with thousands of application connections by default, but administrators can use a template to add any application to the catalog that is not already there and set up the authentication method through a variety of mechanisms, such as SAML, OpenID Connect (OIDC), OAuth2, WS-FED, or even username/password. CyberArk Identity App Gateway enables VPN-less access to legacy on-prem applications. It allows companies to set up a per-application, per-user access to individual legacy applications. CyberArk Identity Standard and Adaptive MFA - CyberArk Identity Standard Multi-factor Authentication (MFA) includes methods such as Security Keys, FIDO 2 Passwordless authenticators, Smart Cards, SMS/Email OTPs and Magic Links. These MFA methods are supported for all targets such as Windows Workstations, Servers and Macs, virtual desktops, VPNs, Web Apps, RADIUS Servers, 3rd party IDPs. CyberArk Identity Adaptive MFA allows customers to configure the solutions to consider various static and dynamic contexts such as device, location, network, day, time etc when evaluating access requests and applying authentication policies based on that. CyberArk Identity Standard and Advanced Lifecycle Management Standard Lifecycle Management (LCM) includes pre-integrated application provisioning and deprovisioning, AD sync and licensing for O365, self-service app request and automated approval workflow, app entitlement management, reporting and SIEM integration. Advanced Lifecycle Management includes inbound provisioning from HCM apps such as Workday, SuccessFactors, Bamboo HR, and Ultipro, as well as custom provisioning based on SCIM. CyberArk Identity Cloud Directory and Connector for On-Prem Directory Integrations Customers can also utilize the Identity Cloud Directory or install the Identity Connector inside their firewall to enable communication between their internal repositories (AD or LDAP) and the Identity services. The following customer side components are authorized as part of the CyberArk Identity for Government offering: CyberArk Identity Connector, CyberArk Windows Cloud Agent, CyberArk Mac Cloud Agent, CyberArk Identity Browser Extension, CyberArk Identity Mobile application for iOS.
CyberArk Software LTD
CyberArk Endpoint Privilege Manager (EPM) for Government

Authorizations

3

Reuse

5

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
With CyberArk Endpoint Privilege Manager government organizations can confidently defend against attacks by automatically removing local admin rights, enforcing least privilege, enabling policy-based comprehensive conditional application control, maintaining application catalog, and protecting the entire endpoint security stack from tampering – in line with a number of recent CISA alerts, advisories and recommendations, and starting day one. The EPM Secure and flexible SaaS management console allows for centralized policy-based and role-based management to ensure automated, robust and differentiated application of policies based on the user’s role. Automatic elevation of known good programs requiring elevation, including those legacy and not-UAC-aware, significantly cuts down on the IT Service Desk requests, while optional automatic access restriction (for example, network connectivity restriction) for unknown applications significantly reduces the area of attack and helps break ransomware kill chain. Out-of-the-box anti-ransomware policy allows to add additional layer of security around sensitive data and prevent data corruption even in the event of successful asset compromise and ransomware execution. Additional critical capabilities include blocking credentials, private keys, secrets, passwords, hashes, cookies and other sensitive information from memory, browsers, operating system and credential stores, effectively blocking most attacks based on credential compromise. Endpoint Privilege Manager helps with audit and compliance by addressing specific regulation requirements and creating audit trail for identity and privilege events on the endpoints. The following customer side components are authorized as part of the CyberArk EPM for Government offering: EPM Windows Agent, EPM MacOS Agent, EPM Linux Agent.
Cyware Labs, Inc.
Cyware Cyber Fusion Center (CFC)

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
Cyware Labs, Inc. (Cyware) Cyber Fusion Center (CFC) is an offering of full-stack Cyber security solutions for strategic, tactical, and operational intelligence sharing and threat response automation as well as orchestration services. Cyware Labs, Inc, Cyber Fusion Center (CFC) - Modules are - 1. CFC Threat Intel Exchange (CTIX) includes Threat Intelligence Platform (TIP) 2. CFC Collaborate (CSAP) 3. CFC Respond (CFTR) 4. CFC Orchestrate (CO) CFC Collaborate (CSAP): A mobile-enabled automated alert aggregation, dissemination, and strategic threat intelligence sharing platform for real-time situational awareness and enhanced collaboration between an organization’s security teams. Features include machine-to-machine orchestration, machine-to-human, orchestration, human-to-machine orchestration, role, location, and business alignment-based alerting, Cyware alerts, mobile-enabled intel sharing, macro intel ingestion, and crisis notifications. CFC Threat Intel Exchange (CTIX): A smart, client-server threat intelligence platform (TIP) for ingestion, enrichment, analysis, and bi-directional sharing of threat data within an organization’s trusted network. Features include any-to-any threat feed orchestration, micro threat intel ingestion, a hub & spoke sharing model, enrichment, correlation, and analysis of data, internal intel ingestion, automated intel actioning, and a multi-level intel view. CFC Respond (CFTR): A threat response automation platform that combines cyber fusion, advanced orchestration, and automation to stay ahead of increasingly sophisticated cyber threats affecting organizations in real-time. Features include malware management, a connect-the-dots threat analysis, incident response & management, triage management, threat actor tracking engine, vulnerability management, custom dashboards and reports, and a case management workflow. CFC Orchestrate (CO): A universal, security orchestration gateway for executing on-demand or event-triggered tasks across deployment environments. Features include flexible API, system playbooks, powerful customization, audit playbook extensions, the ability to export and import logic, nested playbooks, and granular access control.
Datadog
Datadog for Government - High

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP In Process
Datadog is the monitoring and security platform for cloud applications. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics. The services in scope for Datadog for Government are: - Infrastructure Metrics - Observe, analyze, and alert based on infrastructure metrics from hosts, containers and serverless. - Application Performance Monitoring - Collect, search, and analyze traces across fully distributed architectures. - Log Management - Collect, enrich, monitor, and analyze logs from all systems for troubleshooting, auditing, visualization, and alerting. - Real User Monitoring - Collect user actions (e.g., button clicks) to understand user activity within a page. - Network Performance Monitoring - Provide multi-cloud visibility into network flows in granular detail and enabling users to aggregate and monitor that data. - Synthetics - Monitor applications and API endpoints via simulated user requests and browser rendering. - Security Monitoring - Enable real time threat detection and investigate security alerts across infrastructure metrics, distributed traces, and logs. - Error Tracking - Capture, visualize, and browse errors reported by services.
Datadog
Datadog for Government

Authorizations

11

Reuse

84

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Datadog is the monitoring and security platform for cloud applications. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics. The services in scope for Datadog for Government are: - Infrastructure Metrics - Observe, analyze, and alert based on infrastructure metrics from hosts, containers and serverless. - Application Performance Monitoring - Collect, search, and analyze traces across fully distributed architectures. - Log Management - Collect, enrich, monitor, and analyze logs from all systems for troubleshooting, auditing, visualization, and alerting. - Real User Monitoring - Collect user actions (e.g., button clicks) to understand user activity within a page. - Network Performance Monitoring - Provide multi-cloud visibility into network flows in granular detail and enabling users to aggregate and monitor that data. - Synthetics - Monitor applications and API endpoints via simulated user requests and browser rendering. - Security Monitoring - Enable real time threat detection and investigate security alerts across infrastructure metrics, distributed traces, and logs. - Error Tracking - Capture, visualize, and browse errors reported by services.
Datavant
Datavant Cloud

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Datavant Cloud enables privacy-preserving health data connectivity for federal government customers, stakeholders, and collaborators. Our privacy-preserving record linkage (PPRL) solution links person-level data across data silos using universal patient keys without exposing personally identifiable information (PII) or protected health information (PHI). Data governance controls are built-in to Datavant’s unique PPRL deployment model, providing assurance to data originators and data stewards that their data can only be processed by the right entity, for the right purpose, under the right conditions. Datavant features include: - Governance controls that enable an array of data-sharing models including data collaboratives, registries, repositories, project-specific data-sharing, and single vs. bi-directional data linkages. - Trust frameworks that provide linkage honest broker, zero trust, and peer-to-peer models, providing data originators and data recipients with flexibility to connect data using their desired trust models. - De-identified cohort discovery with Datavant’s extensive ecosystem of interoperable real world datapartners to discover shared cohorts and populations without needing to share underlying data. Datavant services include: - Datavant DeID+Link - Datavant Match - Datavant Desktop - Datavant Web Portal features: - Overlaps, Overlaps API - Explore Datavant solutions can be deployed on-premise, in virtualized environments, in cloud, and integrated locally within your native systems via our API.
Deloitte
Evidence Management System (EMS)

Authorizations

10

Reuse

9

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Deloitte Government and Public Sector Technology Center (GPS TC) provides Software-as-a-Service (SaaS) to government agencies, legal departments, and public entities utilizing machine technology and web services. Deloitte Evidence Management System (EMS) provides advanced technology and experienced staff to assist government agencies responding to requests stemming from litigation, congressional inquiries, FOIA, investigations, and other similar use cases. Our capabilities assist other offerings that need to collect, extract, or analyze unstructured data. Deloitte EMS draws on years of experience providing government and public sector clients secure eDiscovery solutions and support. Deloitte"s highly skilled technical resources engage a full array of EDRM data management solutions and services that include identifying, preserving, collecting, reviewing, producing, dispositioning, and archiving. Clients who partner with Deloitte can utilize a wide variety of application software in a secure and scalable environment to address their identified mission requirements. - Disclosure/FOIA (SecureReleaseTM) Advanced Analytics (i.e. active learning, culling data) - Information Governance - Program Integrity - Investigations (i.e., criminal, financial, employment) - Data Collection including mobile data/devices, social media, websites, O365 Project and Contract Management Trial Support - Customizable and tailored workflows
Deloitte GPS OpenCloud
Deloitte GPS OpenCloud

Authorizations

0

Reuse

0

Service Model
PaaS
Impact Level
Moderate
Status
FedRAMP Ready
Deloitte’s Government and Public Services (GPS) OpenCloud Cloud Managed Platform is an enterprise managed, multi-cloud Platform-as-a-Service (PaaS) that offers government enterprises and customers supporting U.S. government organizations with complex compliance requirements the ability to host their applications on their cloud platform of choice and leverage a range of pre-assessed security controls and operational benefits (e.g., automation, redundancy, auto-remediation) from the platform. The platform provides FedRAMP Moderate Impact Level security services for customers to consume, such as boundary and network protection, operating system and device hardening, vulnerability management, trusted patch repositories, malware detection, auto-remediation for policy enforcement, and 24x7 security information and event management (SIEM). The platform also offers a customer self-service portal in ServiceNow allowing customers to interact with platform engineers, architects and operators and submit general service requests. Additionally, operating system changes are monitored to confirm compliance with pertinent security policies. The platform provides the following additional benefits to our clients: • Accelerates time to complete Agency and FedRAMP ATOs for client workloads by leveraging a FedRAMP compliant security platform • Provides a mature security solution to meet federal security monitoring standards and guidelines (i.e., EO 14028, OMB M-14-03, OMB M-21-31, NIST SP 800-137) • Leverages FedRAMP JAB compliant cloud hosting platforms (i.e., AWS GovCloud, AWS US East/West, and Google Cloud Platform Assured Workloads) The platform includes the following key features: • Identity and access management to include account onboarding, offboarding and auditing • Network management to include secure remote access / VPN management, Network Access Control List / Network Security Group configuration and maintenance, Firewall Management with IDS / IPS and DDOS protection • Operating System support to include provisioning of hardened images, configuration management and provisioning of trusted patch repositories • Security Services to include OS vulnerability scanning, STIG / CIS benchmark scanning, endpoint security and logging / continuous monitoring • Certificate / secrets management for platform resources • Support for Common Access Card (CAC) / Personal Identity Verification (PIV) integration (upon customer request).
eGain Corporation
eGain Suite

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
eGain Suite is delivered as a SaaS offering using a multi-tenant Government Only cloud computing environment. It is available to federal, state, local, and tribal governments, as well as research institutions, federal contractors, government contractors. The eGain Suite includes the following applications: • eGain Chat is a real-time chat assistance to website visitors. • eGain Cobrowse allows agents to provide real-time assistance to customers. Agent can share and co-navigate HTML and JavaScript content via web browser with a customer to provide support. • eGain CallTrack is a case management solution for the resolution of customer issues with call taking, logging, and tracking capability. • eGain Mail+Social handles large volumes of email, webform, and social inquiries with automated routing, workflows. Letter and fax interactions are also handled in this service, with PDF-based output. • eGain Secure Messaging is a secure email messaging system that authenticates the customer before allowing the viewing of confidential information. • eGain Knowledge+AI is a knowledge management software including AI that provides agents and other users answers from a common knowledge base • eGain SelfService+AI provides self-service experiences that enable customer self-service and enables context-aware escalations to live customer service agents if required by the customer. • eGain Virtual Assistant is a virtual agent providing a way for users to get answers and assistance on an organization’s website. A user chats with the virtual assistant (also called virtual agent or chatbot). The chatbot provides answers to any queries input within the chatbot. • eGain Notify, enables outbound notification messages to customers. • eGain Offers uses browsing behavior and other attributes, to proactively serve a targeted offer to website visitors. • eGain Contact Center Analytics is an analytics tool to measure, manage, interactions within contact centers with customers. • eGain Advisor Desktop is a desktop for contact center agents.
End To End Computing
Singularity

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
End To End Computing's (EEC) Singularity is a SaaS-based Managed Security Service platform providing customers with MSSP services such as CISO\ISSO support, Security Operation Centers (SOC), and DevSecOps. The Singularity platform consists of two modules, Continuous Monitoring (CM) and DevSecOps. Both modules can also be leveraged to provide shared cybersecurity services across organizations and departments. Singularity CM - The Continuous Monitoring module provides 24/7 SOC support enabling organizations with the visibility required to effectively manage risk. EEC managed SOC utilizes the module to conduct incident response, Managed Detection Response(MDR), Managed SIEM and vulnerability management services. Additionally, the executive dashboard provides agencies with the ability to manage Plan of Action Milestones (POAMs) with ease. Singularity DevSecOps - This is a Comprehensive CI\CD pipeline to enable organizations to deliver holistic, all-in-one solutions that protect applications from the inside while simplifying implementation across a range of environments. Organizations can leverage the capabilities of the platform to protect applications from the beginning of the application development process to solve the root causes of risks, as well as after the applications are placed in production. This is done by providing organizations with access to Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Runtime Application Self Protection (RASP), and Interactive Application Security Testing (IAST) capabilities to protect applications from cyber threats.
Eptura, Inc
Archibus

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Connect and operationalize facilities, assets, and infrastructure securely. Archibus by Eptura connects the built environment to manage assets, facilities, and employees across portfolios while prioritizing security and protection of federal information. Archibus for Government has a robust FedRAMP offering that is centered on Archibus Web Central which organizes facilities and infrastructure management tasks in an intuitive web browser interface. Workplace Services module focuses on employee workspace booking, meeting room booking, and service requests. Archibus Space offers tasks for creating a space inventory -- a listing of the space that a company occupies, its occupiable and non-occupiable areas, how each department is using the occupiable areas, the common areas, and how personnel are assigned to rooms within the inventory. There’s also the capability to internally bill departments for their space usage and build from your current inventory to plan your future space needs. Sustainability & Risk module encompasses business applications that work proactively to forecast and minimize risks to the organization: its staff, its productivity, or its competitive viability. Real Property module helps create an electronic inventory of properties and leases, complete with detailed data on occupancy, leased-out and available area, taxes, regularly occurring required actions, compliance with regulations, costs, and more. Maintenance module helps manage reactive (on demand) maintenance and preventive maintenance by providing tools for scheduling employees and outside contractors, budgeting costs, routing work throughout the system, updating the system with details about completed jobs, and assessing performance and response. The Assets module includes applications that provide different levels of integration between asset management and the suite of Archibus by Eptura applications. Manage assets throughout the lifecycle; optimize the use and disposal of assets. Manage information targeted to the various stakeholders working with assets -- IT, finance, facilities, and department heads. Capital Projects module encompasses business applications that identify problems, identify funding, and plan capital to execute the strategic plan, which includes condition assessments, capital budgeting, individual capital project, and building commissioning.
Evidence Prime
Laser AI

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
LI-SaaS
Status
FedRAMP Authorized
LASER is a system automating the development of Living Systematic Reviews using natural language processing (NLP) and artificial intelligence techniques, which synthesizes available knowledge about a given health problem continuously and with minimal human involvement. As a result, LASER speeds up the process of literature reviews, decreases its costs, and improves the quality of the reviews allowing overworked human specialists to focus on the essential elements offloading much of the repetitive tasks to the AI-enabled system. LASER also provides a human-centric user interface, enabling smooth interaction with suggestions provided by the AI. LASER supports classical systematic reviews as well as enables quick verification of the quality of the reviews by the regulators and the sponsors, makes it possible to perform a larger number of reviews for personalized medicine or the creation of high-quality rapid assessments in the face of epidemics or ecological disasters. LASER is built with larger organizations in mind, providing a high level of security as well as enterprise-grade management of projects, teams, roles, shared dictionaries, and customizable workflow processes. LASER helps with the following steps of literature reviews: creation of the review protocol, construction and execution of a search strategy, T&A screening, screening of full texts, data extraction, quality assessment, export of data to meta-analysis tools.
Exterro, Inc.
Exterro E-Discovery and Legal Software Platform

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Exterro Platform is a single, natively built, fully integrated solution that unifies all of Exterro's E-Discovery and Information Governance products. Further, it includes our integration hub, which connects to the industry's broadest range of 3rd party tools, system applications, and data sources, orchestrating processes across applications and minimizing your cost of ownership. Products within The Exterro Platform: Employee Change Monitor Employee Change Monitor enables you to proactively take steps to mitigate risk associated with the change in any data field stored in your HR information system and shared with the Exterro Platform. For example, when an employee leaves your organization, a task can be issued to take a snapshot of her email box and backup her files, a system notification can be sent to alert Records Management of the change in employment status, and the employee can automatically be released from any active legal holds. File Analysis Exterro File Analysis provides the critical foundation for any Information Governance project by delivering the information you need to achieve your cost and risk reduction efforts. Intuitive and data-rich dashboards in Exterro's File Analysis software display key information about the content stored on your data sources such as network shares and SharePoint servers. Key document properties such as date created, last modified, access rights, metadata, and content type are displayed, providing the critical foundation for all your information governance cost and risk reduction activities. Proactively manage policies that support organizational goals by gaining insight into the content that matters most. Easily identify data that has business or legal value, such as sensitive data (e.g. personally identifiable or health information), files found outside retention guidelines or ESI on legal hold, to make informed business decisions. Data Mapping Build and maintain an up-to-date directory that mirrors your evolving data source inventory with Exterro Data Mapping. Identify important ESI repositories, eliminate irrelevant ones, and meet the most rigorous judicial and compliance standards. Legal Hold Say goodbye to manual, time consuming, and error-prone litigation hold processes with world-class legal hold software. With Exterro Legal Hold, you can: - Manage the entire legal hold process - from notifications, to interviews, to reminders, and more - in one place - Protect and secure data from accidental deletion with the In-Place Preservation module - Integrate with your HR system, and get notified of employee status changes, to mitigate the risk of spoliation and automate other operational processes with the Employee Change Monitor module - Quickly identify critical information from custodian data stored in Microsoft Office 365 prior to collection with the Office 365 Explorer module In-Place Early Case Assessment Perform early case assessment through a broad set of analytic and predictive intelligence capabilities that enable rapid identification of the most important documents in a dataset prior to collection. Uncover crucial documents and communications prior to 26(f) conferences to support your proportionality and strategic arguments. Collection and Processing Perform targeted collections and full e-discovery document review with a "one-click" ability to collect only the relevant files that are identified during ECA. Exterro supports the ability to connect to an ever growing list of 30+ on premises and cloud-based data sources, eliminating the need to send requests to multiple stakeholders to perform collections. Exterro is unique in the market by combining processing with collection and offering documents for review almost immediately after the collection process is started, thus saving you time and money while reducing risk associated with manual handoffs and promotions. In addition, our underlying technology has been built with the future in mind, able to easily and quickly process vast amounts of data without impacting performance for your users. ESI Vault The most architecturally advanced ESI storage available delivers significant cost savings, risk reduction, and powers productivity through cross-matter work product re-use and analytics. Maximize work product re-use via a real-time, fully integrated ESI vault that enables one-click repurposing of data across matters. Gain insight and optimize operations through cross matter analytics. Review Exterro's end-to-end, fully integrated platform ensures the shortest possible time to review from matter inception. Documents can be concurrently collected and processed from multiple data sources and seamlessly moved into review as data becomes available, without delays, handoffs, and complex promotion/staging procedures common in other platforms. Production Choose between Native, PDF, and TIFF production outputs depending on the requirements of your matter. Exterro supports industry-standard loadfiles, including Concordance®, Summation®, EDRM XML, and even custom loadfile. Exterro Production automates the entire production process, including imaging, branding, redaction application and loadfile creation into a single step, eliminating technical intervention and time-consuming handoffs. Legal Project Management Exterro Project Management is the only purpose-built project management system designed specifically to orchestrate the workflows and activities associated with e-discovery and other legal processes. Easily modified user-defined workflows coordinate all relevant tasks and activities, including preservation, collection, processing, review, and production.
FM:Systems
FMS:Workplace

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
FMS:Workplace is an Integrated Workplace Management Solution (IWMS) designed for space management and optimization, asset management, move management, facility maintenance, strategic real estate planning, and facility project management.  This web-based solution enables organizations to manage, analyze and report on facilities and real estate operation and maintenance (O&M) information. With objective facility data and digital automation, customers gain insight into how their real estate portfolio is performing, identify opportunities to reduce costs, create efficiencies across workplace management processes and deliver exceptional workplace experiences to their employees. The system is a web-based application requiring only a browser for the client. The core system consists of Space + Asset Management with Strategic Planning. Additional, optional modules may be added to the core system for move management, facility maintenance, real estate and lease management and project management. FMS:Workplace is hosted in the AWS FedRAMP environment. FMS:Workplace uses a self-described data model—the FMS:Workplace Data Dictionary—that lets system administrators configure the system to add, modify or remove fields, tables, data views, data forms, notification rules, reports, and business logic. The Data Dictionary is unique to the individual client database, allowing each organization to design and configure the system according to their unique business requirements. FMS:Workplace has a three-tier architecture. The client tier is a supported browser. The middle tier is the Web server running ASP.NET on Internet Information Services (‘IIS’). The third tier is a database running on a SQL server. The FMS:Workplace Workplace Management Suite and associated modules allow facility and real estate professionals to use a common database and system to address a wide range of business requirements and to share facility information enterprise-wide. 
FM:Systems
FMS:Employee

Authorizations

6

Reuse

5

Service Model
SaaS
Impact Level
LI-SaaS
Status
FedRAMP Authorized
FMS:Employee for Government provides an innovative scheduling solution that delivers new levels of efficiency and productivity for your mobile, virtual, and traditional employees. From conference rooms and video conferencing facilities to shared workspaces and managed services, from small entities to large entities, the way work gets done has changed. FMS:Employee is a cloud-based, scalable platform that solves the most challenging workplace management issues offering cutting edge technology, integrated floorplans, integrated room panel hardware, availability sensors and expertise in implementation and change management. FMS:Employee empowers your workforce to connect and engage in today’s dynamic digital workplace with intuitive scheduling solutions that help organizations support the work-from-anywhere model and enable inspiring workplace experiences. Room, Resource, and Service Management - FMS:Employee is an online, cloud-based scheduling system for desk, room, and resource reservations. - Quickly find and reserve rooms, equipment, and services. - Comprehensive scheduling includes options for recurring, multi-day and multi-resource reservations. - Create reservations and sending meeting invites from the web, Outlook, or your mobile device. - Streamline internal operations with a dynamic service management system that includes inventory control and reporting. Integrated Solutions for Workplace Productivity - FMS:Employee can help you achieve your efficiency and productivity goals by reducing manual processes, improving collaboration, and increasing the productivity of your mobile workforce. - Seamlessly integrate room and resource scheduling with Microsoft Outlook. - Keep teams connected with integrations for WebEx, Crestron Fusion, and Cisco TMS video conferencing and more. - Streamline operations with an integrated visitor management solution that enforces security protocols. - Create a modern, tech-savvy workplace with digital signage, digital room panels, and interactive kiosks. Desk Sharing for Employee Engagement - With FMS:Employee desk management solutions, users can find and reserve shared workspace quickly and easily from the web, a kiosk, Outlook, or their mobile device. Find space by location, workspace type, or proximity to co-workers, visually on an interactive floorplan. - Drive program adoption with an intuitive user interface and mobile scheduling from multiple devices. - Support mobile and virtual workers with integrated tools for easy collaboration. - Leverage available sensor technology to track space utilization and measure program performance. - Visualize trends, analyze usage behavior, and make data-driven decisions about your real estate investment and workplace design.
Forcepoint
ONE – Security Service Edge (SSE) – CASB/DLP/SWG/ZTNA/RBI

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Forcepoint ONE is a cloud-native distributed Security Service Edge (SSE) platform that delivers distributed Zero Trust protection on devices, on the network and in the cloud. Forcepoint ONE provides unified threat and data protection for safely accessing cloud, web, and private applications—all managed from a single platform. It enables policies for Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Data Loss Prevention (DLP) and other security technologies to be managed easily and consistently in a single location. Products: - ZTNA - Enable secure remote access to private applications in cloud or private datacenters, providing a better experience and protection than traditional VPNs. - SWG - Distributed Secure Web Gateway (SWG) provides secure internet and web access while mitigating risk, improving IT visibility, and enhancing application performance. - CASB - Cloud Access Security Broker (CASB) monitors and protects cloud apps and data on any app, from BYOD, managed, and unmanaged devices. - RBI - Remote Browser Isolation (RBI) with Content Disarm Reconstruction (CDR) extracts and verifies information before delivering to destination, provides a layer of abstraction by browser operation in cloud-hosted VM, and separates end user device from web-borne malware risks Use Cases: - Secure Bring your own Device (BYOD) - Secure the Web and Shadow IT - Protect Access to On-premises Apps. - Secure the Remote and Hybrid Worker - Defend against Malware with Advanced Protection - Prevent Data Leakage across the device and cloud - Secure IaaS
Genesys
Genesys Cloud CX

Authorizations

9

Reuse

8

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Genesys Cloud™ is an AI-powered experience orchestration platform with a full suite of omnichannel contact center capabilities, built-in workforce engagement management (WEM) and artificial intelligence (AI). It is available to the public, federal, state, local, and tribal governments, as well as research institutions, federal contractors and government contractors. Features and capabilities include: All-in-One open platform - Genesys Cloud is a multi-tenant SaaS offering with a comprehensive set of native Contact Center-as-a-Service (CCaaS) product capabilities built on a single platform — running on Amazon Web Services (AWS). Native AI - Genesys Cloud has built-in conversational and predictive AI capabilities. It utilizes technologies such as predictive analytics, machine learning, and natural language understanding to automate, route and personalize interactions. Omnichannel routing - Genesys Cloud supports calls, email, web, text and social messages. A single routing engine leverages a variety of routing algorithms, evaluation and scoring methods to determine the next best action while maintaining context, intent, and desired outcome. Speech-enabled IVR & self-service – Genesys Cloud offers multilingual speech-enabled IVR with natural language understanding (NLU) technology. Automated bot assistants provide continuous support for routine queries. Workforce Engagement Management - A native suite of AI-powered WEM capabilities supports employee onboarding and includes workforce schedule management (WFM), coaching, speech & text analytics, quality management, performance management and gamification. Outbound campaigns – Genesys Cloud supports outbound dialing and digital campaigns for sending proactive notifications or contacting contact lists of people in accordance with programmable rules. Analytics and reporting – Genesys Cloud provides real-time dashboards and analytics for contact center management, with customizable reporting and drill-down capabilities for performance analysis. Integrations - The platform includes a rich set of open APIs, integration methods and an ecosystem of 600+ pre-built solutions and applications available via the AppFoundry® Marketplace.
Google
Google Services (Google Cloud Platform Products and underlying Infrastructure)

Authorizations

24

Reuse

299

Service Model
IaaS
PaaS
SaaS
Impact Level
High
Status
FedRAMP Authorized
The Google Services offering consists of two primary layers: Google Cloud Platform (GCP) and Google Common Infrastructure (GCI). The Google Cloud Platform is made up of customer facing services. The services within the Google Cloud Platform sit on top of Google Common Infrastructure, which is infrastructure private to Google that is responsible for the implementation of common controls for all Google service offerings. These two pieces work together to provide the Google Services offering. GCP is an extensive suite of products from Google-controlled development environments to customer-managed environments (e.g. Google Compute Engine) offering flexibility via fully customizable virtual machines and utilization of other services like: fully-managed databases and data analytics tools, networking services including virtual load balancing and virtual private cloud solutions, access management tools, Cloud project management tools, machine learning capabilities, and developer tools. Assured Workloads is a GCP feature which turns on specific project configurations per the target compliance regime for customers. Products discretely integrate with Assured Workloads and enforce the organization policies themselves. ** The entire authorized security boundary of Google Services is documented, assessed, and managed against the FedRAMP High baseline of security and privacy controls. Services that are denoted with an asterisk (*) do not meet the SA-9(5) requirement. Please review the JAB P-ATO letter for more information.
HB Healthcare Safety, SBC
Healthcare Safeware

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP In Process
Healthcare Safeware® (Safeware®) is an enterprise software solution for healthcare quality and safety improvement. It allows for strategic targeting of quality and safety metrics requiring attention by supporting the workflow for case-based learning. Safeware® captures population-level process and system failures in care delivery by identifying, defining, quantifying, and analyzing events and opportunities for improvement. Safeware® can support multiple different case review workflows within the same healthcare site. Examples include reviews for suicide, inpatient and 30-day mortality, readmissions, falls, various patient safety indicators, etc. Safeware® can also document key portions of the ACGME criteria for Practice-Based Learning and Improvement (PBLI). Safeware® is configurable at the site level with the lowest levels of detail to include the location of care delivery (hospital floor, clinic, or external location), provider specialty, and patient. Safeware® was intentionally designed to support improvements in patient safety culture by not including specific names of frontline care team members involved unless a peer-review case is entered. Case reviews can be entered with or without PHI. Cases may be manually entered, or a CSV file containing unlimited cases can be uploaded. There is no direct connection to the electronic health record to minimize PHI data leakage. To ensure reliable data collection across healthcare systems (government and private sector), Safeware® contains a standardized taxonomy of events. It provides an additional assessment of those events by incorporating the ability to tag them with a translation of the DoD Human Factors Analysis and Classification System (HFACS) to clinical language. Safeware® users can add customized forms for data capture by patient population, outcome, or research project. These forms can be embedded within the case review at any stage within the workflow or sent as a survey form to an external team member to complete, with results auto-populating the respective case review. Safeware® provides analytics for improvement and learning, including visualizations of the results using Pareto diagrams, a statistical process control chart, heatmaps, and other traditional healthcare quality charts. All data entered can be used for visualization or downloaded to be used in other analytic tools.
Human Resources Technologies, Inc. (HRTec)
Federal High Impact Virtualized Environment (FedHIVE)

Authorizations

2

Reuse

1

Service Model
IaaS
PaaS
SaaS
Impact Level
High
Status
FedRAMP Authorized
FedHIVE is a Trademarked service that provides a Federal High Impact Virtualized Environment provision within a physical and logical boundary designed to provide Federal clients an Infrastructure as a Service (IaaS) / Platform as a Service (PaaS) solution that meets or exceeds the FIPS PUB 199 System Security Level of High (sensitive but unclassified information) security controls in which to implement organizational Software as a Service (SaaS) applications. The FedHIVE secure cloud service provides agencies with a compliant, scalable, and secure infrastructure capability enabling and supporting platforms or software required for their business or mission success. And provides software platforms such as Archer Integrated Risk Management, FirstDue, Atlassian JIRA, Confluence, Mattermost, Allocore Unified Loans Platform (ULP), Unified Grants Platform (UGP), Unified Fraud Platform (UFP), 1Kosmos Platform, FormAssembly Gov Cloud, and AWS. FedHIVE implements over 420 High Baseline security controls within the boundary to support Federal cloud services requirements for protecting CUI and PII per agency application level ATO security requirements and is currently providing service to multiple Government Agencies (including DoD, Space Force, TSA, and Dept. of State) and supporting vendor customers. FedHIVE received it’s PA from DISA for IL4 and PA for IL5 is in process. FedHIVE recently received its StateRAMP authorization and Processing its CMMC level 2 Certification.
Hypori, Inc.
Hypori Government Cloud

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
Hypori’s approach to mobile security is analogous to Virtual Desktop Infrastructure (VDI), a term coined by VMware and pioneered by Citrix describing a virtualization technology that hosts a desktop operating system on a centralized server in a data center that is accessed by thin clients on the user’s end point. Hypori Halo creates a Zero Trust architecture to provide secure access to Controlled Unclassified Information (CUI) and customer data and resources. In the Hypori Halo environment, the user’s device effectively becomes a “window” into a virtualized mobile workspace that is Version 1.1 20 Proprietary and Confidential operating in the Amazon GovCloud and delivered via a Software as a Service (SaaS) model. Hypori Halo uses a thin client application to create a virtual image of the user’s unique virtual mobile workspace. The client captures touch and sensor data from the end user physical device and routes it back to the Virtual Workspace through a secure and encrypted TLS tunnel. The Hypori Client has been tested by multiple Red Teams to ensure it meets the most rigorous security posture. It is Common Criteria Certified by the National Information Assurance Partnership (NIAP) for Android, iOS, and Windows platforms. NIAP ensures that all certified products “demonstrate exact compliance to the applicable technology protection profile.” This certification verifies that the “Hypori Client is a thin client that communicates only with a Hypori Virtual Workspace on a Hypori Server and not with other servers or applications.” It validates the cryptographic elements of communication with the Hypori environment, that no data is at rest on the user device and no PII is transmitted or stored on the physical end user device. Additionally, the Hypori Client does not trust the mobile device host. It uses application shielding and cryptographic key protection capabilities to defend against compromised hosts. It also has limited runtime OS attestation checks before it will launch. If it detects tampering of the client components, it will not connect to the environment. The data on the client is limited to the trust key chain. The mutual Transport Layer Security (TLS) tunnel certificate is stored with the operating system (OS) protected key store on the device, but no other data is on the end user mobile device. The backend environment consists of a series of subnets which form a cluster. Each cluster is designed to support numerous virtual workspace instances. To the user, the experience is virtually identical to when the application and data was on the user’s mobile device. Private keys within the Virtual Workspace are protected using the Android keystore in combination with the Cloud Service Provider key protection system. The Private keys are encrypted in accordance with Hypori’s National Institute of Standards and Technology (NIST) Federal Information Processing Standard (FIPS) 140-2.
IBM
IBM Maximo and TRIRIGA on Cloud for U.S. Federal

Authorizations

13

Reuse

12

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Enterprise Asset Management (EAM) in the era of IoT – with a constant stream of data from people, sensors and devices – can be challenging. IBM® Enterprise Asset Management on Cloud (Maximo®) is a comprehensive solution for managing physical assets on a common platform, providing insight into all your enterprise assets, their conditions and work processes, for better planning and control. With Maximo, you can check on asset health in real time and streamline global operations, from procurement to contract management. In addition to meeting the requirements for manufacturing and facilities with core Maximo, IBM has developed specific industry solutions for key asset-intensive industries. Maximo is highly customizable to suit your business requirements without editing a line of code. Maximo SaaS can be integrated with your on-premise and cloud-based enterprise applications. For more information please visit: https://www.ibm.com/products/maximo. Through business analytics, critical alerts and automated process capabilities, IBM Facilities and Real Estate Management on Cloud (TRIRIGA) can increase visibility, control and automation of your real estate management, capital projects, space management, facility maintenance and energy management needs. Finance and real estate executives can make more informed decisions - bringing increased value to their organizations through identification of high-return real estate transactions, increased facilities utilization and reduced energy expenses. TRIRIGA provides highly configurable role-based workspaces, enables automation of work processes, allows virtualization of facilities, assets, and resources. TRIRIGA integrates with IoT data and your on-premise and cloud-based enterprise applications. For more information please visit: https://www.ibm.com/us-en/marketplace/ibm-tririga.
IBM
SmartCloud for Government

Authorizations

7

Reuse

6

Service Model
IaaS
Impact Level
High
Status
FedRAMP Authorized
IBM's SmartCloud for Government (SCG) is a secure multi-tenant Infrastructure as a Service (IaaS) cloud computing environment for U.S. Federal customers. SCG services include provisioning of compute, memory, network, OS, and storage resources to meet client production and development/test computing needs. SCG IaaS services can be bundled with enterprise class, fully managed, cloud hosting services, including: OS Provisioning and Administration Enterprise System Management Security Operation Center (SOC) Storage Management and Backup. IBM SCG required services Storage management Firewall and Network Administration (Boundary management services) Service Desk Access Management Cloud Network IBM SCG rated services SCG Cloud-VM/CPU SCG Cloud-Memory SCG Cloud-Network SCG Load Balancer SOC-SOAR Standard Endpoint Protection Services System Vulnerability Scanning Security Governance and Compliance These SCG IaaS capabilities can also be leveraged to support a broad range of IBM and 3rd party software offerings using a PaaS or SaaS delivery model. The SCG solutions are delivered from IBM Federal Data Centers (FDC) that are expressly designed and managed to meet FISMA requirements. IBM SCG enables customers to choose cloud solutions and services that meet their workload requirements and helps Government agencies deliver business outcomes with faster time to value and a lower total cost of ownership
IBM
IBM Platform Services for Government

Authorizations

12

Reuse

11

Service Model
PaaS
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
IBM Platform Services for Government provides core services for managing devices, applications, content, identity access management. These services work together to modernize device management and IAM enabling clients to provide modern and secure experiences without burdening your admins. IBM MaaS360 for Government is a comprehensive, cloud-based unified endpoint management and security platform for devices, applications and content built on a secure multi-tenant architecture. Government agencies use MaaS360 to protect data and optimize productivity, enabling employees to work anytime and anywhere through trusted mobile interactions. MaaS360 offers device management and security without the added costs and complexities of deploying hardware and software, dealing with intricate configurations, and dedicating additional resources to support the solution on an ongoing basis. MaaS360 allows administrators to manage and enable security on smartphones, tablets and laptops and increase end users productivity by enabling secure access to their enterprise data on their endpoint devices. IBM Verify for Government is an Identity-as-a-Service (IDaaS) platform enabling organizations to secure and modernize experiences for workforce and citizens. IBM Verify provides modern Single-sign-on (SSO) using standard protocols (SAML, OIDC, OAuth, etc.), supports legacy protocols and access to thousands of popular cloud service applications, and in-house applications, with hundreds of pre-built templates for faster integration. IBM Verify manages the lifecycle of users and groups through a scalable and elastic directory, provides granular, attribute-based policies, and supports multi-factor authentication. Government agencies can provide a digital first experience for secure and frictionless authentication for citizens.
iBoss
iboss Government Cloud Platform (IGCP)

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
iboss enables government agencies to reduce cyber risk with a FedRAMP Authorized Zero Trust Security Service Edge that protects resources across cloud, SaaS and on prem while enabling users to connect securely to those resources from wherever they work. The iboss platform implements the NIST 800-207 Zero Trust Architecture, meeting 100% of the tenets and network requirements outlined within the NIST architecture. iboss is designed for network and security administrators with hybrid workforces within government organizations who are dissatisfied with the high renewal costs, managing multiple products, and performance impacts of legacy on-premises proxies. Further, the iboss platform is a SaaS-delivered Zero Trust Security Service Edge that provides trusted authorization, security, and connectivity for your organization's users and devices to your business-critical applications. This shifts the focus from protecting buildings to protecting people and resources wherever they are located. Backed by 230+ issued and pending patents, iboss processes and secures over 150 billion daily network transactions globally, blocking 4 billion threats per day. The iboss Government Cloud Platform enables Federal agencies to migrate rapidly into a single, unified Zero Trust Edge that provides the necessary controls, CASB, malware defense, DLP, connectivity, and visibility needed to secure all resources and evolve organizations completely off of legacy network security appliances as mandated by the Presidential Executive Order on Cyber. Jumpstart your transformational journey and experience the future of Zero Trust cloud security today. Visit www.iboss.com to learn more.
ID.me
ID.me Identity Gateway

Authorizations

6

Reuse

5

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
ID.me's Identity Gateway is a shared service for citizen and employee facing authentication and consists of a NIST 800-63-3 Identity Assurance Level 1 and 2 and Authenticator Assurance Level 1 and 2 as well as a NIST 800-63-2 Level of Assurance 1, 2, and 3 certified Credential Service Provider, a Credential Broker, and an Attribute Exchange. ID.me is the only citizen facing Credential Service Provider with a Supervised Remote capability that enables all users, including individuals without credit history and who live overseas, to reach Identity Assurance Level 2 without needing to visit a location in-person. ID.me is capable of immediately upgrading any government Identity Provider or login system to NIST IAL2/AAL2 within the look and feel of the agency’s brand. An Intelligent Policy Engine provides a dynamic orchestration capability that enables agencies to configure adaptive Risk-Based Authentication and Attribute Based Access Control by policy. Once configured, the Intelligent Policy Engine dynamically routes users through Identity Proofing and Multi-Factor Authentication based on their demographic need and preference. ID.me’s Identity Gateway integrates directly with applications or with all Identity and Access Management platforms via open protocols like SAML 2.0, OAuth 2.0, and OpenID Connect. ID.me’s Credential Service Provider certification is available at (https://www.idmanagement.gov/trust-services/#consumer-identity-credentials) and the Kantara Initiative Trust Registry (https://kantarainitiative.org/trust-registry/). Kantara is a GSA approved Trust Framework Solution provider. To learn more about ID.me, visit https://www.id.me/business/identity-gateway.
Infor
Infor Government Solutions (IGS) Software as a Service

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Infor Government Solutions (IGS) is composed of integrated cloud application suites that align to specific industries such as Public Sector, Aerospace & Defense, Industrial, Automotive, and Healthcare.These cloud suites are web-architected solutions powered by the Infor Operating Service Platform (Infor OS), a modern technology foundation for driving digital transformation. IGS supports workloads for essential business capabilities such as Financial & Supply Management, Manufacturing ERP, and Human Capital Management as well as fully integrated operational capabilities such as Asset & Maintenance Management, Business Intelligence & Analytics. IGS is hosted in an isolated government-only region of AWS GovCloud (US). AWS GovCloud adheres to U.S. International Traffic in Arms Regulations (ITAR), Federal Risk and Authorization Management Program (FedRAMP), Criminal Justice Information Services (CJIS) requirements, and Department of Defense (DoD) Cloud Computing Security Requirements Guide (SRG) Impact Levels 2, 4, and 5. IGS offerings are categorized using NIST SP 800-53 and the FedRAMP baseline to withstand a Moderate impact level. In addition to IGS' FedRAMP Joint Authorization Board (JAB) authorization, IGS is also compliant for Health Insurance Portability and Accountability Act of 1996 (HIPAA) and NIST SP 800-171, rev 1, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. Infor Platform: Infor Operating Service Platform (InforOS) delivers high performance, support for open standards, interoperability, enhanced productivity, responsive design, and mobile access via a wide range of devices. The components of Infor OS work together to unify the user experience (UX) for the following enterprise capabilities, using human-centered design to support the mission. Infor Federated Security (IFS) provides single sign-on (SSO) to provisioned IGS applications and authorizes users for role-based access by synchronizing with customer solutions for multi-factor authentication (MFA). Enterprise Portal is a comprehensive platform for social collaboration, business process improvement and contextual analytics; it provides web portal access and presentation to all IGS applications available to the customer. Homepages provides customers the ability to build custom, dynamic pages or select from Infor-provided widgets. Homepages offers a flexible and highly configurable way to present IGS application information and analytics data to users. Intelligent Open Network (ION)is a configurable integration platform-as-a-service (iPaaS) that provides customers with event-based business process automation and the flexibility to orchestrate end-to-end processes across a complex web of enterprise applications. ION API Gateway provides a secure, scalable API gateway for all API calls and programmatic access to IGS applications with API Discovery Services, Policy Management, and Throttling features. Document Managementenables customers to capture, create, manage and access organization-specific business documents and use contextual intelligence to display documents with relation to their business purpose. Data Lake delivers schema-on-read intelligence, a fast, flexible data consumption framework, and metadata management to provide customers with needed data for making key decisions. Financials & Supply Management:Improve operations throughout your organization with the security, scalability, and flexibility of Infor's financial management solutions. Configurable to suit the unique needs of your industry, Infor's innovative solutions expands data usability, helps meet complex reporting requirements, and eliminates duplicate records and spreadsheets to improve financial performance. CS Financials & Supply Management is an integrated finance and supply management software suite that couples modern General Ledger operations with tools to effectively manage the full source-to-settle process. Establish a single close process across your entire organization and gain real-time visibility into receivables and billing, payables and matching, cash management, lease accounting, asset accounting, and project ledgers. Expense Management comprises a suite of four integrated applications (Expense Reports, Travel Plans, Payment Requests, and Timesheets) that can be used either individually or in any combination to automate expense-related business processes, enforce policy compliance, cut administrative costs, and reduce the risk of accidental errors and intentional fraud. Manufacturing ERP: Infor s manufacturing offerings provide ready-to-run solutions, built specifically to meet the needs of Government, Industrial, Aerospace & Defense, and Automotive companies and organizations. They provide deep, proven capabilities in key areas such as global finance, materials and inventory management, manufacturing production, product lifecycle management, project management, regulatory compliance, and field service management. CS Aerospace & Defense: Infor LN embodies over 25 years of experience and best practices in industrial manufacturing, equipment, automotive, high tech, aerospace and defense, distribution, and service management. Features includes industry-specific purchase and quality management, contract management and flowdown, multisite support, and built-in processes for ETO, MTO, MTS, and repetitive manufacturing. CS Industrial with Mobility: Infor SyteLine provides an end-to-end ERP solution for both discrete and process manufacturers, which includes advanced planning and scheduling, complex product configuration, mixed mode processes, and lean production methods. Factory Track™ is a manufacturing automation solution that supports field service and quality capabilities within Infor manufacturing ERPs and enhances warehousing functions for a paperless shop floor and greater operational efficiency. Warehouse mobility provides real-time barcoding and data collection for inventory operations and traceability. Time tracking provides a comprehensive time and attendance management for labor recording and machine time recording. Infor Supplier Exchange™ is used by automotive manufacturers to publish demand (requirements) and Advance Ship Notices (ASNs) to the Web. The platform provides online collaboration between customers and different types of companies in the manufacturing industry, including logistics service providers, outside processors, purchase parts suppliers, and discrete purchase order suppliers. Features include Global Track and Trace, supplier performance, damaged material notices as supports multiple currencies and multiple languages. Human Capital Management (HCM): Infor HCM provides a powerful set of cloud-based human capital management solutions to replace complex processes, workflows, and systems. Sophisticated, yet intuitive technology, empowers your HR professionals to deliver streamlined workforce processes. Global HR empowers HR departments to unify both data and processes and has the industry's broadest feature set of configurable, simplified, flexible and personalized core HR capabilities. GHR helps manage the person system of record, absence management, time entry, and benefits administration workflows. Cloud-based, mobile-enabled HR software frees your global teams from time-consuming transactional tasks enabling timely, accurate, and insightful data to all of your relevant HR and business applications. Talent Management is an integrated set of applications and performance management software organically built to support your strategic people initiatives by unlocking the potential of your organization's talent. Identify, hire, develop, reward, and retain the best of the best, all using a single, unified user experience. Work Force Management is a comprehensive labor optimization, planning, and time and attendance solution managing employee resource demand, labor performance, and business analytics. WFM addresses all aspects of labor compliance and performance needs with time and attendance, demand-driven scheduling, workforce scheduling, and absence management tools, mitigating potential compliance errors and reducing costs. Payroll is a scalable solution integrating personnel information seamlessly with compensation, benefits, absence, time-entry management, and employee self-services. Infor Payroll reduces administration workload and duplication of effort with a powerful control monitoring system. Update your payroll practices with a reliable and highly secure solution that meets the needs of complex pay job costing components. Asset & Maintenance Management: Hexagon's Enterprise Asset Management (EAM) with Mobility enables everyone involved in asset maintenance and management - owners, inspectors, managers, engineers, field techs, investment strategists - to find out more about the criticality, condition, reliability, and performance of assets, large and small. Based on ISO 55000, asset performance management (APM), asset investment planning (AIP), and GIS capabilities allow organizations to track assets and make data-driven decisions about when to repair, refurbish, retire, or replace. Facilities Management is configured with 14 separate workflows with out-of-the-box functionality. Infor EAM is pre-loaded with American Society of Heating, Refrigerating, and Air-Conditioning Engineers (ASHRAE) standards for equipment classifications, along with standard structures for mechanical, electrical, plumbing, and architectural systems. A two-way integration with OpenCAD Building Information Management (BIM) allows virtual walkthroughs of 3D building models, transforming design, construction, and maintenance capabilities. Maintenance, Repair & Overhaul (MRO) is a configurable solution to manage activities across different types of assets, including Fleets, Equipment, Labs and Utilities. Infor EAM's best-in-class features automatically create and assign work orders for preventive and corrective maintenance, automate purchasing and inventory management, manage inspections, schedule resources, and can leverage IoT and analytics to predict asset failure and support condition-based and reliability-centered maintenance programs. Business Intelligence & Analytics: Infor Burst is a native cloud business intelligence (BI) and data analytics platform for enterprise reporting, dynamic dashboards, and self-service data discovery that helps organizations understand and optimize complex processes in less time than traditional BI solutions. Built with patented data warehouse automation and machine learning technologies, Burst's "networked BI" approach creates a curated semantic data layer that maintains data lineage and connects teams and applications across the enterprise via a trusted network for faster insights and smarter decisions. Democratize data access while still maintaining centralized compliance and governance with new auditing features and granular user access controls. Dynamic Enterprise Performance Management (d/EPM) delivers business and financial performance management applications for Infor ERP solutions that allow organizations to centralize data, build plans tailored to their business, and forecast more accurately. d/EPM is an in-memory analytics platform that provides instant consolidation of data and immediate user feedback. Governance Risk and Compliance (GRC)is a versatile and extensible governance, risk, and compliance software that customers can use to mitigate performance or security risks, minimize inefficiencies, and verify user permissions, while remaining compliant with laws, regulations, and industry standards.
Informatica LLC
Informatica Intelligent Cloud Services (IICS)

Authorizations

3

Reuse

3

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Government agencies need a better, faster, more reliable approach to integrate and deliver timely data and analytics to users and business systems that rely on data. Whether you're delivering analytics, building a data warehouse, migrating a data warehouse to the cloud, or building real-time application processes, you need a high-performance, easy-to-use data integration service that connects to on-premises data sources, cloud applications, and cloud platforms to seamlessly integrate high volumes of data, so that you can get up and running quickly. IICS for FedRAMP IICS is a microservices-based, automated, AI-powered, and cloud-native data management solution. All of the IICS for FedRAMP IICS components and integrated Informatica solutions described below incorporate the CLAIRE artificial intelligence (AI) and machine learning engine, which leverages industry-leading metadata capabilities to accelerate and automate core data management and data governance functions. IICS for FedRAMP IICS includes support for both Cloud Data Integration and Cloud Application Integration: Cloud Data Integration Built on a next-generation, microservices-driven software as a service (SaaS), Informatica Cloud Data Integration enables you to connect to industry-leading applications and data sources across on-premises and the cloud and allows you to integrate the data sources at scale. Optimize the performance of your development teams by employing a codeless UI to build new integrations using drag-and-drop interfaces, making complex integrations simple. Speed up new initiatives with pre-built templates to get teams up and running more quickly, even for very involved scenarios. Cloud Application Integration Informatica Cloud Application Integration (CAI) service offers a single, trusted solution to support any integration pattern, data set, user-type or endpoint to automate business processes, expedite transactions and enable real-time analytics. It is based on a modular, microservices based architecture for agile support of future business requirements. CAI supports multiple new and unique integration patterns, which include on-premises to cloud real-time data integration, real-time/B2B application integration, process orchestration, data synchronization, and more. Users can integrate multi-cloud and hybrid applications, without writing a single line of code. Each of the above services leverage Informatica's Secure Agent that runs all your Cloud Data Integration and Cloud Application Integration workloads inside of the customer’s infrastructure, ensuring the greatest levels of security and performance.
IT-CNP
GovDataHosting Cloud Platform

Authorizations

6

Reuse

5

Service Model
IaaS
Impact Level
High
Status
FedRAMP Authorized
IT-CNP's FedRAMP JAB-authorized GovDataHosting Cloud Platform (GCP) is delivered as FISMA-compliant Infrastructure-as-a-Service (IaaS) offering using multi-tenant Federal Government cloud and private cloud computing environment deployment models. Dedicated to supporting information systems requiring low or moderate risk levels of protection, GCP IaaS fully managed computing infrastructure provides a comprehensive portfolio of hardened Microsoft Windows and Red Hat Enterprise Linux options to support a wide range of virtual server implementation requirements. GCP certified support personnel manage the underlying components of datacenter infrastructure (physical security, redundant power/cooling, network, storage, physical hypervisor servers, access/authentication, operating system, backup, disaster recovery and security compliance) allowing customers to focus on their system mission, software application implementation and system performance fine-tuning. 100% of GCP datacenters and 24/7/365 mission critical support is provided from the continental United States and is available exclusively to U.S. Federal, state, and local government entities and their respective authorized contractors. GCP offers government customers the ability to quickly and cost effectively deploy FedRAMP and NIST SP 800-53 compliant information systems while leveraging elastic network, connectivity, as well as virtual server memory, disk and CPU resources that can be scaled up or down to accommodate periodic spikes in processing demand.
Ivanti
Ivanti Neurons for MDM (Formerly MobileIron)

Authorizations

3

Reuse

3

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
MobileIron Government Cloud provides Government agencies with the foundation of the first mobile-centric, zero trust security platform to securely access and protect data across the digital workplace. MobileIron's zero trust approach validates the device, to ensure that only authorized users, devices, apps, and services can access business resources. With MobileIron, Government agencies can secure and manage data on any device across multiple operating systems such as iOS, Android, Windows 10, macOS, Zebra and Oculus. MobileIron technology automatically provisions enterprise settings such as Wi-Fi and VPN, secures corporate email and email attachments, applications and content delivery for both GSE and BYOD programs. With MobileIron, IT departments can deliver the right resources to authorized personnel while protecting sensitive government data, preserving the privacy of end-user data, and maintaining the seamless native device experience. MobileIron Government Cloud has been purpose built to provide a cloud-based, scalable architecture that enables rapid deployment and scales up to millions of users. The MobileIron Unified Endpoint Management (UEM) platform incorporates identity, context, and privacy enforcement to set the appropriate level of access to data and services while allowing IT departments to securely manage their global mobile workforce from a single console. . When user choice and end user experience matters, MobileIron Cloud provides the simplest onboarding and superior on device experience which improves user productivity. MobileIron Government Cloud offering now includes MobileIron Threat Defense (MTD). MTD builds upon MobileIron's mobile-centric, zero trust security framework by providing a single app that continually detects and remediates against known and unknown (zero-day) device, network and app-level threats on Android and iOS devices, with or without cellular or Wi-Fi connectivity. Deployment and activation of MTD on mobile devices is accomplished silently on managed and unmanaged devices in order to drive towards 100 percent user adoption. In addition to protecting federal data from mobile attacks, MTD helps federal agencies to comply with regulatory requirements, reduce total cost of ownership, and drive business innovation with secure mobile devices, apps, and cloud services.
Juniper Networks
Juniper Mist

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Juniper Mist Government Cloud uses a combination of artificial intelligence, machine learning, and data science techniques to optimize user experiences and simplify operations across the wireless, wired, and SD-WAN branch and campus environments. Data is ingested from numerous sources, including Juniper Mist Access Points, Switches, Session Smart Routers (SSR), and Firewalls (SRX) for end-to-end insight into user experiences. These devices work in concert with Mist AI to optimize user experiences from client to cloud, including automated event correlation, root cause identification, Self-Driving Network™ operations, network assurance, proactive anomaly detection, and more. Juniper also leverages Mist AI for next-generation customer support. For example, it is the foundational element behind Marvis, the industry’s first AI-driven Virtual Network Assistant, providing extensive insight and guidance to IT staff via a natural language conversational interface. As a result, Mist AI saves operators time and money with faster problem resolution and fewer onsite visits. In addition, users benefit from a network infrastructure that is more predictable, reliable, and measurable. Marvis Virtual Network Assistant is the first virtual network assistant (VNA) purpose-built with Mist AI for enterprise WLANs, LANs, and WANs. It transforms network operations from reactive troubleshooting to proactive remediation through self-driving actions. Juniper Wi-Fi Assurance service is based on machine learning and driven by Mist AI. It replaces manual troubleshooting tasks with automated wireless operations to make Wi-Fi predictable, reliable, and measurable, providing unique visibility into user service levels. Juniper Mist Wired Assurance service brings Mist AI to switching. It sets a new network management standard with AI-driven operations and automation, improving the experiences of devices connected to resources through Juniper EX/QFX Series Ethernet Switches for branch and campus deployments. Juniper Mist WAN Assurance service simplifies operations and improves visibility into end-user experiences while shortening the time to repair wired and wireless devices. Premium Analytics offers network visibility and business intelligence to drive your digital transformation journey.
Kiteworks USA, LLC
Kiteworks Secure Gov Cloud

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Ready
The Kiteworks Private Data Network is a FedRAMP Ready service at the High Impact Level that provides data security, governance, and compliance capabilities. The service consists of the following core components and functions: System Components - Virtual private cloud (VPC) environment with dedicated servers for each customer - Encrypted file storage system - Data transfer protocols including SFTP, HTTPS, and SMTP - Authentication and authorization services - Audit logging and monitoring systems - Security scanning and threat detection services Core Functions - File transfer and sharing capabilities via web interface, email, SFTP, MFT, and APIs - Role- and attribute-based access control and user authentication - File encryption at rest and in transit using FIPS 140-3 validated cryptographic modules - Audit logging of all system and user activities - Integration with customer directory services (LDAP/Active Directory, etc., see below) - Multi-factor authentication support - DLP integration - Embedded antivirus Possessionless Editing (SafeEDIT) System Components and Functions - File streaming service for secure remote data access and collaboration - Data rendering system for file type conversion - Audit logging system for data interactions - Versioning system for file changes - Authorization validation service - File integrity verification system - Session management service - Access revocation controls - Activity monitoring system Security Features - Customer-managed encryption keys - Single-tenant deployment providing data isolation between customers - Continuous security monitoring and scanning - File-level role- and attributed-based access controls - Remote device management capabilities - Security event logging and reporting - Integration with customer SIEM systems Compliance Capabilities - Audit log generation and retention - Policy enforcement mechanisms - Compliance reporting tools - Data locality controls - Access tracking and monitoring - Chain of custody documentation Integration Interfaces - REST APIs for system integration and SCIM authentication support - SMTP interface for email services - SFTP/FTPS/CIFS/SMB interfaces for file transfer - LDAP/AD, SAML 2.0, Kerberos, PIV/CAC, time-based one-time password (TOTP) authenticators, SMS, and SFTP certificate connectors for authentication - SIEM integration for security monitoring - DLP and CDR system integrations - The system operates within a defined authorization boundary and undergoes continuous monitoring and regular security assessments in accordance with FedRAMP requirements. To learn more about what Kiteworks can do for government agencies, please visit: https://www.kiteworks.com/solutions/government/
Knightscope, Inc.
Knightscope Autonomous Security Robot (Knightscope ASR)

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Knightscope Autonomous Security Robot (ASR) is a fully autonomous security robot equipped with four (4) cameras, microphones, and speakers, for 360-degree video and audio. The ASRs navigate the area(s) of operation autonomously and stream live video back to the user via a web browser. The ASRs run 24/7 on its own including autonomously recharging itself without any human intervention have the following capabilities: - People Detection – The ASR can detect people by time and location. - License Plate Recognition – The ASR can identify and detect license plates. - Thermal Imaging – Equipped with a FLIR thermal camera, the ASR can monitor for heat anomalies above a pre-determined temperature. - Audio – The ASR can be used to broadcast pre-recorded or custom audio messages and initiate a live intercom call. The core platform of Knightscope ASR is the Knightscope Security Operations Center (KSOC), a fully functional, browser-based user interface included with every subscription which allows customers to access ASR fleet information around the clock. Customers can use the KSOC interface to: - View current ASR locations - Access live (or recorded) video and audio from an ASR - Select pre-determined patrol routes (for mobile ASRs) - Broadcast pre-recorded or custom audio messages through an ASR, using an intercom chat function or a phone call over a live channel, or sound an alarm - View alerts Alerts can be configured to trigger based on pre-defined criteria, such as detection of any person or identification of a specific license plate. In the event of an alert, KSOC can send email messages, text messages, or voice messages to notify designated people about the event. The notifications contain limited information informing the user that an event has been detected by the ASR. Any forensic data related to the event, including a snapshot, date and time, and location must be viewed within KSOC.
KnowBe4, Inc.
KnowBe4 Platform (KSAT + PhishER)

Authorizations

18

Reuse

19

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The KnowBe4 Platform includes KSAT, all training modules, and PhishER+. KSAT (Awareness Learning Management and Simulated Phishing) is designed to provide users with an interactive platform to better manage IT security problems of social engineering, spear-phishing, and ransomware attacks. PhishER+ is a Security Orchestration, Automation, and Response (SOAR) platform that can be used to manage emails that KSAT users report as suspicious or malicious. The purpose of this platform is to provide an organization with a way to evaluate suspicious emails making it through to the inbox of users. The ModStore and Compliance Plus are libraries of available training modules that can be used within the KSAT platform or in external learning management systems. The Phish Alert Button (PAB) is an optional component placed in the inbox of a customer end user. This allows end users to report a suspected phishing simulation and any suspicious email message to their security team. The PAB integrates with KSAT and PhishER. KnowBe4 products and features in scope are: KSAT Learning Management System and all included training content (ModStore, Compliance Plus), KSAT Simulated Phishing Platform, PhishER+, Phish Alert Button (optional) KnowBe4 Products currently excluded from scope: SecurityCoach, and Free Tools (SecondChance, RanSim, Password Exposure Test, Weak Password Test, Breached Password Test, Browser Password Inspector) KnowBe4 products share a central configuration and authentication settings area located within the KSAT Platform. This is included in scope and is used throughout the KnowBe4 suite of products.
Knowledge Services
dotStaff

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
Knowledge Services dotStaff is a Software as a Service (SaaS) offering that includes a Vendor Management System and a Survey Management module. The dotStaff Vendor Management System allows for organizations to manage the contractor life cycle, statement of work bidding, tracking, and selection where contingent or temporary labor is used. Government customers enter position requisitions or projects that are viewable by Contractors, who can submit responsive bids. Activity associated with the winning bid is entered, tracked, and reported. The Survey Management module provides survey automation capabilities, and can be configured to survey certain locations, property types and/or resident classifications. Customers can send survey links, schedule face to face interviews, request information through the Survey Management module. Survey Management The dotStaff Survey module delivers real-time, automated surveys which enhance access to actionable data. The module automates and improves the performance of in-person, mobile, web-based, and telephone surveys, including scheduling and data reporting. Vendor/Consortium Management The dotStaff Vendor Management System allows for organizations to manage the contractor life cycle, statement of work bidding, tracking, and selection where contingent or temporary labor is used. Field Based/Mobile Worker Management All services allow field-based and mobile workforce support through the dotStaff mobile application.
Lastwall Corp
IDCommand

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
IDCommand™ by Lastwall is a mission-ready Identity Platform purpose-built for the unique demands of U.S. government and defense environments. At its core, IDCommand delivers secure, seamless access enabling a Zero Trust architecture - allowing agencies to modernize their authentication without compromising on compliance, control, or security posture. IDCommand supports the identity standards federal agencies trust - including SAML 2.0, OIDC, PIV/CAC, and FIDO2/WebAuthn - for strong, passwordless login experiences that eliminate credential vulnerabilities and streamline secure access. Whether you're operating in government, national security, or critical infrastructure, IDCommand makes it easy to implement Public Key Infrastructure (PKI) by design - so secure identity can be deployed quickly and confidently at scale. Our adaptive access engine continuously assesses risk in real time - factoring in device posture, patch levels, geographic context, and other environmental signals to deliver intelligent, policy-driven access decisions. These capabilities support alignment with key federal frameworks such as NIST SP 800-53 Rev.5 (Security and Privacy Controls for Information Systems and Organizations), NIST SP 800-63 (Digital Identity) and NIST SP 800-207 (Zero Trust architecture). Engineered for high-security domains, IDCommand integrates seamlessly into existing architectures - empowering federal teams to deploy modern identity controls that prioritize mission continuity, not complexity.
LaunchDarkly
LaunchDarkly

Authorizations

1

Reuse

24

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
LaunchDarkly is the feature management platform that teams use to safely deliver and control software through feature flags. By separating code deployments from feature releases, feature management enables organizations to deploy faster, reduce risk, and iterate continuously. Government agencies use feature management to control new feature rollouts, quickly resolve incidents, and increase productivity of development teams while using fewer resources. They are improving their DevSecOps processes, facilitating Continuous Integration/Continuous Delivery (CI/CD), and shipping more code safer than ever. LaunchDarkly enables: - Resolution of incidents in less than 200 milliseconds, without costly rollbacks that threaten other features. - Powerful targeting capabilities that provide complete control over which users or microservices can see new features. - Safe testing in production—empowering teams with real-world QA testing in place of costly pre-production environments. - CI/CD development processes that improve developer productivity and new feature release times. - Hypothesis driven development, including experimentation and percentage rollouts. LaunchDarkly provides developers and business stakeholders with a central location to manage the rollout of new features. At the same time, it can enforce change management policies through scheduling, approval workflows, and custom role-based access control down to the feature level. Agencies can implement their own policies around the use of personally identifiable information (PII) and can take full advantage of targeting without needing to store user PII within the LaunchDarkly Federal SaaS environment. Additional hosting options and an offline mode are available for organizations with more restrictive policies.
M.C. Dean, Inc.
InfraLink

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
InfraLink, formerly known as Infrastructure Maintenance Management System (IMMS), integrates the cyber-physical systems lifecycle from design through implementation and sustainment, enabling configuration management and providing a systematic approach to planning and continuous improvement across project activities. Rely on InfraLink to support all aspects of critical infrastructure management. Configuration Baselines - Effectively manage system security, planned maintenance, issue management, and systems availability/performance reporting by ensuring the integrity of your system baseline configurations. InfraLink supports customization to each system element. Preventive Maintenance - Ensure critical systems and equipment availability and avoid unplanned outages. Based on the concepts of reliability-centered maintenance, InfraLink provides a foundation for effective scheduling, tracking, and performance management activities. Model data, capture tools, and electronic forms document and validate information in near-real time. Issues Management & Analysis - InfraLink’s flexible and customizable ticketing system allows you to define work categories and workflows that align with program scope and priorities, set service level agreement (SLA) milestones, and capture customized status-specific issue attributes. Comprehensive case details help you better assess system and process performance, conduct effective root cause analysis and ensure individual accountability. Installation Management - InfraLink allows project teams to effectively track complex system implementation workflows, from simple component testing and installation to the integration of complex subsystems and hundreds of components. InfraLink enables effective planning and data integrity, which promote worker safety, accountability, and coordination across job functions. Materials Inventory - Avoid work delays caused by stock shortages and extensive inventory carrying costs through effective inventory management. InfraLink helps you plan replacements based on a reliable configuration baseline, performance history and operational priorities, while streamlining stringent Government and enterprise property reporting requirements. Reporting - Maintain a comprehensive assessment of your systems and team performance. InfraLink provides a range of standard and customizable reports and dashboards that offer critical insights to support ongoing improvements in systems performance and management.
MAXIMUS Inc.
MAXIMUS Cloud

Authorizations

3

Reuse

6

Service Model
IaaS
PaaS
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Maximus Cloud is a FedRAMP Authorized multi-tenant Private and Government Community Hybrid Cloud designed exclusively for use by government customers only. Built to meet government compliance and security requirements, our managed Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) portfolio of solutions are hosted, managed, secured, and monitored to provide the highest scalability, reliability, and availability of mission-critical systems and services. Our FedRAMP Authorized services include: • MAXIMUS Amazon Connect Platform: an enterprise-class omnichannel cloud contact center solution. The Engagement Platform leverages Amazon Connect technology to provide an optimized citizen engagement experience that enables citizens to communicate with your agency across all channels – including voice, email, SMS and web chat. The Amazon Connect Platform also provides key additional modular features such as workforce management, recording and quality management, analytics, AI and a robust reporting framework. • MAXIMUS Genesys Engagement Platform: an enterprise-class omnichannel cloud contact center solution. The Engagement Platform leverages Genesys technology to provide the omnichannel functionality required for an optimized citizen engagement experience that enables citizens to communicate with your agency across all channels – including voice, email, SMS and web chat. The Engagement Platform also provides key additional modular features such as workforce management, recording and quality management, analytics, AI and a robust reporting framework. • Maximus Intelligent Insights: a Software-as-a-Service (SaaS) Total Customer Experience solution powered by SuccessKPI that uses AI and machine learning to provide key insights on customer service experiences over text and audio. The platform uses speech recognition and natural language understanding (NLU) to analyze conversations between customers and agents in real-time. With omni-channel capabilities, SuccessKPI brings together information from every customer point of contact to provide comprehensive datasets for improving the consumer experience. • Maximus RPA: is our Platform-as-a-Service (Paas) solution powered by Automation Anywhere that uses a web-based management system that uses a control room to run automated tasks that combines traditional Robotic Process Automation (RPA) with cognitive elements like Natural Language Processing (NLP), reading unstructured data, and machine learning capabilities. • Maximus Analytics: is our Platform-as-a-Service (PaaS) solution powered by tcg mcube that uses a robust, scalable, and flexible end-to-end AI Platform to ingest, store, and process complex data to across the enterprise. Intuitive and built for speed, Maximus Analytics provides real-time data insights, a low code AI drag-and-drop interface, powerful self-service capabilities, and a modular 360-degree platform embedded with AI/ML frameworks. • Maximus Suicide Prevention Service Powered by MindX Sciences is an easy-to-use tool that can identify individuals at risk for suicidality and provide personalized risk-reduction and life improvement strategies. Based on the Niculescu Convergent Functional Information for Suicidality Scale (CFI-S), the test does not ask about suicidal ideation, making it suitable for non-clinical settings such as large organizations or educational settings. The test's validity and reliability have been validated through published studies in scientific and medical journals. Additionally, clinicians can use the test for a nominal yearly fee to reduce suicide risk in their patient population, with a CPT code for clinical use available. Overall, the SX Prevent test is an innovative approach to suicide prevention that can support individuals at risk and may prove beneficial in various settings.
MCG Energy Solutions, LLC
MCG Applications and Hosting

Authorizations

1

Reuse

0

Service Model
IaaS
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
MCG Energy Solutions develops and provides wholesale and retail energy software on a SaaS basis that we host as a CSP in the MCG Private Cloud. Both our Private Cloud infrastructure (IaaS) and our product suite (SaaS) exceed a 99.99% SLA uptime for utilities and other businesses that need a true 24x7x365 system with real-time (active/active) redundancy. MCG’s entire customer solution, including all product offerings and services, has no gaps between our software and the infrastructure it runs on. Our solutions are hardened through and through to mitigate customer risk exposure and minimize required maintenance. The following products are included in the MCG Application suite which can be used individually or together as a complete energy software solution: • Integrated Asset Manager (IAM) - A full-featured, easy-to-use wholesale energy marketing and trading solution integrated with all North American physical bilateral markets and ISOs. IAM’s user-friendly scheduling interface streamlines workflow for managing front-office and back-office operations including trade capture, transmission reservation management, fully integrated native e-Tagging, scheduling, bidding, dispatch, settlement, and reporting for all resources and loads. • Energy Accounting System (EAS) - Tracks and manages time-series data types, visualizes calculations (load, imbalance, contract, etc.), and tracks a meter’s data sources to generate an official profile based on the best available and validated data. EAS supports granular meter input (5-minute, 15-minute, hourly) and tracks multiple data sources for a single meter such as PI, MV90, market, and more. The system’s flexible calculation engine accepts and saves the calculations you require in an Excel-like format. • TransBill - Extends EAS as a complete wholesale power billing and invoicing solution that bills a wide variety of wholesale contracts for both generation and transmission businesses. TransBill assists in performing all components of Open Access Transmission Tariffs (OATTs), Purchase Power Agreements (PPAs), Grandfathered Agreements (Power and Transmission legacy contracts), ISO Transmission Revenue Shadowing, and more. • MCG’s Versify Outage Management System (OMS) - An industry leader for handling the outage process from the initial request, through approval processes, to execution and coordination of activities in the field and with ISO and RTO markets. Versify OMS features the advanced Versify workflow engine that greatly reduces time and expense of adjusting the system to meet changes in markets and your business. • MCG’s Versify Operator Log (OpLog) – A web-based software system that easily logs events, activities, and compliance requirements in a single tool using the same workflow engine as Versify OMS. OpLog simplifies communication between the field and office, and automates manual processes to eliminate errors while improving efficiency and compliance. • MCG’s Versify Workforce – Advances and streamlines safety management with tools for desktop and mobile devices, including Permit to Work (PTW), Job Hazard Analysis (JHA), Job Safety Analysis (JSA), Lockout Tagout (LOTO), and more. Workforce reduces the administrative burden on staff while enhancing compliance and coordination between the field and office. Designed to provide complete visibility across your organization, Workforce ensures the correct safety and compliance measures are taken for the safety of your employees and work environments. • MCG’s Paragon Energy Risk Manager (ERM) - A fully integrated trading, credit, and market risk management solution for complex, multi-commodity energy companies. ERM manages the entire risk management process throughout the transaction life cycle including counterparty onboarding and scoring, trade limits, margining agreements, trade capture, scheduling, Mark-to-Market (MtM), accounting, and credit analysis. Combining state of the art technology with dynamic features, ERM provides a consistent approach to market and credit risk to ensure compliance with credit and market exposure policies and limits. • MCG’s Paragon Credit Risk Manager (CRM) - Combines state of the art technology with a rich feature set for managing credit risk, including counterparty, contract, collateral, exposure management, advanced credit analytics, and credit scoring. CRM is easily configured by users to meet the nuances of each client’s credit risk requirements, and can create custom views and reports that can be saved and shared. Encompasses the entire scope of credit risk management to ensure credit policies are consistently and efficiently followed across your organization. • MCG’s Paragon Gas Scheduling System (GSS) – This extension of Paragon ERM merges operational and commercial data in an easily navigated format that streamlines tasks from processing nominations to generating expected cash flows. GSS simplifies the gas scheduling process by generating invoices and closing statements using transport rates from the pipeline and actualized data. • Hosted Data Services (HDS) – Accessing your data should not interrupt business activities. HDS warehouses and archives data from all MCG products into a single platform with full search, filter, report, and display building capability. It includes a programmatic API for performing queries directly against the HDS database, eliminating production impacts from long running queries while integrating to downstream systems without impacting the operational system in use. • Control Area Scheduling (CAS) – A fully featured interchange and transmission scheduling system integrating MCG e-Tag and OASIS interfaces to automatically create, categorize, and track interchange and transmission schedules for reliability entities. • MCG’s Innotap Data Suite (IDS) – When you need timely, clean, and accurate data from markets for your decision making, IDS (direct or through API feed) is the solution for your business. IDS organizes and displays data for wholesale energy transactions from a wide array of sources, with modules for a variety of ISOs and RTOs to aid and report on the decision making process.
Medallia, Inc.
Medallia GovCloud

Authorizations

10

Reuse

10

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
The Medallia Experience Cloud (MEC), leads the market in the understanding and management of experience for agencies, public sector employees, and citizens. Medallia captures experience signals created on daily journeys in-person, traditional surveys, on calls, digital channels, over video and social media, and IoT interactions. Once net new data is captured or by leveraging legacy data previously collected by customers, Medallia applies proprietary AI technology on data that is structured and unstructured (text and comments) to reveal personalized and predictive insights that can drive action towards positive business / organizational results and outcomes. Using the Medallia Experience Cloud, government agencies can reduce employee churn, increase citizen and employee Trust and Equity, achieve in-the-moment service recovery, and drive data-driven business decisions while providing clear and potent returns on investment. The Medallia Experience Cloud can support agency mission, focus, and objectives by: - Engaging Citizens and Employees Intuitively in a secure, meaningful, continuous way to increase feedback response rate and help the agency better understand their sentiment, value, and behavior. - Empowering the Agency and Activating every Employee by driving feedback and actionable insights to every agency employee. - Taking Action in Real-Time with analysis and alerts that identify focus areas and help resolve issues quickly. - Optimizing Government Experience by empowering agencies to align with mandates related to A-11, Trust, and Equity - Removing Silos by tracking customer journeys that span across engagement channels including email, mobile, websites, chat, phone, video, and contact centers - Maintaining Trust and Security with a platform that is FEDRAMP High certified with the JAB as well as HIPAA compliant allowing us to engage with sensitive PII. - Integrating at scale by leveraging connectors for platforms such as Salesforce and ServiceNow and supported by a robust suite of Restful API
Menlo Security
Cloud Security Platform powered by Isolation Core

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Menlo Security is the pioneer of browser security and stops evasive threats such as phishing and ransomware, delivering on the promise of cloud-based security and enabling zero trust application access. The Menlo Secure Enterprise Browser solution prevents attacks while being invisible to end users who can use their preferred web browser, enhancing productivity. Deploy browser security policies in a single click, securing internet access and protecting organizational data down to the last mile. Menlo Secure Enterprise Browser Solution Instantiated for each browser session, the Menlo Secure Cloud Browser secures access to the web, preventing malware, ransomware, and unauthorized access and ensures that data security policies are enforced to prevent malicious or unintentional data theft with multiple Data Loss Prevention (DLP) features. Defending against highly evasive adaptive threats (HEAT), Menlo leverages machine learning and AI-based URL analysis to identify and block the most sophisticated phishing sites. Menlo remote browser isolation (RBI) offers significant performance enhancements in comparison to all other RBI offerings with patented Adaptive Clientless Rendering (ACR). ACR enables web page rendering, including interactive animations such as scrolling, to be performed on the endpoint browser using optimized desktop hardware and browser software, while the full browser feature set—including copy-paste, find in page, and printing—is maintained. The administrative policy defines whether any site is isolated. Isolation may be managed with traditional categories which should be familiar and easy to use by administrators of Secure Web Gateways (SWG). Unlike a SWG, however, Menlo enables isolation by threat types and/or vulnerable web services. Mitigating the security blindspot posted by mandated transport level encryption (TLS), Menlo Browsing Forensics offers policy-based capture of browsing sessions. Captures are stored in customer data stores, not accessible to Menlo Security. The Browsing Forensics Viewer enables the Security Operations Center (SOC), incident response, and even security awareness training teams to review users’ sessions including clicks, scrolls and text inputs. Policy controls manage whether password entries are retained, whether a user is notified of recording and screen capture rates. Files and archives are delivered with browser protocols. The Menlo Secure Cloud Browser includes comprehensive file and archive inspection. Archives are opened, and each file is subject to hash checks and anti-virus examinations. The safe content of both clean and infected files can be presented as a safe PDF to the user. Policy governs whether any original file or archive may be downloaded from the Secure Cloud Browser. File security checks can be selectively bypassed. Traffic steering to the Menlo Cloud supports proxy chaining from, for example, existing SWG or Cloud Access Security Brokers (CASB), as well as PAC file deployment or firewall redirecting. Menlo Browser Security is fully compatible with Secure Access Service Edge (SASE) and Security Service Edge (SSE) deployments. Common use cases for Menlo Browser Security include: comprehensive zero-hour phishing prevention, ransomware prevention, administrative governance of Generative AI, and comprehensive governance of SaaS using workflows similar to CASB, but including SaaS property isolation and comprehensive file upload and download controls applicable on a per-application basis.
MicroFocus
ITMX Platform featuring Service & Asset Management, Universal Discovery, CMDB and Project & Portfolio Management

Authorizations

1

Reuse

0

Service Model
PaaS
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
OpenText provides the most complete and integrated Information Management platform, allowing companies to organize, integrate and protect data and content as it flows through business processes inside and outside the organization. The OpenText IT Management Platform (ITMX) offers Service & Asset Management (ITSM, ITAM), Universal Discovery & CMDB, and Project & Portfolio Management (PPM) in AWS GovCloud. - ITSM – Empower users with a modern self-service experience and boost IT efficiency with codeless configurations, built-in AI, and advanced automation. - ITAM – Govern your IT assets across their lifecycles. Procurement, financial, vendor, and contract management processes are included in one centralized platform. - Discovery and CMDB – Discover, map, and manage your hybrid IT configurations—on cloud or off. Service dependency mapping and proactive impact analysis improve your IT visibility and reduce service disruptions. - PPM – Drive business value through comprehensive strategic portfolio management and investment optimization, while ensuring projects are on time, in budget and satisfy goals. A strong workflow engine and what-if analysis scenario planning power this strategic portfolio and project management tool. Hosted in the FedRAMP compliant Amazon Web Services (AWS) cloud, these services are fully configurable and scalable, and the service include integrations, and updates to the latest release.
MicroStrategy
MicroStrategy Cloud for Government

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
MicroStrategy is the world’s top-rated platform for enterprise analytics. The MicroStrategy Intelligence Platform offers a full range of trusted, modern BI experiences, and is designed to help departments and agencies build data-driven cultures and make faster, smarter decisions. Built for performance at scale, MicroStrategy delivers concrete answers to users where and when they’re needed. Foundationally, the platform offers out-of-the-box drivers and gateways for a variety of data sources, types, and formats, and APIs/SDKs which are hosted within the MicroStrategy Platform Deployed within Customer Tenant. Using the platform’s proprietary enterprise semantic graph, agencies can establish a unified, governed, secure, and reusable data model on which a variety of intelligence solutions can be built to deliver accurate, personalized, and trusted information to individual users based on each agency’s enterprise data dictionary. The MicroStrategy Cloud for Government is a fully managed enterprise analytics solution that offers all the market-leading capabilities of the MicroStrategy Intelligence Platform on a unique Amazon Web Services (AWS) GovCloud implementation. MicroStrategy Cloud for Government features a fully optimized reference architecture built specifically for deployment in a customer-licensed AWS environment, offered as a software-as-a-service (SaaS) solution. MicroStrategy administers each unique MicroStrategy Cloud for Government environment on the behalf of each government department or agency, including steady state operations, routine application of software upgrades, robust system monitoring and alerting, and 24/7/365 technical support for priority issues. The components that directly support the MicroStrategy Cloud for Government cloud service offering are described in the subsections below. MicroStrategy Cloud for Government is a SaaS service built on top of AWS GovCloud (US) IaaS servers. MicroStrategy utilizes AWS GovCloud (US) to provide the resources that host the MicroStrategy Cloud for Government platform and leverages the experience and resources of AWS to scale quickly and securely as necessary to meet current and future demand. MicroStrategy is responsible for designing and configuring the MicroStrategy Cloud for Government architecture within AWS GovCloud (US) to ensure that the availability, security, and resiliency requirements are met.
MIS Sciences Corporation
GovPoint Cloud Services

Authorizations

8

Reuse

7

Service Model
IaaS
PaaS
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
GovPoint Cloud Services (GCS) offers a variety of cloud solutions, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), custom and private clouds, and 'bring your own hardware' options. This allows for tailored cloud setups to meet specific needs. GovPoint operates from its geographically dispersed data facilities, which are maintained by MIS Sciences, without relying on other providers. All compute instances feature high-performance processors and ultra-fast flash storage with 40 Gbps connectivity, ensuring exceptional speed and efficiency. Overview of Services • Authorization as a Service If you have an application that needs to be FedRAMP authorized, MIS can include it in our suite of FedRAMP authorized SaaS offerings. This will enable your SaaS application to utilize the MIS FedRAMP authorization, allowing you to provide a FedRAMP authorized product to your customers. • Compute (IaaS) With GovPoint Compute (GPC), you balance processors, RAM, and disk to meet the requirements for any cloud application. GPC uses a blend of high-I/O flash disks and Storage. Users can choose between pre-configured and hardened images or customize processors, disk space, and RAM to meet particular needs. • Private FedRAMP Cloud If your requirements call for isolation or dedicated resources, the Private FedRAMP Cloud is your solution. With the Private Cloud, you have complete control over all resources, including firewalls, networking, computing, and Storage. Your private cloud is isolated from all other tenants and users and is part of the GovPoint FedRAMP Infrastructure. • Bring Your Own Hardware Customers can bring their own hardware to operate within the FedRAMP Authorization boundary. This allows them to utilize the GCS controls to meet compliance requirements for specialized hardware, equipment, or appliances. • Sayari (SaaS) Sayari is a trusted supply chain and counterparty risk intelligence provider for government agencies, multinational corporations, and financial institutions. Our platforms integrate corporate ownership, supply chain, trade transactions, and risk data from over 250 jurisdictions, ensuring you can trust the quality of our intelligence. • Calabrio Workforce Engagement Management (SaaS) Calabrio Workforce Engagement Management offers a digital foundation for customer-centric contact centers. This suite improves agent performance and workforce efficiency by combining workforce optimization, agent engagement, and business intelligence in the cloud, leading to better customer experiences. • Sharetru Federal (SaaS) Sharetru Federal is a leading provider of secure file sharing and Managed File Transfer as a Service (MFTaaS). It allows organizations to exchange critical data securely while ensuring compliance with strict regulations such as CMMC, NIST SP 800-171, ITAR, HIPAA, PCI-DSS, and FedRAMP (NIST SP 800-53 Rev. 5). With file transfer protocols including HTTPS, SFTP, and FTPS, Sharetru Federal supports fully automated as well as ad-hoc file transfers. Explicitly designed for industries requiring high data protection standards, Sharetru Federal serves sectors including Defense, Healthcare, Financial Services, and Aerospace. • eAlert Notification Service (SaaS) eAlert is a cloud-based, high-speed, high-volume email and SMS sending service designed to send notifications and transactional messages. It is a reliable, cost-effective service for businesses of all sizes that use email and SMS to keep in contact with their customers. Use the GCS eAlert APIs to integrate eAlert directly into your existing applications. You can also integrate the email sending capabilities of GCS eAlert into the Software you already use, such as ticketing systems and email clients.
Motorola Solutions
Motorola Solutions Federal Cloud (MSFC)

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
Motorola Solutions is expanding its “Mission Critical Ecosystem” which consists of a suite of software and technology that supports mission critical communications in evolving ways and that provides fast access to actionable information. The purpose of the Motorola Solutions Federal Cloud (MSFC) is to serve as the platform upon which the applications and solutions that are part of this Mission Critical Ecosystem will securely operate to provide our U.S. Federal Government users with enhanced capabilities. Primary to our Federal Cloud offering as our initial secure cloud application is the APX NEXT smart radio, a next-generation P25 platform purpose-built for first responders to access and act on information while maintaining focus in critical situations. The Motorola Solutions Federal Cloud enables APX NEXT and additional SaaS services to provide new Common Operating Picture (COP) capabilities to federal Law Enforcement Officers (LEOs), first responders and public safety personnel in the field with a new ownership experience to operations and support personnel. The underlying Motorola Solutions Federal Cloud architecture is reinforced by a modern and comprehensive application of security technology. Once deployed, our cloud services production systems are monitored 24x7x365 by Motorola Solutions’ Security Operations Center using state-of-the-art Security Information and Event Management (SIEM) technology.
Moveworks
Moveworks GovCloud

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
Moveworks is a comprehensive, technology-agnostic Agentic Artificial Intelligence (AI) platform for automating workforce support. The Moveworks Agentic AI Assistant manifests as a standalone search engine, web bot, or collaboration tool native chatbot to drive business process optimization (BPO) by enabling employees to find information, automate tasks, and enhance productivity via workflow automation, cost reduction, and digital transformation at scale across all business systems (ITSM, HRIS, ERP, CRM, and others). Powered by machine learning (ML), a fleet of public and proprietary LLMs, and a pioneering Agentic Reasoning Engine that allows it to handle complex requests across multiple domains (IT, HR, Finance, Facilities, Engineering, Operations, and others), Moveworks helps organizations to achieve Lean Six Sigma levels of operational efficiency while maintaining regulatory compliance and optimizing resource allocation. It streamlines strategic sourcing, financial modeling, and expense reduction, thus ensuring maximum ROI (Return on Investment) and total cost of ownership (TCO) optimization. It also comes with robust stakeholder tools allowing for strong governance, rich analytics, and continuous service improvement. With an intuitive, zero-trust architecture (ZTA), the Moveworks platform seamlessly integrates with existing technology ecosystems to deliver value out of the box, allowing organizations to modernize operations through cloud optimization and IT modernization. And while Moveworks has over 150 native integrations, the platform also has a developer interface that makes it easy for builders to extend the power of the Agentic AI Assistant to every bespoke business system by creating custom AI agents at speed and at scale. For public sector innovation and government modernization, the Moveworks platform enhances agile governance by implementing and tracking key performance indicators (KPIs) to ensure accountability. It enables process mining to uncover inefficiencies, supports continuous improvement (CI) methodologies, and delivers real-time insights for data-driven decision-making.
National Resident Matching Program
iMatch

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Building on 70+ years of physician matching, the NRMP partners with U.S. government agencies to offer simple, equitable, and effective solutions for matching applicants to posts, stations, and government offices around the globe to effectively address recruitment and selection needs and drive outcomes for success. Using our software-as-a-service application called iMatch, administrators can invite participants to take part in a “match” where we leverage our proprietary mathematical matching algorithm to prioritize the selection preferences of participants, placing them in the most preferred positions possible on their rank lists. Participants have access to real time Match information and obtain their Match results in the iMatch system. Additional Match Outcome Reports can inform workforce trends and guide growth and development. NRMP’s iMatch system and matching services simplify selection processes, reduce bias, and encourage stable outcomes based on the principles of market design and the following pillars : **Accuracy:** NRMP’s proprietary mathematical matching algorithm places participants based on preferences and creates the best possible outcome. Research on the algorithm was the basis for awarding the 2012 Nobel Prize in Economic Sciences. **Reliability:** NRMP creates a Match schedule to ensure on-time delivery of services with well published and communicated deadlines throughout the matching process. Our iMatch technology is state-of-the-art, highly secure, and confidential allowing Match participants to create their location selection preferences with piece-of-mind. **Integrity:** NRMP Matches foster a spirit of fairness because our services and matching processes are transparent, and all Match participants must adhere to the same rules and deadlines. Accepts and electronically verifies Personal Identity Verification (PIV) credentials Ranking information submitted by a Match participant is visible only to individuals connected with the Match Provides a standardized process based on 70 years of matching expertise Match outcome reports and statistics displayed at the conclusion of each matchFIPS 199 System Categorization - Moderate ​ Service Model - SaaS ​ Deployment Model - Community ​ Cloud Stack / Leveraged Systems​ - AWS GovCloud A system customizable to each Match sponsor’s particular process: * Specific data fields displayed during participant registration * Branding with Agency logo alongside iMatch logo * Roles and responsibilities of users can be granted or removed specific to their job duties * Multi-tiered levels of access * Email reminders and confirmations with content relevant and detailed to each Match and Agency
Okta
Okta IDaaS Government High Cloud (GHC)

Authorizations

8

Reuse

26

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
Okta for Government High service offering provides centralized identity and access management capabilities to customers who want to manage access across any application or device, whether they are on-premises in the customer’s office/data center or in the cloud. The Okta IDaaS platform is the primary application platform provided to customers. The IDaaS application provides several important features/capabilities, which are listed below. - Universal Directory: Okta Universal Directory provides a single view across all these groups with AD and LDAP directory integrations and out-of-the-box connections with HR systems, CSV files, and third-party IdPs. Integration with Applications: Okta comes with pre-integrated applications that customers can select to allow their users to access them through the Okta Integration Network, either in their enterprise or in a cloud - Okta API Integration: Customers can also integrate their own applications with Okta API - Okta Sign-In Widget (SIW): SIW is the out of the box end user experience that our customers can deploy in an Okta hosted environment. SIW provides configurable user registration, sign in and recovery experience. - Okta Software Development Kit (SDKs): SDKs allow customers to build their own identity experience using Okta as a back end. - Okta Customer Organization Logging: Okta’s prebuilt monitoring, logging, and reporting tools make it easy to analyze security posture, user access events, lifecycle management transitions, security risks and other identity-related data. - Okta Admin Dashboard: Okta’s Admin Dashboard provides central administration and provisioning of users and the applications they can access. - Adaptive Multi-Factor Authentication (aMFA): Adaptive MFA provides an additional layer of security for access control, which gives Okta customers the ability to create contextual access policies that assess risk factors such as device, network, location, travel, IP, and other context at each step of the authentication process. Single Sign-On (SSO): Okta SSO creates a seamless user experience by providing single sign-on to all the web and mobile applications users need to access. - Okta Verify: Okta Verify is Okta’s native desktop and mobile application that can be used for mobile client-based MFA authentication. Okta Verify supports the following authentication mechanisms against a customers’ organization: Time-based One-time Password (TOTP), Okta Push Challenge-Response, and Okta FastPass (signed once challenge) - Okta FastPass - NIST 800-63B AAL2/AAL3 authenticator
OneStream Software
OneStream Cloud - High

Authorizations

16

Reuse

15

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
OneStream is a Corporate Performance Management (CPM) platform designed to support financial consolidation, reporting, planning, budgeting, and forecasting. Delivered as a SaaS offering, the OneStream Government Community Cloud is hosted via Microsoft Azure Government and tailored to meet the needs of federal, state, local, and tribal governments as well as research institutions and government contractors. The platform is built on a fault-tolerant, 64-bit architecture, ensuring high availability and scalability through multiple web and application servers. The OneStream App for Windows is deployed using Microsoft ClickOnce Infrastructure or manual installation via an installation package provided by OneStream (OneStream Desktop). OneStream integrates with Microsoft Office through an Excel add-in, allowing users to interact with data and workflows directly within spreadsheets. The platform also supports data integration from multiple ERP and financial systems, enabling streamlined financial reporting and analysis. OneStream also offers customers the option to extend their application to address frequently faced business challenges through pre-packaged CPM solutions via the OneStream Solution Exchange. Customers who leverage Solution Exchange to install applications developed by OneStream or a third party are responsible for determining if the solution meets customer requirements prior to installation.
OnSolve LLC
OnSolve Platform for Critical Event Management

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The OnSolve Platform for Critical Event Management is a comprehensive software designed to help agencies in effectively managing and responding to critical events. It offers a suite of capabilities that enable timely communication, real-time monitoring and streamlined coordination to enhance overall situational awareness and response efficiency. With OnSolve, you can analyze historical physical threats and trends, leverage real-time AI-powered risk intelligence, communicate with personnel quickly and activate response teams. The Platform strengthens your agency’s ability to identify adverse events, analyze risks and respond throughout the entire resiliency lifecycle. You have the expertise to protect your agency’s mission. With OnSolve you can protect your people and operations with the OnSolve Platform to: - Gain actionable intelligence gathered by filtering through massive amounts of event data to identify a crisis and know how it will impact your mission, operations and assets. - Enable teams with AI-powered technology to manage critical events and reduce risk faster and more reliably than ever before. - Achieve proactive efficiency through automation to allow response teams to focus on outcomes, rather than manually sorting through vast quantities of data. - Analyze historical physical threat data around specific locations to make more informed, risk-based decisions.
Oracle
Oracle Guided Learning (OGL)

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
Oracle Guided Learning (OGL) is Oracle’s own best-in-class Digital Adoption Platform (DAP) helping customers adopt and adapt continually as their application, processes and policies change. Guided Learning enables learning, change and business process teams to digitize their learning and support assets, deliver these to users through in-application automation and provides data on application, module and user consumption to assist with business improvement and innovation. Guided Learning enables organizations to create learning materials using AI and automation features and display them in their application and webpage seamlessly without impacting the user experience. Guided Learning enables organizations to communicate change seamlessly with in-app messages, process guides, personalize guidance to their users depending on who they are or what they’ve done, enforce behaviors with validation and contextual smart tips and measure adoption through user analytics, surveys and feedback. Customers who use Guided Learning experience a faster ROI, increased productivity and lower change management training and user support costs. Guided Learning can be integrated across any HTML/Web application, is hosted and secured on Oracle Cloud Infrastructure and is regularly updated with enhancements and new features every quarter. Customers who use Oracle Cloud Applications can benefit from a direct embedded experience minimizing setup, configuration and maintenance efforts. Guided Learning is available in the US Government Cloud (OC2 realm) and Federal Government Cloud (OC3 realms). A realm is a group of regions that share entities. The main difference between the realms is OC2 has FedRAMP High Joint Authorization Board Authorization whilst OC3 has DISA Impact Level 4/5 authorization. Customers in these two realms experience the identical system functionality from Oracle Guided Learning (OGL).
Palantir Technologies
Palantir Federal Cloud Service – Supporting Services (PFCS-SS)

Authorizations

2

Reuse

10

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
The PFCS-SS is a dedicated environment for the purpose of delivering best-of-breed commercial software to federal government customers as a secure cloud service at the FedRAMP High baseline. The software deployed to PFCS-SS is commercially available software configured to run on PFCS’ Kubernetes infrastructure and leverage PFCS’ management plane services. This includes: Grafana Federal Cloud - A fully managed, highly scalable observability platform, powered by Grafana Mimir for Prometheus metrics, Grafana Loki for logs, Grafana Tempo for traces, and Grafana, the de facto standard for data visualization. SpecterOps BloodHound Enterprise - See your organization from the attacker’s view, BloodHound Enterprise is an Attack Path Management solution that continuously maps and quantifies identity Attack Paths in Active Directory and Azure. Rizkly - a compliance program management platform that automates documentation, control evidence, monitoring, SSP, OSCAL and audit success so organizations can achieve and sustain FedRAMP, 800-53 and CMMC compliance with confidence. Manifest Cyber - provides software supply chain security, generating and ingesting SBOMs and AIBOMs, monitoring vulnerability databases like NVD and OSV, contextualizing with EPSS and KEV exploitability databases, supporting compliance with regulations such as Executive Order 14028 and the EU's Cyber Resilience Act, and aiding in copyleft-licensed software identification and third-party risk management. Hyperscience Hypercell - an AI platform with a proprietary model-based architecture that reads and understands all forms of content with 99% accuracy and 98.5% automation, scaling across the enterprise while ensuring auditability, governance, and security using private enterprise data. TRM Labs - provides blockchain intelligence to combat crypto-facilitated crime and support agency compliance, enabling investigation, monitoring, and detection of fraud by tracing cryptocurrency transactions across 30 blockchains and over 70 million digital assets in a unified graph. Windsurf - provides a suite of AI coding tools to accelerate developer productivity, including the Windsurf Plugins for popular IDEs like VSCode, JetBrains IDEs, and Eclipse as well as its own A-native IDE, the Windsurf Editor. Windsurf leverages state-of-the-art AI models and advanced context-awareness capabilities to deliver tools like fast autocomplete, codebase-aware Chat, and agentic coding capabilities. Enterprise developer teams rely on Windsurf to increase developer velocity, reduce onboarding times, and reduce tech debt. Windsurf was previously known as Codeium.
Palo Alto Networks, Inc.
GCS-HIGH

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
Strata: ● Prisma Access - a Secure Access Service Edge (SASE) that provides scalable, cloud-delivered networking and security to branch offices and remote users. With Prisma Access, agencies are able to rapidly enable consistent, secure connectivity for remote locations and employees. ● Prisma SD-WAN - a product that provides deep application visibility, with Layer 7 intelligence for network policy creation and traffic engineering. It automates operations and problem avoidance using machine learning and data science methodologies. Prisma SD-WAN enables branch services such as networking and security to be delivered from the cloud, simplifying WAN management. ● Cloud Manager for Prisma Access - a cloud delivered solution used by customers to manage Prisma Access from Palo Alto Networks’ Hub. Fawkes allows customers to quickly onboard branches and mobile users through an intuitive and function oriented user experience. Fawkes also provides configuration management of Prisma Access’ security policies. ● Cortex Data Lake (CDL) - collects, normalizes, and integrates data from Palo Alto Networks products with public cloud scale. ● WildFire - an analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis and innovative machine learning techniques to detect and prevent even the most evasive threats. It is a subscription service that works with the Palo Alto Networks Next Generation Firewalls (including VM-Series and CN-Series), Prisma Access, Prisma Cloud, Cortex XSIAM, and Cortex XDR. ● SaaS Security (Inline, SSPM) - is an integrated CASB (Cloud Access Security Broker) solution that helps Security teams meet the challenges of protecting the growing availability of sanctioned and unsanctioned SaaS applications and maintaining compliance consistently in the cloud while stopping threats to sensitive information, users and resources. SaaS Security Inline helps discover and manage risks posed by unsanctioned SaaS applications while SaaS Security Posture Management (SSPM) helps detect and remediate misconfigured security settings in sanctioned SaaS applications through continuous monitoring. ● Inline DLP - serves as a data security service integrated with various Palo Alto Networks services (called channels) such as SaaS Security, Prisma Access, Prisma Cloud, and the Next Generation Firewall platform to provide data security at these various enforcement points. These channels send files to the DLP service via APIs, where DLP will scan the file, perform analysis to detect sensitive data in violation of customer policies in the file, and return this verdict and other data back to the channel. The channel then uses this information to take remedial action in order to protect sensitive data. ● ACE - a generic platform that enables the firewall or Panorama to download App-IDs from the cloud for applications that do not have specific predefined App-IDs from the Palo Alto Networks content releases. ● CIE - Identity-based security controls are a foundational requirement to achieve Zero Trust. Palo Alto Networks Cloud Identity Engine is an entirely new cloud-based architecture for identity-based security that can consistently authenticate and authorize your users, regardless of location and where user identity stores live - on-premises, in the cloud, or hybrid. As a result, security teams can effortlessly allow all users access to applications and data everywhere and quickly move toward a Zero Trust security posture. ● MSP for Prisma SASE - a set of two services (pa-passthru-api-service and pa-custom-api-service) that provide APIs to support the following functionality: Aggregate application, application usage, threats and URL metrics across tenants in a tenant hierarchy Constrain the list of tenants being aggregated to the list of tenants that are authorized for the user in question ● App Services (Hub, API Gateway, Visualization & Reporting, Prisma Access Insights) ○ API Gateway supports unified access to the open APIs of PANW SASE applications. Currently, API Gateway is used by Cloud Management Prisma Access, SD-WAN, Cortex Data Lake (CDL), and Prisma Access Insights customers. Working in conjunction with PANW Global IdP (Identity Provider), which provides authentication services, API Gateway provides authorization services for RESTful API and routing those APIs to multiple applications and regions. ○ Prisma Access Insights is a comprehensive platform for global visibility and monitoring for the Prisma Access service. It continuously monitors the health and performance of your Prisma Access environment with Insights in the Prisma Access app. ○ Visualization & Reporting is the security visualization and reporting product for network security use cases. It provides dashboards to end users to monitor and understand the security of their networks and how different security subscriptions from Palo Alto Networks are performing. Cortex: ● Cortex XDR - a cloud-based service providing a prevention, detection and response platform that integrates network, endpoint, and cloud data to stop sophisticated attacks. Cortex XDR leverages logs, alerts, and information from Palo Alto Networks and third-party security products. It also enforces security policies on endpoints, preventing malware and data loss. Cortex XDR correlates security alerts and network logs with the endpoint processes that generated the alerts, allowing customers to investigate security alerts, as well as search for and remotely respond to threats. ● Cortex Xpanse - an active attack surface management solution that helps your organization discover, understand and respond to unknown risks in all internet-connected systems and services. Xpanse scans the entire internet automatically and continuously, discovering and indexing previously unknown risks, using supervised ML models to continuously map your attack surface and prioritize remediation efforts, while reducing MTTR with the help of built-in automated playbooks. ● Cortex XSIAM - a cloud-delivered, integrated SOC platform that unifies key functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, and SIEM, consolidating multiple products into a single, integrated platform. XSIAM delivers an intelligent data foundation by integrating telemetry from any source, providing unified security operations across any hybrid IT architecture. ● Cortex XSOAR - a comprehensive security orchestration, automation, and response (SOAR) platform that unifies case management, automation, real-time collaboration, and threat intelligence management to serve security teams across the incident lifecycle. ● Cortex Cloud - a unified security platform that enhances application security, cloud posture management and runtime protection. It integrates AppSec, identity, data, cloud infrastructure, and workload security while providing a code-to-cloud-to-runtime-to-SOC approach. With a strong shift-left strategy, it enables proactive remediation using both in-house and third-party tools. The Cloud Detection and Response (CDR) capabilities leverage multiple data sources to deliver real-time threat detection, protection and automated response. (Authorized as of May 2025, please reach out to sales for availability) Prisma Cloud Enterprise (SaaS): ● Prisma Cloud - a cloud-native security platform that consistently provides comprehensive visibility into misconfiguration and over-permissive roles, with threat detection and compliance assurance across multi-cloud environments. ○ CSPM ○ Agentless Workload Security ○ CIEM ○ API Visibility ○ Secret Security ○ SCA ○ IaC Security ● Prisma Cloud Compute (Delivered via Prisma Cloud) - a cloud-native platform that delivers cloud workload protection. Prisma Cloud Compute provides holistic protection across hosts, containers, and serverless deployments in any cloud, throughout the software lifecycle. Prisma Cloud Compute protects all workloads regardless of their underlying compute technology or the cloud in which they run. In addition, it provides Web Application and API Security (WAAS) for any cloud native architecture. ○ Cloud Workload Protection ○ Web Application API Security
Palo Alto Networks, Inc.
Palo Alto Networks Government Cloud Services

Authorizations

27

Reuse

91

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Strata Network Security Platform Secure users, apps, and data anywhere— on-premises, in the cloud, or hybrid. Get complete Zero Trust network security to see and secure everything from your headquarters to branch offices and data centers, as well as your mobile workforce. Prisma Access - a Secure Access Service Edge (SASE) that provides scalable, cloud-delivered networking and security to branch offices and remote users. With Prisma Access, agencies are able to rapidly enable consistent, secure connectivity for remote locations and employees. ZTNA Connector - The Zero Trust Network Access (ZTNA) Connector lets you connect Prisma Access to your organization's private apps simply and securely. ZTNA Connector provides mobile users and users at branch locations access to your private apps using an automated secure tunnel. Because the ZTNA Connector sets up the tunnels automatically, you don't have to manually set up IPSec tunnels and routing to the data center or headquarters locations, public cloud locations, and partner networks where your private apps are located. (Authorized as of February 2025, please reach out to sales for availability) Colo Connect - Colo-Connect builds on the Colo-based performance hub concept, offering high-bandwidth (up to 20 Gbps) private connections along with seamless Layer 2/3 connectivity to Prisma Access from existing performance hubs. (Authorized as of February 2025, please reach out to sales for availability) Traffic Replication - We partnered with Google Cloud Platform (GCP) to enable Google Cloud Packet Mirroring outside the Prisma Access security processing node so it wouldn’t interfere with the security inspection efficacy and overall performance of Prisma Access.Google Cloud Packet Mirroring clones the traffic and delivers a line-rate performance with zero impact on current operations. As with any GCP service, traffic cloning enables Prisma Access Traffic Replication to elastically manage the scale of traffic volume for any of the largest organizations. (Authorized as of February 2025, please reach out to sales for availability) 5g SASE - Prisma SASE 5G extends comprehensive zero-trust security to enterprise 5G deployments. Prisma SASE 5G feature integrates zero-trust security with 5G networks, enabling service providers to offer comprehensive SASE services for 5G-connected devices without the complexity of agents or inline hardware. (Authorized as of February 2025, please reach out to sales for availability) Explicit Proxy - Prisma Access provides a complete cloud Secure Web Gateway (SWG) capability, including an Explicit Proxy connection method based in the cloud. If your organization’s existing network already uses explicit proxy and deploys PAC files on your client endpoints, you can smoothly migrate from legacy proxy-based SWG solutions to Prisma Access to secure mobile users’ outbound internet traffic. You can also use an Explicit Proxy if you need to use a proxy for compliance purposes. (Authorized as of February 2025, please reach out to sales for availability) Prisma SD-WAN - a product that provides deep application visibility, with Layer 7 intelligence for network policy creation and traffic engineering. It automates operations and problem avoidance using machine learning and data science methodologies. Prisma SD-WAN enables branch services such as networking and security to be delivered from the cloud, simplifying WAN management. Strata Cloud Manager (SCM) for Prisma Access - a cloud delivered solution used by customers to manage Prisma Access from Palo Alto Networks’ Hub. Strata Cloud Manager allows customers to quickly onboard branches and mobile users through an intuitive and function oriented user experience. Strata Cloud Manager also provides configuration management of Prisma Access’ security policies. (Authorized as of February 2025, please reach out to sales for availability) Cloud Next-Generation Firewall (CNGFW) - Cloud NGFW is Palo Alto Networks ML-powered Next-Generation Firewall (NGFW) capability delivered as a fully managed cloud-native service by Palo Alto Networks on the Amazon Web Services (AWS) and Azure platforms. This deployment model combines the power of the Palo Alto NGFW with the ease of use. The Cloud NGFW service provides advanced application visibility and access control using Palo Alto Networks’ App-ID and URL filtering technologies. It provides threat prevention and detection through cloud-delivered security services and threat prevention signatures. (Authorized as of February 2025, please reach out to sales for availability) AIOps - AIOps harnesses big data from operational appliances and has the unique ability to detect and respond to issues instantaneously. Using the power of ML, AIOps strategizes using the various forms of data it compiles to yield automated insights that work to refine and iterate continually. AIOps seeks to address a quickly evolving IT landscape using the convenience of machine learning, automation and big data. (Authorized as of February 2025, please reach out to sales for availability) Remote Browser Isolation (RBI) - Fully isolate zero-day web attacks far away from local devices and browsers. Deliver superior browser isolation without sacrificing web performance with Palo Alto Network’s RBI, which combines the latest isolation technologies with proprietary technologies and creates a no-code execution channel between users and web content. (Authorized as of February 2025, please reach out to sales for availability) Strata Logging Service (SLS, formerly CDL) - collects, normalizes, and integrates data from Palo Alto Networks products with public cloud scale. WildFire - an analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis and innovative machine learning techniques to detect and prevent even the most evasive threats. It is a subscription service that works with the Palo Alto Networks Next Generation Firewalls (including VM-Series and CN-Series), Prisma Access, Prisma Cloud, Cortex XSIAM, and Cortex XDR. SaaS Security (API, Inline, SSPM) - is an integrated CASB (Cloud Access Security Broker) solution that helps Security teams meet the challenges of protecting the growing availability of sanctioned and unsanctioned SaaS applications and maintaining compliance consistently in the cloud while stopping threats to sensitive information, users and resources. SaaS Security Inline helps discover and manage risks posed by unsanctioned SaaS applications while SaaS Security Posture Management (SSPM) helps detect and remediate misconfigured security settings in sanctioned SaaS applications through continuous monitoring. Inline DLP - serves as a data security service integrated with various Palo Alto Networks services (called channels) such as SaaS Security, Prisma Access, Prisma Cloud, and the Next Generation Firewall platform to provide data security at these various enforcement points. These channels send files to the DLP service via APIs, where DLP will scan the file, perform analysis to detect sensitive data in violation of customer policies in the file, and return this verdict and other data back to the channel. The channel then uses this information to take remedial action in order to protect sensitive data. Email DLP - Enterprise DLP prevents exfiltration of emails containing sensitive information with AI/ML powered data detections. For example, Enterprise DLP can prevent exfiltration of sensitive data over an outbound email sent from a salesperson within your organization to their personal email. (Authorized as of February 2025, please reach out to sales for availability) ACE - a generic platform that enables the firewall or Panorama to download App-IDs from the cloud for applications that do not have specific predefined App-IDs from the Palo Alto Networks content releases. CIE - Identity-based security controls are a foundational requirement to achieve Zero Trust. Palo Alto Networks Cloud Identity Engine is an entirely new cloud-based architecture for identity-based security that can consistently authenticate and authorize your users, regardless of location and where user identity stores live - on-premises, in the cloud, or hybrid. As a result, security teams can effortlessly allow all users access to applications and data everywhere and quickly move toward a Zero Trust security posture. IoT Security - Protects your IoT attack surface with the industry’s smartest IoT Security solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platform. IoT Edge Cloud now included. MSP for Prisma SASE - a set of two services (pa-passthru-api-service and pa-custom-api-service) that provide APIs to support the following functionality: Aggregate application, application usage, threats and URL metrics across tenants in a tenant hierarchy Constrain the list of tenants being aggregated to the list of tenants that are authorized for the user in question App Services (Hub, API Gateway, Visualization & Reporting, Prisma Access Insights) API Gateway supports unified access to the open APIs of PANW SASE applications. Currently, API Gateway is used by Cloud Management Prisma Access, SD-WAN, Cortex Data Lake (CDL), and Prisma Access Insights customers. Working in conjunction with PANW Global IdP (Identity Provider), which provides authentication services, API Gateway provides authorization services for RESTful API and routing those APIs to multiple applications and regions. Prisma Access Insights is a comprehensive platform for global visibility and monitoring for the Prisma Access service. It continuously monitors the health and performance of your Prisma Access environment with Insights in the Prisma Access app. Telemetry Data Ingestion from Prisma Access Firewalls Firewall Log Data Ingestion from Cortex Data Lake Data Analyzation and Processing Pipelines Data Presentation to User via Prisma Access UI Data retrieval via API service Visualization & Reporting is the security visualization and reporting product for network security use cases. It provides dashboards to end users to monitor and understand the security of their networks and how different security subscriptions from Palo Alto Networks are performing. Advanced Threat Prevention (ATP) - Advanced Threat Prevention Powered by Precision AI defends your network against both commodity threats—which are pervasive but not sophisticated—and targeted, advanced threats perpetuated by organized cyber adversaries. Advanced Threat Prevention includes comprehensive exploit, malware, and command-and-control protection, and Palo Alto Networks frequently publishes updates that equip the firewall with the very latest threat intelligence. (Authorized as of February 2025, please reach out to sales for availability) Prisma Access Browser (PAB) - The Prisma Access Secure Enterprise Browser (Prisma Access Browser) is a browser designed specifically for enterprise use and is fortified with security features to protect users and organizations against cyber threats like phishing, malware, eavesdropping, and data exfiltration. Prisma Access Browser is the only solution that secures both managed and unmanaged devices, through a natively integrated enterprise browser that extends protection to the devices by placing security in the browser. (Authorized as of February 2025, please reach out to sales for availability) Cortex Palo Alto Networks offers the industry’s most comprehensive product portfolio for security operations, empowering organizations and agencies with best-in-class detection, investigation, automation, and response capabilities. Cortex XDR - a cloud-based service providing a prevention, detection and response platform that integrates network, endpoint, and cloud data to stop sophisticated attacks. Cortex XDR leverages logs, alerts, and information from Palo Alto Networks and third-party security products. It also enforces security policies on endpoints, preventing malware and data loss. Cortex XDR correlates security alerts and network logs with the endpoint processes that generated the alerts, allowing customers to investigate security alerts, as well as search for and remotely respond to threats. Cortex Xpanse - an active attack surface management solution that helps your organization discover, understand and respond to unknown risks in all internet-connected systems and services. Xpanse scans the entire internet automatically and continuously, discovering and indexing previously unknown risks, using supervised ML models to continuously map your attack surface and prioritize remediation efforts, while reducing MTTR with the help of built-in automated playbooks. Cortex XSIAM - a cloud-delivered, integrated SOC platform that unifies key functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, and SIEM, consolidating multiple products into a single, integrated platform. XSIAM delivers an intelligent data foundation by integrating telemetry from any source, providing unified security operations across any hybrid IT architecture. Cortex XSOAR - a comprehensive security orchestration, automation, and response (SOAR) platform that unifies case management, automation, real-time collaboration, and threat intelligence management to serve security teams across the incident lifecycle. Cortex Cloud - a unified security platform that enhances application security, cloud posture management and runtime protection. It integrates AppSec, identity, data, cloud infrastructure, and workload security while providing a code-to-cloud-to-runtime-to-SOC approach. With a strong shift-left strategy, it enables proactive remediation using both in-house and third-party tools. The Cloud Detection and Response (CDR) capabilities leverage multiple data sources to deliver real-time threat detection, protection and automated response. (Authorized as of February 2025, please reach out to sales for availability) Prisma Cloud Enterprise (SaaS) We secure applications from code to cloud, enabling security and DevOps teams to collaborate effectively and accelerate secure cloud-native application development and deployment. Prisma Cloud - a cloud-native security platform that consistently provides comprehensive visibility into misconfiguration and over-permissive roles, with threat detection and compliance assurance across multi-cloud environments. CSPM Agentless Workload Security CIEM API Visibility Secret Security SCA IaC Security Prisma Cloud Compute (Delivered via Prisma Cloud) - a cloud-native platform that delivers cloud workload protection. Prisma Cloud Compute provides holistic protection across hosts, containers, and serverless deployments in any cloud, throughout the software lifecycle. Prisma Cloud Compute protects all workloads regardless of their underlying compute technology or the cloud in which they run. In addition, it provides Web Application and API Security (WAAS) for any cloud native architecture. Cloud Workload Protection Web Application API Security
Paperless Innovations, Inc.
Actus

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Paperless Innovations, with our Actus solution, has repositioned GPC utilization and funds management processes as a government-wide shared service under the auspices of Treasury Management available on the FM QSMO Marketplace. Actus is eligible for direct award under pre-competed terms on GSA MAS contract # 47QTCA24D002X utilizing SIN 518210FM (Financial Management) and 54151ECOM (Ecommerce). Our end-to-end (E2E) process optimizations are inclusive of requisitions, obligations, order and transaction processing, settlements, close-out of commitments, records management, and audit. Agencies benefit operationally by adopting FedRAMP secured Cloud-based Government Purchase Card (GPC) processes supporting accurate and timely close-outs of commitments in their preferred financial system. Paperless Innovations, Inc. is committed to enabling GPC spend under management to improve the efficiency and accuracy of government purchase card programs as a compliant financial instrument on par with all Treasury disbursements. Actus eliminates improper payments in the GPC Program utilizing secure, best of breed practices including RPA workflow automations, intelligent digital document authentication with data validation on required forms and attachments, providing financial accuracy and reliability with real-time status of funds, automated reconciliation, and inherent internal controls enforcement. Actus is currently in daily use by thousands of government cardholders and Approving Officials with implementations including end-to-end regulatory and compliance automation for Purchase Card Program Management, cardholders, and associated approvers, requestors, financial managers, and auditors. As directed in OMB Memorandum A-123, Appendix B, Risk Management Guidelines for Government Purchase Card Programs, Agencies should seek cloud automation solutions enabling GPC financial management, internal controls, and prevention of improper payments in avoidance of fraud, waste, and abuse. The OMB guidance is based on 3 pillars of operational excellence: Accountability, Compliance, and Transparency. - Accountability - Actus helps agencies paint a complete and total picture of each expense, eliminating guesswork, human error, and manual data entry tracking. Workflow automations ensure all Agency policies supporting separation of duties, improper payments reduction, and avoidance of split purchases are inherently enforced. - Compliance - Simplified, structured data is at the heart of compliance automation ensuring adherence to Agency policies and acquisition regulations. The Actus solution streamlines and automates oversight processes while maintaining rich transactional records for instant audit reporting. Actus furthers the regulatory mission of each agency with intelligent digital document processing using AI for records authentication, validation, retention, and disposal of purchase records presented as supporting documentation by cardholders. Adoption of Actus itself satisfies and supplements Federal paperless mandate compliance as well as DATA Act, IPERA, IPERIA, Public Law 115 The Evidence Act, M-19-16 Shared Services, A-11 Preparation, Submission, and Execution of the Budget, and more. - Transparency - Actus enables real time visibility over the status of funds in Government Purchase Card Programs, enabling Agencies to maximize GPC purchasing efficiency throughout the entire federal fiscal year. Actus presents role-specific dashboards enabling full visualization of all workflow processes, transactional data, and documents on a need-to-know, right-to-know basis. Audit automation occurs with every upload of bank transactions without requiring manual packet creation by cardholders and enables inspection of every detail of each purchase made within a selected time frame in a unified, streamlined format. Actus elevates GPC financial management to the level of any other public funds obligation, supports accounting with financial system integration, enables informed budgeting with detailed item level transaction data, configures and customizes instant reporting, and unlocks actionable data for analytics, records examination, and transactions investigation. Actus increases Agency confidence to maximize refunds with daily bill pay and enables the use of purchase cards up through $25,000 in coordination with blanket purchases and standing orders. P-Card Compliance Automation Features: - Custom Approval Workflows - Financial Data Capture - Full Lifecycle Spend Tracking - Cloud Storage of Reconciliation Packets - Dashboard Visualization of data & documents - Automated Reconciliation Statements - Structured Item Level (Level 3) Data - Merchant Class Code Tracking - Suspicious Pattern & Activity Detection - Alerts for Each Stage of Transaction - Transactional Keyword Search - Bank Statement Transaction Matching - Auto-Matched Transactions - Travel Expense Tracking and Management - Daily, Weekly, or Monthly Reconciliation - PIV/CAC authentication - Simplified documentation in support of G-Invoicing - Live Agent Contact Center and Customer Services - Actus web app runs on all modern browsers
Paramify
Paramify Cloud

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Ready
The Paramify Cloud (Paramify) is a software platform that automates risk management processes—including compliance planning, solution implementation, gap assessments, and documentation—for cloud service providers, government agencies, and members of the Defense Industrial Base (DIB). Paramify supports adherence to control catalog requirements including NIST 800-53 (FedRAMP, FISMA, GovRAMP, TX-RAMP), NIST 800-171 (CMMC), and standards such as SOC 2, HIPAA, and ISO 27001, with support for additional catalogs and profiles continually expanding. SSP and ATO Package Management ∙ Fast and Easy Setup: Upload previous SSPs or use the intake process to identify your system’s elements and security capabilities. Paramify then generates a roadmap to support your risk management and compliance objectives. ∙ Streamlined Control Implementation & Optimization: Visualize progress and manage security program capabilities through a unified dashboard that tracks system elements and responsibilities. ∙ ATO Package Generation: Produce accurate SSP documentation in both digital (OSCAL) and human-readable formats, with flexible export options that support various file types, including but not limited to OSCAL, PDF, Word, and Excel. ∙ Incorporate Changes Efficiently: As your risk management approach evolves, maintaining stack profiles in Paramify reduces manual update errors across documentation. Paramify automatically synchronizes updates to your SSP, CRM, CIS, policies, procedures, and other records to support compliance with evolving data protection requirements. Continuous Monitoring and Issue Management ∙ Automated POA&M Documentation: Automatically manage and update POA&M documentation via a centralized task-priority view, eliminating the need to manage from multiple spreadsheets or scan files. ∙ Vulnerability Management with Duplicate Detection: Automatically close resolved vulnerabilities and employ duplicate detection to ensure accurate issue tracking. ∙ Automated Risk Adjustment: Apply risk adjustments across multiple issues automatically to support consistent prioritization of remediation efforts. ∙ Automated Inventory Reconciliation: Configure and maintain inventory reconciliation rules to generate accurate workbooks automatically, without manual review of scan files—including those for ephemeral virtual hosts. Integration with Your Organization’s Processes ∙ Workflow Management: Integrate with issue management tools (e.g., Jira, ServiceNow, GitLab) to facilitate collaboration between DevOps and security teams for timely issue remediation. ∙ Evidence Management: Unified evidence approach that minimizes or eliminates duplicate collection efforts. ∙ API Integrations: Paramify’s open API supports custom integrations with system components to facilitate connectivity and interoperability. Available in SaaS and self-hosted implementations. 
Perceptyx
Perceptyx Insights Platform

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Perceptyx's online employee engagement survey technology is built to support four phases of service to Perceptyx clients, including a configuration module to support planning and survey set-up, data collection module, diagnostic reporting module and action planning module, each module runs on the Perceptyx proprietary web software platform. Using the Perceptyx real-time technology for each phase of a project, Perceptyx can create web applications specifically suited to the unique data collection and reporting needs of any organization. From creation to collection to interactive result reporting, the whole process is done in real-time and is hosted on the Perceptyx robust, secure network. Perceptyx technology supports performance improvement services for each client in the following phases: 1. Design, development, configuration, and testing. 2. Deploy, data collection, training, and monitoring. 3. Analysis, diagnosis, and final report configuration. 4. Report distribution, action planning, and executive presentations. Each phase of the project provides specific services for the client leveraged by the Perceptyx technology and facilitated by Project Managers. The services included as part of the Perceptyx Insights Platform include the following: 1. Ask Service - Point-in-time employee surveys to illuminate the employee experience 2. Sense Service - Lifecycle surveys and always-on listening to keep pace with your people 3. Dialogue Service - Crowdsourced insights to engage your people on the topics that matter most 4. Develop Service - Multi-rater feedback to improve manager effectiveness and build leaders
Pexip Inc.
Pexip Government Cloud (PGC)

Authorizations

3

Reuse

2

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Pexip Government Cloud is a SaaS-based video teleconferencing (VTC) solution for U.S. federal, state, and local government organizations. With Pexip, government customers can augment their existing on-premise VTC infrastructure with a subscription-based service model while retaining ownership of their specific endpoint dial plan and call control routing rules. By migrating to a SaaS or hybrid service model, government organizations maintain operational control of their endpoints and systems without incurring the long-term costs of developing and maintaining additional infrastructure. Pexip Government Cloud’s secure VTC platform brings the modernized meeting experience to the government user base in the following ways: • Microsoft-certified Cloud Video Interoperability (CVI) for Microsoft Teams – Helps agencies securely collaborate on Microsoft Teams in their hybrid workplace. With Pexip Government Cloud, employees can join Microsoft Teams calls from their existing standards-based meeting room video systems as well as enterprise-class standards-based soft clients. • Bi-Directional SIP Dialing for Windows-Based Microsoft Teams Rooms (MTRw) – Expanding on Pexip’s CVI capability, this feature enables SIP-based video conferencing endpoints to call directly into Microsoft Teams Rooms (MTR) running on Windows, and vice versa. This allows government agencies to integrate MTRw into their broader VTC ecosystem, ensuring seamless cross-platform collaboration. • Google Meet Interoperability – Enables agencies to seamlessly connect standards-based VTC systems directly into Google Meet meetings using native SIP dialing. This allows government users to leverage existing room-based video conferencing hardware to join Google Meet sessions without additional plugins or workarounds, ensuring a secure, seamless, and familiar meeting experience. • Standards-Based Virtual Meeting Rooms (VMRs) – Supports customer VTC endpoint devices and clients, featuring Pexip’s native CMVP-validated FIPS 140-3 encryption suite, ensuring secure and compliant video communications. • Self-Hosted Platform Integration – Enables hybrid VTC deployments where Pexip Government Cloud extends the customer’s existing self-hosted platform. This integration allows VTC systems to seamlessly connect with enterprise third-party applications, support calendaring integrations for simplified end-user join flows, and align with global policy frameworks such as Zero Trust Architecture (ZTA) and Secure Access Service Edge (SASE).
Pitney Bowes
SendPro 360

Authorizations

10

Reuse

9

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Pitney Bowes SendPro 360 Sending, Receiving, and Locker Management Solution Pitney Bowes SendPro 360 is a comprehensive, cloud-based sending, receiving, locker management, and analytics solution that powers your mailroom operations for maximum efficiency and transparency. Multi-Carrier Shipping and Mailing SendPro 360 makes mailing and shipping quick and easy by empowering departments with the flexibility to send in the way that’s right for them. Users save time and money by printing stamps directly from the online interface and by accessing SendPro 360 multi-carrier shipping functionality to compare rates and print labels across major carriers. The ability to track spend and activity by account or department, facilitates project or departmental chargebacks for accurate accounting. SendPro360 includes a dedicated certified and electronic return receipt (ERR) and registered mailing process with proof of delivery reporting. Also, qualified users can prepare ship requests for packages sent to the mailroom for processing. Package Receiving, Tracking and Delivery The SendPro 360 platform automates the process of receiving, tracking, and delivering incoming packages and mail through a simple scan of a barcode. Manually logging items instantly becomes a process of the past. It can configure delivery routes, provide lists of packages, and has the ability to manage assets. Package tracking notifications via email and SMS as well as SLA management simplify and enhance the experience. -The SendPro 360 platform automates the process of receiving, tracking, and delivering incoming packages and mail through a simple scan of a barcode. Smart Locker Management Effectively manage the delivery process of packages, assets, and other important items moving across your organization with SendPro 360 Smart Locker Management capabilities. This software solution is the intelligence behind a physical smart locker and helps ensure safe, secure contactless delivery. It modernizes the pickup process by enabling convenient 24/7 self-service locker access and automates alerts notifying recipients they have an item for pickup while preserving chain-of-custody. Our Smart Locker Management Software allows users to remotely manage or troubleshoot smart lockers across a single site or multiple locations. Plus, it offers extensibility ensuring seamless expansion to additional workflows to meet evolving needs. -These solutions will require customer-provided hardware and will require assessment, authorization, and continuous monitoring of such capabilities by using agencies. Pitney Bowes has the technical expertise to help determine which hardware best meets agency needs and to assist with agency authorization and approval processes. Analytics From smaller mailrooms to multi-location operations, SendPro 360 offers complete visibility into your receiving and sending operations. Dynamic views can be filtered by divisions, locations, cost accounts, and users, across any date range. View and manage postage and shipping spend, and gain insights to your receiving and locker metrics all the way through final delivery to ensure packages and mail are accounted for and delivered on time. Gauge performance, operator efficiency, and resource utilization to ensure service level agreement (SLA) metrics are being met. To locate a package, SendPro 360 provides end-to-end tracking of packages, locker activity, as well as shipping and mailing activity across your government agency.
PowerTrain Inc.
PowerTrain Government Learning Enclave - SaaS

Authorizations

17

Reuse

16

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The PowerTrain Government Learning Enclave is a secure cloud environment that hosts the PowerTrain Learning Ecosystem of Software-as-a-Service (SaaS) solutions, including the Callisto Learning Platform powered by Moodle™, Career Voyager Talent Management Platform, LMS-Express, SecureWiki, Drupal™ Secure Baseline for Government, Veracity LRS, and Rustici Content Controller. All applications offer multi-factor authentication and single sign-on options. The Callisto Learning Platform powered by Moodle™ is hardened and secured for government use to provide a comprehensive suite of learning delivery and management tools for enterprises large and small. Included in its approved baseline are the current Moodle™ long term release; Electronic Human Resource Integration (EHRI) data collection and reporting; integrated Authorization, Agreement, and Certification of Training Form (SF-182); Individual Development Plans (IDP); comprehensive registration management for live learning events with adjustable workflow, wait list management, and automated notifications; competency management; lesson plans; mandatory training compliance; configurable reports; and support for multiple tenants. The Career Voyager Talent Platform includes Career Mapping, Leadership Succession Planning, Candidate Review, and PowerSurvey. Career Mapping enables users to map a progressive career ladder of job opportunities within an organization, as well as view skills, abilities, competencies, recommended training, and developmental activities necessary to progress from one position to another; Leadership Succession Planning resources, assessments, tools, and reference materials to promote self-discovery, accelerate career advancement, and support leadership development; Candidate Review System supports talent acquisition efforts for fellowships, technical internships, and other multi-phase, interactive application processes; and PowerSurvey supports a variety of employee data collection and secure reporting efforts. LMS-Express is a powerful, lightweight learning management system designed for targeted asynchronous eLearning content delivery. SecureWiki is a hardened and secure version of MediaWiki™ and includes additional functionality to support the unique reporting requirements of government users. Our Drupal™ Secure Baseline for Government is a hardened and secure version of Drupal™ and includes a number of Drupal™ modules cleared for use in the baseline with the ability to extend functionality. Veracity LRS is a robust solution designed to capture, store, and return data about learning experiences in compliance with the Experience API (xAPI) specifications. It serves as a central repository for learning records, enabling detailed tracking and analysis of learner activities across the components of the PowerTrain Learning Ecosystem. With powerful analytics capabilities, the LRS allows organizations to provide a comprehensive view of learning outcomes and effectiveness, enabling educators to make informed decisions to enhance learning strategies and improve overall educational outcomes. Rustici Content Controller ensures uniform access to training materials such as SCORM 1.2, SCORM 2004 (2nd, 3rd, & 4th editions), AICC, xAPI, cmi5, MP3, MP4, and PDF, enhancing the interoperability and efficiency of content delivery without the need for duplicating course files. This capability not only streamlines the management of eLearning content but also supports seamless, secure, and scalable training deployments. Event Registration System supports online registration for live and virtual events. Moodle™ is a registered trademark of Moodle Pty Ltd or its related affiliates. Drupal™ is a registered trademark of Dries Buytaert. MediaWiki™ is a registered trademark of the Wikimedia Foundation.
Profit Apps Inc
Profit.co

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
The Profit.co is delivered as a SaaS offering using a multi-tenant cloud computing environment. It is available to the public, federal, state and local governments., as well as federal contractors Profit.co provides federal agencies with a secure and scalable solution to efficiently execute mission-critical strategic initiatives. Profit.co, a Software-as-a-Service (SaaS) platform, provides an integrated approach to strategy planning, OKR management, performance management, and project & task management, ensuring structured goal execution across distributed teams. The platform offers AI-powered analytics and real-time reporting, enhancing decision-making while ensuring compliance with federal IT security mandates. Profit.co enables agencies to create strategic initiative roadmaps, allowing them to define, visualize, and communicate mission-critical objectives effectively. The OKR management capability facilitates structured goal-setting and progress tracking, aligning agency priorities with national objectives. Profit.co ensures task and project oversight, enabling seamless execution of agency initiatives through real-time task alignment and monitoring. The platform also enhances employee performance management by providing structured evaluation frameworks, competency tracking, and workforce development support. Additionally, it fosters workforce engagement and accountability, ensuring collaboration across distributed teams. The platform is designed to integrate with 100+ applications, supporting seamless interoperability within federal IT infrastructures. Profit.co adheres to stringent security and compliance requirements to maintain data security, access control, and operational resilience.
Project Hosts Inc.
GSS One - AWS

Authorizations

0

Reuse

0

Service Model
PaaS
Impact Level
High
Status
FedRAMP In Process
The Project Hosts “GSS One-AWS” PaaS is a Government Only general support system deployed on AWS GovCloud. The GSS One-AWS is composed of systems and services that manage access control, authentication, auditing, monitoring, scanning, patching, configuration management, malware prevention, intrusion prevention, incident response, backup, and disaster recovery for each Application deployed on the GSS One-AWS. All of the systems that make up the GSS1-AWS and the Project Hosts engineers that administer the systems can be leveraged by any customers to meet the security requirements for their systems at FedRAMP High or Il4 Impact levels. There are three main SaaS components customers deployed on the GSS One-AWS system can leverage and are provided by default: - GSS One Portal/Admin Page: The GSS One Portal is a page where customer users and PH support can login to create and manage non privileged users for their organization including revoking access. It also provides them with the ability to upload software binaries to the test environment and screenshots and other supporting artifacts required for support tickets. The GSS One Admin page is accessible only to PH engineers and is used for managing inventory, privileged user maintenance windows and account creation and JIT access and has dashboards for PH engineers to provide a centralized view of each environment. - GSS One Ticketing System: Project Hosts has configured a customer facing support portal for creating and managing support tickets. This allows customers to view all of their relevant tickets, create tickets, upload screenshots and communicate with PH staff through a secure channel. - GSS One Console: GSS One Console is a one stop shop for agency and CSP customers to view relevant information for their system and aid in implementing and maintaining ConMon requirements including a document repo for SSP and appendixes, POA&Ms and vulnerability scans, allows them to manage training, track incidents, track vulnerabilities and other corrective actions, track red teaming activities, view availability monitoring alerts, change control ticketing, link controls to artifacts and evidence to speed up ATO times, centralized up to date contact lists. There are two main types of customers who use the GSS One-AWS: (i) Independent Software Vendors (ISVs) deploying multitenant SaaS applications and (ii) Federal, state or local agencies deploying dedicated applications just for their agency or organization (not multitenant). For both types of customers, their applications are deployed on customer-dedicated virtual servers (or FedRAMP authorized AWS PaaS services) inside customer-dedicated subnets. VPC Firewall access controls ensure that each customer's subnet is completely isolated from and has no access to any other customer's subnet. For GSS One-AWS customers, Project Hosts also provides services that are over and above the PaaS offering described in the GSS One- AWS FedRAMP package and are provided by Project Hosts as a managed service provider for those workloads leveraging the FedRAMP authorized GSS1-AWS tools and services to provide that functionality. Namely, Project Hosts deploys, secures, manages, and provides continuous monitoring for applications that are compatible with the GSS One-AWS architecture, authentication, operating system, database, and access requirements. Many ISVs do not have the staff or knowledge to fully deploy a cloud workload, write security documentation, refactor the application to meet compliance requirements and work with agencies and the PMO to obtain a FedRAMP authorization which leads to wasted time, money, and resources both for government sponsors and the ISVs. Project Hosts works with these software vendors and agencies to quickly deploy the application to the cloud and build out and manage the system for the customers which includes acting as the security and compliance team for the application. In addition, Project Hosts works with these software vendors to document security controls, perform compliance reviews, perform disaster recovery, and advises the ISV on how refactor the application to meet FedRAMP requirements. Project Hosts security compliance team also performs monthly vulnerability scanning include ACAS scans, dynamic web app scans and container image scans and documents and tracks these findings in accordance with continuous monitoring requirements. Among other things the Project Hosts team also performs (for each customer deployed within the GSS1-AWS) monthly baseline compliance scanning, configuration management, patch and vulnerability management, malware prevention and intrusion prevention using HBSS software, incident response reporting, analysis, eradication, and recovery as well as all SOC review and analysis of audit logs and responding/investigating alerts for suspicious activity. Project Hosts deploys systems to monitor workloads for availability and performance issues and proactively take action to ensure maximum uptime and availability. Performing these functions on the ISVs’ behalf allows the software vendors to focus on their core business model in delivering a secure, highly functional application to the agency. For ISV customers, Project Hosts also creates their SaaS-level FedRAMP or DoD package, helps them throughout the agency authorization process, and manages their 3PAO annual assessments. For agency customers or DoD Mission partners, Project Hosts assists them in the creation of their own SSP, manages annual 3PAO scanning and penetration testing of their dedicated applications, and provides a monthly application-level POA&M. Following is a partial list of applications for which Project Hosts is providing these services over and above the GSS One-AWS platform: - San Luis Aviation, Inc. (ESChat) - FutureFeed (FutureFeed) - H20.ai (H20 AI Cloud) - JAMIS (JAMIS Prime) - Telcloud (Telcloud) - Caveonix (Caveonix SaaS Platform) If an agency would like to use one of these Applications or bring in another GSS One-AWS compatible Application, Project Hosts will provide application-level artifacts that will help the agency or mission partner assess the risk of deploying that application in the GSS1-AWS as well as any other documentation or evidence required in order to grant an Authority to Operate (ATO).
Project Hosts Inc.
GSS One - Azure

Authorizations

0

Reuse

0

Service Model
PaaS
Impact Level
High
Status
FedRAMP In Process
GSS One-Azure (GSS1-AZ) is delivered as a hybrid offering using a multi-tenant PaaS cloud computing environment. It is available to both private and multitenant customers deployed per the agencies preference and agreements and can be utilized by the following audiences: the public, federal, DoD, state, local, and tribal governments, as well as research institutions, federal contractors, government contractors etc.)]. The Project Hosts “GSS1-AZ” PaaS is a Government Only General Support System (GSS) deployed on Azure Government. GSS1-AZ is composed of systems and services that manage access control, authentication, auditing, monitoring, scanning, patching, configuration management, malware prevention, intrusion prevention, incident response, backup, and disaster recovery for each application leveraging the GSS1-AZ. All of the systems that make up the GSS1-AZ and the Project Hosts engineers that administer the systems can be leveraged by any customers to meet the security requirements for their systems. There are three main SaaS components customers deployed on the GSS One-Azure system can leverage: - GSS One Portal/Admin Page: The GSS One Portal is a page where customer users and PH support can login to create and manage non privileged users for their organization including revoking access. It also provides them with the ability to upload software binaries to the test environment and screenshots and other supporting artifacts required for support tickets. The GSS One Admin page is accessible only to PH engineers and is used for managing inventory, privileged user maintenance windows and account creation and JIT access and has dashboards for PH engineers to provide a centralized view of each environment. - GSS One Console: GSS One- Console is a one stop shop for agency and CSP customers to view relevant information for their system and aid in implementing and maintaining ConMon requirements including a document repo for SSP and appendixes, POA&Ms and vulnerability scans, allows them to manage training, track incidents, track vulnerabilities and other corrective actions, track red teaming activities, view availability monitoring alerts, change control ticketing, link controls to artifacts and evidence to speed up ATO times, centralized up to date contact lists. - GSS One Ticketing System: Project Hosts has configured a customer-facing support portal for creating and managing support tickets. This allows customers to view all of their relevant tickets, create tickets, upload screenshots and communicate with PH staff through a secure channel. There are two main types of customers who use the GSS1-AZ: (i) Independent Software Vendors (ISVs) deploying multitenant SaaS applications and (ii) Federal, state, or local agencies deploying dedicated applications just for their agency or organization (not multitenant). For both types of customers, their applications are deployed on customer-dedicated virtual servers (or FedRAMP-authorized Azure PaaS services) inside customer-dedicated subnets. Network Security Group firewall access controls ensure that each customer's systems are completely isolated from and has no access to any other customer's subnet. For GSS1-AZ customers, Project Hosts also provides services that are over and above the PaaS offering described in the GSS1-AZ FedRAMP package. Namely, Project Hosts deploys, secures, manages, and provides continuous monitoring for applications that are compatible with the GSS1-AZ architecture, authentication, operating system, database, and access requirements. Many CSPs do not have the staff or knowledge to fully deploy a cloud workload, write security documentation, refactor the application to meet compliance requirements and work with agencies and the PMO to obtain a FedRAMP authorization which leads to wasted time, money, and resources both for government sponsors and the ISVs. Project Hosts works with these software vendors and agencies to quickly deploy the application to the cloud and build out and manage the system for the customers which includes acting as the security and compliance team for the application. In addition, Project Hosts works with these software vendors to document security controls, perform compliance reviews, perform disaster recovery, and advises the ISV on how refactor the application to meet FedRAMP requirements. Project Hosts security compliance team also performs monthly vulnerability scanning include ACAS scans, dynamic web app scans and container image scans and documents and tracks these findings in accordance with continuous monitoring requirements. Among other things the Project Hosts team also performs (for each customer deployed within the GSS1-AZ) monthly baseline compliance scanning, configuration management, patch and vulnerability management, malware prevention and intrusion prevention using HBSS software, incident response reporting, analysis, eradication, and recovery as well as all SOC review and analysis of audit logs and responding/investigating alerts for suspicious activity. Project Hosts deploys systems to monitor workloads for availability and performance issues and proactively take action to ensure maximum uptime and availability. Performing these functions on the ISVs’ behalf allows the software vendors to focus on their core business model in delivering a secure, highly functional application to the agency. For CSP customers, Project Hosts also creates their SaaS-level FedRAMP package, helps them throughout the agency authorization process, and manages their 3PAO annual assessments. For agency customers, Project Hosts assists them in the creation of their own SSP, manages annual 3PAO scanning and penetration testing of their dedicated applications, and provides a monthly application-level POA&M. Following is a partial list of applications for which Project Hosts is providing these services over and above the GSS One-Azure platform: 1E (1E Tachyon Platform) Archive360 (Archive2Azure) AvePoint (AvePoint Online Services for US Government) Aztec (Aztec Learning System) Bingli (Bingli) Blue Prism (Blue Prism) BrightWork (BrightWork SharePoint-based Project Management) Cardinal Engineering (ShockIQ) C3 AI (C3 AI Suite) Checkmarx (CxSAST Source Code Scanner) CTERA Networks (CTERA Edge Filer, CTERA Drive, CTERA Portal) Conga (Contract Lifecycle Management, X-Author and Conga Approvals) Creative Veteran Productions (Fed ILMS) Davra (WebEx Legislate, Internet of Things) Distributed Solutions Inc. (AEON) Drupal (Drupal CMS) Ephesoft (Transact) Feith Systems and Software Inc. (RMA iQ™) FlowVU (FlowVU Collaboration) Gimmal (Gimmal Records Management) Idea Entity (RhyBus Platform) Image Trend (Elite, Report Writer (RW), Continuum (CT), Licensure, Slate) Invoke (UiPath Orchestrator and RPA) Ivanti (MDM, Access, Neurons) Kofax (Control Suite, Kofax TotalAgility, Kofax Robotics Process Automation) Lexmark (Managed Print Service, Lexmark Print Management) LMI (ATLAS by LMI) Librestream Technology (Onsight Now) Microsoft (Office, Dynamics, Power BI Server, Project Server, SharePoint, SSRS) NIBS/ OM Group Inc. (ProjNet™) Nintex (K2 Five, Workflow Cloud) Nintex (Nintex Automation GE Platform) Nuance (Dragon Suite, DAX CoPilot) OneSpan (OneSpan Sign) Orbus Software (OrbusINFINITY) Permuta (Defense Ready) Power Settlements Consulting and Software, LLC (PowerCore™) ProSymmetry Quest Software, Inc. (On Demand Solution, Security Guardian, Disaster Recovery for Identities) Relocation Management Worldwide (Virtual Employee Network) Synergist Technology, LLC (AFFIRM Solution for AI Compliance, SAS® VIYA®) UMT360 (SharePoint-based Enterprise Portfolio Management) Veritas (eVault, eDiscovery, Merge1) Wellspring (Accolade Enterprise Innovation Management, Sophia) WillCo Tech (CyberSTAR™) WordPress (WordPress CMS) WordPress As a Service (WPaaS) If an agency would like to use one of these Applications or bring in another GSS One-Azure-compatible Application, Project Hosts will provide application-level artifacts that will help the agency assess the risk of deploying that application in the GSS One-Azure as well as any other documentation or evidence required in order to grant an Authority to Operate (ATO).
Project Hosts Inc.
GSS One - Azure

Authorizations

6

Reuse

30

Service Model
PaaS
Impact Level
Moderate
Status
FedRAMP Authorized
GSS One-Azure (GSS1-AZ) is delivered as a hybrid offering using a multi-tenant PaaS cloud computing environment. It is available to both private and multitenant customers deployed per the agencies preference and agreements and can be utilized by the following audiences: the public, federal, DoD, state, local, and tribal governments, as well as research institutions, federal contractors, government contractors etc.)]. The Project Hosts “GSS1-AZ” PaaS is a Government Only General Support System (GSS) deployed on Azure Government. GSS1-AZ is composed of systems and services that manage access control, authentication, auditing, monitoring, scanning, patching, configuration management, malware prevention, intrusion prevention, incident response, backup, and disaster recovery for each application leveraging the GSS1-AZ. All of the systems that make up the GSS1-AZ and the Project Hosts engineers that administer the systems can be leveraged by any customers to meet the security requirements for their systems. There are three main SaaS components customers deployed on the GSS One-Azure system can leverage: - GSS One Portal/Admin Page: The GSS One Portal is a page where customer users and PH support can login to create and manage non privileged users for their organization including revoking access. It also provides them with the ability to upload software binaries to the test environment and screenshots and other supporting artifacts required for support tickets. The GSS One Admin page is accessible only to PH engineers and is used for managing inventory, privileged user maintenance windows and account creation and JIT access and has dashboards for PH engineers to provide a centralized view of each environment. - GSS One Console: GSS One- Console is a one stop shop for agency and CSP customers to view relevant information for their system and aid in implementing and maintaining ConMon requirements including a document repo for SSP and appendixes, POA&Ms and vulnerability scans, allows them to manage training, track incidents, track vulnerabilities and other corrective actions, track red teaming activities, view availability monitoring alerts, change control ticketing, link controls to artifacts and evidence to speed up ATO times, centralized up to date contact lists. - GSS One Ticketing System: Project Hosts has configured a customer-facing support portal for creating and managing support tickets. This allows customers to view all of their relevant tickets, create tickets, upload screenshots and communicate with PH staff through a secure channel. There are two main types of customers who use the GSS1-AZ: (i) Independent Software Vendors (ISVs) deploying multitenant SaaS applications and (ii) Federal, state, or local agencies deploying dedicated applications just for their agency or organization (not multitenant). For both types of customers, their applications are deployed on customer-dedicated virtual servers (or FedRAMP-authorized Azure PaaS services) inside customer-dedicated subnets. Network Security Group firewall access controls ensure that each customer's systems are completely isolated from and has no access to any other customer's subnet. For GSS1-AZ customers, Project Hosts also provides services that are over and above the PaaS offering described in the GSS1-AZ FedRAMP package. Namely, Project Hosts deploys, secures, manages, and provides continuous monitoring for applications that are compatible with the GSS1-AZ architecture, authentication, operating system, database, and access requirements. Many CSPs do not have the staff or knowledge to fully deploy a cloud workload, write security documentation, refactor the application to meet compliance requirements and work with agencies and the PMO to obtain a FedRAMP authorization which leads to wasted time, money, and resources both for government sponsors and the ISVs. Project Hosts works with these software vendors and agencies to quickly deploy the application to the cloud and build out and manage the system for the customers which includes acting as the security and compliance team for the application. In addition, Project Hosts works with these software vendors to document security controls, perform compliance reviews, perform disaster recovery, and advises the ISV on how refactor the application to meet FedRAMP requirements. Project Hosts security compliance team also performs monthly vulnerability scanning include ACAS scans, dynamic web app scans and container image scans and documents and tracks these findings in accordance with continuous monitoring requirements. Among other things the Project Hosts team also performs (for each customer deployed within the GSS1-AZ) monthly baseline compliance scanning, configuration management, patch and vulnerability management, malware prevention and intrusion prevention using HBSS software, incident response reporting, analysis, eradication, and recovery as well as all SOC review and analysis of audit logs and responding/investigating alerts for suspicious activity. Project Hosts deploys systems to monitor workloads for availability and performance issues and proactively take action to ensure maximum uptime and availability. Performing these functions on the ISVs’ behalf allows the software vendors to focus on their core business model in delivering a secure, highly functional application to the agency. For CSP customers, Project Hosts also creates their SaaS-level FedRAMP package, helps them throughout the agency authorization process, and manages their 3PAO annual assessments. For agency customers, Project Hosts assists them in the creation of their own SSP, manages annual 3PAO scanning and penetration testing of their dedicated applications, and provides a monthly application-level POA&M. Following is a partial list of applications for which Project Hosts is providing these services over and above the GSS One-Azure platform: 1E (1E Tachyon Platform) Archive360 (Archive2Azure) AvePoint (AvePoint Online Services for US Government) Aztec (Aztec Learning System) Bingli (Bingli) Blue Prism (Blue Prism) BrightWork (BrightWork SharePoint-based Project Management) Cardinal Engineering (ShockIQ) C3 AI (C3 AI Suite) Checkmarx (CxSAST Source Code Scanner) CTERA Networks (CTERA Edge Filer, CTERA Drive, CTERA Portal) Conga (Contract Lifecycle Management, X-Author and Conga Approvals) Creative Veteran Productions (Fed ILMS) Davra (WebEx Legislate, Internet of Things) Distributed Solutions Inc. (AEON) Drupal (Drupal CMS) Ephesoft (Transact) Feith Systems and Software Inc. (RMA iQ™) FlowVU (FlowVU Collaboration) Gimmal (Gimmal Records Management) Idea Entity (RhyBus Platform) Image Trend (Elite, Report Writer (RW), Continuum (CT), Licensure, Slate) Invoke (UiPath Orchestrator and RPA) Ivanti (MDM, Access, Neurons) Kofax (Control Suite, Kofax TotalAgility, Kofax Robotics Process Automation) Lexmark (Managed Print Service, Lexmark Print Management) LMI (ATLAS by LMI) Librestream Technology (Onsight Now) Microsoft (Office, Dynamics, Power BI Server, Project Server, SharePoint, SSRS) NIBS/ OM Group Inc. (ProjNet™) Nintex (K2 Five, Workflow Cloud) Nintex (Nintex Automation GE Platform) Nuance (Dragon Suite, DAX CoPilot) OneSpan (OneSpan Sign) Orbus Software (OrbusINFINITY) Permuta (Defense Ready) Power Settlements Consulting and Software, LLC (PowerCore™) ProSymmetry Quest Software, Inc. (On Demand Solution, Security Guardian, Disaster Recovery for Identities) Relocation Management Worldwide (Virtual Employee Network) Synergist Technology, LLC (AFFIRM Solution for AI Compliance, SAS® VIYA®) UMT360 (SharePoint-based Enterprise Portfolio Management) Veritas (eVault, eDiscovery, Merge1) Wellspring (Accolade Enterprise Innovation Management, Sophia) WillCo Tech (CyberSTAR™) WordPress (WordPress CMS) WordPress As a Service (WPaaS) If an agency would like to use one of these Applications or bring in another GSS One-Azure-compatible Application, Project Hosts will provide application-level artifacts that will help the agency assess the risk of deploying that application in the GSS One-Azure as well as any other documentation or evidence required in order to grant an Authority to Operate (ATO).
Proofpoint, Inc.
Proofpoint Email Archive

Authorizations

3

Reuse

12

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Federal Production Environment provides a complete message archiving solution that can protect an organization from legal liabilities and regulatory risks while improving email storage management and end-user productivity. Its web interface offers fully secure email archiving with robust search and discovery, supervision, and enforcement features. The solution securely stores electronic messages for a specified retention period, while keeping the messages fully searchable and retrievable in real-time or with a batch process. This allows archived messages to be easily viewed, retrieved to a user's email inbox or exported to an Outlook data file. The Archiving Customer Premise Equipment (CPE) is software-based, a hardware-based version is also available, and is installed within the Microsoft Office 365 ITAR environment behind the firewall to provide the tight integration and security typically only afforded to internal systems. The CPE integrates with Microsoft Exchange to ensure reliable, native format message archiving. Its integration with Active Directory facilitates unified login and access control management. Since the CPE is the only holder of the encryption keys used with Proofpoint's DoubleBlind™ Encryption technology, any processing that involves encryption or decryption happens on the CPE. Proofpoint's DoubleBlind™ Encryption technology guarantees the security of data, ensuring that no one outside the organization can access archived data. When a message reaches the CPE, it is encrypted before being sent outside the Microsoft Office 365 ITAR firewall over a secure connection to the Proofpoint Federal Production Environment. Messages are only decrypted when an authorized user on the customer network conducts a search from Outlook or from the CPE's web-based user interface. Data can never be viewed without access to both the archiving CPE within the Microsoft Office 365 ITAR environment and the Proofpoint Federal Production Environment.
PTC, Inc.
PTC ServiceMax Federal

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
PTC ServiceMax Federal is delivered as a Software as a Service (SaaS) model using multi-tenant AWS Commercial Cloud deployment for underlying infrastructure. The ServiceMax tool allows customers to manage assets, track field operations, and deploy field technicians. ServiceMax has a core offering that when purchased gives customers access to additional supporting applications. The ServiceMax Core product is listed on the Salesforce Marketplace (AppExchange). If a customer wants to purchase the product, they contact PTC and sign a contract. After signing the contract, PTC provisions a license for the customer through the Salesforce license management tools. Customers manage the configuration and access of the ServiceMax tools once purchased. The ServiceMax package includes the following applications: • ServiceMax Core Application – Application offered through the Salesforce Marketplace. Customers purchase the application which is hosted on Salesforce infrastructure. The Core application allows customers to manage assets and boost productivity for field service activities. The application allows technicians to perform services, dispatch technicians to the field, manage contracts, and fill out forms. This is the only service not hosted in AWS. The databases underlying ServiceMax Core are managed by the customer, hosted in their Salesforce tenant. • Go Mobile Application – The Go Mobile App is a mobile version of the ServiceMax Core. It allows technicians in the field to have access to assets and documentation, as well as schedule appointments. The Go Mobile Application is part of the Core product license purchased by the customer. Go Mobile talks to the Sync Gateway and Notification Service backend, hosted in AWS. • Go Console Application – Go Console is a multi-tenant application hosted in AWS that serves as the customer administrator console for the Go Application. Go Console ensures endpoints are running the correct version of the Go mobile application and pushes configurations. It is deployed on a Kubernetes cluster. There are multiple instances for Go Console. The Go Console is part of the Core product license purchased by the customer. • Notification Services Application – Notification Services is hosted in AWS and serves as a customer administrator backed service to support mobile push notifications. • Configurator Application – Configurator is hosted in AWS and helps customer set up ServiceMax Core. It is an optional tool the customer can use to streamline Salesforce configuration management. • Migrator Application – Migrator is hosted in AWS and is an optional service allowing customers to migrate configurations to the ServiceMax Core application. Once the migration is complete, customers receive an email notification that the task is completed. • Data Guide Application – Data Guide is static content hosted in an AWS S3 bucket. If a field agent has a form that a customer needs to fill out the ServiceMax applications will pull the templates from the S3 bucket.
Qualtrics
Qualtrics XM Platform

Authorizations

30

Reuse

31

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Qualtrics XM Platform is a SaaS offering, hosted in a multi-tenant Government cloud environment, designed to support US federal agencies in managing employee experience (EX), customer experience (CX), and conducting strategic research. Subscriptions to the platform and related professional services (research, implementation, and engineering) are available. The platform enables agencies to deploy surveys for systematic data acquisition from various stakeholders. It supports listening across channels to collect data from web properties, mobile applications, email communications, social media, and integrated contact center analytics systems. This facilitates comprehensive data collection across multiple interaction points. Capabilities for understanding and improving the digital experience are included, allowing for analysis of user interactions on digital interfaces. The platform supports the collection of product feedback and website feedback to inform development and user experience enhancements. The Qualtrics XM Platform provides tools for measurement of experience data and offers functionalities for both quantitative and qualitative analysis. Integrated artificial intelligence (AI) capabilities enhance data analysis by identifying key themes, predicting trends, and surfacing actionable insights from structured and unstructured data, including open-text feedback from surveys and other channels. These AI features assist in understanding the nuances of listening across channels and improving the efficiency of data collection analysis. The platform supports the implementation of closed loop feedback mechanisms to facilitate action based on collected and analyzed insights. The platform is accessible to public sector entities, including federal, state, local, and tribal governments, as well as research institutions, federal contractors, and government contractors.
Qualtrics, LLC
Qualtrics XM Platform - High

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP In Process
The Qualtrics XM Platform is a SaaS offering, hosted in a multi-tenant Government cloud environment, designed to support US federal agencies in managing employee experience (EX), customer experience (CX), and conducting strategic research. Subscriptions to the platform and related professional services (research, implementation, and engineering) are available. The platform enables agencies to deploy surveys for systematic data acquisition from various stakeholders. It supports listening across channels to collect data from web properties, mobile applications, email communications, social media, and integrated contact center analytics systems. This facilitates comprehensive data collection across multiple interaction points. Capabilities for understanding and improving the digital experience are included, allowing for analysis of user interactions on digital interfaces. The platform supports the collection of product feedback and website feedback to inform development and user experience enhancements. The Qualtrics XM Platform provides tools for measurement of experience data and offers functionalities for both quantitative and qualitative analysis. Integrated artificial intelligence (AI) capabilities enhance data analysis by identifying key themes, predicting trends, and surfacing actionable insights from structured and unstructured data, including open-text feedback from surveys and other channels. These AI features assist in understanding the nuances of listening across channels and improving the efficiency of data collection analysis. The platform supports the implementation of closed loop feedback mechanisms to facilitate action based on collected and analyzed insights. The platform is accessible to public sector entities, including federal, state, local, and tribal governments, as well as research institutions, federal contractors, and government contractors.
Qualys, Inc.
Qualys Government Platform

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP In Process
Qualys Government Platform (QGP) consists of a suite of Information Technology (IT) security and compliance solutions delivered via a SaaS deployment model that leverages a highly scalable multi-tenant cloud infrastructure. The below services are part of the QGP platform - Vulnerability Management, Detection, and Response (VMDR) service enables customers to discover, assess, prioritize, and patch critical vulnerabilities and misconfigurations in near real-time and across your global hybrid-IT landscape all-in-one subscription. Policy Compliance (PC) service provides the ability to run compliance scans and create compliance reports on hosts (IP addresses) that have been added to the Policy Compliance account. File Integrity Monitoring (FIM) service enables monitoring critical files, directories, and registry paths for changes in near real-time, and helps adhere to compliance mandates such as FedRAMP. Container Security (CS) service provides discovery, tracking, and continuously protecting container environments. Addresses vulnerability management for images and containers in their DevOps pipeline and deployments across cloud and on-premises environments. Certificate View (CertView) service provides a comprehensive view of all the SSL/TLS certificates across the enterprise and cloud-hosted assets. CyberSecurity Asset Management (CSAM) service continuously gathers information on all assets, listing systems and hardware details, running services, open ports, installed software and user accounts. Asset discovery and inventory collection is done through a combination of Qualys Sensors, which together can collect comprehensive data from across on-premises or cloud infrastructure as well as remote endpoints. Web Application Scanning (WAS) service enables organisation's to assess, track and remediate web application vulnerabilities to keep their web applications secure. Patch Management (PM) service is used to patch and apply post-patch configuration changes to operating systems, mobile devices, and 3rd-party applications from a large variety of vendors, all from a central dashboard.
QuestionMark
Questionmark Government

Authorizations

7

Reuse

6

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Questionmark Government service is an online assessment platform providing the ability to author, deliver and report on tests, quizzes, surveys, and exams. Questionmark Government can be used for training, certification, advancement, channel expertise, competency measurement, compliance, and workforce learning. United States Federal, State and Local government agencies and their contractors can safely and securely use our powerful tool for creating, delivering, and reporting on assessments. Questionmark Government is hosted in US-based, FedRAMP-authorized data centers used by US government agencies and their service contractors. Our service is targeted for data up to DoD Impact Level 4. Questionmark Government operates the Software-as-a-Service (SaaS). It includes provisioning and scaling; and maintenance of operating systems and software to ensure sufficient bandwidth and performance, upgrades, and secure backups. Questionmark is widely used by Government, Awarding Bodies, Utilities, Manufacturing and Public Sectors. For more information about Questionmark Government, please see: https://www.questionmark.com/use-cases/government/ **Features** * A government-specific online platform that is FedRAMP authorized and designed to support your special requirements * Comprehensive item banking with easy search functionality * Delivery of assessments via browser, secure browser, mobile devices and paper * Incorporates a robust reporting and analytics suite * Provides a collaborative authoring environment complete with version tracking and roll-back features * Author once then deliver to multiple devices simultaneously * Includes accessibility features such as text sizing and contrast controls * Available in 36 different languages * A secure and robust SaaS provided by a company that is ISO 27001:2022 certified * A scalable, flexible solution that can be rapidly deployed * Robust availability: 99.9%+ uptime **Benefits** * Easily create and deliver certification assessments and advancement exams * Easily create and deliver post-course tests for distance learning * Easily create, deliver, and report on surveys and course evaluations * Provides tracking changes to questions for legal defensibility * Blended delivery allows mobile/onsite workers to take assessments * Provides observational assessments to allow measuring performance on practical tasks * Create valid and reliable assessments to make trustworthy decisions * Author and deliver assessments that document training and understanding for compliance purposes * Improve test validity by running job task analysis surveys * Assess skills of technical staff, engineers, and equipment maintainers
Rackspace Government Solutions
Rackspace Government Cloud

Authorizations

6

Reuse

25

Service Model
PaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Rackspace Government Cloud (RGC) is purpose-built to help organizations achieve Assessment & Authorization faster and with cost savings of up to 70%. Whether you are a government agency, systems integrator, or independent software vendor, RGC is the foundation you need to rapidly deliver mission value via the cloud. Rackspace Government Cloud (RGC) wraps VMware and AWS in a secure-by-design management platform to meet the compliance requirements for FedRAMP and DoD Cloud Computing SRG. Customer solutions will be deployed and managed in secured enclaves within US Rackspace datacenters and/or AWS East/West and GovCloud. Customers are provided with dedicated application stacks to maintain data security at the necessary levels. All this is backed by a 24x7x365 U.S. only support model that allows Rackspace to provide the highest levels of assurance and security to our government customers. Benefits Include: - 24/7/365 operations and system support providing a fully-managed cloud solution up to and including guest operating systems and networks - Secure-by-design cloud environment with proactive support, continuous monitoring, and governance - Fully redundant solutions, with backup, restore, and disaster recovery built-in - Comprehensive system security services as standard, including enterprise-grade log aggregation, endpoint protection, file integrity monitoring, and host-based Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) - Unique combination of automation, accredited tooling, and human expertise, enabling cyber and operational support
Rave Mobile Safety
Rave Safety Platform

Authorizations

3

Reuse

2

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Rave Mobile Safety is a leading SaaS-based provider of critical communication, collaboration, incident management, and safety solutions. The Rave Safety Platform connects millions to those trusted to protect them, by providing innovative and integrated solutions to increase coordination, inform response, and act faster with two-way communications across different devices and locations during both planned (exercise) and unplanned (crisis/disaster) events. Rave provides a comprehensive set of data and tools to help navigate the response lifecycle and ensure the right people have the right information at the right time to reduce the impact of an emergency and shorten the timeframe of events. Rave's easy to use, quick to deploy and secure integrated platform is designed to improve communications, rapidly and reliably deliver alerts and notifications, connect stakeholders, confirm personnel location and accountability, and enhance response through established workflows and processes for event-specific situations. Rave's technology seamlessly integrates with 9-1-1 systems, WebEOC, IPAWS, panic buttons, phone and speaker systems, and CAP compliant devices. Rave's customized personal safety mobile apps allow organization personnel to stay connected and maximize the safety of employees and facilities. With nearly two decades of experience Rave's unified safety solution helps organizations with crisis preparedness, response, recovery, and resilience.
RegScale
RegScale CCM

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP In Process
RegScale FedRAMP High Baseline Security Plan is delivered as PaaS offering using a multi-tenant Public Cloud computing environment. RegScale is a next-generation Governance, Risk and Compliance (GRC) tool on Microsoft Azure, now referred to be Gartner as a Continuous Compliance Automation tool, that is a Software as a Service (SaaS) offering that enables organizations to automate and speed up the process of managing cyber security programs such as FISMA, FedRAMP, CMMC, PCI, HIPAA, NERC/CIP, and many others. RegScale helps organizations to solve their most difficult compliance challenges by allowing customers, based on API integrations, to manage their controls and upload their evidence documentation, perform system assessments, maintain their certifications and authorizations in a single platform (“Single Pane of Glass”), and keep everything updated in near real-time with automation. RegScale ensures that security and privacy-related controls are adequately identified, implemented, and maintained across the System Development Lifecycle (SDLC) for systems, applications, services, processes, and other initiatives. RegScale establishes and maintains customer information assurance capability with the ability to perform Control Validation Testing (CVT) to ensure appropriate controls are operational and risks are managed, prior to the system, application or service being put into production. RegScale is a major application for most large organizations but is not typically considered mission critical. RegScale is a modern cloud-native application that is built to scale using Docker containers which are micro-segmented and orchestrated using Microsoft Azure services. It is designed to be hosted in any environment and configuration is done securely at run-time by injecting environmental variables. The application can be downloaded and installed at any time from our Docker Hub Repository to support on-premises deployment. It is secured with unique customer keys, scales in real-time using serverless technologies, and can be deployed anywhere (laptop/desktop, on-premises, Kubernetes, or cloud (we currently support AWS, Azure, and Google). All our SaaS infrastructure resides within Microsoft Azure commercial cloud.
Relocation Management Worldwide (RMW)
Virtual Employee Network (VEN)

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Formed in 2002 for the government to be compliant with the FEAFA (Federal Enterprise Architecture Framework Act), the RMW - Virtual Employee Network (VEN) system utilizes the most advanced relocation technology in the relocation industry. VEN is a modular, flexible, stable, and highly secure system that supports all critical relocation functions and end-to-end PCS (Permanent Change of Station) software from obligation, de-obligation to financial system interfaces. RMW continues to develop technology tools based on anticipated client needs and customer input in addition to changes in legislation (i.e. 2017 tax cuts and jobs act). RMW IT professionals have built intuitive solutions into a fully comprehensive web-based platform. Users have 24/7 access to the system, which is scalable to meet an Agency's information needs. The user friendly PCS Travel Voucher submissions are initiated by the employee via VEN through an automated work flow controlled by the Agency. E-signature documents are digitally signed that complies with the strictest legal regulations and highest level of assurance of a signer's identity. VEN provides greater flexibility, capability, and protection of sensitive employee data than other systems. - Fully automates expenses, policy, and suppliers so teams can focus on what is most important, "the Agency's mission". - Fully automates all Federal regulations and laws pertaining to employee relocation. - New appointees, retirees, and transferees can access, enter, and submit PCS expenses, all while the Agency reviews or rejects, approves, certifies, and runs real-time reports. - Real-time information directly from suppliers with work-flows that ensure data integrity for much faster processing of data, documents, vouchers, and invoices, all with complete transparency. - Integration of Agency's specific documents completed by transferees with PIV card (Personal Identity Verification smart card) authentication of a digital signature. - All aspects of the system are digital and accomplished online by Agency staff and relocating employees. VEN assists Agencies on complying with the Paper Reduction Act and Green Initiatives.
Rescale
Rescale ScaleX Government

Authorizations

2

Reuse

1

Service Model
PaaS
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Rescale ScaleX Government is mission-ready secure supercomputing. Rescale's multi-cloud HPC-as-a-Service provides an intuitive, centralized, and automated platform for US government agencies and customers supporting the US government to operate sensitive workloads in the cloud. In addition to complying with FedRAMP requirements, Rescale adheres to critical compliance standards including: • U.S. International Traffic in Arms Regulations (ITAR) • Defense Federal Acquisition Regulation Supplement (DFARS) • Cloud Security Alliance (CSA) • Health Insurance Portability and Accountability Act (HIPAA) • American Institute of CPAs: Service Organization Control (AICPA SOC2) Additional information is available at https://rescale.com/solutions/by-industry/government/ Rescale’s HPC-as-a-Service platform provides automated, on-demand access to a wide variety of the latest hardware architectures to meet any specialized HPC needs (CPUs, GPUs, memory, storage, and networking). An easy-to-use console provides a range of tools to help government agencies balance flexibility, cost savings, and processing speed to set up the right HPC cloud service for their needs. The Rescale platform also provides an on-demand portfolio of leading engineering, scientific, and research applications that are pre-installed, secure, and ready to go. This includes commercial, open source, and government-protected applications. Users can also bring their own software. Rescale ScaleX Government supports a variety of computationally intensive use cases and applications including: • High Performance Computing (HPC) • High-Throughput Computing (HTC) • Artificial Intelligence (AI) • Machine Learning (ML) • Modeling and Simulation • Digital Engineering: Research and Development (R&D) • Computer-Aided Engineering (CAE) • Computational Fluid Dynamics (CFD) • Multi-Disciplinary Design Optimization (MDO) With Rescale, HPC operations are automated on a single pane of glass, making it simple for engineers and scientists to harness the most advanced software, computing, and AI architectures for cutting-edge simulation and mission execution. For IT, the Rescale platform provides a centralized, policy-driven automation to assure security, budgetary controls, and comprehensive visibility into all HPC operations, including sophisticated licensing and cloud usage management. Policy-based financial and architectural dashboards streamline workflows and configuration tasks, ensuring greater productivity and cost-efficiencies. By simplifying the complexity of managing on-premises and multi-cloud HPC, the Rescale ScaleX Government platform helps government agencies tap into dynamic cloud HPC services to accelerate their innovation efforts and support their big compute initiatives.
Research Dataware LLC
IRBNet on GovCloud

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
IRBNet's powerful suite of web-based, Software as a Service (SaaS) research compliance solutions provide electronic submission, collaboration and workflow tools that currently serve thousands of research institutions, compliance boards and sponsors, and hundreds of thousands of users, across IRBNet's National Research Network (commercial) and IRBNet on GovCloud (government). IRBNet research compliance solutions support institutions of any size, and currently serve hospitals and hospital networks, universities and academic research institutions, and federal and state agencies. IRBNet’s secure suite of tools is accessible anywhere, anytime, supporting real-time collaboration between investigators and institutions anywhere in the world, helping to streamline compliance workflow, reduce review and approval cycle times, reduce errors and non-compliance, increase staff efficiency, and improve audit trails and record keeping. IRBNet's tools are fully integrated and configurable, and support all institutional compliance offices, investigators and board members, including: - Institutional Review Boards (IRB) - Institutional Biosafety Committees (IBC) - Institutional Animal Care and Use Committees (IACUC) - Research & Development Committees - Radiation Safety Committees - Scientific Review Committees - Conflict of Interest (COI) and other specialty committees IRBNet provides the following core features to support local Agency mission needs and critical business functions, supporting compliance boards and researchers throughout the entire lifecycle of the research review and compliance process: - Project assembly, documentation and team collaboration - Electronic submissions - Routing, tracking and alerting tools for committee member review - Tracking of committee member comments and pre-reviews prior to meetings - Cross-institutional collaboration and communication tools - Custom Form Wizards to improve guidance and document quality (application forms, etc.) - Tracking of researcher and committee training and credentials - Multi-Site studies - Instant notification of study approval and other key events - Automated continuing review alerts - Quality control and pre-review tools - Agenda and Minutes Builders - Personalized Approval Letter and Correspondence Wizards - Document version control and history - Multi-board workflow management - Audit and oversight functions IRBNet also provides the following optional integration features to meet Agency mission needs: - IRBNet provides an optional connection to the WCG IRB for commercial IRB review services. This service allows Agencies to seamlessly send research studies for commercial IRB approval, and receive back approval documentation such as Approval Letters, while maintaining oversight of the complete research portfolio (both internal and external). - IRBNet provides an optional connection to external training sources, such as Agency training systems or the national CITI program, to pull training information for researchers and committee members so that this information is readily available during compliance and review processes. - IRBNet provides an optional Single Sign-On federated authentication capability for Agency authentication frameworks such as PIV/CAC, to provide seamless access to Agency users. IRBNet on GovCloud is the Government Community Cloud offering of the IRBNet SaaS. IRBNet on GovCloud is hosted in multiple availability zones within the Amazon Web Services (AWS) FedRAMP-authorized GovCloud Infrastructure as a Service / Platform as a Service (IaaS/PaaS). All AWS GovCloud data centers are within the Continental United States (CONUS). IRBNet on GovCloud is managed by Research Dataware LLC., an operating unit of WCG Clinical, Inc. (WCG). WCG is the world’s leading provider of solutions that measurably improve the quality and efficiency of clinical research.
Rosalind, Inc.
ROSALIND

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
ROSALIND is a multi-tenant SaaS solution for bioinformatics analyses, COVID diagnostic monitoring, knowledge management, and scientific collaboration. As a cloud-based software platform, ROSALIND provides a web interface for scientists and researchers to securely analyze and interpret datasets. Rosalind provides two web-based solutions, ROSALIND DxM and ROSALIND Research. Both operate in a visual manner and do not require command-line programming, cloud infrastructure setup, or bioinformatics pipeline development. - ROSALIND DxM provides real-time SARS-CoV-2 variant surveillance and diagnostic monitoring incorporating international viral sequence data. DxM also includes a comprehensive BioBank of SARS-CoV-2 specimens with sample tracking and workflow management for test panel creation, panel blinding, and results submission across participating labs and organizations. - ROSALIND Research provides visual analysis, interpretation, and cloud-based data sharing of genomic datasets produced with Next Generation Sequencing (NGS), NanoString instruments, and other multi-omic methods. ROSALIND Research features analysis pipelines for gene expression and gene regulation studies, including Single-Cell RNA-seq, bulk RNA-seq, miRNA-seq, ATAC-seq, ChIP-seq, and Proteomics. Rosalind uses knowledge graphs to securely store institutional data as searchable libraries while enabling permissions-based data sharing between authorized users and across institutions.
San Luis Aviation, Inc.
ESChat

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP In Process
ESChat for Government is a hardened version of the ESChat broadband communication, collaboration, and interoperability platform. ESChat is a Secure Broadband Push-to-Talk (PTT) communication system that facilitates secure inter-agency PTT communication, multimedia messaging, and a Common Operating Picture (COP) within and between agencies for mutual-aid or tactical purposes. ESChat for Government also supports external interfaces including Land Mobile Radio (LMR), dispatch consoles, and logging recorders There are three main components that make up this offering: - The ESChat portal is a browser-based application which allows customers to manage all aspects of their network including managing accounts, devices, groups, integrations,live and historical location display, etc. - The ESChat clients are mobile applications (Android, iOS, Linux), Land Mobile Radio (LMR) gateways, and PC Client applications that communicate using the ESChat protocol. The ESChat clients are the functional endpoints that the users of the system interact with to perform Push-to-Talk voice and multimedia messaging communications with one another. - The ESChat back-end services provide ESChat users with inter-carrier, inter-agency, inter-system, and inter-vendor interoperability all managed and controlled within the authorization boundary, ensuring ESChat is the only solution needed to provide reliable, secure, and interoperable communications.
SAP National Security Services Inc. (SAP NS2)
DoD Cloud Intelligent Enterprise – DD-CIE

Authorizations

4

Reuse

3

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The SAP NS2 Secure Node SuccessFactors Suite – DOD (SNSFS) is a secure cloud environment that hosts the following suite of SAP cloud solutions: SAP SuccessFactors, SAP Employee Central Payroll, Integrated Business Planning (IBP) and SAP S/4HANA Cloud, private edition (PCE). SAP SuccessFactors is an enterprise human resources and people management SaaS solution. SAP SuccessFactors delivers business results by driving business alignment, optimizing people performance, and building connections within organizations. SAP SuccessFactors provides a comprehensive suite of applications that improve executive insight and decision-making while ensuring the right people with the right skills are doing the right work. SAP SuccessFactors includes: Learning, Performance & Goals, Succession & Development, Compensation, Recruiting, Onboarding, Workforce Planning, Workforce Analytics & Reporting, and Employee Central Payroll. Employee Central Payroll is an industry-based payroll engine that seamlessly integrates into the core HR system. Benefits include: Enhanced Disaster Recovery/High Availability, U.S. Federal and Critical Infrastructure compliance, and NS2 U.S. Persons Operation & Support. The SAP Integrated Business Planning (IBP) offering is a fully integrated solution that provides organizations the ability to make optimal, responsive, and strategic decisions affecting their supply chains. Powered by SAP HANA, this cloud-based solution combines sales and operations planning (S&OP), forecasting and demand planning, response and supply planning, demand-driven replenishment, and inventory optimization. IBP provides automated, tightly coordinated supply chain planning processes, advanced machine learning algorithms, and native integration with SAP Supply Chain Control Tower and other solutions. IBP facilitates increased forecast accuracy, reduced inventories and overall supply chain costs and improved customer service. SAP S/4HANA Private Cloud Edition (PCE) is an enterprise resource planning cloud application that includes support, infrastructure management, and technical managed services within a single SaaS solution. This offering provides a path for an accelerated, integrated, and tailored cloud transformation with a priority on safeguarding critical applications and data. Our solutions include S/4HANA, SAP ERP, BW on HANA, BW/4HANA, SAP Landscape Transformation (SLT), Process Orchestration (PO), Data Services, Fiori Hub, Convergent Charging, NetWeaver ABAP, Manufacturing Integration & Intelligence, BusinessObjects, SAP Access Control, SAP IQ Cold Store Cloud, SAP Information Lifecycle Management, Solution Manager, SAP Extended Warehouse Management, BW NetWeaver Java Server, Content Server, Single Sign-On and HANA Enterprise Edition.
SAP National Security Services Inc. (SAP NS2)
SAP NS2 Cloud Intelligent Enterprise

Authorizations

25

Reuse

24

Service Model
PaaS
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The SAP NS2 Cloud Intelligent Enterprise (CIE) is a secure cloud environment that hosts the following suite of SAP cloud solutions: SAP SuccessFactors, SAP Employee Central Payroll, SAP Analytics Cloud, SAP Business Technology Platform and SAP S/4HANA Cloud, private edition. Within the CIE cloud environment, government agencies can safely adopt and deploy SAP cloud solutions under our secured, automated cloud model. SAP NS2 offers customers enhanced security, availability, compliance, and support to help deliver a mission-critical edge. Our innovative solutions address critical processes and operations within the cloud that expand across multiple lines of business. Our intelligent suite includes applications for connecting data from disparate sources, operational transactions, HR and people management, analytics, and other key business capabilities. Applications are integration-ready, include both Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) solutions, have embedded intelligence, and offer a consistent and intuitive user interface. SAP SuccessFactors is an enterprise human resources and people management SaaS solution. SAP SuccessFactors delivers business results by driving business alignment, optimizing people performance, and building connections within organizations. SAP SuccessFactors provides a comprehensive suite of applications that improve executive insight and decision-making while ensuring the right people with the right skills are doing the right work. SAP SuccessFactors includes: Learning, Performance & Goals, Succession & Development, Compensation, Recruiting, Onboarding, Workforce Planning, Workforce Analytics & Reporting, and Employee Central Payroll. Employee Central Payroll is an industry-based payroll engine that seamlessly integrates into the core HR system. Benefits include: Enhanced Disaster Recovery/High Availability, U.S. Federal and Critical Infrastructure compliance, and NS2 U.S. Persons Operation & Support. SAP Analytics Cloud (SAC) is a business intelligence platform SaaS solution. SAC connects people, information, and ideas to enable fast and confident decision making. With SAC machine learning and embedded artificial intelligence, one solution allows you to discover, analyze, plan, and predict across all devices. In addition, SAC allows you to make end-to-end decisions with data management and analytics. SAC scales to meet the needs of your organization and diverse users across all decision types (strategic, operational, and tactical). SAP Business Technology Platform (BTP) is a PaaS solution that allows users to extend and personalize their SAP applications or integrate and connect entire landscapes. SAP BTP helps achieve agility, business value, and continuous innovation through integration, data to value, and extensibility. Organizations can implement their goals with the flexibility to build, manage, and deploy new applications. SAP BTP also connects data and business processes within one, integrated platform. SAP BTP is the secure core that integrates and extends the SAP NS2 Cloud portfolio. SAP S/4HANA Private Cloud Edition (PCE) is an enterprise resource planning cloud application that includes support, infrastructure management, and technical managed services within a single SaaS solution. This offering provides a path for an accelerated, integrated, and tailored cloud transformation with a priority on safeguarding critical applications and data. Our solutions include S/4HANA, SAP ERP, BW on HANA, BW/4HANA, SAP Landscape Transformation (SLT), Process Orchestration (PO), Data Services, Fiori Hub, Convergent Charging, NetWeaver ABAP, Manufacturing Integration & Intelligence, BusinessObjects, SAP Access Control, SAP IQ Cold Store Cloud, SAP Information Lifecycle Management, Solution Manager, SAP Extended Warehouse Management, BW NetWeaver Java Server, Content Server, Single Sign-On and HANA Enterprise Edition.
SAS Institute, Inc.
SAS AI and Analytics for Government on FedRAMP

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
SAS® Viya® provides the foundation for SAS AI and Analytics for Government on FedRAMP, making it possible to integrate teams and technology and deliver significant productivity gains to agencies leveraging data and AI. What’s included in SAS AI and Analytics for Government on FedRAMP: • SAS Visual Text Analytics • Start with training documents to build models iteratively by analyzing and categorizing. • Identify and categorize key textual data with interpretive algorithms that incorporate context. • Leverage the best combinations of linguistics, machine learning and natural language processing. • SAS Visual Statistics • Enable multiple users to explore data and develop models interactively. • Create, refine, and test models using in-memory capabilities. • Discover, predict and act with interactive data exploration and discovery • SAS Viya • Cleanse, prepare and manage data for analysis, exploration and feature engineering with modern statistical, data mining and machine learning techniques all in a single, scalable, in-memory processing environment. • Use the comprehensive visual interface to solve complex analytical problems that handles all tasks in the analytics life cycle. • Register, modify, track, score, publish and report on AI and analytical models. • Store models within folders or projects. • Develop and validate candidate models and assess candidate models for champion model selection. Then publish and monitor champion models. • SAS Visual Analytics • Leverage self-service analytics to make faster decisions with data. • Discover more relevant relationships in your data. • Develop dashboards and reports for use and sharing.
Scale AI, Inc
Scale AI Data Platform

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
The ScaleGov mission is to accelerate the development and deployment of artificial intelligence (AI) solutions within the government space. Scale's comprehensive AI Data Platform goes beyond data labeling, now offering a fully-managed, API-driven solution for the test, evaluation, and development of AI-enabled enterprise applications. This includes Scale's Generative AI Platform (SGP), which empowers organizations to rapidly iterate and scale their AI models across various use cases with robust tooling for enterprise-level testing, evaluation, and operationalization. In addition, Scale's platform now integrates Donovan, a powerful enterprise chat solution built on SGP. Donovan provides real-time, AI-driven insights and collaboration capabilities, augmenting human workflows with intelligent assistance and context-aware responses to enhance decision-making and productivity. Scale continues to offer best-in-class tools and processes for creating high volumes of training data. The managed labeler network uses automated quality assurance, training, matching, and incentive systems to accurately label more than one hundred million annotations monthly. Scale's advanced quality pipeline incorporates active tooling and pre-labeling techniques, driving worker efficiency and accelerating customer workflows. Through Scale's customer management platform, clients can receive data in real-time, monitor task progress, audit results, and provide feedback across a broader range of AI-driven initiatives.
SecurityScorecard, LLC
SecurityScorecard Security Ratings

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
SecurityScorecard Security Ratings monitors the security posture of millions of companies by calculating a risk score derived from publicly available data. Companies are assigned A-F ratings across risk factors including domain name system (DNS) health, internet protocol (IP) reputation, web application security, network security, leaked information, hacker chatter, endpoint security, and patching cadence. This data is provided to customers via the Security Ratings web application. Customers use the Security Ratings web application to review security ratings and detailed security reports. Users access Security Ratings through a standard web browser and leverage identity federation for authentication. Within the application, users search for companies of interest and review security reports developed by SecurityScorecard. These ratings and reports allow customers to evaluate the cybersecurity risk for companies of interest using data-driven, objective, and continuously evolving metrics that provide visibility into information security control weaknesses as well as potential vulnerabilities throughout the supply chain ecosystem. Users can also create "portfolios" to group together companies of interest and easily compare vendors to help make procurement decisions, evaluate acquisition targets, conduct industry benchmarking, and more. Additional capabilities and data points (collected from publicly available data sources) in the Security Ratings web application include: • IP attribution to company domain(s) • Security vulnerability monitoring by company and security factors • Security risk benchmarking and scoring by company and industry • Alerts for changes in risk scores • Executive and detailed company scorecard reports • Workflow for collaboration and remediation with monitored suppliers
SentiLink Corp
SentiLink

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
SentiLink is delivered as a SaaS offering using a multi-tenant public cloud computing environment. It is available to financial institutions and fintech companies, federal, state, local, and tribal governments, as well as research institutions, federal contractors, and government contractors. SentiLink Corp. is a software-as-a-service financial technology company headquartered in San Francisco, California. It provides fraud detection and prevention services to financial institutions in the United States. Synthetic Fraud Scores SentiLink’s Synthetic Fraud Scores solution helps entities stop hard-to-detect synthetic identities in real-time. The Synthetic Fraud Scores product scores applications from 0 (low risk) to 999 (high risk). Three scores are provided on every identity: a composite score, a first-party synthetic score, and a third-party synthetic score. These scores are defined as follows: First-party synthetic score: the likelihood that the identity is first-party synthetic fraud Third-party synthetic score: the likelihood that the identity is third-party synthetic fraud Abuse score: the likelihood that the identity is associated with synthetic fraud or other related fraud risks ID Theft Scores SentiLink’s ID Theft Scores solution determines the likelihood that someone is using stolen credentials to open an account. The solution provides a score between 0 and 999. The higher the score, the higher the likelihood of ID theft. ID Theft Scores are provided via an application programming interface (API) or a user dashboard, and a single API call can be used for both ID Theft Scores and Synthetic Fraud Scores. First-Party Fraud Flags The First-Party Fraud Flags solution allows customers to determine whether an applicant possesses characteristics indicative of identity-related fraud. The model incorporates geographic and fraud alert data related to applicants and other consumers. Manifest Manifest allows customers to identify duplicate data sets in their data portfolios. Customers provide SentiLink with consumer personally identifiable information (PII), and SentiLink assigns each set of PII a unique ID. Customers send SentiLink consumer PII, such as consumer names, dates of birth, Social Security numbers (SSNs), addresses, phone numbers, and email. SentiLink compares the PII to the established unique IDs to identify matches. Insights The Insights solution is a Know Your Customer (KYC) product designed to satisfy Customer Identification Program (CIP) obligations. Insights allow customers to uncover additional intelligence regarding PII and the risks associated with that PII, which facilitates investigation and remediation. Dashboard The Dashboard facilitates customer analysis of applicant information and SentiLink-licensed associated information to determine whether an applicant’s identity is legitimate. It allows customers to access SentiLink’s proprietary user interface to conduct further analysis and request further information regarding specific applications for fraud detection. eCBSV As part of the electronic Consent Based Social Security Number Verification (eCBSV) subscription, SentiLink submits eCBSV requests on behalf of permitted entities. eCBSV subscription services are provided via API or through a user interface. ID Complete ID Complete is designed to resolve missing or incomplete identity fields, such as dates of birth or SSNs, and suggest alternative information where applicable. Data suggestions are derived from customer data and SentiLink supplied data through SentiLink’s proprietary matching logic. The organization accepts data files from Experian. KYC Watchlist Checks The KYC Watchlist Checks service allows customers to compare applicants to various government sanctions lists including, but not limited to, the Office of Foreign Assets Control (OFAC), Politically Exposed Persons (PEPs), United Nations Security Council, and the US Department of State watchlists. SentiLink Corp.’s (SentiLink’s) technology helps its customers combat fraud, a crime in which fake identities are created and used to defraud financial institutions and government agencies. SentiLink equips users with the tools needed to visualize and prevent fraud in any domain, whether money laundering, contractor fraud, synthetic identities, first-party fraud, or classic third-party stolen identities. The organization offers the solutions below that help banks, lenders, credit unions, financial technology entities, insurance companies, and telecommunication companies prevent fraud.
SentinelOne
SentinelOne Singularity Platform High

Authorizations

8

Reuse

19

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
The SentinelOne Singularity platform is a unified, cloud-delivered security platform that provides customers with automation, endpoint detection and response and security information and event management (SIEM) capabilities integrated with a unified data lake to ingest and centralize structured and unstructured data. SentinelOne leverages advanced machine learning algorithms and behavioral AI to analyze and automatically contextualize endpoint data collected across Windows, macOS, Linux, and Cloud Workloads. Data is contextualized and correlated into our patented Storylines technology, which accelerates triage and reduces mean time to detect/respond. Data is organized into a cohesive threat narrative which allows analysts to easily identify threat-related events as well as pivot and hunt to scope threat tactics, techniques, and impact. This gives our customers the ability to quickly stop ransomware and cyber attacks at machine speed with 1-click automated remediation and rollback of malicious activities and changes. Additionally, SentinelOne offers world-class managed detection and response (MDR), digital forensics and incident response (DFIR), and threat hunting services. Our MDR service not only augments security teams by triaging active or suspicious alerts and mitigating and blocking threats as needed, but also keeps them informed and protected from global advanced persistent threat (APT) campaigns, novel attacker techniques, and emerging trends in cybercrime with included threat hunting services. Customers can also call on SentinelOne’s integrated DFIR team for deeper forensic analysis of an event and assistance with incident response. The following SentinelOne Singularity Platform services are FedRAMP High Authorized: -Cloud Funnel -Cloud Workload Protection (CWP) -Digital Forensics & Incident Response (DFIR) services -Endpoint Detection and Response (EDR) -Endpoint Protection Platform (EPP) -Extended Detection and Response (XDR) -Purple AI Foundations for Public Sector -RemoteOps and RemoteOps Forensics -SentineOne Agent (Windows, macOS, Linux, and cloud-native Kubernetes) -SentinelOne Management Console -Singularity Data Lake -Singularity Marketplace -Singularity Network Discovery -Singularity Operations Center (OpsCenter) -Singularity Threat Intelligence -Singularity Vulnerability Management -Vigilance Managed Detection and Response (MDR) services -WatchTower and WatchTower Pro Threat Hunting services
Snyk
Snyk for Government

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Snyk for Government (https://app.snykgov.io/) is a cloud driven, developer security platform that scans code early in the software development lifecycle, providing developers with vulnerability information about their projects directly in the IDE and PR Checks, as well as providing actionable fix advice. Powered by an industry-leading security intelligence database, Snyk for Government analyzes code, open-source dependencies, containers, and IaC (Infrastructure as Code) to find, prioritize, and automatically fix vulnerabilities in projects. Snyk users can interact with the service via the Snyk for Government Web UI, the Snyk CLI, in the IDE, or with an API. Snyk for Government is hosted within AWS US East as the Cloud Service Provider (CSP) which assures product lines are maintained in a secure and trusted environment. Snyk for Government boundary includes the Production environment consisting of virtual compute, storage, databases, and internal management web applications. The Snyk for Government environment is designed and operated based on security compliance and operations best practice by automating the build and operational processes as much as possible using Infrastructure as Code (IaC), CIS benchmarks, vulnerability scanning, continuous monitoring of critical security controls and a managed system development process to obtain initial and continuous FedRAMP Moderate Approval to Operate (ATO).
Socure, Inc.
Socure for Government (SocureGov)

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Socure for Government (SocureGov) is delivered as a SaaS offering using a multi-tenant Public Cloud computing environment. SocureGov is available to, and provides digital identity proofing and fraud prevention capabilities for, customers who want to enable a simple, seamless, and secure verification process for consumers. The platform applies artificial intelligence and machine learning techniques with trusted online/offline data intelligence from physical government-issued documents as well as email, phone, address, IP, device, velocity, date of birth, SSN, and the broader internet to verify identities in real time. It is the only solution that analyzes and correlates every facet of an individual’s digital identity to accurately verify individual identities while simultaneously detecting fraud. The platform is fully compliant with FedRAMP Moderate security controls and has been certified by the Kantara Initiative to meet NIST SP 800-63 Identity Assurance Level 2. SocureGov provides several important capabilities listed below: - Socure Verify uses a triangulated data approach and leverages artificial intelligence and machine learning to verify an identity across 400+ trusted sources, and then correlates thousands of identity data points—online and offline—to resolve to a single best-matched entity. - Sigma Identity Fraud provides high-assurance trust and detects digital identity fraud across the customer lifecycle. - Sigma Synthetic applies the Federal Reserve’s definition of synthetic identity fraud which focuses on “manipulated” and “fabricated” types to support customers in determining the optimal follow-on treatment — without adding unnecessary friction. - Email Risk Score leverages machine learning models and feedback loops to analyze over 56 email fraud predictors, assessing risk throughout the customer lifecycle. - Phone Risk Score leverages adaptive machine learning and continuous feedback data to verify phone number risk and ownership, while ensuring a seamless user experience for legitimate customers. - Address Risk Score establishes address-level risk and its correlation to a holistic identity profile, empowering businesses to deflect identity fraud attacks without adding friction to legitimate customers. - Global Watchlist Screening and Monitoring screens, monitors, and dispositions users in real time against sanctions, enforcement lists, politically exposed persons databases, adverse media information, and custom lists - Digital Intelligence continuously monitors and assesses user interactions, helps detect anomalies, and enhances identity proofing, to provide a secure and trustworthy environment for both organizations and their users. - Predictive Document Verification (DocV) verifies ID, biometrics, PII, barcode, and device and behavior intelligence in a single platform to accurately detect and prevent deepfakes, fake IDs, and stolen and fabricated identities from entering the digital economy, in under 2 seconds. - Image Alert List is a live monitoring service that checks documents to identify individuals who previously attempted a transaction under different identities. - Decision Module provides a seamless method to orchestrate the breadth of Socure’s products, enabling a customer to set risk thresholds and help automate decisions to accept, reject, review, resubmit, or refer individuals in an identity verification flow
Software AG Government Solutions
ARIS Government Cloud

Authorizations

4

Reuse

3

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
ARIS Government Cloud is a platform hosted on AWS GovCloud Kubernetes Infrastructure, offering both dedicated and multi-tenant environments for U.S. government users. Tailored to meet the strictest security standards, ARIS Government Cloud complies with CISA, NIST 800-53 and U.S. data sovereignty regulations. Managed and operated by only U.S. Persons, the solution ensures the highest levels of data security, confidentiality, and availability, empowering government operations to optimize and govern their business processes effectively. ARIS provides a comprehensive platform to model, analyze, and optimize business processes across government operations. The solution supports all stages of business process management, from process discovery to design, analysis, and continuous improvement. With integrated reporting and data analytics capabilities, ARIS helps users identify inefficiencies, mitigate risks, and improve service delivery while ensuring full compliance with federal guidelines. Key Capabilities: - Business Process Modeling (BPM): ARIS enables users to map, simulate, and refine processes, ensuring both operational efficiency and regulatory adherence at every step. - Governance, Risk, and Compliance (GRC): ARIS delivers a comprehensive framework for maintaining federal compliance, offering robust governance tools, audit trails, and risk management functionalities to safeguard data integrity. - Process Mining: The platform’s real-time analytics drive data-informed decision-making, helping users enhance accountability and continuously optimize operations.
Spider Strategies
Spider Impact for Government

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Spider Impact for Government enables cloud-based performance management for defining, measuring, and reporting agency performance against targets and strategic plans. The system is the Federal Government dedicated environment of Spider Strategies’ Spider Impact software. Spider Impact for Government collects, stores, and displays agency key performance indicators (KPIs), generates executive Briefings, Dashboards, and Reports, and enables data analysis and exploration through its business intelligence reporting engine. Spider Impact for Government Scorecards allow agencies to define KPIs and metrics and align them to the overall agency strategy through objectives, initiatives, and corrective action plans. This permits users to track and evaluate their agency’s performance strategically by comparing KPI performance against targets and goals resulting in Red/Amber/Green assessments. Spider Impact for Government Dashboards and Reports allow agencies to create custom, ad-hoc, or cascading dashboards to track and report performance across teams, projects, strategies, or organizations with dynamically updating data collected and reported via Spider Impact for Government scorecards and datasets. The result is reports and dashboards that provide a common operating picture across an agency, based on timely data and insights from agency leaders. Spider Impact for Government Datasets provides users a business intelligence engine to explore and analyze large amounts of data, allowing users to discover insights, trends, correlations, or anomalies within and across agency datasets. Datasets permits agencies to apply conditional and Boolean logic to sort, filter, or report subsets of data. Spider Impact for Government automates data input to save countless hours of data collection, entry, and quality review resulting in greater efficiency in data gathering, greater speed to reporting, and increased return on investment by allowing organizations to devote user time to data analysis and not data collection. Spider Impact for Government, from Spider Strategies, is an approved Software-as-a-Service (SaaS) Performance Management suite for all Federal Government customers, including the Department of Defense at Impact Level 4 (DoD IL4).
StackArmor
The Armory

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Ready
The Armory is a purpose-built General Support System (GSS) cloud service offering (CSO) that delivers security and compliance services aligned to the FedRAMP High risk categorization baseline. The Armory accelerates the ability for Independent Software Vendors (ISVs) and Enterprises to meet complex regulatory requirements on the Google Cloud Platform (GCP). The Armory delivers and continuously monitors FedRAMP compliant, risk-mitigated cloud solutions to government agencies and their partners through either a hosted or managed delivery model by: • providing full compliance architecture, engineering, documentation and audit support, • reducing the burden to both agencies and SaaS providers, and - expanding the catalog of mission-critical cloud solutions available to agencies. The Armory is built on the FedRAMP authorized Assured Workloads Google Cloud Platform and includes configuration managed Google resources such as VPCs (Virtual Private Clouds), networking components, security controls, identity and access management (IAM) policies, and logging and monitoring mechanisms. The system also provides access to in-boundary tools for automation, configuration management, and account management. Each of these mechanisms has been configured to meet specific regulatory requirements such as International Traffic in Arms Regulations (ITAR), FedRAMP High, and Department of Defense (DoD) Impact Levels 4/5 (IL 4/5). The Armory provides ISVs, Enterprises and Agencies with access to pre-production staging environments and Google “Landing Zones”. These are securely architected environments that enable quick and compliant deployments, and a scalable foundation for their regulated cloud workloads. This secure standardized approach to creating and managing deployments allows government agencies and customers to easily deploy and manage their workloads while maintaining security, governance, and compliance. ISV Partners: Qanapi - As our inaugural ISV Partner, Qanapi’s FIPS-validated API service delivers state-of-the-art encryption and protection at the data level. Designed to safeguard sensitive, industry-regulated, and mission-critical data, Qanapi’s API seamlessly integrates into any software, device, or network. Built on a zero-trust architecture, it ensures robust security across organizations of all sizes, in both the public and commercial sectors. With Qanapi, organizations can achieve the highest level of data protection and compliance, regardless of their environment. Discover more at qanapi.com
Sumo Logic
Sumo Logic

Authorizations

3

Reuse

88

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Sumo Logic is a cloud-native SaaS log analytics platform helping customers enable application reliability, secure and protect against modern threats, gain insights into cloud infrastructures, and obtain comprehensive visibility across their threat landscape. Sumo Logic provides the following solutions within our FedRAMP Moderate product offering: Cloud Security Incident and Event Management (SIEM) - Full-featured SIEM automates alert triage, correlation, and threat detection at scale to speed investigation and response times while reducing analyst alert fatigue. Community analytics delivers machine learning (ML) predicted true positive Global Confidence scores, along with global threat benchmarking. Cloud Security Monitoring & Analytics - Sumo Logic supports the entire spectrum of security use cases - from centrally logging compliance data to monitoring and securing public and hybrid clouds, to delivering market-leading DevSecOps capabilities. Application Modernization and Observability - Reduce downtime by finding, investigating, and resolving customer-impacting issues faster with real-time alerting and dashboards for all data - logs, metrics, and traces. Infrastructure Monitoring - On-call teams can reduce mean-time-to-resolution (MTTR) by simplifying the work required to validate issues, identify suspects, and quickly remediate. Reduce downtime and solve customer-impacting issues faster with an integrated observability platform for all application data. Compliance Monitoring - Security and configuration analytics provide the data monitoring, dashboards, analyses, and reporting capabilities necessary to achieve rapid, cost-effective continuous compliance readiness for many industry leading cybersecurity frameworks and programs - NIST 800-53, FISMA, FedRAMP, PCI, SOC2, ISO, HIPAA and more. Multi-cloud support - Unify and monitor logs, metrics, and traces from multi-cloud or hybrid cloud environments. Sumo Logic enables real-time visibility into AWS, Azure, and GCP cloud applications and infrastructure. Moreover, 150 apps and native integrations give out-of-the-box visibility into the technologies that power your applications. Service Maps - The Sumo Logic service visualizes all service dependencies to give you insights into end-to-end execution of your mission critical transactions with open standard compatible distributed tracing data. Application and service dashboards break down latency, load, and errors to identify services contributing to application slowdowns Advanced Alert Analytics - Advanced analytics are applied across a unified repository of telemetry data to surface noteworthy insights that guide on-call teams to the root cause.
T-Metrics, Inc.
T-Metrics Cloud Contact Center (TCCC)

Authorizations

3

Reuse

2

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
T-Metrics' Cloud Omnichannel Contact Center (CCaaS) solution provides Federal agencies with a secure, customizable, highly flexible, low-risk, and scalable option to improve the experiences of interactions with their constituents. Federal agencies looking to modernize their legacy premises-based contact centers now have a choice to migrate at their pace without compromising security. Building on two decades of innovation and security, T-Metrics’ CCaaS solution is the only single omnichannel contact center in the market that meets both the robust FedRAMP security standards for cloud deployments and the security and interoperability demands of the Joint Interoperability Test Command (JITC) certification for premises-based deployments. Through its flexible architecture, the TM-Cloud Omnichannel Contact Center enables agencies to customize cloud deployment models – public cloud (multi-tenant) and/or private cloud (dedicated instance) - to address different constituent requirements. Strategically designed, TM-Cloud Omnichannel Contact Center capitalizes on cloud architecture to integrate an agency's existing staff with existing customer telephony platforms (e.g., Avaya, Cisco, MS Teams, Zoom, etc.), which minimizes migration and project risk. Agencies can choose cloud, on-premises virtual machine, and/or on-premises physical servers to integrate existing voice services to the TM-Cloud Omnichannel Contact Center. This flexibility allows for zero-maintenance for full cloud deployments. Agencies choosing on-premises integration will provision hardware according to their own requirements and procedures. The TM-Cloud Omnichannel Contact Center can be scaled to accommodate current and future contact center resource demands and requirements. The ability to obtain agent subscriptions in small or large quantities enables organizations to quickly scale to levels necessary to handle even the most dynamic volume, especially for emergencies or seasonal demand. The contact center distributed architecture ensures a high-available and high-performance system is deployed in the T-Metrics FedRAMP cloud. Resiliency, scalability, and advanced feature access were traditionally available to only the largest contact centers with significant capital investment. Through the TM-Cloud Omnichannel Contact Center, these advantages are now available to every customer through flexible monthly subscriptions. The cloud-based service offerings provided by the T-Metrics TM-Cloud Omnichannel Contact Center include the following: - Skills-based and Attribute-based Routing - Interactive Voice Response - Microsoft TeamsTM Integration - Digital Channel Communication - Customer & Agent Callbacks - Voice and Screen Recordings - Analytics and Sentiment Analysis - Quality Management - Section 508 compliance (for agents and callers) - Advanced Agent and Supervisory Dashboards - Standard and Custom Reporting - Self Service Administration Portals - Natural language speech recognition - Voicebots and chatbots To learn more about how the T-Metrics CCaaS solution can satisfy your contact center requirements, please visit https://www.tmetrics.com/industries/fedramp.
Tango
Tango

Authorizations

14

Reuse

13

Service Model
SaaS
Impact Level
LI-SaaS
Status
FedRAMP Authorized
Tango Reserve is a SaaS workplace solution for managing your use of workspaces. Tango provides this the capability to manage conference rooms, assigned seats, hoteling areas, neighborhoods, and provides operational Analytics for workplace optimization efforts. Functionality includes: Scalable instance Solution delivers a workspace hoteling, conference room, and assetreservation system. Secure authentication End user interface(s) to find available places to work and reserve workstations, conference rooms, and resources like equipment, services, health & wellness, parking, and transportation. Allows employees to set profile preferences, check-in, cancel and modify their reservations at their convenience. Add digital signage like Room Kiosks, Lobby Kiosks, Desk Signs, and ID Screens Wayfinding options to locate colleagues to enhance engagement, teamwork, and productivity. Utilize integrations with existing platforms to rapidly adopt and deploy. Self-service administrative tools and capabilities Ability to set limitless configuration of users and space relationships Analytics: Tango Reserve allows operational data to be revealed to understand how your office and people are working. By measuring your office space and managing your workplace operations this supports the agency mission to make data-driven decisions about your workplace and real estate as well as save tax-payers money. In addition to the solutions listed above, Tango customers can also license the extended services through the Tango Core applications: Tango Space Management software helps organizations plan, forecast and operate from a single solution. Space is space planning software to streamline space allocation, plan moves, analyze floor plans, and test potential scenarios. Key features include, CAD integration, stacking and blocking, planning and forecasting, scenario planning, move management, IoT integrations, and allocation reporting. Tango Transactions is built on a foundation of proven analytic capabilities, innovative data sets, native mapping and mobile-first experiences that are required to win in today’s dynamic corporate real estate environment. Key features include scenario development, pipeline management, budgeting, property analysis, mapping, and budgeting. Tango Platform provides both a single source of truth for all location and asset information. Tango’s Program & Project Management software solution organizes project portfolio and aligns activities across budgets & timelines. Provides a program view of all activities, including new builds, retrofits, remodels, closures, and special projects. Tango Projects is a single, integrated solution to align program budgets, timelines, and development activities across portfolio of projects, to quickly identify exceptions and take corrective action. Tango’s Lease Administration and Lease Accounting software brings together lease financials, accounting, and administration to manage all lease activities including options, expirations, renewals, key clauses, co-tenancy, recurring costs, rent rolls, expense reconciliation, and is built to comply with FASB ACS 842, IFRS 16 and GASB 87. Tango Predictive Analytics solutions provide the necessary intelligence to develop smarter location strategies and make better capital investment decisions by combining advanced AI/ML modeling with data in a scalable geospatial analytics platform. Tango Edge, an extension of the company’s Integrated Workplace Management System solution, provides a fully integrated collaboration workspace and communications hub that enables your partners to access and interact with Tango solutions. Agencies leverage these solutions to manage: Hybrid Work – Manage and measure work from any location including WFH (work from home), the office, other Agencies, or coworking locations. Reduce the Footprint – Measure the actual utilization of space for short duration Workplace Surveys as well as continuous, consistent, and systematic measurement of People, Presence, and Workplace use across the entire portfolio year after year. Agencies can cut their office space by up to 50%, as facilitated for GSA’s 1800F HQ in Washington, DC. Tango Reserve Analytics data analysis provides management the support tool necessary to augment space planning and office space invest/divest decisions. Zero Emission Buildings – Through actual utilization measurement, real estate reduction, and shared desk strategies, Agencies can reduce their office space, and thus reduce their Carbon Footprint by up to 50%
TechTrend, Inc.
Federal GovCloud (FGC) DevSecOps

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Federal GovCloud DevSecOps (FGC DSO) combines an array of tools, integrates them together under the FedRAMP umbrella and provides a complete software-as-a-service solution to include hosting, patching and help desk support. FGC DSO enables U.S. federal government agencies to easily adopt practices to enhance software supply chain with a solution to automate development, security, and operations (DevSecOps) practices through every phase of the software development life cycle. FGC DSO SaaS enables rapid adoption of a continuous integration and continuous deployment (CI/CD) pipeline to deliver high quality citizen and public applications through its integrated security validation tools as a managed service. It resides on a FedRAMP authorized government cloud infrastructure and is provisioned as a dedicated suite of tools leveraging a suite of tools and technologies that provide the foundation to implement DevSecOps. Landing zones for applications are cloud vendor agnostic and the FGC DSO platform supports application deployments and secure management of infrastructure on Azure, Amazon Web Services, Google Cloud, low-code platforms (e.g., Power Platform), and on-premises or hybrid environments. FGC DSO has an integrated software factory capability which provides a managed hosting environment for PaaS services as part of the FGC DSO security authorization boundary that allow agencies to obtain application landing zone cloud hosting while meeting zero trust requirements. With FGC DSO, Federal agencies can focus on developing repeatable, modern, and secure applications to support their missions by utilizing a turnkey platform that help to meet federal security mandates. Leveraging FGC DSO will speed up agile application development, security compliance, integration testing, deployment and secure operational monitoring.
TeleTech (TTEC) Services Corporation
Humanify Enterprise - Government (Humanify Enterprise - G)

Authorizations

14

Reuse

13

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
TTEC Digital’s Humanify Enterprise for Government (Humanify G) is a secure customer experience VOIP solution, powered by Cisco’s UCCE and UC Enterprise Software. Designed for agencies with up to 80,000 unified communications endpoints and 24,000 knowledge workers or agents, it allows you to scale as needed to meet citizen demand. By applying technologies like journey orchestration, analytics, and AI/automation you can deliver efficient and intuitive constituent services while reducing overall contact center costs. Key Features Experience Cloud integrates with Humanify Enterprise Workforce Optimization SaaS (WFOaaS Quality Assurance / Call Recording / Desktop Screen Recording, Speech Analytics, and Post Call IVR surveys, powered by Verint) to enable departments and agencies to capture citizen and stakeholder feedback after interactions with contact center agents, and then utilize that input to drive coaching and feedback. TTEC Humanify Enterprise - Government platform users can now obtain the unique value of these solutions working together to drive improvements in citizen and stakeholder service. WFOaaS Quality Assurance / Call Recording / Desktop Screen Recording. The Humanify Enterprise Workforce Optimization Software as a Service for Government Community Cloud provides Quality Monitoring (QM), Contact Recording, Text to Speech Analytics. The service records 100% of voice calls and 15% of contact center agent desktop screen recordings for compliance, transaction verification, and legal protection. Data is stored in a FedRAMP encrypted format and available for playback and analysis and for agent performance scoring. Workforce Management (WFM) provides forecasting, multi-skill scheduling, and real-time adherence for contact center agents. Includes features for workflows, intra-day dynamic scheduling, audit trail reporting, and mentoring requests. The speech-enabled Interactive Voice Response (IVR) enhanced by Natural Language Processing and Natural Language Understanding (NLU/NLP) enables seamless self-service capability through the use of Voice Bot and Chat Bot capability. Experience Cloud, powered by Verint Experience Management Experience Cloud, is a SaaS application platform that utilizes the TTEC Humanify Enterprise - G to make delivering exceptional experiences easy. The Experience Cloud gathers omni-channel experience information from citizens, employees, and digital site visitors and helps to prioritize and provide key insights on ways to improve those experiences. Process and analyze direct feedback from multi-channel surveys, unstructured text data from open-ends and other comment streams, and behavior data from web interactions Automate and speed decision-making with our proprietary Predictive Engine paired with Verint Professional Services guidance Operationalize across all functions with real-time triggers and alerts; custom dashboards for executives, service center managers, and contact center managers and agents; and case management tools for follow-ups when appropriate with a citizen or other key stakeholders Experience Cloud consists of multiple solutions that work either singly or together to capture, analyze, and act on citizen and stakeholder feedback. These solutions include: Predictive Experience allows organizations to measure citizen experiences across channels, prioritize resources effectively, accurately benchmark performance, and bring certainty to their experience programs with proven predictive data science and AI-powered technologies. Digital Experience captures real-time citizen-initiated feedback via web and mobile channels throughout the digital citizen journey, empowering organizations to make smarter, faster decisions to improve experiences. Enterprise Experience enables organizations to engage citizens and employees to understand, analyze, and orchestrate improved experiences, satisfaction, and trust across multiple channels. Text Analytics provides the ability to analyze text information from any text stream, including surveys, comment posts, and others, and to extract key insights found in those text comments around the topics, keywords, and the related sentiment expressed in those comments Unified Experience enables Federal departments and agencies to capture feedback across virtually any channel, combine those feedback channels (and a wide variety of external data sources to enrich the data, correlate the information from disparate sources to create customized data models, and then use those data models to drive collaboration and closed-loop action on the data. Humanify Portal provides easy access to your contact center and unified communications administrative and management tools from a single interface. It increases the flexibility of the platform. It allows end-user administrators to perform Move, Add, Change, and Delete (MACD) activities for phones, personnel, locations, skill groups, agent teams, and many other system elements. It also allows administrators to change routing rules, IVR prompts, call queues, and contact flows. You can also increase the agility of managing your contact center operations with Humanify Portal Mobile, a 100% web-based application for on-the-move access. (508 Compliant) Integration with Contact Center Solutions (Cisco, Genesys, and Amazon Connect) Availability and Support High availability/disaster recovery deployed across two data centers for full failover in the event of an outage 24x7x365 support with one of the largest pools of Cisco-certified engineers anywhere TTEC Digital delivers automated training programs and knowledge systems that enable CX delivery across every channel
Totara Learning Inc.
Totara Talent Development Government Cloud Platform

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
TotaraGov is a FedRAMP® Authorized SaaS Learning Management System purpose-built for federal agencies to meet the complex demands of government-wide training, compliance, and workforce development. Designed with the needs of the public sector in mind, TotaraGov streamlines the delivery of mandatory training, supports workforce upskilling, competency management, and enhances engagement through personalized learning pathways. As the official FedRAMP Edition of Totara’s LMS, TotaraGov is tailored to support the public sector’s mission-readiness goals and works seamlessly with internal government systems. Standard integrations include: • Workflow based SF-182 Request module • Enterprise Human Resources Integration (EHRI) reporting • Microsoft Teams • Content Marketplace connections to leading federal content providers TotaraGov offers a fully managed, secure, and scalable platform that is 508 compliant and aligned with federal accessibility standards. Each major release includes a comprehensive Accessibility Compliance Report (ACR) based on the Voluntary Product Accessibility Template (VPAT), supporting agencies in meeting their inclusivity mandates. With robust functionality designed for enterprise-level training delivery, TotaraGov empowers L&D teams to: • Manage role-based learning paths and personalized audience experiences • Automate compliance tracking and certification management • Deliver and track SCORM/AICC content, instructor-led and virtual sessions, assessments, and more • Leverage a powerful analytics and reporting engine for real-time visibility into training progress and gaps
TRAPWIRE
TRAPWIRE Threat Detection and Analysis System

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
TRAPWIRE is a software platform for detecting and alerting on threats against your assets and personnel in real-time. It provides a comprehensive suite of tools all synchronized and accessible in one centralized, highly secure and encrypted platform, including: - Incident reporting - Pattern analysis - Threat detection - Originator-controlled information sharing - Mass warning and notification - Cross-organizational collaboration The TrapWire Threat Detection and Analysis System is a web-based software-as-a-service offering that provides secure web access to a suite of incident reporting, analytical, and information sharing tools. It bridges disparate agencies into a network of security-focused organizations, where each Agency owns its data and determines what other organizations its users may collaborate with. In addition to secure web access, the following services are available: The TrapWire Mobile App: Enables real-time incident reporting and feedback from the TrapWire Network while in a mobile environment such as VIP or perimeter protection. The TrapWire Community Member (CM) App: Allows organizations to broaden their protection footprint to include the eyes and ears of their communities of interest, empowering them to report suspicious activity in a structured manner through publicly accessible apps branded to each organization’s needs. The TrapWire API: Provides for integration between a TrapWire System deployment and legacy or other enterprise systems, enabling a system-of-systems approach to data integration. The TRAPWIRE Threat Detection and Analysis System brings security organizations into a protection network that detects and alerts on mutual threats spanning time and geography, allowing users to break down stovepipes and interdict threats before they materialize into successful criminal or terrorist acts. The network encapsulates thousands of protected facilities and personnel spanning Federal, State, and Local Law Enforcement; Anti-Terrorism/Force Protection personnel; private/commercial security organizations; and community protection programs. Bringing all sectors together with modern technology and expert analytical support services, while maintaining ""originator control"" principles for each owner's data, empowers a tangible force multiplier effect.
Trellix
Trellix GovCloud Security Platform

Authorizations

4

Reuse

3

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
Trellix GovCloud Security Platform (formerly known as Trellix XDR GovCloud) is a SaaS offering that is deployed on AWS GovCloud IaaS. The SaaS offering is made up of a suite of solutions developed by Trellix. Trellix GovCloud Security Platform enables customers to centrally manage security for their organization while leveraging real-time monitoring and protection of the environment. Machine learning, artificial intelligence, and behavioral analysis are used to detect and respond to suspicious activity based on comparing observed activity to real-world adversarial attack techniques. - Trellix ePolicy Orchestrator (ePO) is a SaaS-based centralized management console for using Trellix's Endpoint solution with enhanced native security controls without the complexity of on-premises infrastructure. The client-side component of Trellix ePO provides secure communication between Trellix ePO and managed products. In addition to downloading and enforcing policies, Trellix Agent performs client-side tasks such as deploying and updating endpoint products. In order to manage an endpoint with Trellix ePO, Trellix Agent must be installed on each system in your network. As an optional deployment method, Trellix also offers the ePO On-prem platform that can be installed on the customer’s premises, as well as in air-gapped environments. - Trellix Endpoint Detection and Response (EDR) provides continuous data collection and advanced analytics that helps you detect suspicious behavior on your endpoints. Using alert ranking and data visualization, you can quickly understand the threat and take immediate action. Trellix ML Protect (formerly known as Trellix Real Protect) is a machine learning cloud which enhances our Endpoints pre-execution machine learning with post-execution to detect dynamic behavior based on machine learning algorithms derived from over a billion sensors and over 30 years of experience. - Trellix Global Threat Intelligence (GTI) is based on activity from millions of sensors world-wide and an extensive research team, Trellix publishes timely, relevant threat activity via GTI. This always-on, cloud-based threat intelligence service enables accurate protection against known and fast-emerging threats by providing threat determination and contextual reputation metrics. GTI integrates directly with our security products, instantly protecting against emerging threats to reduce operational efforts and time between detection and containment. - Trellix Threat Intelligence Exchange (TIE) acts as a reputation broker that combines threat intelligence from imported global sources, such as Trellix Global Threat Intelligence (GTI) and third-party threat information (such as VirusTotal) with intelligence from local sources, including endpoints, gateways, and advanced analysis solutions. Using Trellix Data Exchange Layer (DXL), it instantly shares this collective intelligence across the security ecosystem, allowing security solutions to operate as one to enhance protection throughout the organization. - Trellix Insights is an industry-first proactive security solution that changes the cyber security paradigm with the capability to stop threats before the attack. It provides actionable and preemptive threat intelligence by leveraging Trellix's cutting-edge threat research, augmented with sophisticated AI applied to real-time threat telemetry streamed from over 1 billion sensors. This global insight is applied to assess an organization's environment and its security posture to predict and prioritize actions for the Security Operations Team. - Trellix Helix Connect integrates data from security tools (Trellix native controls and 490+ third parties) to tell you the complete story of an attack. Data is ingested from multiple sources, then correlated by pre-built analytics and rules to create multi-vector, multi-vendor detections.Trellix GovCloud Security Platform (formerly known as Trellix XDR GovCloud) is a SaaS offering that is deployed on AWS GovCloud IaaS. The SaaS offering is made up of a suite of solutions developed by Trellix. Trellix GovCloud Security Platform enables customers to centrally manage security for their organization while leveraging real-time monitoring and protection of the environment. Machine learning, artificial intelligence, and behavioral analysis are used to detect and respond to suspicious activity based on comparing observed activity to real-world adversarial attack techniques.
Trellix
Trellix Email Security GovCloud

Authorizations

8

Reuse

7

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Trellix ESC GovCloud is a SaaS offering that provides advanced protections against modern sophisticated email attacks. ESC GovCloud consolidates advanced threat prevention with traditional Email Anti-Spam and Anti-Virus security to optimize spending, reduce false positives, and enable operational efficiencies through consolidation. ESC GovCloud can be deployed in line to analyze emails and quarantine threats for active protection, or as a passive monitor for 'bcc' type review of each email. With no hardware or software to install, the ESC GovCloud is a particularly good fit for organizations seeking to move their infrastructure into the cloud. This eliminates the complexity of procuring, installing, and managing a physical infrastructure. ESC GovCloud provides organizations several unique capabilities, such as: - Identifying previous targets of spear-phishing, impersonation, virus and spam emails - Locating copies of the malicious email in target inboxes - Finding out if the message is being forwarded to new targets - Detection of advanced malicious URL threats - The ESC Portal shows region- and industry-based malware trends, has customizable security policies, RBAC, and audit logging. Organizations face an ever-increasing number of threats from email-based spam, viruses, and advanced threats. ESC GovCloud uses the signature-less Trellix Multi-vector Virtual Execution™ (MVX) engine to analyze every attachment and URL within emails to detect threats and stop advanced attacks in real-time. Today's advanced attacks use email as a primary delivery mechanism for malicious content. While some attacks use an attachment with embedded malicious code, it is common for cybercriminals to use a malicious link thereby blending attack tactics in the hopes of bypassing today's traditional defense silos. ESC GovCloud uses the cloud-based MVX engine to detonate email attachments against a cross-matrix of operating systems and applications, including multiple Web browsers and plug-ins like Adobe Reader and Flash. To block spear-phishing emails, ESC GovCloud analyzes every attachment using the MVX engine to accurately identify today's advanced attacks. ESC GovCloud includes anti-virus and anti-spam engines and may also be paired with an organization's existing anti-virus and anti-spam email gateways.
Trend Micro Inc.
Trend Cloud One for Government

Authorizations

1

Reuse

2

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Trend Micro offers the leading cybersecurity solution to protect endpoints, servers, and cloud workloads. Deploy security across your endpoints and physical, virtual, and multi-cloud environments to gain unified visibility, management, detection and prevention with Trend Cloud One for Government. Native integrated endpoint and server detection and response (EDR/XDR) sensors allow for quicker detection of complex attacks that bypass prevention. This provides an unmatched understanding of the activity data in your environment and a balanced approach to security, as teams can quickly see the story of an attack and respond faster and more confidently. The platform's real-time prevention and detection capabilities (application control, anti-malware, behavioral analysis, machine learning, EDR, intrusion prevention (IPS), firewall, integrity monitoring, and log inspection) are managed via a single lightweight FIPS enabled agent. This agent is deployed on FIPS supported Operating systems for Windows and Linux on the endpoint, server, or VM being protected. Combined with a rich set of application programming interfaces (APIs), Trend Micro Cloud One for Government allows you to automate security and reduce impact on your teams. Trend Micro Is trusted by 9 out of the top 10 Fortune 500 companies, blocks over 94 billion threats per year, analyzes over 100 TB of threat information per day and processes over 2.5 trillion events per day. We are cyber security experts.
Turning Point Global Solutions, L.L.C
Network Inventory and Optimization Solution (NiOS®)

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP In Process
TurningPoint’s Network Inventory and Optimization Solution (NiOS®) is a comprehensive Telecommunication Expense Management (TEM) and Managed Mobility (MM) system that facilitates enterprise-wide management and automation of telecom ordering, inventory management, bill validation, financial management, and reporting. NiOS® provides US federal, state, and local governments with a single-pane window for telecom lifecycle management. The following are the high-level functional characteristics of NiOS®: • A built-in, customizable workflow enables customers to manage service orders, including move/add/change/disconnect (MACD), port, suspend, and restore requests. • It offers customers a unified view of inventory data, covering all telecom services, such as wireline, mobility, and future technologies. • Assists customers in reconciling and verifying telecom bills against agency contracts, orders, quotes, and inventory; initiates and tracks disputes through resolution. • Provides visibility into budgets, obligated, spent, and available values with projections; and associated system alerts to proactively manage budget and internal customer chargebacks • Allows customers to generate various reports, providing access to accurate, comprehensive insights on spending, enhancing governance, and ensuring cost control. NiOS® is a software-as-a-service (SaaS) application hosted on Amazon Web Services (AWS) GOVCLOUD (US) using a secure, high-availability, multi-availability zones, multi-tenant architecture. The authorization boundary comprises a secure web-based portal, processing modules for data integration, analytics, Application Processing Interfaces (APIs), and supporting databases.
UberEther
IAM Advantage

Authorizations

1

Reuse

1

Service Model
PaaS
SaaS
Impact Level
High
Status
FedRAMP Authorized
UberEther Advantage The UberEther Advantage platform offers a highly secure and easy-to-deploy boundary platform with FedRAMP High and DoD IL5 authorizations based on NIST 800-53 Revision 5 security control requirements. The platform includes two main solutions within the authorization boundary: • ATO Advantage: An empty boundary platform designed to accelerate FedRAMP and DoD authorization for agency solutions and third-party software products. • IAM Advantage: A comprehensive identity and access management (IAM) solution equipped with pre-installed, configured, and optimized IAM tools. ATO Advantage ATO Advantage provides a Platform as a Service approach to satisfy over 355 of the required 425+ technical controls out-of-the-box, which are then inherited by third-party applications when deployed on the platform. This includes the preparation of required documentation and artifacts such as the System Security Plan (SSP) and automated POA&M reports. The platform can help agencies and software vendors deliver their solutions securely at the speed of need. IAM Advantage IAM Advantage delivers an end-to-end identity management solution integrating leading identity and access management products. This includes support for seamless single sign-on (SSO), multiple NIST 800-63 multi-factor authentication options, privileged user management, and separation of duties enforcement. The platform ensures compliance with Continuous Diagnostics and Mitigation (CDM) and EO 14028 requirements. Services: • AppGate Software Defined Perimeter • BeyondTrust Endpoint Privilege Management • BeyondTrust Password Safe • CyberArk Central Policy Manager • CyberArk Digital Vault • CyberArk OnDemand Privileged Manager • CyberArk Password Vault Web Access • CyberArk Privileged Access Management • CyberArk Privileged Session Manager • CyberArk Privileged Threat Analytics • PingAM (formerly ForgeRock Access Management) • PingDS (formerly ForgeRock Directory Services) • PingGateway (formerly ForgeRock Identity Gateway) • Ping IDM (formerly ForgeRock Identity Management) • Nok Nok - Phishing Resistant S3 Authentication Suite • OpenSearch & Dashboards (SIEM & User Behavior Analytics) • Ping Government Identity Cloud • PingAccess • PingAuthorize • PingCentral • PingDirectory • PingFederate • Ping MFA for Government • Radiant Logic RadiantOne Data Management • Sailpoint IdentityIQ (IIQ)
Unison
FedConnect

Authorizations

4

Reuse

3

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
FedConnect provides US Government Acquisition leaders and Contract Officers a secure, full-lifecycle, auditable approach to interacting with vendors and complying with Paperless Contracting mandates. FedConnect is a Federal acquisition and grants portal where vendors and grant applicants can find opportunities for federal contracts, grants, and other types of assistance funding. It was developed to bridge the gap between government agencies and their vendor and grant applicant/recipient communities in order to streamline the process of doing business with government. Through the FedConnect portal, Federal Government representatives are able to issue opportunity requests and make awards via the internet. Company representatives are able to review opportunities, submit bids or proposals, and receive awards. FedConnect provides an open channel of communication with the government that is both secure and auditable. There are three types of government opportunities facilitated through FedConnect: traditional eRFX issuance, Reverse Auction events, and Financial Assistance opportunities, e.g. grants. For eRFX and Financial Assistance opportunities, FedConnect is offered by subscription fee to Federal Government agencies that are federally regulated. For Reverse Auction only, there is no subscription fee to Federal Government agencies. The bidding and winning vendor company is responsible for payment upon award. On the government side, FedConnect is accessed through a system-to-system interface to the Unison Contracting and Grants software applications, where Government procurement and grant representatives become indirect users of FedConnect. On the Vendor/Applicant side, FedConnect is accessed via the internet with a browser. Anyone can access the FedConnect web site and review public opportunities. However, to receive directed opportunities that are not publicly issued, respond electronically, and receive ongoing communications, a vendor/applicant must be registered. To learn more about FedConnect and its capabilities, please visit the public portion of the FedConnect site.
United Solutions
US AI

Authorizations

5

Reuse

4

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
The US AI platform is a managed service comprised of a suite of microapps and microservices built on an AI-powered data lake, zero-trust framework, and hyperscale microservices infrastructure. Using microservices, US AI decomposes complex business components into smaller, autonomous services that are infinitely more scalable. US AI operates under a multi-tenancy model, where customers have the option to leverage the shared tenant to save money or have their own tenant to house their unique data; all while also leveraging the hyperscale community database containing hundreds of millions of valuable, common, and curated records for acquisition, grants, finance, health, and supply chain. A cloud native infrastructure, US AI scales elastically and dynamically, and relies on infrastructure automation and devsecops to optimize the operations and management of the infrastructure. The US AI suite consists of microapps, mobile apps, and microservices that power global business operations through a suite of services: 1. Extreme Innovation Software Factory - Customers may subscribe to (or acquire) the microapps in the US AI app store. Alternatively, customers may host their applications, leverage the native CI/CD pipelines, software libraries, data pipelines, and security controls to launch their applications with speed, quality, and high impact security. Customers may acquire a tenant to run their applications and isolate them from other applications within US AI. Using templates, customers run their applications on their own Kubernetes clusters across multiple high impact clouds such as Amazon Web Services, Google Cloud, and Microsoft Azure. Customers may acquire access to a curated community data lake consisting of over 50 public data sets for acquisition, finance, supply chain, healthcare, insurance, etc. 2. Archangel - Archangel demystifies, automates, and streamlines the cybersecurity lifecycle, from Governance, Risk, and Compliance (GRC) to Continuous Diagnostics and Mitigation (CDM). Cloud Service Providers (CSPs) and security professionals apply AI to eliminate redundancy, digitize workflows, and automate security accreditation by predicting compliance with security controls. Additionally, CSPs and security professionals apply Blockchain, AI, and RPA to continuously monitor device logs and predict vulnerabilities and breaches. Lastly, security, supply chain, and risk management professionals apply AI to predict global security and supply chain risks. 3. Certior – Certior is a highly accessible solution for providing unparalleled traceability, provenance, and auditability to any level of granularity an organization wishes to track to. Certior accomplishes this by letting organizations model and set up tracking for their various products and supply lines through easy-to-use point and click configuration. Without needing developers, you have a great amount of control over what gets tracked when, by whom, and to what level of detail. 4. Evolution - Evolution applies a low-/no-code process configuration designer to empower customers to facilitate, manage, and monitor the movement of individuals entering and leaving any secured locations; requesting services; and receiving services including, but not limited to passport, visas, asylum, healthcare, transportation, etc. 5. Forsight - Forsight is a novel general purpose AI platform that uses unsupervised and supervised machine learning to collect, sanitize, curate, and index both structured and unstructured acquisition, emergency response, finance, grants, health, and supply chain data within a high performing, parallel processing data lake. Forsight facilitates the extraction of crucial business insights and predictions for price optimization, compliance, risk, fraud, etc. Lastly, Forsight connects humans to the AI workflow to train the machine to make better predictions. 6. Gini - Gini applies Blockchain, AI, and RPA to intelligently automate the grants life cycle, institutionalize a standardized pre-award risk framework, and reconcile financial ledgers throughout the grant ecosystem. Grants professionals and recipients use the digital dossier to share data and reduce recipient burden and administrative costs. Gini runs on hyperscale community database that consolidates, curates, and indexes over 100TB of data from 30+ public and private data sources. Gini uses AI to scan millions of records of data including single audits to extract key findings, including but not limited to financial health; procurement, suspension, and debarment; improper cash management; excessive executive pay, eligibility; etc. 7. Illuminate - Illuminate is a collection of emerging technologies that power a state-of-the-art supply chain ecosystem. Contracting professionals leverage intelligent automation to accelerate acquisition, make smarter buys, and ensure compliance. Additionally, contracting professionals leverage AI to automate contract formation, administration, and closeout. Lastly, supply chain leaders use Blockchain and AI to track the provenance of goods and services and “illuminate” areas of inefficiencies. 8. Siqi - Siqi is a collection of emerging technologies that power a state-of-the-art healthcare ecosystem. Siqi uses mobile and micro apps to collect vital personal health information and save transactional information onto a blockchain. Personal digital identity and health records are protected via encryption and self-sovereign identity. Siqi uses AI to predict the presence of disease such as COVID, skin cancer, etc. and provides an immutable digital provenance for contact tracing and disease analysis. 9. Velicus – Velicus applies Blockchain and AI to combat global pandemics by transforming the global emergency response through a coordinated ecosystem. Velicus facilitates the global emergency response process to pandemics like COVID-19, Ebola, SARS, MERS, etc. Participants in the emergency response value chain can track the geolocation, health, and safety of responders, connecting to their deployment force anywhere in the world. AI is used to match responders to an event based on requirements such as skill, education, mental health, etc.
United States Department of Agriculture
USDA Digital Infrastructure Services Center

Authorizations

4

Reuse

9

Service Model
IaaS
PaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The USDA's Digital Infrastructure Services Center (DISC) is a federally-owned Cloud Service Provider for systems that are owned by Federal, State, and Local governments. The USDA DISC offers both IaaS and PaaS services to its customers on Midrange and Mainframe infrastructure, with a variety of operating system platforms and database options to choose from in a fully virtualized hosting environment. Network services are provided for both IaaS and PaaS environments, and offer robust, secure and highly redundant connectivity to the USDA WAN and the Internet. Additional information about these services is available here (http://www.ocio.usda.gov/about-ocio/data-center-operations-dco). The USDA DISC Service Catalog is available here (http://www.ocio.usda.gov/document/nitc-service-catalog) The USDA DISC Infrastructure as a Service (IaaS) offering provides a virtual machine infrastructure which allows customers the option to maintain control of their operating and general support systems at the system level. Network, Facility and Operational Support Services are included with all IaaS offerings. Security monitoring and defense in depth for all IaaS servers is provided via periodic vulnerability scanning with best-in-class software. IaaS customers receive the benefit of fully managed standardized hardware, advanced server virtualization, strict standards, security and economies of scale from DISC. The USDA DISC's Platform as a Service (PaaS) offerings build upon IaaS offerings and enable customers to select from secure, standardized Operating System images that are configured to meet actual processing requirements. The PaaS service offering provides fully managed Operating Systems that are maintained by USDA DISC. These hardened and virtualized operating systems leverage advanced server virtualization technologies, compliant security and build standards, and economies of scale. The PaaS offering enables rapid delivery of cost-effective, fully-managed operating platforms offering expanded controls to securely host customer's mission critical applications. This USDA DISC PaaS offering is currently available for multiple operating systems, including: RedHat Linux, Microsoft Windows, Oracle Solaris, IBM AIX, and zOS. The DISC PaaS Service offering also fully supports many database offerings, including: mySQL, MSSQL, Oracle and DB2. Security services offered by USDA DISC, as part of all standard service offerings, are implemented and monitored through Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) solutions. In addition to the FedRAMP Moderate security control baseline, the USDA DISC has implemented FISMA High security controls for all service offerings and FedRAMP+ DoD Impact Level 4 (IL4) controls within the Midrange PaaS service offering.
Veracode
Veracode Online Security Platform for Government

Authorizations

4

Reuse

45

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Veracode's unified platform helps Government developers and application security teams assess and improve the security of applications from inception through production. With a combination of automation, process, and speed, Veracode integrates application security into the software lifecycle, effectively eliminating vulnerabilities during the development/deployment chain. This solution is widely used by enterprises to secure web, mobile, legacy, and third-party enterprise applications, with a simpler and more scalable way to help reduce software security risk across software infrastructure. Through its FedRAMP offering, Veracode offers the ability to test all the code for your applications, including code you write yourself (with Static Application Security Testing or SAST), open-source libraries (with Software Composition Analysis or SCA), and web-based applications (with Dynamic Application Security Testing or DAST). We also provide eLearning for training in secure software development practices, helping developers learn to fix security issues and avoid introducing new ones. Veracode's cloud-based model helps scale software security for both small teams and large agencies, without requiring the cost, up front setup, and maintenance of on premise offerings. Additionally, Veracode provides all the security expertise, program planning, education, and remediation guidance that security and development teams need to build a robust application security program.
Verizon
Verizon Managed SD WAN

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
High
Status
FedRAMP Ready
Verizon Managed Software Defined Wide Area Network (SD WAN) Description: Verizon offers a FedRAMP High Ready SD WAN managed solution designed to help optimize network performance, enhance security, and simplify operations for our federal government clients. Key Features - Dynamic Path Selection: Intelligent routing based on real-time network conditions to help optimize application performance. - Application-Aware Routing: Prioritization of your critical applications to help ensure performance even during peak congestion. - Secure Connectivity: Built-in security features, including Zone-Based Firewall (ZBFW) and FIPS 140-2/3 encryption certified equipment, for robust threat protection. - Transport Agnostic: Supports various transport options including Verizon Private IP (PIP/MPLS), Verizon Internet, and third-party transport. - Centralized Management: Centralized dashboard for easy network configuration, monitoring, and management of your entire network Benefits Provides a complete solution with a simplified experience that seamlessly integrates with the Verizon Government Cloud and Verizon network infrastructure. - Improved Efficiency: Save time and reduce operational complexity with streamlined, automated deployment and orchestration. - Network Modernization: Simplify and modernize network operations, freeing up valuable IT resources, with centralized management and automation capabilities. - Reduced Costs: Minimize reliance on expensive specialized expertise and leverage cost-effective transport options through application-aware routing. - Enhanced Security: Protect your network and data with a multi-layered security approach. - Agile Connectivity: Choose flexible and scalable network connectivity adaptable to your changing needs. - Service Capabilities: Manage your network through our customer portal providing access to your inventory, incidents, network performance reporting, and more self-service capabilities.
VLogic Systems, Inc.
VLogicFM

Authorizations

1

Reuse

0

Service Model
SaaS
Impact Level
LI-SaaS
Status
FedRAMP Authorized
The VLogicFM® system is designed to provide users with real-time information about facilities that are managed within the system. System Function or Purpose The VLogicFM system provides users with an overview of facilities usage as well as output data from sensors installed within the various facilities (e.g., motion, temperature, and humidity sensors). The VLogicFM system achieves this goal through the use of multiple modules that end-users can access via the VLogicFM Graphic User Interface (GUI). VLogicFM is composed of the following modules. Administration Module The Administration module provides a set of tools and utilities that allow administrators to manage user accounts and credentials, set up locations properties such as Sites, Buildings and Floors, and manage overall Access Control. Reports of background data and a Logbook of the activities in all modules by all users are also included in the Administration module. This module is accessible only by Administrators. As-Builts Module The VLogicFM As Built module provides a secure cloud-based repository of master as-builts CAD drawings, organized by site, building, floor and discipline. It facilitates sharing of drawings with professionals like engineers, construction managers, project managers etc. Stakeholders with access privileges can collaborate my notating ideas and comments right on the drawings for later discussion and decision-making. The As-Builts module also provides for drawings version control management, to keep track of all drawing iterations, and maintain an archive of all past versions. Assets Module The VLogicFM Assets module provides a repository to store an inventory of facility assets. In addition, this module maps these assets to their location on facility floor plan drawings. This allows the user to not only list specific assets but also mark asset locations right on the CAD floor plan drawings—rapid identification of an asset AND its floor plan location simultaneously. The Assets module lets you add asset attributes, documentation, and attach asset pictures. Finally, you can also conduct asset audits using the companion VL Audit Android/iOS app for scanning asset and room bar/QR codes. Capital Asset Inventory (CAI) Module Each VA Medical Center is obligated to periodically submit a Capital Asset Inventory (CAI) report to its VISN office and ultimately to VA Central Office. Part of this VA report includes over 90 specific facility-related CAI space drivers that must be assigned to every space in the facility. The VLogicFM CAI module was custom-made specifically for the VA and includes all of these mandatory CAI space drivers. Users can assign these CAI space drivers to every space in the facility. This allows users to leverage VLogicFM to rapidly generate facility-related CAI reports for use in their periodic CAI submissions. What used to take weeks of manual effort can now be done in minutes. Employee Module The Employee Module manages assignments of employee lists to specific spaces on the CAD floor plan drawings by role/title or name. This module allows a facility to show how different organizations are stacked in the facility and also provides tools for moving employee room assignments across the facility. Fire and Life Safety Module The Fire and Life Safety Module facilitate organized documentation of the Fire Protection system linking riser diagrams, floor plan drawings and any other available documents. Connectivity information and other details required for maintenance of the system can be attached to the components and fixtures, which can be viewed in the context of the floor plan drawing. Datasheets, photographs, notes, etc. can be attached to any component of the system. Locating components like Fire Alarm Control Panel, Smoke Detector, Pressure Gauge, etc. can be done through simple search and report options. Plan Room Module The Plan Room is a virtual library for storing digital facility drawings and related files. The module supports up to 70+ file formats. Customer administrators can set access permissions at the user level. Users can search the documents/drawings using keyword and advanced search options and download the documents for which they have access permissions. Real Property Module The Real Property Module is intended for Tenants, Landlords and Brokers. It enables Facility Managers to keep track of their leased spaces and manage their leases effectively. This module lets users manage lease details such as Lease Type, Lease Property Type, Lease Category, Execution Date, Commencement Date, Expiry Date, Landlord/Tenant name, Lease Area and any other information that needs to be associated with the lease. Scheduling Module The Scheduling module is a robust room and desk booking/reservation system that enables everything from conference room reservations to hot desking bookings for hybrid work environments. Users can search for rooms they want to schedule by capacity, location, and even what amenities are provided in the room (AV equipment, white board, etc.). A check-in system is also deployed to mitigate against users overbooking spaces. Space Module The Space module is at the core of VLogicFM’s space management capabilities. The module pairs a powerful cloud-based MS SQL database with accurate CAD drawings, also stored on the same cloud repository. The combination of these two resources gives users the power to not only locate lists of rooms and room attributes, but also run distribution reports that colorize different rooms by Service Line / Department or other attributes. The Space module also provides the user with a range of reporting options to gauge trends, usable and chargeable areas and cost per square foot. Tracking Module The Tracking module uses IoT-based sensors installed in the facility to render objective occupancy data in real time. This module is currently used by VA users to assess occupancy trends for use cases such as space planning and load balancing / utilization of patient exam rooms between different service lines, clinics and sub-clinics. Utilities Module The Utilities Module facilitates organized documentation of the Utilities Systems linking riser diagrams, floor plan drawings and any other available documents. Connectivity information and other details required for maintenance of the utility system can be linked to the components and fixtures. This allows users to display how parts of these systems are connected to one another in the context of the floor plan drawing. Data sheets, photographs, notes, etc. can be attached to any component of the system to facilitate easy maintenance. Locating components like Flow Control Valve, Smoke Detector, Pressure Gauge, etc. can be done through simple search. Users see lists of components next to these same components blinking on the CAD floor plan drawings. Work Order Module The Work Order module can manage scheduled preventive maintenance activities as well as ad-hoc work request-based service activities. Work orders are generated based on previously defined PM schedules, or other service requests from users. Work orders contain information about a maintenance activity, such as where and how it is to be done, who is supposed to do it, and the supplies needed to complete the task. They keep track of the maintenance activities performed, time taken and cost information that is used to generate reports for planning and analysis.
Wasabi Technologies
Wasabi GovCloud (WGC)

Authorizations

0

Reuse

0

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Ready
Wasabi GovCloud is a dedicated cloud object storage solution specifically designed for Federal, State, and Local Government agencies. It addresses the unique needs of government workloads by providing secure and compliant storage for critical data, including backups, disaster recovery, and long-term archives. Wasabi GovCloud provides on-demand access to a scalable and reliable cloud object storage platform, empowering government agencies to modernize their data storage infrastructure, improve data security and compliance, and optimize their IT budgets while accelerating digital transformation initiatives. Key features include: Enhanced Security: Built with robust security measures to meet stringent government compliance and security requirements. Predictable Pricing: Offers transparent and competitive pricing with no egress fees, making it cost-effective for government budgets. S3 Compatibility: Seamlessly integrates with existing applications and workflows utilizing the industry-standard S3 protocol. Scalability and Flexibility: Provides the ability to easily scale storage capacity up or down based on changing data volumes and agency needs. Improved Efficiency: Streamlines data management and enhances operational efficiency through features like granular user access controls and flexible permission management. Wasabi GovCloud is authorized in compliance with HIPAA, GDPR, UK GDPR, CJIS, FINRA/SEC, and TPN requirements to ensure the security, durability, availability, immutability, and interoperability required for sensitive government data. Wasabi GovCloud is only accessible to U.S. entities, all vetted with a rigorous screening process.
WingSwept
Case Management & Tracking System (CMTS)

Authorizations

5

Reuse

4

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
WingSwept has provided case management solutions to investigators at government agencies for more than a decade. WingSwept converted its Case Management & Tracking System (CMTS) into a Commercial Off-The-Shelf (COTS) service offering in 2010. Built with both security and flexibility in mind, CMTS provides for the secure storage, retrieval, and reporting of case management data for investigative offices at all levels of government. The CMTS design is neither static nor monolithic. Intentionally flexible, CMTS provides government agencies with the ability to establish unique naming conventions, tailor agency-specific workflows, and to support a wide range of other user-preferred configurations. An idle-case tracking function also includes both time and activity-based notifications in order to establish and maintain a seamless agency workflow. As an added layer of security, each CMTS customer operates in a secure environment with data separated by customer. Hosted on Amazon Web Services (AWS), CMTS is a web-based, browser-accessible application that requires no device-specific software for implementation. Highly customizable dashboards, combined with specialized labels and entry fields provide investigators with the ability to compile and display comprehensive case metrics in a simplified, user-friendly format. CMTS can display ad-hoc and pre-defined reports in minutes, drastically reducing processing times and increasing staff efficiency. This flexible design allows agencies to tailor workflows in order to match existing processes and to provide for continuity in ongoing investigations. As a result, CMTS may be readily adapted to serve investigative offices of any size. Many of the CMTS customers leverage our optional Online Intake Service (OIS) which allows customers to host or leverage OIS hosted internet facing forms which can collect case intakes to be later securely picked up by the agency CMTS server for potential ingestion as a case.
Xerox Corporation
Xerox Managed Print Services for US Government

Authorizations

3

Reuse

2

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
Xerox Managed Print and Capture Services (MPCS) for US Government is a cloud-based solution developed specifically to help US Federal, State, and Local government agencies manage the print and document capture life cycles within an organization while maximizing productivity, security and reducing waste and risk. The Xerox Managed Print Services (MPS) capability is a management solution for both Xerox and Non-Xerox print/imaging devices such as printers, multi-function devices, and copiers. Managed print services focus on the management of print output devices themselves, related supplies, and service requirements. The solution ensures proactive device management resulting in maximum uptime, utilization/optimization, and robust print and security policy management. Xerox Capture Services provide advanced multichannel capture, digitization, and data transformation to help government agencies achieve digital transformation goals. Digitization and imaging services can be provided on-site, near-site or off-site. Digitization can be combined with data transformation, process automation, and electronic document management solutions to ensure optimal speed and productivity. Xerox Connect for Microsoft OneDrive FedRAMP Authorized and Microsoft 365 FedRAMP Authorized apps are developed specifically to help US Federal, State, and Local government agencies securely connect their Xerox ConnectKey Enabled multi-function devices to the Microsoft Government Community Cloud Environment (GCC). These apps will allow users to choose scan or print workflows, navigate directly to their file or folder, and convert to popular Microsoft Office formats directly from the User Interface of the device.
XTec, Incorporated
AuthentX Cloud

Authorizations

2

Reuse

1

Service Model
SaaS
Impact Level
High
Status
FedRAMP Authorized
The AuthentX Cloud provides end-to-end identity, credential and access management to US Federal agencies, quasi-federal agencies, and private organizations that require interoperable identity authentication services with Federal systems and infrastructure. The primary use of AuthentX in the Federal government is to satisfy Homeland Security Presidential Directive #12 (HSPD-12), Federal Identity, Credential and Access Management (FICAM) and related policies, mandates and standards from the Office of Management and Budget (OMB), Department of Homeland Security (DHS), and National Institute of Standards and Technology (NIST) Special Publications (SP). Therefore, the AuthentX Cloud solution offered is aligned with federal mandates and high assurance requirements regarding cybersecurity, multi-factor authentication, Federal interoperability, and secure solutions for consolidation of data centers. The AuthentX Cloud consists of COTS hardware, software, and network components assembled and connected in multiple data centers. Hardware includes the XTec AuthentX XaNode appliances, the XTec AuthentX Secure Appliance (ASA), enrollment and issuance peripherals, the XTec XNode and XTec card readers, and Thales SafeNet Hardware Security Modules (HSM's). The software of the AuthentX system is built entirely from source to produce the AuthentX Linux Operating System (OS), customized embedded Microsoft OS, the AuthentX Enrollment Manager application, as well as other software packages. XTec's AuthentX Cloud also provides Hardware Security Module (HSM) as a Service using Thales Trusted Cyber Technologies' (TCT) flagship Luna T-Series HSM. This cloud-based HSM, known as Luna as a Service, allows customers to generate, store, protect and manage cryptographic keys used to secure sensitive data and critical applications. The Luna T-Series HSM at the core of Luna as a Service is FIPS 140-2, Level 3 certified, and is approved for use in National Security Systems PKI. XTec's AuthentX Cloud Luna as a Service is offered using three (3) models: - Luna as a Service Dedicated HSM provides customers full cryptographic control of the entire HSM. - Luna as a Service Managed HSM provides customers HSM cryptographic capabilities in a scalable, cost-effective model. Administrative tasks such as provisioning, configuring, monitoring, and patching are all performed by U.S.-based Luna as a Service engineers. - Luna as a Service Credential System provides customers a cloud service model of Thales TCT's Luna Credential System (LCS). LCS offers multi-factor authentication by maintaining user credentials in a centralized hardware device that is securely accessible through the cloud service by endpoints in a distributed network. LCS is a multi-purpose, secure credential system ideally suited for an environment in which the endpoints, or users cannot use a traditional authentication token.
Zoom Video Communications, LLC
Zoom for Government

Authorizations

49

Reuse

56

Service Model
SaaS
Impact Level
Moderate
Status
FedRAMP Authorized
The Zoom for Government Platform is a Zoom product offering for the US Federal, and US Department of Defense communities. The Zoom for Government Platform is an all-in-one collaboration platform that makes connecting easier, more immersive, and more dynamic for people and businesses. Zoom for Government FedRAMP JAB authorized products include: - Zoom Cloud Video Conferencing - a cloud-based collaboration service which includes video, audio, content sharing webinars and collaboration. -Zoom Events - is a versatile platform that allows customers to create a variety of engaging virtual experiences for attendees. Events allow for users to manage their own branded event hub, track ticketing and registration, control user access from one dashboard, and allow networking during Zoom Events. - Zoom Rooms - software-based group video conferencing for conference and huddle rooms that run off-the-shelf hardware including a dedicated MAC or PC, camera, and speaker with an iPad controller. - Zoom Whiteboard - provides customers with a set of easy-to-use tools to collaborate together to capture ideas, processes, and concepts. With features focused on fostering innovation, Zoom Whiteboard makes it simple for hybrid teams to interact in new ways for seamless collaboration. - Workspace Reservation - is a solution that enables customers to reserve flexible workspaces ahead of time or when they arrive at the office. Feature is enabled by the customer admin via the Zoom administrative portal and available workspaces are managed in the Room Management service. - Zoom Mesh - is a native client-based Mesh (eCDN) solution for Zoom Webinars and Events, that allows organizations to better manage how their users receive Webinar and Event media streams. It is all built within the existing Zoom for Government Client, subscribing to Zoom Mesh activates the ability of the Zoom for Government client to allow Mesh through customer designated client for meetings and Webinars. No transport or encryption is changed in the Mesh client communication with the Zoom for Government security boundary. - Continuous Meeting Chat allows meeting participants to communicate before, during, and after a meeting by creating a dedicated group chat in Zoom Team Chat for all meeting participants. When enabled, in-meeting chats will show up in that group chat as they are sent in the meeting, allowing meeting conversations to continue after a meeting ends. Schedule a recurring meeting and have a group chat that follows the group for the entire project, in and out of meetings. - AI Companion for ZfG, Zoom for Government’s generative AI assistant, empowers individuals by helping them be more productive, connect and collaborate with teammates, and improve their skills. AI Companion for ZfG is a set of generative AI features that can be enabled within the Zoom for Government platform. - Zoom Team Chat - send chat messages in public or private channels organized by projects, teams, or topics with the ability to share files, emojis, screenshots, and more. - Zoom Phone - a cloud-based phone system with traditional PBX features, integrated PSTN connectivity, enhanced emergency services, and support for calling from mobile apps, desktop apps, and legacy desk phone devices. - Zoom Contact Center (ZCC) - is an omnichannel contact center that's optimized for video and integrated into the same Zoom experience. Zoom Contact Center brings unified communications together with contact center capabilities. ZCC builds off the FedRAMP Authorized service Zoom Phone. ZCC is administered in the Zoom for Government administrative portal. - Zoom API - provides the ability for developers to easily add Video, Voice and Screen Sharing to your application. Our API is a server-side implementation designed around REST. The Zoom API helps manage the pre-meeting experience such as creating, editing, and deleting resources like users, meetings, and webinars. - The Zoom Meeting SDK - lets you display the familiar Zoom meeting and webinar experience in your app or website. The Meeting SDK interface resembles the Zoom client, except that it lives inside your own app or website. - Zoom Client - a local client that allows users to start/join a meeting, employ in-meeting controls for participants, hosts, and co-hosts, webinar controls, manage participants, share screen controls, chat, establish channels, add contacts, and modify settings. - The Zoom for Chrome PWA - allows customers to use FedRAMP authorized services Chat and Phone- , currently available on the desktop client or mobile app, within the Chrome web browser. - QSS - enables enterprise organizations to identify, troubleshoot, and resolve network and service disruptions in near real time for every user, host, and participant across Zoom Meetings, Webinars, & Phone (all FedRAMP authorized services) within their enterprise subscription. The change introduces a new Webhook API to the boundary to transfer this information over TLS 1.2 to customer owned tooling.