GovWin
B2G is moving!
Blogs posted after May 22, 2015 will be located on Deltek's central blog page at www.deltek.com/blog.
Just select the "B2G Essentials" blog to continue to receive this valuable content.
Top Information Security Contracts FY 2009 to 2014

Analysis of historic federal information security spending reveals where agencies are investing the most.

Methodology

As part of the research and analysis completed for the recent Federal Information Security Market, 2014 to 2019 report, the Federal Industry Analysis Team explored reported spending on information security across the government. Historic spending data was collected using a non-definitive selection of 24 information security related keyword searches on FPDS.gov. The resulting 224,297 contracts were culled down to 33,233 through further analysis. This analysis reviewed the initial set for IT-related product or spending (PSC) codes, duplicate entries, and as well as security related contract descriptions.

 

The report includes findings from the over 33,000 contracts, which provide an approximate baseline total contracted value for security contract awards that can be used to assess the overall size and composition of historical federal information security spending from FY 2009 to FY 2014. The discussion in this blog addresses findings associated with the top 50 contracts from that set.

Findings

The top 50 contracts spread nearly $1.4 billion in funds across 11 different federal agencies.

Conclusions

Over the past five years, agency top contracts have provided security related products and services including compliance with security mandates (e.g. HSPD-12), encryption devices, enterprise identity management, and technology support services. While some of these awards are through stand-alone contracts or dedicated security programs, a number are associated with agency preferred contract vehicles. Going forward, agencies aiming to implement enterprise solutions or streamline costs are likely to continue leveraging existing channels to address security capabilities.

 

----------------------------------

Originally published in the GovWin FIA Analysts Perspectives Blog. Follow me on Twitter @FIAGovWin.

Comments (Comment Moderation is enabled. Your comment will not appear until approved.)