Blog

ISO 9001: 2008 Certification Earned By Government Acquisitions, Inc.

iso_9001

Pittsburgh, PA  January 11, 2016 – SRI Quality System Registrar is pleased to announce that it has recently awarded an ISO 9001:2008 Management System certificate to Government Acquisitions, Inc., located in Cincinnati, Ohio, for the provision of Information Technology products, solutions and services in the areas of Big Data Analytics, Cloud Computing, Data Center Modernization, Network Modernization, Cyber Security, and Mobility & End User Computing.

According to Edward L. Maschmeier, Director, Certification: “We are pleased to acknowledge that Government Acquisitions, Inc. has demonstrated effective implementation of a management system.  ISO 9000 certification provides evidence to customers, suppliers, employees, and their community of their commitment to producing a quality product (service) and providing customer satisfaction.”

ISO 9001:2008 is process-based; certification recognizes organizations that can link business objectives with operating effectiveness.  Companies that achieve management system certification to ISO 9001:2008 have demonstrated effective implementation of documentation and records management, top management’s commitment to their customers, establishment of clear policy, good planning and implementation, good resource management, efficient process control, measurement and analysis.  Continual improvement has been institutionalized.

SRI Quality System Registrar is an internationally accredited registrar for management systems standards, such as ISO 9001, AS9100, ISO/TS 16949, OHSAS 18001, ISO 13485, ISO 20000-1, ISO 27001, ISO 22000 and environmental management systems standards such as ISO 14001, RC14001, and RCMS.  SRI also provides public training for auditing, implementing, and maintaining these standards.

CONTACT at Government Acquisitions, Inc.:

Leslie Egan

720 E Pete Rose Way

Suite 360

Cincinnati, Ohio 45202-3576

703-400-6636

Leslie.egan@gov-acq.com

CONTACT at SRI:

Jennifer Jackson

300 Northpointe Circle, Suite 304

Seven Fields, PA 16046

724-934-9000 Ext. 660

jjackson@SRIRegistrar.com

 

News, Press Releases

Government Acquisitions, Inc. Launches New Hyperconverged Analytics Platform Solution

CINCINNATI, OH, Oct. 26, 2015 – Government Acquisitions, Inc. (GAI), a leading Federal Information Technology (IT) solutions provider and small business, today announced the launch of their Hyper Converged Analytics Platform (HyperCAP) – an end-to-end data analytics solution. Integrated and optimized with best-of-breed commercial-off-the-shelf (COTS) technologies from Dell, Palo Alto Networks, Nutanix, and Splunk Inc., the HyperCAP solution enables Federal agencies to harness powerful analytics for IT and security operations.

The base of the solution infrastructure, the Dell XC Series of Web-scale Converged Appliances, powered by Nutanix, provides the underlying server and storage resources to run I/O disk intensive workloads. Designed to easily deploy, manage and incrementally scale, the infrastructure lowers the total cost of ownership for agencies. Serving as a security analytics platform, Splunk’s solutions collect, index, and analyze machine-generated data for threat correlation, security reporting, and data breach investigations. Finally, the Palo Alto Networks next-generation security platform safely enables applications and prevents threats known and unknown – protecting agencies from successful breaches at all stages of the attack life cycle.

“Over the last five years, there has been a 650 percent increase in cyberattacks on Federal agencies. We’re excited to announce a fully integrated cyber solution, thanks to the partnership of industry-leading OEMs and ISVs: Splunk, Dell, Nutanix, and Palo Alto Networks,” says Jay Lambke, President, GAI. “Most customers are familiar with the hardware and software offered by each OEM. GAI pulls these best-of-breed pieces together and fully integrates them on the back-end, delivering a comprehensive solution. Agencies can implement more quickly and with significantly less risk.”

The HyperCAP solution:

  • Performs network forensics and Advanced Persistent Threat (APT) analysis
  • Identifies privileged accounts and executes compliance monitoring
  • Obtains holistic views of agency security posture and network hygiene
  • Investigates and responds to threat alerts and trends
  • Determines malware impact across agencies
  • Provides cyber forensic analysis for incident responders

“With HyperCAP, the whole process of detection to remediation is compressed into a few seconds, providing agencies with real-time situational awareness,” says Prem Jadhwani, chief technology officer, GAI. “And, the HyperCAP solution is fully integrated on the back-end. As the amount of security data ingested increases, agencies can scale efficiently and effectively.”

For more information, please see HyperCAP webpage

About GAI

GAI is a Federal IT solutions provider with more than 25 years of dedication to Federal missionsuccess, and a performance culture to power real innovation. A mission mindset is in our DNA. We understand that success is driven by partnership, process, and technology. GAI’s experienced team members work side-by-side with Federal IT executives and industry-leading OEM partners to modernize, optimize, and deliver unparalleled mission support. To learn more, visit www.gov-acq.com or call (513) 721-8700.

News, Press Releases

Splunk GovSummit 2015

Join Government IT, Security, Program and Management professionals October 22, 2015 at the Marriott Marquis in Washington, DC to discuss how government is using data today to make a big difference in the future. Whether your agency has future sights on improving its security posture, maximizing value of services delivered or driving efficiencies, GovSummit sessions and discussions will provide you with insights on how to optimize your data to enhance mission delivery and pave the way for the future. Register Here

Events

July 2015 GovLoop Guide Interview with our CTO, Prem Jadhwani, on “How Data Analytics Drives Mission Outcomes”

Most of us don’t think twice before powering up navigation apps, weather apps and other nifty resources on our mobile devices. Apps such as Zillow and Trulia put housing market data at our fingertips, and the travel search engine KAYAK has made shopping for flights, hotels and rental cars that much easier.

Besides the ease of use that these apps provide, they share another common denominator: Each is powered by government data.

For far too long, the government’s data assets have been locked away in siloed systems, in less-than-ideal formats and with little incentive for agencies to share data across bureaus or with the public.

But that’s changing. The open data movement is driving government to make its data more accessible to the public in formats that people can use. As a result, entrepreneurs and everyday citizens are developing applications that benefit both the public and government.

Agencies are realizing that open data leads to better citizen engagement, increased transparency around government operations and better decision-making. Open data is empowering government officials and citizens to make informed decisions about health care, sustainability and transportation issues. Making data open and accessible to the public enables the government to tap into the knowledge and expertise that exists far beyond its walls. The benefits are endless.

Clearly, it’s more important than ever to understand how to implement and benefit from open data at your organization. That’s why GovLoop has created our latest guide, “The Open Data Playbook for Government.”

In this playbook, we offer helpful tips to solve some of your most pressing open data challenges, including measuring return on investment, boosting public engagement and much more. This playbook will help you:

  •  Identify key tenets of an open data program.
  • Show the impact of your program.
  • Explain the benefits of open data.
  • Increase public engagement with your data.
  • Make data more accessible and easy to use.
  • Identify key roles and responsibilities for your data team.
  • Develop partnerships with the private sector.

In this playbook you’ll also find practical examples and lessons learned from government Chief Data Officers (CDOs) and open data enthusiasts who are embracing open data to improve transparency and make better decisions.

 

News

Government Acquisitions, Inc. Awarded NIH CIO-CS Contract

Government Acquisitions, Inc. (GAI) is pleased to announce that we have been awarded a NIH CIO-CS GWAC contract vehicle.

NIH CIO-CS is a 10-year, Government-Wide Acquisition Contract (GWAC) for IT commodities/solutions that can be used by any Federal civilian or DoD agency to fulfill mission critical requirements while meeting their socioeconomic goals.

Additional Information can be found here

News

March 2015 GovLoop Guide Interview with our CTO, Prem Jadhwani, on “Crafting Holistic Insider Threat Protection”

Many news outlets declared 2014 to be “The Year of the Breach,” especially for government. The title seems appropriate. Last year, the U.S. Postal Service (USPS), the Nuclear Regulatory Commission, the State Department, and even the White House fell victim to successful hacks that resulted in sensitive information being exposed to adversaries and the public.

And that’s just the beginning. Nearly every state experienced a government network breach during 2014, while simultaneously managing disruptions in commerce caused by hacks of companies such as Home Depot, Staples, and Target. Even localities were not exempt — Rapid City, N.D., and Napa, Calif., are just two cities whose websites were hacked.

Nevertheless, maybe we should reconsider that title and be a little more optimistic. Instead of “Year of the Breach,” can we consider 2014 to be the “Year of Lessons”? Maybe the “Year of Progress”? While government-at-large certainly faced setbacks in the cyber world, many agencies also took great steps toward security. At the federal level, commitments were made and plans drawn to better equip smaller entities with the resources and strategies necessary to protect their networks. Locally, many organizations created new partnerships and streamlined their internal systems to achieve greater security at less cost.

This guide explores how local, state, and federal governments have learned from successful attacks of the past to bolster their cybersecurity today. In this guide, we:

  • Describe the level and impact of advanced cyberattacks on government agencies.
  • Discuss five cybersecurity tactics that the public sector has deployed to mitigate risk.
  • Provide two case studies from government to illustrate each tactic in action.
  • Detail lessons learned from these government tactics.

The numerous cyber incidents of last year prove there is still more government must do to secure our nation’s networks. However, the case studies in this guide highlight that innovators in the public sector are already leading the way to enhanced cybersecurity.

Download the guide here.

News

2015 Symantec Government Symposium

Come see Government Acquisitions’ Chief Technology Officer, Prem Jadhwani, be a part of a panel discussion on “Risky Business: Minimizing Insider Threat” at the 2015 Symantec Government Symposium.

When: April 15, 2015 at 10:00AM.

Where: Walter E. Washington Convention Center

Washington, D.C.

About the Event

We are pleased to announce that the 2015 Symantec Government Symposium, “Secure Government: Manage, Mitigate, Mobilize,” will take place on April 15, 2015 at the Walter E. Washington Convention Center in Washington, D.C.

Serious challenges call for serious dialogue. Join the leading government IT security and management professionals, keynote speaker Robert Mueller (former director of the FBI), and Government Acquisitions at this one-day event to discuss best practices in:

  • The New IT: Learn how to ensure secure information access and hear real-world case studies in secure application management
  • Data Optimization: Learn about data governance and information sharing in the age of big data
  • Legislation and Policy: Get the read on cyber legislative priorities and policy driving implementations
  • Cyber Front Lines: Discuss security intelligence, cyber crime scenarios, and advanced persistent threats
  • Securing Government: Focus on insider threats, CDM, and risk management

Click here to register.

Events, News
en_USEnglish
en_USEnglish