CoAspire is a subcontractor to one of the world's largest software providers, PTC.  CoAspire also provides both IT and Cyber Services and is a software reseller to the federal government through companies like Carahsoft, Citrix, Ingram Micro, Corel and Acronis. CoAspire's goal in providing IT and Cybersecurity solutions is:

"OUR CustomerS and Their Missions Comes First"

CoAspire has experience with its own employees providing cybersecurity expertise to the Department of Commerce.  Additionally, CoAspire has past experience providing Citrix trained IT professionals as network administrators for federal customers, and past experience in Mobile Device Management and in Computer Network Defense (and Attack) with the U.S. military.  

Building off of this experience, CoAspire is partnering with many IT and Cybersecurity companies now and recently helped the US Coast Guard (as a subcontractor) plan for alternative Cyber futures.

CoAspire has recently become an authorized silver-level software re-seller for Citrix for mobile, networking, and file sharing.  CoAspire can offer Citrix products directly to customers to help mobilize their workforce, secure their enterprise, and optimize their networks.  

CoAspire is also pleased to announce it has a re-seller agreement with Acronis to provide backup and disaster recovery software solutions.  Both of these partnerships are enabled through Ingram Micro.

CoAspire is proud to announce its new teammate in Cybersecurity, GrayPier Technology.  GrayPier has an impressive suite of tools, products and services for secure online and mobile operations.

CoAspire can provide Cybersecurity and IT services to government customers by using its prime Seaport-e contract with the U.S. Navy, and is applying for a GSA IT Schedule 70.  Please contact us at info@coaspire.com for additional information on our Cybersecurity and IT offerings.

CoAspire is now offering Cybersecurity Vulnerability Testing and Penetration Testing. Please learn more about this service at: CoAspire PENTEST

So what are the Federal IT Priority Areas that CoAspire and its Partners are poised to help?  One of the biggest overarching federal challenges is:

legacy system modernization

So many of federal and commercial customer's priorities could be fixed by just upgrading their legacy hardware and software.  In Federal IT, the spending is out of balance.  Federal CIOs need to eliminate technical debt in their enterprise.  CIOs are now working under a new construct, the FITARA self-assessment.  As noted in: https://management.cio.gov/

The Federal Information Technology Acquisition Reform Act (FITARA), passed by Congress in December 2014, is a historic law that represents the first major overhaul of Federal information Technology (IT) in almost 20 years. Since FITARA’s enactment, OMB published guidance to agencies to ensure that this law is applied consistently governmentwide in a way that is both workable and effective. This guidance is now available as OMB Memorandum M-15-14: Management and Oversight of Federal Information Technology.

Approximately 75% of Federal IT spending is just to keep the antiquated systems and functions running, and the remaining 25% is focused on new capabilities.  Federal IT priorities include:

  1. Cybersecurity
  2. Mobility
  3. Cloud Computing (Hybrid Cloud Strategies)
  4. Data Centers
  5. Big Data and,
  6. Health IT

Cybersecurity

In Cybersecurity, both federal and commercial customers are focused on:

  1. Continuous Monitoring
  2. Identity Management
  3. Vulnerability and Penetrations (See our new offer in this area here.)
  4. Testing Automation
  5. Layered Security
  6. Analytics and
  7. Education and Training

Therefore, CoAspire is building a team and will work with its partners to: 

  • Develop through R&D tools to Enhance IT and Network Security
  • Develop Capabilities and Strategic Policies to Ensure Freedom of Access and Secure Networks
  • Help develop Cybersecurity Tools and Practices for Enhanced IA
  • Enhance Critical Infrastructure Security for Government and the Private Sector
  • Help Build and Train the Cyber Force
  • Better understand and operationalize DoD Cyber Strategy Requirements
  • Promote Interagency Development of National Cyber Security Policy
  • Explore Initiatives to Increase Private Sector Participation
  • Help Define Clear Acquisition Priorities for Cyber Capabilities for customers
  • Help Operationalize Cyber Forces

So why the picture of the Antietam Civil War battlefield above, and why not a picture of a bunch of hackers attacking computer systems in the U.S.?  Here are the metaphors:

  1. Antietam was fought in September of 1862 and was the bloodiest battle of the Civil War. Cyber intrusions are arguably the bloodiest battle, in the loss of "treasure" and the theft of data, IP and secrets.

  2. Just days before the battle, General Robert E. Lee accidentally dropped his Special Order 191, a piece of paper, or "packet" wrapped around two cigars that was found by Private Mitchell of the 27th Indiana on September 13, 1862 before the battle, and delivered to Union General McLellan.  Lee said in 1868 that, "Had the lost dispatch not been lost... I would have had all my troops reconcentrated on the Md. side, stragglers up, men rested, and intended then to attack McCellan hoping the best results from state of my troops and those of the enemy." This loss of a critical piece of information allowed the Union forces to know of Lee's plans, and amass their forces around Sharpsburg and Antietam and put Lee and the Confederate Army at a disadvantage.  Just like the loss of one critical cyber package can critically cripple our Armies of today.

  3. The photo above is of the Sunken Road at Antietam, also referred to as "bloody lane" after the battle there on September 17, 1862.  Over 5,500 men were killed or wounded on this short stretch of road in just three hours of fighting.

  4. In 2015, the U.S. Government's Office of Personnel Management discovered two separate but related cybersecurity incidents that resulted in the loss to foreign agents of personal and security background information of approximately 25 million military members, government employees, federal contractors and their relatives and associates.  

  5. The loss of this data has not resulted in the loss of life like what was seen during those three hours at Antietam, but like the soldiers there, who found minimal protection behind a a wooden split rail fence and the berm of a sunken road, the U.S. government must do better to protect those who protect us all. CoAspire is poised to help in this endeavor.