recommended reading

DHS Awards XTec Contested $103 Million Biometric ID Contract

Jeff Gentner/AP file photo

The Homeland Security Department has switched vendors for a deal inked last September to update an employee badge system with advanced biometric verification features, such as face and iris scans, officials announced late Friday. 

DHS originally awarded the $102.8 million contract to HP Enterprise Services on Sept. 27, 2013, but in November the department notified the Government Accountability Office that it was reevaluating the award after XTec, which had previously provided software for the project, argued  that "the agency did not reasonably evaluate proposals," Ralph White, GAO managing associate general counsel, told Nextgov last month in an email.

The value of the new contract, over an anticipated 10-year timeline, will remain the same, Homeland Security officials say.

DHS awarded the new contract to XTec Inc., on Feb. 28, officials said in a filing on FedBizOps.gov, a website for federal business opportunities. 

Homeland Security last month temporarily extended XTec's expiring contract for one year while reassessing technologies proposed by XTec, HP and other technology firms. 

In recent years, GAO attorneys had twice dismissed challenges to contracts brought by XTec. In November 2011, the credentialing firm was unsuccessful in contesting an award to Secure Mission Solutions for a Secret Service access control and visitor management system. Later that month, XTec lost a protest against an order for HP technology to support a General Services Administration system that issued and maintained ID cards for employees governmentwide. 

Following the Sept. 11, 2001, terrorist attacks, the government required that all federal employees carry biometric ID badges to access federal facilities and computer networks. GSA offers the cards at a bulk rate to all agencies, but many departments, including DHS, prefer to manage credentialing inhouse. 

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.