recommended reading

GSA pushes back Networx deadlines

The General Services Administration has extended two intermediate deadlines for agencies switching to the Networx telecommunications contract, but an observer said it remains unlikely that they will finish the move by June 2011, when services under the previous arrangement will expire.

GSA is giving agencies until August 2010 to pick a Networx vendor and begin changing services, said Karl Krumbholz, director of the network services program at GSA's Federal Acquisition Service. Originally they had until January 2010 to request funding and until April 2010 to submit their orders. The extension comes in response to a request from the Interagency Management Council steering committee, chaired by Interior Department Chief Information Officer Sonny Bhagowalia.

According to Krumbholz, only 33 percent of services have been disconnected from FTS 2001, the less complicated contract that preceded Networx.

"Where we are now in the transition suggests that we're not going to make those milestones," he said. He declined to predict how likely it was agencies would complete the move by June 2011, but he was more pessimistic than three months ago.

"I'm hoping it will be done, there's a lot of work to be done yet," Krumbholz said. "Our goal is to get it done by 2011, that's when the contracts expire. Those are the facts."

Moving the intermediate milestones won't make much of a difference in completing the transition before FTS 2001 expires, said Bob Woods, president of Tyson's Corner, Va., Topside Consulting Group and former commissioner of GSA's now-defunct Federal Technology Service.

"The best they're going to get is 60 percent to 65 percent cut over by [June 2011]," he said. "I'm not wishing they'll miss it, I hope they don't. But hope is not a plan. That date seems awfully ambitious."

Woods attributed the delays to the complexity of Networx, which has forced agencies to evaluate their telecommunications needs. There is no easy one-to-one transition for many services as there was from FTS 2000 to FTS 2001. He said the shrinking of the federal telecom workforce and a lack of leadership from GSA also contributed to the problem.

"GSA has been too reticent about how they've treated this thing," Woods said. "Their view initially was that the contracts are out there, the transitions are up to you. You know when the deadlines are." GSA has shown improvement recently, he said, particularly under the leadership of Ed O'Hare, head of the Integrated Technology Service.

Krumbholz noted agencies are making 383 fair opportunity decisions, far more than originally anticipated. GSA expected agencies to choose one carrier for the bulk of their Networx services, but most have decided to hold competitions for individual services instead. Agencies have made only half of the fair opportunity decisions and 38 percent of the total statements of work have yet to reach GSA.

Delays in moving to Networx are costing the government $18 million a month, since the new contract is significantly cheaper than its predecessor. Moreover, any extension of FTS 2001 would involve sole-source contracts, which the Obama administration has said it wants to avoid.

Officials are growing more aware of the transition's importance thanks to O'Hare's leadership and the influence of the Chief Information Officers Council, which has been briefed and is "very aware and inclined to get this done," Krumbholz said.

"I think their heart's in it," Woods said. "But I think June 2011 will be very difficult to make."

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.