Keeper Security Named to Carahsoft ITES-SW2 Contract to Support U.S. Army Enterprise Infrastructure Goals
Keeper Security, the creator of the leading cybersecurity platform for preventing password-related data breaches and cyberthreats, today announced that it has been named a manufacturer on the Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS). This contract is held by Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, and is effective through August 30, 2025.
ITES-SW2 is a firm-fixed price, indefinite delivery and quantity contract vehicle for commercial off-the-shelf software products and related services and hardware. The contract has no fees, and ordering is open to all Army, DoD and Federal agencies and authorized systems integrators on a worldwide basis. Under this contract, Carahsoft provides software, software maintenance and ancillary services from Keeper Security to support Federal agencies’ enterprise infrastructure goals.
“Winning the ITES-SW2 contract with Carahsoft is the latest result of our continued commitment to the Federal Government,” said Dan Wilbricht, Vice President of Public Sector at Keeper Security, Inc. “Our Enterprise Security Password Management Platform enables Federal agencies to securely protect their assets and prevent data breaches. From our dedicated team to our deep expertise in Identity and Access Management, we can bring compliance to NIST controls and provide a platform that adheres to best practices that improve data protection and cybersecurity hygiene.”
Keeper Enterprise Password Management (EPM) for Government helps solve the most common cybersecurity vulnerability: user credentials. Keeper EPM enables the Federal Government to protect against cyberthreats through the enforcement and adoption of cybersecurity best practices, such as multi-factor authentication, all through a zero-trust security framework.
Keeper EPM protects against ransomware and phishing attacks and bolsters an organization’s Identity and Access Management Architecture as well as fill security gaps of existing SSO solutions.