Welcome!

News Feed Item

CGI Federal announces award as a prime contractor for Department of Homeland Security EAGLE II contract

Multi-award contract vehicle allows CGI to compete for new projects

FAIRFAX, VIRGINIA -- (Marketwired) -- 05/22/14 -- The U.S. Department of Homeland Security has selected CGI Federal Inc. (CGI) (NYSE: GIB)(TSX: GIB.A) as a prime contractor for a program that will allow the company to compete to provide a range of new technology services and products that support the agency's critical mission and business functions.

DHS announced on this month that CGI Federal had been selected as a prime contractor under its Enterprise Acquisition Gateway for Leading Edge Solutions II (EAGLE II) contract on the Unrestricted Track in Functional Category 1, Service Delivery, including Integration, Software Design/Development, Operations & Maintenance program. EAGLE II is an "indefinite-delivery, indefinite-quantity" contract vehicle that provides a $22B ceiling to procure IT services over the seven year period of performance. CGI is one of 68 awardees on this track that will be authorized to compete to provide services under this Functional Category. CGI will compete to provide advanced mission-enabling technical solutions including cloud services, big data and analytic solutions, agile methodologies, continuous integration and operations, mobile solutions, continuous monitoring and cyber security.

"CGI will support DHS in protecting our nation, its citizens, resources, and critical infrastructure in an increasingly dynamic and sophisticated threat environment," said Dr. James Peake, Lt. Gen. (Ret), President, CGI Federal. "We are looking forward to continuing and growing our partnership with DHS."

DHS has a broad mission to secure the nation from a range of threats, from aviation and border security to emergency response; from cybersecurity analysis to chemical facility inspections. CGI has a long history with the agency, having provided a range of IT services to the Coast Guard since 1996. CGI is also a leading cloud service provider to the agency. The new contract may give the company an opportunity to expand its footprint with DHS and provide a greater role in providing mission-critical IT services to the federal government agency.

EAGLE II may put CGI in an even stronger position to support DHS in its vast and varied role in responding effectively and rapidly to natural disasters through enhanced information sharing capabilities and immigration and law enforcement systems, enhanced Risk-Based Security solutions, emergency response capabilities, and proactive global enforcement solutions.

"CGI will deliver solutions with an increased capability to proactively monitor and thwart threats before they arise," said Timothy J. Hurlebaus, CGI Federal senior vice president and National Security Defense Programs business unit leader. "Our "as a service offerings", predictive analytics, agile development and continuous integration will help bring mission capability to market faster."

About CGI Federal Inc.

CGI Federal Inc. is a wholly-owned U.S. operating subsidiary of CGI Group Inc., dedicated to partnering with federal agencies to provide solutions for defense, civilian, and intelligence missions. Founded in 1976, CGI Group Inc. is the fifth largest independent information technology and business process services firm in the world. Approximately 68,000 professionals serve thousands of global clients from offices and delivery centers across the Americas, Europe and Asia Pacific, leveraging a comprehensive portfolio of services including high-end business and IT consulting, systems integration, application development and maintenance, infrastructure management as well as a wide range of proprietary solutions. With annualized revenue in excess of C$10 billion and an order backlog exceeding C$19 billion, CGI shares are listed on the TSX (GIB.A) and the NYSE (GIB). Website: www.cgi.com.

CGI Forward-Looking Statements

All statements in this press release that do not directly and exclusively relate to historical facts constitute "forward-looking statements" within the meaning of that term in Section 27A of the United States Securities Act of 1933, as amended, and Section 21E of the United States Securities Exchange Act of 1934, as amended, and are "forward-looking information" within the meaning of Canadian securities laws. These statements and this information represent CGI's intentions, plans, expectations and beliefs, and are subject to risks, uncertainties and other factors, of which many are beyond the control of the Company. These factors could cause actual results to differ materially from such forward-looking statements or forward-looking information. These factors include but are not restricted to: the timing and size of new contracts; acquisitions and other corporate developments; the ability to attract and retain qualified members; market competition in the rapidly evolving IT industry; general economic and business conditions; foreign exchange and other risks identified in the press release, in CGI's annual and quarterly Management's Discussion and Analysis ("MD&A"), in CGI's Annual Report, in CGI's Annual Report on Form 40-F filed with the U.S. Securities and Exchange Commission (filed on EDGAR at www.sec.gov), and in the Company's Annual Information Form filed with the Canadian securities authorities (filed on SEDAR at www.sedar.com), as well as assumptions regarding the foregoing. The words "believe," "estimate," "expect," "intend," "anticipate," "foresee," "plan," and similar expressions and variations thereof, identify certain of such forward-looking statements or forward-looking information, which speak only as of the date on which they are made. In particular, statements relating to future performance are forward-looking statements and forward-looking information. CGI disclaims any intention or obligation to publicly update or revise any forward-looking statements or forward-looking information, whether as a result of new information, future events or otherwise, except as required by applicable law. Readers are cautioned not to place undue reliance on these forward-looking statements or on this forward-looking information.

www.cgi.com/newsroom

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need it. In his session at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will talk through some real-world OpenStack deployments and look into the ways this can benefit customers of all sizes....
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.