BreakPoint Labs’ Government contracting corporate attributes are as follows:
Contact Us for additional information, such as DCSA Facility Clearance (FCL) details and/or Past Performance references.
Contracts Point of Contact:
Denise Cole
Contracts Administrator
(703) 495-3559
contracts@breakpoint-labs.com
NAICS Code: | Description: |
---|---|
541511 | Custom Computer Programming Services |
541512 | Computer Systems Design Services |
541513 |
Computer Facilities Management Services |
541519 |
Other Computer Related Services (primary)
|
541330 |
Engineering Services |
541715 |
Research and Development in the Physical, Engineering, and Life Sciences (except Nanotechnology and Biotechnology) |
SIC Code: | Description: |
---|---|
7371 | Custom Computer Programming Services |
7373 | Computer Integrated Systems Design |
7376 | Computer Facilities Management |
7379 | Computer Related Services, Nec* |
7379 | Computer Related Services, Nec* (primary) |
54151HACS - Highly Adaptive Cybersecurity Services (HACS)
High Value Asset Assessments
Risk and Vulnerability Assessments
Cyber Hunt
Incident Response
Penetration Testing
PSC Code: | Description: |
---|---|
AC11 | National Defense R&D Services; Department of Defense - Military; Basic Research |
AC12 | National Defense R&D Services; Department of Defense - Military; Applied Research |
AJ11 | General Science and Technology R&D Services; General science and technology; Basic Research |
AJ12 | General Science and Technology R&D Services; General science and technology; Applied Research |
D310 | IT AND TELECOM - CYBER SECURITY AND DATA BACKUP |
DJ01 | IT and Telecom - Security And Compliance Support Services (Labor) Support services focused on supporting security policies/controls, processes, measuring compliance of relevant legal/compliance requirements, to include Section 508, and responding to security breaches. Also provides support for IT Security systems providing Continuous Diagnostics and Mitigation (CDM) for real-time Cyber Security and protection such as vulnerability scanning, managing firewalls, intrusion prevention systems, and security information and event management (SIEM). Includes Disaster Recovery (DR) services to support DR policy, process and means, dedicated failover facilities and perform DR testing. Excludes: The implementation actions defined by Compliance policy (e.g. implementing controls like multi-factor authentication) are not included in the Compliance sub-tower and are part of the respective towers where the actions take place (e.g. Compute, Storage, Network, Application, End User). |