Share this article on:
The cyber security firm has secured a contract to broaden its offering to Defence.
ASX-listed company archTIS has announced its receipt of a $7 million contract to expand its existing deployment of Kojensi software within Defence.
The two-year deal, which commenced upon execution, includes an option for a 12-month extension.
Kojensi — an accredited multi-level security (MLS) platform —supports the sharing of sensitive and classified information internally and with external partners and clients.
The deal builds on the existing deployment of Kojensi across the Department of Defence, as well as the deployment of archTIS’ NC Protect software in the Defence Information Environment (DIE).
NC Protect is designed to secure documentation and file sharing across SharePoint for classified information or content in communities of interest on the DIE.
Daniel Lai, archTIS managing director and CEO, said this latest deal is a result of the company’s broader push to bolster its footprint in the defence space.
“Over the past 18 months we have been actively targeting global defence agencies and the broader defence industry due to their compelling need to secure highly sensitive information,” he said.
“This target market strongly aligns with the unique value proposition our products offer. Kojensi and NC Protect are filling a critical need for zero-trust information security in the well-funded, defence and intelligence market and the industries that support them.”
This latest Kojensi contract follows archTIS’ participation in the KPMG Consortium which was awarded Tranche 1 of the OneDefence Data Program.
As part of its involvement, archTIS is expected to leverage its experience offering security architecture.
“The recent sale to Australian Defence continues to drive our high-gross margin licensing strategy of more predictable, low-churn ARR,” Kurt Mueffelmann, global COO, said.
“This sale alone will drive significant revenue into FY23 and beyond.”
[Related: Russian state-backed hacking group Fancy Bear linked to malware campaigns in Ukraine]