The Challenge
A military branch service issued a formal RFP for enterprise-wide phishing-resistant authentication. Three vendors were selected for evaluation, including two larger competitors with established DoD footprints. We were the smallest company in the evaluation with the least DoD deployment experience.
The Approach
I assembled our strongest team: a former military IT officer as our technical lead, our most experienced federal SE, and our VP of Government Business. We treated the evaluation like a military operation — every deliverable on time, every question answered within four hours, and every demonstration rehearsed multiple times.
Our technical differentiation came from our offline authentication capability, which was critical for the military's disconnected and denied environments. While competitors required constant network connectivity for authentication, our solution could authenticate users in field environments with no internet access. I made this capability the centerpiece of our presentation, showing operational scenarios specific to the branch's mission profiles.
The Result
We won the $1.7M contract with the highest technical score in the evaluation. The selection committee specifically cited our offline authentication capability and our team's responsiveness as differentiators. The deployment became our flagship military reference, opening doors across all service branches.
Key Takeaway
In military evaluations, operational relevance beats feature lists. Understanding the unique operational environments — disconnected, denied, and austere — and demonstrating how your solution works in those conditions is what separates vendors who win from vendors who demo well.
Get new posts in your inbox
No noise. Tactical field notes when something worth sharing comes up.