We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

KeyLogic – Government-Grade Digital Transformation

Eytan Morgenstern Technical Interviewer and Writer

Businesses aren’t the only entities that need excellent digital and secure solutions.  Jon Hammock, President and CEO of KeyLogic, discusses the challenges and rewards related to working to make the U.S. government, one of the world’s largest customers, digital and secure.

Tell us about KeyLogic, the history of the company and what it does.

KeyLogic has been around for 20 years and is focused primarily on the United States’ Federal government’s digital transformation, including agencies such as the Department of Defense. As one of the world’s largest customers, the US government is a very large ‘machine’ which can make change difficult. This is a challenge we embrace, and we feel privileged that our efforts are making the country better.

Our goal is to empower these organizations to make better decisions. In fact, that’s our catchphrase –  “Unlock and Empower.” Every organization can make good decisions if we equip them with the right data at the right time. Our solutions are centered around quality business intelligence and our overall program management approach.

Furthermore, KeyLogic currently maintains a workforce of approximately 300 employees. This signifies our capacity to harness a diverse range of skills, while simultaneously retaining the flexibility to act swiftly and achieve the desired outcomes.

How did you get involved in web privacy and cybersecurity?

I’ve always been in the field of Information Technology. Earlier in my career, I worked for several companies, and after I received my MBA, I decided it was time to venture out and create KeyLogic

There are many different types of cybersecurity products on the market.  What is unique about KeyLogic?

At the core, the main difference is our anticipatory service.  This is the way we approach every problem – from the way we hire employees to how we engage with a technological challenge. We focus on accepting the client's mission as our own and work to deeply understand the needs of our clients and their customers.  Often, partners and contractors will overly focus on a statement of work on a given project – really checking the box on a specific project, without looking left or right-- and that means they can often miss the underlying issue. Too many people have ‘succeeded’ on the contract, but didn’t actually end up solving the problem.  We want to succeed on the contract AND solve the problem.

What products and services does KeyLogic provide to clients?

We focus on two main areas: Financial and Data Analysis, and Mission and Program Support.  For Financial and Data Analysis, our solution is Veracity. Veracity is a leading, recommended budget solution for the federal government. We are able to link performance management metrics and extensive reporting for budgets that ultimately are part of the President’s budget. Incredibly, over 50% of agencies still formulate their budgets using spreadsheets. Spreadsheets are a good resource, but they don’t allow for quick, across the board changes which are necessary when working against a deadline and the need for testing different scenarios.

For Mission and Program Support, we provide a number of solutions for project management, biometrics solution optimization, energy technology management, and cloud platforms. We are able to ensure that the right experience and practices are applied to these important technologies so that their implementation is successful.

While KeyLogic works primarily with the US Government, what are some of the same principles that you work with that small businesses can or should adopt as well?

Small businesses can and should adopt broad, general principles such as utilizing the National Institute of Standards and Technology (NIST) cybersecurity framework version 1.1 (released in April 2018).  This provides a good framework and best practices for companies which are mostly independent of the size of the company.

What do you see as the most significant challenges today with regard to cybersecurity?

Without a doubt, cyberattacks are among the largest threats humanity will face in the coming years if not decades. To date, we haven’t really seen the depths of a concerted, wide-spread cyberattack, and we are well behind the curve in handling it.  The NIST framework is, however, making positive strides and GDRP is also going to play an important role by putting into place better privacy and data protection. We need to take these issues more seriously. As we’ve seen most recently, social media has not been a good steward of our data, and it is time for those who fail to protect our data to face the consequences – in the hopes that this will change in the future.

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Eytan Morgenstern is a seasoned technology writer. He loves learning about new innovations, meeting the people behind them, and sharing their story.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.