Home > Federal Acquisition Categories > IT Security

Showing Page # 1 of 2


Information Technology: 8(a) STARS II (18-00537)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-18-00537

Replaces: Information Technology: GSA 8(a) STARS II Information Sheet (11-00195)

Description:
8(a) STARS II is a multiple-award, indefinite-delivery/indefinite quantity (IDIQ) contract engineered to provide federal agencies with cutting-edge Information Technology (IT) solutions from award-winning 8(a) small businesses. Using 8(a) STARS II will enable you to access 8(a) firms through an established contract vehicle instead of traditional, open  market methods – saving time and taxpayer money.


Target Audience: Internal, Military.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: Cloud Computing Acquisition Vehicles & Services Brochure (17-00275)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-17-00275

Replaces: Information Technology: Your Comprehensive Cloud Computing Solution (16-00472)

Description:
The General Services Administration (GSA) Cloud Program Management Office (PMO) can help agencies meet the growing list of challenges that impact mission-critical services. Our flexible, pre-competed contracts and cloud acquisition expertise give you faster, easier access to cloud computing services available in today’s market. We will work with you to provide the guidance and direction you need to determine which cloud computing acquisition vehicle best meets your agency’s unique mission and security requirements.


Target Audience: Federal Civilian, Internal, Military.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: Comprehensive Cloud Computing Solutions (17-00293)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-17-00293

Replaces: Information Technology: Your Comprehensive Cloud Computing Solution (16-00472)

Description:
The General Service Administration’s (GSA) Federal Acquisition Service Customer Engagement and Solutions Development Division (CESDD) helps federal agencies identify and acquire the right cloud computing solution to meet their IT needs.

GSA’s CESDD offers convenient, on-demand access to a shared pool of computing resources that can be rapidly and easily configured, provisioned, and released. These solutions are delivered through the Internet on a pay-per-use or subscription basis in three service models.

 


Target Audience: Federal Civilian, Internal, Military.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: Federal Hybrid Cloud Solutions (17-00292)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-17-00292

Replaces: 8 Reasons to Implement a Federal Hybrid Cloud Solution (05-16-00565)

Description:

Hybrid cloud implementations have been increasing in the federal marketplace due to their flexibility, customization, and ability to manage the balance between security and availability. Federal agencies can utilize existing on-premise solutions for mission critical workloads, while moving noncritical items to a public cloud. Learn 8 reasons why your agency should move to a Hybrid Cloud Solution.


Target Audience: Federal Civilian, Internal, Military.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: Federal ID Credential HSPD12 (15-00330)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-15-00330

Replaces: HSPD-12 Trifold (05-08-00336)

Description:
Your Federal ID Credential is your key to the places, systems and information you need to perform your official duties. It conforms to a standard format and technology across the entire federal government.  

The Federal ID Credential helps your agency comply with the President’s Homeland Security Presidential Directive 12 (the Common Identification Standard for Federal Employees and Contractors), commonly known as HSPD-12.


Target Audience: Internal.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: GSA IT & Telecommunications: Your Acquisition Partner (16-00566)
Feature 1

Pages: 4
Publication Date:

Publication Number: 05-16-00566

Replaces: GSA Technology and Telecommunications (5-15-00385)

Description:

Across government, information technology (IT) and telecommunications are inseparable from agency mission requirements. At the same time, agencies face constantly shifting priorities – from cloud computing and infrastructure consolidation to cybersecurity and environmental sustainability. With tight budgets and a diminished workforce, finding the right solution to meet your IT and telecommunications needs can be a significant burden. At GSA, we help customers make smart, cost saving decisions on technology. We bring together leading industry partners, our IT and acquisition experts, and your agency specialists to maximize the effectiveness and efficiency of your acquisition while minimizing risk.


Target Audience: Current Vendors, Federal Civilian, Internal, Military, State and Local.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: GWACs Quick Reference Guide for IT Solutions (16-00623)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-16-00623

Replaces: GSA GWAC Desk Reference Guide (05-11-00196)

Description:
Simplify your procurement of Information Technology (IT) solutions with GSA's Governmentwide Acquisition Contracts (GWACs) - acquisition vehicles tailored specifically for IT project, disaster recovery and information assurance, innovative e-Business solutions or procuring IT services from small businesses, look no further than GSA GWACs that can save you both time and money.


Target Audience: Current Vendors, Federal Civilian, Internal, Military.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: Introduction to Electronic Commerce Services SIN - IT Schedule 70 (17-00679)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-17-00679

Replaces:

Description:
In today’s market, an agency’s success depends on easy access to the latest and proven IT solutions. The General Services Administration’s (GSA) IT Schedule 70 provides government agencies with a simplified method to procure IT-related services via task orders, simplified online ordering, and blanket purchase agreements
(BPAs).

GSA’s IT Schedule 70 includes Electronic
Commerce Special Item Number (SIN) 132-52 which federal, state, local, and tribal government agencies can use to easily access electronic commerce-related products, services, and solutions. This includes network services, email services, Internet access services, electronic subscription services, data transmission services, and emerging electronic commerce technologies.


Target Audience: Federal Civilian, Internal, Military.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: IT Schedule 70 Highly Adaptive Cybersecurity Services (18-00512)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-18-00512

Replaces: Information Technology: IT Schedule 70 Intro to HACS SINS (17-00572)

Description:
In today’s cyber world, many organizations face the ongoing challenges of vulnerability assessments, protection of High Value Assets (HVAs), and incident detection and response. That’s why GSA worked with the Department of Homeland Security to develop this new set of HACS Special Item Numbers (SINs) for IT Schedule 70.


Target Audience: Current Vendors, Federal Civilian, Internal, Military.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".

Information Technology: Risk Management Framework (RMF) Solution Slipsheet (17-00568)
Feature 1

Pages: 2
Publication Date:

Publication Number: 05-17-00568

Replaces:

Description:
The Risk Management Framework (RMF) is a holistic approach that integrates security- and risk-management activities into the system-development life cycle for the entire federal government. Developed by the National Institute of Standards and Technology (NIST) in collaboration with public- and private-sector partners, and it takes applicable laws, directives, executive orders, policies, standards, and regulations into consideration.


Target Audience: Federal Civilian, Military.
Whenever using a CMLS “Click to view” function, be sure your computer’s pop-up blocker is disabled. To disable the pop-up blocker, hold down “Ctrl” on your keyboard while selecting “Click to access PDF. PDF is 508 Compliant” or "Click to access Flipbook. Flipbook is not 508 Compliant. Use PDF for 508 Compliant content.".
Showing Page # 1 of 2