Safeguarding Information |
MAS
|
Multiple Award Schedule
- Available offerings include commercial goods and services organized by 12 Large Categories, corresponding Subcategories, and SINs.
|
Download Contractors (Excel)
|
Information Technology - IT Hardware |
Category |
Description |
33411 |
Purchasing of New Electronic Equipment - Includes desktop, laptop, tablet computers (including rugged), servers, storage equipment, hyperconverged integrated systems, supercomputers, routers, switches and other communications equipment, IT security equipment (hardware based firewalls), audio and video (AV) equipment, public address systems, monitors/displays, sensors and other Internet of Things (IOT) devices, printers and Multi-Function Device (MFD) equipment, broadcast band radio, two-way radio (LMR), microwave radio equipment, satellite communications equipment, radio transmitters/receivers (airborne), radio navigation equipment/antennas, optical/imaging systems, and associated peripherals required for operations (such as controllers, connectors, cables, drivers, adapters, etc., ancillary installation of any equipment purchased.
NOTE: Subject to Cooperative Purchasing |
|
Subgroups (Subgroups are provided for market research purposes only. Buyers should confirm specific contract offerings are available by verifying awarded products and services on the contractor's GSA pricelist.) |
|
|
Airborne Radar Equipment |
|
All in One Printers |
|
Audio Visual/Conference Room Equipment |
|
Backup Power/UPS |
|
Broadcast Band Radio |
|
Cables and Interfaces |
|
Computer Monitors |
|
Digital Cameras |
|
End User IT Accessories |
|
End User IT Peripherals |
|
Fiber Optic Equipment |
|
Hyperconverged Integrated Systems |
|
Keyboard Video Monitor (KVM) Switches |
|
Laptops (inc. Rugged) |
|
Large Format Displays |
|
Microwave Radio Equipment |
|
Network Equipment |
|
Network Printers |
|
Projectors |
|
Radio Base Stations |
|
Radio Chargers |
|
Radio (inc. LMR) Handhelds |
|
Radio Navigation Equipment/Antennas |
|
Radio Repeaters |
|
Radio Transmitters/Receivers, Airborne |
|
Radio Trunking System |
|
Routers |
|
Satellite Communications Equipment |
|
Security Appliances |
|
Servers |
|
Software Defined Network Equipment |
|
Storage - Memory, Solid State (SSD), Software Defined (SDS), Network Attached (NAS), Storage Area Network (SAN) |
|
Supercomputers |
|
Switches |
|
Tablets (inc. Rugged) |
|
Thin Clients |
|
Tower/Small Form Factor/Micro/Mini Computers |
|
Vehicle Radio Units |
|
Video/Media Distribution Equipment |
|
Video Teleconferencing (VTC) |
|
Wireless LAN Equipment |
Information Technology - IT Services |
Category |
Description |
54151S |
Information Technology Professional Services - IT Professional Services and/or labor categories for database planning and design; systems analysis, integration, and design; programming, conversion and implementation support; network services, data/records management, and testing.
NOTE: Subject to Cooperative Purchasing |
|
Subgroups (Subgroups are provided for market research purposes only. Buyers should confirm specific contract offerings are available by verifying awarded products and services on the contractor's GSA pricelist.) |
|
|
Auto. Info. System Design & Integration |
|
IT Systems Analysis Services |
|
IT Systems Development Services |
|
Programming Services |
|
Automated News, Data and other Info. Services |
|
CAD/CAM Services |
|
Desktop Management |
|
Information Assurance |
|
IT Backup and Security Services |
|
IT Data Conversion Services |
|
IT Facility Operation and Maintenance |
|
IT Network Management Services |
Information Technology - IT Software |
Category |
Description |
511210 |
Software Licenses - Includes both term and perpetual software licenses and maintenance.
NOTE: Subject to Cooperative Purchasing |
|
Subgroups (Subgroups are provided for market research purposes only. Buyers should confirm specific contract offerings are available by verifying awarded products and services on the contractor's GSA pricelist.) |
|
|
Application |
|
Office Productivity |
|
Operating Systems |
|
Programming (Commercial Off the Shelf (COTS)) |
|
Software Utilities and Tools |
|
Threat Protection |
|
Business Mgmt |
|
Communication |
|
Educational |
|
Electronic Commerce/Internet |
|
Entertainment |
|
Financial Management |
|
Graphics |
|
Multimedia |
54151 |
Software Maintenance Services - Software maintenance services creates, designs, implements, and/or integrates customized changes to software that solve one or more problems and is not included with the price of the software. Software maintenance services includes person-to-person communications regardless of the medium used to communicate: telephone support, online technical support, customized support, and/or technical expertise which are charged commercially.
NOTE: Subject to Cooperative Purchasing |
Information Technology - IT Solutions |
Category |
Description |
541519ICAM |
Identity, Credentialing and Access Management (ICAM) - Managed service offerings for electronic credentials (assurance levels IAL, AAL, and FAL), identity and access management, authentication, and identity and access management professional services.
NOTE: Subject to Cooperative Purchasing |
541519PIV |
Homeland Security Presidential Directive 12 Product and Service Components - PIV products and PIV services to implement the requirements of HSPD-12, FIPS-201 and associated NIST special publications. implementation components specified under this SIN are: * PIV enrollment and registration services, * PIV systems infrastructure, * PIV card management and production services, * PIV card finalization services, * Logical access control products and services, * PIV system integration services. Installation services and FIPS 201 compliant PACS (Physical Access Control System) products.
NOTE: Subject to Cooperative Purchasing |
Information Technology - IT Training |
Category |
Description |
611420 |
Information Technology Training - Includes training on hardware, software, cloud, and other applicable systems.
NOTE: Subject to Cooperative Purchasing |
Information Technology - Telecommunications |
Category |
Description |
517312 |
Wireless Mobility Solutions - Wireless Mobility Solutions, including but not limited to, Wireless Carriers Services, Telecommunication Resellers, Other Mobility End-Point Infrastructure - Mobility infrastructure, Mobility-as-a-Service, Enterprise Mobility Management, Mobile Backend-as-a-Service, Telecom Expense Management, Mobile Application Vetting, Mobile Threat Protection, Mobile Identity Management, Internet of Things (IoT), and Other/Mobile Services.
All Nationwide Business Plans under this contract may include ""no-cost"" Service Enabling Devices (SEDs) (including, but not limited to, cell phones and shall be offered to the general public at ""no-cost"") and bundling the SEDs with cellular service. The SEDs are offered on an ""as available"" basis and may or may not be domestic end products or end products of a designated country. The "no-cost" SEDs are not available through this contract apart from ordering cellular service.
NOTE: Subject to Cooperative Purchasing |
|
Subgroups (Subgroups are provided for market research purposes only. Buyers should confirm specific contract offerings are available by verifying awarded products and services on the contractor's GSA pricelist.) |
|
|
Wireless Carrier Services |
|
Mobility Infrastructure |
|
Mobility-as-a-Service (MaaS) |
|
Enterprise Mobility Management (EMM) |
|
Mobile Backend-as-a-Service (MBaaS) |
|
Telecom Expense Management (TEM) |
|
Mobile Application Vetting |
|
Mobile Threat Protection (MTP) |
|
Mobile Identity Management |
|
Internet of Things (IoT) |
|
Other/Mobile Services |
Office Management - Document Services |
Category |
Description |
561990 |
Document Destruction Services - Includes on-site and off-site destruction of classified, unclassified, or personal identifiable information. Types of documents include hard copy media, electronic media, and optical mass storage media. Destruction techniques may include, but are not limited to, shredding, pulverization, disintegration, and incineration. |
Office Management - Office Supplies |
Category |
Description |
333318SBSA |
Office Security Equipment and IT Products (Small Business Set Aside) - Includes security applications for office equipment that shall be secured in any environment to deter unlawful removal. Available security solutions include anti-theft software tracking systems, the ability to manage a PC from a network location, switch for computer case, motion sensors, and all directly related conventional and biometric products.
NOTE: Small Business Set Aside (SBSA) |
Professional Services - Business Administrative Services |
Category |
Description |
541611 |
Management and Financial Consulting, Acquisition and Grants Management Support, and Business Program and Project Management Services - Provide operating advice and assistance on administrative and management issues. Examples include: strategic and organizational planning, business process improvement, acquisition and grants management support, facilitation, surveys, assessment and improvement of financial management systems, financial reporting and analysis,due diligence in validating an agencyâs portfolio of assets and related support services, strategic financial planning, financial policy formulation and development,special cost studies, actuarial services, economic and regulatory analysis, benchmarking and program metrics, and business program and project management.
Inherently Governmental services as identified in FAR 7.503 or by the ordering agency are prohibited. It is the responsibility of the Contracting Officer placing the order to make this determination. Ordering activities must require prospective contractors to identify potential conflicts of interest and address those, prior to task order award.
Personal services as defined in FAR 37.104 are prohibited. |
|
Subgroups (Subgroups are provided for market research purposes only. Buyers should confirm specific contract offerings are available by verifying awarded products and services on the contractor's GSA pricelist.) |
|
|
Acquisition/Grant Management Support |
|
Actuarial Services |
|
Customer Survey Services |
|
Facilitation Services |
|
Financial Consulting Services |
|
Financial, Economic and Regulatory Analysis Support |
|
Management Consulting Services |
|
Program/Project Management Support |
|
Strategic Planning |
|
Program Evaluation Services |
561450 |
Business Information Services (BIS) - Services include electronic and non-electronic transmission of consumer and/or business: credit reports, address verification reports, skip location reports, public information, domestic business profile, international business profile, mortgage reports, supplemental credit reference reports, bond rating, managed fund rating, institutional ranking, data processing (credit/financial) credit scoring, security freeze (lock credit file), merged credit files, business credit risk assessment, and miscellaneous business information services. Firms may provide computer software intended for BIS use and customization of reports. |
Professional Services - Identity Protection Services |
Category |
Description |
541990IPS |
Data Breach Response and Identity Protection - Data Breach Response and Identity Protection Services (IPS) include an integrated, total solution to provide identity monitoring and notification of Personally Identifiable Information (PII) and Protected Health Information (PHI); identity theft insurance; identity restoration services; and protection (safeguarding) the confidentiality of PII and PHI. Additional requirements specifically for Identity Protection Services are found in the notes section referenced below.
NOTE 1: Additional Proposal Instructions related to Identity Protection Services (IPS) are found in IPS Requirements Document 1B.
NOTE 2: Any firm offering Identity Protection Services will be required to provide a System Security Plan (SSP) in accordance with the template found in IPS Requirement Document 1C. The firm will also be required to submit a Firm Fixed Price as outlined in IPS Pricing Document 2, unless otherwise defined at the Task Order level (e.g. per product redeemed per the agreed-upon coverage period (month, year, etc.) ) covering ALL services cited in Section I of IPS Requirements Document 1A. If defined otherwise at the Task Order level, it must still be able to be mapped to the awarded Schedule contract pricing. Firms are encouraged to provide separate line item pricing for key services within this total solution SIN that the firm believes could be ordered independently (e.g., credit monitoring, restoration, etc). This will allow the Ordering Agency to obtain only those services needed depending on level of breach. See IPS Pricing Document 2 for pricing tables.
NOTE 3: Services provided shall be performed in accordance with applicable Federal laws and policies, including the Identity Theft and Assumption Deterrence Act of 1998, as amended by Public Law 105-318, 112 Statute 3007 (Oct. 30, 1998), and implemented by 18 U.S.C. 1028. Firms are required to adhere to all applicable Office of Management and Budget (OMB) policies including OMB Circular A-130, Managing Federal Information as a Strategic Resource, and any updates to OMB Memorandum M-17-12, Preparing for and Responding to a Breach of Personally Identifiable Information.
NOTE 4: The Agency Ordering Guide for Identity Protection Services can be found at https://www.gsa.gov/buying-selling/products-services/professional-services/buy-services/identity-protection-services-ips
|
541990RISK |
Risk Assessment and Mitigation Services - Services include: breach mitigation and analysis/forensic services, the deployment of financial risk assessment and mitigation strategies and techniques; improvement of capabilities through the reduction, identification, and mitigation of risks; detailed risk statements, risk explanations and mitigation recommendations; design and development of new business applications, processes, and procedures in response to risk assessments; and ensuring compliance with governance and regulatory requirements. Under this SIN, firms can also assist the Ordering Agency with preventive measures in protecting Personally Identifiable Information (PII) and Protected Health Information (PHI) through the evaluation of threats and vulnerabilities to PII and PHI type of information; training of Government personnel on how to prevent data breaches and identity theft; vulnerability assessments; privacy impact and policy assessments; review and creation of privacy and safeguarding policies; prioritization of threats; maintenance and demonstration of compliance; and evaluation and analysis of internal controls critical to the detection and elimination of weaknesses to the protection of PII and PHI type of information. |
Security and Protection - Protective Equipment |
Category |
Description |
332999S |
Safes, Vault Systems, and Security Products - Includes safes, vaults, and security products, such as interior components, vault door accessories, utility lockers, etc. |
Security and Protection - Security Systems |
Category |
Description |
334290L |
Physical Access Control Systems (PACS) - Legacy SIN - Includes physical access control systems (PACS), such as card-controlled access, biometrics, security barriers, etc.
NOTE: Subject to Cooperative Purchasing |
Transportation and Logistics Services - Packaging Services |
Category |
Description |
334419 |
Unique Identification (UID) / Radio Frequency Identification (RFID - For a variety of applications including supply chain management, logistics, and anti-counterfeiting, to improve inventory management and reduce operating costs. Unique Identification (UID) is a system of distinguishing one object from another. UID of items requires that qualifying items have a data matrix inscribed either directly on the item or on a permanent machine-readable label affixed to the item. Radio Frequency Identification (RFID) is a method of remotely storing and retrieving data using devices called RFID tags/transponders. An RFID tag is a small object integrated with a silicon chip, such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennas to enable them to receive and respond to radio-frequency queries from an RFID transceiver. RFID allows for individual items to have a unique identifier and can identify many items at once. RFID enables consumer packaged goods companies, retailers and other industries to improve their operating efficiency throughout their supply chains. |