Debt ceiling deal impacts IT budgets

What federal IT contractors need to know about the legislation

By Grier Eagan, Senior Market Intelligence Analyst

With the expected passing of the debt ceiling legislation, which locks in federal civilian spending until January 2025, contractors who sell IT to the government face a shifting landscape. While the Federal Civilian FY24 IT budget will cap at $56.4 billion, identical to the budget passed in FY22, opportunities still exist for those nimble enough to adapt.

Despite this cap representing a $6.9 billion decrease from the IT budget originally requested for FY24, IT vendors should take solace in the fact that the FY25 budget will see a marginal 1 percent increase. However, considering the current annual inflation rate of 4.93 percent as per the Consumer Price Index, this means that the federal civilian government will have approximately 4 percent less buying power under the FY25 budget than the FY24 budget.

Read more of this post

Selling cyber now means understanding FITARA

Feds update FITARA metrics to include agency performance in critical cyber needs.

By Tara Franzonello, Program Development Manager

The U.S. House of Representatives Committee on Oversight and Reform (COR) released its 15th  Federal Information Technology Acquisition Reform Act (FITARA) scorecard in December 2022. This latest scorecard introduced a new category for cyber security. 

Agencies’ protests against enacting this key IT legislation have high visibility from agency chief information officers (CIOs) to the General Accounting Office (GAO) to Congress. Technology vendors have an advantage over their competition if they can help agency customers show progress in measured categories. This is now particularly important for FITARA because agency self-assessment for compliance happens every spring.

Why FITARA matters for federal cyber security sales

Read more of this post

Make it easier for your Army customers: How the ITES-SW2 helps you sell into this market

By Tara Franzonello, GSA Programs Consultant

Are you selling or planning to sell to the Army? Then you need to add your company and its products to the Information Technology Enterprise Solutions – Software 2 contract.

Nearly 3% of DoD IT contract spending in FY 2020 flowed through an ITES contract – that’s $1.64 billion. The Army believes that number will increase over the next couple of years.  

The ITES-SW2 contract is part of the Army’s Computer Hardware, Enterprise Software and Solutions (CHESS) program. It is a mandatory source for commercial IT hardware and software purchases. Here’s how the two connect:

The CHESS program’s mission is to be the primary source to “support the Warfighter’s Information Dominance Objectives” by developing, implementing and managing commercial IT contracts that provide “enterprise-wide net-centric hardware, software and supporting services to the Army.” 

CHESS contracts provide IT products and services that comply with U.S. Army Network Enterprise Technology Command, Army and DoD policy and standards. Army commercial hardware and software buyers must use CHESS contracts first, no matter the dollar value.

Read more of this post

The Future of the GSA CDM SIN: What it means to you

By Gina Brown, Federal Contracts Manager

In August 2018, the CDM program underwent a procurement transition that vendors should keep in mind. Combined with a proposed elimination of the GSA CDM special item number (SIN), the changes could streamline certain aspects of the way in which products are catalogued.

Initially, blanket purchase agreements (BPAs) were awarded to 17 primes. This then switched to a two-pronged acquisition strategy, in which four GSA Alliant prime contractors were awarded six Dynamic and Evolving Federal Enterprise Network Defense (DEFEND) task orders.

These prime system integrators would purchase cybersecurity tools according to the DHS approved product list (APL), to strengthen the security posture of civilian agency customers.

Read more of this post

DHS’s New Mobile App Playbook

Tom O'KeefeBy Tomas O’Keefe, Consultantmobile apps

Security is one of the biggest hurdles for mobility in government, but some recent work by the Department of Homeland Security (DHS) might make this challenge a little less daunting for federal agencies.

DHS has been working on a mobile app playbook to help agencies develop secure mobile applications and follow a streamlined process to introduce those apps into agencies’ mobile environments. Sound familiar? That’s because it’s a riff on the federal CIO’s Digital Playbook, suggesting a baseline for mobile app development and appropriate milestones to ensure the final application isn’t riddled with errors.

DHS has been a pioneer in securing the mobile workspace for the last few years. You might be familiar with DHS’ Car Wash process, a continuous pen-testing and design-verifying security application that vets mobile apps as they’re developed. Car Wash is available to all federal agencies (and even private sector mobile app developers), and DHS is continuing the trend of advancing the security of mobile environments with the mobile app playbook.
Read more of this post

Market Intelligence Cloud Briefing: Tech Trends and Federal Opportunities

CloudChris Wiedemannby Chris Wiedemann, Senior Analyst

The federal government’s “Cloud First” policy, originally part of Vivek Kundra’s 25-Point Plan, is almost five years old – and yet there’s still plenty of confusion and uncertainty surrounding federal cloud adoption. What are the major challenges facing customers moving into the cloud? How much progress has been made on the commonly-cited challenges of security, data ownership, and elastic procurement within the confines of federal acquisition regulations? How will new policy and regulatory developments affect federal cloud business, and what do industry cloud providers need to know to begin marketing their services?

Read more of this post

Automation Tech Creating Opportunities at USDA

Kevin Shaker_65 x 85by Kevin Shaker, AnalystUSDA-farm

Automation technology could help the Department of Agriculture (USDA) analyze and track farmers’ crop sizes, costs and loan applications. But for now, the agency is relying on good ol’ pen and paper for many of these functions. However, things are changing. Streamlining USDA’s systems and operations is now a major priority, with the USDA Office of the Chief Information Officer listing information technology optimization as a key objective through FY18.

This is why we’re seeing automation activity coming out of many of the department’s sub agencies. At USDA, not every agency relies on the same IT capabilities that are distributed from the HQ’s OCIO. To some extent the department is decentralized, with many of its agencies containing their own IT groups with mission-specific legacy applications and systems.

Read more of this post

C4ISR Challenges: Converging Cyber and Data

blog-cybersecStephanie Meloniby Stephanie Meloni, Senior Analyst

Air Force, Navy and Army leaders shared their upcoming IT priorities for tactical operations at last week’s AFCEA C4ISR breakfast in Arlington, VA. There’s quite a bit of overlap in the challenges they face, but they really  boil down to cybersecurity operations and data management. Both will help military leaders develop a better and more complete Common Operating Picture (COP), which the panelists pointed out is “neither common, nor operational” at the moment.

Read more of this post

Why GWACs Are A Good Bet

US Flag, Capitol Building and MoneyBob Laclede 100x135by Bob Laclede, Vice President, Channels

The Office of Management and Budget (OMB) has dusted off a 2011 policy for stamping out “unnecessary” government-wide acquisition contracts. With so much time left to do business in FY 2016, it’s time to review the fundamentals of a good GWAC strategy. And a few of the techniques manufacturers can use to maintain or even boost their federal sales even if they don’t have a prime contract on one of the main GWACs.

What I’m suggesting may sound obvious, yet I’ve heard so many manufacturers over the years complain that they’re blocked out of this or that agency or requirement because they miscalculated their GWAC strategy. Read more of this post

The End of No Child Left Behind Brings Technology Back to the Classroom

EduImg_100x100Rachel Eckertby Rachel Eckert, Consultant – SLED

As the No Child Left Behind Act draws to a close, the education market is seeing a shift in focus that will bring about much-needed change in school curriculum and learning approaches — all with an eye towards technology integration.

The No Child Left Behind Act, signed into law in 2002, provided an avenue for teachers to identify where students were progressing and where they might be falling behind. Gradually, its requirements became too limiting for teachers and ultimately ineffective. In its place is the Every Student Succeeds Act, signed into law December 10, 2015. This relatively new act fundamentally changes how content and curriculum are developed for schools. Rather than mandates and broad-brush minimums required by the federal government, the new Every Student Succeeds Act puts the states and then each school locality system in control of the decisions and benchmarks that make sense for them. Read more of this post

%d bloggers like this: