Skip to content Skip to left sidebar Skip to right sidebar Skip to footer

Selling to the government

The Eagle (II) is Not Landing

DHS will not be recompeting their EAGLE II IT services contract when it expires in 2020. They are moving toward a strategy called EAGLE Next Gen, which allows them to rely on existing contracts in order to meet IT services needs. Agile development and special or niche mission needs will be met by smaller targeted contracts competed as necessary. (Nextgov, April 20, 2019)

The EAGLE Next Gen strategy is just that, a strategy whereby DHS would use already established governmentwide acquisition contracts or GWACs. These include:

  • the National Institutes of Health’s CIO-SP3 and CIO-SP3 Small Business
  • GSA’s Alliant 2, 8(a) STARS II
  • GSA’s VETS 2

When requirements cannot be met by this strategy, DHS will build in-house contracts.

So far, DHS is beginning to build an in-house contract for cloud and data center optimization. Over 100 responses were received from their initial RFI. Most likely, resulting RFPs will ultimately be the family of contracts under DHS Next Gen, and are expected in the Fall. (ibid)

Some Homeland Security components are still using EAGLE II to support their agile development. Work with each of the components is at various phases of the procurement process. Each component has different requirements; therefore procurements will be specialized to meet individual needs. (ibid)

The future procurement strategy is far from finalized. There may be full and open competition or a blanket purchase agreement using pre-vetted vendors.

Would you like to learn more about the EAGLE Next Gen strategy and where you might fit in? Give us a call at (301) 913-5000.

 

Automating Robots, the GSA Way

To deal with the breakneck pace of emerging technology, GSA has formed a Community of Practice (CoP), specifically for Robotic Process Automation (RPA). This will give government leaders a forum to collaborate and share ideas on how RPA might be implemented into respective agencies.  (GSA.gov, April 2019)

Executive Sponsors of the RPA CoP are GSA Chief Financial Officer Gerard Badorrek and GSA Technology Transformation Services Director Anil Cheriyan. The CoP will be chaired by Ed Burrows of the GSA Office of the Chief Financial Officer (CFO). (ibid)

The RPA aims to shift members of the federal workforce from low-value to high-value work. Additionally, it allows agencies to cost-effectively automate manual, repetitive, and rule-based operations. (ibid)

Some RPA benefits include:

  • Improving and re-engineering processes as they are automated
  • Using fewer resources to complete work
  • Increasing the efficiency of existing operations
  • Reducing costs partly by absorbing various new requirements without additional hiring or spending
  • Reducing processing errors
  • Reducing processing cycle times (ibid)

The GSA Office of the CFO will leverage the existing TTS CoP management capabilities to lead the RPA CoP. If all goes as planned, the RPA CoP will assist in advancing agency missions well into the future.

Do you have questions about the RPA CoP? Give us a call at 301-913-5000 to discuss how this can affect you.

 

Innovate and Create Opportunities!

A number of federal agencies are updating their acquisition strategies to attract small technology businesses and innovators, in an effort to speed up the time-to-market of technology solutions. (Fedscoop, April 2019) Here’s a breakdown:

  •  The National Science Foundation (NSF) – In 2017, the NSF published “Ten Big Ideas” for investing in tech pilots. The first two of these — harnessing the data revolution (a proprietary type Siri)  and the future of work — are moving forward. NSF is shaking things up a bit by looking at startups and nonprofits to award a $1 million planning grant toward phase two delivery. Past proposals were only accepted from academia. (ibid)
  • The Department of Homeland Security (DHS)  – The Silicon Valley Innovation Program (SVIP) within DHS operates like a startup, including in its acquisition process and a similar talent pool. SVIP has shortened their proposals to just 10 pages with a 15-minute pitch followed by a 15-minute question/answer period. Awards are now made within 24 hours as opposed to the month-long timeframe previously experienced by potential awardees. (ibid)
  • The Department of Homeland Security (DHS) – Customs and Border Protection are currently involved with the Internet of Things security interacting with blockchain and distributed ledger tech. Recently SVIP issued an RFP for a solution to issue credentials, using blockchain or ledger technology. (ibid)
  • The Transportation Security Administration (TSA) – TSA is hoping to speed up the checkpoint process. Using similar solutions, Customs will track the movement of oil from Canadian pipelines. (ibid)
  • The Cyber Apex Solutions Consortium (CASC) – CASC is working with DHS within the financial services sector to identify cybersecurity solutions. With varying budgets, generally due to the size financial entities, they plan on pulling together tech components to create solutions. DHS takes into consideration the consortium’s recommendations, then chooses the solutions to fund in order to solve the issue. (ibid)

With the time to respond to RFPs growing shorter and technology changing so quickly, contractors must be more nimble than ever in their ability to resolve federal agency issues.

Are you aware of the many new strategies federal agencies are deploying to solve their tech issues? Give us a call at 301-913-5000 if you’re interested in discussing some.

 

Alliant2 Be or Not to Be

Alliant2 Small Business, the largest contract in over a decade for government-wide IT services, was recently rescinded by GSA.  (Nextgov, March 2019)

Over a year ago, GSA announced the Alliant2 award to 81 small businesses. Protests immediately ensued. One company, Citizant, Inc., protested to the GAO, who dismissed the file, so Citizant took their complaints to court and won, resulting in the rescission of the awards and GSA revisiting their scoring methodology. (ibid)

Evaluation of bidders differed from the last iteration of Alliant, with rumors of contracting officer bias and arbitrary bid pricing scores bubbling under. Many believe GSA’s self-scoring system allowed companies that should have been eliminated early on to continue through the process. Time will tell if each submission will be rescored or just those below the cutoff, although the judge requires GSA to rescore all. (Federal News Network, April 1)

If only a handful of submissions are rescored, the protest floodgates are likely to open again, possibly forcing a re-compete. Making awards to multiple companies have proven time and again that it is nearly impossible to compare apples to apples during the evaluation process. The process raises a lot of questions. Stay tuned.

We are always available to talk to you about this or other contracting problems. Give us a call at 301-913-5000.

Are you practicing “safe cybersecurity”?

The Department of Defense (DoD) is working to extend its own cybersecurity expertise and infrastructure to small and medium-sized businesses. Their current plan is to build a “secure cloud” for company data instead of leaving it to the responsibility of the contractor. (Federal News Network, March 25, 2019)

DoD plans to use their 2020 research and development budget for the Defense Industrial Base (DIB) Secure Cloud Managed Services Pilot. The project will start by making the cloud service available to a specified number of small and medium companies that support prioritized, critical DoD missions/programs. (ibid)

Ellen Lord, the undersecretary for acquisition and sustainment said, “In contract terms, the Department would treat the secure cloud as Government Furnished Equipment (GFE).” She believes larger companies are already quite savvy and have the funds to create a hardened environment. Ms. Lord is most concerned with small, innovative companies. She said, “we sit down and talk to them about cybersecurity, and sometimes we hear – no kidding, ‘my nephew does my cybersecurity.’ That gets us a little bit worried. And we know that we will either put these small companies out of business, or we will drive them away from the Department of Defense if we give them very, very onerous regulations to meet.” (ibid)

In 2017 DoD began inserting clauses into contracts that require firms to implement the security controls in NIST Special Publication 800-171. Prime contractors are required to impose the same requirements on their subcontractors as they are expected to meet when coming in contact with sensitive, unclassified information. (ibid)

It does not appear as though verification of a company’s compliance with the standards has been accomplished, thus far. However, going forward, spot checks are likely to take place with the hope of getting to a point where DoD certifies third-party cybersecurity examiners to help verify contractors systems meet the existing requirements and that their systems are adequately protected. Currently, about 800,000 systems should be regularly audited. (ibid)

We do know that information is being stolen; but classification levels make it hard to investigate in a reasonable time frame. The details of any individual data theft are classified, making specifics about nature and volume difficult to determine. We also know that sufficient cybersecurity capabilities to protect information must be in place sooner rather than later in order for small and medium-sized businesses to remain contractors to DoD.

Call us with any questions regarding this project at 301-913-5000.