Image

RedTrace Technologies, Inc. is a prime contractor awardee on GSA MAS. The Multiple Award Schedule (MAS) consolidates GSA’s product and service offerings into a single contract. GSA created the MAS to give agency acquisition professionals the ability to obtain total contract solutions for their professional and information technology needs using a single contract vehicle. Agencies have access to the same services and products offered across multiple schedule contracts as before – but in an easier-to-use contract environment. Also, for both industry and GSA, MAS eliminates significant contract duplication and workload previously associated with negotiating, administering, and auditing multiple contracts.

Benefits Of The Multiple Award Schedule

MAS gives authorized agencies the ability to use a single contract to procure simple to complex fixed-price or labor-hour professional and information technology services as well as software and hardware. The MAS provides end agencies with:

  • Simplified acquisition procedures to issue a Request for Information (RFI), Request for Quotation (RFQ), or Blanket Purchasing Agreement (BPA) using GSA’s eBuy e-commerce system or through direct email to contractors.
  • Pre-negotiated contract ceiling rates that ensure fair and reasonable pricing
  • Allows for unique Contractor Team Arrangements to bring a wide variety of industry partners to the negotiating table.
  • Customized terms and conditions at the task order level – or through Blanket Purchase Agreements (BPAs) – to meet specific requirements.
  • Assurance that required FAR terms and conditions are incorporated into the contract.
  • Time savings via the use of streamlined procurement procedures of FAR Subpart 8.4 – reducing agency administrative costs while meeting OMB mandates for existing contracts.
Benefits of HACS SINs
  • Access to pool of technically evaluated cybersecurity vendors
  • Rapid ordering and deployment of services
  • Reduction in open market ordering and contract duplication
  • Cybersecurity/Acquisition support resources from GSA
Image
Image
Image
Image
Image
Contract Number

47QTCA20D00E2

Program Period of Performance

Base Period: August 2020 - August 2025
Option Periods: August 2025 - August 2040

Who Can Use It?
  • All Federal Agencies
Task Order Types Available
  • Firm-Fixed-Price (FFP)
  • Cost-Reimbursement (CR)
  • Labor-Hour (LH)
  • Time-and-Materials (T&M)
  • Incentive Contracts (IC)
RedTrace Technologies, Inc. Services Offered
  • Cybersecurity
  • Information Technology
  • Management Consulting
  • Intelligence Solutions
  • Penetration Testing: is security testing in which assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network.
  • Incident Response: services help organizations impacted by a Cybersecurity compromise determine the extent of the incident, remove the adversary from their systems, and restore their networks to a more secure state.
  • Cyber Hunt: activities are responses to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats. Cyber Hunt activities start with the premise that threat actors known to target some organizations in a specific industry, or specific systems, are likely to also target other organizations in the same industry or with the same systems.
  • High Value Asset Assessments: includes Risk and Vulnerability Assessments (RVA), Security Architecture Review (SAR), and Systems Security Engineering (SSE). Additionally, the scope of the SIN includes services for the seven step Risk Management Framework (RMF), and Security Operations Center (SOC) services.
  • Risk and Vulnerability Assessment: conduct assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. This SIN offers the following services:
    • Network Mapping
    • Vulnerability Scanning
    • Phishing Assessment
    • Wireless Assessment
    • Web Application Assessment
    • Operating System Security Assessment (OSSA)
    • Database Assessment
    • Penetration Testing