Cyber Solutions: FASt Lane Eligible

The FASt Lane program ensures that our government customers have quick access to emerging technologies and innovative suppliers. FASt Lane gives suppliers shorter processing times for IT Schedule 70 contract actions that directly support federal customer agency requirements, including cyber solutions.

Based on solicitation requirements, the assigned GSA contracting officer will review new offers or contract modifications and provide any necessary feedback. To ensure a speedy process, applying suppliers must be prepared to respond quickly to any inquiries from GSA contracting officers.

The federal government faces daily cyber attacks. Even in a resource-constrained environment, departments and agencies need to implement cost-effective and efficient cybersecurity controls for federal information systems. 

Our contracts help you comply with mandates and guidelines for cybersecurity products, services, and solutions. We offer a customizable suite of products and services, including shared services, helping government enhance security while bringing systems into the 21st century. We continually improve how we deliver the best value in technology services to government.


Risk Management Framework (RMF) cybersecurity services

The Risk Management Framework (RMF) blanket purchase agreement (BPA) replaces the static Certification and Accreditation (C&A) process with one providing the National Institute of Standards and Technology's (NIST) recommended security controls for federal information systems. 

SmartBUY software

SmartBUY blanket purchase agreements (BPAs) offer commodity software and services at deep discounts, including:

State, local, and tribal governments

State, local, and tribal governments can use the Cooperative Purchasing Program to buy from IT Schedule 70, the Risk Management Framework BPA, and certain SmartBUY BPAs.

Homeland Security Presidential Directive-12 (HSPD-12) Products and Services

Get Personal Identity Verification (PIV) credentials or purchase other identity and credential management products and services to secure your facilities and control access to networks, email, documents, and laptops:

Federal Public Key Infrastructure (FPKI)

FPKI is the government's common infrastructure that administers digital certificates and public-private key pairs. It can also issue, maintain, and revoke public key certificates.

Trusted Internet Connections (TIC)

The Office of Management and Budget (OMB) mandates that all agencies use Trusted Internet Connections (TIC). We provide access to Trusted Internet Connections (TIC) providers through the Managed Trusted Internet Protocol Services (MTIPS) program.














 Telecommunications service

Networx allows federal agencies to build seamless, secure operating environments through customized telecommunications solutions. 

 Telecommunications infrastructure

Connections II offers secure telecommunications equipment, labor, services, and solutions for federal infrastructure, buildings, and campuses. 

IT Solutions

Governmentwide Acquisition Contracts (GWACs) offer cybersecurity services as part of a total IT solution.

Cross-Agency Priority Goal: Cybersecurity

As established by the Government Performance and Results Modernization Act of 2010, we work toward improving cybersecurity performance through ongoing awareness of information security, vulnerabilities, and threats impacting the operating information environment; ensuring that only authorized users have access to resources and information; and implementing technologies and processes that reduce the malware risk.

Information Security Continuous Monitoring Mitigation (ISCM) – Provide ongoing observation, assessment, analysis, and diagnosis of an organization’s cybersecurity: posture, hygiene, and operational readiness.

Use GSA's Risk Management Framework (RMF) services BPA to establish your agency's Information Security Continuous Monitoring (ISCM) capability.

The Continuous Diagnostics and Mitigation (CDM) Tools/Continuous Monitoring as a Service (CMaaS) Blanket Purchase Agreement (BPA) provides tools and services that strengthen network security posture. Consult the CDM frequently asked questions (FAQs) for more information.

Identity, Credential, and Access Management (ICAM) – a set of capabilities that ensures users must authenticate to use IT resources and can access only those resources required for their job. GSA's Homeland Security Presidential Directive 12 (HSPD-12) products and services help agencies implement their ICAM capability:

Anti-Phishing & Malware Defense – Implement technologies, processes and training that reduce the risk of malware introduced through email and malicious or compromised web sites.

Use GSA's Cloud Email-as-a-Service (EaaS) blanket purchase agreements (BPAs) to implement your agency's Anti-Phishing & Malware Defense capability.

The shortcut to this page is

Last Reviewed 2016-04-21