Wireless Mobility Solutions SIN 517312
Our Wireless Mobility Solutions offer:
- A single Best-in-Class contract for cutting-edge commercial mobility services
- A streamlined request for quote process with our RFQ generator tool
- Easier onboarding for vendors and increased competition from new and emerging companies
Wireless carrier services replaced the expired Federal Strategic Sourcing Initiative (FSSI) Wireless Blanket Purchase Agreements (BPAs). It includes wireless telecommunications carriers and resellers of wireless services in and outside of the contiguous United States, offering:
- Federal, state, local, and tribal government buying
- Quality wireless carriers
- Select no-charge devices, with device replacement after 20 months
- Up to 30 percent in savings
Find a list of wireless carrier services vendors on eLibrary.
Enterprise Mobility Management (EMM) centralizes mobile device management and maintenance, combining security and management solutions for devices, applications, data, and content by:
- Enabling IT to track and manage wireless devices
- Improving security, integration, and mobile application adoption
- Securely managing mobile devices and platforms
- Increasing access to data, applications, and services
- Mobility Infrastructure — includes the mobile infrastructure required to use or enhance wireless communications (includes user interfaces and hardware included with a mobile service)
- Mobility-as-a-Service (MaaS) — offers subscription-based, service-enabling mobile endpoint management
- Enterprise Mobility Management (EMM) — offers tools, software, and services for managing, securing, and controlling mobile endpoint functionality
- Mobile Backend-as-a-Service (MBaaS) — offers mobile application development and delivery services, including the tools to develop, integrate, test, and publish mobile applications
- Telecom Expense Management (TEM) — offers enterprise telecommunications solutions that support mobility and lifecycle management
The computing power, storage, networking capabilities, and sensory features on mobile devices can leave them open to malware that collects or compromises sensitive data. Mobile application security makes sure user-requested or agency-developed mobile applications meet your security requirements, offering:
- Secure web browsing
- Secure voice and data communications
- Safely stored email, calendar, and contacts
- Government-/agency- and mission-specific information and mobile applications
- Personal information protection
Mobile Application Security services include:
- Mobile Application Vetting— includes software, processes, and tools required to test, validate, and verify mobile apps against a baseline of security, privacy, and organization-specific requirements and policies.
- Mobile Threat Protection (MTP) — Solutions and services monitor mobile endpoints in real-time to identify threats that may compromise the endpoint, applications, or data on a device.
- Mobile Identity Management — This set of complementary products and solutions issues and maintains certificates, which may include Derived Personal Identification Verification (PIV) Credential usage.
- Policy for mobile security — Ensure your agency's security policies include mobile applications. The CIO Mobile Baseline [PDF] and the NIST Guidelines can help shape policy, strategy, and priorities.
- Security requirements for mobile apps — the Protection Profile from the National Information Assurance Partnership (NIAP) establishes baseline mobile application security profiles across the federal government.
- App vetting tool(s) — specialized software is required to test, validate, and verify mobile apps against the security baseline. This list of App Vetting tools includes those used by agencies and industry. However, this niche, relatively new marketplace rapidly changes suppliers and solutions.
- Maintainability and reciprocity — Guard against potential risks introduced by updates to apps and mobile device operating systems. Also, consider collaborating with other federal agencies such as the Mobile App Security Vetting Working Group (MASVWG), a cross-agency group working on recommendations for sharing best practices and information on pre-vetted applications.
Find a full list of mobile application security vendors on eLibrary.
Use the Mobile Application Playbook [PDF - 3 MB] to guide you through the security application's design and lifecycle, and learn more about current and emerging threats and recommendations on security upgrades in this Department of Homeland Security mobile device security report.
Internet of Things and Other/Mobile Services include services not commonly used across agency enterprises due to unique usage, features, niche application, or legacy technology requirements.
- Internet of Things (IoT)— solutions that allow you to design, develop, operate, and maintain a networked infrastructure of computing resources, digital sensors, actuators, and human interfaces.
- Other/Mobile Services — include wireless mobility and telecommunications services not commonly used across agency enterprises because of unique usage, features, niche application, or legacy technology requirements.
Buy Wireless Mobility Solutions
Federal, state, local, regional, and tribal governments can order commercial off the shelf (COTS) wireless mobility solutions on eLibrary on the Multiple Award Schedule under IT Category Special Item Number 517312:
- Wireless Services
- Enterprise Mobility Management
- Mobile Application Security
- Internet of Things & Other/Mobile Services
Sell Wireless Mobility Solutions
Existing Multiple Award Schedule (MAS) contract holders
Fill out the Modification Checklist [PDF - 93 KB] and submit a modification to add the Wireless Mobility Solutions SIN 517312 through the GSA eOffer/eMod portal.
For more information, follow the instructions for selecting SIN subgroups [PDF - 52 KB]