Wireless Mobility Solutions SIN 517312

Best in Class badge in a circle shape

Our Wireless Mobility Solutions offer:

  • A single Best-in-Class contract for cutting-edge commercial mobility services
  • A streamlined request for quote process with our RFQ generator tool
  • Easier onboarding for vendors and increased competition from new and emerging companies

Wireless Carrier Services

Wireless carrier services replaced the expired Federal Strategic Sourcing Initiative (FSSI) Wireless Blanket Purchase Agreements (BPAs). It includes wireless telecommunications carriers and resellers of wireless services in and outside of the contiguous United States, offering:

  • Federal, state, local, and tribal government buying
  • Quality wireless carriers
  • Select no-charge devices, with device replacement after 20 months
  • Up to 30 percent in savings

Find a list of wireless carrier services vendors on eLibrary.

Enterprise Mobility Management

Enterprise Mobility Management (EMM) centralizes mobile device management and maintenance, combining security and management solutions for devices, applications, data, and content by:

  • Enabling IT to track and manage wireless devices
  • Improving security, integration, and mobile application adoption
  • Securely managing mobile devices and platforms
  • Increasing access to data, applications, and services

EMM services

Download the EMM functional requirements [DOCX - 86 KB] created by the Federal Mobility Group.

Mobile Application Security

The computing power, storage, networking capabilities, and sensory features on mobile devices can leave them open to malware that collects or compromises sensitive data. Mobile application security makes sure user-requested or agency-developed mobile applications meet your security requirements, offering:

  • Secure web browsing
  • Secure voice and data communications
  • Safely stored email, calendar, and contacts
  • Government-/agency- and mission-specific information and mobile applications
  • Personal information protection

Mobile Application Security services include:

  • Mobile Application Vetting— includes software, processes, and tools required to test, validate, and verify mobile apps against a baseline of security, privacy, and organization-specific requirements and policies.
  • Mobile Threat Protection (MTP) — Solutions and services monitor mobile endpoints in real-time to identify threats that may compromise the endpoint, applications, or data on a device.
  • Mobile Identity Management — This set of complementary products and solutions issues and maintains certificates, which may include Derived Personal Identification Verification (PIV) Credential usage.
  • Policy for mobile security — Ensure your agency's security policies include mobile applications. The CIO Mobile Baseline [PDF] and the NIST Guidelines can help shape policy, strategy, and priorities.
  • Security requirements for mobile apps — the Protection Profile from the National Information Assurance Partnership (NIAP) establishes baseline mobile application security profiles across the federal government.
  • App vetting tool(s) — specialized software is required to test, validate, and verify mobile apps against the security baseline. This list of App Vetting tools includes those used by agencies and industry. However, this niche, relatively new marketplace rapidly changes suppliers and solutions.
  • Maintainability and reciprocity — Guard against potential risks introduced by updates to apps and mobile device operating systems. Also, consider collaborating with other federal agencies such as the Mobile App Security Vetting Working Group (MASVWG), a cross-agency group working on recommendations for sharing best practices and information on pre-vetted applications.

Find a full list of mobile application security vendors on eLibrary.

Use the Mobile Application Playbook [PDF - 3 MB] to guide you through the security application's design and lifecycle, and learn more about current and emerging threats and recommendations on security upgrades in this Department of Homeland Security mobile device security report.

Internet of Things and Other Mobile Services

Internet of Things and Other/Mobile Services include services not commonly used across agency enterprises due to unique usage, features, niche application, or legacy technology requirements.

  • Internet of Things (IoT)— solutions that allow you to design, develop, operate, and maintain a networked infrastructure of computing resources, digital sensors, actuators, and human interfaces.
  • Other/Mobile Services — include wireless mobility and telecommunications services not commonly used across agency enterprises because of unique usage, features, niche application, or legacy technology requirements.

Buy Wireless Mobility Solutions

Federal, state, local, regional, and tribal governments can order commercial off the shelf (COTS) wireless mobility solutions on eLibrary on the Multiple Award Schedule under IT Category Special Item Number 517312:

Learn more about what we offer in the Wireless Mobility [PDF - 1017 KB] and Wireless Subcategories [PDF - 180 KB] slipsheets.

Sell Wireless Mobility Solutions

Existing Multiple Award Schedule (MAS) contract holders

Fill out the Modification Checklist [PDF - 93 KB] and submit a modification to add the Wireless Mobility Solutions SIN 517312 through the GSA eOffer/eMod portal.
For more information, follow the instructions for selecting SIN subgroups [PDF - 52 KB]

Agencies without an existing MAS contract

Follow steps in the Guide to Preparing a MAS Offer to prepare and send an offer, or learn more about how to sell to the government.


Tell us what you think

Last Reviewed: 2023-03-15