Wireless Mobility Solutions (WMS)

Multiple Awards Schedule (MAS) Information Technology special item number (SIN) 517312. Best-in-Class contract covers federally compliant, commercially available wireless mobility solutions in 11 subcategories within these technology areas:

Use the Wireless Mobility Solutions program to buy a broad portfolio of solutions. View the Wireless Mobility slipsheet [PDF - 1017 KB] and the Wireless Subcategories slipsheet [PDF - 180 KB] for more information.

Wireless Services

city background with multiple circles of people conducting business connected to each other

Subcategory 1: Wireless Services replaces the expired Federal Strategic Sourcing Initiative (FSSI) Wireless Blanket Purchase Agreements (BPAs). This new program includes many service providers and offers increased flexibility so you can easily select the best-quality wireless carrier to meet your needs.

Other features include:

  • Up to 30 percent in savings;
  • Federal, state, local, and tribal government availability; and
  • Select no-charge devices, with device replacement after 20 months.


  • Subcategory 1: Wireless Carrier Services—This includes but is not limited to wireless telecommunications carriers and telecommunication resellers of wireless services. These providers offer mobile communications in and outside of the contiguous United States.

Enterprise Mobility Management

Man in suit touching iPad on desk, with overlay of nodes, charts and graphs

Enterprise Mobility Management (EMM) is a set of tools and services that centralizes mobile device management and maintenance. EMM combines security and management solutions for devices, applications, data, and content by:

  • Enabling IT to track and manage wireless devices;
  • Improving security, integration, and mobile application adoption;
  • Securely managing mobile devices and platforms; and
  • Increasing access to data, applications, and services.

You can learn more by downloading the EMM functional requirements [DOCX - 86 KB] created by the Federal Mobility Group.


  • Subcategory 2: Mobility Infrastructure—This includes mobile infrastructure required to use or enhance wireless communications. Also includes user interfaces and miscellaneous hardware included with a mobile service.
  • Subcategory 3: Mobility-as-a-Service (MaaS)—This is a subscription-based service enabling mobile endpoint management.
  • Subcategory 4: Enterprise Mobility Management (EMM)—A cohesive set of tools, software, and service capabilities for providing, managing, securing, and controlling mobile endpoint functionality as well as its applications, features, and content.
  • Subcategory 5: Mobile Backend-as-a-Service (MBaaS)—MBaaS offers mobile application development and delivery service that includes the tools to develop, integrate, test, and publish mobile applications.
  • Subcategory 6: Telecom Expense Management (TEM)—TEM offers enterprise solutions that support mobility and telecom-related assets’ lifecycle management.

Mobile Application Security

Silhouette of lock with tech bands around it and binary numbers in the background

Mobile devices’ computing power and storage, networking capabilities, and sensory features can introduce malware that collects or compromises an agency’s sensitive data.

Mobile application security ensures that user-requested or agency-developed mobile applications meet an agency’s security requirements and includes:

  • Secure web browsing;
  • Secure voice and data communications;
  • Safely stored email, calendar, and contacts;
  • Government-/agency- and mission-specific information and mobile applications; and
  • Personal information protection.

The Mobile Application Playbook [PDF - 3 MB] can guide you through the security application’s design and lifecycle.

You can also view current and emerging threats to the federal government’s use of mobile devices and recommendations on security upgrades in a Department of Homeland Security mobile device security report.


  • Subcategory 7: Mobile Application Vetting—This includes software, processes, and tools required to test, validate, and verify mobile apps against a baseline of security, privacy, and organization-specific requirements and policies.
    • Policy for mobile security. Ensure your agency’s security policies include mobile applications. The CIO Mobile Baseline [PDF] and the NIST Guidelines can help shape policy, strategy, and priorities.
    • Security requirements for mobile apps. The Protection Profile from the National Information Assurance Partnership (NIAP) establishes baseline mobile application security profiles across the federal government.
    • App vetting tool(s). Specialized software is required to test, validate, and verify mobile apps against the security baseline. This list of App Vetting tools includes those used by agencies and industry. However, this niche, relatively new marketplace rapidly changes suppliers and solutions.
    • Maintainability and reciprocity. Guard against potential risks introduced by updates to apps and mobile device operating systems. Also, consider collaborating with other federal agencies such as the Mobile App Security Vetting Working Group (MASVWG), a cross-agency group working on recommendations for sharing best practices and information on pre-vetted applications.
  • Subcategory 8: Mobile Threat Protection (MTP)—Solutions and services monitor mobile endpoints in real-time to identify threats that may compromise the endpoint, applications, or data on a device.
  • Subcategory 9: Mobile Identity Management—This set of complementary products and solutions issues and maintains certificates, which may include Derived Personal Identification Verification (PIV) Credential usage.

Internet of Things & Other/Mobile Services

City skyline background with virtual globe and rings and various internet clip art

This section covers vendors who offer other services not commonly used across agency enterprises due to unique usage, features, niche application, or legacy technology requirements.


  • Subcategory 10: Internet of Things (IoT)—Design, develop, operate, and maintain a networked infrastructure of computing resources, digital sensors, actuators, and human interfaces that are combined into systems to achieve specific goals.
  • Subcategory 11: Other/Mobile Services—Industry partners that provide mobile solutions not included in Subcategories 1 through 10 are offered here. Examples include paging, short-term rental/disposable endpoint component, and satellite-only communications providers.

Get Expert Help

If you need help, contact us.

Last Reviewed: 2021-07-29