Wireless Mobility Solutions (WMS)
If you're buying on Multiple Award Schedule (MAS), find a broad portfolio of Best-in-Class wireless mobility solutions on Special Item Number (SIN) 517312. Learn more about what we offer in the Wireless Mobility [PDF - 1017 KB] and Wireless Subcategories [PDF - 180 KB] slipsheets.
Wireless Services offers
- Federal, state, local, and tribal government buying
- Quality wireless carriers
- Select no-charge devices, with device replacement after 20 months
- Up to 30 percent in savings
Our Wireless Carrier Services include wireless telecommunications carriers and telecommunication resellers of wireless services in and outside of the contiguous United States.
Note: Wireless services replaced the expired Federal Strategic Sourcing Initiative (FSSI) Wireless Blanket Purchase Agreements (BPAs).
Enterprise Mobility Management (EMM) centralizes mobile device management and maintenance, combining security and management solutions for devices, applications, data, and content by:
- Enabling IT to track and manage wireless devices
- Improving security, integration, and mobile application adoption
- Securely managing mobile devices and platforms
- Increasing access to data, applications, and services
EMM services include
- Mobility Infrastructure — the mobile infrastructure required to use or enhance wireless communications (includes user interfaces and hardware included with a mobile service)
- Mobility-as-a-Service (MaaS) — a subscription-based service enabling mobile endpoint management
- Enterprise Mobility Management (EMM) — a cohesive set of tools, software, and service capabilities for providing, managing, securing, and controlling mobile endpoint functionality and its applications, features, and content
- Mobile Backend-as-a-Service (MBaaS) — mobile application development and delivery service that includes the tools to develop, integrate, test, and publish mobile applications
- Telecom Expense Management (TEM) — enterprise solutions that support mobility and telecom-related assets' lifecycle management.
The computing power, storage, networking capabilities, and sensory features on mobile devices can leave them open to malware that collects or compromises an agency's sensitive data. Mobile application security ensures that user-requested or agency-developed mobile applications meet an agency's security requirements, including:
- Secure web browsing
- Secure voice and data communications
- Safely stored email, calendar, and contacts
- Government-/agency- and mission-specific information and mobile applications
- Personal information protection
Use the Mobile Application Playbook [PDF - 3 MB] to guide you through the security application's design and lifecycle, and learn more about current and emerging threats and recommendations on security upgrades in this Department of Homeland Security mobile device security report.
Mobile Application Vetting—This includes software, processes, and tools required to test, validate, and verify mobile apps against a baseline of security, privacy, and organization-specific requirements and policies.
- Policy for mobile security. Ensure your agency's security policies include mobile applications. The CIO Mobile Baseline [PDF] and the NIST Guidelines can help shape policy, strategy, and priorities.
- Security requirements for mobile apps. The Protection Profile from the National Information Assurance Partnership (NIAP) establishes baseline mobile application security profiles across the federal government.
- App vetting tool(s). Specialized software is required to test, validate, and verify mobile apps against the security baseline. This list of App Vetting tools includes those used by agencies and industry. However, this niche, relatively new marketplace rapidly changes suppliers and solutions.
- Maintainability and reciprocity. Guard against potential risks introduced by updates to apps and mobile device operating systems. Also, consider collaborating with other federal agencies such as the Mobile App Security Vetting Working Group (MASVWG), a cross-agency group working on recommendations for sharing best practices and information on pre-vetted applications.
- Subcategory 8: Mobile Threat Protection (MTP)—Solutions and services monitor mobile endpoints in real-time to identify threats that may compromise the endpoint, applications, or data on a device.
- Subcategory 9: Mobile Identity Management—This set of complementary products and solutions issues and maintains certificates, which may include Derived Personal Identification Verification (PIV) Credential usage.
Internet of Things & Other/Mobile Services cover vendors who offer other services not commonly used across agency enterprises due to unique usage, features, niche application, or legacy technology requirements.
- Subcategory 10: Internet of Things (IoT)—Design, develop, operate, and maintain a networked infrastructure of computing resources, digital sensors, actuators, and human interfaces that are combined into systems to achieve specific goals.
- Subcategory 11: Other/Mobile Services—Industry partners that provide mobile solutions not included in Subcategories 1 through 10 are offered here. Examples include paging, short-term rental/disposable endpoint component, and satellite-only communications providers.
Get Expert Help
If you need help, contact us.