Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

Government Business Development | Technology

GSA's COMET 2 On the Horizon

By: Stephanie Hagan
November 27th, 2023

North pole reindeer won’t be the only thing you think of when you hear the word comet this season—GSA has plans in FY 2024 for version 2 of COMET, a multiple award Blanket Purchase Agreement (BPA) for IT modernization, transformation, and operations/maintenance. COMET, which stands for CIO Modernization and Enterprise Transformation, has awarded task orders totaling almost $1 billion, making it a great success for GSA and all contractors involved, especially when it comes to updating GSA’s legacy systems. GSA wants to continue the success with COMET 2, but make it larger and improve upon certain lessons learned. Here’s what we know so far about COMET 2 and how GSA plans to further the impact of this vehicle.

Read More

Share

Blog Feature

Government | Technology

The Importance of Cyber Hygiene in Government Contracts

By: Stephanie Hagan
October 26th, 2023

If you have a government contract such as the GSA Multiple Award Schedule (MAS), or are thinking about getting one, good cyber hygiene is key. Of course, every company wants to avoid cyber attacks and hacking, but it’s important when you are selling to the federal government to have certain practices in place to proactively safeguard your network.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

Government | Technology

Department of Defense Expects New CMMC Rule to be Released in Fall 2023

By: Stephanie Hagan
August 30th, 2023

The Department of Defense (DoD) and the Office of Management and Budget (OMB) are expecting the release of a proposed Cybersecurity Maturity Model Certification (CMMC) rule in September 2023. This rule was originally expected earlier this summer, but once released will set the framework for CMMC. Since this rule has been highly anticipated, let’s cover what you can expect over the next few months and how you can prepare for the implementation of CMMC.

Read More

Share

Blog Feature

Government Business Development | Government | Technology

Taking Advantage of State and Local Opportunities: Cooperative Purchasing

By: Stephanie Hagan
June 26th, 2023

A lot of GSA Schedule contractors think they can only sell their products and services to the federal government, but did you know you can sell to state, local, educational, and tribal entities too? Under certain state and local programs, you can offer the same products and services you sell to these entities, greatly expanding the marketplace for your company. One of the most widely used programs is Cooperative Purchasing, which applies to IT and Security and Protections contractors.

Read More

Share

Blog Feature

GSA Schedule | Technology

Selling through GSA’s Information Technology Category

By: Patrick Morgans
May 24th, 2023

We live in an increasingly digitally connected age, and the federal government is no exception. If your business is in the Information Technology (IT) field, you may be leaving money on the table if you are not actively marketing your products and services to the federal government. While often thought of as out of date in terms of its technology, it’s worth noting that the federal government spends billions on new IT hardware, software, solutions, and services every year. Not only that, but it is also increasing its expenditures in an attempt to create a more connected and secure federal cyber infrastructure.

Read More

Share

Blog Feature

Government | Technology

Compliance Requirements for Handling Controlled Unclassified Information (CUI)

By: Marissa Sims
February 22nd, 2023

As a government contractor, you have to stay vigilant about certain regulations so you are staying within the guidelines of the federal government. However, it’s not always an easy guidebook to follow. Some contractors are subject to additional policies if they handle certain types of information. If you are a government contractor within the Defense Industrial Base (DIB), or you handle Controlled Unclassified Information (CUI), there are certain regulations and clauses you have to follow. Here’s what you need to know about the security requirements for safeguarding CUI.

Read More

Share