Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

Technology

Everything You Need to Know About GSA’s FASt Lane Program

By: Daniel Lopez
July 25th, 2022

The process of obtaining a GSA Schedule or completing modifications to an already existing contract takes time. We understand that the award cycle can be difficult and exhausting. Thankfully if you offer innovative IT solutions, your business might be eligible for GSA’s FASt Lane Program. This option is intended to help IT vendors obtain a GSA Schedule faster as well as speed up the modification time. It’s important to note that to every shortcut there are restrictions, so let’s take a closer look at how this program works and who qualifies.

Read More

Share

Blog Feature

GSA Schedule | Technology

Polaris: GSA's Small Business IT Contract

By: Stephanie Hagan
July 20th, 2022

Last Updated September 16, 2022 It’s finally here—GSA has unpaused the final Request for Proposal (RFP) for Polaris and released solicitations for all 4 pools. Polaris is a multiple-award small business IDIQ contract that will provide the federal government with IT services and IT service-based solutions with an emphasis on emerging technologies.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

GSA Schedule | Technology

Federal Government Spending: The Top 10 Special Item Numbers (SINs)

By: Julien Cannon
May 27th, 2022

Just like the commercial world, it’s important to periodically research what the current federal marketplace looks like and where it may be headed. Tracking federal government spending allows you know which agencies are spending the most money and what they are most interested buying. As we move through the 3rd quarter of Fiscal Year (FY) 2022, the government is gearing up for the Q4 spending spree, so it's important to take note of agencies' procurement habits and how your business can prepare.

Read More

Share

Blog Feature

Government | Technology

Department of Homeland Security (DHS) Issues Shields Up Advisory Amid Tension with Russia

By: Stephanie Hagan
February 24th, 2022

The Department of Homeland Security's (DHS) Cyber and Infrastructure Security Agency (CISA) has issued a Shields Up Advisory amid growing geopolitical tensions surrounding Russia and Ukraine. In addition to the recent tensions, CISA and the Federal Bureau of Investigation (FBI) have observed regular targeting of U.S. cleared defense contractors (CDCs) by Russian-state sponsored cyber actors from January 2020 to February 2022.

Read More

Share

Blog Feature

Government | Technology

Cybersecurity Maturity Model Certification (CMMC) 2.0 is Here

By: Stephanie Hagan
November 8th, 2021

CMMC 2.0 is here—the Department of Defense (DoD) announced the revamped version of the Cybersecurity Maturity Model Certification (CMMC) on November 4, 2021. CMMC, a cybersecurity compliance program for defense contractors, is intended to verify that contractors are taking the appropriate cybersecurity practices and measures. Contractors in the Defense Industrial Base (DIB) have been following CMMC closely as it’s slowly being phased into notices, requirements, and solicitations.

Read More

Share

Blog Feature

GSA Schedule | Technology

The High Value Asset (HVA) Assessment Requirement for the HACS SIN

By: Elizabeth Mordica
September 7th, 2021

We live in the digital era and as we have seen with the pandemic, more and more aspects of life are becoming digitized. This does not exclude our federal entities, so it’s imperative that our federal government is protected from the threats that come with the digital age. As a result, GSA created a HACS (Highly Adaptive Cybersecurity Services) SIN which is dedicated to preventing leaks and cyberattacks. Before an entity can obtain a HACS SIN, they must show that they are qualified to provide thorough and extensive cybersecurity. A main part of the qualification for the HACS SIN is determined by an Assessment Evaluation and Standardization (AES) High Value Asset (HVA) assessment. Let’s dive into the HVA assessment and what it entails.

Read More

Share