Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

Technology

Section 508 for Contractors: What is it and Who Has to Comply?

By: Tyler Kittle
September 7th, 2022

Are you in the process of putting together an offer for a GSA Schedule or bidding on a government solicitation and want to ensure your company is meeting all the compliance criteria? Well, Section 508 may apply to you. If you plan on supplying Information and Communication Technology (ICT) products and services to the federal government, you’ll need to outline your company’s ability to comply with the revised Section 508 standards. Here’s what you need to know about this legislation and how it fits into the federal government.

Read More

Share

Blog Feature

GSA Schedule | Technology

Polaris: GSA's Small Business IT Contract

By: Stephanie Hagan
July 20th, 2022

Last Updated September 16, 2022 It’s finally here—GSA has unpaused the final Request for Proposal (RFP) for Polaris and released solicitations for all 4 pools. Polaris is a multiple-award small business IDIQ contract that will provide the federal government with IT services and IT service-based solutions with an emphasis on emerging technologies.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

GSA Schedule | Technology

Federal Government Spending: The Top 10 Special Item Numbers (SINs)

By: Julien Cannon
May 27th, 2022

Just like the commercial world, it’s important to periodically research what the current federal marketplace looks like and where it may be headed. Tracking federal government spending allows you know which agencies are spending the most money and what they are most interested buying. As we move through the 3rd quarter of Fiscal Year (FY) 2022, the government is gearing up for the Q4 spending spree, so it's important to take note of agencies' procurement habits and how your business can prepare.

Read More

Share

Blog Feature

Government | Technology

Department of Homeland Security (DHS) Issues Shields Up Advisory Amid Tension with Russia

By: Stephanie Hagan
February 24th, 2022

The Department of Homeland Security's (DHS) Cyber and Infrastructure Security Agency (CISA) has issued a Shields Up Advisory amid growing geopolitical tensions surrounding Russia and Ukraine. In addition to the recent tensions, CISA and the Federal Bureau of Investigation (FBI) have observed regular targeting of U.S. cleared defense contractors (CDCs) by Russian-state sponsored cyber actors from January 2020 to February 2022.

Read More

Share

Blog Feature

Government | Technology

Cybersecurity Maturity Model Certification (CMMC) 2.0 is Here

By: Stephanie Hagan
November 8th, 2021

CMMC 2.0 is here—the Department of Defense (DoD) announced the revamped version of the Cybersecurity Maturity Model Certification (CMMC) on November 4, 2021. CMMC, a cybersecurity compliance program for defense contractors, is intended to verify that contractors are taking the appropriate cybersecurity practices and measures. Contractors in the Defense Industrial Base (DIB) have been following CMMC closely as it’s slowly being phased into notices, requirements, and solicitations.

Read More

Share

Blog Feature

GSA Schedule | Technology

The High Value Asset (HVA) Assessment Requirement for the HACS SIN

By: Elizabeth Mordica
September 7th, 2021

We live in the digital era and as we have seen with the pandemic, more and more aspects of life are becoming digitized. This does not exclude our federal entities, so it’s imperative that our federal government is protected from the threats that come with the digital age. As a result, GSA created a HACS (Highly Adaptive Cybersecurity Services) SIN which is dedicated to preventing leaks and cyberattacks. Before an entity can obtain a HACS SIN, they must show that they are qualified to provide thorough and extensive cybersecurity. A main part of the qualification for the HACS SIN is determined by an Assessment Evaluation and Standardization (AES) High Value Asset (HVA) assessment. Let’s dive into the HVA assessment and what it entails.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Before you leave, grab a copy of our ebook.

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.