SmartBUY
SmartBUY Agreements
SmartBUY
smartbuy@gsa.gov
The SmartBUY Agreements allow federal agencies to procure commercial software from publishers/resellers at reduced prices and more favorable terms/conditions. Each agreement is listed within its respective software market category.
SmartBUY Market Categories
|
Business Intelligence – Decision-making software used by enterprise users to analyze corporate data, track organizational performance, and detect business trends.
|
Geospatial Information Systems (GIS) - Systems that capture, store, analyze, and manage geographically-referenced data. GIS tools allow users to create interactive queries, analyze spatial information, edit data, and map the results of these operations.
Geospatial Agreement
|
Database Management - A computer program, or suite of programs, that stores large amounts of information in a hierarchical structure to allow users to search, retrieve, sort, revise, analyze, and order data quickly and efficiently.
Database Management Agreements |
Information Assurance (IA) -Software that protects and defends information systems and their data by ensuring system availability, integrity, authentication, and confidentiality.
Information Assurance Agreements
Data at Rest (DAR) Encryption Fact Sheet
|
Enterprise Backup/Recovery - An organizational business process undertaken to restart operations following natural or human-caused disasters. Disasters may be horrific events such as terrorist attacks and fires, or as subtle as data input errors that trigger negative consequences.
|
Network Management - A set of tools and applications used to monitor an organization’s computer networks and effectively manage, control, and protect its software assets.
Network Management Agreements |
Enterprise Content Management (ECM) - A process improvement technology used to manage important documents and other business information via a structured framework. ECM tools manage the capture, storage, security, revision control, retrieval, distribution, preservation, and destruction of organizational content.
ECM Agreement
|
Office Automation - A set of software business applications commonly used for document production by professional and clerical employees. A typical suite consists of word processing, spreadsheet, presentation graphics, and relational database software.
Office Automation Agreement |
Enterprise Resource Planning (ERP) -An integrated software solution used to manage an organization's resources. ERP systems integrate all business management functions, including planning, inventory/materials management, engineering, order processing, manufacturing, purchasing, accounting, finance, and human resources.
ERP Agreements
|
Open Source - Free software and corresponding source code available to the general public. Open source code is typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community.
|
SmartBUY Agreements Listing
Market Category
|
Publisher/(Product)
|
Reseller
|
Products
|
Database Management
|
Oracle
|
Oracle Corporation
DLT Solutions
Mythics, Inc.
|
Oracle offers a family of financial, database, application server, collaboration software, and management and development tools for Microsoft Windows and .Net.
Back to the top
|
Enterprise Content Management
|
Meridio
|
Point One Inc.
|
Meridio enables enterprises to meet their corporate governance needs including legislation, litigation, and business process optimization goals. Meridio with Microsoft provides complete lifecycle Enterprise Content Management (ECM), from document creation and modification to record declaration, policy driven retention, and disposal.
Back to the top
|
Enterprise Resource Planning
|
Manugistics
|
Manugistics Inc.
|
Manugistics provides solutions in the functional areas of Supply Chain Management, Pricing and Promotional Planning, Sales and Operations Planning, Performance Management, and Revenue Management.
Back to the top
|
Enterprise Resource Planning
|
Primavera/ProSight
|
Primavera/ProSight Inc.
|
Primavera / ProSight - Primavera Systems (formerly ProSight Inc.) provides enterprise portfolio management software and services. ProSight software suite provides applications for Capital Planning and Investment Budgeting, IT Governance, FISMA & Privacy Compliance, and Regulatory Compliance.
Back to the top
|
Geospatial Information Systems
|
Environmental Systems Research Institute
|
Environmental Systems Research, Inc.
|
Environmental Systems Research Institute - ESRI software is used for a variety of applications including natural resource management, environmental impact assessment, strategic and military operation mapping, national infrastructure planning, and social services distribution.
Back to the top
|
Information Assurance (Anti-Virus)
|
McAfee
|
CDW-G
En Pointe
Softmart
|
McAfee provides software and services in the areas of virus protection, spyware, computer worm removal, internet security, and hacker protection.
Back to the top
|
Information Assurance (C&A)
|
Xacta
|
Telos Corporation
|
Xacta provides Web Certification and Accreditation (C&A) software and consulting services. Xacta Web C&A is the first commercially available application to automate the C&A security process.
Back to the top
|
Information Assurance (Data At Rest)
|
CREDANT Technologies, Inc.
|
Intelligent Designs, Inc
|
Credant Mobile Guardian is an enterprise Intelligent Encryption solution for mobile security. The enterprise scale security solution protects mobile data with enforced security across all endpoints (e.g., laptops, desktops, USB drives, external hard drives, and optical media).
Back to the top
|
Information Assurance (Data At Rest)
|
Encryption Solutions, Inc.
|
Hi-Tech Services Inc
|
ESI's SkyLOCK Encryption At-Rest technology is an ideal security solution to reduce or eliminate the risks associated with data breaches by securing data for laptops, tablets and PCs.
Back to the top
|
Information Assurance (Data At Rest)
|
GuardianEdge Technologies, Inc.
|
Merlin International, Inc.
|
The GuardianEdge Data Protection Platform provides an enterprise-class solution for deploying and managing endpoint data protection. Designed to meet the key criteria for enterprise IT administration, it makes endpoint data protection easy to install and manage, leverages the Active Directory enterprise infrastructure, and provides unprecedented scalability.
Back to the top
|
Information Assurance (Data At Rest)
|
Information Security Corporation |
Carahsoft Technology Corp |
Information Security Corporation products offered under the BPA include SecretAgent, SecretAgent DAS and SpyProof! SecretAgent, the leading X.509 certificate-based encryption and digital signature utility, protects data-at-rest and data-in-transit with or without a formal PKI on a wide range of platforms.
Back to the top
|
Information Assurance (Data At Rest)
|
Mobile Armor, LLC |
MTM Technologies Inc. |
Mobile Armor security solutions provide organizations with tools to manage data encryption, device administration, system compliance, remediation, remote networking, or command and control. The software provides compliance, data protection, authentication, and advanced administration for all enterprise devices.
Back to the top
|
Information Assurance (Data At Rest)
|
Pointsec Mobile Technologies |
immixGroup, Incorporated |
Pointsec Mobile Technologies develops security software for PCs, laptops, PDAs and other mobile devices. By securing sensitive information, Pointsec helps enterprises minimize risk, shield confidential data, guard information assets, and strengthen public and shareholder confidence.
Back to the top
|
Information Assurance (Data At Rest)
|
SafeBoot |
Rocky Mountain RAM, LLC |
The SafeBoot suite of mobile data security solutions protects data, devices, and networks against the risks associated with loss, theft, and unauthorized access. SafeBoot provides enterprise-class, powerful encryption and strong access control technologies that seamlessly integrate with existing systems.
Back to the top
|
Information Assurance (Data At Rest)
|
SafeBoot |
Spectrum Systems, Inc |
The SafeBoot suite of mobile data security solutions protects data, devices, and networks against the risks associated with loss, theft, and unauthorized access. SafeBoot provides enterprise-class, powerful encryption and strong access control technologies that seamlessly integrate with existing systems.
Back to the top
|
Information Assurance (Data At Rest)
|
SafeNet, Inc |
SafeNet, Inc |
SafeNet provides complete security utilizing encryption technologies to protect communications, intellectual property, and digital identities. ProtectDrive, the full-disk encryption component of SafeNet's data-at-rest protection suite, secures sensitive data on laptops, workstations, servers, and USB drives against theft or accidental loss.
Back to the top
|
Information Assurance (Data At Rest)
|
SPYRUS, Inc.
WinMagic, Inc. |
Autonomic Resources |
The SPYRUS Talisman/DS Data Security Suite integrates authentication and encryption products with WinMagic's SecureDoc full-disk encryption to offer the most comprehensive commercially available selection of high-assurance encryption with advanced authentication solutions. These solutions protect data on PC hard drives, external drives, portable drives, and removable media.
Back to the top
|
Information Assurance (Data At Rest)
|
WinMagic, Inc. |
GovBuys, Inc |
WinMagic's SecureDoc encryption software addresses the needs of mobile workforces by ensuring protection of sensitive information by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot time. SecureDoc presents a user-friendly solution, providing solid security for PCs and laptops alike.
Back to the top
|
Network Management
|
BDNA Corporation
|
DLT Solutions Inc.
|
BDNA Corporation's software enables government agencies and business customers to reduce IT maintenance and operations costs, free dollars to increase investments in new technology, manage regulatory compliance, attest to IT software and hardware assets, and align IT with business needs.
Back to the top
|
Network Management
|
Belarc, Inc.
|
Belarc, Inc.
|
Belarc's software allows users to simplify and automate the management of all IT systems, using a central repository consisting of detailed software, hardware and security configurations. Vulnerability assessments of IT systems can also be performed to check security policies and configuration settings.
Back to the top
|
Network Management
|
BigFix Inc
|
Patriot Technologies Inc.
|
BigFix Inc. offers a converged IT security and operations platform that enables real-time visibility and control of globally distributed desktop, mobile and server computers. BigFix enables large-scale enterprises to continuously enforce IT security, IT policy compliance, and systems management on all computers.
Back to the top
|
Network Management
|
Quest Software
|
Quest Software
|
Quest provides a set of solutions to reduce system downtime, optimize application performance and provide dynamic visibility into IT infrastructures. Quest's software falls into three functional areas: Application Management, Database Management, and Infrastructure Management.
Back to the top
|
Office Automation
|
WinZip
|
Eyak Technology, LLC
|
WinZip provides data-compression software to allow users to more efficiently organize, store, transport, e-mail, and download data.
Back to the top
|
Back to the top
|