The SmartBUY Agreements allow federal agencies to procure commercial software from publishers/resellers at reduced prices and more favorable terms/conditions. Each agreement is listed within its respective software market category.
SmartBUY Market Categories
Business Intelligence – Decision-making software used by enterprise users to analyze corporate data, track organizational performance, and detect business trends.
Geospatial Information Systems (GIS) - Systems that capture, store, analyze, and manage geographically-referenced data. GIS tools allow users to create interactive queries, analyze spatial information, edit data, and map the results of these operations. Geospatial Agreement
Database Management - A computer program, or suite of programs, that stores large amounts of information in a hierarchical structure to allow users to search, retrieve, sort, revise, analyze, and order data quickly and efficiently.
Information Assurance (IA) -Software that protects and defends information systems and their data by ensuring system availability, integrity, authentication, and confidentiality.
Enterprise Backup/Recovery - An organizational business process undertaken to restart operations following natural or human-caused disasters. Disasters may be horrific events such as terrorist attacks and fires, or as subtle as data input errors that trigger negative consequences.
Network Management - A set of tools and applications used to monitor an organization’s computer networks and effectively manage, control, and protect its software assets.
Enterprise Content Management (ECM) - A process improvement technology used to manage important documents and other business information via a structured framework. ECM tools manage the capture, storage, security, revision control, retrieval, distribution, preservation, and destruction of organizational content.
Office Automation - A set of software business applications commonly used for document production by professional and clerical employees. A typical suite consists of word processing, spreadsheet, presentation graphics, and relational database software.
Enterprise Resource Planning (ERP) -An integrated software solution used to manage an organization's resources. ERP systems integrate all business management functions, including planning, inventory/materials management, engineering, order processing, manufacturing, purchasing, accounting, finance, and human resources.
Open Source - Free software and corresponding source code available to the general public. Open source code is typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community.
Oracle offers a family of financial, database, application server, collaboration software, and management and development tools for Microsoft Windows and .Net.
Meridio enables enterprises to meet their corporate governance needs including legislation, litigation, and business process optimization goals. Meridio with Microsoft provides complete lifecycle Enterprise Content Management (ECM), from document creation and modification to record declaration, policy driven retention, and disposal.
Manugistics provides solutions in the functional areas of Supply Chain Management, Pricing and Promotional Planning, Sales and Operations Planning, Performance Management, and Revenue Management.
Primavera / ProSight - Primavera Systems (formerly ProSight Inc.) provides enterprise portfolio management software and services. ProSight software suite provides applications for Capital Planning and Investment Budgeting, IT Governance, FISMA & Privacy Compliance, and Regulatory Compliance.
Environmental Systems Research Institute - ESRI software is used for a variety of applications including natural resource management, environmental impact assessment, strategic and military operation mapping, national infrastructure planning, and social services distribution.
Xacta provides Web Certification and Accreditation (C&A) software and consulting services. Xacta Web C&A is the first commercially available application to automate the C&A security process.
Credant Mobile Guardian is an enterprise Intelligent Encryption solution for mobile security. The enterprise scale security solution protects mobile data with enforced security across all endpoints (e.g., laptops, desktops, USB drives, external hard drives, and optical media).
Credant Mobile Guardian is an enterprise Intelligent Encryption solution for mobile security. The enterprise scale security solution protects mobile data with enforced security across all endpoints (e.g., laptops, desktops, USB drives, external hard drives, and optical media).
ESI's SkyLOCK Encryption At-Rest technology is an ideal security solution to reduce or eliminate the risks associated with data breaches by securing data for laptops, tablets and PCs.
The GuardianEdge Data Protection Platform provides an enterprise-class solution for deploying and managing endpoint data protection. Designed to meet the key criteria for enterprise IT administration, it makes endpoint data protection easy to install and manage, leverages the Active Directory enterprise infrastructure, and provides unprecedented scalability.
Information Security Corporation products offered under the BPA include SecretAgent, SecretAgent DAS and SpyProof! SecretAgent, the leading X.509 certificate-based encryption and digital signature utility, protects data-at-rest and data-in-transit with or without a formal PKI on a wide range of platforms.
The McAfee (formerly SafeBoot) suite of mobile data security solutions protects data, devices, and networks against the risks associated with loss, theft, and unauthorized access, anytime and anywhere. McAfee provides powerful encryption and strong access control technologies that seamlessly integrate with existing enterprise systems.
The McAfee (formerly SafeBoot) suite of mobile data security solutions protects data, devices, and networks against the risks associated with loss, theft, and unauthorized access, anytime and anywhere. McAfee provides powerful encryption and strong access control technologies that seamlessly integrate with existing enterprise systems.
Mobile Armor security solutions provide organizations with tools to manage data encryption, device administration, system compliance, remediation, remote networking, or command and control. The software provides compliance, data protection, authentication, and advanced administration for all enterprise devices.
Pointsec Mobile Technologies develops security software for PCs, laptops, PDAs and other mobile devices. By securing sensitive information, Pointsec helps enterprises minimize risk, shield confidential data, guard information assets, and strengthen public and shareholder confidence.
SafeNet provides complete security utilizing encryption technologies to protect communications, intellectual property, and digital identities. ProtectDrive, the full-disk encryption component of SafeNet's data-at-rest protection suite, secures sensitive data on laptops, workstations, servers, and USB drives against theft or accidental loss.
The SPYRUS Talisman/DS Data Security Suite integrates authentication and encryption products with WinMagic's SecureDoc full-disk encryption to offer the most comprehensive commercially available selection of high-assurance encryption with advanced authentication solutions. These solutions protect data on PC hard drives, external drives, portable drives, and removable media.
WinMagic's SecureDoc encryption software addresses the needs of mobile workforces by ensuring protection of sensitive information by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot time. SecureDoc presents a user-friendly solution, providing solid security for PCs and laptops alike.
BDNA Corporation's software enables government agencies and business customers to reduce IT maintenance and operations costs, free dollars to increase investments in new technology, manage regulatory compliance, attest to IT software and hardware assets, and align IT with business needs.
Belarc's software allows users to simplify and automate the management of all IT systems, using a central repository consisting of detailed software, hardware and security configurations. Vulnerability assessments of IT systems can also be performed to check security policies and configuration settings.
BigFix Inc. offers a converged IT security and operations platform that enables real-time visibility and control of globally distributed desktop, mobile and server computers. BigFix enables large-scale enterprises to continuously enforce IT security, IT policy compliance, and systems management on all computers.
Quest provides a set of solutions to reduce system downtime, optimize application performance and provide dynamic visibility into IT infrastructures. Quest's software falls into three functional areas: Application Management, Database Management, and Infrastructure Management.