GSA 8(A) STARS III GWAC
TIC Security has been awarded with the 8(a) STARS III small business set-aside, providing flexible access to customized IT solutions from a large, diverse pool of 8(a) industry partners. This next-generation GWAC builds upon the 8(a) STARS II framework, expanding capabilities for newly developed technologies and OCONUS requirements.
STARS III OVERVIEW:
STARS III enable federal agencies to fulfill mission requirements and, at the same time, assists in meeting or exceeding socioeconomic goals through the utilization of businesses which were certified 8(a) eligible by the SBA. Federal agencies may earn applicable socioeconomic procurement preference credits that each industry partner possesses. STARS III is a five-year contract with one three-year option, affording the opportunity for industry partners to develop and create sustainable businesses.
SCOPE OF CONTRACT:
Provides Federal agencies with customized IT services and IT services-based solutions, both commercial and non-commercial. Customized IT services-based solutions can be tailored to meet an agency’s particular mission needs and may include new and emerging technologies that evolve over the life of the Master Contract. The principal nature of any resulting Order must be for IT services; however ancillary support may be included when it is integral to and necessary for the IT services-based effort. Services may be performed at Government and/or Contractor locations worldwide, as specified in each Order.
STARS III CLASSIFICATION:
Supports personnel and facility work up to TOP SECRET.
STARS III BENEFITS:
Provides streamlined procurement for IT Services through:
- Access to high-quality industry partners
- Pre-competed, multiple award contracts
- Shortened procurement lead time
- Limited protest ability
- Socioeconomic credit through FPDS-NG reporting
- Customer-focused staff with expertise in small business technology contracts
- Scope compatibility reviews of prospective orders and modifications
- Market research and capabilities support
- Identical labor categories for all industry partners on each contract
- Fixed price
- Time and materials
- Labor hour
- Blended task order types
Examples of work to be performed relative to Order requirements include, but are not limited to, the following:
Data Management is the development, execution, and supervision of plans, policies, programs, and practices that control, protect, deliver, and enhance the value of data and information assets. Examples of Data Management services include, but are not limited to:
- Cloud Computing Services,
- Data Architecture,
- Analysis and Design,
- Data Governance,
- Data Migration,
- Data Quality Management,
- Data Security Management,
- Data Warehousing and Business Intelligence Management,
- Document, Record and Content Management,
- Network and Individual Storage Management
Information and Communications Technology refers to the technology used to manage telecommunications, broadcast media, intelligent building management systems, audiovisual processing and transmission systems, and network-based control and monitoring functions. Examples of Information and Communications Technology services include, but are not limited to:
- Collaboration Technology Services,
- IPv6 Implementation and Support Services,
- Telepresence and Video Services,
- Virtual Private Network (VPN) and other Remote Network Access Services,
- Virtualization Services,
- Voice over IP (VoIP) Services,
- Wireless Services
IT Operations and Maintenance includes the operation and management of technology infrastructure. Examples of IT Operations and Maintenance services include, but are not limited to:
- Bring Your Own Device (BYOD) Support Services,
- Data Center Management,
- Email and File Server Management,
- IT Helpdesk / IT Support,
- IT Training,
- Mobile Device Management,
- PC Provisioning, Server, and
- Device Management
IT Security / IT Workforce Augmentation, often referred to as cyber security, is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Examples of IT Security services include but are not limited to:
- Continuous Diagnostics and Mitigation,
- Continuous Security Monitoring Services,
- Identity Management and Access Management,
- Information Assurance,
- Intrusion Detection,
- IT Disaster Recovery Services,
- IT Security Incident Response,
- Network Security Monitoring,
- Security Assessment Services, and
- Vulnerability Analysis Services
Software Development is the process of developing software through successive phases in an orderly way. This process includes not only the actual writing of code but also the preparation of requirements and objectives, the design of what is to be coded, and confirmation that what is developed has met objectives. All software development methodologies, including Agile, are supported. Examples of Software Development services include but are not limited to:
- Mobile Application Development Services,
- Software Design,
- Software Maintenance,
- Software Programming,
- Software Testing,
- Web Development
Systems Design includes the planning and designing of computer systems that integrate computer hardware, software, and communication technologies. The hardware and software components of the system may be provided by this establishment or company as part of a customized IT solution. These establishments often install the system and train and support users of the system. Examples of Systems Design services include, but are not limited to:
- Computer Systems Integration,
- Design Consulting Services,
- Configuration Management Services,
- Information Management Computer Systems Integration Design Services,
- IT Specifications Development,
- Network Infrastructure Design,
- Office Automation Computer Systems Integration Design Services,
- Smart Buildings Systems Integration
Emerging Technology-Focused IT Services – This scope sub-area provides for IT services-based solutions which involve emerging technology (ET) innovation to securely accelerate transformation and advance mission outcomes. A task order requirement can fit in this sub-area if it includes IT services-based solutions with ET as the focus.
ET can be understood as evolving state-of-the-art information technologies and their use in solutions to improve and/or transform business processes and enhance mission delivery. ET includes those technologies that are not yet mature in the marketplace and have the potential for wide-spread adoption. These technologies are in the early stages of their life cycles and have been implemented by early adopters.
Rather than specifying predetermined technology solutions, agencies considering ET are encouraged to succinctly focus on articulating in the task order requirement the business problems they face, e.g. through the use of a statement of objective approach. ET activities include, but are not limited to:
(1) Analyzing, designing and applying the knowledge needed to investigate and provide an ET solution.
(2) Providing technical expertise and guidance to plan, conduct, technically direct, document, test and assess ET implementations, including operating and sustaining ET implementations.
(3) Analyzing the trade-off of implementing vs. not implementing ET, including cost-benefit analysis.
Illustrative ET examples include but are not limited to:
- Artificial Intelligence, including:
- Machine Learning,
- Deep Learning/Neural Networks,
- Natural Language Generation.
- Autonomic Computing.
- Blockchain and/or Distributed Ledger
- Quantum Computing.
- Robotic Process Automation.
- Technological Convergence.
- Virtual Reality, including Augmented Reality, Extended Reality, Mixed Reality.