̽»¨ÊÓƵ

Information Technology Enterprise Solutions – Software 2 (ITES-SW2)

# W52P1J-20-D-0042

ITES-2W2-logo.png

 

The purpose of the ITES-SW 2 acquisition is to support Army, Department of Defense (DoD) and all Federal Agency enterprise Information Technology (IT) infrastructure and info-structure goals by leveraging Commercially available-Off-The-Shelf (COTS) software products and maintenance in 14 product categories in addition to related incidental services and hardware. These 14 categories align with the major software categories identified by U.S. Army Network Enterprise Technology Command (NETCOM). The software catalogs are:

Audio & Visual
Multimedia & Design
Business & Finance NetOps
Communication Office Suite
Database Operating Systems
Education Programming & Development
Internet IT Utility & Security
Modeling & Simulation Specialized


All products and services available under ITES-SW 2 must be commercial in accordance with the definition of commercial items in Federal Acquisition Regulation (FAR) 2.101. The planned period of performance is five years with one five year option with an estimated contract value of $13 billion.

Contract Information

Ordering

Vendors

#

1Kosmos

3CLogic

7SIGNAL

17a-4

1440

A

Absolute Security

Abstract

Acadis

Acalvio

Accela

AccessData

Accrete Government

AchieveIt

Acquia

ActiveFence

ActiveState

ADF Solutions

Adobe

Adobe Connect

AECOM

Aerospike

AgileBlue

AIComply

Airspace Link

Aisera

Akamai

Allocore

Alltius

Allyant

Altair

Altana

Alteryx, Inc.

AmbiFi

Anchore

Animate Cyber

APIsec.ai

Apollo Information Systems

AppGuard

Appian

Apposite Technologies

Aqua

Arcadus

Archer

archTIS

Armada

ArmorText

Arqit

Ascent Solutions

Ask Sage

Assima

Astera

Audible Sight

Aurigo

Authenticiti

Autodesk

Automize A/S

Avaap

AvePoint Public Sector

Avid

Avisare

Aware

AWS

Axon

Axonius Federal Systems

Axway

B

Babel Street

Backing Fire

Beezy

Bentley Systems

BetterUp

BeyondTrust

Bidscale

BigID

BlackBerry

Blackbird.AI

Black Duck

BlackFog

Blackshark.ai

Blaize

Blancco

Blinkly

BlocPower

Blue Fusion

BlueHalo

Bluescape

BlueVoyant

Bocada

Boomi

Botcopy

Boulder Insight

Box

Bravium

Bright Pattern

Bryq

Buoyant

Byos

C

CalypsoAI

Cambium Networks

CA Technologies

cBEYONData

Cellebrite

Celonis

Censys

Certus Core

Chainalysis

Chainbridge Solutions

Chainguard

Check Point

Chooch

Chronus

Cigent

Cimcor

Circle Protocol

Cision

Clarifai

ClearInfo

ClearInsight Solutions

ClearPoint Strategy

Clear Skye

Click Armor

CloudBees

Cloudburst

CloudCaller.io

Cloudera

CloudFrame

Cloudian

CloudMatos

CloudSaver

Cloud Software Group

Codeium

CodeLock

Cofense

Cohesity

Collabware

Collibra

Commvault

Compart

Confluent

Contentsquare

ContraForce

Contrast Security

Copado

CORAS

Corelight

Corellium

CoreLogic

CorePLUS

CostPerform

CounterCraft

Coupa

Coursera

Craft

Cranium

CrashPlan

Crave.io

Crawford Technologies

Cribl

Cronos

CrowdAI

Cyara

Cyberbit

CybernetIQ

Cybrary

CyCognito

Cylance

Cynerio

Cypher

Cytellix

D

D-Wave

Dantex

Daric

Darzin Software

data.world

Databricks

Dataiku

Datameer

DataRobot

DataShapes

Decision Lens

Deep Labs

Deep Media

Definitive Business Solutions

Dejero

Delinea

Delphix

Deltek

Denodo

Dice

DigitalXForce

DigitSec

Diligent

Disaster Tech

Discovered Intelligence

Docusign

Domino Data Labs

Domo

Do Process

Dragos

DreamFactory Software

Dremio

Druid

Druva

DryvIQ

DTech Apps by Discover Technologies

Dtex Systems

Duality

Dun & Bradstreet

Dynamo AI

Dynatrace

E

e-Magic

e-Share

EarlyBirds

Eclypsium

EDB

Edgecore Networks

EdgeRunner

Eduworks Corporation

Effectual

eGain

Eightfold.ai

Elastic

ElastiFlow

ElectrifAi

Element34

Elemental Cognition

Elliptic Enterprises

Endor Labs

Entrust Digital Security

Epik Solutions

Ericsson (formerly Cradlepoint)

Everblue

Everfox

Everlaw

eVisit

EvolveWare

Exabeam

Exclaimer

Exiger Government Solutions

Expanse

F

Falkonry

FastDial

Federal Compass

Federated Wireless

FedLearn

Fend

Fenix Insight

FI Consulting

Fidelis Security

FileCloud

Flashpoint

Flexera

Flosum

Fluence Technologies

FM:Systems

FogHorn Systems

ForceMetrics

Forcepoint

Forescout

Fornetix

Fortanix

Fortinet

Fortra

Fortress

Forum Systems

Forward Networks

Frameable

FusionReactor

G

Gallus Communications

Garblecloud

Genesys

Geosite

Gimmal

GitLab

Glasswall

Global Telehealth Services

GL Solutions

GoMeddo

Google

GoSecure

Govini

Grafbase

Graid Technology

Grammarly

Granicus

Graphika

Greymatter.io

GreyNoise

Greystones Group

Groq

Groundswell

Guardian Score

GuardStack

GXC

Gyrus Systems

Gyst

H

H2O.ai

HackerRank

Hack The Box

Haevek

Halcyon Solutions Inc.

HashiCorp

Hewlett Packard Enterprise

HIPAA Vault

Hiplink

Holonic Technologies

Hootsuite

Horizon3.ai

HUMAN Security

HYAS

Hypori

HyTrust

I

iboss

iBwave

ICEYE

ID.me

IDI

IEM

Immersive Wisdom

Inbox Monster

Indago

Industrial Defender

Info Bastion

Infoblox

Info Security Corp

InfraMappa

Ingentis

Inkit

Innive

InQuisient

Instabase

Insystech

Intercede

Intermap Technologies

Interos

Interpersonal Frequency

Intratem

Invicti

ioMoVo

IronNet Cybersecurity

ITS Partners

Ivanti

iVerify

ixlayer

J

JDXpert

JFrog

John Snow Labs

Jotform

Jotto

K

Kagool

Kajeet

Kapalya

Kaseware

Katalon

Keeper Security

Keralia

Keyavi Data

Kharon

Kinetica

Kinetic Data

Kion

KLaunch

KLC Group LLC

KnowledgeLake

Kodak Alaris

Kore ai

Kove

Krista Software

KWIZ

Kyndi

L

Labelbox

Lambda

Latent AI

Leaning Technologies

LeGuard

Liferay

LightBox

LILT

LinkedIn

Liquibase

Liquidware

Little Arms Studios

Live Earth

Lloyds List Intelligence

Lookout

M

Magnet Forensics

MangoApps

Manifest

Mapbox

MapLarge

Mark43

MarkLogic

Material Security

Mattermost

Measure

Meltwater

Menlo Security

Mercurio Analytics

Merkle Science

Microcall

Microsoft

MinIO

MixMode

mLogica

MLtwist

MobileMind

ModelOp

MongoDB

Mossé Security

Moveworks

Muck Rack

MuleSoft

Mural

mxHero

Myota

N

Natsoft

Nearmap

NEOGOV

Nerdio

Netaphor

NetDocuments

Netenrich

NetFoundry

NetImpact Strategies

Netography

Netskope

NetThunder

NetWitness

Netwrix

New Net Technologies (NNT)

NewPush

New Relic

Next Chapter Technology

NexTech Solutions

NICE

Night Shift Development

Nintex

Nokia

Nok Nok

Noname

NowSecure

Nozomi Networks

Ntrepid

NU Borders

Nucleus Security

Nuggets

NuHarbor Security

Nutanix

Nuvolo

NVIDIA

Nyriad

O

Oak Innovation

Ocient

OffSec

Okta

Omnissa

Onapsis

OneLayer

OnSolve

Onspring

Ooma

OpenAI

OPEXUS

Optezo

Orbital Insight

Orca Security

Orijin

Orion

OSIsoft

Outpost Security

OutSystems

Overwatch Data

oVio technologies

P

PacketViper

Palantir

Palo Alto Networks

Paperless Innovations

Parabol

Parallel Works

Paramify

Parascript

Patero

PC Matic

PDQ

PeopleGoal

Permuta

Persado

PhoneLive

Phylum

Ping Identity

piXlogic

PIXM

Planet Technologies

PlatCore

Plauti

Plotly

Plum Identity

Pluralsight

Portal26

Preamble

Prepared

Primer

Privaini

Progress Software

Proofpoint

Prophecy

Proven Optics

Pryon

Pulselight

Puppet

Pyramid Analytics

Pyze

Q

QFlow

Qmulos

Qrypt

Qualtrics

Qualys

QuantaHub2

Quantexa

Quantifind

Quantropi

Quantum

Quantum Bridge

Queue-it

QuintessenceLabs

Quiq

Qumulo

Quokka

QuSecure

R

R-Mor

r4 Technologies

Radiant Logic

Raindrop Systems

RAKIA

Rancher Government Solutions

RangeForce

Rapid7

Ratio Exchange

Raven

Read

Ready

Rebellion Defense

Recorded Future

Red Hat

Red Vector

RegScale

Rendered.ai

RepRisk

Rescale

Resemble AI

Resiliant

ReSTNSX

ReversingLabs

Rhondos

Ripcord

RippleMatch

Riskonnect

RiskRecon

Riverbed Technology

Rocket.Chat

RPI-CS

RSA

Rubrik

Run:ai

runZero

RZero

S

S-Docs

SafeLogic

SailPoint Technologies

Salesforce

SalesIntel

SandboxAQ

SAP NS2

SAS

Saviynt

Scale AI

SDL

SearchBlox Software

SectorNet

Secured Communications

Securitybricks

SecurityScorecard

Seekr

Seerist

SentinelOne

ServiceNow

SessionGuardian

ShardSecure

Sicura

SigmaXai

SimpliGov

Simsi

SimSpace

Sitetracker

Sixgill

Skopenow

Skuid

Skyhigh Security

Skyline Software

Slack

Smart Communications

Snorkel.ai

Snowflake

Socialgist

Socure

Sodales Solutions

Software AG Government Solutions

SOFware

SolarWinds

Sonatype

SonicCloud

Sotera Digital Security

SparkCognition Government Systems

Spire Federal

Splashtop

Splunk

Sprinklr

Sprout Social

SpyCloud

stackArmor

Stave

Stralto

Strike Solutions

Striveworks

Styrk AI

SuccessKPI

Suggestion Ox

Swirl

Sword GRC

Sylabs

Symantec

Symmetry Systems

Synergist Technology

Syniverse

Synthesis AI

Systecon

System High

T

Tableau

Tabnine

TAG Infosphere

Tanium

Taqtile

TDI

Team Cymru

TeamWorx Security

Tech5

Telos Corporation

Tenable

Tensor Networks

Terida

Terra Pixel

TestifySec

Thales Trusted Cyber Technologies (TCT)

The Information Lab

The Mortgage Office

The Routing Company

think-cell

ThreatLocker

TIAG

Titania

Titan Technologies

Titus

TLUX Technologies

Tomorrow.io

Tonic.ai

Torch.AI

Tranquility AI

TransPerfect

Trellis Data

Trellix

Tricentis

Trifacta

Trimble

True Elements

Trusona

TrustLayer

Trustwave

Truyo

TSECOND

Tufin

Tungsten Automation

Two Six Technologies

TYCHON

U

UberEther

Udacity

Udemy

UiPath

Unstructured Technologies

Upstream Tech

V

Valimail

Vantiq

Vasion

VAST Data

Vcinity

VectorZero

Vectra

Veeam

Velaro

Velos

Venafi

Verge Technologies

Verint

Veritas Technologies

Veritone

Verkada

Versa Networks

Virsec

Virtana

VirtualZ Computing

Vision Point Systems

Visium Analytics

VisualVault

Vivid-Hosting

VividCharts

VM2020

VMRay

VMware

Voltron Data

Voyager Labs

Voyager Labs

Vyopta

W

Walacor

WalkMe

Wasabi Technologies

Weights & Biases

Whistic

WhiteCanyon Software

WillCo Tech

WinMagic

WINN Solutions

WinPure

WireScreen

Wiz

Workera

Workiva

X

XQ Message

Y

Yansa Labs

Yext

Yubico

Yurts

Z

Zammo.ai

Zebra

Zencase

Zencity

ZenGRC

ZenLedger

Zensors

Zentera

ZeroEyes

ZeroFox

Zignal Labs

Zimperium

ZLS.app

ZL Technologies

Zoom

Zscaler

Contract Holders

News

̽»¨ÊÓƵ Adds 65 Vendors to Catalog Offerings on ITES-SW2 Contract

March 9, 2021
̽»¨ÊÓƵ today announced that it has added 65 more vendors to its Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS). ̽»¨ÊÓƵ’s contract now includes 128 solutions providers and is effective through August 30, 2025.
READ MORE

̽»¨ÊÓƵ Awarded Information Technology Enterprise Solutions – Software 2 Contract to Support U.S. Army Enterprise Infrastructure Goals

October 1, 2020
̽»¨ÊÓƵ today announced that it has been awarded an Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract from the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS), in coordination with the Army Contracting Command, Rock Island, to support the Army’s IT software requirements.
READ MORE