Go to Top

Govt Procurement Vehicles

Procurement vehicles

In order to balance the need for open, competitive opportunity with the demands for urgent specialized situations, alternative procurement practices and vehicles have been created for government use. To facilitate the procurement process for our valued clients, ipss is listed on the following procurement vehicles:

Task-Based Informatics Professional Services (TBIPS) - Tier 1 (requirements not exceeding $2 million) and Tier 2 (requirements valued at over $2 million) - Streams 3 IM/IT Services, 4 Business Services and 6 Cyber Protection Services

TBIPS is a major GC procurement vehicle that is completely dedicated to IT categories. It was introduced to consolidate and replace the variety of generalist procurement vehicles that were formerly used for IT services. TBIPS does not have a dollar maximum and contracts can be structured with a provision for option years, thereby facilitating contract extensions when required.

ipss is qualified in Stream 3 (I) IM/IT Services on both the TBIPS Standing Offer and TBIPS Supply Arrangement.  Stream 3 encompasses the following roles:

  • Data Conversion Specialist
  • Database Administrator
  • Database Analyst
  • Database Modeller/IM Modeller
  • IM Architect
  • Network Analyst
  • System Administrator
  • Technical Architect
  • Technology Architect

ipss is qualified in Stream 4 (B) Business Services on both the TBIPS Standing Offer and TBIPS Supply Arrangement.  Stream 4 encompasses the following roles:

  • Business Analyst
  • Business Continuity/Disaster Recovery Specialist
  • Business System Analyst
  • Business Transformation Architect
  • Courseware Developer
  • Help Desk Specialist
  • Instructor, IT
  • Network Support Specialist
  • Operations Support Specialist
  • Technical Writer

ipss is qualified in Stream 6 (C) Cyber Protection Services on both the TBIPS Standing Offer and TBIPS Supply Arrangement.  Stream 6 encompasses the following roles:

  • Strategic IT Security Planning and Protection Consultant
  • IT Security Methodology, Policy and Procedures Analyst
  • IT Security TRA and C&A Analyst
  • IT Security Product Evaluation Specialist
  • PKI Specialist
  • IT Security Engineer
  • IT Security Design Specialist
  • Network Security Analyst
  • IT Security Systems Operator
  • IT Security Installation Specialist
  • IT Security VA Specialist
  • Incident Management Specialist
  • Physical IT Security Specialist
  • IT Security R&D Specialist
  • Computer Forensics Specialist
  • PIA Specialist
  • EMSEC Security Specialist

ipss is qualified in both the regular stream and Aboriginal Set Aside stream.

ipss also has access to Streams 1 and 5 on both the TBIPS Supply Arrangement and Standing Offer. Please call us if you have a specific requirement.

 

 

NESS NMSO - Networking Equipment Support Services

The NESS NMSO – Networking Equipment Support Services procurement vehicle allows federal government clients to purchase pre-qualified Networking Equipment (including switches, routers, VPN devices, and other related items) as well as installation and configuration services from qualified suppliers.

As an authorized supplier on the NESS NMSO (Aboriginal Set Aside EN578-030742/019/EW), ipss can provide its federal government clients with the following pre-qualified hardware products:

Category 1.2 – L2-3 LAN Switches

  • Alcatel Lucent

Category 3.1 – Layer 4-7 Switch

  •  Citrix NetScaler

Category 3.2 – WAN Optimization

  • Citrix Cloudbridge

Category 10.1 Intrusion Prevention Systems

  • HP TippingPoint

For software requirements, see the SLSA.

Software Licensing Supply Arrangement (SLSA)

The SLSA procurement vehicle addresses the delivery of various commercial software licenses and related commercial software maintenance and support, as required by Canada, in support of its various programs, operational needs and projects. ipss is pleased to offer the following solutions on the SLSA:

  • Stormshield Security Suite (EN578-1008/038/EE)

    Based on a unique system-analysis technology, Stormshield is the only solution that provides proven protection against targeted attacks and APT even when unknown. Entirely invisible to users and well suited to large-scale deployments, Stormshield federates, in a single agent, all the security services required for the protection of computers and servers, from monitoring peripheral devices to hard disk encryption. Stormshield delivers protection to all risks faced by laptop and desktop computers: vulnerabilities, known and unknown attacks, inappropriate usage of applications, unauthorized connections, theft of critical data. Stormshield distinguishes itself from other solutions by its truly unique HIPS, able to proactively block even the most sophisticated targeted attacks. Even when used in the most demanding environments, Stormshield delivers an unparalleled level of security, whilst remaining completely invisible to users.

    Stormshield Data Security allows controlling the confidentiality of sensitive information while enjoying the advantages of cloud-based collaboration in today’s mobile world. This security solution o­ffers end-to-end encrypted security in exchanges and collaboration. The identification of users and verification of their security keys through the solution in the trusted zone guarantees their authentication.

    The unique Stormshield Data Security tool’s main features include:

    Control over data

    • Seamless encryption of local or shared folders
    • Automated encryption
    • Integration with mail clients for electronic mail signature and confidentiality
    • Security of data shared confidentially between internal and external collaborators
    • Confidentiality of data contained in a virtual volume

    Authentication and destruction

    • Sign any type of file
    • Help provided for digitizing administrative and sales procedures
    • Secure and irreversible deletion of files and folders

    Centralized administration

    • Manage security policies
  • Rapid7 Vulnerability Management and Penetration Testing Software Suite (EN578-1008/103/EE)

    Nexpose vulnerability management software, proactively scans your environment for misconfigurations, vulnerabilities, and malware and provides guidance for mitigating risks. Experience the power of Nexpose vulnerability management solutions by:

    • Knowing the security risk of your entire IT environment including networks, operating systems, web applications and databases.
    • Exposing security threats including vulnerabilities, misconfigurations and malware.
    • Prioritizing threats and getting specific remediation guidance for each issue.
    • Integrating with Metasploit to validate security risk in your environment.

    Metasploit penetration testing software gives  a clear view as to what vulnerabilities can easily be exploited within your environment so you can focus on the most critical vulnerabilities.

    • Safely simulate attacks on your network to uncover pressing security issues.
    • Use with Nexpose to assess and validate security risks in your environment.
    • Verify your defenses, security controls and mitigation efforts.
    • Manage phishing exposure, and audit web applications.

    Mobilisafe is the only mobile risk management solution that automatically performs a mobile risk assessment of all the devices in your organization and provides easy-to-use tools to eliminate these risks. The mobile ecosystem is complex and software updates require coordination between handset manufacturers, OS vendors and carriers, and can take months to deploy, creating large windows of risk. If you are looking to gain an overall view of your mobile threat landscape you should perform a mobile risk assessment to get a clear view as to what risks need to be eliminated to maintain company security. In order to achieve this, you need a mobile risk management solution like Mobilisafe.

    ControlsInsight is a security solution that centralizes critical controls information to provide a complete picture of how well an organization is protected against the threats most likely to affect them. Supported by leading security experts and industry best practices, Rapid7 has developed and patented an intelligent model relating today’s threat landscape to the effectiveness of compensating controls. Controls Insight applies this model to an organization’s environment to prioritize actions for the greatest progress towards improving endpoint security, with step-by-step guidance for easy implementation.

    Only Rapid7 UserInsight provides visibility into user activity across on-premise, cloud and mobile environments. Traditional monitoring tools have focused on monitoring traffic between assets within the firewall but this paradigm is failing as more activity occurs outside the perimeter in cloud services or on user-supplied devices. In addition to tracking activity on traditional sources such as the firewall and web proxy, UserInsight deeply integrates with ActiveSync to monitor mobile devices and key cloud services such as SalesForce and Box. This means that you get visibility when users are accessing corporate resources even if they’re not on a corporate network or are using their own devices.

  • AppSense Desktop Management Suite (EN578-100808/246/EE)

    Manage any Windows desktop, physical or virtual, across multiple devices, locations and delivery mechanisms with AppSense’s DesktopNow Suite. AppSense seamlessly spans physical and virtual desktops managing all aspects of the user, independent of the desktop.

    The DesktopNow Suite enables you to deliver the fastest, easiest and lowest cost desktop ever to your users. With user abstraction, operating systems and applications can be seamlessly managed, delivered and upgraded independently of user settings and data.  This significantly reduces operational costs, streamlines desktop management and ensures a seamless user experience across all platforms, all without compromising IT security.

    AppSense DataNow enables simple, secure access, sync and sharing of files from any device, while also helping you get more out of the storage you already have. Their unique data broker, delivered as a turn-key virtual appliance, integrates simply with your existing Active Directory and on-premises storage locations such as file servers and Microsoft SharePoint. DataNow puts IT teams in complete control over where files are stored and provides granular policy control over how data is accessed.

    AppSense is the leading provider of User Environment Management solutions. AppSense user virtualization technology allows IT to deliver unprecedented user productivity while securing and simplifying workspace management at scale across physical, virtual, and cloud-delivered desktops. The AppSense Platform, which includes the Environment Manager, the Application Manager and the Performance Manager, has been deployed to over 7.5 million endpoints.

  • Bromium (EN578-100808/252/EE)

    Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware from the Web, email or USB devices, by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource.

Solutions Based Informatics Professional Services (SBIPS) Tier 1 and Tier 2

SBIPS is a Government-wide fixed price method of supply for professional services that provides a complete operational solution to a requirement.  SBIPS can also cover consulting services that are typically team based and deliverable focused including advisory work.  It can be applied to end-to-end project work, or to the supply of a solution to a business problem.

Under SBIPS Tier 1, ipss is eligible for requirements up to $2M in value. ipss is a SA Holder for the following categories under SBIPS SA# EN53705IT01/045/EI:

  • IT Systems Management (Stream 6)
  • Network Services (Stream 9)
  • Security Management services (Stream 10)
  • Systems Integration (Stream 11)

Under SBIPS Tier 2, ipss is eligible for requirements greater than $2M in value. ipss is a SA Holder for the following categories under SBIPS SA# EN53705IT01/045/EI:

  • Security Management services (Stream 10)
  • Systems Integration (Stream 11)

 

ipss is qualified in both the regular stream and Aboriginal Set Aside (ASA) stream.

ProServices

ProServices replaces the Professional Services (PS) Online System and its 66 categories by 150 categories from Task and Solutions Professional Services [task based] (TSPS) and Task Based Informatics Professional Services (TBIPS). ProServices is a professional services mandatory method of supply for requirements below the North American Free Trade Agreement (NAFTA) threshold. The ProServices streams and categories are the same streams and categories as what is offered in the Task Based Informatics Professional Services (TBIPS) and the Task and Solutions Professional Services (TSPS – task portion only) methods of supply. For requirements not exceeding $75,000.00.

ipss inc. is an authorized supplier for ProServices in Stream 3 – (I) Information Management IT Services for the following select roles:

  • Data Conversion Specialist
  • Database Administrator
  • Database Analyst
  • Database Modeller / IM Modeller
  • IM Architect
  • Network Analyst
  • System Administrator
  • Technical Architect
  • Technology Architect

ipss inc. is an authorized supplier for ProServices in Stream 4 – (B) Business Services for the following select roles:

  • Business Analyst
  • Business Continuity/Disaster Recovery Specialist
  • Business System Analyst
  • Business Transformation Architect
  • Courseware Developer
  • Help Desk Specialist
  • Instructor, IT
  • Network Support Specialist
  • Operations Support Specialist
  • Technical Writer

ipss inc. is an authorized supplier for ProServices in Stream 6 – (C) Cyber Protection Services for the following select roles:

  • Strategic IT Security Planning and Protection Consultant
  • IT Security Methodology, Policy and Procedures Analyst
  • IT Security TRA and C&A Analyst
  • IT Security Product Evaluation Specialist
  • Public Key Infrastructure (PKI) Specialist
  • IT Security Engineer
  • IT Security Design Specialist
  • Network Security Analyst
  • IT Security Systems Operator
  • IT Security Installation Specialist
  • IT Security Vulnerability Analysis (VA) Specialist
  • Incident Management Specialist
  • Physical IT Security Specialist
  • IT Security Research and Development (R&D) Specialist
  • Computer Forensics Specialist
  • Privacy Impact Assessment (PIA) Specialist
  • Emanations Security (EMSEC) Security Specialist

 

Temporary Help Services (THS)

ipss also has access to the following procurement vehicle:

Temporary Help Services (THS) are provided by the resources of temporary help firms. The THS On-Line System is an on-line procurement tool designed to assist Federal Departments in the National Capital Region (NCR) in their procurement of temporary help services. Although not a Supply Arrangement or Standing Offer Holder for THS directly, ipss has access to all THS categories. Call us if you have a specific requirement.