Multiple Award Schedule (MAS)
Through MAS, Newberry is able to provide expert management and consulting services for government agencies. We can help your federal, state, or local government agency with project and program management, performance analysis, and program design.
Federal, state, local, and tribal government customers can use MAS to optimize the planning and procurement processes. As with all contract vehicles, cost savings are also generated via pre-negotiated ceiling prices that provide significant discounts from commercial pricing and serve as a starting point for head-to-head competition or further negotiations.
DISA Encore III Small Business
ENCORE III provides services ranging from engineering development to full sustainment under a suite of multiple award, indefinite delivery/indefinite quantity (ID/IQ) contracts with a $17.5 billion ceiling.
The 19 performance areas included in the ENCORE III performance work statement are:
- Enterprise IT Policy and Planning.
- Integrated Solutions Management.
- Business Process Reengineering.
- Requirements Analysis.
- Market Research and Prototyping.
- Information and Knowledge Management.
- Custom Application Development.
- Product Integration.
- Test and Evaluation.
- Asset Management.
- Network Support.
- Cyber Security Assessment, Authorization, and Authorization.
- Information Communications Technology.
- Computer-Telephony Integration.
- Web Services.
- Operations Support.
- IT Support Services.
- Cloud Professional Services.
- Process, Performance, and Strategic Benchmarking.
Contract Number: HC1028-18-D-0034 (MADIAN IT Solutions JV)
Highly Adaptive Cybersecurity Services
Highly Adaptive Cybersecurity Services – Special Item Number 54151HACS can help your agency
- Test high-priority IT systems.
- Quickly order and implement services from technically-evaluated vendors.
- Stop adversaries before they impact networks.
- Rapidly address potential vulnerabilities.
HACS includes proactive and reactive cybersecurity services and supports government-wide priorities like Application Security Testing and Zero Trust Architecture.