Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag An official website of the United States government
Dot gov

The .gov means it’s official.
Federal government websites always use a .gov or .mil domain. Before sharing sensitive information online, make sure you’re on a .gov or .mil site by inspecting your browser’s address (or “location”) bar.

SSL

This site is also protected by an SSL (Secure Sockets Layer) certificate that’s been signed by the U.S. government. The https:// means all transmitted data is encrypted  — in other words, any information or browsing history that you provide is transmitted securely.

GWACs
  • For Government, By Government
  • HHS logo U.S. Department of Health & Human Services
  • NIH logo An OMB Executive Agent
  • BIC logo OMB Best in Class
NITAACsupport@nih.gov 1.888.773.6542
Home Home
  • About
    • What is NITAAC
    • Federal Authorities
    • Contract Holder Capabilities
    • Ordering Process
    • News
  • GWACs
    • CIO-SP3
    • CIO-SP3 Small Business
    • CIO-CS
    • CIO-SP4
    • CIO-CS | The Store
  • Services
    • Assisted Acquisitions
    • Government-Wide Strategic Solutions
    • Technical Assessments
    • Virtual Industry Day
  • Resources
    • e-GOS
    • Contract Holder Directory
    • NITAAC University
    • Training and Events
    • Tools and Templates
    • Articles
    • Videos
    • FAQs
  • E-GOS SIGN IN | SIGN UP
  • About
    • What is NITAAC
    • Federal Authorities
    • Contract Holder Capabilities
    • Ordering Process
    • News
  • GWACs
    • CIO-SP3
    • CIO-SP3 Small Business
    • CIO-CS
    • CIO-SP4
    • CIO-CS | The Store
  • Services
    • Assisted Acquisitions
    • Government-Wide Strategic Solutions
    • Technical Assessments
    • Virtual Industry Day
  • Resources
    • e-GOS
    • Contract Holder Directory
    • NITAAC University
    • Training and Events
    • Tools and Templates
    • Articles
    • Videos
    • FAQs
  • E-GOS SIGN IN | SIGN UP
GWACs
  • For Government, By Government
  • HHS logo U.S. Department of Health & Human Services
  • NIH logo An OMB Executive Agent
  • BIC logo OMB Best in Class

Search

X

Filter by:

  • Agency
  • Article
  • Contract Holder
  • Event
  • FAQ
  • GWAC
  • Landing Page
  • Person
  • Project Summary
  • Service
  • Tool/Template
  • Training
  • Video
  • Whitepaper
SHOW MATCHES
  • Your search yielded the following 262 results with the following filters:
  • Article
FiltersCLEAR ALL

Pagination

  • First page « First
  • Previous page ‹ Previous
  • …
  • Page 2
  • Page 3
  • Current page 4
  • Page 5
  • Page 6
  • …
  • Next page Next ›
  • Last page Last »
  • Federal agencies get smart with Cloud Smart
    The 2019 Federal Cloud Computing Strategy — Cloud Smart — is a long-term, high-level strategy to drive cloud adoption in Federal agencies. This is the first cloud policy update in seven years, offering a path forward for agencies to migrate to a safe and secure cloud infrastructure. This new strategy will support agencies to achieve additional savings, greater security and faster services. In the…
    Type: Article
  • IT Modernization Still More Important Than Ever to Federal Agencies
    According to the Government Accountability Office (GAO) and the Office of Management Budget’s (OMB) 2019 budget document, over 80 percent of all information technology (IT) spending is on the Operations and Maintenance of "aging legacy systems, which pose efficiency, cybersecurity, and mission risk issues, such as ever-rising costs to maintain them and an inability to meet current or expected…
    Type: Article
  • Why “Best in Class” makes good business sense
    A 2019 memorandum from the Office of Management and Budget directs agencies to increase their use of Best in Class (BIC) contracts. But the case for BIC solutions goes well beyond any mandate. BIC, part of the federal government’s category management initiative, is a government-wide designation for acquisition solutions that can be used by multiple agencies and that satisfy key criteria defined…
    Type: Article
  • Will the 2021 NDAA procurement reforms lead to more small business contracts for DoD
    As Congress continues to deliberate on the 2021 National Defense Authorization Act (NDAA), many small business contractors are wondering if the reforms started in 2018 will continue. The FY 2018 and 2019 NDAA both contained positive provisions for small businesses. From making it easier for small businesses to win follow-on contracts, to encouraging prompt payment of small business contractors,…
    Type: Article
  • NITAAC CIO-CS CIO-SP3 and CIO-SP3 Small Business Maintain BIC Status after Successful Completion of OMB Annual Review
    Rockville, MD - November 19, 2020 -,  Today, the NIH Information Technology Acquisition and Assessment Center (NITAAC) announced that all three NITAAC Government-Wide Acquisition Contracts (GWACs) have maintained Best in Class (BIC) status after successful completion of the Office of Management and Budget’s (OMB) Annual Review. The status of a BIC contract is reviewed annually to ensure solution providers continue to meet the five…, About NITAAC:, The NIH Information Technology Acquisition and Assessment Center (NITAAC) is housed within the Department of Health and Human Services (HHS) at the National Institutes of Health (NIH), and is a full-service acquisition program that has been designated a federal Executive Agent, authorized by the Office of Management and Budget (OMB) to administer three Best in Class (BIC) Government-Wide…
    Type: Article
  • The Importance of Cyber Technologies in Government
    Every day the federal government fends off tens of thousands of cyberattacks from adversaries. Some of these attacks are simple – phishing emails aimed at hopefully tricking an unassuming federal employee – to more sophisticated attacks targeting the nation’s most precious data assets. Protecting federal agencies from cyberattack is not an easy job, but an incredibly important one as more and…, Artificial Intelligence (AI) and Machine Learning (ML)., The newest cyber tools use behavior analytics to stop bad actors in their tracks and prevent intellectual property and sensitive data from falling into the wrong hands. These end-to-end analytics work across data environments to identify and stop threats to network traffic, files and devices, leveraging user behavior analytics that get smarter over time. AI and ML can now provide complete…, Intrusion detection and prevention systems., Known as IDS and IPS tools, these can help IT staff identify and protect their wired and wireless networks against several security threat types. These technologies, like other network security tools, have become more popular as government networks have grown in complexity. Both IDS and IPS solutions detect threat activity in the form of malware, spyware, viruses, worms and other attack types, as…, Anti-malware., Anti-malware tools help administrators identify, block and remove malware. Malware’s primary purpose is to look for network vulnerability, especially in security defenses, operating systems, browsers, applications and popular targets such as Adobe Flash, Acrobat and Reader. Best practices call for a multipronged defense that might also include IP blacklisting, data loss prevention tools, anti-…, Mobile device management., Also called MDM, these solutions allow administrators to remotely monitor and control security configurations on mobile devices. This allows employees to work remotely on agency-approved devices, but leadership can know these devices are secure since they can manage them at all times., Network access control., These products enforce security policy by granting only policy-compliant devices access to network assets. They handle authentication and authorization functions and can control the data that specific users access, ensuring that users meet a certain safety standard before they can access any information., Next-generation firewalls, . The technology beyond the traditional firewalls has expanded. Next-generation firewalls provide enhanced network security services, including application visibility and control, along with web security essentials., Authentication and authorization, . Traditional directory-based services authenticate users and grant access based on authorization rules. Newer identity-based security technology uses methods such as digital certificates and public key infrastructure solutions that provide an extra layer of security on top. The NITAAC Difference With technology constantly evolving, Cybersecurity threats become more and more of a concern. Cyber…
    Type: Article
  • NITAAC 2019/2020 Program Guide-at-a-Glance
    At NITAAC, we are not only fueling modernization across the government, we are leading by example. As one of the federal government’s top sources for ‘everything IT,’ NITAAC has taken the message of modernization to heart and is proud to launch a refreshed experience that will change how agencies acquire new technology. NITAAC’s three easy-to-use, easy-to-understand, Best in Class GWACs – CIO-SP3…
    Type: Article
  • NITAAC CIO-SP4 on track
    By Mark Rockwell October 20, 2020 The National Institute of Health's Information Technology Acquisition and Assessment Center (NITAAC) is still on schedule to issue its request for proposals for the CIO Solutions and Partners 4 (CIO-SP4) contract vehicle in late December, Brian Goodger, the center's acting director told FCW in an Oct. 20 interview. Plans for the new contract haven't been slowed…
    Type: Article
  • NITAAC Wins 2020 EPEAT Award
    NITAAC recently was recognized as a 2020 EPEAT Purchaser Award winner. The EPEAT Purchaser Award celebrates leaders in sustainable electronics procurement. NITAAC is the first Government-Wide Acquisition Contract (GWAC) to receive the EPEAT award. “Thank you to all our CIO-CS contract holders whose commitment to providing sustainable products made this award possible,” said Keith Johnson, NITAAC…
    Type: Article
  • NIH’s NITAAC following familiar path to deliver acquisitions during coronavirus
    By Jason Miller  |  @jmillerWFED May 25, 2020, 3:16 pm Like many acquisition organizations, the National Institutes of Health’s Information Technology Acquisition and Assessment Center (NITAAC) is busier than ever. But the pressure to deliver during the coronavirus pandemic hasn’t caused NITAAC to falter or struggle. Keith Johnson, the contracting lead for the CIO-SP3 and CIO-SP4 vehicles for …
    Type: Article

Pagination

  • First page « First
  • Previous page ‹ Previous
  • …
  • Page 2
  • Page 3
  • Current page 4
  • Page 5
  • Page 6
  • …
  • Next page Next ›
  • Last page Last »
Home Home

Footer menu

  • About
    • What is NITAAC
    • Federal Authorities
    • Contract Holder Capabilities
    • Ordering Process
    • News
  • GWACs
    • CIO-SP3
    • CIO-SP3 Small Business
    • CIO-CS
    • CIO-SP4
    • CIO-CS | The Store
  • Services
    • Assisted Acquisitions
    • Government-Wide Strategic Solutions
    • Technical Assessments
    • Virtual Industry Day
  • Resources
    • e-GOS
    • Contract Holder Directory
    • NITAAC University
    • Training and Events
    • Tools and Templates
    • Articles
    • Videos
    • FAQs
  • Contact
    • 1.888.773.6542
    • NITAACsupport@nih.gov
Contract Holders Sign In
GWACs
  • For Government, By Government
  • HHS logo U.S. Department of Health & Human Services
  • NIH logo An OMB Executive Agent
  • BIC logo OMB Best in Class
Facebook Instagram LinkedIn X YouTube Threads

Government Links

NIH Accessibility FOIA No Fear Plain Writing USA.gov
Accessibility Privacy Policy HHS Vulnerability Disclosure © Copyright 2025