Information Technology Enterprise Solutions – Software 2 (ITES-SW2)

# W52P1J-20-D-0042

ITES-2W2-logo.png

 

The purpose of the ITES-SW 2 acquisition is to support Army, Department of Defense (DoD) and all Federal Agency enterprise Information Technology (IT) infrastructure and info-structure goals by leveraging Commercially available-Off-The-Shelf (COTS) software products and maintenance in 14 product categories in addition to related incidental services and hardware. These 14 categories align with the major software categories identified by U.S. Army Network Enterprise Technology Command (NETCOM). The software catalogs are:

Audio & Visual
Multimedia & Design
Business & Finance NetOps
Communication Office Suite
Database Operating Systems
Education Programming & Development
Internet IT Utility & Security
Modeling & Simulation Specialized


All products and services available under ITES-SW 2 must be commercial in accordance with the definition of commercial items in Federal Acquisition Regulation (FAR) 2.101. The planned period of performance is five years with one five year option with an estimated contract value of $13 billion.

Contract Information

Scope:
The scope of the Information Technology Enterprise Solutions – Software 2 (ITES-SW2) includes COTS IT software products in the following 14 catalogs: Audio & Visual, Business & Finance, Communication, Database, Education, Internet, Modeling & Simulation, Multimedia & Design, NetOps, Office Suite, Operating Systems, Programming & Development, IT Utility & Security, and Specialized. ITES-SW2 also allows customers to fulfill a total solution requirement by adding related incidental services and/or hardware.

Primary Goods and Services:
ITES-SW2 includes COTS IT software products in the following 14 catalogs: Audio & Visual, Business & Finance, Communication, Database, Education, Internet, Modeling & Simulation, Multimedia & Design, NetOps, Office Suite, Operating Systems, Programming & Development, IT Utility & Security, and Specialized. ITES-SW2 also allows customers to fulfill a total solution requirement by adding related incidental services and/or hardware.

Ordering Open To: 
Army, DoD and other Federal Agencies

Ordering Instructions:
Requests for software under ITES-SW2 are submitted via the CHESS RFQ or RA tools. The ITES-SW2 contracts are the Army’s mandatory source for the purchase of COTS IT software products. Army customers must follow the software order of precedence which is: Enterprise License Agreement (ELA), ITES-SW2, DOD Enterprise Software Initiative (ESI) Blanket Purchase Agreements (BPA). Customers must obtain a Statement of Non-availability from CHESS and/or an ITAS Waiver from the CIO/G-6 if they wish to purchase outside of CHESS. Note that purchasing from an ELA or DOD ESI is considered purchasing through CHESS. See the CHESS FAQ page for further information.

Contract Fee:
None

Resources:

Ordering

Requests for software under ITES-SW2 are submitted via the CHESS RFQ or RA tools. The ITES-SW2 contracts are the Army’s mandatory source for the purchase of COTS IT software products. Army customers must follow the software order of precedence which is: Enterprise License Agreement (ELA), ITES-SW2, DOD Enterprise Software Initiative (ESI) Blanket Purchase Agreements (BPA). Customers must obtain a Statement of Non-availability from CHESS and/or an ITAS Waiver from the CIO/G-6 if they wish to purchase outside of CHESS. Note that purchasing from an ELA or DOD ESI is considered purchasing through CHESS. See the CHESS FAQ page for further information.

How to Utilize ITES-SW2

  1. Access the CHESS IT E-MART here
  2. Under Software, select ITES-SW2 Contracts (a list of all vendors is provided)
  3. Select any of the Contracts Details

Resources:

Vendors

#

1Kosmos

3CLogic

7SIGNAL

17a-4

1440

A

Absolute Software

Abstract

Acadis

Acalvio

Accela

AccessData

AchieveIt

Acquia

ADF Solutions

Adobe

Adobe Connect

AECOM

Aerospike

Aisera

Akamai

Allyant

Alteryx, Inc.

AmbiFi

Anchore

APIsec.ai

Apollo Information Systems

AppGuard

Appian

Apposite Technologies

Aqua

Arcadus

Archer

archTIS

Armada

ArmorText

Arqit

Ascent Solutions

ASG Technologies

Assima

Astera

Authenticiti

Autodesk

Automize A/S

Avaap

AvePoint Public Sector

Avid

Avisare

AWS

Axon

Axonius Federal Systems

Axway

B

Babel Street

Beezy

Bentley Systems

BetterUp

BeyondTrust

Bidscale

BigID

BlackBerry

Blackbird.AI

Blackshark.ai

Blaize

Blancco

Blinkly

BlocPower

Blue Fusion

BlueHalo

Bluescape

BlueVoyant

Boeing Twister

Boomi

Botcopy

Boulder Insight

Box

Bravium

Bright Pattern

Bryq

Buurst

Byos

C

CalypsoAI

Cambium Networks

CA Technologies

cBEYONData

Cellebrite

Celonis

Censys

Certus Core

Chainalysis

Chainbridge Solutions

Chooch

Cigent

Circle Security

Cision

Clarifai

ClearInfo

ClearInsight Solutions

Clear Skye

Cloud Academy

CloudBees

Cloudburst

CloudCaller.io

Cloudera

CloudFrame

CloudMatos

CloudSaver

CodeLock

Cofense

Cohesity

Collabware

Collibra

Commvault

Confluent

Contentsquare

ContraForce

Contrast Security

Copado

CORAS

Corelight

Corellium

CoreLogic

CorePLUS

CounterCraft

Coupa

Coursera

Cradlepoint

Craft.co

CrashPlan

Cribl

Cronos

CrowdAI

CureMetrix

Cyara

Cyberbit

CybernetIQ

Cybrary

CyCognito

Cylance

Cynerio

Cytellix

D

Dantex

Daric

Darzin Software

Dassian

Databricks

Dataiku

Datameer

DataRobot

DataShapes

Decision Lens

Delinea

Dell

Delphix

Deltek

Denodo

Digital Map Products

DigitalXForce

DigitSec

Discovered Intelligence

Docusign

Domino Data Labs

Do Process

Dragos

Dremio

Druid

Druva

DryvIQ

DTech Apps by Discover Technologies

Dtex Systems

Duality

Dun & Bradstreet

E

e-Magic

e-Share

EarlyBirds

Eclypsium

Eduworks Corporation

Effectual

eGain

Eightfold.ai

Elastic

ElectrifAi

Element34

Elemental Cognition

EnterpriseDB

Entrust Digital Security

Epik Solutions

Everlaw

EvolveWare

Exabeam

Exclaimer

Exiger Government Solutions

Expanse

F

Falkonry

FastDial

Federal Compass

Federated Wireless

FedLearn

Fend

FI Consulting

Fidelis Security

Flashpoint

Flexera

Flosum

Fluence Technologies

FM:Systems

FogHorn Systems

ForceMetrics

Forcepoint

Forescout

Fornetix

Fortinet

Fortra

Forward Networks

Frameable

G

Gallus Communications

Garblecloud

Genesys

Geosite

Gimmal

GitLab

Glasswall

GL Solutions

Google

GoSecure

Govini

Granicus

Greymatter.io

GreyNoise

Greystones Group

Groundswell

Guardian Score

Gyst

H

H2O.ai

HackerRank

Hack The Box

Halcyon

HashiCorp

Hewlett Packard Enterprise

Hiplink

Holonic Technologies

Hootsuite

Horizon3.ai

HYAS

Hypori

HyTrust

I

iboss

iBwave

ID.me

IDI

IEM

Immersive Wisdom

Industrial Defender

Infoblox

InfraMappa

Ingentis

Inkit

Innive

InQuisient

Instabase

Insystech

Intercede

Intermap Technologies

Interos

Intratem

Invicti

IronNet Cybersecurity

ITS Partners

Ivanti

ixlayer

J

JFrog

John Snow Labs

Jotform

K

Kajeet

Kapalya

Kaseware

Keene Village Plastics

Keeper Security

Keralia

Keyavi Data

Kharon

Kinetica

Kion

KLaunch

KLC Group LLC

KnowledgeLake

Kodak Alaris

Kofax

Kore ai

Kove

Krista Software

KWIZCOM

Kyndi

L

Labelbox

Lambda

LeGuard

Liferay

LILT

LinkedIn

Liquibase

Liquidware

Little Arms Studios

Lookout

M

Magnet Forensics

MangoApps

Manifest

Mapbox

Mark43

MarkLogic

Material Security

Mattermost

Measure

Menlo Security

Mercurio Analytics

Merkle Science

Microsoft

MinIO

MixMode

MLtwist

MobileMind

MongoDB

Mossé Security

Moveworks

Muck Rack

MuleSoft

Mural

mxHero

N

Natsoft

Nearmap

NEOGOV

Nerdio

Netaphor

NetDocuments

Netenrich

NetFoundry

NetImpact Strategies

Netography

Netskope

NetThunder

NetWitness

Netwrix

New Net Technologies (NNT)

NewPush

New Relic

Next Chapter Technology

NICE

Nintex

Nokia

Nok Nok

Noname

NowSecure

Nozomi Networks

Ntrepid

NU Borders

Nucleus Security

NuHarbor Security

Nutanix

Nuvolo

NVIDIA

Nyriad

O

Oak Innovation

Ocient

OffSec

Okta

Onapsis

OneLayer

OnSolve

Onspring

OPEXUS

OPSWAT

Optezo

Orbital Insight

Orca Security

Orijin

Orion

OSIsoft

Outpost Security

OutSystems

oVio technologies

P

PacketViper

Palantir

Palo Alto Networks

Paperless Innovations

Parascript

Patero

PC Matic

PeopleGoal

Permuta

Persado

PhoneLiveStreaming

Phylum

Ping Identity

piXlogic

PIXM

Planet Technologies

PlatCore

Plauti

Plotly

Preamble

Prepared

Primer

Progress Software

Proofpoint

Prophecy

Proven Optics

Pulselight

Puppet

Pyramid Analytics

Pyze

Q

QFlow

Qmulos

Qrypt

Qualtrics

Qualys

QuantaHub2

Quantexa

Quantifind

Quantropi

Quantum

Quantum Bridge

Queue-it

QuintessenceLabs

Quokka

QuSecure

R

R-Mor

r4 Technologies

Radiant Logic

RangeForce

Rapid7

Ready

Rebellion Defense

Recorded Future

Red Hat

Red Vector

RegScale

Rendered.ai

RepRisk

Rescale

Resiliant

ReSTNSX

ReversingLabs

Rhondos

Ripcord

Riskonnect

RiskRecon

Riverbed Technology

Rocket.Chat

RSA

Rubrik

Run:ai

runZero

RZero

S

S-Docs

SailPoint Technologies

Salesforce

SalesIntel

SandboxAQ

SAP NS2

SAS

Saviynt

Scale AI

SDL

Secured Communications

SecurityScorecard

Seerist

SentinelOne

ServiceNow

SimpliGov

SimSpace

Sitetracker

Sixgill

Skuid

Skyhigh Security

Skyline Software

Slack

Smart Communications

Snowflake

Socure

Sodales Solutions

Software AG Government Solutions

SOFware

SolarWinds

Sonatype

SonicCloud

SparkCognition Government Systems

SpiderOak

Spire Federal

Splashtop

Splunk

Sprinklr

Sprout Social

SpyCloud

stackArmor

Stave Apps

Strike Solutions

Striveworks

SuccessKPI

Suggestion Ox

Sword GRC

Sylabs

Symantec

Symmetry Systems

Synergist Technologies

Syniverse

Synthesis AI

Systecon

T

Tableau

TAG Infosphere

Talend

Tanium

Taqtile

TDI

Team Cymru

TeamWorx Security

Telos Corporation

Tenable

Tensor Networks

Terida

Terra Pixel

Thales Trusted Cyber Technologies (TCT)

The Mortgage Office

think-cell

ThreatLocker

TIAG

TIBCO Software Federal, Inc.

Titan Technologies

Titus

Tonic.ai

TransPerfect

Trellis Data

Trellix

Tricentis

Trifacta

Trimble

True Elements

Trusona

Trustwave

TSECOND

Tufin

Two Six Technologies

TYCHON

U

UberEther

Udacity

UiPath

V

Valimail

VAST Data

Vcinity

VectorZero

Vectra

Veeam

Velaro

Velos

Venafi

Verge Technologies

Verint

Veritas Technologies

Veritone

Virsec

Virtana

VirtualZ Computing

Vision Point Systems

Visium Analytics

VividCharts

VM2020

VMRay

VMware

Voyager Labs

Vyopta

W

Walacor

WalkMe

Wasabi Technologies

Weights & Biases

Whistic

WhiteCanyon Software

Wickr, Inc.

WillCo Tech

WinMagic

WINN Solutions

WireScreen

Wiz

Workiva

Y

Yansa Labs

Yext

Yubico

Yurts

Z

Zammo.ai

Zebra

Zencase

Zencity

ZenLedger

Zentera

ZeroEyes

Zimperium

Zoom

Zscaler

Contract Holders

In addition to Carahsoft's contract, we also support the following reseller partners.

News

Carahsoft Adds 65 Vendors to Catalog Offerings on ITES-SW2 Contract

March 9, 2021
Carahsoft today announced that it has added 65 more vendors to its Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS). Carahsoft’s contract now includes 128 solutions providers and is effective through August 30, 2025.
READ MORE

Carahsoft Awarded Information Technology Enterprise Solutions – Software 2 Contract to Support U.S. Army Enterprise Infrastructure Goals

October 1, 2020
Carahsoft today announced that it has been awarded an Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract from the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS), in coordination with the Army Contracting Command, Rock Island, to support the Army’s IT software requirements.
READ MORE