̽»¨ÊÓÆµ

Information Technology Enterprise Solutions – Software 2 (ITES-SW2)

# W52P1J-20-D-0042

ITES-2W2-logo.png

 

The purpose of the ITES-SW 2 acquisition is to support Army, Department of War (DOW) and all Federal Agency enterprise Information Technology (IT) infrastructure and info-structure goals by leveraging Commercially available-Off-The-Shelf (COTS) software products and maintenance in 14 product categories in addition to related incidental services and hardware. These 14 categories align with the major software categories identified by U.S. Army Network Enterprise Technology Command (NETCOM). The software catalogs are:

Audio & Visual
Multimedia & Design
Business & Finance NetOps
Communication Office Suite
Database Operating Systems
Education Programming & Development
Internet IT Utility & Security
Modeling & Simulation Specialized


All products and services available under ITES-SW 2 must be commercial in accordance with the definition of commercial items in Federal Acquisition Regulation (FAR) 2.101. The planned period of performance is five years with one five year option with an estimated contract value of $13 billion.

Contract Information

Scope:
The scope of the Information Technology Enterprise Solutions – Software 2 (ITES-SW2) includes COTS IT software products in the following 14 catalogs: Audio & Visual, Business & Finance, Communication, Database, Education, Internet, Modeling & Simulation, Multimedia & Design, NetOps, Office Suite, Operating Systems, Programming & Development, IT Utility & Security and Specialized. ITES-SW2 also allows customers to fulfill a total solution requirement by adding related incidental services and/or hardware.

Primary Goods and Services:
ITES-SW2 includes COTS IT software products in the following 14 catalogs: Audio & Visual, Business & Finance, Communication, Database, Education, Internet, Modeling & Simulation, Multimedia & Design, NetOps, Office Suite, Operating Systems, Programming & Development, IT Utility & Security and Specialized. ITES-SW2 also allows customers to fulfill a total solution requirement by adding related incidental services and/or hardware.

Ordering Open To: 
Army, DOW and other Federal Agencies

Ordering Instructions:
Requests for software under ITES-SW2 are submitted via the CHESS RFQ or RA tools. The ITES-SW2 contracts are the Army’s mandatory source for the purchase of COTS IT software products. Army customers must follow the software order of precedence which is: Enterprise License Agreement (ELA), ITES-SW2, DOW Enterprise Software Initiative (ESI) Blanket Purchase Agreements (BPA). Customers must obtain a Statement of Non-availability from CHESS and/or an ITAS Waiver from the CIO/G-6 if they wish to purchase outside of CHESS. Note that purchasing from an ELA or DOW ESI is considered purchasing through CHESS. See the for further information.

Contract Fee:
None

Resources:

Ordering

Requests for software under ITES-SW2 are submitted via the CHESS RFQ or RA tools. The ITES-SW2 contracts are the Army’s mandatory source for the purchase of COTS IT software products. Army customers must follow the software order of precedence which is: Enterprise License Agreement (ELA), ITES-SW2, DOW Enterprise Software Initiative (ESI) Blanket Purchase Agreements (BPA). Customers must obtain a Statement of Non-availability from CHESS and/or an ITAS Waiver from the CIO/G-6 if they wish to purchase outside of CHESS. Note that purchasing from an ELA or DOW ESI is considered purchasing through CHESS. See the  for further information.

How to Utilize ITES-SW2

  1. Access the CHESS IT E-MART
  2. Under Software, select ITES-SW2 Contracts (a list of all vendors is provided)
  3. Select any of the Contracts Details

Resources:

Vendors

#

1Kosmos

3CLogic

7SIGNAL

17a-4

1440

A

Abel Police

Absolute Security

Abstract

Acadis

Acalvio

Accela

AccessData

Accrete Government

AchieveIt

Acquia

Acta Solutions

ActiveFence

ActiveState

Adaptive Security

ADF Solutions

Adlib

Adobe

Adobe Connect

AECOM

Aerospike

AgileBlue

AIComply

Airspace Link

Aisera

Akamai

Alchemer

Allocore

Alltius

Allyant

Altair

Altana

Alteryx, Inc.

AmbiFi

Anchore

Animate Cyber

Apexti

APIsec.ai

Apollo Information Systems

AppGuard

Appian

Apposite Technologies

Aqua

Arcadus

Archer

archTIS

Arctop

Armada

ArmorText

ArmorxAI

Arqit

Ascent Solutions

Ask Sage

Assima

Astera

Audible Sight

Aurigo

Authenticiti

Authentrics

Autodesk

Automize A/S

Avaap

Avature

AvePoint Public Sector

Avid

Avisare

Aviz Networks

Aware

AWS

Axon

Axonius Federal Systems

Axway

B

Babel Street

Backing Fire

Basis Technologies

Beezy

Behavioral Signals

Bentley Systems

Bestdefense

BetterUp

Beyond Identity

BeyondTrust

Bidscale

BigID

Binoloop

BlackBerry

Blackbird.AI

Black Duck

BlackFog

Blackshark.ai

Blaize

Blancco

Blinkly

BlocPower

Blue Fusion

BlueHalo

Bluescape

BlueVoyant

Bocada

Boomi

Botcopy

Boulder Insight

Box

Bravium

Bright Pattern

Bryq

Buoyant

Byos

C

CafeX Communications

CalypsoAI

Cambium Networks

Canfigure

Case X

CA Technologies

cBEYONData

Cellebrite

Celonis

Censys

Certify360

Certus Core

Chainalysis

Chainbridge Solutions

Chainguard

Check Point

Chooch

Chronus

Cigent

Cimcor

Circle Security

Cision

CKEditor

Clarifai

Clear Fracture

ClearInfo

ClearInsight Solutions

ClearPoint Strategy

Clear Skye

Click Armor

CloudBees

Cloudburst

CloudCaller.io

Cloudera

CloudFrame

Cloudian

CloudMatos

CloudNova Technologies

Cloud Software Group

CodeLock

CodeSecure

Cofense

Cohesity

Collabware

Collective Data

Collibra

Commvault

Compart

ConductorAI

Confluent

ConsLog

Contentsquare

Continuous Software

ContraForce

Contrast Security

Control Plane

Copado

CORAS

Corelight

Corellium

CorePLUS

CostPerform

Cotality

CounterCraft

Coupa

Coursera

Craft

Cranium

CrashPlan

Crave.io

Crawford Technologies

Credo AI

Cribl

Crisis24

Cronos

CrowdAI

Cyara

Cyberbit

CybernetIQ

Cyberspatial

Cyberstar

Cybrary

CyCognito

Cylance

Cynerio

Cypher

Cytellix

D

D-Wave

Dantex

Daric

Darzin Software

data.world

Databricks

Dataiku

Data Literacy

DataMasque

Datameer

DataRobot

DataShapes AI

DataSnipper

Deceptio.ai

Decision Lens

Deep Labs

Deep Media

Definitive Business Solutions

Dejero

Delinea

Dell

Delphix

Deltek

Denodo

Denser.ai

Dice

DigitalXForce

DigitSec

Diligent

Disaster Tech

Distran Switzerland

District 4 Labs

Ditto

Docusign

Domino Data Labs

Domo

Do Process

Dragos

DreamFactory Software

Dremio

Druid

Druva

DryvIQ

DTech Apps by Discover Technologies

Dtex Systems

Duality

Dun & Bradstreet

Dynamo AI

Dynatrace

E

e-Magic

e-Share

EarlyBirds

EBF

Eclypsium

EDB

Edgecore Networks

EdgeRunner

Eduworks Corporation

Effectual

eGain

Eightfold.ai

Elastic

ElastiFlow

ElectrifAi

Element34

Elemental Cognition

Elliptic Enterprises

EM1

EmergeGen.ai

Endor Labs

Entrust Digital Security

Enveil

Epik Solutions

Epsilon3

Ericsson (formerly Cradlepoint)

Ethos

Everblue

Everfox

Everlaw

eVisit

EvolveWare

Exabeam

Exclaimer

Exiger Government Solutions

Expanse

F

Falkonry

FastDial

Federal Compass

Federated Wireless

FedLearn

Fend

Fenix Insight

FenixPyre

FI Consulting

Fiddler AI

Fidelis Security

FileCloud

Filigran

Finch AI

First To Invest

Fivecast

Flashpoint

Flexera

Flosum

Fluence Technologies

FM:Systems

FogHorn Systems

ForceMetrics

Forcepoint

Forescout

Fornetix

Forrester

Fortanix

Fortinet

Fortra

Forum Systems

Forward Networks

FusionReactor

G

Gallus Communications

Garblecloud

Genesys

Geosite

Gimmal

GitLab

Glasswall

Glean

Global Telehealth Services

GL Solutions

Goldcast

Gomboc AI

GoMeddo

Google

GoSecure

Govini

Grafbase

Graid Technology

Grammarly

Granicus

Graphika

Gray Wolf Analytics

Greymatter.io

GreyNoise

Greystones Group

Groq

Groundswell

Guardian Score

GuardStack

GXC

Gyrus Systems

Gyst

H

H2O.ai

HackerRank

Hack The Box

Haevek

Halcyon Solutions Inc.

Harpoon Corp

HashiCorp

Hewlett Packard Enterprise

Hexnode

HIPAA Vault

Hiplink

Holonic Technologies

Hootsuite

Horizon3.ai

HUMAN Security

HYAS

Hyper

Hypori

HyTrust

I

i-PRO

iboss

iBwave

ICEYE

ID.me

IDI

IEM

Immersive Wisdom

Impetus

Inbox Monster

Incorta

Indago

Industrial Defender

Info Bastion

Infoblox

Info Security Corp

InfraMappa

Ingentis

Inkit

Innive

InQuisient

Insane Cyber

Instabase

Insystech

Intercede

Intermap Technologies

Interos.ai

Interpersonal Frequency

IntraEdge

Intratem

Invicti

ioMoVo

iOra

IRIS Tech

IronNet Cybersecurity

ISARA

Itential

ITS Partners

Ivanti

iVerify

IVIX

ixlayer

J

JDXpert

JFrog

John Snow Labs

Jotform

Jotto

K

Kagool

Kajeet

Kaseware

Katalon

Keeper Security

Kemicard

Keralia

Keyavi Data

Kharon

Kinetica

Kinetic Data

Kion

KLaunch

KLC Group LLC

KnowledgeLake

Knox Systems

Kodak Alaris

Kong

Kore ai

Kove

Kovr.AI

Kriptos

Krista Software

Kyndi

L

Labelbox

lakeFS

Lambda

Latent AI

Lazarus Enterprises

Leaning Technologies

Legion

LeGuard

Liferay

LightBox

LILT

LinkedIn

Liquibase

Liquidware

Little Arms Studios

Live Earth

Lloyds List Intelligence

Lookout

Lumana

Lynk

M

Magnet Forensics

MangoApps

Manifest

Mapbox

MapLarge

Mark43

MarkLogic

Material Security

Mattermost

Measure

Melissa

Meltwater

Menlo Security

Mercurio Analytics

Merkle Science

Microcall

Microsoft

Mimic

mimik Technology

MindsDB

MinIO

MixMode

mLogica

MLtwist

MobileMind

ModelOp

MongoDB

Mossé Security

Moveworks

Movius

Muck Rack

MuleSoft

Mural

Mutare

mxHero

Myota

N

Natsoft

Nearmap

NEOGOV

Nerdio

Netaphor

NetDocuments

Netenrich

NetFoundry

NetImpact Strategies

Netography

Netskope

NetThunder

NetWitness

Netwrix

New Net Technologies (NNT)

NewPush

New Relic

NEXGEN Asset Management

Next Chapter Technology

NexTech Solutions

NiCE

Night Shift Development

Nintex

Nirmata

Nokia

Nok Nok

Noname

NowSecure

Nozomi Networks

Ntrepid

NU Borders

Nucleus Security

Nuggets

NuHarbor Security

Nutanix

Nuvolo

NVIDIA

Nyriad

O

Oak Innovation

Ocient

OffSec

Ogre.run

Okta

Okteto

Omnissa

Onapsis

OneLayer

Onspring

Ooma

OpenAI

OPEXUS

OPSWAT

Optezo

Orbital Insight

Orbit Analytics

Orca Security

Orijin

Orion

OSIsoft

Outpost Security

OutSystems

Outtake

Outway

Overwatch Data

oVio technologies

P

PacketViper

Palantir

Palo Alto Networks

Parabol

Parallel Works

Paramify

Parascript

Patero

PC Matic

PDQ

Pendulum Intelligence

Pentera

PeopleGoal

Permanence

Permuta

Persado

Persimmony International

PhoneLive

Phylum

Ping Identity

piXlogic

PIXM

Planet Technologies

PlatCore

Plauti

Plotly

Plum Identity

Pluralsight

Portal26

Preamble

Precog

Prepared

Primer

Prism PPM

Privaini

Progress Software

Project Broadcast

Proofpoint

Prophecy

Proven Optics

Pryon

Pulselight

Puppet

Purple Transform

Pyramid Analytics

Pyze

Q

Q247

QFlow

Qmulos

Qrypt

Qualtrics

Qualys

QuantaHub2

Quantexa

Quantifind

Quantropi

Quantum

Quantum Bridge

Queue-it

QuintessenceLabs

Quiq

Qumulo

Quokka

QuSecure

R

R-Mor

r4 Technologies

Radiant Logic

Raindrop Systems

RAKIA

Rancher Government Solutions

RangeForce

Rapid7

RapidFort

Ratio Exchange

Raven

RCN Technologies

Read

Ready

Rebellion Defense

Recorded Future

Red Data

Red Hat

Red Vector

RegScale

Reka

Rendered.ai

RepRisk

Rescale

Resemble AI

Resiliant

ReSTNSX

Reveille Software

ReversingLabs

Rhondos

RideCo

Ripcord

RippleMatch

Riskonnect

RiskRecon

Riverbed Technology

RoadFlex

Rocket.Chat

Routeware

RSA

RTA Fleet

Rubrik

Run:ai

runZero

RZero

S

S-Docs

SafeLogic

SailPoint Technologies

Salesforce

SalesIntel

SandboxAQ

SAP NS2

SAS

Saviynt

Scale AI

Scorelate

SDL

SearchBlox Software

SectorNet

Secured Communications

Securitybricks

SecurityScorecard

Seekr

Seerist

Semantic Visions

SentinelOne

Sentry AI

ServiceNow

SessionGuardian

ShardSecure

Sicura

SigmaXai

Silent Push

SimpliGov

Simsi

SimSpace

Sitetracker

Sivil

Sixgill

Skopenow

Skuid

Skyhigh Security

Skyline Software

Slack

Smart Communications

SnapOn By KWIZ

Snorkel.ai

Snowflake

Socialgist

SockPuppet

Socure

Sodales Solutions

Software AG Government Solutions

SOFware

Sol Analytica

SolarWinds

Sonatype

SonicCloud

Sotera Digital Security

Spacelift

SparkCognition Government Systems

Spark Hire

Spendwell.AI

Spire Federal

Splashtop

Splunk

Sprinklr

Sprout Social

SpyCloud

stackArmor

Stave

StorMagic

Stralto

Strike Solutions

Striveworks

Styrk AI

SuccessKPI

Suggestion Ox

Swirl

Switchboard Live

Sword GRC

Sylabs

Symantec

Symmetry Systems

SyncDog

Synergist Technology

Syniverse

Synthesis AI

Systecon

System High

T

Tableau

Tabnine

Tadaweb

TAG Infosphere

Tango

Tanium

Taqtile

TDI

Team Cymru

TeamWorx Security

Tech5

TechTrend

Telos Corporation

Tenable

Tensor Networks

Terida

Terra Pixel

Terrogence

Testfully

TestifySec

Thales Trusted Cyber Technologies (TCT)

The Information Lab

The Mortgage Office

TheRecordXchange

The Routing Company

think-cell

ThreatConnect

Threat Digital

ThreatLocker

TIAG

Tidal Cyber

Tines Automation Inc.

Titania

Titan Technologies

Titus

TLUX Technologies

Tomorrow.io

Tom Sawyer Software

Tonic.ai

Torch.AI

Torchlight

TrackLight

Tranquility AI

TransPerfect

Trellis Data

Trellix

Tricentis

Trifacta

Trimble

Troverlo

True Elements

Trusona

Trustible

TrustLayer

Trustwave

TSECOND

Tufin

Tungsten Automation

TurboVets

Two Six Technologies

TYCHON

U

UberEther

Udacity

Udemy

UiPath

Unstructured Technologies

Upstream Tech

US AI

V

Validit.ai

Valimail

Vantiq

Vasion

VAST Federal

Vcinity

VectorZero

Vectra AI

Veeam

Velaro

Velos

Venafi

Verge Technologies

Verint

Veritas Technologies

Veritone

Verkada

Versa

Virsec

Virtana

Virtual Investigation Platforms

VirtualZ Computing

Vision Point Systems

Visium Analytics

VisualVault

Vivid-Hosting

VividCharts

VM2020

VMRay

VMware

Voltron Data

Vonar AI

Voyager Labs

Voyager Labsdup

Vyopta

W

Walacor

WalkMe

Weights & Biases

Whistic

WhiteCanyon Software

WhoMeta

Windsurf

Windward

WinMagic

WINN Solutions

WinPure

WireScreen

WitnessAI

Wiz

Workera

Workiva

Wyvern

X

xAI

XQ Message

Y

Yansa Labs

Yext

Yubico

Z

Zammo.ai

Zebra

Zencase

Zencity

ZenGRC

ZenLedger

Zensai

Zensors

Zentera

ZeroEyes

ZeroFox

Zifino

Zignal Labs

Zimperium

ZLS.app

ZL Technologies

Zoom

Zscaler

Contract Holders

News

̽»¨ÊÓÆµ Adds 65 Vendors to Catalog Offerings on ITES-SW2 Contract

March 9, 2021
̽»¨ÊÓÆµ today announced that it has added 65 more vendors to its Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS). ̽»¨ÊÓÆµâ€™s contract now includes 128 solutions providers and is effective through August 30, 2025.
READ MORE

̽»¨ÊÓÆµ Awarded Information Technology Enterprise Solutions – Software 2 Contract to Support U.S. Army Enterprise Infrastructure Goals

October 1, 2020
̽»¨ÊÓÆµ today announced that it has been awarded an Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract from the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS), in coordination with the Army Contracting Command, Rock Island, to support the Army’s IT software requirements.
READ MORE