Information Technology Enterprise Solutions – Software 2 (ITES-SW2)

# W52P1J-20-D-0042

ITES-2W2-logo.png

 

The purpose of the ITES-SW 2 acquisition is to support Army, Department of Defense (DoD) and all Federal Agency enterprise Information Technology (IT) infrastructure and info-structure goals by leveraging Commercially available-Off-The-Shelf (COTS) software products and maintenance in 14 product categories in addition to related incidental services and hardware. These 14 categories align with the major software categories identified by U.S. Army Network Enterprise Technology Command (NETCOM). The software catalogs are:

Audio & Visual
Multimedia & Design
Business & Finance NetOps
Communication Office Suite
Database Operating Systems
Education Programming & Development
Internet IT Utility & Security
Modeling & Simulation Specialized


All products and services available under ITES-SW 2 must be commercial in accordance with the definition of commercial items in Federal Acquisition Regulation (FAR) 2.101. The planned period of performance is five years with one five year option with an estimated contract value of $13 billion.

Contract Information

Scope:
The scope of the Information Technology Enterprise Solutions – Software 2 (ITES-SW2) includes COTS IT software products in the following 14 catalogs: Audio & Visual, Business & Finance, Communication, Database, Education, Internet, Modeling & Simulation, Multimedia & Design, NetOps, Office Suite, Operating Systems, Programming & Development, IT Utility & Security, and Specialized. ITES-SW2 also allows customers to fulfill a total solution requirement by adding related incidental services and/or hardware.

Primary Goods and Services:
ITES-SW2 includes COTS IT software products in the following 14 catalogs: Audio & Visual, Business & Finance, Communication, Database, Education, Internet, Modeling & Simulation, Multimedia & Design, NetOps, Office Suite, Operating Systems, Programming & Development, IT Utility & Security, and Specialized. ITES-SW2 also allows customers to fulfill a total solution requirement by adding related incidental services and/or hardware.

Ordering Open To: 
Army, DoD and other Federal Agencies

Ordering Instructions:
Requests for software under ITES-SW2 are submitted via the CHESS RFQ or RA tools. The ITES-SW2 contracts are the Army’s mandatory source for the purchase of COTS IT software products. Army customers must follow the software order of precedence which is: Enterprise License Agreement (ELA), ITES-SW2, DOD Enterprise Software Initiative (ESI) Blanket Purchase Agreements (BPA). Customers must obtain a Statement of Non-availability from CHESS and/or an ITAS Waiver from the CIO/G-6 if they wish to purchase outside of CHESS. Note that purchasing from an ELA or DOD ESI is considered purchasing through CHESS. See the CHESS FAQ page for further information.

Contract Fee:
None

Resources:

Ordering

Requests for software under ITES-SW2 are submitted via the CHESS RFQ or RA tools. The ITES-SW2 contracts are the Army’s mandatory source for the purchase of COTS IT software products. Army customers must follow the software order of precedence which is: Enterprise License Agreement (ELA), ITES-SW2, DOD Enterprise Software Initiative (ESI) Blanket Purchase Agreements (BPA). Customers must obtain a Statement of Non-availability from CHESS and/or an ITAS Waiver from the CIO/G-6 if they wish to purchase outside of CHESS. Note that purchasing from an ELA or DOD ESI is considered purchasing through CHESS. See the CHESS FAQ page for further information.

How to Utilize ITES-SW2

  1. Access the CHESS IT E-MART here
  2. Under Software, select ITES-SW2 Contracts (a list of all vendors is provided)
  3. Select any of the Contracts Details

Resources:

Vendors

#

1Kosmos

3CLogic

7SIGNAL

17a-4

1440

A

Absolute Security

Abstract

Acadis

Acalvio

Accela

AccessData

Accrete Government

AchieveIt

Acquia

ActiveFence

ADF Solutions

Adobe

Adobe Connect

AECOM

Aerospike

AIComply

Aisera

Akamai

Akridata

Allyant

Altair

Altana

Alteryx, Inc.

AmbiFi

Anchore

Animate Cyber

APIsec.ai

Apollo Information Systems

AppGuard

Appian

Apposite Technologies

Aqua

Arcadus

Archer

archTIS

Armada

ArmorPoint

ArmorText

Arqit

Arria NLG (USA) Inc

Ascent Solutions

ASG Technologies

Ask Sage

Assima

Astera

Aurigo

Authenticiti

Autodesk

Automize A/S

Avaap

AvePoint Public Sector

Avid

Avisare

Aware

AWS

Axon

Axonius Federal Systems

Axway

B

Babel Street

Backing Fire

Basis Technologies

Basis Technology

Beezy

Bentley Systems

BetterUp

BeyondTrust

Bidscale

BigID

BlackBag Tech

BlackBerry

Blackbird.AI

Black Cape

Black Duck

BlackFog

Blackshark.ai

Blaize

Blancco

Blinkly

BlocPower

Blue Fusion

BlueHalo

Bluescape

BlueVoyant

Bocada

Boeing

Boomi

Botcopy

Boulder Insight

Box

Bravium

Brazen Technologies, Inc.

Bright Pattern

Bryq

Buurst, Inc.

Byos

C

C2 Labs Inc.

CalypsoAI

Cambium Networks

Casepoint

CA Technologies

cBEYONData

Cellebrite

Celonis

Censys

Certus Core

Chainalysis

Chainbridge Solutions

Chainguard

Check Point

Chooch

Chronus

Cigent

Circle Protocol

Cision

Clarifai

Clarivate

ClearInfo

ClearInsight Solutions

ClearPoint Strategy

Clear Skye

Click Armor

CloudBees

Cloudburst

CloudCaller.io

Cloudera

CloudFrame

Cloudian

CloudMatos

Cloud Range Cyber

CloudSaver

Cloud Software Group

CoachMePlus

Codeium

CodeLock

Cofense

Cohesity

CollabNet

Collabware

Collibra

Commvault

Compart

Confluent

Contentsquare

ContraForce

Contrast Security

Control Plane

Copado

CORAS

Corelight

Corellium

CoreLogic

CorePLUS

CounterCraft

Coupa

Coursera

Craft

Cranium

CrashPlan

Crave.io

Crawford Technologies, Inc.

Cribl

Cronos

CrowdAI

Cubic Cyber Solutions

CureMetrix

Customertimes Corp.

Cyara

Cyberbit

CybernetIQ

Cybrary

CyCognito

Cyera

Cylance

Cynerio

Cypher LLC

Cytellix

D

D-Wave Systems

Dantex

Danti.ai

Daric

Darkweb IQ

Darzin Software

Dassian

data.world

Databricks

Dataiku

Datameer

DatAnchor

DataRobot

DataShapes

DataSnipper

Decision Lens

Deep Labs

Deep Media

Defend3D

Definitive Business Solutions

Dejero

Delinea

Dell

Delphix

Deltek

Denodo

Deque Systems, Inc.

Dice

Digital Map Products

DigitalXForce

DigitSec

Diligent

Discovered Intelligence

Docusign

Domino Data Labs

Domo

Do Process

Dragos

DreamFactory Software

Dremio

Druid

Druva

DryvIQ

DSI Compliance Ltd

DSP Development Corporation

DTech Apps by Discover Technologies

Dtex Systems

Duality

Dun & Bradstreet

Dynamo AI

E

e-Magic

e-Share

EarlyBirds

Ecco Select Corporation

Eclypsium

EDB

Edge-Core Networks

EdgeRunner

Eduworks Corporation

Effectual

eGain

Eightfold.ai

Elastic

ElastiFlow

ElectrifAi

Element34

Elemental Cognition

Encryption Consultant

Entrust Digital Security

Epik Solutions

Ericsson (formerly Cradlepoint)

Everfox

Everlaw

eVisit

EvolveWare

Exabeam

Exclaimer

Exiger Government Solutions

Expanse

F

Falkonry

FastDial

Federal Compass

Federated Wireless

FedLearn

Fend

Fenix Insights

FI Consulting

Fidelis Security

FileCloud

FireEye

Flashpoint

Flexera

Flosum

Fluence Technologies

Fluid Mobility

FM:Systems

FogHorn Systems

ForceMetrics

Forcepoint

Forescout

Fornetix

Fortanix

Fortinet

Fortra

Fortress

Forum Systems

Forward Networks

Frameable

FusionReactor

G

Gallus Communications

Garblecloud

General Networks

Genesys

Geosite

Gimmal

GitLab

Glasswall

Global Telehealth Services

GL Solutions

Golden

Golden Recursion

GoMeddo

GoodMaps, Inc.

Google

GoSecure

Govini

Grafbase

Graid Technology

Grammarly

Granicus

Graphika

Greymatter.io

GreyNoise

Greystones Group

Groq

Groundswell

Groupdolists

Guardian Score

GuardStack

GXC

Gyrus Systems

Gyst

H

H2O.ai

HackerRank

Hack The Box

Halcyon Solutions Inc.

HashiCorp

Help Lightning

Hewlett Packard Enterprise

Hexagon US Federal

HHS Tech Group

HIPAA Vault

Hiplink

Holonic Technologies

Hootsuite

Horizon3.ai

HUMAN Security

HYAS

Hypori

HyTrust

I

iboss

iBwave

ICEYE

ID.me

IDI

IEM

Ignyte Group

Immersive Wisdom

Improbable.io

Inbox Monster

Industrial Defender

Infoblox

Infotopics

InfraMappa

Ingentis

Inkit

Innive

InQuisient

InSource

Instabase

Insystech

Intact Partners Inc

Intercede

Intermap Technologies

Interos

Interpersonal Frequency

Intratem

Invicti

InVisionApp Inc.

ioMoVo

IronNet Cybersecurity

IT Consulting Partners LLC

ITS Partners

Ivanti

iVerify

ixlayer

J

JDXpert

JFrog

John Snow Labs

Jotform

K

Kagool

Kajeet

Kapalya

Kaseware

Keeper Security

Keralia

Keyavi Data

Kharon

Kinetica

Kinetic Data

Kion

KLaunch

KLC Group LLC

KL Software Technologies

KnowledgeLake

Kodak Alaris

Kong

Kore ai

Kove

Krista Software

Kusari, Inc

KWIZ

Kyndi

L

Labelbox

Lambda

Leaning Technologies

Leankor

Learn to Win

LeGuard

Liferay

LILT

LinkedIn

Liquibase

Liquidware

Little Arms Studios

Live Earth, LLC

Live Wall Media

Lloyds List Intelligence

LOCH Technologies

Lookout

Lovelytics Data LLC

Luminix, Inc.

M

Magnet Forensics

MangoApps

Manifest

Mapbox

MapLarge

Mark43

Markforged

MarkLogic

Material Security

Mattermost

McAfee

Measure

Menlo Security

Mercurio Analytics

Merkle Science

Micro Focus

Microsoft

MinIO

MixMode

mLogica

MLtwist

MobileMind

ModelOp

MongoDB

Mossé Security

Moveworks

Muck Rack

MuleSoft

Mural

mxHero

Myota

N

Natsoft

Nearmap

NEOGOV

Nerdio

Netaphor

NetDocuments

Netenrich

NetFoundry

NetImpact Strategies

Netography

Netskope

NetThunder

NetWitness

Netwrix

Netwrix Corporation

New Net Technologies (NNT)

NewPush

New Relic

Next Chapter Technology

NICE

Night Shift Development

Nintex

NNData

Nokia

Nok Nok

Noname

NowSecure

Nozomi Networks

Ntrepid

NU Borders

Nucleus Security

Nuggets

NuHarbor Security

Nutanix

Nuvolo

NVIDIA

NWO.ai INC

Nyriad

O

Oak Innovation

Ocient

OffSec

Okta

Onapsis

OneLayer

OnSolve

Onspring

Ooma

OpenAI

OPEXUS

OPSWAT

Optezo

Orbital Insight

Orca Security

Orijin

Orion

OSIsoft

Outpost Security

OutSystems

Overwatch Data

oVio technologies

P

PacketViper

Palantir

Palo Alto Networks

Paperless Innovations

Parabol

Parallel Works Inc.

Paramify

Parascript

Patero

PC Matic

PDQ.com

Pendulum Intelligence

PeopleGoal

Permuta

Persado

PhoneLiveStreaming

Photon Medical Communications, Inc.

Phylum

Ping Identity

Pivotal

piXlogic

PIXM

Planet Technologies

PlatCore

Plauti

Plotly

Plum Identity

Pluralsight

Portal26

Preamble

Prepared

Primer

Privaini

Progress Software

Proofpoint

Prophecy

ProStar Geocorp

Proven Optics

Pryon

Pulselight

Puppet

Pyramid Analytics

Pyze

Q

QA USA Inc.

QFlow

Qlik

Qmulos

Qrypt

Qualtrics

Qualys

QuantaHub2

Quantexa

Quantifind

Quantropi

Quantum

Quantum Bridge

Queue-it

QuintessenceLabs

Qumulo

Quokka

QuSecure

R

R-Mor

r4 Technologies

Radiant Logic

Raindrop Systems

Rancher Government Solutions

RangeForce

Rapid7

Ratio Exchange

Read

Ready

Rebellion Defense

Recon Apps

Recorded Future

Red Hat

Red Vector

RegScale

Rendered.ai

RepRisk

Rescale

Resemble AI

Resiliant

Resource Hero

ReSTNSX

Reva Solutions

Reveal Technologies

ReversingLabs

Rhondos

Ripcord

Riskonnect

RiskRecon

Riverbed Technology

Rocket.Chat

RPI-CS

RSA

Rubrik

Run:ai

runZero

RZero

S

S-Docs

SafeLogic

SailPoint Technologies

Salesforce

SalesIntel

SandboxAQ

SAP NS2

SAS

Saviynt

Scale AI

SDL

SearchBlox Software

SectorNet

Secured Communications

Securitybricks

SecurityScorecard

Seekr

Seerist

SentinelOne

ServiceNow

SessionGuardian

ShardSecure

SigmaXai

SimpliGov

SimSpace

Sitetracker

Sixgill

Skuid

Skyhigh Security

Skyline Software

Slack

Smart Communications

SmartSuite

Snorkel.ai

Snowflake

Socialgist

Socure

Sodales Solutions

Software AG Government Solutions

SOFware

SolarWinds

Sonatype

SonicCloud

Sotera Digital Security

SparkCognition Government Systems

Sphere Technology Solutions

SpiderOak

Spire Federal

Splashtop

Splunk

Sprinklr

Sprout Social

SpyCloud

Squivr LLC

stackArmor

Stave Apps

Stralto

Straylight Systems Inc.

Strike Solutions

Striveworks

SuccessKPI

Suggestion Ox

SurePass ID

Swirl

Sword GRC

Sylabs

Symantec

Symmetry Systems

Synergist Technology

Synergy SKY

Syniverse

Synthesis AI

Systecon

System High

T

Tableau

Tabnine

TAG Infosphere

Tanium

Taqtile

TDI

Team Cymru

TeamWorx Security

Tech5

Tech Soft 3D, Inc.

Telos Corporation

Tenable

Tensor Networks

Terida

Terra Pixel

TestifySec

Thales Trusted Cyber Technologies (TCT)

The Information Lab

The Mortgage Office

The Routing Company

think-cell

ThreatLocker

Throughline, Inc.

TIAG

Tier44 Technologies, Inc

Titania

Titan Technologies

Titus

TLUX Technologies

Tomorrow.io

Tonic.ai

Torch.AI

TrainCy

TransPerfect

TraqPlan

Trellis Data

Trellix

triangle experience group, inc

Tricentis

Tricentis Americas, Inc.

TriestAI, Inc.

Trifacta

Trimble

True Elements

Trusona

TrustLayer

Trustwave

TSECOND

TTEC

Tufin

Tungsten Automation

Two Six Technologies

TYCHON

U

UberEther

Udacity

Udemy

UiPath

Unstructured Technologies

UXstorm

V

Valimail

Vannevar Labs

Vantiq

Vasion

VAST Data

Vcinity

VectorZero

Vectra

Veeam

Velaro

Velos

Venafi

Verge Technologies

Verint

Veritas Technologies

Veritone

Verkada

Versa Networks

Vibronyx

VIQ Solutions

VIRNECT

Virsec

Virtana

VirtualZ Computing

Vision Point Systems

Visium Analytics

Vivid-Hosting

VividCharts

VM2020

VMRay

VMware

Voyager Labs

Voyager Labs

Vyopta

W

Wabbi

Walacor

WalkMe

Wasabi Technologies

WaveDancer

Weights & Biases

Whistic

WhiteCanyon Software

WillCo Tech

WinMagic

WINN Solutions

WireScreen

Wiz

Workera

Workiva

X

XQ Message

Y

Yansa Labs

Yext

Yubico

Yurts

Z

Zammo.ai

Zebra

Zencase

Zencity

ZenGRC

ZenLedger

Zentera

ZeroEyes

ZeroFox

Zimperium

Zoom

Zscaler

Contract Holders

In addition to Carahsoft's contract, we also support the following reseller partners.

News

Carahsoft Adds 65 Vendors to Catalog Offerings on ITES-SW2 Contract

March 9, 2021
Carahsoft today announced that it has added 65 more vendors to its Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS). Carahsoft’s contract now includes 128 solutions providers and is effective through August 30, 2025.
READ MORE

Carahsoft Awarded Information Technology Enterprise Solutions – Software 2 Contract to Support U.S. Army Enterprise Infrastructure Goals

October 1, 2020
Carahsoft today announced that it has been awarded an Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract from the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS), in coordination with the Army Contracting Command, Rock Island, to support the Army’s IT software requirements.
READ MORE