February 23, 2021
North Wilkesboro, NC
IT Schedule 70, currently the largest procurement vehicle, is an Indefinite Delivery Indefinite Quantity (IDIQ) Multiple Award Schedule (MAS) contract. Schedule 70 offers a comprehensive array of state-of-the-art IT products, services, and solutions.
On February 23, InfusionPoints was awarded GSA Contract Number 47QTCA21D005Q to be a pre-approved vendor within Schedule 70. This contract is for five years and will allow InfusionPoints, a HUBZone and Veteran Owned Small Business (VOSB), the opportunity to supply cybersecurity services to government entities. This five-year award is a wonderful opportunity for InfusionPoints to enlarge its government customer base and expand their business while supplying top-tier compliance, program development, cybersecurity, and managed security services.
GSA Schedule 70 SINS Numbers:
54151S - Information Technology Professional Services
541519ICAM - Identity, Credentialing and Access Management (ICAM)
541519PIV - Homeland Security
“We are extremely excited to start marketing and selling our services to the federal government through one of the largest contract vehicles out there today. This award will allow for InfusionPoints to step back into the world of Government contracting because our major focus over the last 5 years has been on the commercial market and it is time to combine our efforts with the federal market. We have been working on obtaining our GSA Schedule 70 contract for almost two years and it is a relief the reward is finally here.”
- Chief of SMarketing Felisha Daemer
InfusionPoints Next Steps
InfusionPoints is tackling two more SINS to include 54151HACS & 518210C. To obtain both 54151HACS & 518210C SIN, InfusionPoints will showcase their past performance with federal cloud experience, skill sets and marketing obligations to win this SIN. One of InfusionPoints main selling points to the federal government will be our secure cloud-based solution sets.
InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions to protect your consumer, employee, and partner information. We are a strategy and technology security consulting firm that is comprised of experienced security professionals. We take an independent approach to infuse security and privacy into the people, processes, and technologies of your business solutions. We leverage our security strategy and technology framework to support decision making and guide ongoing planning, design, and implementation activities.