Seaport-e

Seaport Enhanced Multiple Award Contract Vehicle

Seaport-e:

Seaport POC:

Suresh C Nayak
(732) 326-1600 x 101 
suresh@sag-inc.com

Seaport Customer Satisfaction POC:

Suresh C Nayak
(732) 326-1600 x 101 
suresh@sag-inc.com

Task Order: N00178-16-D-9019

SAG Seaport-e Teammates:

STERLING COMPUTERS CORPORATION

Capabilities / Experience:

Sterling is an award-winning technology solutions provider with over 19 years of experience helping customers solve the most complex requirements of their IT environments. We provide customers with a simplified IT experience by being their single point of contact for all of their solutions architecture, proof of concept, product fulfillment, and technology adoption service’s needs. Additionally, we provide cyber security solutions for mission critical clouds and networks.

 

Sterling was chosen by the National Aeronautics and Space Administration (NASA) as one of the prime recipients of the fifth iteration of the Solutions Enterprise Wide Procurement (SEWP) Government-Wide Agency Contract (GWAC). Sterling is one of only a select few companies to be named to three of the four product categories, including Computer Based Systems, Server Support Devices/Multi-Function Devices, and Networking / Security/Video and Conference Tools. The company is also able to provide customers with proprietary cybersecurity products through the contract, powered by Sterling’s SmartXD technology.

 

Sterling is uniquely qualified for this contract, in particular, based on its extensive past performance delivering customized solutions to the federal government. The company is currently a prime contractor on several similar federal contracts, giving them an in-depth understanding of the unique requirements of the federal government. The company also has a national sales team with extensive knowledge of the missions and objectives of the federal agencies utilizing this contract.

 

Size: Small business, Woman Owned business, SBA Certified Small Disadvantaged business

 

Seaport-e Functional Area:

3.5 – System Design Documentation and Technical Data Support

3.6 – Software Engineering, Development, Programming, and Network Support

3.7 – Reliability, Maintainability, and Availability (RM&A) Support

3.11 – Quality Assurance (QA) Support

3.12 – Information System (IS) Development, Information Assurance (IA), and Information Technology (IT) Support

3.21 – Functional and Administrative Support

 

MCKINNEY & MCKINNEY TECHNICAL SERVICES INC

Capabilities / Experience:

Program Management

MMTSI's Program Management (PM) strategies ensure rapid, low-risk execution of large scale, multi-faceted projects. We have PMP certified staff members that use PMBOK and ISO 9000:2008 compliant procedures focused on continual process improvement.

Tier 1, 2, and 3 Desktop/Service Desk Support

 

MMTSI provides Service Desk support services for PC components, LANs, servers, and peripherals. We offer database, file server and E-Mail server administration services. We tailor our maintenance package to the customer's requirements. Our maintenance program includes a database system to track spare parts, provide maintenance status reports as defined by the customer and track expenditures. Our staff members are A+, Security+, Network+, CCNA, CISSP, and ITIL certified.

 

System Engineering

MMTSI provides system engineering services to Federal and Commercial customers with the ultimate goal of building systems and software applications in accordance with our customer's requirements. MMTSI has experience in the areas of computer architecture, software architecture, networking, and transportation. We provide the following deliverables:
Requirement Specifications, System Design Specifications System Architecture Specifications,   Master Test Plans, Test & Integration Procedures, System Maintenance Plans, Systems Engineering Management Plans, and System Acceptance Plans

 

IV&V

MMTSI provides program management and implementation of IV&V efforts for large complex integration tasks. MMTSI monitors theSolution Architecture throughout the Lifecycle against the end-state while evaluating and validating it against the customers' defined criteria. MMTSI's IV&V services will effectively implement risk management by monitoring and identifying deviations of schedule, cost, and objectives while providing mitigation strategies to prevent delays.

 

Software Development

MMTSI adheres to industry standard software engineering principles and practices defined by Commercial and Federal Government organizations. We provide software developers with expertise in the following:
C, C++, C#, Pro C, ADA, Oracle 11, 10, Oracle Forms, SQL Plus, PL/SQL, SQL Server 2008,   Visual Studio 2010, SharePoint Architecture/Development, WEB Development (SharePoint 2010, Cold Fusion, IIS 7.0, ASP.NET, Designer, Flash), Specification Development (Teamwork and DOORS)

 

Database Development

MMTSI develops databases for the Federal and Commercial market. We provide services in several areas of database development such as:
Requirements/needs analysis, Database specifications (H/W and S/W), Database structure design, Performance modeling, Database user interface design, Database network design, Database installation and verification, User training/DB Maintenance

 

Quality Engineering Services

MMTSI provides SEI CMMI, ITIL, and ISO 9001:2000 services which include business process reengineering, policy and process definitions, assessments, audits and compliance mapping. MMTSI performs business process reengineering for Information Technology (IT) organizations. We interview managers and IT personnel to define the current processes, inputs, triggers, outputs, timelines, and metrics to reengineer processes and increase organizational proficiency utilizing ISO, ITIL, and/or CMMI methods and procedures. MMTSI also performs metric analysis and implements organizational continual process improvement.

SharePoint Development and Architecture Support

MMTSI provides complex SharePoint Architecture and application development including WEB parts, portal development, and administration support.

 

Training

MMTSI adheres to a systematic approach using Adult Learning Principles and the Instructional Systems Development (ISD) model to develop and train courses. We provide training in stand up lecture environments and/or as Computer Based Training (CBT) standalone lectures. Additionally, M & M provides video conferencing, web conferencing, discussion panels, focus groups, and work groups support.

 

Size: Woman Owned business, Women Owned (WOSB), Women Owned (EDWOSB), SBA Certified Small Disadvantaged business, SBA Certified HUBZone Firm

 

Seaport-e Functional Area:

3.5 – System Design Documentation and Technical Data Support

3.6 – Software Engineering, Development, Programming, and Network Support

3.7 – Reliability, Maintainability, and Availability (RM&A) Support

3.11 – Quality Assurance (QA) Support

3.12 – Information System (IS) Development, Information Assurance (IA), and Information Technology (IT) Support

3.21 – Functional and Administrative Support

 

ASYMMETRIC LLC

Capabilities / Experience:

With decades of military experience in managing Division and Brigade level logistics operations, Asymmetric Technologies can offer staffing and planning services with the warfighter in mind. With our past contract performance in multiple austere, OCONUS locations and our extensive network of seasoned, veteran logisticians, we provide comprehensive logistics program management and staffing services to meet DoD needs globally.

 

With a proven track record of staffing excellence and program management expertise, AT excels in the placement of subject matter experts with superior qualifications in key roles and the management of government owned contractor-operated equipment and facilities

 

Size: Small business, Veteran Owned Small business

 

Seaport-e Functional Area:

3.5 – System Design Documentation and Technical Data Support

3.6 – Software Engineering, Development, Programming, and Network Support

3.7 – Reliability, Maintainability, and Availability (RM&A) Support

3.11 – Quality Assurance (QA) Support

3.12 – Information System (IS) Development, Information Assurance (IA), and Information Technology (IT) Support

3.21 – Functional and Administrative Support

 

CATALYST COMPUTER TECHNOLOGIES

Capabilities / Experience:

Founded in 2005 to provide small and medium-sized businesses (SMB) with IT infrastructure support services to fit their technology and budgetary needs. Catalyst’s mission is to provide its clients with the highest quality computer and networking consulting services that leverage state-of-the-art technology and industry-wide best practices.

 

Desktop Support:

You and your employees will have a virtually unlimited tech support team at their disposal. Catalyst combines industry leading SLA’s with a U.S. based support team to support you and your business.

 

Network Management and Support

Your network and computers need to be secure. Catalyst’s IT service plan includes enterprise-level antivirus and antispyware software at no additional cost. Catalyst manages the users on your network and will set up security based on your policies. No one has time to deal with spam so Catalyst prevents up to 98% of e-mail-born spam from entering your network and e-mail system.

 

Server Monitoring and Management

Catalyst provides 24×7 server monitoring and support. This makes sure that your most critical network piece is ready to work whenever you are. With included services such as data backup and disaster recovery planning, you can rest assured knowing your network is both stable and secure.

 

Proactive Support

Technology infrastructure security is a continual process of identifying weaknesses, finding solutions, and implementing changes. Businesses concerned about the protection of data–often including sales records, customer information, emails, spreadsheets, databases etc.–implement processes to *proactively* handle threats before they can negatively affect your business.

 

Catalyst’s proactive approach to security includes:

Enterprise-grade spam, spyware, malware and virus protection, routinely upgraded to protect you from the latest threats. High-quality scanning systems are mandatory in all real-world business systems, and will be managed for you.

Firewalls systems that prevent unauthorized access to your computer systems from Internet users.

Secure e-mail access to protect you from eavesdropping and accidental disclosure of confidential information.

Automated deployment of Microsoft updates.

Virtual Private Networks (VPN). A VPN allows you securely log in to your business computers when you are at home, on the road, or anywhere with an Internet connection. Connections to your business network through a VPN are encrypted to prevent eavesdropping and authenticated such that only approved users have remote access.

 

Size: Small business, SBA Certified Small Disadvantaged business

 

Seaport-e Functional Area:

3.5 – System Design Documentation and Technical Data Support

3.6 – Software Engineering, Development, Programming, and Network Support

3.7 – Reliability, Maintainability, and Availability (RM&A) Support

3.11 – Quality Assurance (QA) Support

3.12 – Information System (IS) Development, Information Assurance (IA), and Information Technology (IT) Support

3.21 – Functional and Administrative Support

 

SAG's Quality Assurance Program