For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Securing data and your IT environment isn’t a policy discussion – it’s the law

Simple IT management for a complex federal world

Technology keeps changing. Whether it’s compliance and security, cloud migration, datacenter consolidation or something new, Quest Public Sector helps federal agencies solve complex problems with simple solutions.

Maintain legacy systems

Automate managing endpoints

Maintain data availability

Audit Active Directory access rights

Give the correct users access to the right data at the right time

Manage complex database environments


No matter the challenge, Quest Public Sector has the right solution for your business

Government Contracts

GSA logo

GSA Schedules (also referred to as Multiple Award Schedules (MAS) and Federal Supply Schedules) are long-term government wide contracts with commercial firms providing federal, state, and local government buyers access to more than 11 million commercial supplies (products) and services at volume discount pricing. IT Schedule 70 delivers federal, state, and local customer agencies the tools and expertise needed to shorten procurement cycles, ensure compliance, and obtain the best value for innovative technology products, services, and solutions. Here's the link to DLT's Quest page and GSA Teaming Partners

DOD ESI logo

DoD ESI is pleased to announce that Information Technology Asset Management (ITAM) BPAs are now available to all Department of Defense organizations. Products include software licenses, software maintenance support, subscriptions, and information technology professional services.

SEWP logo

SEWP is divided into five Groups of contracts. Groups A, B, C and D were awarded through a Competitive process with the Group B competition set-aside for SDVOSB (Service Disabled Veteran Owned Small Businesses) and Group C competition set-aside for Small Business. Group E consists of non-Competed 8(a) set-aside contracts.

2GIT logo

2nd Generation Information Technology (2GIT) BPA. The 2GIT BPA will replace the NETCENTS-2 IT Products IDIQ contract and is expected to be available to all DoD, federal government agencies, state, local, and tribal governments to purchase IT, security, and law enforcement products and services offered through specific GSA IT Schedule 70 contracts. The NETCENTS-2 Products contract ordering period ends November 5, 2019.

First Source  logo

FirstSource II is an IDIQ contract vehicle which provides Department of Homeland Security with access to a full array of value-added reseller services and access to a wide and renewable variety of IT commodities and solutions (hardware and software) from multiple Original Equipment Manufacturers (OEMs). Any commercially available IT product may be made available through these contracts. 100% small business with 5 Socio-economic tracks.

US army logo

The fundamental purpose of the ITES-SW acquisition is to support the Army enterprise infrastructure and info structure goals and leverage specific COTS software products and maintenance that have obtained a full Certificate of Networthiness (CoN) through the US Army's Network Command (NETCOM) networthiness process. ITES-SW contractors are to enhance Army capabilities by partnering with and supporting the implementation of Army NETCOM's Net worthiness Program.

ITES 3H logo

The ITES-3H contract is a follow-on to the ITES-2H indefinite-delivery/indefinite-quantity contract that covers the purchase of storage network systems, commercial servers, network printers, video equipment and support services such as installation, image loading, systems configuration and data

DHS CDM logo

This is a program and not a standard contract. Purchases made through GSA Alliant 2. The Continuous Diagnostics and Mitigation (CDM) program helps strengthen the cybersecurity of government networks and systems. CDM provides federal agencies with capabilities and tools that find on-going cybersecurity risks on an ogoing basis; prioritize these reisks based upon potential impacts; and enable cybersecurity personnel to focus on the most significant problems first.

Contact a Federal Expert

Need to learn more? Speak to a Product Expert Today