Contract # 47QTCA19D00LK

Highly Adaptive Cybersecurity Services (HACS)

How to use cooperative contracts on Pavilion

On this page, view contract documents; see other suppliers on the contract and message suppliers directly. Contract didn't fit your needs? Search through over 100,000 cooperative and shareable contracts for products, services, brands and suppliers directly on Pavilion.
Search contracts

Due diligence checklist



Is this information accurate?

Contract Overview

Supplier

TAU SIX, LLC and 114 other suppliers on contract

Lead agency

General Services Administration (GSA)

Eligibility

The General Service Administration’s (GSA) Multiple Award Schedules (MAS) are long-term contracts negotiated by GSA with vendors. State, local and education entities, as well as other eligible buyers, can purchase IT, security, and law enforcement products and services under certain Special Item Numbers (SINs) through GSA MAS contracts. Learn more about eligibility requirements here.

Contract source

Expiration date

Renewals through September 23, 2024

Take the next step

Reach out to TAU SIX, LLC with questions.

TAU SIX, LLC


Documents

Contract documents

  • online

    Download

Contract documents are only available for Pavilion users. Sign up for your free account to view, search and download these documents.

T

About TAU SIX, LLC

Tau Six was founded with a plan to build a highly strategic, national security company, with specialized capabilities in cyber security, risk management, and secure system development & integration. Intellectual property, privacy act protected information, critical command and control systems, and national security data are increasingly compromised by sophisticated cyber attacks. Working in partnership with our customers, Tau Six helps organizations plan and implement an integrated cyber strategy to minimize cyber security risk, increase mission assurance, and improve customer and organizational privacy. Tau Six works together with our customers to assess vulnerabilities and threats, prioritize mitigation approaches based on the latest technology and best practices, and implement a comprehensive cyber security strategy.

View other contracts from supplier