Latest News

Products

Use next-generation APT sandbox technology to catch not only persistent threats and zero-day exploits, but also advanced malware designed to evade detection by traditional, first-generation sandbox technologies. Flexible architecture allows for easy scalability as your architectural, operational and business needs change. Lastline offers the ability to deploy on commodity hardware or in virtual environments on a per-user basis, so go ahead, deploy as much as you'd like. Expensive proprietary hardware is a thing of past.

Affordable network security is our game. From enterprise to the small branch office, we've got solutions that delivers security, & reliability. Learn why Next-Generation Firewalls (NGFWs) are essential for today's big business networks. Browse the features & benefits of our strong Extensible Threat Management (XTM) products. Discover how WatchGuard SSL makes secure remote access easy. For best email and web security with data loss prevention, check out our Extensible Content Security (XCS) appliances.

GvTech's Layered Security Approach to Network Security With the number of security threats on the rise, network security has become an essential part of maintaining the privacy and integrity of an enterprise. Gv Tech Solutions, has the technology to help you defend your network against attacks by implementing preventative security solutions or Defense in Depth. Our layered approach to network security was designed with the knowledge that no single tool can protect every segment of a network from harm.

Clients

Downloads

scan-mail

ScanMail Suite for MS Exchange (Mail Server)

ScanMail Suite for Microsoft Exchange fights Cybercriminals where they strike most often by blocking emails with links to malicious sites...

office-scan

OfficeScan (File Server)

OfficeScan secures all endpoints - physical and virtual - while reducing the impact on your endpoint resources...

office-scran

OfficeScan Client-Mobile Device

OfficeScan secures all endpoints - physical and virtual - while reducing the impact on your endpoint resources.

Next Generation Firewall

Next Generation Firewall

GvTech's Layered Security Approach to Network Security With the number of security threats on the rise, network security has become an essential part of maintaining the privacy and integrity of an enterprise

WatchGuard

Extensible Threat Management

WatchGuard's award-winning Extensible Threat Management (XTM and XTMv) network security solutions combine firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions.

lastline

Layered Security Approach to Network Security

GvTech Solutions, has the technology to help you defend your network against attacks by implementing preventative security solutions or Defense in Depth.


FAQ

Federal Supply Schedules Frequently Asked Questions
  • 8.405 Under FAR 8.405-6(c) agencies are not required to go out to bid for every renewal of a existing contract. If the previous contract was competitively bid, in the interest of efficiency logical follow on contracts do not have to go through the same open competition process?
  • 8.405 Ordering procedures for Federal Supply Schedules. Ordering activities shall use the ordering procedures of this section when placing an order or establishing a BPA for supplies or services. The procedures in this section apply to all schedules. For establishing BPAs and for orders under BPAs see 8.405-3.
  • "Does the no bid or price comparison" for micro purchases (under $3000) applies to GSA Schedule price list (FAR 804.4) ?
  • 8.004 Contract clause (19/98 released 2/24/98) Contractor Use of Mandatory Sources of Supply and Services, in solicitations and contracts that require a contractor to provide supplies or services for Government use that are on the Procurement List maintained by the Committee for Purchase From People Who Are Blind or Severely Disabled. The contracting officer shall identify in the contract schedule the supplies or services that shall be purchased from a mandatory source and the specific source.
  • 8.504 Procedures?
  • The contracting officer must forward the following information to the Bureau of Land Management within 45 days of the close of each fiscal quarter: (a) The name of any company that supplied a major helium requirement. (b) The amount of helium purchased. (c) The delivery date(s). (d) The location where the helium was used.

About Us

Who is GvTech?

GvTech Solutions Inc. is a nationally based public sector re-seller of Information Assurance tools located in Shingle Springs, CA. GvTech never stops asking what if? Over the years, our partnerships have improved the daily operations for thousands of public sector Government IT organizations all over the United States.

We have made the deployment and implementation of IA tools easier, helped make Networks more secure, made Endpoints safer and helped Government agencies secure their IT environments for over 17 years. There are over 1000 different security products on the market. Most of them work. Can you install them all? Use our experience to help you filter through the data sheets and white papers.

Contact Us

Government Technology Solutions Inc.

4110 Business Drive, Suite A Shingle Springs, CA 95682-7230 1-800-326-5683

Error: Embedded Map could not be displayed.

Connect with us / Feedback