45.8 F
Washington D.C.
Monday, March 27, 2023

DHS Innovation Lab Procurements Beating Estimates for Cost and Speed

The Homeland Security Department Procurement Innovation Lab (PIL) has honed a two-phase acquisition approach that is awarding multimillion-dollar procurements in less than two months, Federal News Radio reported Feb. 26. For example, two relatively complex information technology procurements came in at 42 and 57 days and $13 million and $45 million below estimate, respectively.

The former, for a service management tool that handles workflow requests, was an example of IT modernization in that DHS was moving multiple instances from its data centers to a single, cloud-based application. The latter, for DHS financial systems modernization, used the agency’s multiple-award Eagle 2 indefinite-delivery/indefinite-quantity contract.

Both employed the two-phase model: a self-certification based on technical evaluation factors, followed by an interactive oral presentation that lasted 30 minutes.

“What was really important here is that they took the evaluation process, streamlined it and required a very collaborative team-based approach. They met daily in person,” Polly Hall, PIL strategy and planning lead, told FNR. “The contracting officer said the streamlined process was tremendously valuable. She was able to learn from that; it gave her insight for how to accomplish this for future procurements.”

The PIL has awarded 18 procurements and has 21 more in the works.

Read more at Federal News Radio.

Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles