top of page
Signing a Contract

We Got You

Covered.

FAQ

We Got Answers.

FAQ

+ How different is your solution from other industrial security ones? 

Unlike homegrown office automation solutions  or enterprise case management software or broad low-code / no-code solutions, Fresh Haystack is COTS platform that addresses all the key pressure points as they are felt and necessary of keeping the bad guys out and compliance levels high, while closing critical gaps in time to market.


+ When it is a good time to start preparing for Trusted Workforce 2.0?

Status quo is not an option. We already have deployed some of the TW2.0 capabilities to our customers and have built preconfigured and customizable workflows for new vetting scenarios.

+ Can we develop similar solution using LCAP/NCAP tools? 

Designed for modularity, so you can get what you need when you need it, Fresh Haystack modernizes risk management for the national security and has all pre-configured, benchmarked workflows.

+ Is Fresh Haystack cloud ready? 

Yes, Fresh Haystack is cloud ready and has been deployed to both AWS and Azure Gov Clouds. We achieved FedRAMP and FISMA High ATO and are ready for submission of all paperwork including SSP, PenTest, etc. We also have received independent 3rd party SOC2 approvals for last few years. 

+ Is Fresh Haystack mobile ready?

Fresh Haystack is mobile browser ready and could potentially be compiled as a native application for iOS/Android.

+ How easy is to modify existing workflows?

Our screen and workflow designer allows to change workflows tasks/phase, SLAs, notifications / escalations as well as create new workflows.

 

 


+ How long it takes to make Fresh Haystack operational?

Capability is preconfigured and packaged for accelerated delivery – a fraction of the time in most cases. Reliable and trustworthy automation frees our customers from time-consuming ‘build, deploy and manage’ tasks so they can focus on the next. 

 

 


+ How flexible are provided out-of-the-box risk models? 

Our flexible risk models enable our customers to change and fine tune their risk models to their needs. Adjusting risk baseline vetting score or adding a new rule is a trivial configuration change.

 


+ How can our organization use data collected in Fresh Haystack for the whole enterprise?

Fresh Haystack data is stored in the MS SQL server database. We make most common data views available for the enterprise customers and allow to connect Power BI, Tableau, Qlik or any other business intelligence / analytical tools.

Feel free to Contact Us if you have more questions about our products and services.

DATASHEETS

What We Do.

GSA SCHEDULE 70

CONTRACT:

Prime.

NUMBER:

47QTCA18D00GP for Special Item Number 132-51

TYPE:

Information Technology Professional Services.

PERIOD OF PERFORMANCE:

12/10/2018 to 12/09/2023

ENTERPRISE SECURITY AND ARCHITECTURE

Revolutionizing Enterprise Security And Architecture.

CANDA'S COMMITMENT

 

 

At CANDA, we understand that Enterprise Security and Architecture are more than just technical necessities—they are the lifeblood of your business’s success. Our approach is rooted in a deep understanding of the entire development cycle, encompassing business strategy, technical infrastructure, the competitive landscape, and data management. Most crucially, we focus on delivering unparalleled value to all stakeholders: users, developers, managers, and the architecture team.

We balanced crucial stakeholder representation: while user needs are often given prime importance, we recognize that other stakeholders sometimes don't receive equivalent support. Our architects represent a wealth of knowledge, understanding not only the products and projects but also the varying priorities of system requirements across multiple business units — from organizational goals to product functionality and quality.


Our approach for client success:

I. ESTABLISHING BOUNDARIES:
 

Efficiency is key. We create a focused environment for our architectural team, setting clear 'walls' to minimize distractions and temptations, enabling rapid and efficient progress.

II. PRIORITIZING EFFECTIVELY:

Understanding and tracking product priorities and developer concerns is crucial. We establish seamless communication channels between developers, project managers, and architects to ensure that systems are not just planned but executed cohesively.

 

III. REDUCING RISK:

Keeping projects on track and on schedule is imperative. Our architects maintain direct contact with customers, fostering an educated team that stays abreast of market directions, thereby significantly reducing technical risks.

IV. TEAM ORGANIZATION & COLLABORATION:
 

At the heart of our architecture strategy is the facilitation of team communication and understanding. We adopt software development methodologies that reduce risk by promoting active communication among various project roles and involving business leadership in the development and implementation of the enterprise architecture.

At CANDA we deliver Your Vision, Our Architecture and we don't just build systems; we build long lasting relationships and understanding within your organization, ensuring that your enterprise architecture and security solutions are not just functional but are integrated, strategic components of your business's success.

Contact Us at CANDA, where your business strategy transforms into an architectural masterpiece.

CONTRACTS

CANDA Solutions holds a mix of contract vehicles in support of customers in Defense, Intelligence, Civilian and State / Local markets. Ranging from Government-Wide Acquisition Contracts (GWAC) to Agency-focused vehicles, our clients and industry partners have rapid access to CANDA Solutions to draw upon experts within the Information Technology (IT) and Security domains.

C5 OTA — CONSORTIUM FOR COMMAND, CONTROL, AND COMMUNICATIONS IN CYBERSPACE

CONTRACT:

Prime Member.

NUMBER:

Other Transactional Authority.

CLIENT:

Department of Defense.

PERIOD OF PERFORMANCE:

4/2017 to 4/2027

ENTERPRISE SECURITY AND ARCHITECTURE

Revolutionizing Enterprise Security And Architecture.

CANDA'S COMMITMENT

 

 

At CANDA, we understand that Enterprise Security and Architecture are more than just technical necessities—they are the lifeblood of your business’s success. Our approach is rooted in a deep understanding of the entire development cycle, encompassing business strategy, technical infrastructure, the competitive landscape, and data management. Most crucially, we focus on delivering unparalleled value to all stakeholders: users, developers, managers, and the architecture team.

We balanced crucial stakeholder representation: while user needs are often given prime importance, we recognize that other stakeholders sometimes don't receive equivalent support. Our architects represent a wealth of knowledge, understanding not only the products and projects but also the varying priorities of system requirements across multiple business units — from organizational goals to product functionality and quality.


Our approach for client success:

I. ESTABLISHING BOUNDARIES:
 

Efficiency is key. We create a focused environment for our architectural team, setting clear 'walls' to minimize distractions and temptations, enabling rapid and efficient progress.

II. PRIORITIZING EFFECTIVELY:

Understanding and tracking product priorities and developer concerns is crucial. We establish seamless communication channels between developers, project managers, and architects to ensure that systems are not just planned but executed cohesively.

 

III. REDUCING RISK:

Keeping projects on track and on schedule is imperative. Our architects maintain direct contact with customers, fostering an educated team that stays abreast of market directions, thereby significantly reducing technical risks.

IV. TEAM ORGANIZATION & COLLABORATION:
 

At the heart of our architecture strategy is the facilitation of team communication and understanding. We adopt software development methodologies that reduce risk by promoting active communication among various project roles and involving business leadership in the development and implementation of the enterprise architecture.

At CANDA we deliver Your Vision, Our Architecture and we don't just build systems; we build long lasting relationships and understanding within your organization, ensuring that your enterprise architecture and security solutions are not just functional but are integrated, strategic components of your business's success.

Contact Us at CANDA, where your business strategy transforms into an architectural masterpiece.

RESELLER PARTNER GWACS AVAILABLE

NAME:

GSA Contract Holder.

ID:

GS-35F-402GA

DESCRIBTION:

Information Technology schedule price-list general purpose commercial information technology equipment, software and services.

NAME:

NASA SEWP V.

ID:

NNG15SD23B (Group B)

NNG15SC78B (Group C)

DESCRIBTION:

Solutions for Enterprise-Wide Procurement (SEWP, pronounced ‘soup’), is a multi-award Government-Wide Acquisition Contract (GWAC) vehicle focused on IT products and product based services.

NAME:

CIO-CS

ID:

HHSN316201500035W

DESCRIBTION:

The contract is focused on IT products and services, both on-site and in the cloud. It offers a wide range of advanced technology including end-user computing, servers, storage, enterprise software, cyber-security solutions, health care IT, cloud computing, and cloud storage.

NAME:

ITES-3H

ID:

W52P1J-16-D-0019

DESCRIBTION:

The ITES-3H contract vehicle enables organizations to provide agencies with commercial IT equipment, including servers, workstations, PCs, networking equipment, storage environments, and other IT products.

NAME:

2GIT

ID:

47QTCA20A0034

DESCRIBTION:

Open to all agencies but designed with the Air Force in mind, the GSA-based 2GIT contract replaces the NETCENTS 2 Products contracts. It is designed to provide streamlined access to Commercial Off-The-Shelf (COTS) hardware/software and ancillary services.

NAME:

FirstSource II

ID:

HSHQDC-13-D-00023

DESCRIBTION:

FirstSource II is designed as the preferred source to acquire commercially-available Information Technology (IT) commodities, solutions, and Value-Added Reseller (VAR) services to support DHS.

NAME:

US Navy SeaPort-NxG

ID:

N0017821D9097

DESCRIBTION:

The go-to contract for IT professional services for the Navy and Marine Corps. Covers 23 functional areas in two main categories: Engineering Services and Program Management. Flexible contracting models, robust competition, and a dedicated portal for solicitations and award are key features of the vehicle.

NAME:

US Patent & Trademark Office IDIQ

ID:

DOC50PAPT1500035

DESCRIBTION:

By providing optimized IT infrastructure solutions, GAI has helped the Department of Commerce become more business agile. GAI is dedicated to supporting USPTO’s efforts to foster, serve, and promote the Nation’s economic development and technological advancement.

NAME:

Department of State GITM SEWP Agency Catalog

ID:

SAQMMA-17-Q-0070

DESCRIBTION:

Desktop and notebook computer systems including enhancements and peripherals and a complete range of Motorola radio- and IP-based communications systems and associated services.

NAME:

Commerce Networking SEWP Agency Catalog

ID:

1331L519A13ES0043

DESCRIBTION:

Supports US Department of Commerce for solutions supporting Networking Equipment product and maintenance support services.

NAME:

Commerce UiPath SEWP Agency Catalog

ID:

1331L521A13ES0015

DESCRIBTION:

This is a Department wide ordering catalog, issued under SEWP Prime Contract NNG15SD23B for all robotic process automation products and services.

ENTERPRISE SECURITY AND ARCHITECTURE

Revolutionizing Enterprise Security And Architecture.

CANDA'S COMMITMENT

 

 

At CANDA, we understand that Enterprise Security and Architecture are more than just technical necessities—they are the lifeblood of your business’s success. Our approach is rooted in a deep understanding of the entire development cycle, encompassing business strategy, technical infrastructure, the competitive landscape, and data management. Most crucially, we focus on delivering unparalleled value to all stakeholders: users, developers, managers, and the architecture team.

We balanced crucial stakeholder representation: while user needs are often given prime importance, we recognize that other stakeholders sometimes don't receive equivalent support. Our architects represent a wealth of knowledge, understanding not only the products and projects but also the varying priorities of system requirements across multiple business units — from organizational goals to product functionality and quality.


Our approach for client success:

I. ESTABLISHING BOUNDARIES:
 

Efficiency is key. We create a focused environment for our architectural team, setting clear 'walls' to minimize distractions and temptations, enabling rapid and efficient progress.

II. PRIORITIZING EFFECTIVELY:

Understanding and tracking product priorities and developer concerns is crucial. We establish seamless communication channels between developers, project managers, and architects to ensure that systems are not just planned but executed cohesively.

 

III. REDUCING RISK:

Keeping projects on track and on schedule is imperative. Our architects maintain direct contact with customers, fostering an educated team that stays abreast of market directions, thereby significantly reducing technical risks.

IV. TEAM ORGANIZATION & COLLABORATION:
 

At the heart of our architecture strategy is the facilitation of team communication and understanding. We adopt software development methodologies that reduce risk by promoting active communication among various project roles and involving business leadership in the development and implementation of the enterprise architecture.

At CANDA we deliver Your Vision, Our Architecture and we don't just build systems; we build long lasting relationships and understanding within your organization, ensuring that your enterprise architecture and security solutions are not just functional but are integrated, strategic components of your business's success.

Contact Us at CANDA, where your business strategy transforms into an architectural masterpiece.

bottom of page