Lawelawe Defense

Introduction

Lawelawe is a Hawaiian word meaning “TO CARE FOR OTHERS”. The Lawelawe community of companies was created to support the parent company Native Hawaiian Organization Charity’s nonprofit initiatives to uplift economically disadvantaged Native Hawaiians and families and preserve the Native Hawaiian heritage. Lawelawe’s portfolio includes 8 SBA certified 8(a) NHO small businesses with a DCAA approved accounting system and facility clearances.
UEI: EY7ZKMMAA7D7
1604 ULUALANA PLACE
KAILUA, HI 96734-4401
www.lawelawedefense.com
CAGE Code: 8V6C6
Year Established: 2020
SBA 8(a) Case Number: C00rmD
SBA 8(a) Entrance Date: 02/28/2022
SBA 8(a) Exit Date: 02/27/2031

Business Type: SBA Certified 8(a), Native American, Native Hawaiian Organization Owned Firm, Other Minority Owned, Self-Certified Small Disadvantaged Business

The Hawaiian Super 8(a) Advantage

  • Ability to receive direct awards. No J&A required for DoD direct award contracts up to $100M ($4M for all others) DFARS 219.808-1(a) and Exemption from competitive thresholds
  • Directly negotiate contracts with the Government 13CFR124.503©
  • Awards cannot be protested 13CFR124.517(a)
  • Agencies may attribute the experience or past performance of a parent or affiliated company
  • Agencies may claim both Small Disadvantaged Business (SDB) and Native credits

Capabilities

Our outstanding record of delivery on various projects encompass: Program and Portfolio Management; Systems Engineering and Architecture; Network Engineering and Operations; Data Center Optimization and Operations; Desktop/Server and Application Virtualization; Cybersecurity and Vocational Rehabilitation.

IT Operations

Provide comprehensive IT Operations support services to optimize our customers’ IT operations, rapidly solve their users’ day-to-day IT issues, and evolve the IT operations to stay current. We use industry best practices, including ITIL/ITSM, to provide optimal IT support. We provide IT Enterprise Service Desk support to resolve user problems remotely in an efficient, scalable, and cost-effective manner as well as touch labor support for users in the field. Our staff have expertise with many ITSM products including Remedy and ServiceNow.

Our comprehensive IT Operations services include:
Multi-sourcing Service Integration (MSI) / Service Integration and Management (SIAM) support, Service Portfolio Management, including Service Design and Service Catalog Management, Self-Service Portals with automated Service Requests and self-help Knowledge Bases (KBs), Phone, Email, Live-Chat Customer Service, and “touch labor” support, 24×7 Service Desks with capability of high volume (i.e. 50,000+ calls per month) global user support, 

Government Owned Contractor Operated (GOCO) and Contractor Owned Contractor Operated (COCO) Service Desks, Desktop, Laptop, Handheld, and Mobile Device Support, Technology Refresh Support Services, General IT Support, such as Account Access, Network, MS Office, Active Directory, Smartphones, and SharePoint, Mission Critical Applications Support, such as Databases, Case Management Systems, Financial Systems, and Medical Systems, Video Telecommunications (VTC) Support, Knowledge Base Development and Maintenance, Service Request development and management, including orchestration to automate repetitive requests such as password re-sets and software installs and Radio-Frequency Identification (RFID) Implementations

Cyber Security

At the same time, the government is implementing more safeguards, policies, and controls, which adds more complexity to getting a system operational. Lawelawe Defense consistently provides security related services that ensure our customers’ systems are safe and comply with agency specific security requirements, such as FISMA, DIACAP, and RMF. We implement Information Assurance security best practices to make sure our customer hardware and software meets all required security mandates without delay.

Our Cyber services and expertise include:
NIST Risk Management Framework (RMF) Assessments and Authorizations, Federal Information Security Management Act (FISMA) Compliance, DISA Security Technical Implementation Guidelines (STIGs) Compliance, System/Network Compliance Monitoring/Scanning for Availability, Reliability, and Integrity, Incident, Threat, and Vulnerability Analysis, Firewall Management, Intrusion Detection and Intrusion Prevention Systems (IDS/IPS),
Virus, Malware, and Security Remediation, Federal IT Security & Compliance, including DoD 8570.01-M Compliance, Assured Compliance Assessment Solution (ACAS) and Security Content Automation Protocol (SCAP)

HW/SW Life Cycle Software Asset Management support includes planning, acquisition, deployment compliance, and retirement. We deploy industry best practices that ensure efficiency, compliance and cost savings.

Scan

Scan your workstations that are scattered across different sites to discover and import all the installed software automatically; Classify software as managed, shareware, freeware, prohibited, and categorize them for efficient tracking and management; Get a complete history of when the software was installed or uninstalled, past users of the software, and workstations that ran the software; Get a single list view of each software, capturing critical details like the number of purchases vs. installations, workstations running the software, and the software manufacturer’s profile. 

Audit

Scan your workstations periodically to detect license violations and unauthorized software installation to sail through audits with ease; Allocate license types as individual, enterprise, OEM, concurrent, and volume license to all managed software; Keep track of license expiration dates and be notified in advance so you can reduce license management risks; Create license agreements with various vendors and associate multiple software licenses to software license agreements anytime. 

Manage

Track overlicensed, underlicensed, and compliant software using the software dashboard; Ensure that your software is bug-free and updated by managing service packs such as hotfixes, security updates, and software updates from a centralized location; Plan your future purchases wisely by gaining information on the frequently used, rarely used, and occasionally used software via software metering; Create software reports, automatically schedule them, and share them in desired formats across your enterprise for analysis and better decision making. 

In addition, we help with the following:

Audit Preparation and Defense, Contract Negotiation,
Right-pricing by aggregation of licenses, True-up Accuracy Reporting, Normalizing the Software Catalog, Full Software and Hardware Inventory, Support for Upgrade and Migration Activities and Optimization of consumption and availability of licenses to drive value.

NAICS

541715 Research and Development in the Physical, Engineering, and Life Sciences (primary) 
518210 Data Processing, Hosting, and Related Services 
541511 Custom Computer Programming Services 
541512 Computer Systems Design Services 
541513 Computer Facilities Management Services 
541519 Other Computer Related Services 
541611 Administrative Management and General Management Consulting Services 
541612 Human Resources Consulting Services 
541690 Other Scientific and Technical Consulting Services 
541990 All Other Professional, Scientific, and Technical Services 
624310 Vocational Rehabilitation Services 
541330 Engineering Services 
335400 Aerospace Products and Parts Manufacturing 
488190 Other Support Activities for Air Transportation 
336414 Guided Missile and Space Vehicle Manufacturing 
336415 Guided Missile and Space Vehicle Propulsion Unit and Propulsion Unit Parts Manufacturing 
336992 Military Armored Vehicle, Tank, and Tank Component Manufacturing 
336999 All Other Transportation Equipment Manufacturing 

Skip to content