Customer Support: 1-888-232-4405 (Hours: 8-5 EST)
    Army's designated "primary source" for commercial IT

Mission

Be the Army's "Primary Source" to support the War fighter's Information Dominance objectives by developing, implementing, and managing Information Technology contracts that provide enterprise-wide net centric hardware, software and support services for the Army.


More about CHESS

Consolidated Buy 16

Consolidated Buy 16 is now open.

RFQ/RFP Tool Now Available

The RFQ and RFP tools are now available for use. Users should submit a Request for Quote when they require information about hardware and a Request for Proposal when they require a services solution. Though the e-mail distribution links will remain available, customers are required to use the RFP tool and encouraged to use the RFQ tool.

Adobe/Windchill Licenses

STOP! Army organizations should NOT purchase new licenses or renew maintenance for PDF Creation/Adobe Acrobat Professional or PTC Windchill licenses. Two Army-Wide Enterprise License Agreements (ELAs) have been awarded for these products. Contact the CHESS helpdesk at 1-888-232-4405 for more information.


This website is provided as a public service by the Computer Hardware, Enterprise Software and Solutions Program. Information presented on this website is considered public information.

DOD computer systems may be monitored for all lawful purposes, including to ensure their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security.

No personal information about you is collected when you visit our website unless you choose to provide that information to us.

All information, including personal information, placed on or sent over this system may be monitored. Use of this DOD computer system, constitutes consent to monitoring.

Unauthorized attempts to upload information or change information presented on this website is strictly prohibited and may be punishable under the Computer Fraud and Abuse act of 1986, and the National Information Infrastructure Protection Act.