:- IDBI /PCELL/ RFP/
|
|
- Kerry Rich
- 6 years ago
- Views:
Transcription
1 Sr. No RFP Page No Section / Clause/Para No Existing clause 1 6 Control Sheet Schedule for receipt of Bids: - 31 st March 2017 at 1600 Hrs. 2 6 Control Sheet Schedule for Opening of Technical Bids: 31 st March 2017 at 1630 Hrs. Modified/Revised clause Schedule for receipt of Bids: - 6 th April 2017 at 1600 Hrs. Schedule for Opening of Technical Bids : 6 th April 2017 at 1630 Hrs Eligibility Criteria The bidder should provide the list of clients for APT solution implemented during last two years up-to (Relevant PO / client confirmation mail or letter regarding successfully implementation of APT solution) Eligibility Criteria Delivery, Installation and Commissioning : period & Location Product licenses should be perpetual and AMC would be around 25-30%. Delivery and installation of APT solution will be at DC, Belapur & DR- Chennai within Eight weeks from the date of release of PO. Inspect SMTP, POP3, The OEM/Bidder should provide the list of clients for APT solution implemented during last two years up-to (Relevant PO / client confirmation mail or letter regarding successfully implementation of APT solution). Product licenses should be perpetual and AMC cost to decide by OEM/Bidder. Delivery and installation of APT solution will be at DC, Belapur & DR- Chennai within Twelve weeks from the date of release of PO. 5 27, 55 & Technical/Evaluation Inspect SMTP, POP3, IMAP Format II IMAP traffic traffic, FTP and SMB 6 27 & Additional Support of STIX / TAXII inclusion as Desirable for evaluation (Refer revised Technical Format I & II below) 7 Page no. 28, 56 & 96 Technical bid/ Evaluation bid part II Point no.17 A solution must support minimum 2X10 GB supported to Copper Gigabit Ethernet (GBE) and 4X10Gigabit Fiber (LC) interfaces The Solution should be able to handle and detect threats in a traffic of 6 GBPS Page 1 of 6
2 8 Page no. 56 Additional point for Scope of work 9 Page 56 Additional point for Scope of work 10 Page 57 - bb Scope of Work 11 Additional point for Technical specifications under section (3.1) Service Level Expectation OEM/ Bidder to provide hardware replacement within 3 days time if failed as part of RMA replacement policy. The bidder is required to adhere to the Service Level Agreements as mentioned below for the support phase. Time to Detect 10 to 15 minutes maximum inclusion as Critical TIME TO DELIVER - signature for new or zero day malware infection to be provided WITHIN minutes inclusion as Critical OEM/ Bidder to provide hardware replacement within 1 days time if failed as part of RMA replacement policy. The Tool or the vendor/bidder should have an Intelligence sharing network where Information learned from APT and advance malware threats can be shared across the vendor s customer base globally Please refer below revised SLA point no. 3.1 *Rest all terms & conditions as per RFP. Date: - 27 th March 2017 Place: - Mumbai Page 2 of 6
3 Sr Evaluation Parameter * TECHNICAL BID / EVALUATION FORMAT PART I The OEM/bidder must have implemented atleast two APT solution from the proposed OEM in a BFSI/ E-Commerce environment or at Banks with 100 branches/ offices globally The proposed APT solution Product features (Critical) The proposed APT solution Product features (Desirable) The bidder should have minimum 3 skilled OEM certified staff for APT solution The vendor/bidder must be Gold/Tier-1 or Silver/Tier-2 partner of the OEM for the proposed product. Approach, Methodology & Expertise ** (Presentation would be held) Sample reports to be submitted which would be evaluated). Minimum Requirement 2 BFSI/Ecommerce/Banks environment implementation Silver/Tier-2 partner Maximum Marks Details 2 implementations = 4 3 implementations = 5 4+ implementations = 7 Critical (Refer Part-II of Technical bid/evaluation Format) 2 marks to each. Desirable (Refer Part-II of Technical bid/evaluation Format) 1 marks to each Certified Staff =3 3+ Certified Staff = 4 4 Gold/Tier-1 partner = 4 Silver/Tier-2 partner = 3 Based on data submitted including (1) Project plan and Product details for all products/technology that 30 will be used in IDBI Environment. 2) Proposed process and formal presentation on the architecture for 1 hour Total 100 Qualifying Marks is 70 Attachments/Necessary documentary evidence/ proofs PO or Work order or Invoice Letter from client on client letter Head. / directly marked by the client to IDBI Product Brochures and any supporting documents clearly indicating the features Product Brochures and any supporting documents clearly indicating the features CV of resources along with certificates to be furnished. i. This evaluation will be carried out on a total score of 100 on the basis of the above evaluation parameters defined in this section. However, the detailed scoring mechanism is to be carried out as per Technical Bid Evaluation Criteria (Section 6). ii. The Bidders scoring a minimum of 70 marks based on the detailed evaluation in Technical Proposal Evaluation would be qualified and short listed for next Phase i.e Opening of Indicative Commercial Bid and ORA. iii. In Part II, bidder has to provide their compliance (Yes/No) for Critical & desirable specification. The same will also be evaluated for next phase commercial bid. Page 3 of 6
4 TECHNICAL BID / EVALUATION FORMAT PART II Sr. APT Gateways solution Critical Yes/No Desirable Yes/No 1 Automated Malware Analysis 2 Real-Time Threat detection 3 Solution should be deployed on premise and along with on premise sandboxing capability 4 5 Sandboxing capabilities of following Operating Systems (32 and 64 bit) : Win XP, Win7, Win8.x, Win10.x, Server 2008 R2, 2012 R2, Solution should be able to detect the persistent threats which come through executable files, PDF files, Flash files, RTF files, any type of file 6 Inspect SMTP, POP3, IMAP traffic, FTP and SMB 7 Inspect UDP traffic 8 Domain Fluxing ( Fast Fulx / Dynamic Reputation/ Domain Generation Algorithms) 9 Ransamware detection 10 C&C and Botnet detection using ANY protocol 11 Dormant threat detection capability 12 Suspected file collection and submission from Console. 13 Solution should be capable to integrate with devices like Firewall/IPS to mitigate risk by blocking similar session. (Checkpoint, Cisco) The solution should support discovery of infections via Ipv4 and Ipv6 Traffic Analysis Solution should integrate with SIEM technology specific to RSA SA (Security Analytics) v and above. Solution/appliance must have RAID redundancy (for hard drives), network redundancy (for management network interfaces), Power-Supply and Fan module redundancy. The Solution should be able to handle and detect threats in a traffic of 6 GBPS A solution should identify infections regardless of the host s Operating System and devices used (OSagnosticism) A solution should have Infections detection without sandbox features as well. Page 4 of 6
5 20 21 Solution should track the infection or threat history for a device, with the ability to access all forensic evidence for past infections. (6 months) A solution should support hostname resolution through either NetBios Lookup or reverse DNS. (Asset Identification) Sandboxing File type supports Multilevel Zip files (.doc,.xls,.ppt,.pdf,.exe,.zip,.rar,.tar,.gz,.tar.gz, 22.tgz,.zip,.bz2,.tar.bz2,.bz,.tar.Z,.cab,.rar,.arj,.exe,.dll,.avi,.mpeg,.mp3/4,.jpg, java script, JavaArchive JAR, LNK,.chm,.swf,.sys,.com,.hwp etc) 23 Support of STIX / TAXII 24 Sandboxing capabilities of following Operating Systems :- Linux, Unix and MAC OS, Android 25 Zero Day Malware Discovery 26 Malicious P2P Discovery 27 Inspect Proxy/ http traffic 28 Inspect DNS traffic 29 Inspect https traffic (Full Deep Packet / Encrypted Traffic Inspection) 30 Inspect Non-standard TCP port traffic Solution should be capable to integrate with 31 devices like Web proxy to mitigate risk by blocking similar session. Solution should be capable to integrate with 32 devices like Enterprise Antivirus product to mitigate risk by blocking similar threat by pushing hashes / signature. Solution should be able to support XFF (X- 33 Forwarded-For) to identify the IP Address of a host in a proxy/nat environment. 34 Solution should be able to Identify suspicious embedded object in document file like OLE & Macro extraction, Shell code& exploit matching Page 5 of 6
6 3.1 The bidder is required to adhere to the Service Level Agreements as mentioned below for the support phase. Sno. Service Area Service Level Penalty APT Gateway Solution Appliance /server Affected Onsite Visits next day for level 0 issues Penalty as XX% will be calculated yearly while Support Payments Webex session same day of issue for level 1 would be made annually issues Telephonic support at same time issue faced for level 2 issues. 1 >8 hrs. Level 0 0.5% 2 >4 hrs. Level 1 1.0% 3 >1 hrs. Level 2 1.5% Page 6 of 6
Seceon s Open Threat Management software
Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More informationRequest for Proposal (RFP) for setting up a Security Operations Centre (SOC), SIEM and Security Tools Implementation
BANK OF INDIA HEAD OFFICE INFOSEC CELL RFP for setting up a SOC, SIEM and Security Tools Implementation 16.12.2015 CORRIGENDUM 8 Request for Proposal (RFP) for setting up a Security Operations Centre (SOC),
More informationSub : ADDENDUM/CORRIGENDUM for Request for Proposal for Providing Managed Networking Solutions using SDWAN Technology for ESIC Offices across India
EMPLOYEES STATE INSURANCE CORPORATION ESIC Hqrs. Extension office, Express Building, BSZ Marg, Ground Floor, New Delhi-02 VOIP No. 10011008/10011048 PH: 011-23701356, email: ac_icthq@esic.nic.in F. No.
More informationCORRIGENDUM. REQUEST FOR PROPOSAL FOR Supply, Installation and Maintenance of Appliance based SMS Gateway Solution DATE:
CORRIGENDUM REQUEST FOR PROPOSAL FOR Supply, Installation and Maintenance of Appliance based SMS Gateway Solution DATE: 02.12.2017 Ref: SBI/GITC/Platform Engineering-II/2017/2018/445 dated: 22/11/2017
More informationDENA BANK INFORMATION TECHNOLOGY DEPARTMENT, HO, MUMBAI.
Replies to Queries during the Pre-bid meeting held on 12 th May, 2015 for Tender Managed Security Services [Tender Ref: HO/ITD/206/2015 Dated 06/05/2015]. Sr. No. RFP Reference No. Query Clarification/
More informationJuniper Sky Advanced Threat Prevention
Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services
More informationJUNIPER SKY ADVANCED THREAT PREVENTION
Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX
More informationSurat Smart City Development Ltd. Surat Municipal Corporation 1
Surat Smart City Development Ltd. Surat Municipal Corporation 1 Surat Smart City Development Limited (SSCDL) ADDENDUM AND CORRIGENDUM-1 Name of the work: - [SSCDL-Network-01-2018] The Bidders are requested
More informationIDBI BANK LIMITED IDBI TOWER, WTC COMPLEX, CUFFE PARADE MUMBAI
IDBI BANK LIMITED IDBI TOWER, WTC COMPLEX, CUFFE PARADE MUMBAI 400 005 Invitation for EXPRESSION OF INTEREST (EOI) From Telecom Service Providers For MPLS Network Connectivity in India Address communication
More informationTender 10/ dated Reply to Pre-bid Queries
Compliance Queries Suggested changes Reply Please specify if this is mandatory or Optional? 1 27/6.2 System should have capability to integrate with new/forthcoming network technologies such as it should
More informationCORRIGENDUM / AMENDMENT-1 TO REQUEST FOR PROPOSAL FOR REPLACEMENT OF OLD INTEL SERVERS
CORRIGENDUM / AMENDMENT-1 Dated: 25 Sep 2017 With reference to the query received from vendors (bidders), following are the amendments to the RFP Reference No. IT-07/2017-18 dated 08/09/2017 RFP DOCUMENT
More informationMcAfee Advanced Threat Defense
Advanced Threat Defense Detect advanced malware Advanced Threat Defense enables organizations to detect advanced, evasive malware and convert threat information into immediate action and protection. Unlike
More informationADMINISTRATION DEPARTMENT TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS TOTAL SECURITTY FOR BUSINESS LICENSES FOR USE AT NIT KARACHI
1 ADMINISTRATION DEPARTMENT Admn. 24(42-C)/03/2018 Date: December 21, 2018 TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS TOTAL SECURITTY FOR BUSINESS LICENSES FOR USE AT NIT KARACHI National Investment
More informationCLARIFICATION/AMENDMENTS REQUEST FOR PROPOSAL (RFP) FOR SUPPLY, IMPLEMENTATION AND MAINTENANCE OF SOLUTION
RFP Number: InfoTech Project SEWA 2015/Email/29.10.2015 Date: 19.11.2015 CLARIFICATION/AMENDMENTS REQUEST FOR PROPOSAL (RFP) FOR SUPPLY, IMPLEMENTATION AND MAINTENANCE OF EMAIL SOLUTION Agriculture Insurance
More informationNovember 1, 2018, RP Provision of Managed Security Services on an Annual Contract ADDENDUM #2
November 1, 2018, RP029-18 Provision of Managed Security Services on an Annual Contract ADDENDUM #2 Please see the below summation of the technical questions and answers that have been received regarding
More informationThe Institute of Cost Accountants of India. Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi.
The Institute of Cost Accountants of India Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi Tender Document Table of Contents Chapter Description Page No. 1 Notice
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series
HUAWEI TECHNOLOGIES CO., LTD. Huawei 6000 series Huawei 6000 series can detect APT (Advanced Persistent Threat) attacks, which altogether exploit multiple techniques (including zero-day vulnerabilities
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationODISHA GRAMYA BANK Information Technology Department Head Office, Gandamunda, P.O.-Khandagiri, Bhubaneswar
ODISHA GRAMYA BANK Information Technology Department Head Office, Gandamunda, P.O.-Khandagiri, Bhubaneswar RFP Ref. No. OGB/RFP/ITD/HARDWARE/002/2018-19, Amendment_1 Date: 04-05-2018 AMENDMENT_1: REQUEST
More informationFile Policies and AMP for Firepower
The following topics provide an overview of file control, file policies, file rules, AMP cloud connections, and dynamic analysis connections. About, page 1 File Control and Cisco AMP Basics, page 2 File
More informationCisco Advanced Malware Protection for Networks
Data Sheet Cisco Advanced Malware Protection for Networks Product Overview Fighting malware effectively today requires new approaches, strategies, and technologies. Cisco Advanced Malware Protection (AMP)
More informationInstitute of Physics (An autonomous Research Institute of Dept. of Atomic Energy, Govt. of India) P.O: Sainik School, Bhubaneswar, Orissa ,
NOTE 1. LAST DATE OF RECEIPT OF SEALED QUOTATIONS : EXTENDED TILL 3 PM OF 03.01.2011 2. COMMERCIAL TERM AND CONDITIONS IS MODIFIED 3. TECHNICAL SPECIFICATION FOR BACKUP DEVICE FOR SERVER IS MODIFIED 4.
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationCisco Advanced Malware Protection for Networks
Data Sheet Cisco Advanced Malware Protection for Networks Product Overview Fighting malware effectively today requires new approaches, strategies, and technologies. Cisco Advanced Malware Protection (AMP)
More informationProtection - Before, During And After Attack
Advanced Malware Protection for FirePOWER TM BENEFITS Continuous detection of malware - immediately and retrospectively Inline detection of sophisticated malware that evades traditional network protections
More informationTENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS LICENSES FOR USE AT NIT, KARACHI
1 TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS LICENSES FOR USE AT NIT, KARACHI 2 NATIONAL INVESTMENT TRUST LIMITED TABLE OF CONTENTS PAGE No 1. INTRODUCTION 3 2 SCOPE OF WORK 3 3 INFORMATION FOR
More informationRFP Page No. RFP Clause No. Sl.No.
CORRIGENDUM-I DATED 10.12.2018 RFP FORRATE CONTRACT FOR AMC AND FMS SERVICES OF VIDEO CONFERENCING EQUIPMENT (END-POINTS) AND MCU FOR OFFICES OF STATE BANK OF INDIA Ref: SBI/GITC/NW&C/18-19/540 dated :20/11/2018
More informationIDBI Bank Limited Corrigendum to the RFP For Procurement of Treasury PCs RFP ref. no: IDBI/PCELL/RFP/ /017 dated : 30-Oct-2015
RFP Page Section / Clause/Para 1 6 Document Control Sheet 2 6 Document Control Sheet Existing clause Schedule for Receipt of Bids: Date 23/11/2015 Time 16:00 hours Schedule for Opening of Technical Bids
More informationCORRIGENDUM. Corrigendum to RFP No. SBI/GITC/PMD/ /402 dated
CORRIGENDUM Corrigendum to RFP No. SBI/GITC/PMD/2017-18/402 dated 30.06.2017 For procurement of services for setting up Transformation Management Office (TMO) and for providing services to the Enterprise
More information: Administration of Symantec Endpoint Protection 14 Exam
250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks
More informationTERMS OF REFERENCE FOR THE APPOINTMENT OF A SERVICE PROVIDER FOR WEBSITE AND DOMAIN HOSTING SERVICES
TERMS OF REFERENCE FOR THE APPOINTMENT OF A SERVICE PROVIDER FOR WEBSITE AND DOMAIN HOSTING SERVICES 09 April 2018 1. Assignment: The National Lotteries Board requires the appointment of a service provider
More informationFile Policies and Advanced Malware Protection
The following topics provide an overview of file control, file policies, file rules, AMP cloud connections, and dynamic analysis connections. About, on page 1 File Control and Cisco AMP Basics, on page
More informationGLOBAL TENDER NOTICE NO.: 05/ Last date of receipt of the sealed quotations: Upto 3 P.M. of
Institute of Physics (An autonomous Research Institute of Dept. of Atomic Energy, Govt. of India) P.O: Sainik School, Bhubaneswar, Orissa- 751 005, India GLOBAL TENDER NOTICE NO.: 05/2010-2011 Last date
More informationLast Date of Submission : March 19, 2012 up to 3:00 p.m.
TENDER NO: JMI/CIT/202/4 LIMITED TENDER DOCUMENT Subject: Renewal of McAfee Antivirus and Procurement of Additional Licenses Jamia Millia Islamia intends to renew the existing Licenses of McAfee Antivirus
More informationTender Schedule No. Figure: Active-Active Cluster with RAC
Tender Schedule No SIBL-IT-2014-01- ORACLE_RAC_ADG Social Islami Bank Ltd is running Core Islami Banking Solution since 2009. Total no of Branches/Users is increasing per year. Now, Database Server Load
More informationPROCUREMENT, INSTALLATION, COMMISSIONING AND TESTING OF WI-FI SYSTEM OFC BACKBONE UPTO SWITCH AT SBIM, RAJARHAT CORRIGENDUM-VI DATED
PROCUREMENT, INSTALLATION, COMMISSIONING AND TESTING OF WI-FI SYSTEM OFC BACKBONE UPTO SWITCH AT SBIM, RAJARHAT SBI/ITS/KOL/2017-18/03 DATED 30.06.2017 CORRIGENDUM-VI DATED 17.07.2017 Sr Clause No Existing
More informationCisco IOS Inline Intrusion Prevention System (IPS)
Cisco IOS Inline Intrusion Prevention System (IPS) This data sheet provides an overview of the Cisco IOS Intrusion Prevention System (IPS) solution. Product Overview In today s business environment, network
More informationSecurity Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:
Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security
More information(A premier Public Sector Bank) Information Technology Division Head Office-Mangalore. Corrigendum 1 dated
(A premier Public Sector Bank) Information Technology Division Head Office-Mangalore. Corrigendum 1 dated 14.09.2017 No. 05/2017-18 dated 24.08.2017 for Empanelment, Supply & Installation of All-In-One
More informationNo: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE
OFFICE OF THE MISSION DIRECTOR, NATIONAL RURAL HEALTH MISSION, ASSAM Saikia Commercial Complex, G. S. Road, Christianbasti, Guwahati - 781005 Ph. 0361 2340236:: Fax 0361 2340238 Website : www.nrhmassam.in
More informationMerchant Certificate of Compliance
Merchant Certificate of Compliance Awarded To: Consolid S.R.L. (55504923) Self - Assessment Questionnaire Passed: SAQ D, v3.2r1.1 Date Awarded: 03/01/2018 Most Recent Scan Date: 06/04/2018 Certificate
More informationDriving Network Visibility
Flowmon Price List EUR Driving Network Visibility Flowmon Hardware Appliances... 2 Flowmon Virtual Appliances... 3 Flowmon Cloud... 3 Flowmon ADS Anomaly Detection System... 4 Flowmon DDoS Defender...
More informationLastline Breach Detection Platform
Lastline Breach Detection Platform Quickly and accurately detect, block and respond to active breaches in your network. Highlights Integrate with existing security systems through API to optimize IR workflows
More informationBuilding Resilience in a Digital Enterprise
Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.
More informationClarifications No. 1 to the Queries (Commercial/Technical) Received from the Bidders (13th August 2012)
Clarifications No. 1 to the Queries (Commercial/Technical) Received from the Bidders (13th August 2012) (Tender No. NDCL/28/068-69 for Supply, Delivery, Installation and Commissioning of Internet Traffic
More informationUnified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System
2115 YM Unified Networks Administration & Monitoring System 1. مواصفات نظام ادارة ومراقبة الشبكات الموحد: BOQ of Unified Networks Administration and Monitoring System: N 1 2 3 4 Item Main Network Monitoring
More informationCisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers
Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module (IPS AIM) and Network Module Enhanced
More informationNIP6000 Next-Generation Intrusion Prevention System
NIP6000 Next-Generation Intrusion Prevention System Thanks to the development of the cloud and mobile computing technologies, many enterprises currently allow their employees to use smart devices, such
More informationPre-Bid Queries for NIT No. RECPDCL/TECH/SERVER-GED/e-Tender/ /186 Dated:
S. No. Vendor Item 1 HTPGT Pre Qualifying criteria 20/3 Page No. / Clause No. Parameter Sucessful Projects execution 2 HTPGT EMD 3 EMD Amount 3 4 Technical Specifications as per RFP Queries / Modifications
More informationAmerican University of Madaba Information Technology Center Digital Signage General Information
General Information Objective Of This Rfp: This RFP (Request for Proposal) is issued as a request for the supply and installation of campus digital information display system for the American University
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationCisco Security Appliances
Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate
More informationBidding Document. Renewal and Maintenance Support of Intrusion Detection System / Intrusion Prevention System (IDS/IPS)
Bidding Document Renewal and Maintenance Support of Intrusion Detection System / Intrusion Prevention System (IDS/IPS) Last Date for Submission: Tender Opening Date: 23-01-2019 at 3:30PM 23-01-2019 at
More informationMonitoring the Device
The system includes dashboards and an Event Viewer that you can use to monitor the device and traffic that is passing through the device. Enable Logging to Obtain Traffic Statistics, page 1 Monitoring
More informationexam. Number: Passing Score: 800 Time Limit: 120 min File Version: CHECKPOINT
156-730.exam Number: 156-730 Passing Score: 800 Time Limit: 120 min File Version: 1.0 CHECKPOINT 156-730 Check Point Accredited Sandblast Administrator Version 1.0 Exam A QUESTION 1 Regarding a proper
More informationRSA ECAT DETECT, ANALYZE, RESPOND!
RSA ECAT DETECT, ANALYZE, RESPOND! Cyber Threat Landscape Attack surface (& attackers) expanding Web app Existing strategies & controls are failing Laptop EHR Firewall Attacks sophistication on the rise
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationUnderstanding Cisco Cybersecurity Fundamentals
210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco
More informationAnnexure E Technical Bid Format
Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security
More informationFireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.
Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which
More informationDesign and Deployment of SourceFire NGIPS and NGFWL
Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the
More informationQueries / Modifications / Changes Suggested
S. No. Vendor Item Page No. / Clause No. Pre-Bid Queries for NIT No. RECPDCL/TECH/IT Security-GED/e-Tender/2015-16/1518 Dated:04.09.2015 Rate Contract of Supply and installation of IT Security Solution
More informationSECURITY FOR SMALL BUSINESSES
SECURITY FOR SMALL BUSINESSES 2017 UNCOMPROMISING PERFORMANCE A common problem with firewalls used by small businesses has to do with hardware performance. Most often, vendor-stated bandwidth claims fall
More informationSecurity Section Indian Institute of Technology Kanpur
Notice inviting tenders for supply, installation, testing and commissioning of Central Storage for CCTV surveillance equipment at IIT Kanpur Security Section Indian Institute of Technology Kanpur भ रत
More informationCloud Sandboxing Against Advanced Persistent Attacks
CANTO 2017 Cloud Sandboxing Against Advanced Persistent Attacks Ric Leung Director of Product Management Huawei Technologies Co., Ltd. Traditional Defenses Are Ineffective Against Advanced Unknown Threats
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More informationRequest for Quotation (RFQ) BRAC Bank Limited
Request for Quotation (RFQ) BRAC Bank Limited BRAC Bank Limited has planned to upgrade their existing Enterprise Network Systems for new generation banking and better customer experience. The Quotation
More informationBehavior-Based IDS: StealthWatch Overview and Deployment Methodology
Behavior-Based IDS: Overview and Deployment Methodology Lancope 3155 Royal Drive, Building 100 Alpharetta, Georgia 30022 Phone: 770.225.6500 Fax: 770.225.6501 www.lancope.com techinfo@lancope.com Overview
More informationPlease note that your offer should be only in the enclosed format duly signed by the authorised signatory on each page along with seal of your firm.
Tender Enquiry No. : CDC/1k/17011/2009-10/02 dated 20 th July 2009 Item : Sealed Quotation for Computer Hardware and Software Due Date & Time : 28.7.2009, 16.00 Hrs Dear Sir, Consultancy Development Centre
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationRESPONSE TO QUERIES II
RESPONSE TO QUERIES II (Volume., Section, Page ) 1 Volume II: Scope of Work Electrical Works, Page no : 513 MSI shall be responsible to facilitate with provisioning of electricity to the cameras through
More informationSandboxing and the SOC
Sandboxing and the SOC Place McAfee Advanced Threat Defense at the center of your investigation workflow As you strive to further enable your security operations center (SOC), you want your analysts and
More informationWe re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.
COMPANY PROFILE We re Different Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. A Value-Added Distributor (VAD) with focus on end-to-end security product
More informationSub: Supply, Design, Customize, Installation Implementation, Hosting and Maintenance of IT System Solution for Navi Mumbai Municipal Schools.
To 13.01.2017 Date: Respective Bidders, Sub: Supply, Design, Customize, Installation Implementation, Hosting and Maintenance of IT System Solution for Navi Mumbai Municipal Schools. Ref: 1. Tender No:
More informationWild card SSL Certificate for Web Servers. Technical specification, Vendor Qualification criteria & General conditions
ANNEXURE-A Wild card SSL Certificate Technical specification, Vendor Qualification criteria & General conditions Technical specification Wild card SSL Certificate for main domain bheltry.co.in and multiple
More informationCisco Next Generation Firewall Services
Toronto,. CA May 30 th, 2013 Cisco Next Generation Firewall Services Eric Kostlan Cisco Technical Marketing 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Objectives At the
More informationCyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems
Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational
More informationSymantec Ransomware Protection
Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway
More informationGladiator Incident Alert
Gladiator Incident Alert Allen Eaves Sabastian Fazzino FINANCIAL PERFORMANCE RETAIL DELIVERY IMAGING PAYMENT SOLUTIONS INFORMATION SECURITY & RISK MANAGEMENT ONLINE & MOBILE 1 2016 Jack Henry & Associates,
More informationSpirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing
Data Sheet Spirent Avalanche Spirent s Avalanche Layer 4-7 testing solution provides capacity, security and performance testing for network infrastructures, cloud and virtual environments, Web application
More informationAutomated Response in Cyber Security SOC with Actionable Threat Intelligence
Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent
More information(Detailed Terms, Technical Specifications, and Bidding Format) This section describes the main objective to be achieved through this procurement.
ITEM:- Supply and Installation of Servers for Private Cloud Annexure Tender No: - 201601945 IIT Bombay is setting up a cloud to host important applications and data for a national project. The cloud is
More information45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all
Addendum / Corrigendum Dated 29/09/2017 Tender Ref No. - 236/387/DCCS/2010/IREDA/1 Dated: 22/09/2017 Name of Project - Supply Installation and Support Services of Data centers S. No. Document Reference
More informationCorrigendum: RFP by MAB IT Ops for procurement of SIM cards for use in PoS terminals RFP ref: SBI/GITC/MAB/2017/2018/418
Corrigendum: RFP by MAB IT Ops for procurement of SIM cards for use in PoS terminals RFP ref: SBI/GITC/MAB/2017/2018/418 Sr No Page of RFP 1 19 Award criteria-i, Clause Present clause / condition / criteria
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationReply to queries raised for Procurement of Bulk Services
1 2 3 4 3-3.2 (Eligibility Criteria for Bulk Email Services (OPEX Model) 3-3.3 (Eligibility Criteria for Bulk Email Services (OPEX Model) 4-4.2.3 (Scope of work for Bulk 4-4.2.4 (Scope of work for Bulk
More informationImplementing Cisco Cybersecurity Operations
210-255 Implementing Cisco Cybersecurity Operations NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-255 Exam on Implementing Cisco
More informationAddendum to RFP SSL/IT/RFP-004/ dated 28-March-2017
Addendum to RFP SSL/IT/RFP-00/0- dated -March-0 Revised RFP Submission date: th April 0, 00 Hours RFP is now open for all SBI empanelled and non-empanelled bidders. Additional Requirement: Bidders are
More informationein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec)
Next Gen Endpoint Protection ein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec) What is Next Gen Endpoint Protection? 2 DT Next Gen Endpoint Protection
More informationForeScout CounterACT. Configuration Guide. Version 2.2
ForeScout CounterACT Core Extensions Module: IOC Scanner Plugin Version 2.2 Table of Contents About the CounterACT IOC Scanner Plugin... 4 Use Cases... 5 Broaden the Scope and Capacity of Scanning Activities...
More informationCisco Advanced Malware Protection against WannaCry
Cisco Advanced Malware Protection against WannaCry "A false sense of security is worse than a true sense of insecurity" Senad Aruc Consulting Systems Engineer Advanced Threats Group Nils Roald Advanced
More informationNOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY. Addendum No. 1 issued September 7, RFI responses are in red bold print
DEDICATED TO THE HEALTH OF OUR COMMUNITY www.hcdpbc.org NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY Addendum No. 1 issued September 7, 2018 RFI responses are in red bold print How many public
More informationTHE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson
THE RSA NETWITNESS SUITE REINVENT YOUR SIEM Presented by: Walter Abeson 1 Reality Goals GOALS VERSUS REALITY OF SIEM 1.0 Single compliance & security interface Analyze & prioritize alerts across various
More informationTrend Micro and IBM Security QRadar SIEM
Trend Micro and IBM Security QRadar SIEM Ellen Knickle, PM QRadar Integrations Robert Tavares, VP IBM Strategic Partnership February 19, 2014 1 Agenda 1. Nature of the IBM Relationship with Trend Micro
More informationCheck Point DDoS Protector Introduction
Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods
More information1 Page No. 20, 21 & 22 Form factor. This should be read as 1U/2U Rack Mountable
Karnataka State Natural Disaster Monitoring Centre (Affiliated to Dept. of Science & Technology, Govt. of Karnataka) Pre-bid meeting held on 22.12.2009 Corrigendum RACK SERVERS, SAN Storage, TAPE library,
More informationViewing Capture ATP Status
Capture ATP Viewing Capture ATP Status Configuring Capture ATP Viewing Capture ATP Status Capture ATP > Status About the Chart About the Log Table Uploading a File for Analysis Viewing Threat Reports Capture
More informationDDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH
DDoS Protector Block Denial of Service attacks within seconds Simon Yu Senior Security Consultant CISSP-ISSAP, MBCS, CEH 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012
More information