:- IDBI /PCELL/ RFP/

Size: px
Start display at page:

Download ":- IDBI /PCELL/ RFP/"

Transcription

1 Sr. No RFP Page No Section / Clause/Para No Existing clause 1 6 Control Sheet Schedule for receipt of Bids: - 31 st March 2017 at 1600 Hrs. 2 6 Control Sheet Schedule for Opening of Technical Bids: 31 st March 2017 at 1630 Hrs. Modified/Revised clause Schedule for receipt of Bids: - 6 th April 2017 at 1600 Hrs. Schedule for Opening of Technical Bids : 6 th April 2017 at 1630 Hrs Eligibility Criteria The bidder should provide the list of clients for APT solution implemented during last two years up-to (Relevant PO / client confirmation mail or letter regarding successfully implementation of APT solution) Eligibility Criteria Delivery, Installation and Commissioning : period & Location Product licenses should be perpetual and AMC would be around 25-30%. Delivery and installation of APT solution will be at DC, Belapur & DR- Chennai within Eight weeks from the date of release of PO. Inspect SMTP, POP3, The OEM/Bidder should provide the list of clients for APT solution implemented during last two years up-to (Relevant PO / client confirmation mail or letter regarding successfully implementation of APT solution). Product licenses should be perpetual and AMC cost to decide by OEM/Bidder. Delivery and installation of APT solution will be at DC, Belapur & DR- Chennai within Twelve weeks from the date of release of PO. 5 27, 55 & Technical/Evaluation Inspect SMTP, POP3, IMAP Format II IMAP traffic traffic, FTP and SMB 6 27 & Additional Support of STIX / TAXII inclusion as Desirable for evaluation (Refer revised Technical Format I & II below) 7 Page no. 28, 56 & 96 Technical bid/ Evaluation bid part II Point no.17 A solution must support minimum 2X10 GB supported to Copper Gigabit Ethernet (GBE) and 4X10Gigabit Fiber (LC) interfaces The Solution should be able to handle and detect threats in a traffic of 6 GBPS Page 1 of 6

2 8 Page no. 56 Additional point for Scope of work 9 Page 56 Additional point for Scope of work 10 Page 57 - bb Scope of Work 11 Additional point for Technical specifications under section (3.1) Service Level Expectation OEM/ Bidder to provide hardware replacement within 3 days time if failed as part of RMA replacement policy. The bidder is required to adhere to the Service Level Agreements as mentioned below for the support phase. Time to Detect 10 to 15 minutes maximum inclusion as Critical TIME TO DELIVER - signature for new or zero day malware infection to be provided WITHIN minutes inclusion as Critical OEM/ Bidder to provide hardware replacement within 1 days time if failed as part of RMA replacement policy. The Tool or the vendor/bidder should have an Intelligence sharing network where Information learned from APT and advance malware threats can be shared across the vendor s customer base globally Please refer below revised SLA point no. 3.1 *Rest all terms & conditions as per RFP. Date: - 27 th March 2017 Place: - Mumbai Page 2 of 6

3 Sr Evaluation Parameter * TECHNICAL BID / EVALUATION FORMAT PART I The OEM/bidder must have implemented atleast two APT solution from the proposed OEM in a BFSI/ E-Commerce environment or at Banks with 100 branches/ offices globally The proposed APT solution Product features (Critical) The proposed APT solution Product features (Desirable) The bidder should have minimum 3 skilled OEM certified staff for APT solution The vendor/bidder must be Gold/Tier-1 or Silver/Tier-2 partner of the OEM for the proposed product. Approach, Methodology & Expertise ** (Presentation would be held) Sample reports to be submitted which would be evaluated). Minimum Requirement 2 BFSI/Ecommerce/Banks environment implementation Silver/Tier-2 partner Maximum Marks Details 2 implementations = 4 3 implementations = 5 4+ implementations = 7 Critical (Refer Part-II of Technical bid/evaluation Format) 2 marks to each. Desirable (Refer Part-II of Technical bid/evaluation Format) 1 marks to each Certified Staff =3 3+ Certified Staff = 4 4 Gold/Tier-1 partner = 4 Silver/Tier-2 partner = 3 Based on data submitted including (1) Project plan and Product details for all products/technology that 30 will be used in IDBI Environment. 2) Proposed process and formal presentation on the architecture for 1 hour Total 100 Qualifying Marks is 70 Attachments/Necessary documentary evidence/ proofs PO or Work order or Invoice Letter from client on client letter Head. / directly marked by the client to IDBI Product Brochures and any supporting documents clearly indicating the features Product Brochures and any supporting documents clearly indicating the features CV of resources along with certificates to be furnished. i. This evaluation will be carried out on a total score of 100 on the basis of the above evaluation parameters defined in this section. However, the detailed scoring mechanism is to be carried out as per Technical Bid Evaluation Criteria (Section 6). ii. The Bidders scoring a minimum of 70 marks based on the detailed evaluation in Technical Proposal Evaluation would be qualified and short listed for next Phase i.e Opening of Indicative Commercial Bid and ORA. iii. In Part II, bidder has to provide their compliance (Yes/No) for Critical & desirable specification. The same will also be evaluated for next phase commercial bid. Page 3 of 6

4 TECHNICAL BID / EVALUATION FORMAT PART II Sr. APT Gateways solution Critical Yes/No Desirable Yes/No 1 Automated Malware Analysis 2 Real-Time Threat detection 3 Solution should be deployed on premise and along with on premise sandboxing capability 4 5 Sandboxing capabilities of following Operating Systems (32 and 64 bit) : Win XP, Win7, Win8.x, Win10.x, Server 2008 R2, 2012 R2, Solution should be able to detect the persistent threats which come through executable files, PDF files, Flash files, RTF files, any type of file 6 Inspect SMTP, POP3, IMAP traffic, FTP and SMB 7 Inspect UDP traffic 8 Domain Fluxing ( Fast Fulx / Dynamic Reputation/ Domain Generation Algorithms) 9 Ransamware detection 10 C&C and Botnet detection using ANY protocol 11 Dormant threat detection capability 12 Suspected file collection and submission from Console. 13 Solution should be capable to integrate with devices like Firewall/IPS to mitigate risk by blocking similar session. (Checkpoint, Cisco) The solution should support discovery of infections via Ipv4 and Ipv6 Traffic Analysis Solution should integrate with SIEM technology specific to RSA SA (Security Analytics) v and above. Solution/appliance must have RAID redundancy (for hard drives), network redundancy (for management network interfaces), Power-Supply and Fan module redundancy. The Solution should be able to handle and detect threats in a traffic of 6 GBPS A solution should identify infections regardless of the host s Operating System and devices used (OSagnosticism) A solution should have Infections detection without sandbox features as well. Page 4 of 6

5 20 21 Solution should track the infection or threat history for a device, with the ability to access all forensic evidence for past infections. (6 months) A solution should support hostname resolution through either NetBios Lookup or reverse DNS. (Asset Identification) Sandboxing File type supports Multilevel Zip files (.doc,.xls,.ppt,.pdf,.exe,.zip,.rar,.tar,.gz,.tar.gz, 22.tgz,.zip,.bz2,.tar.bz2,.bz,.tar.Z,.cab,.rar,.arj,.exe,.dll,.avi,.mpeg,.mp3/4,.jpg, java script, JavaArchive JAR, LNK,.chm,.swf,.sys,.com,.hwp etc) 23 Support of STIX / TAXII 24 Sandboxing capabilities of following Operating Systems :- Linux, Unix and MAC OS, Android 25 Zero Day Malware Discovery 26 Malicious P2P Discovery 27 Inspect Proxy/ http traffic 28 Inspect DNS traffic 29 Inspect https traffic (Full Deep Packet / Encrypted Traffic Inspection) 30 Inspect Non-standard TCP port traffic Solution should be capable to integrate with 31 devices like Web proxy to mitigate risk by blocking similar session. Solution should be capable to integrate with 32 devices like Enterprise Antivirus product to mitigate risk by blocking similar threat by pushing hashes / signature. Solution should be able to support XFF (X- 33 Forwarded-For) to identify the IP Address of a host in a proxy/nat environment. 34 Solution should be able to Identify suspicious embedded object in document file like OLE & Macro extraction, Shell code& exploit matching Page 5 of 6

6 3.1 The bidder is required to adhere to the Service Level Agreements as mentioned below for the support phase. Sno. Service Area Service Level Penalty APT Gateway Solution Appliance /server Affected Onsite Visits next day for level 0 issues Penalty as XX% will be calculated yearly while Support Payments Webex session same day of issue for level 1 would be made annually issues Telephonic support at same time issue faced for level 2 issues. 1 >8 hrs. Level 0 0.5% 2 >4 hrs. Level 1 1.0% 3 >1 hrs. Level 2 1.5% Page 6 of 6

Seceon s Open Threat Management software

Seceon s Open Threat Management software Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real

More information

Corrigendum 3. Tender Number: 10/ dated

Corrigendum 3. Tender Number: 10/ dated (A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial

More information

Request for Proposal (RFP) for setting up a Security Operations Centre (SOC), SIEM and Security Tools Implementation

Request for Proposal (RFP) for setting up a Security Operations Centre (SOC), SIEM and Security Tools Implementation BANK OF INDIA HEAD OFFICE INFOSEC CELL RFP for setting up a SOC, SIEM and Security Tools Implementation 16.12.2015 CORRIGENDUM 8 Request for Proposal (RFP) for setting up a Security Operations Centre (SOC),

More information

Sub : ADDENDUM/CORRIGENDUM for Request for Proposal for Providing Managed Networking Solutions using SDWAN Technology for ESIC Offices across India

Sub : ADDENDUM/CORRIGENDUM for Request for Proposal for Providing Managed Networking Solutions using SDWAN Technology for ESIC Offices across India EMPLOYEES STATE INSURANCE CORPORATION ESIC Hqrs. Extension office, Express Building, BSZ Marg, Ground Floor, New Delhi-02 VOIP No. 10011008/10011048 PH: 011-23701356, email: ac_icthq@esic.nic.in F. No.

More information

CORRIGENDUM. REQUEST FOR PROPOSAL FOR Supply, Installation and Maintenance of Appliance based SMS Gateway Solution DATE:

CORRIGENDUM. REQUEST FOR PROPOSAL FOR Supply, Installation and Maintenance of Appliance based SMS Gateway Solution DATE: CORRIGENDUM REQUEST FOR PROPOSAL FOR Supply, Installation and Maintenance of Appliance based SMS Gateway Solution DATE: 02.12.2017 Ref: SBI/GITC/Platform Engineering-II/2017/2018/445 dated: 22/11/2017

More information

DENA BANK INFORMATION TECHNOLOGY DEPARTMENT, HO, MUMBAI.

DENA BANK INFORMATION TECHNOLOGY DEPARTMENT, HO, MUMBAI. Replies to Queries during the Pre-bid meeting held on 12 th May, 2015 for Tender Managed Security Services [Tender Ref: HO/ITD/206/2015 Dated 06/05/2015]. Sr. No. RFP Reference No. Query Clarification/

More information

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services

More information

JUNIPER SKY ADVANCED THREAT PREVENTION

JUNIPER SKY ADVANCED THREAT PREVENTION Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX

More information

Surat Smart City Development Ltd. Surat Municipal Corporation 1

Surat Smart City Development Ltd. Surat Municipal Corporation 1 Surat Smart City Development Ltd. Surat Municipal Corporation 1 Surat Smart City Development Limited (SSCDL) ADDENDUM AND CORRIGENDUM-1 Name of the work: - [SSCDL-Network-01-2018] The Bidders are requested

More information

IDBI BANK LIMITED IDBI TOWER, WTC COMPLEX, CUFFE PARADE MUMBAI

IDBI BANK LIMITED IDBI TOWER, WTC COMPLEX, CUFFE PARADE MUMBAI IDBI BANK LIMITED IDBI TOWER, WTC COMPLEX, CUFFE PARADE MUMBAI 400 005 Invitation for EXPRESSION OF INTEREST (EOI) From Telecom Service Providers For MPLS Network Connectivity in India Address communication

More information

Tender 10/ dated Reply to Pre-bid Queries

Tender 10/ dated Reply to Pre-bid Queries Compliance Queries Suggested changes Reply Please specify if this is mandatory or Optional? 1 27/6.2 System should have capability to integrate with new/forthcoming network technologies such as it should

More information

CORRIGENDUM / AMENDMENT-1 TO REQUEST FOR PROPOSAL FOR REPLACEMENT OF OLD INTEL SERVERS

CORRIGENDUM / AMENDMENT-1 TO REQUEST FOR PROPOSAL FOR REPLACEMENT OF OLD INTEL SERVERS CORRIGENDUM / AMENDMENT-1 Dated: 25 Sep 2017 With reference to the query received from vendors (bidders), following are the amendments to the RFP Reference No. IT-07/2017-18 dated 08/09/2017 RFP DOCUMENT

More information

McAfee Advanced Threat Defense

McAfee Advanced Threat Defense Advanced Threat Defense Detect advanced malware Advanced Threat Defense enables organizations to detect advanced, evasive malware and convert threat information into immediate action and protection. Unlike

More information

ADMINISTRATION DEPARTMENT TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS TOTAL SECURITTY FOR BUSINESS LICENSES FOR USE AT NIT KARACHI

ADMINISTRATION DEPARTMENT TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS TOTAL SECURITTY FOR BUSINESS LICENSES FOR USE AT NIT KARACHI 1 ADMINISTRATION DEPARTMENT Admn. 24(42-C)/03/2018 Date: December 21, 2018 TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS TOTAL SECURITTY FOR BUSINESS LICENSES FOR USE AT NIT KARACHI National Investment

More information

CLARIFICATION/AMENDMENTS REQUEST FOR PROPOSAL (RFP) FOR SUPPLY, IMPLEMENTATION AND MAINTENANCE OF SOLUTION

CLARIFICATION/AMENDMENTS REQUEST FOR PROPOSAL (RFP) FOR SUPPLY, IMPLEMENTATION AND MAINTENANCE OF  SOLUTION RFP Number: InfoTech Project SEWA 2015/Email/29.10.2015 Date: 19.11.2015 CLARIFICATION/AMENDMENTS REQUEST FOR PROPOSAL (RFP) FOR SUPPLY, IMPLEMENTATION AND MAINTENANCE OF EMAIL SOLUTION Agriculture Insurance

More information

November 1, 2018, RP Provision of Managed Security Services on an Annual Contract ADDENDUM #2

November 1, 2018, RP Provision of Managed Security Services on an Annual Contract ADDENDUM #2 November 1, 2018, RP029-18 Provision of Managed Security Services on an Annual Contract ADDENDUM #2 Please see the below summation of the technical questions and answers that have been received regarding

More information

The Institute of Cost Accountants of India. Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi.

The Institute of Cost Accountants of India. Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi. The Institute of Cost Accountants of India Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi Tender Document Table of Contents Chapter Description Page No. 1 Notice

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series

HUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series HUAWEI TECHNOLOGIES CO., LTD. Huawei 6000 series Huawei 6000 series can detect APT (Advanced Persistent Threat) attacks, which altogether exploit multiple techniques (including zero-day vulnerabilities

More information

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last

More information

ODISHA GRAMYA BANK Information Technology Department Head Office, Gandamunda, P.O.-Khandagiri, Bhubaneswar

ODISHA GRAMYA BANK Information Technology Department Head Office, Gandamunda, P.O.-Khandagiri, Bhubaneswar ODISHA GRAMYA BANK Information Technology Department Head Office, Gandamunda, P.O.-Khandagiri, Bhubaneswar RFP Ref. No. OGB/RFP/ITD/HARDWARE/002/2018-19, Amendment_1 Date: 04-05-2018 AMENDMENT_1: REQUEST

More information

File Policies and AMP for Firepower

File Policies and AMP for Firepower The following topics provide an overview of file control, file policies, file rules, AMP cloud connections, and dynamic analysis connections. About, page 1 File Control and Cisco AMP Basics, page 2 File

More information

Cisco Advanced Malware Protection for Networks

Cisco Advanced Malware Protection for Networks Data Sheet Cisco Advanced Malware Protection for Networks Product Overview Fighting malware effectively today requires new approaches, strategies, and technologies. Cisco Advanced Malware Protection (AMP)

More information

Institute of Physics (An autonomous Research Institute of Dept. of Atomic Energy, Govt. of India) P.O: Sainik School, Bhubaneswar, Orissa ,

Institute of Physics (An autonomous Research Institute of Dept. of Atomic Energy, Govt. of India) P.O: Sainik School, Bhubaneswar, Orissa , NOTE 1. LAST DATE OF RECEIPT OF SEALED QUOTATIONS : EXTENDED TILL 3 PM OF 03.01.2011 2. COMMERCIAL TERM AND CONDITIONS IS MODIFIED 3. TECHNICAL SPECIFICATION FOR BACKUP DEVICE FOR SERVER IS MODIFIED 4.

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Cisco Advanced Malware Protection for Networks

Cisco Advanced Malware Protection for Networks Data Sheet Cisco Advanced Malware Protection for Networks Product Overview Fighting malware effectively today requires new approaches, strategies, and technologies. Cisco Advanced Malware Protection (AMP)

More information

Protection - Before, During And After Attack

Protection - Before, During And After Attack Advanced Malware Protection for FirePOWER TM BENEFITS Continuous detection of malware - immediately and retrospectively Inline detection of sophisticated malware that evades traditional network protections

More information

TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS LICENSES FOR USE AT NIT, KARACHI

TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS LICENSES FOR USE AT NIT, KARACHI 1 TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS LICENSES FOR USE AT NIT, KARACHI 2 NATIONAL INVESTMENT TRUST LIMITED TABLE OF CONTENTS PAGE No 1. INTRODUCTION 3 2 SCOPE OF WORK 3 3 INFORMATION FOR

More information

RFP Page No. RFP Clause No. Sl.No.

RFP Page No. RFP Clause No. Sl.No. CORRIGENDUM-I DATED 10.12.2018 RFP FORRATE CONTRACT FOR AMC AND FMS SERVICES OF VIDEO CONFERENCING EQUIPMENT (END-POINTS) AND MCU FOR OFFICES OF STATE BANK OF INDIA Ref: SBI/GITC/NW&C/18-19/540 dated :20/11/2018

More information

IDBI Bank Limited Corrigendum to the RFP For Procurement of Treasury PCs RFP ref. no: IDBI/PCELL/RFP/ /017 dated : 30-Oct-2015

IDBI Bank Limited Corrigendum to the RFP For Procurement of Treasury PCs RFP ref. no: IDBI/PCELL/RFP/ /017 dated : 30-Oct-2015 RFP Page Section / Clause/Para 1 6 Document Control Sheet 2 6 Document Control Sheet Existing clause Schedule for Receipt of Bids: Date 23/11/2015 Time 16:00 hours Schedule for Opening of Technical Bids

More information

CORRIGENDUM. Corrigendum to RFP No. SBI/GITC/PMD/ /402 dated

CORRIGENDUM. Corrigendum to RFP No. SBI/GITC/PMD/ /402 dated CORRIGENDUM Corrigendum to RFP No. SBI/GITC/PMD/2017-18/402 dated 30.06.2017 For procurement of services for setting up Transformation Management Office (TMO) and for providing services to the Enterprise

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information

TERMS OF REFERENCE FOR THE APPOINTMENT OF A SERVICE PROVIDER FOR WEBSITE AND DOMAIN HOSTING SERVICES

TERMS OF REFERENCE FOR THE APPOINTMENT OF A SERVICE PROVIDER FOR WEBSITE AND DOMAIN HOSTING SERVICES TERMS OF REFERENCE FOR THE APPOINTMENT OF A SERVICE PROVIDER FOR WEBSITE AND DOMAIN HOSTING SERVICES 09 April 2018 1. Assignment: The National Lotteries Board requires the appointment of a service provider

More information

File Policies and Advanced Malware Protection

File Policies and Advanced Malware Protection The following topics provide an overview of file control, file policies, file rules, AMP cloud connections, and dynamic analysis connections. About, on page 1 File Control and Cisco AMP Basics, on page

More information

GLOBAL TENDER NOTICE NO.: 05/ Last date of receipt of the sealed quotations: Upto 3 P.M. of

GLOBAL TENDER NOTICE NO.: 05/ Last date of receipt of the sealed quotations: Upto 3 P.M. of Institute of Physics (An autonomous Research Institute of Dept. of Atomic Energy, Govt. of India) P.O: Sainik School, Bhubaneswar, Orissa- 751 005, India GLOBAL TENDER NOTICE NO.: 05/2010-2011 Last date

More information

Last Date of Submission : March 19, 2012 up to 3:00 p.m.

Last Date of Submission : March 19, 2012 up to 3:00 p.m. TENDER NO: JMI/CIT/202/4 LIMITED TENDER DOCUMENT Subject: Renewal of McAfee Antivirus and Procurement of Additional Licenses Jamia Millia Islamia intends to renew the existing Licenses of McAfee Antivirus

More information

Tender Schedule No. Figure: Active-Active Cluster with RAC

Tender Schedule No. Figure: Active-Active Cluster with RAC Tender Schedule No SIBL-IT-2014-01- ORACLE_RAC_ADG Social Islami Bank Ltd is running Core Islami Banking Solution since 2009. Total no of Branches/Users is increasing per year. Now, Database Server Load

More information

PROCUREMENT, INSTALLATION, COMMISSIONING AND TESTING OF WI-FI SYSTEM OFC BACKBONE UPTO SWITCH AT SBIM, RAJARHAT CORRIGENDUM-VI DATED

PROCUREMENT, INSTALLATION, COMMISSIONING AND TESTING OF WI-FI SYSTEM OFC BACKBONE UPTO SWITCH AT SBIM, RAJARHAT CORRIGENDUM-VI DATED PROCUREMENT, INSTALLATION, COMMISSIONING AND TESTING OF WI-FI SYSTEM OFC BACKBONE UPTO SWITCH AT SBIM, RAJARHAT SBI/ITS/KOL/2017-18/03 DATED 30.06.2017 CORRIGENDUM-VI DATED 17.07.2017 Sr Clause No Existing

More information

Cisco IOS Inline Intrusion Prevention System (IPS)

Cisco IOS Inline Intrusion Prevention System (IPS) Cisco IOS Inline Intrusion Prevention System (IPS) This data sheet provides an overview of the Cisco IOS Intrusion Prevention System (IPS) solution. Product Overview In today s business environment, network

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

(A premier Public Sector Bank) Information Technology Division Head Office-Mangalore. Corrigendum 1 dated

(A premier Public Sector Bank) Information Technology Division Head Office-Mangalore. Corrigendum 1 dated (A premier Public Sector Bank) Information Technology Division Head Office-Mangalore. Corrigendum 1 dated 14.09.2017 No. 05/2017-18 dated 24.08.2017 for Empanelment, Supply & Installation of All-In-One

More information

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE OFFICE OF THE MISSION DIRECTOR, NATIONAL RURAL HEALTH MISSION, ASSAM Saikia Commercial Complex, G. S. Road, Christianbasti, Guwahati - 781005 Ph. 0361 2340236:: Fax 0361 2340238 Website : www.nrhmassam.in

More information

Merchant Certificate of Compliance

Merchant Certificate of Compliance Merchant Certificate of Compliance Awarded To: Consolid S.R.L. (55504923) Self - Assessment Questionnaire Passed: SAQ D, v3.2r1.1 Date Awarded: 03/01/2018 Most Recent Scan Date: 06/04/2018 Certificate

More information

Driving Network Visibility

Driving Network Visibility Flowmon Price List EUR Driving Network Visibility Flowmon Hardware Appliances... 2 Flowmon Virtual Appliances... 3 Flowmon Cloud... 3 Flowmon ADS Anomaly Detection System... 4 Flowmon DDoS Defender...

More information

Lastline Breach Detection Platform

Lastline Breach Detection Platform Lastline Breach Detection Platform Quickly and accurately detect, block and respond to active breaches in your network. Highlights Integrate with existing security systems through API to optimize IR workflows

More information

Building Resilience in a Digital Enterprise

Building Resilience in a Digital Enterprise Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.

More information

Clarifications No. 1 to the Queries (Commercial/Technical) Received from the Bidders (13th August 2012)

Clarifications No. 1 to the Queries (Commercial/Technical) Received from the Bidders (13th August 2012) Clarifications No. 1 to the Queries (Commercial/Technical) Received from the Bidders (13th August 2012) (Tender No. NDCL/28/068-69 for Supply, Delivery, Installation and Commissioning of Internet Traffic

More information

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System 2115 YM Unified Networks Administration & Monitoring System 1. مواصفات نظام ادارة ومراقبة الشبكات الموحد: BOQ of Unified Networks Administration and Monitoring System: N 1 2 3 4 Item Main Network Monitoring

More information

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module (IPS AIM) and Network Module Enhanced

More information

NIP6000 Next-Generation Intrusion Prevention System

NIP6000 Next-Generation Intrusion Prevention System NIP6000 Next-Generation Intrusion Prevention System Thanks to the development of the cloud and mobile computing technologies, many enterprises currently allow their employees to use smart devices, such

More information

Pre-Bid Queries for NIT No. RECPDCL/TECH/SERVER-GED/e-Tender/ /186 Dated:

Pre-Bid Queries for NIT No. RECPDCL/TECH/SERVER-GED/e-Tender/ /186 Dated: S. No. Vendor Item 1 HTPGT Pre Qualifying criteria 20/3 Page No. / Clause No. Parameter Sucessful Projects execution 2 HTPGT EMD 3 EMD Amount 3 4 Technical Specifications as per RFP Queries / Modifications

More information

American University of Madaba Information Technology Center Digital Signage General Information

American University of Madaba Information Technology Center Digital Signage General Information General Information Objective Of This Rfp: This RFP (Request for Proposal) is issued as a request for the supply and installation of campus digital information display system for the American University

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service

More information

Cisco Security Appliances

Cisco  Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

Bidding Document. Renewal and Maintenance Support of Intrusion Detection System / Intrusion Prevention System (IDS/IPS)

Bidding Document. Renewal and Maintenance Support of Intrusion Detection System / Intrusion Prevention System (IDS/IPS) Bidding Document Renewal and Maintenance Support of Intrusion Detection System / Intrusion Prevention System (IDS/IPS) Last Date for Submission: Tender Opening Date: 23-01-2019 at 3:30PM 23-01-2019 at

More information

Monitoring the Device

Monitoring the Device The system includes dashboards and an Event Viewer that you can use to monitor the device and traffic that is passing through the device. Enable Logging to Obtain Traffic Statistics, page 1 Monitoring

More information

exam. Number: Passing Score: 800 Time Limit: 120 min File Version: CHECKPOINT

exam. Number: Passing Score: 800 Time Limit: 120 min File Version: CHECKPOINT 156-730.exam Number: 156-730 Passing Score: 800 Time Limit: 120 min File Version: 1.0 CHECKPOINT 156-730 Check Point Accredited Sandblast Administrator Version 1.0 Exam A QUESTION 1 Regarding a proper

More information

RSA ECAT DETECT, ANALYZE, RESPOND!

RSA ECAT DETECT, ANALYZE, RESPOND! RSA ECAT DETECT, ANALYZE, RESPOND! Cyber Threat Landscape Attack surface (& attackers) expanding Web app Existing strategies & controls are failing Laptop EHR Firewall Attacks sophistication on the rise

More information

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service

More information

Understanding Cisco Cybersecurity Fundamentals

Understanding Cisco Cybersecurity Fundamentals 210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco

More information

Annexure E Technical Bid Format

Annexure E Technical Bid Format Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Design and Deployment of SourceFire NGIPS and NGFWL

Design and Deployment of SourceFire NGIPS and NGFWL Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the

More information

Queries / Modifications / Changes Suggested

Queries / Modifications / Changes Suggested S. No. Vendor Item Page No. / Clause No. Pre-Bid Queries for NIT No. RECPDCL/TECH/IT Security-GED/e-Tender/2015-16/1518 Dated:04.09.2015 Rate Contract of Supply and installation of IT Security Solution

More information

SECURITY FOR SMALL BUSINESSES

SECURITY FOR SMALL BUSINESSES SECURITY FOR SMALL BUSINESSES 2017 UNCOMPROMISING PERFORMANCE A common problem with firewalls used by small businesses has to do with hardware performance. Most often, vendor-stated bandwidth claims fall

More information

Security Section Indian Institute of Technology Kanpur

Security Section Indian Institute of Technology Kanpur Notice inviting tenders for supply, installation, testing and commissioning of Central Storage for CCTV surveillance equipment at IIT Kanpur Security Section Indian Institute of Technology Kanpur भ रत

More information

Cloud Sandboxing Against Advanced Persistent Attacks

Cloud Sandboxing Against Advanced Persistent Attacks CANTO 2017 Cloud Sandboxing Against Advanced Persistent Attacks Ric Leung Director of Product Management Huawei Technologies Co., Ltd. Traditional Defenses Are Ineffective Against Advanced Unknown Threats

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

Request for Quotation (RFQ) BRAC Bank Limited

Request for Quotation (RFQ) BRAC Bank Limited Request for Quotation (RFQ) BRAC Bank Limited BRAC Bank Limited has planned to upgrade their existing Enterprise Network Systems for new generation banking and better customer experience. The Quotation

More information

Behavior-Based IDS: StealthWatch Overview and Deployment Methodology

Behavior-Based IDS: StealthWatch Overview and Deployment Methodology Behavior-Based IDS: Overview and Deployment Methodology Lancope 3155 Royal Drive, Building 100 Alpharetta, Georgia 30022 Phone: 770.225.6500 Fax: 770.225.6501 www.lancope.com techinfo@lancope.com Overview

More information

Please note that your offer should be only in the enclosed format duly signed by the authorised signatory on each page along with seal of your firm.

Please note that your offer should be only in the enclosed format duly signed by the authorised signatory on each page along with seal of your firm. Tender Enquiry No. : CDC/1k/17011/2009-10/02 dated 20 th July 2009 Item : Sealed Quotation for Computer Hardware and Software Due Date & Time : 28.7.2009, 16.00 Hrs Dear Sir, Consultancy Development Centre

More information

Venusense UTM Introduction

Venusense UTM Introduction Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,

More information

RESPONSE TO QUERIES II

RESPONSE TO QUERIES II RESPONSE TO QUERIES II (Volume., Section, Page ) 1 Volume II: Scope of Work Electrical Works, Page no : 513 MSI shall be responsible to facilitate with provisioning of electricity to the cameras through

More information

Sandboxing and the SOC

Sandboxing and the SOC Sandboxing and the SOC Place McAfee Advanced Threat Defense at the center of your investigation workflow As you strive to further enable your security operations center (SOC), you want your analysts and

More information

We re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.

We re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. COMPANY PROFILE We re Different Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. A Value-Added Distributor (VAD) with focus on end-to-end security product

More information

Sub: Supply, Design, Customize, Installation Implementation, Hosting and Maintenance of IT System Solution for Navi Mumbai Municipal Schools.

Sub: Supply, Design, Customize, Installation Implementation, Hosting and Maintenance of IT System Solution for Navi Mumbai Municipal Schools. To 13.01.2017 Date: Respective Bidders, Sub: Supply, Design, Customize, Installation Implementation, Hosting and Maintenance of IT System Solution for Navi Mumbai Municipal Schools. Ref: 1. Tender No:

More information

Wild card SSL Certificate for Web Servers. Technical specification, Vendor Qualification criteria & General conditions

Wild card SSL Certificate for Web Servers. Technical specification, Vendor Qualification criteria & General conditions ANNEXURE-A Wild card SSL Certificate Technical specification, Vendor Qualification criteria & General conditions Technical specification Wild card SSL Certificate for main domain bheltry.co.in and multiple

More information

Cisco Next Generation Firewall Services

Cisco Next Generation Firewall Services Toronto,. CA May 30 th, 2013 Cisco Next Generation Firewall Services Eric Kostlan Cisco Technical Marketing 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Objectives At the

More information

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational

More information

Symantec Ransomware Protection

Symantec Ransomware Protection Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway

More information

Gladiator Incident Alert

Gladiator Incident Alert Gladiator Incident Alert Allen Eaves Sabastian Fazzino FINANCIAL PERFORMANCE RETAIL DELIVERY IMAGING PAYMENT SOLUTIONS INFORMATION SECURITY & RISK MANAGEMENT ONLINE & MOBILE 1 2016 Jack Henry & Associates,

More information

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing Data Sheet Spirent Avalanche Spirent s Avalanche Layer 4-7 testing solution provides capacity, security and performance testing for network infrastructures, cloud and virtual environments, Web application

More information

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Automated Response in Cyber Security SOC with Actionable Threat Intelligence Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent

More information

(Detailed Terms, Technical Specifications, and Bidding Format) This section describes the main objective to be achieved through this procurement.

(Detailed Terms, Technical Specifications, and Bidding Format) This section describes the main objective to be achieved through this procurement. ITEM:- Supply and Installation of Servers for Private Cloud Annexure Tender No: - 201601945 IIT Bombay is setting up a cloud to host important applications and data for a national project. The cloud is

More information

45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all

45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all Addendum / Corrigendum Dated 29/09/2017 Tender Ref No. - 236/387/DCCS/2010/IREDA/1 Dated: 22/09/2017 Name of Project - Supply Installation and Support Services of Data centers S. No. Document Reference

More information

Corrigendum: RFP by MAB IT Ops for procurement of SIM cards for use in PoS terminals RFP ref: SBI/GITC/MAB/2017/2018/418

Corrigendum: RFP by MAB IT Ops for procurement of SIM cards for use in PoS terminals RFP ref: SBI/GITC/MAB/2017/2018/418 Corrigendum: RFP by MAB IT Ops for procurement of SIM cards for use in PoS terminals RFP ref: SBI/GITC/MAB/2017/2018/418 Sr No Page of RFP 1 19 Award criteria-i, Clause Present clause / condition / criteria

More information

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider

More information

Reply to queries raised for Procurement of Bulk Services

Reply to queries raised for Procurement of Bulk  Services 1 2 3 4 3-3.2 (Eligibility Criteria for Bulk Email Services (OPEX Model) 3-3.3 (Eligibility Criteria for Bulk Email Services (OPEX Model) 4-4.2.3 (Scope of work for Bulk 4-4.2.4 (Scope of work for Bulk

More information

Implementing Cisco Cybersecurity Operations

Implementing Cisco Cybersecurity Operations 210-255 Implementing Cisco Cybersecurity Operations NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-255 Exam on Implementing Cisco

More information

Addendum to RFP SSL/IT/RFP-004/ dated 28-March-2017

Addendum to RFP SSL/IT/RFP-004/ dated 28-March-2017 Addendum to RFP SSL/IT/RFP-00/0- dated -March-0 Revised RFP Submission date: th April 0, 00 Hours RFP is now open for all SBI empanelled and non-empanelled bidders. Additional Requirement: Bidders are

More information

ein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec)

ein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec) Next Gen Endpoint Protection ein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec) What is Next Gen Endpoint Protection? 2 DT Next Gen Endpoint Protection

More information

ForeScout CounterACT. Configuration Guide. Version 2.2

ForeScout CounterACT. Configuration Guide. Version 2.2 ForeScout CounterACT Core Extensions Module: IOC Scanner Plugin Version 2.2 Table of Contents About the CounterACT IOC Scanner Plugin... 4 Use Cases... 5 Broaden the Scope and Capacity of Scanning Activities...

More information

Cisco Advanced Malware Protection against WannaCry

Cisco Advanced Malware Protection against WannaCry Cisco Advanced Malware Protection against WannaCry "A false sense of security is worse than a true sense of insecurity" Senad Aruc Consulting Systems Engineer Advanced Threats Group Nils Roald Advanced

More information

NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY. Addendum No. 1 issued September 7, RFI responses are in red bold print

NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY. Addendum No. 1 issued September 7, RFI responses are in red bold print DEDICATED TO THE HEALTH OF OUR COMMUNITY www.hcdpbc.org NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY Addendum No. 1 issued September 7, 2018 RFI responses are in red bold print How many public

More information

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson THE RSA NETWITNESS SUITE REINVENT YOUR SIEM Presented by: Walter Abeson 1 Reality Goals GOALS VERSUS REALITY OF SIEM 1.0 Single compliance & security interface Analyze & prioritize alerts across various

More information

Trend Micro and IBM Security QRadar SIEM

Trend Micro and IBM Security QRadar SIEM Trend Micro and IBM Security QRadar SIEM Ellen Knickle, PM QRadar Integrations Robert Tavares, VP IBM Strategic Partnership February 19, 2014 1 Agenda 1. Nature of the IBM Relationship with Trend Micro

More information

Check Point DDoS Protector Introduction

Check Point DDoS Protector Introduction Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods

More information

1 Page No. 20, 21 & 22 Form factor. This should be read as 1U/2U Rack Mountable

1 Page No. 20, 21 & 22 Form factor. This should be read as 1U/2U Rack Mountable Karnataka State Natural Disaster Monitoring Centre (Affiliated to Dept. of Science & Technology, Govt. of Karnataka) Pre-bid meeting held on 22.12.2009 Corrigendum RACK SERVERS, SAN Storage, TAPE library,

More information

Viewing Capture ATP Status

Viewing Capture ATP Status Capture ATP Viewing Capture ATP Status Configuring Capture ATP Viewing Capture ATP Status Capture ATP > Status About the Chart About the Log Table Uploading a File for Analysis Viewing Threat Reports Capture

More information

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH DDoS Protector Block Denial of Service attacks within seconds Simon Yu Senior Security Consultant CISSP-ISSAP, MBCS, CEH 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012

More information