Procurement Summary
Country: Philippines
Summary: Supply and Delivery of Eighty Seven (87) Renewal and Subscription of Anti-Virus Licenses
Deadline: 29 Aug 2019
Other Information
Notice Type: Tender
TOT Ref.No.: 35745040
Document Ref. No.: LLC-CAP-19-011
Financier: Self Financed
Purchaser Ownership: -
Tender Value: Refer Document
Purchaser's Detail
Name: Login to see tender_details
Address: Login to see tender_details
Email: Login to see tender_details
Login to see detailsTender Details
Supply and Delivery of Eighty Seven (87) Renewal and Subscription of Anti-Virus Licenses
FEATURES AND SPECIFICATIONS:
-c Delivers a multi-layer protection to all endpoint devices (laptop, desktop, server, smartphone and tablet) under a single, unified management console.
-c Security against: Software exploits, ransomware, mobile malware, advanced threats, fileless threats, powershell and script based attacks and web threats.
-c Features included: Anti-Malware, vulnerability assessment, security policy adviser, AI-based learning, AMSI support, encrypted traffic scanning, process isolation, exploit prevent and rollback, firewall and OS firewall management, cloud-assisted protection, integrated EDR agent, SIEM integration via Syslog, application control, web and device controls, server and containers protection, mobile threat defense and reporting.
-c Anti-Malware
- has multiple anti-malware engines - with the combination of the traditional Signature-based, heuristic, Cloud-Assisted scanning and Machine Learning technology - for superior scanning and detection capability.
- provides security for heterogeneous IT environment. It shall support a range of platforms - including Mac, Linux and Windows - Including the new Windows 10 and Windows Server 2016 operating system.
- Lightweight mode for Threat Protection (-œCloud mode-). Light antivirus databases with enabled KSN (require less RAM and drive space).
- provides protection against new and unknown malwares. It should have an urgent detection system that may help protect the system against new threats, even before the release of a new malware signature.
- protection against encryption for shared folders unique anti-cryptor mechanism capable of blocking encryption of files on the shared resources from the malicious process running on another machine on the same network.
- has Host-based Intrusion Prevention System (HIPS) and personal firewall that would protect against hacker attacks. It should be able to control inbound and outbound traffic setting up parameters for an individual port, IP address or application.
- has a Network Threat Blocker mechanism that detects and monitors suspicious activity on the network.
- auto-quarantine or auto-delete identified malwares without end-user interaction
- scan body text and attachments of incoming e-mail messages that are delivered through POP3 / IMAP mail clients.
- block malicious/phishing URLs.
- scan password protected compressed files for malicious programs
- has the option of single agent for EDR and EPP (Endpoint Protection) that can be activated via licensing option.
-c End-Point Controls
a. Application Control
- control application start up by blocking, granting or auditing each application upon launch.
- monitor and classify each application as trusted, untrusted or restricted.
- control whether an application is given access to specific system resources, such as the file system or the registry.
- do Blacklisting and Whitelisting technology.
- has a dynamic whitelisting service that assesses the security of commonly used applications. Whitelist database should be updated regularly and automatically to ensure up-to-date protection.
- Policy should be able to use user account-based profile on the active directory.
b. Device Control
- allow administrator to set policy and control to any connected device, on any connection bus (not only USB), at any time.
- support device management and shall allow administrator to monitor, block or make the device Read-Only along with the option of providing exceptions.
- block or allow devices based on specific serial number.
- generate logs of events associated with deleting and saving files on USB device.
- generate logs of list of trusted Wi-Fi networks, based on network name, encryption type, and authentication type.
- monitor information about write and removal operations performed with files located on removable drives.
- has Anti-Bridging capability which blocks unauthorized commuting between networks.
- policy should be able to use user a...
Closing Date : 2019-08-29
Documents
Tender Notice