The Vendor is required to provide for cybersecurity equipment and services limited to: 1) endpoint protection, 2) identity protection and authentication, and 3) monitoring, detection, and response.
- Endpoint Protection and Response
1. Pre-Attack Surface Reduction, Breach Prevention and Response and Remediation to prevent full-blown data breaches before exfiltration can occur.
• Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices.
• Vulnerability Remediation
• Breach Assessment
• Contains device control which specifies block or allow policies on different types of devices that attach to client computers
• App Isolation and App Control which allows known “good” applications to run, shields applications to prevent attackers from exploiting vulnerabilities and isolates unknown applications.
2. Attack Prevention
• Must immediately and effectively protect against file-based and file less attack vectors and methods. Should implement machine learning and artificial intelligence use advanced device and cloud-based detection schemes to identify evolving threats across device types, operating systems, and applications.
• Malware Prevention
• Exploit prevention blocks memory-based zero-day exploits of vulnerabilities in popular software.
• Should include prevention that enables fine-grained tuning of the level of detection and blocking separately to optimize protection and gain enhanced visibility into suspicious files.
• Incorporates network connection security that identifies rouge Wi-Fi networks and delivers a policy-driven VPN to protect network connections and support compliance.
- Identity Protection and Authentication
1. Email Security – Spam Guard & Phishing Protection
• Identifies and blocks spam, viruses and malware delivered via email messages.
• Uses virus scanning, spam scoring, real-time intent analysis, URL link protection, reputation checks, and other techniques to scan email messages and files.
• Stops advanced threats.
• Blocks access to malicious URLs and attachments.
• Protects data from corruption and deletion with full cloud backup and recovery of every email and file.
• Keeps sensitive data safe with data leak prevention and encryption.
• Provides secure, tamper-proof cloud archiving of all incoming, outgoing, and internal emails to meet compliance, retention, and e-discovery requirements.
• Supports long-term retention policies, legal hold, and easy search and retrieval of cloud archived emails and attachments by authorized personnel.
2. Active Directory, Email & File Server Auditing Solution
• Secures your Active Directory from end to end, on premises and in the cloud, with a solution that addresses all the key functions of IT security: Identify, Protect, Detect, Respond and Recover.
• Detects all changes in your Active Directory and Group Policy and provides the critical who, what, when and where details and before and after values.
• Facilitates access control by reporting on both failed and successful attempts to log on to critical systems, as well as all ADFS logon attempts, and displaying the full logon history of any user.
• Shows the current state of your users and groups, their permissions in Active Directory, you’re GPOs and their settings, and more, so you can easily compare them to a known good baseline.
• Provides out-of-the-box reports aligned with controls from a wide range of standards, including institutes and more.
• Reports on changes to audit policy settings and other Group Policy modifications with full details and before and after values.
• Enable data owners to approve permissions and access requests instead of burdening your IT team with the optional access reviews module.
- Monitoring, Detection, and Response
1. Penetration Testing
• Identifies vulnerabilities in the current network environment and provides steps to address and mitigate.
• Provides internal and external testing to identify security gaps for both wireless and hardwired network.
• Provides a comprehensive report which documents findings and supports a framework for mitigation including strategy.
2. Vulnerability Scanning and Management Solution
• Provides around the clock vulnerability assessments.
• Automates point-in-time assessments to identify software flaws, missing patches, malware and misconfigurations across a variety of operating systems, devices and applications.
• Provides a variety of vulnerability scoring systems like CVSS v4, EPSS (or equivalent) to help implement effective vulnerability prioritization for remediation efforts.
• Provides advisory and guidance on the next steps to take with a resource center that can guide experienced and non-security staff.
• Contextualize threats, prioritize vulnerabilities, and optimizes response.
3. Network Detection and Response (NDR) Solution
• Identifies technologies and methodologies to detect and respond to suspicious activities and anomalies within network traffic.
• Continuous monitoring of traffic patterns, identifying potential threats, and enabling swift response measures.
• Uses techniques such as machine learning algorithms and behavioral analytics to analyze network traffic in real-time, which results in preventative and live threat detection, with targeted autonomous response to shut down and mitigate threat without disrupting school operations.
• Uses AI automation.
• Streamline incident response with AI automation, saving time and resources while ensuring minimal disruption to operations.
• Provides detection, investigation, and response.
• Identifies threat detection models and provides in depth comprehensive examples of the model(s) proposed.
- Contract Period/Term: 1 year
- Pre-Proposal Conference (Additional) Date: June 18, 2025
- Questions/Inquires Deadline: June 20, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.