The vendor is required to provide managed security protection services to deliver 24/7/365 cybersecurity monitoring, threat detection, and incident response services tailored to the unique requirements of the state’s critical public safety infrastructure.
- Motorola radio network infrastructure (RNI) cybersecurity monitoring
• Establish passive or low-impact telemetry collection to monitor traffic flows to and from Motorola RNI components.
• Detect and alert on unauthorized access attempts, segmentation boundary violations, and privilege escalation across Motorola and desc infrastructure.
• Provide visibility into Fortinet firewall rules, VPN tunnels, and access control mechanisms protecting the RNI without internet connectivity.
• Monitor traffic and segmentation boundaries across RNI components including Fortinet devices and land mobile radio (LMR)-specific infrastructure.
• Include continuous monitoring of connected partner RNI networks, specifically those operated by county’s, due to their direct connections into the statewide RNI.
• RNI partners should have access to and individualized monitoring console restricted to their networking environment.
• Participate in coordinated incident response with desc technical staff and Motorola ASTRO engineering personnel in accordance with documented escalation procedures.
- Infrastructure monitoring
• Monitor the multi-vendor infrastructure supporting network, focusing on cisco catalyst switches, firepower firewalls, and cisco ISE with pxGrid integration.
• Maintain full segmentation-aware visibility across virtual routing and forwarding (VRF) zones, including BTOP, network, and guest traffic.
• Detect configuration drift, unauthorized policy changes, and lateral movement attempts that may affect tenant isolation or operational continuity.
- Future partner expansion
• Allow flexible expansion of telemetry and monitoring to new public safety partners that integrate with network or the statewide RNI.
• Maintain consistent monitoring standards, alerting, and incident response protocols across expanded participants.
• Coordinate access control and visibility to ensure operational boundaries are preserved while enabling centralized threat oversight.
• Provide pricing that is valid for the life of the contract for future partners to participate in this solution.
- Mandatory Vendor Conference Date: September 19, 2025
- Vendor Conference: September 24, 2025
- Questions/Inquires Deadline: October 7, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.