The vendor is required to provide cybersecurity equipment and services limited to: 1) endpoint protection, 2) identity protection and authentication, and 3) monitoring, detection, and response.
1. Endpoint protection
a. Endpoint detection and response (EDR) solution
• Inclusive of product updates, upgrades, virus definition updates, and technical support.
• Advanced threat protection for workstations and servers.
• Zero-trust security model enforcement.
• Centralized policy management and enforcement.
• Ai-powered malware, ransomware, and exploit prevention.
• Behavioral analysis for anomaly detection.
• Solution should include pre-attack surface reduction, attack prevention, and breach prevention.
• Response and remediation
2. Identity protection and authentication
a. Email security – spam guard & phishing protection
• Ai-based filtering for spam, phishing, and malware.
• Sandboxing for suspicious attachments and links.
• DMARC, DKIM, and SPF enforcement for email authentication.
• Real-time threat intelligence and adaptive filtering.
• URL rewriting and malicious link detection.
b. Active directory, email & file server auditing solution
• Real-time auditing of active directory (ad) changes, including user account modifications, group policy changes, and privilege escalations.
• File server auditing to track file and folder access, modifications, deletions, and permission changes.
• Automated alerts for suspicious activities, such as privilege abuse, unauthorized access.
• Detect and respond to active directory attacks identify unmanaged, or unknown, privileged accounts with constant scanning.
• Stop attackers moving laterally in your environment by disabling unnecessary accounts.
3. Monitoring, detection, and response
a. Penetration testing
• External and internal penetration testing to identify security gaps.
• Regular vulnerability scans and risk assessments.
• Wireless and network security scanning for vulnerabilities.
• Remediation plans with prioritized risk-based recommendations.
• Compliance validation for cybersecurity frameworks
• Comprehensive report with findings and mitigation strategies
b. Vulnerability scanning and management solution
• Vulnerability scanning for servers, workstations, and applications.
• Continuous asset discovery and risk prioritization.
• Capability to integration with SIEM, EDR, and patch management solutions.
c. Network detection and response (NDR) solution
• Ai-driven threat detection for network traffic anomalies.
• Autonomous response to mitigate threats in real-time.
• Lateral movement detection and data exfiltration monitoring.
• Deep packet inspection (dpi) for advanced threat analysis.
• Seamless integration with existing security infrastructure.
- Budget: $171,156.00.
- Contract Period/Term: 3 years
- Pre-Proposal Conference Date: June 03, 2025
- Questions/Inquires Deadline: June 13, 2025