The vendor is required to provide to acquire a one-year license to an advanced breach detection solution leveraging, and dark web scanning to detect ransomware attacks and data breaches in real time.
- The solution needs to be able to monitor the public internet and dark web for the exposed credentials and sensitive data of employees, vendors, providers and partners.
- The solution will provide continuous monitoring that identifies threats, breaches and vulnerabilities in real time as well as being able to send automated alerts and customizable reports on demand.
- Software required capabilities and conditions:
• API interface to exchange data with existing security incident and event management (SIEM) platform such as unified security management anywhere (USMA).
• Active directory and Entra integration for forced credential resets.
• Support for the two latest versions of microsoft edge and google chrome browsers.
• Cloud-based console with centralized management and reporting dashboards.
• High availability (24x7x365) with a minimum of 99.9% uptime.
• At the time of bid submission, the vendor must provide a service organization control (SOC) 2 type 2 report pdf from cloud services stating the application/environment has been tested for the security, availability, processing integrity, confidentiality, and privacy of a system
• Ability to detail historical data breaches and historical ransomware attacks.
• Ability to add up to 150 unique third-party vendor domains for data breaches, attacks, and software vulnerabilities.
• A third party is a current vendor or business partner that agency is interested in obtaining breach-related data on.;
• Ability to run up to 93,750 queries against a searchable indexed database of leaked personally
identifiable information (PII) records on the internet or dark web.
- Dashboard and reporting:
• The solution must provide real-time leak records of first parties.
• The solution must provide on-demand and real time dark web scanning of first parties.
• Solution must provide ability to email relevant information obtained during scans of first parties.
• Solution must provide database of dark web records that is searchable on demand.
• Solution must provide database of dark web records updated in real time.
• Solution must provide real time breach monitoring, alerts and dark web scanning capabilities of third parties.
• Solution must provide real-time leak records of end user accounts.
• Solution must provide the ability to conduct dark web searches of county workforce members.
• Solution must provide exposure alerts of PII discovered on the dark web.
• Solution must provide automated customizable alerts to IT security teams by either software notification or email on demand.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.