Terms of Reference
Endpoint Security Software License
Posted: November 29, 2011
 

Minimum Technical Specification Requirements for Antivirus

Endpoint Security and Control

  • Platform Supported: 95/98/NT/2000/XP/Win7/Server2003/Vista/Server2008/VMWare/ SX/Mac OS/Linux
  • Centralized management console for multiple operating systems: 95/98/NT/2000/XP/Server2003/Server2008/VMware ESX/OSX/Linux/Unix
  • Actionable security dashboard (can perform full scan, cleanup, remediation from console)
  • Full Active Directory integration for automatic deployment of endpoint agents
  • Centralized multiple platform updating
  • Targeted remote malware and PUA cleanup from console
  • Targeted remote PUA/Suspicious/Buffer Overflow Protection authorization
  • Rootkit detection and clean-up

Mobile Security

  • Anti-virus and anti-spyware protection for Windows Mobile smartphones and PDAs.

Client Firewall

  • Platform supported : 2000/XP/Vista/Windows 7
  • Provides stealth mode
  • Prevents application hijacking and checksum-based exclusion
  • Centrally Managed Firewall

Network Access Control

  • Platform supported : 2000/XP/Vista/Windows 7
  • Ensures endpoint security compliance (AV,Installed/updated, firewall, Windows Update) with Company policy and provides client and network-based enforcement
  • Control guest access to the network using DHCP enforcement
  • Network Access Control is part of endpoint license, not an add-on.

Application Control

  • Selectively authorize or block legitimate Applications that impact network bandwidth, Systems availability, and user productivity
  • Integrated in unified detection engine
  • Policy set in central management console
  • Allows different policies for different groups

Device Control

  • Control the use of removable storage, optical media drives and wireless networking devices
  • Easy authorization of allowed devices
  • Integrated in unified detection engine
  • Policy set in central management console
  • Allows different policies for different groups

Host Intrusion Prevention Systems (HIPS)

  • Guarding against unknown threats by analyzing Behavior before code executes (Genotype, etc.)
  • Stop zero-day threats with built-in HIPS
    • Behavioral Genotype® Protection
    • Suspicious Behaviour Detection
    • Buffer Overflow Protection

Runtime Protection

  • Monitor and block suspicious behavior like Registry or critical Windows system files modification
  • Protection against buffer-overflow

Live Protection

  • Block URLs that are hosting malware
  • Live in-the-cloud lookups check database of Millions of compromised sites
  • Constantly updating, 20-40,000 new sites Identified daily
  • Protects users everywhere, In the office, and when not behind corporate protection i, e at home or over public WiFi
  • Integrated into existing endpoint agent with no endpoint configuration required
  • Online scanning for malware (in the cloud)
  • Runtime HIPS/genotype/etc combination

Tamper protection

  • Prevents users from uninstalling the Anti-Virus, Auto update, client Firewall, Remote Management System and Disk Encryption on a Windows computer
  • Policy is configured within Enterprise Console
  • Requires password to be set for Protection can only be configured on the endpoint if:
    • The user has administration rights
    • The correct password is entered

Data Loss Protection

  • Control transfer of sensitive data
  • Integrated into endpoint agent
  • Pre-packaged data definitions

Enterprise Console

  • A single, automated console for Windows, Mac, UNIX and Linux that centrally deploys and manages: antivirus and client firewall protection; intrusion prevention; data, device, and application control; and endpoint assessment and control.
  • Implementation on Virtual Environment

Policy-based

  • Role-based administration privileges
  • Centralized policy cover updating schedules, Anti-virus and HIPS, client firewall, application, Device and data control and NAC

Active Directory synchronization

  • Automatic computer discovery and Synchronization with AD structure
  • Centralized policy cover updating schedules, anti-virus and HIPS, client firewall, application, Device and data control and NAC
  • Automatic installation of newly discovered

Failsafe updating

  • Multiple sources of update with automatic failover
  • Bandwidth throttling support for low-speed Network links

Reporting

  • Integrated graphical reporting delivers instant And scheduled email reports of threat alerts and Infections while the security dashboard gives you An at-a-glance report of outbreak risk

Support

  • Free 8 x 5 Standard Technical LOCAL Support
  • Free 8 x 5 Telephone Support
  • Free 8 x 5 Email Support
  • Free Quarterly Product Health Check
  • FREE Product updates and software upgrades

Inclusion:

  • Product Media Kit
  • Product Training & Management for two (2)
  • Product Installation and Configuration –

Delivery :

  • Delivery of license key/s, product media kit/s shall be made within 7-15 working days from receipt of Purchase Order and complete requirements

Term

  • Two (2) years

Number of users

  • Two Hundred (200) Users



CORAZON G. CORPUZ
Vice-Chairperson
Bids and Awards Committee