|
Home >> Invitation to Submit Proposal >> Endpoint Security Software License >> Terms of Reference |
|
|
Terms of Reference Endpoint Security Software License
Posted: November 29, 2011
|
|
Minimum Technical Specification Requirements for Antivirus
Endpoint Security and Control
- Platform Supported: 95/98/NT/2000/XP/Win7/Server2003/Vista/Server2008/VMWare/ SX/Mac OS/Linux
- Centralized management console for multiple operating systems: 95/98/NT/2000/XP/Server2003/Server2008/VMware ESX/OSX/Linux/Unix
- Actionable security dashboard (can perform full scan, cleanup, remediation from console)
- Full Active Directory integration for automatic deployment of endpoint agents
- Centralized multiple platform updating
- Targeted remote malware and PUA cleanup from console
- Targeted remote PUA/Suspicious/Buffer Overflow Protection authorization
- Rootkit detection and clean-up
Mobile Security
- Anti-virus and anti-spyware protection for Windows Mobile smartphones and PDAs.
Client Firewall
- Platform supported : 2000/XP/Vista/Windows 7
- Provides stealth mode
- Prevents application hijacking and checksum-based exclusion
- Centrally Managed Firewall
Network Access Control
- Platform supported : 2000/XP/Vista/Windows 7
- Ensures endpoint security compliance (AV,Installed/updated, firewall, Windows Update) with Company policy and provides client and network-based enforcement
- Control guest access to the network using DHCP enforcement
- Network Access Control is part of endpoint license, not an add-on.
Application Control
- Selectively authorize or block legitimate Applications that impact network bandwidth, Systems availability, and user productivity
- Integrated in unified detection engine
- Policy set in central management console
- Allows different policies for different groups
Device Control
- Control the use of removable storage, optical media drives and wireless networking devices
- Easy authorization of allowed devices
- Integrated in unified detection engine
- Policy set in central management console
- Allows different policies for different groups
Host Intrusion Prevention Systems (HIPS)
- Guarding against unknown threats by analyzing Behavior before code executes (Genotype, etc.)
- Stop zero-day threats with built-in HIPS
- Behavioral Genotype® Protection
- Suspicious Behaviour Detection
- Buffer Overflow Protection
Runtime Protection
- Monitor and block suspicious behavior like Registry or critical Windows system files modification
- Protection against buffer-overflow
Live Protection
- Block URLs that are hosting malware
- Live in-the-cloud lookups check database of Millions of compromised sites
- Constantly updating, 20-40,000 new sites Identified daily
- Protects users everywhere, In the office, and when not behind corporate protection i, e at home or over public WiFi
- Integrated into existing endpoint agent with no endpoint configuration required
- Online scanning for malware (in the cloud)
- Runtime HIPS/genotype/etc combination
Tamper protection
- Prevents users from uninstalling the Anti-Virus, Auto update, client Firewall, Remote Management System and Disk Encryption on a Windows computer
- Policy is configured within Enterprise Console
- Requires password to be set for Protection can only be configured on the endpoint if:
- The user has administration rights
- The correct password is entered
Data Loss Protection
- Control transfer of sensitive data
- Integrated into endpoint agent
- Pre-packaged data definitions
Enterprise Console
- A single, automated console for Windows, Mac, UNIX and Linux that centrally deploys and manages: antivirus and client firewall protection; intrusion prevention; data, device, and application control; and endpoint assessment and control.
- Implementation on Virtual Environment
Policy-based
- Role-based administration privileges
- Centralized policy cover updating schedules, Anti-virus and HIPS, client firewall, application, Device and data control and NAC
Active Directory synchronization
- Automatic computer discovery and Synchronization with AD structure
- Centralized policy cover updating schedules, anti-virus and HIPS, client firewall, application, Device and data control and NAC
- Automatic installation of newly discovered
Failsafe updating
- Multiple sources of update with automatic failover
- Bandwidth throttling support for low-speed Network links
Reporting
- Integrated graphical reporting delivers instant And scheduled email reports of threat alerts and Infections while the security dashboard gives you An at-a-glance report of outbreak risk
Support
- Free 8 x 5 Standard Technical LOCAL Support
- Free 8 x 5 Telephone Support
- Free 8 x 5 Email Support
- Free Quarterly Product Health Check
- FREE Product updates and software upgrades
Inclusion:
- Product Media Kit
- Product Training & Management for two (2)
- Product Installation and Configuration –
Delivery :
- Delivery of license key/s, product media kit/s shall be made within 7-15 working days from receipt of Purchase Order and complete requirements
Term
Number of users
CORAZON G. CORPUZ
Vice-Chairperson
Bids and Awards Committee
|
|
|
|