Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF AUGUST 24, 2008 FBO #2463
SOLICITATION NOTICE

70 -- IT Security Software

Notice Date
8/22/2008
 
Notice Type
Presolicitation
 
NAICS
511210 — Software Publishers
 
Contracting Office
Department of the Interior, Bureau of Indian Affairs, BIA - DAPM, BIA Office of Acquisitions and Property Management, 2051 Mercator Dr., Reston, VA 20191
 
ZIP Code
20191
 
Solicitation Number
REQ007653
 
Response Due
8/26/2008
 
Archive Date
9/10/2008
 
Point of Contact
Meridith Potts 703-390-6348
 
Small Business Set-Aside
N/A
 
Description
The government intends on awarding a sole source acquisition to GTB Technologies for GTB Endpoint Protector sorfware and GTB Inspector Appliance.GTB Inspector is an appliance that sits at the edge of the network before the firewall. The Inspector scans any outbound transmission from the network for the presence of secure content. All transmissions from the network to the Internet over any protocol and port, even unknown protocols, can be monitored and/or blocked. The Inspector is independent of network protocols and is file format agnostic. It is an appliance based on Linux and contains a pre-installed Oracle database for stored fingerprinted data. GTB assumes support for the entire system The GTB Inspector supports all protocols on all ports (even unknown protocols). Since it inspects traffic in real-time, unlike others, it can block transmissions on any protocol without integrating a proxy server. However, for SSL, the GTB Inspector integrates with any ICAP client enabled system. Both systems act as an ICAP client to terminate SSL. Since the Inspector is also an MTA, it can either quarantine emails or reroute emails to a third party encryption server. GTB Endpoint Protector is a true 'content aware' system that extends the data loss prevention system beyond the enterprise's perimeter to the client endpoint.GTB provides two content detection engines: A) Content Fingerprinting (CF) B) Data Pattern (DP) A. Content Fingerprinting (CF) The CF engine supports SPII or PII content which resides in databases or in files (binary or text). The GTB engine uses a proprietary fingerprinting system which allows precise matching with zero false positives and with zero false negative rates. Partial file matching is also supported as well as file format conversion. The GTB system includes all TCP protocols. No additional hardware or modules are required. The engine performs deep packet scanning in real-time and supports all TCP protocols including HTTPS. All file formats are supported since the engine does not require prior knowledge of the file type during real-time scanning. Multi field rules policies are supported. For SPII or PII, the engine supports pre-defined multi-field rules and policies which insure only true events are triggered. B. Data Pattern Engine (DP) The Data Pattern engine uses regular expressions to define data objects. Rules for such objects with sensitivity threshold are defined to trigger events. Objects maybe defined based on regular expressions including key words, lexicons, etc. DEFINING AND COMBINING POLICIES AND RULES: Defined policies are based on Objects and Rules for those Objects similar to a firewall method. Objects are defined for Protocols and/or Sources and/or Destinations. Sources or Destinations are defined based on LDAP names, based on URLs or based on a range of IP addresses. GTB system can block (prevent) a transmission from leaving without needing additional hardware or modules. There is a separate setting for alerts and notifications. These can be set to alert specific manager(s) based on the policy. GTB ENDPOINT PROTECTOR GTBs Endpoint Protector is a data leakage protection solution addressing the growing problem of secure data leaving the organization through removable media devices such as memory sticks, CD/DVDs, or USB Drives. GTBs Endpoint Protector scans data for sensitive content before it is saved and then can block unauthorized transfers. The Endpoint Protector can also detect activities such as copy and paste, or use of sensitive data in an unapproved application, such as someone encrypting the data in an attempt to bypass the Endpoint Protectors block. Rather than restricting devices that connect to the network and passively auditing data transfers, the GTB Endpoint Protector offers organizations the ability to control what content can be transferred between the network and removable media devices. It provides complete access control addressing all USB, Firewire and all other removable media types, fully integrates with Active Directory/E-directory, manages detailed file auditing and offers both online and offline protection mode.
 
Web Link
FedBizOpps Complete View
(https://www.fbo.gov/?s=opportunity&mode=form&id=52c9e85304e7baddf617a9711877d0f9&tab=core&_cview=1)
 
Record
SN01648981-W 20080824/080822223244-52c9e85304e7baddf617a9711877d0f9 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  © 1994-2020, Loren Data Corp.