Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF APRIL 14, 2010 FBO #3063
SOURCES SOUGHT

70 -- Anti-Virus/Malware Desktop Software Solution

Notice Date
4/12/2010
 
Notice Type
Sources Sought
 
NAICS
511210 — Software Publishers
 
Contracting Office
Social Security Administration, Office of Budget, Finance, and Management, Office of Acquisition and Grants, 1st Floor, Rear Entrance, 7111 Security Blvd., Baltimore, Maryland, 21244
 
ZIP Code
21244
 
Solicitation Number
SSA-SSS-10-MALWARE
 
Archive Date
5/11/2010
 
Point of Contact
Michael V. DeAngelis, Phone: 410-965-9543
 
E-Mail Address
Mike.DeAngelis@ssa.gov
(Mike.DeAngelis@ssa.gov)
 
Small Business Set-Aside
N/A
 
Description
The Social Security Administration (SSA) is seeking providers of software solutions for a desktop anti-virus, anti-malware solution for SSA's Windows network environment. The Anti-Virus/Malware desktop solution must be scalable to manage virus and malware detection in an enterprise environment consisting of 100,000+ Windows workstations and servers. The software product shall have these required features: 1. IPv6 compliant; 2. Section 508 compliant; 3. Compatible with both 32- and 64-bit operating systems; 4. Providing malware-removal tools; 5. Flexibility of policy administration, to include: a. Policy exclusion capability for managing executables that can be identified both as tool and as malware, e.g. Dameware; and, b. Policy exclusion capability by identifying directory/folder path.; 6. Reporting capabilities, to include: a. ad hoc; b. scheduled; and, c. emailed.; 7. Role-based administration privileges based on Active Directory (AD) Organizational Units, to include the following more granular functions: a. Ability to pull information/inventory from AD or Lightweight Directory Access Protocol (LDAP) servers at least every 24 hours; b. Ability to filter or tag data in order to separate the workstations into their respective region/subnet/Local Area Network (LAN) locations once the inventory is pulled from the AD/LDAP; c. Ability to provide effective means for managing machines, to include the following more granular functions: i. Use of system names of distribution servers, to allow for managing them per LAN/subnet group; and, ii. Use of wildcards, e.g. "*", for purposes of selecting specific groups of servers and workstations and locating specific systems.; d. Ability to apply separate policies to servers/workstations, to include using wild cards if possible; e. Ongoing maintenance mode, to include the following more granular functions: i. Ongoing ability to import AD/LDAP inventory; and, ii. Automated sorting of servers/workstations according to region/subnet/LAN specifications.; 8. Identification of managed machines versus unmanaged machines, e.g. a quick and user-friendly interface to aid in recognition of machines no longer connected to network; 9. Ability to run admin servers and report processing servers on virtual machines; 10. Comprehensive out of the box reporting, exportable to Comma Separated Values (CSV) file, HTML and PDF, with a minimum 90-day retention period; 11. Automatic enforcement of all policies; 12. Microsoft Systems Center Configuration Manager (SCCM) deployable updates (except signature files); 13. Scriptable creation of subnets, organization, policies and assignment of policies; 14. Configurable "Time to Die" option for scheduled jobs; the job shall stop at the configured time regardless of whether the job is completed; 15. Smooth migration path from Computer Associates Threat Manager r8.1; 16. Intuitive user interface with fast path option for management server; 17. Visual representation of the subnets where there are missed discoveries; 18. Visual representation of the organizational branches where the proxy machines have not been assigned or are not responding; 19. Microsoft SQL database including utilities to maintain and tune the database; 20. A configuration parameter to limit the size of the log folder; currently, logs can be configured to be retained for most recent "n" days; 21. Methods for controlling or phasing in signature files; 22. Automatic resetting of duplicate ID key that occurs when a replacement computer is cloned; 23. Ability to enable trace logging, where logs detail: policy, applied time, and results; 24. Options for both full and incremental scans; 25. Audit trail logging options that show who did what and when on the management servers; 26. Ability to restrict to particular policy and organization; 27. More granularity in configuring permissions; the current solution provides the following configurable options: "read", "change", "delete" and "full control", applicable to whole Threat Manager server; more granularity in configuring permissions is required; 28. Ability to copy a policy; 29. Ability to detect all machines added to network including, but not limited to, server rebuilds, laptops, re-imaged machines, and other computers; 30. Ability to manage virtual machines the same way physical computers are managed; 31. Maintenance including all upgrades, patches, fixes and enhancements and 24 x 7 telephone/online support; 32. Availability reports for both real-time and nightly scans for the most recent 24 hours; 33. Ability to utilize Wake on LAN (WOL) feature to initialize activities, such as malware detection scan, signature updates, etc., during non-production hours. Please provide examples of implementation scenarios; and, 34. Single software activation code to permit mass deployment. The software product may have these desired features: 1. Self healing capabilities of Client; the client should have all policies it receives from an authorized admin server in an encrypted file so that client will then enforce this policy on itself once in a predetermined time period; 2. Provision of option to configure admin server time or local time of the box; and, 3. High performance - less resource-intensive scans, e.g. using indexing or not scanning certain files unless they have changed since the most recently completed scan. This is not a request for quote/proposal, therefore SSA will not honor or respond to written and/or verbal requests for copies of a solicitation or other information related to this announcement. SSA will use this information in their assessment of capable sources. Interested sources that believe they have the capability to address SSA's requirements should submit a detailed statement of their capabilities to Michael DeAngelis, Contracting Officer, via email at Mike.DeAngelis@ssa.gov. Please reference SSA-SSS-10-MALWARE in the email subject line. Responses must be received by 12:00 pm EST on Monday, April 26, 2010.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/SSA/DCFIAM/OAG/SSA-SSS-10-MALWARE/listing.html)
 
Place of Performance
Address: Social Security Administration, Balttimore, Maryland, 21244, United States
Zip Code: 21244
 
Record
SN02119606-W 20100414/100412235043-7776e808d7dd66809d4d310b5391b3be (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.