STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.



Similar documents
Endpoint protection for physical and virtual desktops

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

BitDefender Client Security Workstation Security and Management

IBM Endpoint Manager for Core Protection

Test Report October InterScan Messaging Security Suite. Anti-Spam Technology Report

Endpoint protection for physical and virtual desktops

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Powerful and reliable virus and spam protection for your GMS installation

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

100% Malware-Free A Guaranteed Approach

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Quick Heal Exchange Protection 4.0

For Businesses with more than 25 seats.

AntiVirus and AntiSpam scanning The Axigen-Kaspersky solution

For Businesses with more than 25 seats.

for businesses with more than 25 seats

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business.

Symantec Protection Suite Add-On for Hosted and Web Security

Symantec Protection Suite Small Business Edition

Trend Micro Hosted Security Stop Spam. Save Time.

isheriff CLOUD SECURITY

avast! Business products 2012

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

Symantec AntiVirus Enterprise Edition

Proactive security IT body armor against business attacks WHITE PAPER

Advantages of Managed Security Services

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Integrated Protection for Systems. João Batista Territory Manager

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features

PC Security and Maintenance

SonicWALL Security Appliance

World-class security solutions for your business. Business Products. C a t a l o g u e

Symantec Protection Suite Small Business Edition

Trend Micro OfficeScan Best Practice Guide for Malware

Features Business Perspective.

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

ESET Security Solutions for Your Business

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

V1.4. Spambrella Continuity SaaS. August 2

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Get Started Guide - PC Tools Internet Security

Migration Project Plan for Cisco Cloud Security

Types of cyber-attacks. And how to prevent them

INTRODUCING isheriff CLOUD SECURITY

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

Limited Tender Document

For additional information and evaluation copies of Trend Micro products and services, visit our website at

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

The 7 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 15 th 2012

Mailwall Remote Features Tour Datasheet

Symantec Endpoint Protection

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Trend Micro Hosted Security Stop Spam. Save Time.

Symantec Protection Suite Small Business Edition

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec


Secure Your Mobile Workplace

Top 10 Features: Clearswift SECURE Gateway

Building a Business Case:

Advantages of Managed Security Services

Best Practice Configurations for OfficeScan (OSCE) 10.6

Mimecast Security

AVG AntiVirus. How does this benefit you?

TECHNOLOGY BRIEF: CA ANTI-VIRUS. Protecting Endpoint Systems Against Viral Malware

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

AVeS Cloud Security powered by SYMANTEC TM

Visendo Fax Server Solutions - Product Review

Kaspersky Internet Security 6.0 vs Microsoft Windows Live OneCare. Comparative Analysis

Modular Network Security. Tyler Carter, McAfee Network Security

WHITE PAPER. Understanding the Costs of Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

A progressive and integrated approach to protecting corporate networks

Achieve more with less

How To Protect Your Computer From A Malicious Virus

overview Enterprise Security Solutions

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

people-powered protection

Putting Web Threat Protection and Content Filtering in the Cloud

Top tips for improved network security

Stop Spam. Save Time.

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

Features and benefits guide for partners and their customers

Spyware: Securing gateway and endpoint against data theft

How To Protect Your Cloud From Attack

MXSweep Hosted Protection

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

Anti Spam Best Practices

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Transcription:

STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication & Information Technology, Govt. of India is interested in purchase / renewal of Antivirus Software. You are requested to give your quotes for supply of Antivirus Software in a sealed cover superscribing on it Quotation for supply of Antivirus software addressed to The Director, Software Technology Parks of India, No. 5, III floor, Rajiv Gandhi Salai, Taramani, Chennai 600 113. The quotes should reach this office on or before 12.07.08..No. Description Quantity Unit Rate Amount 01 As per Annexure - A The terms and conditions are as follows: 1. The validity of the quote must be atleast two months. 2. The rate of Excise duty and Sales Tax, Prevalent on the date of quotation, should be clearly indicted in the quotation itself. If these particulars are not provided, the quotation is liable for rejection. 3. If any sales tax is payable as extra to the quoted price it should be specifically stated in quotation alongwith CST No./TNGST No. 4. Tenders should be free from correction and erasures. Corrections if any, should be attested. 5. You are requested to offer the best and competitive price. 6. Payment will be made on receipt of goods in good condition. 7. The delivery should be made within the stipulated date mentioned in the PO 8. Liquidity damages will be applicable as per rules. 9. 10% Retention money will be kept for one year wherever applicable. 10. Tender shall be accompanied by an EMD of Rs. 2500/- in the form of DD favoring STPI-Chennai. Thanking you, Name: K.Sujatha Member Admin Support Staff Note: Please be ensured to subscribe Quote for Purchase of Anti Virus Software on the envelope, failing which the quote is liable for rejection.

Annexure-A SI.No Service 1. Spam Prevention Solution-gateway level anti spam & antivirus-one server 2. Client Server anti virus with Damage Cleanup Services-70 PCs 3. Anti virus for Windows & Linux servers -5 Servers 4. Installation / Maintenance Support Charges Remarks Details are given below Antivirus for Servers 1. Centralized management and reporting 1.1 This software shall provide centralized management of multiple servers in one site from a windows based console. 1.2 The console shall enable administrator to deploy programs and updates servers simultaneously and monitor server status in real time. 1.3 Administrators shall use a web-based console with control manager which shall offer centralized management of antivirus strategies deployed throughout a multiple-site network. 2. Reliable & Efficient Virus Protection 2.1 Rule based and pattern recognition technologies / patches shall be available for efficient virus detection. 2.2 The scan engine shall be certified by both the International Computer Security Association (ICSA) and Virus Bulletin (VB) for reliable scanning. 3. Support 3.1 The software shall provide outbreak prevention services and damage cleanup services to address mixed threat attacks. 4. 24x7 Antivirus Support is required 5. Supporting Corporate Antivirus Policies

5.1 The antivirus for Windows & open source based server shall offer comprehensive real-time protection for enterprise web-servers, file-servers, and mail server preventing them from spreading malware to internal or external endpoints. 5.2 Shall be designed to protect Windows & open source based server from inadvertently hosting viruses, Trojan horses, bots, and other malware. 5.3 The solution s stability and reliability is to be evidenced by certifications from all major Linux vendors, including Redhat, Novell, IBM, and Virus Bulletin. 6. Central Management: 6.1 This software shall enable central management of attack information, policy deployment, pattern file/ patches and scan engine deployment, and reports on policy implementation. 7. Easy to Install: 7.1 A web-based interface is needed to support multiple simultaneous remote installations as well as provision on central update and configuration that accelerate the rollout process on the broadest range of all relevant Operating system shall be given to use. 8. High Performance: 8.1. Real-time, on-demand, and scheduled scanning shall use the latest multi-threaded scanning engine for highest performance and kernel-level scanning to help minimize performance degradation. Client Server Antivirus Software 9. Client Server Antivirus Software 9.1 Client Server antivirus shall provide a defense against threats both on and off the corporate network combining anti-malware with innovative in-the-cloud protection. 9.2 The File Reputation shall move the burden of pattern file/ patches management into the cloud, freeing endpoint resources. 9.3 The Web Reputation shall protect endpoints by blocking access to malicious sites. 9.4 This software shall offer a single solution to protect desktops, laptops, servers, storage appliances. 9.5 A flexible plug-in architecture, virtualization, and extended platform support shall ensure better security, lower management costs, and more flexibility to evolve our security. 10. File reputation

10.1 Query up-to-the second data on the safety of a file before it s accessed. 10.2 Eliminate the management burden commonly associated with pattern based solutions. 10.3 Provide immediate protection for endpoints, on or off the corporate network. 10.4 Reduce the impact on the end point s performance and resources 11. Web Reputation 11.1. Defend against web-based malware, data theft, lost productivity, and reputation damage shall protect applications from accessing malicious or infected websites. 12. Superior Malware Protection 12.1. Deliver powerful protection against viruses, Trojans, worms, spyware, and new variants as they emerge. 12.2. Detect and remove active and hidden rootkits. Safeguard endpoint mail boxes by scanning incoming POP3 email and Outlook folders for threats. 12.3. Secure handling of removable media according to corporate policy using device control technology. 13. Ease-of-Management 13.1. Automatically clean endpoints of malware, including processes and registry entries that are hidden or locked. 13.2. Easily integrate with Active Directory to retrieve and synchronize information on endpoints and report on policy compliance. 13.3. Support native 64- and 32-bit processing for optimized performance. Enable centralized management with a single, web-based console 14. Comprehensive Security 14.1. Provide a complete endpoint security suite to protect all types of endpoints. 15. Spam prevention Solution Spam prevention Solution 15.1. Spam Prevention Solution shall offer a comprehensive approach to blocking spam and phishing with three distinct tiers of anti-spam protection. 15.2. Email Reputation shall offer global and dynamic reputation services and IP Profiler shall provide customer-specific reputation services and a firewall against

Directory Harvest Attack(DHA) and bounced mail attacks, keeping the majority of email threats completely off of the network. 15.3. The anti-spam composite engine shall provide the third tier, keeping all remaining spam and phishing emails out of the inbox with innovative techniques, such as patent-pending image spam detection. 16. Network Reputation Services 16.1. Network Reputation Services shall provide the initial tier of defense by stopping spam and phishing prior to entering the gateway before they can flood the network, overload mail gateway security, and burden IT resources. 16.2. The reputation services shall verify IP addresses of incoming email against the world s largest, most trusted reputation database, and use a dynamic reputation service to identify new spam and phishing sources, stopping even zombies and botnets as they first emerge. 17. IP Profiler 17.1. Patent-pending IP Profiler shall provide the second tier of protection with the specific reputation services and a firewall against DHA and bounced mail attacks. 17.2. Provision shall be given to fix the thresholds for spam, DHA, and bounced emails. If the emails received from an IP address exceed these thresholds, the IP address shall be blocked permanently or temporarily. 17.3. Network Reputation Services and IP Profiler shall keep email threats completely off of the network, securing the network and preserving bandwidth, storage, and other network resources. 18. Anti-Spam Composite Engine 18.1. The robust anti-spam composite engine shall provide the final tier of protection by filtering spam and phishing emails at the gateway through statistical analysis, advanced heuristics, signature filtering, whitelists, blacklists, and multi-lingual spam detection, catching any remaining threats before they reach the inbox. 18.2. The anti-spam composite engine shall include patent-pending image spam detection technology and other cutting-edge approaches to protect customers as spam and other threats evolve. 19. Anti-Phishing Security 19.1. Phishing emails are a unique threat and require targeted techniques to provide effective protection.

19.2. Spam Prevention Solution shall block IP addresses of known phishers, signatures of phishing emails, and heuristics specifically shall be aimed at phishing emails to provide an effective, combined approach against phishing emails. 19.3. Anti-phishing shall offer protection against identity theft and loss of confidential information of both corporation data and employee personal information. 20. Easy Management 20.1. Provision shall be given to Administrators set rules specific to spam and phishing emails. 20.2. The management tools shall provide the flexibility to customize spam tolerance settings, create approved and blocked sender lists, establish filter actions, and set policies for individuals or groups. 20.3. In addition, Web-based End User Quarantine and quarantine notification emails shall allow end users to manage their own spam and create personal whitelists. 20.4. Integrated reporting shall give a global view of spam and phishing activity, to tune settings and adjust policies for more accurate detection. 21. Gateway level anti-spam & anti virus 21.1.Gateway level anti-apam and anti virus shall protect STPI network by integrating antivirus with powerful anti-spam, and anti-phishing along with content filtering for compliance and data security. 21.2. This software solution shall be delivered on a single, highly scalable platform with centralized management for easy, comprehensive email security at the gateway. The features required are as follows: Consolidate email security onto one platform, simplifying administration Provide powerful anti-spam and anti-phishing, stopping most threats before they even reach the network. Stop malware at all phases of the outbreak with zero-day and pattern file/patches protection Guard against targeted spyware attacks sent in email Aid regulatory compliance and prevent data loss through content filtering Streamline management with a Web-based administrative console and an Enduser Quarantine