Tender notice for supply, installation & configuration of Enterprise Antivirus solution



Similar documents
न शनल ट क सट इल क र प र शन ललल ट ड. 7, Lodhi Road, 7, ल ध र ड, New Delhi

Notice Inviting Open Tender. Tender Enquiry No. IDRBT/SYS/GR/13.10/878/ Dated: Oct 25, 2013

For providing Facility Management Services of IT Infrastructure at College of Engineering Pune

SOFTWARE TECHNOLOGY PARKS OF INDIA

Annual Maintenance Contract (AMC) of Computer/Printer/Server/Scanner/ Laptop/UPS etc. in the Ministry of Women and Child Development

4 Mbps Internet connectivity Leased Line (1:1 uncompressed and unshared) for National Small Industries Corporation Ltd, New Delhi for one year.

NOTICE INVINTING QUOTATION

ICWA/IT/AMC/872/21/2013 Dated: NOTICE INVITING TENDER

SPICES BOARD (Ministry of Commerce & Industry, Govt. of India) Palarivattom.P.O. N H By Pass Kochi

TENDER FOR. Supply, Installation, Commissioning and Maintenance of 04 Mbps Internet Leased Line at NSIC Head Office, Okhla, New Delhi for One Year.

Re-Tender. for. Supply and Installation of the. Student Biometric Attendance System. Indian Institute of Technology Jodhpur

INDIAN INSTITUTE OF TECHNOLOGY GANDHINAGAR

भ रत य गक स थ न र पड़

Oracle Financial Services Applications

Office of the Competition Commission of India Hindustan Times House, K.G. Marg, New Delhi

ANNEXURE - I MPD/EPC/TIC/ NR logo web application development dated: Page 1

SUPPLY AND INSTALLATION OF INTERNET BANDWIDTH SERVICES

TENDER DOCUMENTS FOR SUPPLY INSTALLATION AND COMMISSIONING OF BIOMETRIC DEVICE FOR FINGERPRINT ATTENDANCE SYSTEM

Tender document. for. Providing Managed Internet Leased Line Network. at Chandigarh Police Headquarters, Sector 9, Chandigarh

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Centre for Development of Imaging Technology (CDIT) Chithranjali Hills, Thirvallom PO, Thrivananthapuram (An Autonomous Body under Govt.

Development of application Software for Election Commission

TENDER FOR ANNUAL MAINTENANCE CONTRACT OF WEBSITEs OF O/O DIRECTORATE OF FILM FESTIVALS.

TENDER NOTICE NO. 04/

Ref No: / /91/IT/Dir/ Date: 02/02/2012.

Inviting Quotation for Internet Leased Line Connection

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015

Indian Institute of Technology, Kharagpur Kharagpur , WB, India

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Supply, Installation and maintenance of OCSP software

School of Open Learning University of Delhi

REQUEST FOR PROPOSAL SUPPLY, INSTALLATION AND CUSTOMIZATION OF HELPDESK SOFTWARE. Tender No. ECIL / CSD / dated

TENDER FOR. SUPPLY, INSTALLATION, TESTING & COMMISSIONING OF UTMs. Tender No. IT/ 01/IIMP/ 05/2015

School of Open Learning University of Delhi

INVITATION OF TENDERS

DIRECTORATE OF KNOWLEDGE MANAGEMENT IN AGRICULTURE (Indian Council of Agricultural Research) Krishi Anusandhan Bhavan, Pusa, New Delhi

Prof.& Head, Department of Computer Science & Engineering PEC University of Technology Chandigarh

Tender for development, upgradation of web based software application for Student Information System (SIS) INVITATION OF THE BID

Following terms and conditions may be kept in view while submitting the bids :-

Rajya Sabha Secretariat Rajya Sabha Television 12 A, Gurudwara Rakab Ganj Road, New Delhi TENDER NOTICE FOR INTERNET CONNECTIVITY

Request For Quotation from Service Providers. for. Web Security & Performance Testing for Web-based Applications for UTIITSL

Tender Notice. Tender no. : NTSC (O)/EM/F&F/ Date: 8th June, 2015

ADMINSTRATION OF DAMAN AND DIU(U.T.)

Terms and Conditions

State Health Society, Bihar Pariwar Kalyan Bhawan, Sheikhpura, Patna-14

TENDER FOR TRAVEL SERVICES

Tender for 30Mbps (1:1) Internet Leased Line on RF for Translational Health Science an Technology Institute, Faridabad

Ref. REC/Adm. (Estate)/ / Dated

TENDER DOCUMENT FOR SUPPLY OF OMR SCANNER WITH BAR CODE READER

Centre for Development of Imaging Technology (CDIT) Chithranjali Hills, Thirvallom PO, Thrivananthapuram (An Autonomous Body under Govt.

Tender No: NEDA/Comp/ RMS/ Dated: 03/11/2015

Section 12 MUST BE COMPLETED BY: 4/22

LIMITED TENDER FOR DESIGN, DEVELOPMENT AND IMPLEMENTATION OF WEBSITE FOR NON TIMBER FOREST PRODUCE (NTFP)

Symantec Endpoint Protection

SECTION-I. Mysore /Division / NOTICE INVITING TENDER

NAME OF THE WORK: Leased Line for WAPCOS Gurgaon.

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

2. The Earnest Money Deposit (EMD) of Rs. 50,000/- (Rupees Fifty thousand only) in

Did you know your security solution can help with PCI compliance too?

TENDER NOTICE FOR SOCIAL MEDIA MONITORING SERVICES (TWITTER) FOR THE EXTERNAL PUBLICITY AND PUBLIC DIPLOMACY DIVISION, MINISTRY OF EXTERNAL AFFAIRS

Request for Techno-Commercial Proposal. Design, Development, Implementation & Maintenance of Portal Solution for Dr. MCR HRD IAP

The Cotton Corporation of India Ltd. (भ रत सरक र क उपक रम) ( A Govt. of India Undertaking ) Veer Sawarkar Chowk, शह न रव ड र ड, सम र ट नगर,

URBAN LOCAL BODIES, HARYANA SHORT TERM TENDER

TENDER DOCUMENT. For SUPPLY OF TWO OMR SCANNER WITH BAR CODE READER

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CENTRAL INFORMATION COMMISSION BLOCK IV, 5 TH FLOOR, OLD JNU CAMPUS, NEW DELHI TENDER DOCUMENT

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Dated 14 July, Director (A&F) NHIDCL

Request for Techno-Commercial Proposal(TCP) for Design, Development, Implementation & Maintenance of ERP Solution for APMDC

Introduction. PCI DSS Overview

TENDER FOR INSTALLATION OF TEA/COFFEE VENDING MACHINES AND SUPPLY OF MATERIALS/CONSUMABLES AT CORPORATE OFFICE, GURGAON

PRASAR BHARATI BROADCASTING CORPORATION OF INDIA DOORDARSHAN KENDRA : CHENNAI ***** No.9(2)(17)/WEBSITE/ /ES/DKC Date:

Government of Jharkhand Department of Science & Technology Nepal House, Doranda, Ranchi Ph , , Fax ,

Symantec Protection Suite Small Business Edition

Subject : Annual Contract for Pest Control, Rodent Control and Termite Control to the Commission for the year

Dy. General Manager (Information Technology)

Microsoft Windows Server System White Paper

How To Run A Web Server On A Linux Or Windows Computer (For Free) On A Cheap Server (For Cheap) On Your Own Computer (Free) On An Old Hard Drive (For A Free) Or Ipad (For Low Cost)

Getting Started with Symantec Endpoint Protection

Chapter 9 Firewalls and Intrusion Prevention Systems

JHARKHAND STATE ELECTRICITY BOARD

Tender Notice No.: OIDC/07/DMN/BUS/Uniform/ /179 Dt LIMITED TENDER NOTICE

LIMITED TENDER ENQUIRY FOR RODENT CONTROL SERVICES IN AAAGH

DIRECTORATE OF SOCIAL AUDIT

Inviting Tender from Cert-In empanelled agencies for Conducting Load and Security Testing of Web application of UPSDM

TENDER FOR ANNUAL MAINTENANCE CONTRACT & CREATION OF WEBSITES OF O/o DIRECTORATE OF FILM FESTIVALS.

BIHAR RURAL DEVELOPMENT SOCIETY (BRDS) RURAL DEVELOPMENT DEPARTMENT GOVERNMENT OF BIHAR MAIN SECRETARIAT PATNA BIHAR (INDIA)

Tender Document for Procurement of Internet Bandwidth

TENDER FOR INTERNET LEASED LINE FOR PERMANENT CAMPUS OF THE INSTITUTE AT OKHLA, PHASE-III NEW DELHI

Tender Notice. Biometric Attendance System Software with SMS service for NITT Hostels

TENDER DOCUMENTS FOR INTERNET LEASED LINE CONNECTION AT HRDG, CSIR COMPLEX, NEW DELHI : ( upto 1500 hrs.)

TENDER DOCUMENT FOR MAINTENANCE CONTRACT FOR COMPUTERS AND PRINTERS

SUPPLY, INSTALLATION, TESTING & COMMISSIONING OF SPLIT AIR CONDITIONERS

How To Sell Cement In Jamshedpur

Transcription:

28034304, 05, 06 Patents/Designs/Trademark GOVERNMENT OF INDIA GEOGRAPHICAL INDICATIONS MINISTRY OF COMMERCE & INDUSTRY 28034322-28034320 Intellectual Property Office Building Fax No.28034301/302 Plot No.32, Sector 14, Dwarka NEW DELHI - 110 075. E-mail : delhi-patent@nic.in http://ipindia.nic.in No. POD/Tenders/2010-2011/- Dated: 01.11.2010. Tender notice for supply, installation & configuration of Enterprise Antivirus solution The sealed Tenders are invited by the Patent Office, New Delhi for supply of Enterprise Antivirus solution at the address as mentioned above and as per the specifications and quantity given below for Servers & Desktops in two bid system. Requirement: Enterprise Antivirus Solution for: Servers (Windows based o/s) 10 Desktops (Windows based o/s) 245 1. Eligibility Criteria of Bidders: a) Vendor should attach the Balance Sheet showing at least Rs. 2 crores annual turnover in each financial year for the last three financial years. b) Bidder should be Original Equipment Manufacturer (OEM) / Authorized Partner of Principal Antivirus Vendor and a letter of Authorization from OEM, specific to the quotation should be enclosed. c) The Bidder should be an ISO certified company. d) The Bidder should have professionals certified on the antivirus solution they propose against this quotation. Proof of the same shall be enclosed. Page 1 of 13

e) The OEM must enclose a certification of having successfully executed at least two enterprise Anti Virus solutions for minimum 250 nodes each in any of the last 3 financial years for any Educational Institute/University/Govt. entity/psu. f) An undertaking from the manufacturer is required in this regard stating that they would facilitate the bidder on a regular basis with technology/product updates and extend support for the warranty as well. g) Latest Income Tax Certificate should be enclosed. 2. Obtaining Bid Documents: The tender can be obtained on request from administrative officer on payment of Rs. 500/- (Rupees Five hundred only) (Non refundable), payable through cash / crossed demand draft drawn on nationalized bank in favour of controller of patents payable at New Delhi The tender document can also be downloaded from the website of IPO but should be accompanied with the cost of tender document of Rs 500/ in cash (to be deposited at counter) or crossed demand draft drawn on nationalized bank in favour of controller of patents payable at New Delhi at the time of submission. 3. Submission of Proposals: (i) The bidder shall go through the entire document and must comply with all the terms and conditions. A Compliance statement in the form of Complied or Not Complied shall be given against each item and specification of the Tender (Annexure-I). The compliance statements should be supported by authentic documentation. Please note that any deviation from the laid down requirements / specification shall be brought out separately in deviation sheets to be attached with concerned section of the Tender document. Failure to comply with this requirement may result in the bid being rejected. Each page of the bid and cuttings / corrections shall be duly signed and stamped by the bidder. Failure to comply with this requirement may result in the bid being rejected. (ii) The proposals shall be submitted in two parts and should be super-scribed as PART-I: COVER FOR TECHNICAL BIDS and PART-II: COVER FOR COMMERCIAL BIDS. Page 2 of 13

(iii) (iv) (v) (vi) Part-I shall be a Company Profile covering all the documents specified in the Eligibility Criteria of Bidders as per para 1 above as well as a Technical Offer with full details including description of product so as to enable technical assessment of the proposal and categorical clause wise compliance statement as per Annexure-I. The Technical bid must be submitted in an organized and structured manner. No brochures/leaflets etc. should be submitted in loose form. The Technical Offer should comprise of the following: a.) A letter of authority duly signed by an authorized signatory. b.) Complete Information of Commercial bid with Product Name, Version & Manufacturer quoted for. c.) Commercials must not be given in Part I. d.) Technical Documentation [Product Brochures, leaflets, manuals etc.] e.) Delivery and implementation schedule. f.) Compliance of terms with any deviation clearly indicated in remarks & brought in separate deviation sheets. g.) Warranty details etc. Part II should contain The Commercial Bids for the entire proposal. The bidders are requested to quote: a.) Name and Version of Enterprise Antivirus solution with charges for installation & configuration in Indian Rupees. d.) Prices quoted shall be inclusive of escalation of any description. The rates must be quoted including the following: I. All costs should be given in Figures and Words. II. Govt. Levies like Sales Tax, Octroi, Excise Duty, Work Contract Tax (WCT) and Educational cess etc., if any, shall be paid at actual rates applicable on the date of delivery. Rates should be quoted accordingly giving the basic price, duties and taxes etc., if any. Both the covers should first be sealed separately, and then both the covers should be kept in a single sealed bigger cover. This envelope should be duly signed by an authorized signatory and should bear the inscription as under: Supply, Installation & Configuration of Enterprise Antivirus Solution for IPO Tender document Enquiry No. :.. Dated.. Page 3 of 13

(vii) (viii) Bids Acceptance: The Bids must reach the Patent Office, Delhi addressed to The Administrative Officer, Patent Office, Boudhik Sampada Bhawan, Plot No. 32, Sector-14, Dwarka, New Delhi 110 078, on or before the due date, i.e., on 09th November 2010 by 3.00 P.M. In the event of due date being a closed holiday or declared Holiday for Central Government offices, the due date for submission of the bids will be the following working day at the appointed time & venue. Bids will not be accepted after the due date & time. Validity of bids: Bids should be valid for a minimum period of 90 days after the due date. 4. The important dates: a) Last Date and time for Submission of Tender document: The last date to submit sealed Tender is 10.11.2010 till 3.00 pm. b) Opening date of Technical Bid:.10.11.2010 at 4.00 P.M. c) Opening date of Commercial Bid:.12.11.2010 at 3.00 P.M. d) Address and place for submission of bids: The bids may be submitted in sealed envelope in the prescribed format super scribing Tender for supply of Enterprise Antivirus Solution for IPO, addressed to The Administrative Officer, Patent Office, Boudhik Sampada Bhawan, Plot No. 32, Sector-14, Dwarka, New Delhi 110 078. 5. Terms & Conditions: 1. Price quoted should be inclusive of all applicable taxes and levies. 2. The office reserves the right to change the quantity as per its requirement at any stage. Further the Office reserves the right to place order either of all the items or only some of above items. The supplier shall have no right to claim any compensation in such case. 3. The Office reserves the right to reject any or all Tenders without specifying any reasons thereof. 4. If the technical offer contains any price information the offer will be summarily rejected. 5. Incomplete Tenders are liable to be rejected. Page 4 of 13

6. Canvassing in any form in connection with the tenders is strictly prohibited and bids submitted by the bidders who resort to canvassing are liable for rejection. 7. IPO shall not pay any costs incurred towards preparation and submission of the bid or any other expenditure in this regard. 8. Unsigned bids, unattested corrections and over writings by bidders are also liable for rejection. 9. Bids not adhering to the specifications will be out rightly rejected. 10. Conditional bids will be summarily rejected. 11. Delivery should be within 1 week from the date of receipt of order for supply. 12. Sealed Tender should reach on or before date as mentioned above. 13. In case of delay, penalty at the rate of 0.5% per day of the ordered value shall be charged (maximum penalty up to 5 % of the order value can be deducted). If the delay is more than ten days the order shall stand cancelled. 14. Payment will be done after installation. 15. All disputes should be within the jurisdiction of Delhi. 16. The Vendor has to submit documentary proof of Sales Tax/PAN etc. 17. No Advance payment shall be made by the office. 18. The Vendor has to submit an EMD of Rs10,000/- in the form of Demand Draft in favour of Controller of Patents payable at New Delhi. 19. Tenders submitted without EMD shall be rejected out rightly. 20. The Vendor has to submit performance security for Rs. 50,000/-, if the tender is awarded. 21. If vendor does not supply the product as per the configuration no payment will be made and performance security will be forfeited. 22. Rates once submitted cannot be changed & should be valid for at least 90 days from the date of contract. ( Dr.K.S.Kardam) Deputy Controller of Patents & Designs (Head, Patent Office Delhi). Page 5 of 13

ANNEXURE-I TECHNICAL SPECIFICATIONS: Compliance Requirement Description Sr no. Description Compliance (Complied/Not Complied) (a) End Point Security Protection Features capabilities Remarks 1 2 3 4 5 6 Solution should able to Detects and blocks malicious software in real time, including viruses, worms, Trojan horses, spyware, Adware, and RootKit. Endpoint solution technology should include a behavioral based technology apart from providing the signatures for known threats, vulnerability add heuristic based approach. It should be able to score both good and bad behaviors of unknown applications, enhancing detection and reducing false positives without the need to create rule-based configurations to provide protection from unseen threats i.e. zero-day threats. Solution firewall engine should have option to allow or block support of network protocols, including Ethernet, Token Ring, IPX/SPX, AppleTalk, and NetBEUI. Can block protocol drivers (example: VMware, WinPcap) and should have Adapter specific rules e.g. Ethernet, Wireless, VPN Proposed IPS solution should allow customer to edit and create the IPS signature using snort/custom based format if required. Solution should able to block devices based on Windows Class ID and should include USB, Infrared, Bluetooth, Serial, Parallel, fire wire, SCSI and PCMCIA. Solution should also be able to block and give read/write/execute permission for mentioned devices. Solution should provide application analysis, process control, file and registry access control, module and DLL control. Proposed Solution should be able to deploy flexible and different security policies depending upon the AND/OR Page 6 of 13

relationship of following network triggers - - IP address (range or mask) - DNS Server - DHCP Server - WINS Server - Gateway Address - TMP Token Exists (hardware token) - DNS Name Resolves to IP - Policy Manager Connected - Network Connection (wireless, VPN, Ethernet, dialup) 7 8 9 10 11 12 13 Proposed IPS solution should combines NIPS (network) and HIPS (host) both with Generic Exploit Blocking (GEB) for one signature to proactively protect against all variants, Granular application access control and behavior based technology mentioned above. Proposed solution should be able provide superior root kit detection and removal. This should have access below the operating system to allow thorough analysis and repair. System Lock Down - it should be able to Locks down the system by fingerprinting every executable file on the system. It can then monitor all running applications and terminate any application for which the agent does not have a matching fingerprint. Denial of service detection and protection - Should Protects the system from multiple forms of anomalous network behavior that is designed to disrupt system availability and/or stability. Anti-spoofing - Should Protects the transmission of data from being sent to a hacker system who has spoofed their IP or Mac Address Agent has the ability to detect and block process execution chains. It is able to detect when a malicious application tries to execute a trusted application, and then use the trust privileges of that application to access the network. Anti-application hijacking - Should prevent hackers and web sites from identifying the operating system and browser of individual computers. Page 7 of 13

Code insertion attack prevention - Prevent malicious applications from inserting code into trusted application to 14 bypass outbound application fire walling. Protocol adapter attack prevention - Prevent malicious applications from using their own protocol adapter to bypass 15 outbound fire walling. Antivirus and Antispyware policy can have options by default to choose High Security and High performance to have a right 16 balance while deployment in the production network. Antivirus schedules scans should get delayed/rescheduled 17 while laptops are running on batteries. Antivirus should have behavior based technology to scan for Trojans, worms and key stroke loggers to protect from zero day threats. Sensitivity level of this should get adjusted with 18 customized scanning frequency. Antivirus Solution should have internet browser protection and home page should be configurable if security risk changes 19 that. Antivirus solution should be able to Scan POP 3 email traffic including email clients Microsoft outlook, lotus notes and 20 outlook express. Desktop Firewall rules should be configurable depending upon the adapters including Ethernet, wireless, Dialup, VPN 21 (Microsoft PPTP, Nortel, Cisco). Desktop Firewall rules should be configurable depending 22 upon the state of screen saver "ON" & "Off". Desktop Firewall Policies should be configurable depending 23 upon the time and day. 24 The solution must have readymade policies including a) To Make all removable drives read only, b) To block program from running from removable drives, c) Protect clients files and registry keys, d) Log files written to USB drives, e) Block modifications to host files 25 Solution must be able to display and customize warning messages on infected computers. For example, if users have a spyware program installed on their computers, you can notify them that they have violated your corporate policy. Page 8 of 13

26 27 28 (b) 1 2 3 4 Management server should have the capabilities to add multiple domains if required for the different locations to assign the different administrators for other locations. Each domain should shares the same management server and database & This separation prevents administrators in one domain from viewing data in other domains. These administrators can view and manage the contents of their own domain, but they cannot view and manage the content of other domains. Solution must provide a group updater for remote site and must have bandwidth throttling option to streamline updates and there by reducing load on the bandwidth To conserve the network bandwidth clients should be configurable to upload the maximum records of logs to the management server. Compliance enforcement and validation options The Host-based, self-enforcement - It should use a desktop firewall (built into the agent) to permit or deny managed endpoints access to the network. This method should offer the fastest and easiest implementation as it requires: No infrastructure changes and No additional deployment efforts. Solution should have the integration with various client management & patch management solution It must have compliance check policy templates for client management agent to ensure that agent is always installed, running and updated. Solution must have the ability to validate the users connecting to the Enterprise network by determining the following: a) Their host-firewall policy matches the policy defined on the management server. b) Host-IPS is running. And HIPS signature files are up to date c) Anti-Virus is running and Anti-Virus definitions/.dat files are up-to-date according to enterprise security policy. d) Custom or third-party security applications are running. e) The patch level of the operating system meets enterprise security policy. f) The patch level of applications meets enterprise Page 9 of 13

security policy. g) Registry values are present. h) The password strength meets minimum requirements. i) Windows Update tool is enabled and running. j) They are permitted to alter their network configuration settings. k) Minimum service pack requirements are met. l) Anti-Spyware is running. m) The agent is a valid agent present.. n) Determine if a custom or third-party files are o) Add/Remove Programs is enabled for the user 5 6 (d) 1 p) Enforce the presence and update status of Anti- Spyware products. Solution should have following policies templates to check & enforce the security of workstations a) Minimum password age, password length, complexity and history. b) To Disable Guest account, registry editing, add or remove program, remote desktop, IP change, windows CD and windows auto play. Host Integrity rule priorities and conditions enable administrators to create interdependencies between rules such as if/then/else conditions and determine the order in which rule are executed. For Example, rule conditions allow administrator to create policies such as the host must be running either anti-virus 1 or anti-virus 2. Rule priorities ensure the Host Integrity rules are run in the correct order. For example, Agent could download and install a required operating system patch before initiating the update of a hot fix. Automatic remediation in case compliance level of machines fails If the host is non-compliant with security policies, Agent can automatically initiate a restoration action, which can include running command line, downloading and executing/inserting a file, rechecking the host for compliance, and ultimately granting access for the compliant host to the network. Page 10 of 13

Common usages of remediation include: 2 a) Remediate by executing a file - The ability to bring a system back into compliance after a failed Host Integrity check by running an executable on the local system, such as an Anti-Virus engine. b) Remediate by downloading a file - the ability to bring a system back into compliance after a failed Host Integrity check by downloading a file to the local system, such as an Anti-Virus dat file. c) Remediate by running a script - The ability to bring a system back into compliance after a failed Host Integrity check by running a script that is included in the policy on the local system, such as a cscript or perl script. d) Remediate by setting registry key- The ability to bring a system back into compliance after a failed Host Integrity check by setting a registry key to a specific value. Solution must be scalable to incorporate the following with no installation of component on clients should need be in future: 3 (e) 1 a) Network access control solution should be able to provide flexible options to enforce the security policies at different network entry points and user scenario. It should include: i) 802.1x standards-based approach for LAN and wireless networks, DHCP-based approach for LAN and Wirelessover any infrastructure, ii) Gateway enforcement for in-line enforcement on any network, iii) Guest Access for unmanaged nodes connected locally, The Solution must provide security for MS Exchange, Domino and at Mail Gateway Backup and Restore Management System Recovery solution should support for Dissimilar Hardware recovery in case of a complete system crash. Page 11 of 13

It should support conversion to and from virtual environments like VMware, Microsoft Hyper & Microsoft 2 Virtual Server 3 It should support scheduling of recovery points It should auto-detect hardware and install appropriate drivers while recovering a system from complete crash 4 situation. Solution should support saving of recovery points at 5 FTP locations, DAS, NAS, USB Drive, DVD drives The solution must be able to initiate automatic threat con driven backups as soon as the threat landscape 6 increases. The solution should provide a complimentary disaster 7 recovery for critical servers and clients. The solution must provide bare metal recovery to the 8 existing or dissimilar hardware possible in minutes The solution must provide physical to virtual and virtual to physical conversion. With this functionality, administrators can have can follow best-practices, such as testing deployments in virtual environments or using virtual environment as an immediate disaster recovery 9 site. An optional Granular Restore should also be part of 12 solution. Should support for windows 2000, 2003, 2008 R2 13 (servers),red Hat and SUSE Linux Should support for 32 bit & 64 bit windows (incl. xp, 14 vista, 7) Page 12 of 13

ANNEXURE-II COMMERCIAL BID FORMAT: Sub: Tender for Supply, installation & configuration of Enterprise Antivirus solution a) Enterprise Antivirus Solution Sl.No Name of the manufacture(brand) Rate per license Total (in Rupees incl. Taxes etc.) In Words In Figures (Signature of vendor/supplier with stamps of the firm/company) Dated :.. At :. Page 13 of 13