RFP: Anti-virus Solution

Similar documents
Symantec Endpoint Protection

Endpoint protection for physical and virtual desktops

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Best Practice Configurations for OfficeScan (OSCE) 10.6

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

FortiClient dialup-client configurations

Getting Started with Symantec Endpoint Protection

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

ESET SMART SECURITY 6

Trend Micro OfficeScan Best Practice Guide for Malware

Symantec Endpoint Protection

thriller INTERNET SECURITY

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

ESET SMART SECURITY 9

Patch Management SoftwareTechnical Specs

Endpoint protection for physical and virtual desktops

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware

Certification Report

ANTIVIRUS EVALUATION GUIDE. AntivirusBusiness. Make the Right Choice the First Time

Best Practice Configurations for OfficeScan (OSCE) 10.6

Symantec Endpoint Protection Getting Started Guide

Release Notes for Websense Web Endpoint (32- and 64-bit OS)

Agilent Technologies Electronic Measurements Group Computer Virus Control Program

CITY OF GOLETA, CALIFORNIA REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES

Net Protector Admin Console

Sophos for Microsoft SharePoint startup guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

escan Comparison (Enterprise, Corporate, SMB, SOHO)

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Hope is not a strategy. Jérôme Bei

Information Technology Solutions

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

ViRobot Desktop 5.5. User s Guide

IBM Endpoint Manager Product Introduction and Overview

Managed Antivirus Quick Start Guide

System Administrator Guide

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET NOD32 ANTIVIRUS 9

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

ESET NOD32 ANTIVIRUS 8

For Businesses with more than 25 seats.

1. Amendment of Section I. Invitation to Bid item no. 6 and 7 are hereby amended as follows: From:

Spyware Doctor Enterprise Technical Data Sheet

Introduction. PCI DSS Overview

Basic Virus Removal Steps

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

VESZPROG ANTI-MALWARE TEST BATTERY

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

Kaseya 2. User Guide. Version 6.5 and 2.3

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

TECHNOLOGY BRIEF: CA ANTI-VIRUS. Protecting Endpoint Systems Against Viral Malware

Quick Heal Exchange Protection 4.0

BitDefender Client Security Workstation Security and Management

Section 12 MUST BE COMPLETED BY: 4/22

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Symantec Protection Suite Small Business Edition

Goals. Understanding security testing

IBM Endpoint Manager for Core Protection

Best Practice Configurations for OfficeScan 10.0

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

Mobile Network Access Control

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

2012 Best Practice Seminar. Presented by David Rawle

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

ESET NOD32 Antivirus. Table of contents

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

GFI White Paper PCI-DSS compliance and GFI Software products

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command Document Revision History... 10

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

Chapter 15: Computer and Network Security

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

SANS Top 20 Critical Controls for Effective Cyber Defense

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Printed Documentation

How to easily clean an infected computer (Malware Removal Guide)

Introduction to Free Computer Tools

AVeS Cloud Security powered by SYMANTEC TM

Endpoint Security Management

Driving Company Security is Challenging. Centralized Management Makes it Simple.

What is Windows Intune? The Windows Intune Administrator Console. System Overview

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

Information Security Recommendation Report

ESET NOD32 Antivirus 4

How to Configure Sophos Anti-Virus for Home Systems

OBSERVEIT DEPLOYMENT SIZING GUIDE

How To Create A Virtual Desktop In Gibidr

Windows Operating Systems. Basic Security

Host-based Intrusion Prevention System (HIPS)

McAfee Endpoint Protection Products

Avira Version 2012 (Windows) Release Information

Norton. AntiVirus. Product Manual

Trusteer Rapport Virtual Implementation Scenarios

Limited Tender Document

Copyright 2013 Trend Micro Incorporated. All rights reserved.

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

Transcription:

RFP: Anti-virus Solution Catoosa County Schools (CCPS) is looking to purchase an anti-virus security solution that protects an institution s entire network including the internet gateway, servers and desktops, laptops, handheld and tablet computers. In addition to the applicable software, any proposed solution needs to include the maintenance, technical support and training necessary to allow CCPS to fully utilize the software licensed. Proposal should be based on 5300 endpoints. I. Solution Structure and Parameters The Anti-Virus Security Solution will be a solution offered to CCPS. The solution will: 1. Be designed as a renewable multiple-year offering capable of serving the entire CCPS District; 2. Offer the highest quality anti-virus security products with the best pricing structures; 3. Offer support for Novell server OS, Windows server OS and Linux/Unix server OS; 4. Offer Mobile Device Management and security for mobile devices including smart phone and tablet control, App store, mobile antivirus; 5. Offer support for desktops, laptops, tablet, and hand held devices including antivirus, device control, application control, threat aware patch assessment; 6. Offer Web protection, including built in web security and content web filtering. 7. Offer data protection with proven encryption and data control; 8. Offer network protection, including client firewall and integrated network access control; 9. Offer centralized management using a console. II. Protection and Research What types of threats does your solution detect? Spyware Rootkits Adware Dialers Trojans Cookies System monitors Does the solution provide cleaning and blocking services? How are new malware samples identified? How often are new signatures delivered? How does your organization deal with requests to remove Web sites or applications from the detection list? Describe the submission and review processes.

What actions are taken if a status change is warranted? Are sites removed from the database, or is there a change of default recommended action? How are customers notified of changes? III. Servers and Infrastructures Describe the various components of the solution infrastructure, including: Policy server Distribution server Reporting server Management console What are the minimum and recommended requirements for server components, including? Supported operating systems CPU Memory Disk space Please provide a scaling guide, describing maximum clients supported versus server specifications. Can server components be installed on separate machines, or must they all be installed together? Please list what communication ports are used between components. IV. Database Describe the database included with the server installation package. Does the application work with existing enterprise databases? If so, list which databases are supported. V. Clients Which client operating systems are supported? Windows Server 2003 Windows XP Windows 2000 Windows 95/98/ME

How much disk space is required? How much memory is consumed? Under normal conditions? During scans? What is the CPU usage during scans? Can administrators adjust via policy or manually? Does the client operate as an application or a service? At what point in the boot process does the anti-spyware product start? Does the service/process require local administrative rights to perform scans or cleans? Describe modes of operation: User interactive User alerting only Silent (no user interaction or alerting possible) Other (describe) Are there any known conflicts with other applications and services? Describe how agents communicate with server components. Please list any relevant TCP/UDP (User Datagram Protocol) ports. Describe any special concerns for clients traveling out of network. Does the client receive updates from the vendor? Does the client process shut down after a predetermined amount of time? Can the client report back to the server through an alternative method? VI. Client Distribution Does the solution include client distribution tools? Describe how they work. Can you create.exe or.msi files for deployment using existing software deployment tools? Is the server contact information hard-coded into the agent package, or can server assignments be changed from the console? VII. Updates

Does your product schedule definition updates for the primary servers and when clients check in for new definitions? What is the typical definition size? Describe administrative rights controls. Can read access be set for some administrators and read/write access for others? Can administrator access be granted to only one particular group? VIII. Policy Control Can client scans be scheduled for individual computers or groups of computers? Can scans looking for subsets of threats (such as system monitors only) be run? Can threats be automatically quarantined with the option to restore, if necessary? Can exemptions for certain Web sites, applications or processes be configured? Can Web site blacklists be configured? IX. Reporting How many reports do you offer? Describe some unique reports. What formats can reports be exported to? What types of alerts are available? In-console SNMP E-mail Syslog Pager X. Licensing and Maintenance What is the licensing cost per user per year? Volume pricing is likely available, so you will want to have the number of seats needed in mind when developing an RFP.

Are there additional costs for server or reporting components? Describe the standard support agreement. Is it included in the license fee? What are the support operation hours? Describe any premium or advanced support contract options, including pricing. XI. Company Information Include information on corporation, awards and references. All submitted RFP s must include a signed copy of the Catoosa County Bidding Terms and Conditions document located on the school system website. (RFP Option under the Board of Education section) RFPs should be submitted via fax, email, or post no later than 4:00 p.m. on Wednesday, February 13 th. To: Steve Sawyer - ssawyer@catoosa.k12.ga.us P.O. Box 130 307 Cleveland St. Ringgold, GA 30736