Procurement of One Year Anti-Virus Paper License Subscription January- December 2022

This tender is from the country of Philippines in Asian region. The tender was published by DEPARTMENT OF TOURISM on 13 Sep 2021 for Request for Quotation RFQ Procurement of One Year Anti-Virus Paper License Subscription January- December 2022Closing Date Time 17092021 400 PMProcurement Mode Negotiated Procurement - Small Value Procurement Sec 539Brief Terms of ReferencePurchase of Anti-Virus Paper License SubscriptionBackground In 2017 The Dot Acquired the Annual License Subscription on Kaspersky Anti Virus to Protect the Dot Computer and Other Devices from Malicious Attacks Such as but not Limited Viruses Rootkit Trojan Spyware Malware and RansomwareThe Kaspersky is One of the Best and Leading Brand of Anti Virus Software in the World In Providing Protection and Security as Well as Preventive Measure against Newly Develop Viruses Rootkit Trojan Spyware Malware Ransomware And Other Malicious Attack by Integrating AnalyticsObjectivesThe Main Objective is to have a Protection that will Secure and Protect Dot Database Systems Files and Other Ict Equipment but Also have a Preventive Measure against Newly Developed Virus Malware Ransomware And Other Related IssuesTechnical SpecificationEndpoint Security for Business Advance for 1000 LicensesDelivers a Multi-Layer Anti-Malware Protection for Smartphones Workstations and Servers with End Point Controls Mobile Device Management Encryption and Systems Management under a Single Unified Management Console with Additional Feature of Endpoint Detection and ResponseFeatures1 Anti-Malware Workstations and File Server the Solution must have Multiple Anti-Malware Engines with the Combination of the Traditional Signature-Based Heuristic Cloud-Assisted Scanning and Machine Learning Technology for Superior Scanning and Detection Capability the Solution should be Able to Provide Security for Heterogeneous it Environment It shall Support a Range of Platforms including Mac Linux and Windows including the New Windows 10 and Windows Server 2016 Operating System Lightweight Mode for Threat Protection Cloud Mode Light Antivirus Databases with Enabled Ksn Require Less Ram and Drive Space the Solution should Provide Protection against New and Unknown Malwares It should have an Urgent Detection System that may Help Protect the System against New Threats Even before the Release of a New Malware Signature the Solution should be Able to Monitor the Behaviour of Applications Automatically It should have Behavioural Detection Exploit Anti-Rootkit and Remediation Engine that Monitor the System Real Time and will Detect Any Suspicious Behaviour Deeper within Your System and Application that Rolls Back Actions Done by Malware the Solution should have Protection against Encryption for Shared Folders Unique Anti-Cryptor Mechanism Capable of Blocking Encryption of Files on the Shared Resources from the Malicious Process Running on Another Machine on the Same Network the Solution should have a Deeper Level of Protection that could Work on the Lowest Level of a Computers Operating System the Solution should have Technologies that are Improving its Performance by Estimating File Threat Level on the Basis of its Last Modification Date File Last Modification Date is Compared against its First Scan Date Creation Date And Antivirus Databases Release Date the Solution should have Host-Based Intrusion Prevention System Hips and Personal Firewall that would Protect against Hacker Attacks It should be Able to Control Inbound and Outbound Traffic by Setting up Parameters for an Individual Port Ip Address or Application the Solution should have a Network Threat Blocker Mechanism that Detects and Monitors Suspicious Activity on Your Network It should be Pre-Configurable on How the System should Respond when Suspicious Behaviour is Detected the Solutions should be Able to Auto-Quarantine or Auto-Delete Identified Malwares without End-User Interaction the Solution should be Able to Scan Body Text and Attachments of Incoming E-Mail Messages that are Delivered through Pop3 Imap Mail Clients the Solution should be Able to Block MaliciousPhishing Urls the Solution should be Able to Scan Password Protected Compressed Files for Malicious Programs the Solution should be Able to Re-Launch Itself Automatically - when File Server Restarts - on Events that the Server Experiences Fault or Suffering an Unplanned Shut down the Solution should have Amsi Protection Provider Antimalware Scan Interface Amsi Allows a Third-Party Application with Amsi Support to Send Objects For Example Powershell Scripts to Endpoint Security Solution for Additional Scan and to Receive Scan Results for These Objects the Solution should be Able to Monitor and Block Abnormal Behavior of Applications the Solution should have the Option of Single Agent for Edr and Epp Endpoint Protection that can be Activated via Licensing Option 2 End Point ControlsA Application Control the Solution should be Able to Control Application Start up by Blocking Granting or Auditing each Application upon Launch the Solution should be Able to Monitor and Classify each Application as Trusted Untrusted or Restricted the Solution should be Able to Control Whether an Application is Given Access to Specific System Resources Such as the File System or the Registry the Solution should be Able to do Blacklisting and Whitelisting Technology the Solution should have a Dynamic Whitelisting Service that Assesses the Security of Commonly Used Applications Whitelist Database should be Updated Regularly and Automatically to Ensure up-To-Date Protection Policy should be Able to Use User Account-Based Profile on the Active Directory B Device Control the Solution should be Able to Allow Administrator to Set Policy and Control to Any Connected Device On Any Connection Bus Not only Usb At Any Time the Solutions should be Able to Support Device Management and shall Allow Administrator to Monitor Block or Make the Device Read-Only along with the Option of Providing Exceptions the Solution should be Able to Block or Allow Devices Based on Specific Serial Number the Solution should be Able to Generate Logs of Events Associated with Deleting and Saving Files on Usb Device the Solution should be Able to Generate Logs of List of Trusted Wi-Fi Networks Based on Network Name Encryption Type And Authentication Type the Solution should be Able to Monitor Information about Write and Removal Operations Performed with Files Located on Removable Drives the Solution should have Anti-Bridging Capability Which Blocks Unauthorized Commuting between Networks Policy should be Able to Use User Account-Based Profile on the Active Directory C Web Control the Solution should be Able to Filter each Clients Web Browser Usage It should be Able to Permit Prohibit Limit or Audit Users Access to Individual Websites or Categories of Websites including Games Websites Gambling Sites or Social Networks Policy should be Able to Use User Account-Based Profile on the Active Directory 3 Data Protection the Solution should be Capable of Doing Full-Disk Encryption Fde and Protects Data on Hard-Drives the Solution should be Capable of Bitlocker Management the Solution should be Able to do - Pre-Boot Authentication that is Requiring Users to Pass through an Authentication Process before the Operating System will Even Launch the Solution should be Capable of Doing Single Sign-On Sso the Solution should be Capable of Doing File-Level Encryption Fle the Solutions should be Capable of Encryption Removable Drive Usb by Means of Entire Drive Encryption and Portable Mode the Solutions should be Capable of Protecting Data during Transfer Storage and Restoration Regardless of the Policy Settings at the Endpoint to Which the Data is Restored the Solution should be Able to Prevent Exchange of Encrypted Files over Im or Skype Without Restricting Legitimate Message Exchange the Solution should be Capable of Providing Mechanism for Password Recovery Ability to Recover Disk Data in Case of Hardware Failures the Solution should be Gdpr Compliant 4 Mobile Device Management and Security the Solution should be Able to Configure and Manage Smartphones and Tablets from a Single Console the Solution should be Compatible with Different Mobile Platforms Ios and Android the Solution should be Able to do Over the Air Provisioning It should be Able to Secure Phones Remotely by Sending Either an Email or Sms Containing a Link to the Corporate Portal Where Users can Download the Profile and Applications that Administrator has Approved the Solution should be Able to Detect Rooted and Jailbreak Mobile Devices to Ensure Compliance Policy in the Network the Solution should be Able to Enforce Security Settings Such as Camera Disabling and Force Password the Solution should be Able to Control the Applications that are being Run in the Mobile Devices the Solution should be Able to Encrypt Corporate Data on Mobile Devices the Solution should have Anti-Theft Mechanism for Mobile Devices the Solution should have Multiple Layer of Anti-Malware Protection on Mobile Devices the Solution should have a Containerization Mechanism that will Separate Corporate Data from Personal Data on Mobile Devices 5 System Management Tools the Solution should have Operating System and Application Provisioning Provide Easy Creation Storage Cloning and Deployment of System Images from a Central Location the Solution should be Able to Check Operating System and Other Application Vulnerabilities the Solution should be Able to Patch Microsoft Systems Files and Other 3rd Party Applications Seamlessly Patc. The last date to submit your bid for this tender was 17 Sep 2021. This tender is for the companies specializing in Asian bulk upload and similar sectors.

*The deadline for this tender has passed.

Tender Organisation:

DEPARTMENT OF TOURISM

Tender Sector:

Tender Service:

Worldwide

Tender Region:

Tender Country:

Tender CPV:

9000001 : Asian bulk upload

Tender Document Type:

Tender Notice

Tender Description:

Request for Quotation RFQ Procurement of One Year Anti-Virus Paper License Subscription January- December 2022Closing Date Time 17092021 400 PMProcurement Mode Negotiated Procurement - Small Value Procurement Sec 539Brief Terms of ReferencePurchase of Anti-Virus Paper License SubscriptionBackground In 2017 The Dot Acquired the Annual License Subscription on Kaspersky Anti Virus to Protect the Dot Computer and Other Devices from Malicious Attacks Such as but not Limited Viruses Rootkit Trojan Spyware Malware and RansomwareThe Kaspersky is One of the Best and Leading Brand of Anti Virus Software in the World In Providing Protection and Security as Well as Preventive Measure against Newly Develop Viruses Rootkit Trojan Spyware Malware Ransomware And Other Malicious Attack by Integrating AnalyticsObjectivesThe Main Objective is to have a Protection that will Secure and Protect Dot Database Systems Files and Other Ict Equipment but Also have a Preventive Measure against Newly Developed Virus Malware Ransomware And Other Related IssuesTechnical SpecificationEndpoint Security for Business Advance for 1000 LicensesDelivers a Multi-Layer Anti-Malware Protection for Smartphones Workstations and Servers with End Point Controls Mobile Device Management Encryption and Systems Management under a Single Unified Management Console with Additional Feature of Endpoint Detection and ResponseFeatures1 Anti-Malware Workstations and File Server the Solution must have Multiple Anti-Malware Engines with the Combination of the Traditional Signature-Based Heuristic Cloud-Assisted Scanning and Machine Learning Technology for Superior Scanning and Detection Capability the Solution should be Able to Provide Security for Heterogeneous it Environment It shall Support a Range of Platforms including Mac Linux and Windows including the New Windows 10 and Windows Server 2016 Operating System Lightweight Mode for Threat Protection Cloud Mode Light Antivirus Databases with Enabled Ksn Require Less Ram and Drive Space the Solution should Provide Protection against New and Unknown Malwares It should have an Urgent Detection System that may Help Protect the System against New Threats Even before the Release of a New Malware Signature the Solution should be Able to Monitor the Behaviour of Applications Automatically It should have Behavioural Detection Exploit Anti-Rootkit and Remediation Engine that Monitor the System Real Time and will Detect Any Suspicious Behaviour Deeper within Your System and Application that Rolls Back Actions Done by Malware the Solution should have Protection against Encryption for Shared Folders Unique Anti-Cryptor Mechanism Capable of Blocking Encryption of Files on the Shared Resources from the Malicious Process Running on Another Machine on the Same Network the Solution should have a Deeper Level of Protection that could Work on the Lowest Level of a Computers Operating System the Solution should have Technologies that are Improving its Performance by Estimating File Threat Level on the Basis of its Last Modification Date File Last Modification Date is Compared against its First Scan Date Creation Date And Antivirus Databases Release Date the Solution should have Host-Based Intrusion Prevention System Hips and Personal Firewall that would Protect against Hacker Attacks It should be Able to Control Inbound and Outbound Traffic by Setting up Parameters for an Individual Port Ip Address or Application the Solution should have a Network Threat Blocker Mechanism that Detects and Monitors Suspicious Activity on Your Network It should be Pre-Configurable on How the System should Respond when Suspicious Behaviour is Detected the Solutions should be Able to Auto-Quarantine or Auto-Delete Identified Malwares without End-User Interaction the Solution should be Able to Scan Body Text and Attachments of Incoming E-Mail Messages that are Delivered through Pop3 Imap Mail Clients the Solution should be Able to Block MaliciousPhishing Urls the Solution should be Able to Scan Password Protected Compressed Files for Malicious Programs the Solution should be Able to Re-Launch Itself Automatically - when File Server Restarts - on Events that the Server Experiences Fault or Suffering an Unplanned Shut down the Solution should have Amsi Protection Provider Antimalware Scan Interface Amsi Allows a Third-Party Application with Amsi Support to Send Objects For Example Powershell Scripts to Endpoint Security Solution for Additional Scan and to Receive Scan Results for These Objects the Solution should be Able to Monitor and Block Abnormal Behavior of Applications the Solution should have the Option of Single Agent for Edr and Epp Endpoint Protection that can be Activated via Licensing Option 2 End Point ControlsA Application Control the Solution should be Able to Control Application Start up by Blocking Granting or Auditing each Application upon Launch the Solution should be Able to Monitor and Classify each Application as Trusted Untrusted or Restricted the Solution should be Able to Control Whether an Application is Given Access to Specific System Resources Such as the File System or the Registry the Solution should be Able to do Blacklisting and Whitelisting Technology the Solution should have a Dynamic Whitelisting Service that Assesses the Security of Commonly Used Applications Whitelist Database should be Updated Regularly and Automatically to Ensure up-To-Date Protection Policy should be Able to Use User Account-Based Profile on the Active Directory B Device Control the Solution should be Able to Allow Administrator to Set Policy and Control to Any Connected Device On Any Connection Bus Not only Usb At Any Time the Solutions should be Able to Support Device Management and shall Allow Administrator to Monitor Block or Make the Device Read-Only along with the Option of Providing Exceptions the Solution should be Able to Block or Allow Devices Based on Specific Serial Number the Solution should be Able to Generate Logs of Events Associated with Deleting and Saving Files on Usb Device the Solution should be Able to Generate Logs of List of Trusted Wi-Fi Networks Based on Network Name Encryption Type And Authentication Type the Solution should be Able to Monitor Information about Write and Removal Operations Performed with Files Located on Removable Drives the Solution should have Anti-Bridging Capability Which Blocks Unauthorized Commuting between Networks Policy should be Able to Use User Account-Based Profile on the Active Directory C Web Control the Solution should be Able to Filter each Clients Web Browser Usage It should be Able to Permit Prohibit Limit or Audit Users Access to Individual Websites or Categories of Websites including Games Websites Gambling Sites or Social Networks Policy should be Able to Use User Account-Based Profile on the Active Directory 3 Data Protection the Solution should be Capable of Doing Full-Disk Encryption Fde and Protects Data on Hard-Drives the Solution should be Capable of Bitlocker Management the Solution should be Able to do - Pre-Boot Authentication that is Requiring Users to Pass through an Authentication Process before the Operating System will Even Launch the Solution should be Capable of Doing Single Sign-On Sso the Solution should be Capable of Doing File-Level Encryption Fle the Solutions should be Capable of Encryption Removable Drive Usb by Means of Entire Drive Encryption and Portable Mode the Solutions should be Capable of Protecting Data during Transfer Storage and Restoration Regardless of the Policy Settings at the Endpoint to Which the Data is Restored the Solution should be Able to Prevent Exchange of Encrypted Files over Im or Skype Without Restricting Legitimate Message Exchange the Solution should be Capable of Providing Mechanism for Password Recovery Ability to Recover Disk Data in Case of Hardware Failures the Solution should be Gdpr Compliant 4 Mobile Device Management and Security the Solution should be Able to Configure and Manage Smartphones and Tablets from a Single Console the Solution should be Compatible with Different Mobile Platforms Ios and Android the Solution should be Able to do Over the Air Provisioning It should be Able to Secure Phones Remotely by Sending Either an Email or Sms Containing a Link to the Corporate Portal Where Users can Download the Profile and Applications that Administrator has Approved the Solution should be Able to Detect Rooted and Jailbreak Mobile Devices to Ensure Compliance Policy in the Network the Solution should be Able to Enforce Security Settings Such as Camera Disabling and Force Password the Solution should be Able to Control the Applications that are being Run in the Mobile Devices the Solution should be Able to Encrypt Corporate Data on Mobile Devices the Solution should have Anti-Theft Mechanism for Mobile Devices the Solution should have Multiple Layer of Anti-Malware Protection on Mobile Devices the Solution should have a Containerization Mechanism that will Separate Corporate Data from Personal Data on Mobile Devices 5 System Management Tools the Solution should have Operating System and Application Provisioning Provide Easy Creation Storage Cloning and Deployment of System Images from a Central Location the Solution should be Able to Check Operating System and Other Application Vulnerabilities the Solution should be Able to Patch Microsoft Systems Files and Other 3rd Party Applications Seamlessly Patc

Tender Bidding Type:

Publish Date: 13 Sep 2021

Deadline Date: 17 Sep 2021

  • 1 week to go
  • 15 Days to go
  • More than 15 days to go

Get A Callback Within 24 Hours

Fill form below to get callback from Tender Experts.

855668

Explore More Asian bulk upload Tenders in Philippines, Asian, and Worldwide

Looking for more tenders like this one in Asian bulk upload? With over 70 million global procurement opportunities and new tenders added daily, Tender Impulse is your gateway to international and local contracting success. Whether you're targeting the Industry-leather sector in Philippines, or expanding across regions, we provide live, accurate, and relevant updates every day.

Our platform sources tenders from:

  • National and local government portals
  • International development and funding agencies
  • Municipal corporations and state authorities
  • NGOs, education ministries, and public-private partnerships

Daily Tender Updates Across 200+ Countries

Every day, we add hundreds of new RFPs, RFQs, EOIs, and contract awards across multiple sectors and geographies. This tender from Philippines is just a sample of what's available right now.

Tender Impulse covers:

  • Public procurement tenders
  • International development projects
  • Local municipal bids
  • Private and PPP contracts
  • Framework agreements and supply tenders

Search Smarter with CPV and Industry Matching

Each listing is categorized using CPV codes like 9000001, enabling precise filtering. Search by:

  • Tender type: RFP, RFQ, EOI, GPN, Contract Awards
  • Location: Philippines, Asian, or global
  • Industry: Industry-leather
  • Deadline and issue date
  • Issuing organization or funding agency

Opportunities in Every Industry and Region

While you're viewing a tender in Philippines, Tender Impulse offers access to tenders across:

  • Asia, Europe, Africa, the Americas, and Oceania
  • Defence, Energy, Healthcare, Construction, Education, IT, Agriculture, and more
  • All CPV categories—from consultancy to infrastructure

Tools to Help You Succeed

Tender Impulse provides more than listings:

  • Custom email alerts by CPV and location
  • Downloadable bid documents and submission support
  • Registration guidance and compliance tools
  • Translation support for non-English tenders
  • Proposal writing tips and examples

Stay Ahead with Real-Time Updates

Thousands of new tenders are added daily-across countries, sectors, and CPV codes. With Tender Impulse, you gain strategic insight, timely alerts, and a competitive edge.

Start your free trial to unlock tenders customized to your Industry-leather, Philippines, and Asian bulk upload categories.

Tender by Region

Tender by Sector

Tender by Country