Catalogue values for End Point Protection Software / Appliances (V3)

Category Specification Bid Requirement (Allowed Values)
BASIC INFORMATION Software Type End Point Protection Software/ Appliances
Component of End Point Protection Software/Appliance offered in the scope of supply Policy Management, Centralized Management, Updation and Upgradation Management, Advanced Endpoint Protection, Device Control, Mobile and Virtual Environment, Patch management, Anti Ransomware, Anti Fishing Protection
SCOPE OF LICENCE Types of Licence Subscription
Duration of Subscription (in Years) (Hint :- Select '0' if not applicable) 3.0 - 5.0 Or higher
OEM Licensing policy (Hint:- Device means Server, Desktop, Laptop,Thin client etc) Per Device, Per User
Maximum number of devices supported by the console (Select 'NA' if not applicable) 1001-5000, 5001-10000, 10001-50000, 50001-100000 Or higher
Number of users for license offered in the scope of supply (Select '0' if not applicable) 1001-5000, 5001-10000, 10001-50000, 50001-100000 Or higher
Licence Delivery Mode Paper Licence, Electronic Licence
Scope of Installation Installation, Integration, Configuration, End to End Workflow Implementation
Deployment option On premises
The offered product have support from OEM for Updation for Patches and Bug fixes within support period, Upgradation of version within support period
Number of Monthss for OEM support for updation (Patches and Bug fixes) is included in the scope of supply (Select '0' if not applicable) 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60 Or higher
Number of Months of supply (Select '0' if not applicable) 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60 Or higher
Training Options Virtual, Training Material
Number of days Training Provided (Hint :- Select '0' if not applicable) 2.0 - 30.0 Or higher
Policy Management Policy Management Features Device Based Policies, User Based Policies
Centralized Management Centralized Management Features Defining and Managing Configuration, Policy Editing, Scalability, Exception Management, Application Control, Automatic Client Updates, Live Security Alerts, Mass Updates, Remote Software Installation and Updates, Reporting, Cloud-Assisted Security Network
Updation and Upgradation Management Updation and Upgradation Features Deploy, manage, and update agents and policies from one management platform, Automatic updates, DAT files rollback in case of issues with new DATs, Offline update support
Advanced Endpoint Protection Advanced Endpoint Protection Features Blended Threats/Malware Protection, (HIPS)/Behavioral Analytics, HTTP Malware Detection, HTTPS Malware Detection, Automated Malware and Threat Removal, Web Filtering, Suspicious email attachments scanning, Enhanced remediation capabilities, Global Threat Intelligence with Reputaion Source configuration capability, Advanced Protection against fileless attack methods, Data Protection / Full disk and file Encryption, Data backup / Data recovery / Roll Back, End point forensic, Memory Protection, Advance machine learning and AI based next generation End point security, Application Blacklisting, Application Vulnerability
Device Control Device Control Features Multiple Device Support, USB Device Access Control and Monitoring, Workstations, Offline Support and Forensics, Device Authentication capability, Bluetooth, Media Encryption, Device Whitelisting
Data Loss Protection Data Loss Protection Features Endpoint Encryption, File and removable media encryption, Drive encryption, Remote data Protection, Encrypt/Quarantine/Monitor/Delete sensitive files, Serial No. Whitelisting
Identify content using Key words, Pattern matching
Mobile and Virtual Environment Mobile and Virtual Environment Features Mobile Security to detect mobile threats and prevent against zero day attacks, Virtualized Environments, Highlight privacy risks, Actionable mobile threat intelligence
END POINT GENERIC PARAMETERS End Point Generic Features Anti-virus feature, Anti-malware feature, Personal Firewall, Web Control / URL filtering, Host integrity, Signature based Protection, Browser protection
GENERIC PARAMETERS Backend Operating System required by the offered product Windows, Mac, Linux
Backend Web browsers required by the offered product Internet Explorer, Google Chrome, Mozilla Firefox, Safari, Opera, Edge