Catalogue values for End Point Protection Software / Appliances (V3)
Category | Specification | Bid Requirement (Allowed Values) |
---|---|---|
BASIC INFORMATION | Software Type | End Point Protection Software/ Appliances |
Component of End Point Protection Software/Appliance offered in the scope of supply | Policy Management, Centralized Management, Updation and Upgradation Management, Advanced Endpoint Protection, Device Control, Mobile and Virtual Environment, Patch management, Anti Ransomware, Anti Fishing Protection | |
SCOPE OF LICENCE | Types of Licence | Subscription |
Duration of Subscription (in Years) (Hint :- Select '0' if not applicable) | 3.0 - 5.0 Or higher | |
OEM Licensing policy (Hint:- Device means Server, Desktop, Laptop,Thin client etc) | Per Device, Per User | |
Maximum number of devices supported by the console (Select 'NA' if not applicable) | 1001-5000, 5001-10000, 10001-50000, 50001-100000 Or higher | |
Number of users for license offered in the scope of supply (Select '0' if not applicable) | 1001-5000, 5001-10000, 10001-50000, 50001-100000 Or higher | |
Licence Delivery Mode | Paper Licence, Electronic Licence | |
Scope of Installation | Installation, Integration, Configuration, End to End Workflow Implementation | |
Deployment option | On premises | |
The offered product have support from OEM for | Updation for Patches and Bug fixes within support period, Upgradation of version within support period | |
Number of Monthss for OEM support for updation (Patches and Bug fixes) is included in the scope of supply (Select '0' if not applicable) | 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60 Or higher | |
Number of Months of supply (Select '0' if not applicable) | 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60 Or higher | |
Training Options | Virtual, Training Material | |
Number of days Training Provided (Hint :- Select '0' if not applicable) | 2.0 - 30.0 Or higher | |
Policy Management | Policy Management Features | Device Based Policies, User Based Policies |
Centralized Management | Centralized Management Features | Defining and Managing Configuration, Policy Editing, Scalability, Exception Management, Application Control, Automatic Client Updates, Live Security Alerts, Mass Updates, Remote Software Installation and Updates, Reporting, Cloud-Assisted Security Network |
Updation and Upgradation Management | Updation and Upgradation Features | Deploy, manage, and update agents and policies from one management platform, Automatic updates, DAT files rollback in case of issues with new DATs, Offline update support |
Advanced Endpoint Protection | Advanced Endpoint Protection Features | Blended Threats/Malware Protection, (HIPS)/Behavioral Analytics, HTTP Malware Detection, HTTPS Malware Detection, Automated Malware and Threat Removal, Web Filtering, Suspicious email attachments scanning, Enhanced remediation capabilities, Global Threat Intelligence with Reputaion Source configuration capability, Advanced Protection against fileless attack methods, Data Protection / Full disk and file Encryption, Data backup / Data recovery / Roll Back, End point forensic, Memory Protection, Advance machine learning and AI based next generation End point security, Application Blacklisting, Application Vulnerability |
Device Control | Device Control Features | Multiple Device Support, USB Device Access Control and Monitoring, Workstations, Offline Support and Forensics, Device Authentication capability, Bluetooth, Media Encryption, Device Whitelisting |
Data Loss Protection | Data Loss Protection Features | Endpoint Encryption, File and removable media encryption, Drive encryption, Remote data Protection, Encrypt/Quarantine/Monitor/Delete sensitive files, Serial No. Whitelisting |
Identify content using | Key words, Pattern matching | |
Mobile and Virtual Environment | Mobile and Virtual Environment Features | Mobile Security to detect mobile threats and prevent against zero day attacks, Virtualized Environments, Highlight privacy risks, Actionable mobile threat intelligence |
END POINT GENERIC PARAMETERS | End Point Generic Features | Anti-virus feature, Anti-malware feature, Personal Firewall, Web Control / URL filtering, Host integrity, Signature based Protection, Browser protection |
GENERIC PARAMETERS | Backend Operating System required by the offered product | Windows, Mac, Linux |
Backend Web browsers required by the offered product | Internet Explorer, Google Chrome, Mozilla Firefox, Safari, Opera, Edge | |