Tenders Are Invited For Network Infrastructure – Increasing The Cyber Security Of The Information Systems Of ... in Czech Republic
Tender Notice
TenderID
108077221
Tender Brief
Tenders Are Invited For Network Infrastructure – Increasing The Cyber Security Of The Information Systems Of The Office Of The City Of Prague 11 – 1St Phase – Ii.
Network Infrastructure – Increasing The Cyber Security Of The Information Systems Of The Office Of The City Of Prague 11 – 1St Phase – Ii.. The Subject Of The Awarded Public Contract (Hereinafter Referred To As The Public Contract) Is The Supply Of Software, Hardware And Related Services For The Purpose Of Increasing The Cyber Security Of The Assets Of The Office Of The City Of Prague 11, I.E. Its Information Systems, Including The Information Managed Therein. This Delivery Will Consist Of The Delivery Of The Following: 1) Ndr, Sandbox, Network Traps - Ndr Is A Security Technology Focused On Monitoring, Analyzing And Responding To Suspicious Activities In Network Traffic. Using Advanced Techniques Such As Machine Learning, Behavioral Analysis And Network Flow Analysis, Ndr Identifies Anomalies That May Indicate The Presence Of Malicious Activity Such As Lateral Movement Attempts, Data Exfiltration Or Communication With C2 Servers. - A Sandbox Is A Virtualized Or Emulated Environment In Which It Is Possible To Safely Run Suspicious Files, Programs Or Links Without The Risk Of Affecting The Production System. It Allows Detailed Observation Of The Behavior Of The Launched Object - Whether It Tries To Change System Files, Connect To A Remote Server, Install Malware, Etc. - A Honeypot Is A Deliberately Unprotected Or Partially Vulnerable System That Mimics Real Targets On The Network. It Is Used To Deter Attackers, Monitor Their Techniques And Gain Information About New Attack Methods. Honeypots Can Be Deployed For Research Purposes, Early Detection Of An Attack, Or As Part Of An Active Defense. 2) Endpoint System Edr - Edr (Endpoint Detection And Response) Strengthens The Ability To Identify, Monitor And Respond To Suspicious Activities On End Devices Such As Workstations, Servers And Mobile Devices. This Kind Of Security Solution Allows You To Monitor The Behavior Of Applications, Processes And Users In Real Time And Alert You To Potential Anomalies Or Dangerous Actions. This Allows The Security Team To Quickly Identify New, Unknown Threats And Take The Necessary Steps To Stop Them. 3) Servers - 4 Servers. Server Hardware To Ensure The Operation Of Virtualized Servers/Applications. The Overall Hardware Solution Must Ensure Sufficient Resistance To Hardware Failure Of Individual Nodes And Sufficient Performance For The Operation Of The Required Systems. 4) Disk Array/Storage - Storage Are Specialized Storage Systems For Efficient And Powerful Data Management And Storage. Among Other Things, They Function As Storage For Individual Virtual Servers. Connection Via Fiber Channel Ports. Architecture: A Modular, At Least Two-Controller All Flash Disk Array Of Active-Active Design, The Solution Must Form A Complete Unit With Proven Interoperability, A Single Supported Sla And One Responsible Integrator, The Client Also Allows A Multi-Product Solution If All Requirements Are Met And Demonstrable Evidence Of Compatibility And Uniform Support Is Presented. At Least 64 Gb Of Ram. The Capacity Of The Installed Disk Pool Must Be At Least 24 Tb Of Pure Binary Capacity (In The Case Of Using Protection Against The Failure Of One Disk), Excluding Deduplication, Compression And Other Reduction Mechanisms. Part Of The Public Subject
Contact Information
Address
Ocelíkova 672/1
Contact No.
+420 267902111
Email
podatelna@praha11.cz
View Notice Now...
Fill Detail for Getting Instant Access
Download Tender Document / Tender Notice
Dear Sir,
Warm Greetings from TenderDetail.com !!
We have received Tender Document request for the TDR No : 108077221
Tender Notice along with it's Attachments ( Tender Document / Scan Image of News Paper)
sent to your Email Address :.
Please check your email for Tender Document.