Awarded
ET2102 - Provision of ICT Security & Infrastructure Services to the RSA
Request tender documents
Save your time. You just request and we will send you the available documents.
Request for bid service
Save your time. You just request and we will arrange tender related all available documents to bid writers for the best possible quote.
Descriptions
The RSA is seeking tender from interested parties with the intention of awarding a contract under each of the following lots:Lot 1: ICT Managed Security Services;Lot 2: ICT Infrastructure Support Services;(each a “Lot” and together “the Lots”).Tenderers are now invited to submit tenders for one or both of the Lots.Any contract that may result from this competition will be for a period of 3 years, with option to extend by a period of up to 2 years, with a maximum of three such extensions to a maximum duration of 9 years.Further information can be found in the RFT documents attached to this notice in the Lot 1 folder.
Timeline
Published Date :
Deadline :
Contract Start :
Contract End :
Tender Regions
CPV Codes
72000000 - IT services: consulting, software development, Internet and support
72220000 - Systems and technical consultancy services
48732000 - Data security software package
72100000 - Hardware consultancy services
72212730 - Security software development services
72600000 - Computer support and consultancy services
72212732 - Data security software development services
72212731 - File security software development services
72250000 - System and support services
48730000 - Security software package
48731000 - File security software package
Keywords
IT consulting
web services
network support
cloud services
encryption suite
systems aid
systems audit
IT outsourcing
performance optimization
IT support consulting
systems assistance
scalability consulting
tech assistance packages
vendor evaluation
anonymization tools
software development
cybersecurity support
application maintenance
data encryption engine
virus & malware shield
file shredding utilities
document security layers
full-cycle IT support
file integrity checker
privacy compliance suite
technical IT consultancy
file-level antivirus
secure data storage
procurement advisory
managed systems support
file audit logging
equipment selection
performance benchmarking
secure file vault
vulnerability scanner
secure erase utility
data masking tool
help desk services
digital transformation
IT infrastructure review
audit trail generation
technical support
IT equipment planning
tokenization engine
firewall software
tech advisory services
security audit tool
hardware consultancy
system integration
access control manager
software customization
tokenization systems
secure backup encryption
technical advisory
technology advisory
IT support framework
data encryption modules
security auditing tools
user support coverage
access control system
hybrid support services
file encryption tool
secure coding practices
tamper detection modules
computing guidance
technical risk assessment
secure archiving routines
IT infrastructure management
threat detection algorithms
encryption engine development
system hardening software
file access control systems
solution feasibility studies
compliance-based access control
digital certificate handling
vulnerability scanning tools
infrastructure specification
network security platform
access permission manager
cybersecurity programming
infrastructure maintenance
permission management APIs
secure file transfer modules
end-to-end system services
system architecture analysis
systems integration advice
professional tech consultation
secure data wiping software
secure data transmission protocols
access control for datasets
secure key management software
data loss prevention tool
intrusion prevention logic
secure authentication modules
endpoint protection suite
operational support advisory
database encryption module
technology troubleshooting consultancy
secure file sharing system
data loss prevention (DLP)
integrated system operations
reactive and proactive IT services
encrypted container manager
intrusion detection system
hardware architecture design
real-time data protection
digital signature verification
hardware lifecycle planning
technical requirement definition
digital rights management software
Tender Lot Details & Award Criteria
2 Tender Lots
Workflows
Status :
Procedure :
Suitable for SME :
Nationwide :
Assign to :
Tender Progress :
Details
Notice Type :
Tender Identifier :
Tenderbase ID :
Low Value :
High Value :
Buyer Information
Name :