Awarded
ET2102 - Provision of ICT Security & Infrastructure Services to the RSA
Descriptions
The RSA is seeking tender from interested parties with the intention of awarding a contract under each of the following lots:Lot 1: ICT Managed Security Services;Lot 2: ICT Infrastructure Support Services;(each a “Lot” and together “the Lots”).Tenderers are now invited to submit tenders for one or both of the Lots.Any contract that may result from this competition will be for a period of 3 years, with option to extend by a period of up to 2 years, with a maximum of three such extensions to a maximum duration of 9 years.Further information can be found in the RFT documents attached to this notice in the Lot 1 folder.
Timeline
Published Date :
Deadline :
Tender Awarded :
Awarded date :
Contract Start :
Contract End :
Tender Regions
CPV Codes
72000000 - IT services: consulting, software development, Internet and support
72220000 - Systems and technical consultancy services
48732000 - Data security software package
72100000 - Hardware consultancy services
72212730 - Security software development services
72600000 - Computer support and consultancy services
72212732 - Data security software development services
72212731 - File security software development services
72250000 - System and support services
48730000 - Security software package
48731000 - File security software package
Keywords
endpoint protection suite
firewall software
intrusion detection system
network security platform
virus & malware shield
encryption suite
vulnerability scanner
security audit tool
access control manager
system hardening software
file encryption tool
secure file vault
access permission manager
file integrity checker
secure erase utility
digital rights management software
secure file sharing system
file audit logging
encrypted container manager
file-level antivirus
data encryption engine
secure data storage
data loss prevention tool
database encryption module
secure data wiping software
tokenization engine
access control for datasets
data masking tool
privacy compliance suite
secure key management software
IT consulting
software development
web services
network support
system integration
IT infrastructure management
digital transformation
cloud services
cybersecurity support
application maintenance
helpdesk services
technical support
software customization
IT outsourcing
hardware consultancy
IT equipment planning
technology advisory
hardware architecture design
equipment selection
performance benchmarking
procurement advisory
infrastructure specification
vendor evaluation
hardware lifecycle planning
cybersecurity programming
secure authentication modules
threat detection algorithms
access control systems
encryption engine development
security auditing tools
intrusion prevention logic
secure coding practices
digital certificate handling
vulnerability scanning tools
file encryption tools
secure file transfer modules
file access control systems
digital signature verification
file integrity checkers
secure archiving routines
tamper detection modules
permission management APIs
file shredding utilities
document security layers
data encryption modules
anonymization tools
secure data transmission protocols
tokenization systems
compliance-based access control
intrusion detection systems
real-time data protection
data loss prevention (DLP)
secure backup encryption
audit trail generation
system architecture analysis
technical advisory
solution feasibility studies
performance optimization
technical risk assessment
systems integration advice
IT infrastructure review
scalability consulting
technical requirement definition
systems audit
end-to-end system services
IT support framework
infrastructure maintenance
integrated system operations
tech assistance packages
full-cycle IT support
user support coverage
managed systems support
reactive and proactive IT services
IT support consulting
tech advisory services
systems assistance
computing guidance
technology troubleshooting consultancy
operational support advisory
technical IT consultancy
hybrid support services
professional tech consultation
systems aid
Tender Lot Details
2 Tender Lots
Workflows
Status :
Procedure :
Suitable for SME :
Nationwide :
Assign to :
Tender Progress :
Details
Notice Type :
Tender Identifier :
Tenderbase ID :
Low Value :
High Value :
Buyer Information
Name :
Procurement contact
Name :
Phone :
Email :
Possible Competitors
1 Possible Competitors