Awarded
IWA SOC 2022 - IWA Security Operations Centre (SOC) as a service 2022
Descriptions
a)IWA seeks responses for the provision of a Managed SOC Service (Lot A) that can provide both Microsoft Office365 Monitoring and Network Monitoring, a SIEM Security Information and Event Management Solution (Lot B), and a Data Governance Solution (Lot C) in accordance with the specification and criteria outlined throughout this document and in section 6 Project Overview & Specification. IWA seeks pricing for a Managed SOC service to support and bolster our in-house Information Security SOC function, operating a hybrid model. IWA seeks to layer security tools and services for best-in-class security operations and data governance.
Timeline
Published Date :
Deadline :
Tender Awarded :
Awarded date :
Contract Start :
Contract End :
Tender Regions
CPV Codes
72700000 - Computer network services
35721000 - Electronic intelligence system
79710000 - Security services
48732000 - Data security software package
72212732 - Data security software development services
72212731 - File security software development services
72315100 - Data network support services
48730000 - Security software package
79700000 - Investigation and security services
Keywords
electronic intelligence system
ELINT system
signals intelligence
electronic intercept system
signal monitoring
spectrum analysis equipment
electronic surveillance tools
communication interception
defense ELINT platform
passive signal collection
endpoint protection suite
firewall software
intrusion detection system
network security platform
virus & malware shield
encryption suite
vulnerability scanner
security audit tool
access control manager
system hardening software
data encryption engine
secure data storage
data loss prevention tool
database encryption module
secure data wiping software
tokenization engine
access control for datasets
data masking tool
privacy compliance suite
secure key management software
file encryption tools
secure file transfer modules
file access control systems
digital signature verification
file integrity checkers
secure archiving routines
tamper detection modules
permission management APIs
file shredding utilities
document security layers
data encryption modules
anonymization tools
secure data transmission protocols
tokenization systems
compliance-based access control
intrusion detection systems
real-time data protection
data loss prevention (DLP)
secure backup encryption
audit trail generation
network ticketing response
endpoint connectivity checks
live troubleshooting
port testing
physical cabling support
VPN diagnostics
router assistance
data link support
client/server connection help
downtime intervention
network configuration
LAN/WAN setup
data transmission support
network architecture
secure communication infrastructure
connectivity solutions
IP routing services
wireless network deployment
network traffic control
enterprise network integration
investigation and security services
detective services
private investigation
security consulting
risk investigation
surveillance operations
background checks
investigative support
security analysis
investigative monitoring
security services
guarding services
property protection
asset security
premises security
security officer deployment
static guarding
mobile patrol
corporate security
infrastructure security
Tender Lot Details
2 Tender Lots
Workflows
Status :
Procedure :
Suitable for SME :
Nationwide :
Assign to :
Tender Progress :
Details
Notice Type :
Tender Identifier :
Tenderbase ID :
Low Value :
High Value :
Buyer Information
Name :
Procurement contact
Name :
Phone :
Email :
Possible Competitors
1 Possible Competitors