Closed
TUSLA_ICT_16052023 - Request for Tender for the provision of Cyber Security Advisory Services (1)
Request tender documents
Save your time. You just request and we will send you the available documents.
Request for bid service
Save your time. You just request and we will arrange tender related all available documents to bid writers for the best possible quote.
Descriptions
Tusla requires the services of a specialised information/cyber security partner to provide expert advice and supporting services in delivering the organisation’s Information security programme. The range of services which may fall under this tende ....see more
Timeline
Published Date :
Deadline :
Contract Start :
Contract End :
Tender Regions
CPV Codes
72800000 - Computer audit and testing services
72700000 - Computer network services
79710000 - Security services
35121000 - Security equipment
72212730 - Security software development services
72212732 - Data security software development services
48730000 - Security software package
Keywords
locks
alarms
safes
IT auditing
mobile patrol
security systems
asset security
static guarding
software testing
encryption suite
risk evaluation
LAN/WAN setup
surveillance gear
anonymization tools
IP routing services
corporate security
network configuration
virus & malware shield
security accessories
digital quality control
property protection
penetration testing
premises security
infrastructure security
vulnerability scanner
audit trail generation
cybersecurity assessment
security hardware
firewall software
security equipment
network traffic control
biometric devices
security audit tool
connectivity solutions
hardware diagnostics
network architecture
security services
guarding services
access control manager
tokenization systems
secure backup encryption
data encryption modules
security auditing tools
access control system
secure coding practices
enterprise network integration
threat detection algorithms
encryption engine development
system hardening software
system certification support
compliance-based access control
digital certificate handling
vulnerability scanning tools
network security platform
cybersecurity programming
secure communication infrastructure
data transmission support
secure data transmission protocols
wireless network deployment
intrusion prevention logic
secure authentication modules
endpoint protection suite
data loss prevention (DLP)
system compliance verification
intrusion detection system
regulatory audit preparation
real-time data protection
security officer deployment
Workflows
Status :
Procedure :
Suitable for SME :
Nationwide :
Assign to :
Tender Progress :
Details
Notice Type :