135 Results (0 seconds)

Status: Awarded
Published Date: 24/08/2022
Closing Date: 20/05/2022
Value: £42,000
Penetration Testing for RWT - Royal Wolverhampton NHS Trust (RWT) has a requirement to engage a suitably qualified (CHECK, TIGER, CREST or equivalent) third party to perform penetration/application testing on 15 externally accessible IP addresses.

Status: Awarded
Published Date: 31/05/2022
Closing Date: 31/03/2022
Value: £24,504
CEH Licence -1521 - This licence covers internal business use for a number of data products we use in flood modelling and water resources modelling.

Status: Awarded
Published Date: 31/05/2022
Closing Date: 31/03/2022
Value: £20,000
Land Registry - National Polygon Dataset - Licence 22/23 - To re-procure National Polygon Dataset from HM Land Registry for 12 months

Status: Awarded
Published Date: 31/05/2022
Closing Date: 29/05/2022
Value: £17,340
Cybersecurity Services - Cybersecurity Systems

Status: Closed
Published Date: 17/05/2022
Closing Date: 31/05/2022
Value: neg.
CFGC DP1 - Provision of Enterprise Arrangement for Blancco Secure Data Drive Erasure Licensing and Support - The Council requires a supplier for the provision of Provision of Enterprise Arrangement for Blancco Secure Data Drive Erasure Licensing and Support. This contract will be for a period of 24 months with an option of further 12-month extension (at the sole discretion of the Council), commencing 20th June 2022 until 19th June 2024. Provision of Enterprise Licensing for Blancco Secure Data Drive Erasure Licencing, and support services for Licensing. The successful bidder must be an approved provider of Blancco Enterprise Secure Data Drive Erasure Licensing Services. The Council will be using its free to use e-tendering system (in-tend) for the administration of this procurement process and potential suppliers must register with the system to be able to express an interest. If you wish to express an interest in this opportunity please click on the following link to access https://in-tendhost.co.uk/birminghamcc/ and submit your details to register. You will then be sent details on how to log on which will enable you to download all relevant quotation documentation. If you are unable to register with In-tend or have any questions or problems on how to use this web site please either email us at: cps@birmingham.gov.uk or call CPS Helpdesk on 0121 464 8000. Your completed quotation submission should be returned by noon on 1pm on 31st May 2022 via the 'in-tend' system https://in-tendhost.co.uk/birminghamcc

Status: Awarded
Published Date: 12/05/2022
Closing Date: 06/03/2020
Value: £34,000
HSE and Azure Consultancy - Supplier will provide consultancy to assess the gaps in capability and make recommendations for the forward approach. Supplier will provide a Security Architect and an Azure Architect to perform the majority of the work

Status: Closed
Published Date: 06/05/2022
Closing Date: 20/05/2022
Value: £42,000
Penetration Testing for RWT - Royal Wolverhampton NHS Trust (RWT) has a requirement to engage a suitably qualified (CHECK, TIGER, CREST or equivalent) third party to perform penetration/application testing on 15 externally accessible IP addresses.

Status: Awarded
Published Date: 05/05/2022
Closing Date: 15/03/2022
Value: £30,810
UK SBS - DDaT22183 - Network Security/Firewall - ***Please note this is an award notice, not a call for competition*** UK Research and Innovation (UKRI) had a requirement for the provision of Network Security/Firewall hardware and additional support. This has been sourced via a Competitive quotation procedure.

Status: Awarded
Published Date: 14/04/2022
Closing Date: 22/03/2022
Value: £67,983
Privilege Access Management (PAM) - Privilage access management

Status: Closed
Published Date: 14/04/2022
Closing Date: 22/04/2022
Value: neg.
Privilege Access Management PoC - Opportunity Outline: PAM (Privileged Access Management) is an additional security measure that can be placed in front of a system administration interface. Her Majesty's Courts and Tribunals Service (HMCTS) intend to run a pro bono proof of concept (POC) process to better understand how PAM can help protect the department. What is PAM: PAM is based on two central concepts: Just in time Administration and Just enough Administration. Just in time Administration: No assumed access is granted; Request access must be made. A Temporary credential is given to the system administrator through workflow. Just enough administration: Just enough Administration is another way of describing the concept of least privilege. Benefits of PAM: It will make it more difficult for an attacker to pivot into critical services, from an already compromised management access workstation. It will introduce an additional source of auditing, making it easier to identify misuse of administration interfaces. This will act as a strong deterrent against the insider threat, where a legitimate system administrator may consider abusing their access. It will introduce additional guard rails to help system administrators. They will hold less responsibility to protect their access credentials. It will help protect them from accidentally making unintended changes. Privilege Access Management would be an Enterprise level initiative covering all business areas that are part of the strategic roadmap, however the initial focus is on two groups within HMCTS. This contract opportunity only covers the pro bono POC. Hence, it will be for a pro bono contract. Proof of Concept: HMCTS wish to run one POC with two suppliers, to understand if a third-party security tool would be of any benefit to HMCTS systems. The POC is envisioned to last up to 3 months and be carried out asap. High Level Requirements to be used for the POC: The Key requirements that operate as a baseline for mitigation of the Cyber risks are: Just-in-time Administration Request access - workflow Approval process Just enough Administration (Least privilege) Full system level/ global admin privilege should be an exception Definition of role-based access management Strong logging and auditing Logging keystrokes which could leverage behavioural analytics Session recording Centralisation Policy management and roll out Reporting / metrics - BI Based Periodical user entitlement reviews