April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

January 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Library of Congress seeks possible sources for expanding its advanced threat detection system

Washington, DC, October 12 - The Library of Congress has released a Request for Information (RFI) in support of reviewing and potentially expanding its advanced threat detection and response capabilities of its security operations.

The objectives of these requirements are to arrive at a solution that provides the following:

  • Malware Sandboxing Capabilities
  • Centralized Analysis and Administration
  • Network File Share Sandbox Scanning
  • Network Threat Detection
  • Email Threat Detection
  • Intelligence Platform
  • Endpoint Threat Protection
  • Managed Security Services

The Library of Congress is requesting responses that detail solutions that meet or exceed the following requirements and provide a full description of services offered, methods of implementation, and scope of the solution.

  • General Requirements
  • Must be a single-vendor solution
  • Provide an informative and intuitive analyst console
  • Provide robust reporting features
  • Centrally manage alert forwarding via email
  • Centrally manage alert forwarding to SIEM solution
  • Integrate with Splunk
  • General email alerts for each alert type
  • Customize recipients for each alert type
  • Support native threat intelligence that feeds cross platform signature and detection mechanisms
  • Automatically update signatures and detection mechanisms
  • Integrate with Archer and Nessus scans for vulnerability rating
  • Provide a highly flexible and customizable policy for all platforms

The Library of Congress includes a list of other requirements -- including sandboxing; providing a centralized console; performing sandbox scans of network shares; detecting network threats; detecting email threats; an Intel platform; malware submission; endpoint; and managed services -- in its RFI, which is available on FedBizOpps.gov.

When responding to the RFI, businesses also must include the following information:

All interested businesses almost must have a valid System for Award Management (SAM) Registration. If you are not registered on SAM and are interested in bidding on government contracts, please call US Federal Contractor Registration, the world's largest third-party registration firm, at (877) 252-2700 ext. 1. One of its specialists can help register you with SAM.

Responses are due by November 4, 2015 at 2 p.m. via email to Arneed Dozier ([email protected]).


Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...