Procurement News - Latest Tenders News & Updates

Get latest Procurement news & updates on Bid Detail. Set Alert for Upcoming Global procurement News & New Tender News worldwide. Search International & Global Procurement News & Tender news on Bid Detail.

1.

Dubai Municipality to submit 4 tenders .. and the closure of 15

Dubai Municipality has announced four public tenders, including pest control at Dubai Safari, the supply of frozen food and live animals such as food at Dubai Safari, internal and external cleaning se ......

  • United Arab Emirates
  • Other Industries
  • 24 May 2018
view notice less notice
Description Dubai Municipality has announced four public tenders, including pest control at Dubai Safari, the supply of frozen food and live animals such as food at Dubai Safari, internal and external cleaning services for the Safari, and the anti-virus and malware project. And set April 15 to close the receipt of offers, and April 16 to open the envelopes, inviting national institutions and companies owned by the national 51% specialized and licensed in the emirate to participate. The cost of purchasing documents for the Pest Control Services project at Dubai Safari was AED 300, with a primary guarantee of AED 20,000, a frozen food supply and live animals food for Dubai Safari for AED 300 for the purchase of documents, At Safari AED 1,000 purchase fee documents, 400,000 initial security value, antivirus and malware project AED 300 worth of documents, and AED 10,000 initial security value. Requirements The municipality stipulated that the companies and establishments that are not registered and are willing to participate in the tenders submitted by the municipality should register directly through the municipalitys website. GRB on site for payment of fees electronically, non-refundable, and must not be less than 90 days from the date of opening the envelopes can be extended for another 30 days. The offer must be made electronically through the website and accompanied by a copy of an unconditional bank guarantee letter issued by a local bank according to the stated values. It shall be valid for 120 days from the date of submission of the offer and may be extended for another 30 days if necessary. In the opening session of the envelopes on time, and can be inquired about the technical and contractual matters of these tenders through the website, and in the event of access to the system can be reviewed Ahmed Mahmoud on 042064584
Industry Other Industries
Source https://www.albayan.ae/across-the-uae/news-and-reports/2018-04-01-1.3225772
2.

eScans Range of Products now available on Government e-Marketplace (GeM)

eScan Enterprise Security has announced that their IT security products and solutions will now be available on Government e-Marketplace. This is one such initiative by eScan to ensure that IT security ......

  • India
  • Information Technology
  • 09 Mar 2018
view notice less notice
Description eScan Enterprise Security has announced that their IT security products and solutions will now be available on Government e-Marketplace. This is one such initiative by eScan to ensure that IT security becomes an essential and integral part of every business unit handled by the Government of India. Launched in August 2016, GeM is an online market platform to facilitate procurement of goods and services by various Ministries and agencies of the Government. It aims to enhance transparency, efficiency and speed in public procurement of goods and services and eliminate corruption. Ms Shweta Thakare, Senior AVP, Government and PSU Business speaking on this initiative she said, "The IT landscapes are highly competitive as well as innovative, due to its inherent quality of frequently changing technology. This change also brings new business opportunities in terms of upgrades of technology and reaching out to the audience in innovative ways. We are honoured and delighted to take up this new challenge and responsibility to provide eScans unique range of products and solutions via GeM" she further added. Mr Govind Rammurthy, MD & CEO, eScan added, "eScan, in its relentless efforts to provide robust security and protection from growing cyber threats, has been constantly innovating ways to reach out to the audience and to be at the forefront of IT security solution for next-gen threats and stay ahead of its peers. He further added that "I am confident that with our innovative security solutions, rapid deployment expertise and 24x7 customer support, eScan Enterprise Security solutions will soon be an integral part of IT security for Government and PSUs across India." eScans range of products and security solutions can be found on https://gem.gov.in/ under the Anti-Virus products category. The products and solutions are specifically designed for Businesses, Enterprises and Large Corporate Houses to ensure comprehensive endpoint security to safeguard against Malware, Ransomware, Productivity Management, and Data Leaks (DLP).
Industry Information Technology
Source https://www.gizbot.com/news/escan-range-products-now-available-on-gem-048818.html
3.

eScan’s range of products and solutions now available on Government e-Marketplace

eScan Enterprise Security, as a part of its vision 2020 has announced that their IT security products and solutions will now be available on Government e-Marketplace. This is one such initiative by eS ......

  • India
  • Information Technology
  • 08 Mar 2018
view notice less notice
Description eScan Enterprise Security, as a part of its vision 2020 has announced that their IT security products and solutions will now be available on Government e-Marketplace. This is one such initiative by eScan to ensure that IT security becomes an essential and integral part of every business unit handled by the Government of India. Launched in August 2016, GeM is an online market platform to facilitate procurement of goods and services by various Ministries and agencies of the Government. It aims to enhance transparency, efficiency and speed in public procurement of goods and services and eliminate corruption. As a key member of eScan management team, Shweta Thakare, Senior AVP, Government and PSU Business, has been instrumental in successfully handling many initiatives instrumental to achieve eScan’s vision 2020 to be in the top list of IT security solutions. Speaking on this initiative she said, “The IT landscapes are highly competitive as well as innovative, due to its inherent quality of frequently changing technology. This change also brings new business opportunities in terms of upgradation of technology and reaching out to the audience in innovative ways. We are honored and delighted to take up this new challenge and responsibility to provide eScan’s unique range of products and solutions via GeM.” Govind Rammurthy, MD & CEO, eScan added, “eScan, in its relentless efforts to provide robust security and protection from growing cyber threats, has been constantly innovating ways to reach out to the audience and to be at the forefront of IT security solution for next-gen threats and stay ahead of its peers. I am confident that with our innovative security solutions, rapid deployment expertise and 24×7 customer support, eScan Enterprise Security solutions will soon be an integral part of IT security for Government and PSUs across India.” eScan’s range of products and security solutions can be found on https://gem.gov.in/ under the Anti-Virus products category. The products and solutions are specifically designed for Businesses, Enterprises and Large Corporate Houses to ensure comprehensive endpoint security to safeguard against Malwares, Ransomwares, Productivity Management, and Data Leaks (DLP).
Industry Information Technology
Source https://www.crn.in/news/escans-range-products-solutions-now-available-government-e-marketplace/
4.

Government to Introduce Preferential Public Procurement for Cybersecurity Products

NEW DELHI: The government is planning to introduce preferential treatment for cyber security products in public procurement. The ministry of electronics and IT (MEITY) has released a draft notificati ......

  • India
  • Information Technology
  • 27 Sep 2017
view notice less notice
Description NEW DELHI: The government is planning to introduce preferential treatment for cyber security products in public procurement. The ministry of electronics and IT (MEITY) has released a draft notification proposing preference for domestically manufactured or produced cybersecurity products for public procurement. The draft has invited comments by October 11. The preferential procurement will be applicable on a wide range of products such as those used for advanced authentication, content protection, DoS and DDoS protection among others The draft follows the Public Procurement {Preference to Make in India) Order issued by the Department of Industrial Policy and Promotion (DIPP) in June to encourage Make in India. This was done to "promote manufacturing and production of goods and services in India with a view to enhancing income and employment," the ministry said on its website. The draft has defined a cybersecurity product as a product or appliance or software manufactured for the purpose of maintaining confidentiality, availability and integrity of information by protecting computing devices, infrastructure, programmes, data from attack, damage, or unauthorized access. it added that companies that will qualify as local suppliers will have to be incorporated and registered in India as governed by the applicable Indian Act. Also, the revenue from the products in the Indian geography and revenue from Intellectual Property (IP) licensing should accrue to the same company in India. it added that the local supplier at the time of tender, bidding or solicitation shall provide self-certification that the item offered meets the definition of local supplier and in cases of procurement above Rs. 10 crores, a certificate from the statutory auditor or cost auditor of the company will have to be provided. Some of the other products which have been included in the list are Big Data Analytics. Secure Access, Web Security, Antivirus/ Antimalware and Mobile Payment.
Industry Information Technology
Source http://economictimes.indiatimes.com/tech/software/government-to-introduce-preferential-public-procurement-for-cybersecurity-products/articleshow/60843739.cms
5.

WC grad hits big time with gaming software

The tech wares of a Warren Central High School student will soon hit the shelves of two of the largest video game retailers in the country. Seventh Knight Inc. CEO Luke Koestler said his company ha ......

  • United States
  • Information Technology
  • 15 Oct 2016
view notice less notice
Description The tech wares of a Warren Central High School student will soon hit the shelves of two of the largest video game retailers in the country.

Seventh Knight Inc. CEO Luke Koestler said his company has two products in 5,300 GameStop locations across the United States and will soon have those products available on Steam, a PC game and software purchasing website.

“To put it into perspective, we’ll be sitting on shelves with a couple of other solutions from billion-dollar companies. There are really no small companies that produce antivirus that sit on retail shelves, so that’s why we feel it’s significant,” Koestler said.

The two products, which will also be available on GameStop’s online store, include the second version of Gaming Accelerator, a product that “devotes all your resources to that game so they play smoother and function better” and Seventh Knight PC Security, a “new type of antivirus security.”

“(Gaming Accelerator) was successful enough last year that they picked up this product line,” Koestler said.

He added the “big news” on the Seventh Knight PC Security is its availability for individual use.

“We brought up the idea of a new type of antivirus (software) based on our software for big business and government but scaled down for people’s home machines to address the growing threat of ransomware because their really wasn’t anything on the market that would address it for home use.

“It replaces antivirus software, whatever a person is currently using to scan their computer and clean up viruses. It will prevent all the other junk, like viruses and malware, but it also prevents ransomware. Someone who uses their PC for work or gaming can go into a GameStop Store, replace their product with ours for $40 a year on all their PC devices and not have to worry about that stuff.”

Friends and family experiencing issues with ransomware, which blocks access to a computer until a sum of money is paid to unblock it, prompted him to create the personal antivirus software.

“Just being in the tech field, friends and family would call whenever they had problems with their PCs, and we were addressing so much ransomware just with friends and family that we decided we had the ability to help and we wanted to help on the national level,” he said.

The company, which Koestler started at age 19 and is now going on 17 years old, is already looking forward, he said.

“Steam and GameStop are the largest outlets for a product like this on the home market so our next step is to launch our new enterprise software for government and big companies, which essentially does the same thing but for organizations of that size,” he said.
Industry Information Technology
Source http://www.vicksburgpost.com/2016/09/09/wc-grad-hits-big-time-with-gaming-software/
6.

10 Tips to Make Your MacBook Run as Fast as Usain Bolt

Nobody wants a machine that reminds them of a slug. It’s the worst.What’s worse than dragging yourself through the mud? The world demands A LOT from us and our machines. Improving your machine spee ......

  • United States
  • Information Technology
  • 15 Oct 2016
view notice less notice
Description Nobody wants a machine that reminds them of a slug. It’s the worst.What’s worse than dragging yourself through the mud? The world demands A LOT from us and our machines.

Improving your machine speed is as easy as hitting up DuckDuckGo. Others? Well, they involve getting more storage. But, this, too, can backfire (especially if you’re a packrat like me). Speeding up your Macbook (or any laptop) is as easy as 1-2-3. Here are several things you can start (today) to be on your merry way towards a sailing-smooth machine.

1. Don’t Put Your MacBook on Your Lap
If those things fry? It’s a quick trip to the repair shop. And you’re out another $100.

I was guilty with my first laptop (an HP; I’ve fixed the error of my ways) of sitting it on the bed. On top of a silky-thick afghan. In the middle of summer.

Not good. Not good at all.

2. Restore Once a Year
MacbBooks and laptops (and desktops) will run their peak performance the first instance it’s running. The very first time you turn them on, they’re running the best they ever will.

Backup your important files to an ex. HDD (you can buy a 1TB for $80 online) and restore your MacBook/laptop.

Oh, and make sure you have a bootable USB install drive of your latest OS. You can usually find driver updates on the manufacturer’s website.

3. Cut Down on Browser Tabs
One of my colleagues has over 14 tabs – and they’re pinned! This means 14 sites are all ready in his tabs. Imagine how many times your CPU takes a hit loading up those tabs which are always running. It is wise to close applications which are not being used to free some CPU (processor) & RAM (memory), so that it can power other applications being used during the time.

You should also check applications that are running in the background. Press Win+R, type “msconfig” (without quotes) & hit enter. This will open up a small window. Check “services” and “startup” tabs to see if there are applications that are hiding behind the scene and consuming much of your PC’s energy. Un-tick these crooks, that hampers your work. Save & Restart!

4. Find Your Battery Cycle Count
Each MacBook has a different cycle count (maximum). This count helps you figure out when your battery needs to be switched for a fresher, more “youthful” one that can handle what’s happening now.

You can find your cycle count easily: Just hold down the Option key while clicking the Apple icon on your upper left-hand corner. Go to System Information > Power. Find your cycle count in Health Information. Once you see your current cycle count, find out your max count by heading over to Apple.

5. Update Your Software
Manufacturers aren’t telling you to update all the dang time just to annoy you. Those nuisances serve a purpose: to keep you safe. Manufacturers continually upgrade (and improve) their programs/software to protect against aging, keeping up with the “we need it now” world… and not to mention the safety/protection upgrades.

6. Cool Down
Keeping your baby cool a few degrees (anywhere between 2 to 7 degrees) can save you YEARS. The normal heat of a MacBook runs a steady 50 to 95 degrees F (10 degrees to 35 degrees C). That’s without gaming. Buy yourself a laptop fan or cooler – I bought one for $25 for my NEW laptop…and have had it for seven years.

This coming after a series of laptops and Macbooks that crapped the bed after a few years.

Bonus: If you don’t want to shell out for a full laptop cooler, you can make your own.

7. Plug-In That Silicone
These handy dandy little plugs go into all the exposed ports – keeping dust particles and what-have-you out of them.

Think about it: those wide open spaces where anything and everything that’s small enough… crawling through your hardware?

Yeah, your machine is going to slow down because of all that build-up and poor ventilation.

8. Invest in a Lap Desk
To put it simply: a lapdesk is rifled with ventilated holes – allowing your precious to breathe easily and smoothly. Laptop coolers have one or more fans (usually USB generated) that dissipate the heat.

While you shouldn’t use a conventional laptop cooler directly on your lap (unless you grab one of those cool ergonomic ones)… since the dissipating heat needs to go somewhere… a lap desk sits your MacBook inches off your lap – allowing your baby to breathe freely.

9. Buy SSD – Fast.
This day and age, you probably know all about SSDs and how hardcore they are, when compared to slow and sluggish (and outdated) HDDs. But, just in case you need a little reminder why millions of people have struck oil when they made the switch to SSD.

Don’t take my word for it: as HowToGeek reports, you just have to look at the results.

And take a look at one of the best-selling SSDs: The Samsung EVO. Over 10,000+ people (including me) can’t be wrong about something that costs around $100+. This (Samsung 850 EVO) came with all new desktop PC at my office and without surprise they are beating the hell out of HDD-desktops and Usain.

10. Regularly Run AVs And AMs
Think trojan horses, backdoors, keyloggers, and spyware. They’re ALL “malware.” Technically. But thanks to the “worldwide virus scare” a couple years ago – a few marketing heads got together and thought selling protection programs called “Antivirus Programs” would sell big.

And they did.

AVG, Avira, Avast, Kaspersky. There’s a whole world of anti-virus programs out there, as you probably know. Whatever you choose, it’s a no-brainer that regularly updating the definition base of your antivirus program AND scanning (weekly)… is the number 1 safest way of protecting your baby from the evil, evil world.

Anti-Malware programs? They’re just a matter of keeping your PC even safer in addition to AV programs. Regularly updating your AM program (I personally use Malwarebytes) on top of regularly updating your AV… and scanning weekly (not at the same time)… is like protecting your laptop/Macbook from school bullies.

Everybody wants their machine to run faster, for longer, and handle more tasks efficiently. Especially in this rat race world. I hope you implement these tips so you can find yourself at the head of an almost-brand-new machine.
Industry Information Technology
Source http://tech.co/tips-speeding-up-macbook-2016-09
7.

Intel flogs McAfee security unit at a whopping $3.5bn loss

INTEL HAS sold the Intel Security business for $3.5bn less than it paid for it six years ago. Intel Security, previously and better known as McAfee, has been sold to private equity firm TPG for $4. ......

  • United States
  • Financial Services
  • 15 Oct 2016
view notice less notice
Description INTEL HAS sold the Intel Security business for $3.5bn less than it paid for it six years ago.

Intel Security, previously and better known as McAfee, has been sold to private equity firm TPG for $4.2bn, despite Intel paying $7.7bn for it in 2010.

The chip firm will receive $3.1bn in cash as part of the transaction and retain a 49 per cent minority stake. TPG will take control with a 51 per cent stake, and will invest $1.1bn in the company.

Intel Security is based on the McAfee business and was renamed two years ago. The company will revert to the better known McAfee brand, despite John McAfee reportedly suing Intel over the use of his name.

The transaction is expected to close in the second quarter of 2017, and Chris Young, general manager of Intel Security Group, will become CEO of McAfee.

Young described TPG in an open letter to stakeholders as a "seasoned technology investor" that was "attracted to our current momentum and long-term potential".

He claimed that McAfee currently protects "more than a quarter of a billion endpoints" and more than 200 million consumers, and is present in two thirds of the world's 2,000 largest companies.

Intel CEO Brian Krzanich claimed that, despite the sale, security "remains important in everything we do at Intel".

"We will continue to integrate industry-leading security and privacy capabilities in our products from the cloud to billions of smart, connected computing devices," he added.

Bryan Taylor, a partner at TPG, said that the company had "long identified the cyber security sector, which has experienced strong growth due to the increasing volume and severity of cyber attacks, as one of the most important areas in technology".

Intel's acquisition of McAfee Security in 2010 was intended to enable the company to beef up security around PCs and sell McAfee antivirus and other security software around its core business.

However, the combination never worked as the money to be made in the security business became increasingly focused on the data centre and cloud computing. µ
Industry Financial Services
Source http://www.theinquirer.net/inquirer/news/2470227/intel-flogs-mcafee-security-unit-at-a-whopping-usd35bn-loss
8.

John McAfee’s company could spoil the party for Intel’s new venture

Intel’s plans to spin out its security business under the McAfee name could be clouded by the plans of security expert and businessman John McAfee, who claims he had not assigned the rights to his per ......

  • United States
  • Information Technology
  • 15 Oct 2016
view notice less notice
Description Intel’s plans to spin out its security business under the McAfee name could be clouded by the plans of security expert and businessman John McAfee, who claims he had not assigned the rights to his personal name.

The chip maker said Wednesday that it had signed an agreement with TPG for a deal that would see its Intel Security business as a separate cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm. Intel would also receive US$3.1 billion in cash. The new company would be named McAfee.

Earlier, Intel had written to MGT Capital Investments, a company of which John McAfee is executive chairman and CEO, of its plans to change its name to John McAfee Global Technologies.

In its letter, produced in court by John McAfee, Intel has asked for confirmation that MGT will not change its name “to one that includes the MCAFEE trademark or otherwise use the MCAFEE name as a trademark.” Intel, which acquired security company McAfee in 2011, warned that if MGT went ahead with its plans for a name change, it will take legal action to protect its trademark rights.

In the letter dated June 3, Intel said it had learned from MGT’s press releases that it was acquiring anti-spy software company D-Vasive. The use of the McAfee name would create confusion as to the origin of its products and suggest some affiliation with Intel and McAfee, which does not exist.

John McAfee and MGT have meanwhile filed a suit in the U.S. District Court for the Southern District of New York, asking the court for a judgment declaring that "their use of or reference to the personal name of John McAfee and/or McAfee in their business," particularly in the renaming of MGT, does not infringe on Intel’s trademark rights or breach any agreement between the parties.

John McAfee states in the filing that he entered in 1991 into an agreement with McAfee Associates to transfer certain assets to it in exchange of stock and a promissory note, but at no point did he “assign the rights to his personal name, via assignment of trademark or otherwise, or agree to restrict his right to do business using his own name.”

At the time of the agreement, John McAfee had not filed for or registered the trademark to “John McAfee” or “McAfee” or any other variation of the name, according to the filing. A review of the trademark database of the U.S. Patent and Trademark Office show eight marks involving the word McAfee in conjunction with computers. But none refer to John McAfee, who claims that Intel "never consulted, requested or otherwise obtained the permission of McAfee to use his last name as part of Defendants’ Marks on its products," according to the filing.

“In truth, when I formed McAfee Inc I signed over only the name ‘McAfee Antivirus,’” John McAfee told Newsweek this week. Intel could not be immediately reached for comment.
Industry Information Technology
Source http://www.cio.com/article/3117830/john-mcafee-s-company-could-spoil-the-party-for-intel-s-new-venture.html
9.

Concern over rising attacks on cellphones

Cellphones are increasingly under attack from ransomware‚ spyphone applications‚ SMSt rojans ‚ personal information theft and aggressive adware. This is of serious concern because increasing amount ......

  • United States
  • Information Technology
  • 15 Oct 2016
view notice less notice
Description Cellphones are increasingly under attack from ransomware‚ spyphone applications‚ SMSt rojans ‚ personal information theft and aggressive adware.

This is of serious concern because increasing amounts of sensitive personal and business information are now stored on smartphones around the world.

Mobile device infections rose96% in the first half of the year‚ a Nokia malware report issued yesterday shows.

“Malware is becoming more sophisticated‚ utilising multiple methods to bypass safe guards and take permanent control of devices‚” Nokia said.

Mobile game infections are capitalising on popular trends.

Smartphone infections nearly doubled between January and July compared to the latter half of last year‚ with smart phones accounting for 78% of all mobile network infections.

The malware infection rate hit an all-time high in April‚ with infections striking one out of every 120 smartphones.

Devices based on the Android operating system were the most targeted by far‚ re p -resenting 74% of all mobile malware infections compared to Window-PC systems (22%)‚and other platforms‚ including iOS devices (4%).

The report also highlighted the emergence of new‚ more sophisticated malware that can be more difficult to detect and remove.

The top three cellphone threats ‚ which account for 47%of all detected mobile infections‚ are: Uapush‚ Kasandra and SMS Tracker.Highly sophisticated forms of malware are attempting to take permanent control of users’ devices.

They are: RIP, Humming Bad, Ghost Push and Viking Horde.

Nokia said the monthly infection rate in residential fixed broadband networks reached an average of 12% in the first half of the year‚ compared with11% late last year‚ primarily due to an increase in “moderate threat level adware”.

These are mostly due to malware on Windows PCs and laptops in the home‚ but also include infections on smart phones using home WiFi.

Nearly 40% of consumers have been victims, yet less than 50% of consumers have anti-virus software on their phones.
Industry Information Technology
Source http://www.heraldlive.co.za/business/2016/09/06/concern-rising-attacks-cellphones/
10.

Con artists use pop-ups to scam Microsoft users

Hackers do not always have to break into your computer to rip you off, sometimes you let them in. Stacia Gates says she was on her computer when a pop-up appeared and said it was from Microsoft. He ......

  • United States
  • Information Technology
  • 03 Sep 2016
view notice less notice
Description Hackers do not always have to break into your computer to rip you off, sometimes you let them in.

Stacia Gates says she was on her computer when a pop-up appeared and said it was from Microsoft. Her Microsoft computer immediately froze and the pop-up directed her to call the number on her screen to fix the problem.

Once Gates called the number, a man said he was from Microsoft and needed to get inside her computer. She decided to give him access. But the man was not from Microsoft.

“I did not have control of the computer any longer, he did,” said Gates.

Hemu Nigam, cyber security expert, says it is an old scam that is reappearing in a big way. Since 2014, Microsoft has heard from over 175,000 customers complaining about tech support scams. The con artists often ask for payment to fix your computer.

“At that point they got your credit card, they got your expiration date, they got your home address and they got your first and last name and they got the cc code on your card,” said Nigam.

Con artists are not only posing as Microsoft employees, but as tech support for Apple.

Cyber security experts say there are ways to protect yourself.

Never call a phone number on a pop-up. Never give a stranger access to your computer. Make sure to update anti-virus programs and your operating system software.

Gates says she realized there was something wrong when the man on the phone asked if she did banking on the computer.

“Bingo, a light bulb just hit me, it just went off and I thought, what have I done,” said Gates.

Gates says she immediately hung up. After the incident she says she thinks twice when she sees a pop-up.
Industry Information Technology
Source http://www.kmov.com/story/32901935/con-artist-use-pop-ups-to-scam-microsoft-users

Filter Procurement News

Top