It Services: Consulting, Software Development, Internet And Support – Procurement Of An Mxdr Security Solution. The Endpoint Software (Agent) Should Meet The Following Key Points: - Proactive, Comprehensive Endpoint Protection Under The Above-Mentioned Operating Systems With The Expected Local Protection, Detection And Automatic Response Components Of An Endpoint Security Solution - Device Control: Access Blocking Of Usb Floppy Drives, Usb Mass Storage Devices, Optical Drives, Portable Mobile Devices And Webcams To Ensure Policy Specifications Including A Temporary And Permanent One Exception-Based Release Of Blocked Devices - Additional Detection Of Complex Attack Patterns Across The Entire Geo-Onboarded Customer Environment As Well As Detection Of Attack Propagation In The Customer Environment - Inclusion And Linking Of Multiple Sensor Sources To Detect Complex Attacks. Additionally, It Should Be Noted The Fact That We Have Our Virtual Windows Clients Generated From A So-Called Gold Image Via Omnissa Horizon. This Means That When You Log In To Omnissa-Horizon, The Machines Are Regenerated Ad Hoc From A Copy Template And Are Completely Discarded Again At The End Of The Day When You Log Out. The Software Solution Must Therefore Be Able To Deploy The Agent To The Virtual Machine When The Machine Is Created In The Login Process, To Recognize And Identify It Clearly In The Management Console Of The Software And To Delete The Entry From The Management Console Again After The User Logs Out Or The Machine Is Discarded, So That There Are No Double Entries And Uncounted Card Files In The Software. The 24/7 Managed Service Should Meet The Following Key Points: - 24/7 Security Operations Manager / Personal German-Speaking Contact For Security Questions And Technical Support - Multi-Stage Remote Onboarding Workshop With Security-Relevant Risk Education - Individual Configuration And Exception Management By Providers - Support With Rollout Via Standard Software Distribution Systems With Individualized Setup - Support In Configuring Proxy Environments For Download Load Distribution - Baseline Analysis By Providers In Order To Ensure Normal To Distinguish Between Malicious Behavior In The Network - Telephone Notification Of Critical Security Incidents And Recommendations For Action - 24/7 Detect & Response Service By Experienced Security Analysts - Alert Monitoring And Incident Analysis Based On Security Events - Proactive False Positive Handling And Exception Management - Log-Based Threat Hunting - Remote Analysis Of Security Incidents Via Live Terminal - Containment Of Attack Spread, Such As Network Isolation - Cleaning Up Of Persistent Malware Artifacts By Security Analysts All Agent And Service Features Listed Are To Be Understood As Rough Features And Requirements For The Solution And Will Be Further Specified And Evaluated As Part Of The List Of Services That Follows Later.
Contact Information
Address
Jülicher Ring 32
Contact No.
+49 2251151337
Email
zvs@kreis-euskirchen.de
View Notice Now...
Fill Detail for Getting Instant Access
Download Tender Document / Tender Notice
Dear Sir,
Warm Greetings from TenderDetail.com !!
We have received Tender Document request for the TDR No : 106464987
Tender Notice along with it's Attachments ( Tender Document / Scan Image of News Paper)
sent to your Email Address :.
Please check your email for Tender Document.