ARCYBER seeks Endpoint Security Solution as a Service

On August 16, the Army Cyber Command (ARCYBER) posted a sources sought notice for an endpoint security solution as a service. Responses are due by 4:00 p.m. Central on September 15.

ARCYBER is seeking information for potential sources for an Army Endpoint Security Solution (AESS) managed service capability.  As the information technology service provider for the Army, Network Enterprise Technology Command (NETCOM) plans, integrates, and protects the Army’s enterprise network. In executing this mission, Army Cyber Command (ARCYBER) seeks to improve visibility in the security of Army endpoints, regardless of operational domain, and to track compliance metrics providing robust asset protection and systems to appropriately detect and respond to cyber threats regardless of location or environments.

Background

As the information technology service provider for the Army, Network Enterprise Technology Command (NETCOM) plans, integrates, and protects the Army’s enterprise network. In executing this mission, Army Cyber Command (ARCYBER) seeks to improve visibility the security of Army endpoint regardless of operational domain, track compliance metrics, provide robust asset protection and systems appropriately detect and respond to cyber threats regardless of location. Environments. Management shall be executed quickly, effectively, with efficiency.

Objectives

The objective of this effort is to provide a managed solution that will deliver capabilities to drive improved security and reduced risk across the Army. This solution must meet the following broad objectives:

1) An Endpoint Protection solution that provides protection for all Army endpoints regardless of operating system

2) A Unified Asset Management solution that provides asset (endpoints and non-endpoints) visibility and management, to include compliance reporting and vulnerability tracking

3) An Extended Endpoint Detection and Response solution that unifies reporting from endpoint protection platforms with telemetry from other security and business tools to optimize threat detection, investigation, and response

4) A Threat Intelligence solution that will allow for ingestion of third-party and Government intelligence and integrated alerts based on that intelligence. All solutions must be able to integrate with the Army’s Big Data Platform, and must be able to provide seamless capability for local (on-premises), cloud, or hybrid environments.

Read the full sources sought notice from ARCYBER.

Source: SAM