Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY - FEDBIZOPPS ISSUE OF JUNE 21, 2015 FBO #4958
MODIFICATION

D -- Global Enterprise Fabric - Cloud Computing (LandWarNet) in support of NETCOM

Notice Date
6/19/2015
 
Notice Type
Modification/Amendment
 
NAICS
541512 — Computer Systems Design Services
 
Contracting Office
ACC-APG - Fort Huachuca, ITEC4 Contracting, Bldg. 61801, Room 3212, Fort Huachuca, AZ 85613-5000
 
ZIP Code
85613-5000
 
Solicitation Number
W91RUS15GEF1
 
Response Due
7/6/2015
 
Archive Date
8/18/2015
 
Point of Contact
Daniel J. Octaviano, 520-538-5948
 
E-Mail Address
ACC-APG - Fort Huachuca
(daniel.j.octaviano.civ@mail.mil)
 
Small Business Set-Aside
N/A
 
Description
Amendment 02 for W91RUS15GEF1 Global Enterprise Fabric Sources Sought/Synopsis Description: The U.S. Army Contracting Command (ACC) Aberdeen Proving Ground (APG), Huachuca Division is seeking information on business sources that can provide non-personal service support synopsized below. Synopsis: The US Army NETCOM currently operates and uses numerous enterprise level tools to perform its Network Operations mission. These tools include capabilities to manage, control, and perform activities related to directory services, system management, network management, scanning and patching of desktops, security services for classical network security devices, endpoint security, network device management, operation of installation networks and installation processing nodes, and maintenance and standardization of our global network, from the desktop to the enterprise access points and systems provided by DISA. The current architecture used to host our NetOps tools and capabilities is classical client-server with independent and disparate systems that are not tightly integrated. NETCOM desires to build a global cluster of virtual machines that are tightly integrated, connected, controlled, and managed to host our current and future NETOPS tools and capabilities, data analytics capabilities, installation processing needs, and defensive cyber capabilities. The envisioned architecture is tiered with a hub and spoke topology and with components at the installation, regional, and enterprise level. NETCOM's desire is to move away from classical client-server architecture to a tiered, virtual-machine based architecture in order to drive down costs, simplify our network operations topology, utilize cloud technology, and to quote mark future-proof quote mark our ability to operate, maintain, and control our global network as much as possible. This global cluster of virtual machines is central to our enterprise strategy that transcends six zones, with the zones being consistent with the network definitions, activities, and capabilities as defined by DISA and NSA. The zone-based strategy provides the architecture that encompasses global network operations, capabilities, interfaces, design, and communications needs at all levels, including from the tactical to the enterprise. The global fabric can be built in phases, but key functions and capabilities to ensure operations and connectivity must be accounted for in a phased approach. It is envisioned that as funds permit, the fabric will be built out over time, but as stated, key capabilities, functions, and operational elements must be built to provide basic services as the system is constructed. Global Enterprise Fabric (GEF) virtual hosting platform environment that utilizes a converged architecture that is a software defined infrastructure consisting of computing, network storage management elements. When configured and deployed it will enable the Army to have global visibility and CND, regional management environment with ability to enforce compliance. The Enterprise Fabric is a convergence of the hardware architectures for the tools that the Army requires to manage its environment. Instead of buying tech refresh hardware for each capability (i.e. Active Directory, ACAS, HBSS, System Center etc.); we buy a high density converged platform that can support all of these requirements and more for a fraction of the combined cost. Through this platform we also gain the ability to integrate these capabilities at a software level to further reduce the cost to the Army (i.e. consolidation of software licenses). This converged architecture also give us the unique ability to create a global consolidated view of the Enterprise's status enables to trust and verify standardizations and compliances, through a quote mark Role based Single Pane of Glass quote mark. The GEF allows us to merge existing physical and virtual environment silos into a single enterprise managed hosting environment. The capacity can also be leveraged to support new missions as they require operating capacity such as JIE, JMN and Big Data analytics. Below is a list of common services hosted on the GEF. Active Directory (AD): Active Directory provides identification, authentication, authorization and accountability for network and resource access. Provides an integrated global network for Joint, Coalition, interagency, intergovernmental, and others that need to collaborate across organizational boundaries. Network Management (NetMan): The IP Transport Management - IP Network Management System (NetMan) provides Network Operations (NETOPS) management and control of the Internet Protocol (IP) data transport network for the Army's Infrastructure. It is the primary system for network related discovery, mapping (display), event processing, failure detection, isolation, and analysis. Host-Based Security System (HBSS): Host Based Security System is a suite of commercial-off-the-shelf (COTS) software that provides a framework to protect against cyber threats both at the network and host levels. It is mandated for installation on all systems in the DoD that are connected to the high and low side networks. The current requirement is to deploy HBSS to Windows-based operating systems including desktops, severs, laptops, etc., including Programs of Record. Assured Compliance Assessment Solution (ACAS): ACAS is the Army's vulnerability assessment & management solution to identify vulnerabilities and configuration issues in the network environment. ACAS is an active scanning application that uses current plug-ins to identify and report instances of known vulnerabilities. The application consists of the Security Center management software and a local scanner software Nessus. ACAS is a GOTS product especially configured for DISA from the tenable product suite. Security Incident Management System (SIMs) (currently ArcSight): Collects, normalizes, aggregates and correlates security-related information from diverse network sources (routers, firewalls, switches, IDS/IPS, and other GNEC capabilities to provide a standard, correlated and consolidated view of security events from across the network, enabling comprehensive understanding of the security environment from a single point. Enterprise Protected Domain Name Service: The Enterprise Protected Domain Name Service (EP DNS) is an enhancement for redundancy and survivability over standard DNS solutions by providing a system designed to accommodate security and performance. The system incorporates several layers of protection, centralized server management, and a dynamic Internet Protocol management schema. EP-DNS is organized into multiple tiers with each tier providing a separate but definitive functional role. Tier 0 servers provide DNS service to queries that originate outside the U.S. Army name space and provide a secondary role as a virtual firewall effectively protecting the internal U.S. Army DNS structure. Tier 1 DNS servers are the primary authoritative source for DNS information inside the U.S. Army name space. Tier 2 servers serve as the primary regional DNS resolver, receiving DNS queries form U.S. Army end users. System Center: System Center provides persistent asset Visibility, reporting and auto quarantine and remediation for information assurance vulnerability, patch, and configuration management for windows and non-windows computing platforms. Enables monitoring of services, devices, and operation for multiple clients in a single console. Provides an overview of state, health and performance, configuration and security situations. Provides a workflow management solution which enables automation to create, monitor and deploy resources utilizing customized runbooks. Army Enterprise SharePoint: Army Enterprise SharePoint is a centralized information role based portal that provides enterprise collaboration, workflow and document management. ITSM/Remedy: ITSM Provides incident management and asset management based on persistent reporting from HBSS, Enterprise AD, System Center, ACAS, Spectrum, ArcSight, SARM and other NETOPS capabilities Spectrum: Spectrum provides Persistent Network Device IP Management, Asset Visibility & Reporting, Remediation, Configuration Management of all network devices, such as routers, switches, firewalls. Public Key Infrastructure (PKI): PKI provides user and machine certificate based identification and authentication enables 802.1x. Identity and Access Management (IdAM): IdAM provides the ability to create and manage a user's identity throughout their life cycle (from creation to deletion) using authoritative data sources. IdAM solution provides a repository of automated authoritative user information for utilization within Enterprise Directory Services. Installation Services: Core installation network services (eg. 911, based, print services, UC Emergency services) and local mission applications The purpose of this synopsis is to gain knowledge of interest, capabilities, and qualifications of members of the business community who can support this venture. The Government is interested in industry's capabilities and how they relate to an overall solution. The two power point attachments represent a Government proposed way forward, but the Government is interested in vendor capabilities/solutions. Government Responses to this sources sought synopsis will be used by the Government to make appropriate determinations about potential sources only. A solicitation is not currently available at this time. It is anticipated that a RFP for hardware associated with this future requirement will be posted to CHESS prior to this FY end. Submissions: The Government is requesting input on the above as it relates to the Global Enterprise Strategy as identified above and in the attachments to this document. Please provide any comments to the draft functional requirement as a separate document. Should this request raise questions, please include those questions with the capabilities submission. No reimbursement will be made for any costs associated with providing information in response to this sources sought/synopsis or any follow-up information requests. Please address each of the following by restating them and providing your response under each one. 1)Company Name: Address: DUNS: CAGE Code: 2)Point of Contact to include name telephone number and e-mail address. 3)Briefly describe your current capabilities 4)Address your capabilities to accomplish the service/solution and experience in regard to those identified in the draft functional requirement listed above and in the attachments. Technical capability statements can be submitted in your own format, addressing items 1-4 above, and shall be 10 pages or less. NOTE: This is not a request for proposal nor is the technical capability statement considered to be a proposal. No reimbursement will be made for any costs associated with providing information in response to this synopsis or any follow-up information requests. The functional requirement for this Sources Sought is a draft document and changes will be made in the future. Responses are due by 12 p.m., Mountain Standard Time (MST) on 6 JULY 2015. Please send information via e-mail to Ms. Jadie Sherick, Contracting Officer, at jadie.l.sherick.civ@mail.mil and Mr. Dan Octaviano, Contract Specialist at daniel.j.octaviano.civ@mail.mil. Telephone responses will not be accepted. Responses must come electronically or by mail. All responses shall be unclassified and reviewed (prior to submission to the Government) to ensure that there are no operational sensitivities. Prospective vendors must be registered in the System for Award Management (SAM) at https://www.sam.gov/portal/SAM/#1. Response Date:6 July 2015 Response Due Time:1200 hours/12:00 PM Time Zone Due:Mountain Standard Time Attachments: Attachment 1: Enterprise Strategy Updated to CG Boards Attachment 2: GEF Converged Architecture Spt RFI
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/notices/984e24e168159222ab820eb4deceabc5)
 
Place of Performance
Address: ACC-APG - Fort Huachuca ITEC4 Contracting, Bldg. 61801, Room 3212 Fort Huachuca AZ
Zip Code: 85613-5000
 
Record
SN03769890-W 20150621/150619234346-984e24e168159222ab820eb4deceabc5 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.