SOURCES SOUGHT
R -- Integrated Cyber Platform Systems (ICPS) - RFI/ Source Sought Letter
- Notice Date
- 8/1/2016
- Notice Type
- Sources Sought
- NAICS
- 541512
— Computer Systems Design Services
- Contracting Office
- Department of the Air Force, Air Force Space Command, 38 CONS, 4064 Hilltop Road, Tinker AFB, Oklahoma, 73145-2713, United States
- ZIP Code
- 73145-2713
- Solicitation Number
- FA8773-16-R-8009
- Point of Contact
- Amy L. Barnes, Phone: 4057368739
- E-Mail Address
-
amy.barnes.2@us.af.mil
(amy.barnes.2@us.af.mil)
- Small Business Set-Aside
- N/A
- Description
- ICPS DRAFT PWS ICPS Market Research Questionnaire RFI Sources Sought Letter The 90 th Cyberspace Operations Squadron (90 COS) of the 688 th Cyberspace Wing innovates solution to defend the Air Force (AF) network infrastructure under the umbrella project of Integrated Cyber Platform Systems (ICPS). ICPS was born out of necessity to streamline processes and provide a mechanism to consolidate multiple information assurance (IA) tools and systems into a single Command and Control management system with a common view. The 90 th COS innovates solutions to defend the network against various threats. One of the 90 th COS solutions is the Information Operations Platform (IOP). It incorporates defensive network tools and services to support (AF) IA and information operations (IO). It is a system of systems. The system functions include real-time network monitoring, intrusion detection and prevention, data management, correlation, and forensic capabilities, documentation, reporting, data visualization and policy enforcement. It is a hardware platform dedicated to enterprise-level intrusion detection and prevention. It is place in-line with network traffic flow and enhances network security by analyzing network Internet Protocol (IP) traffic to identify suspicious activity and providing automated and manual blocking of selected network traffic based on that analysis. Specifically, IOP monitors Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) traffic. Its numerous intrusion detection techniques include attack signature recognition, anomaly detection, expert system correlation, and pattern recognition. The system is deployed as both rack-mounted suites at permanent installations and as mobile fly-away suites for rapid deployment to sites requiring its capabilities. This proposed contract is being considered for an 8(a) set aside.
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/notices/0e01c432bcd17c8bacd7793cd10971a4)
- Record
- SN04203119-W 20160803/160801234600-0e01c432bcd17c8bacd7793cd10971a4 (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |