Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
SAMDAILY.US - ISSUE OF JUNE 24, 2020 SAM #6782
SOURCES SOUGHT

70 -- COVID19 - Threat Intelligence Subscription - Silobreaker (VA-20-00061989)

Notice Date
6/22/2020 10:16:08 AM
 
Notice Type
Sources Sought
 
NAICS
541519 — Other Computer Related Services
 
Contracting Office
TECHNOLOGY ACQUISITION CENTER AUSTIN (36C10A) AUSTIN TX 78744 USA
 
ZIP Code
78744
 
Solicitation Number
36C10A20Q0206
 
Response Due
7/2/2020 3:00:00 PM
 
Archive Date
08/31/2020
 
Point of Contact
Daniel Winterroth, daniel.winterroth@va.gov, Phone: 512-981-4418
 
E-Mail Address
Daniel.winterroth@va.gov
(Daniel.winterroth@va.gov)
 
Awardee
null
 
Description
REQUEST FOR INFORMATION 36C10A-20-Q-0206 SILOBREAKER The purpose of this Request For Information (RFI) is to identify qualified vendors, who are able to meet the Department of Veterans Affairs Cyber Security Operations Center (VA-CSOC) requirement for shared membership licensing to Silobreaker for twenty concurrent connections. Silobreaker offers a threat intelligence aggregation interface that extracts threat intelligence from the dark web, social media platforms, and news outlets. The requirements in this document are used to describe the necessary functions of a VA-CSOC Silobreaker membership licensing solution. Requirements are solely to provide a structure of thought during analysis. Any contract/order that might be awarded based on information received or derived from this market research will be the outcome of the competitive process. The purpose of this RFI is to obtain market information on capable sources of supply, industry practices, and input specific to the information provided. Not responding to this RFI does not preclude participation in any future Request for Proposal (RFP), if any is issued. Any information submitted by respondents to this RFI is strictly voluntary. All submissions become Government property and will not be returned. The North American Industry Classification System (NAICS) code applicable to this acquisition is 541519. The Small Business Size Standard for this NAICS code is $150 Mil. Small Business companies with the capability to perform this requirement, in total or in part, are encouraged to participate. If you are interested only in subcontracting opportunities please indicate this fact clearly in your submission. Should you believe a different NAICS code better applies to the requirement requested under this request for information please provide your suggestions in your response to the RFI. Please indicate your company size and socio-economic status for applicable NAICS codes. RFI RESPONSE INSTRUCTIONS Note: Provide a capability package that is clear, concise, and complete. The VA is under no obligation to provide feedback to the company, or to contact the company for clarification of any information submitted in response to this RFI. Provide the following information: Provide Company Information: Company Name CAGE/DUNS Number under which the company is registered in SAM/VetBiz.gov Company Address Point of contact name Telephone number Email address For Service-Disabled Veteran Owned Small Business (SDVOSB)/Veteran Owned Small Business (VOSB) concerns, indicate whether at least 50 percent of the cost of performance incurred is planned to be expended for employees of your concern or employees of other eligible SDVOSB/VOSB concerns. Do you plan to Prime or be a subcontractor? Can your company independently provide the entire range of requirements? If not, which requirements cannot be met and describe learning arrangement to meet all of the requirements. Existing contract vehicles the contractor holds for providing these services (GSA Schedules/GWACS, other agency GWACS, etc.). The Department of Veterans Affairs requires shared membership licensing for twenty concurrent connections to a threat intelligence aggregation interface that collects threat intelligence data from all possible sources, including; the deep and dark web, social media platforms, and news outlets. The Period of Performance for this effort is one (1) year base period with two (2) year option periods. Requirements Item Number Requirement 1 Two-factor-authentication 2 Access be limited to a customer s network (Specific IP Rage) 3 Ability for customer decide when to have session timeouts because of user inactivity 4 No installation required 5 User training provided (creating and sharing - custom searches, custom reports, custom dashboards, etc.) 6 Monitoring for and alerting on mentions of bank identification numbers (BINs) and credit cards across open and deep & dark web sources 7 Tracking developments and trends to Veteran Affairs trojans and automated teller machine (ATM) malware 8 Using external unstructured data to gain intelligence on vulnerabilities, proofs of concept (PoCs) and exploits 9 Tracking threat actors, campaigns and attack types targeting financial services and Veteran Affairs 10 Contextualizing indicators of compromise (IOCs) with unstructured web data in 17 languages 11 Monitoring for leaked credentials and data breaches 12 Analyzing mentions of domains and IP ranges related to malicious activity and phishing 13 Monitoring geopolitical trends, instability and physical security threats related to areas of operation 14 Tracking activism and related campaigns which can disrupt business operations 15 Use as an intelligence hub to index and make searchable emails, reports and similar from other providers 16 Brings all aspects of the intelligence workflow into a single SaaS-offering (plan, collect, process, analyze, disseminate) 17 Fully configurable and customizable to a customer s use-case and requirements 18 Intelligence on attack surfaces and assets (domains, IP-addresses, credentials, products, brands, etc.) 19 Intelligence on threat actors, malware, vulnerabilities, IOCs 20 Intelligence on companies, industries, markets, executives 21 Intelligence on geopolitics, instabilities, crime, incidents 22 Single system that supports the whole intelligence workflow 23 Seamless integration into security products eco-system 24 Open source data in 17 languages (news, blogs, social media, research, feeds, forums, pastes) 25 Premium data from partner providers (deep/dark web, phishing intel) 26 Intuitive visualizations and graphics that contextualize the data (geo-mapping, link-analysis, entity extraction, time-lines) 27 Real-time trending and early warning tools 28 Customizable dashboards and watch-lists 29 Auto-generated email alerts 30 Reporting and dissemination tools 31 Collaboration tools and workflow support 32 Export/integrations into 3rd party products 33 Support Application Programming Interface (API) NOTE: Please indicate whether you are including information on name brand products/services or, or equal products. If or equal products are identified, include detailed product descriptions and any available product literature/information. RESPONSE SUBMISSION: Please submit responses via email to Daniel Winterroth, @ daniel.winterroth@va.gov by 5:00pm CST, July 2, 2020. Responses should include contractor name, point of contact, phone number, DUNS number, and CAGE Code. VA reserves the right not to respond to any or all emails or materials submitted. VA will not be able to grant any extensions to this RFI.
 
Web Link
SAM.gov Permalink
(https://beta.sam.gov/opp/19101648a1b8474e82cde66c22c75b31/view)
 
Record
SN05699400-F 20200624/200623042720 (samdaily.us)
 
Source
SAM.gov Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's SAM Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.