Jadual 1 JADUAL PEMATUHAN TEKNIKAL

Transcription

Jadual 1JADUAL PEMATUHAN TEKNIKALSEBUTHARGA PEMBAHARUAN 2500 UNIT LESEN PERISIAN ANTIVIRUS KASPERSKY DAN TERMASUKPENYELENGGARAAN (PEMBAIKAN & PENCEGAHAN) BAGI PERISIAN DAN SEPULUH (10) UNIT SERVERANTIVIRUS KASPERSKY BAGI TEMPOH SATU (1) TAHUN UNTUK KEGUNAAN PEJABAT SETIAUSAHA KERAJAANNEGERI SELANGOR DAN SEMBILAN (9) PEJABAT DAERAH DAN TANAH SELANGORi)SPESIFIKASI PERISIAN ANTIVIRUS UNTUK PERLINDUNGAN BAGI WORKSTATION, LAPTOPS, SMARTPHONEDAN SERVER DALAM RANGKAIAN PEJABAT SUK SELANGOR (MINIMUM REQUIREMENTS)BIL1.SPESIFIKASIKUANTITIAntivirus Software to protect Workstation, Laptops, SmartPhone, File Servers and Networked Storage on thenetwork with the following functionality:2500 UnitBrand and Product : Antivirus Kaspersky EndpointBusiness Select (Latest version)i. desktopsii. smartphoneiii. servers2.Shall provide support for centralized management andpolicy based antivirus configuration3.Shall support the following platformi. Microsoft Windows Windows Workstation XP/Vista/Windows7,8, 10 Windows Server 2003/2008/2012ii. Macintosh OS1MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BILSPESIFIKASIKUANTITIiii. Mobile OS (Windows Mobile, Android & iOS)iv. Linux OS Redhat, CentOS, Fedora, SUSE Linux,Novell Open Entterprise, OpenSUSE Linux,Debian GNU, Mandriva, Ubuntu, Linux XPEnterprise Desktop, FreeBSDv. Novell Netware4.Shall provide continuous virus protection by providing realtime protection scanning (Hybrid technology - using bothsignature and cloud assisted scanning engine)5.Shall provide on demand anti-virus scanning (Hybridtechnology - using both signature and cloud assistedscanning engine)6.Shall be able to scani. 1,200 types of compression archive formats orversionsi. with unlimited layers of compression by differentarchiversii. Include recursive scanning (for example a zipwithin a zip within a RAR)ii. Include protection against “archive bombs”iii. Compressed with GZIP7.Shall automatically clean viruses in most commonly usedarchive filesi. ZIP, ARJ, CAB, LHA, RAR, TAR2MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BILSPESIFIKASIKUANTITIi. with unlimited layers of compression8.Shall be able to scan more than 2000 version ofexecutable packers9.Shall protect from all types of malicious programs includingviruses, ad ware, spy ware, dialers, trojans and rootkitwithin one fully functional standard product10.Must integrate with KSN cloud assisted technology forgetting information on file and URL reputationi) A KSN proxy is provided to reduce network trafficand provide faster responseii) With over 3 billion files in the reputation databaseiii) With more than 300 million unique clean filesiv) Globally deployed cloud infrastructure thatintegrates a network of at least 300 millioncustomers11.Must provide the following reputation servicesi) Application activity monitor: Reputationii) Monitoring running applications (even trusted one)iii) Grouping applications based on trustworthiness,evaluation across the following sourcesa. Signature basesb. Analytical protection modulesc. Cloudi. Trusted programsii. Trusted websitesiii. Suspicious programiv. Suspicious websitesiv) Urgent detection system12.Shall scan incoming and outgoing e-mail messages of anymail clients that use SMTP, IMAP, MAPI, NNTP and GA

Jadual 1BILSPESIFIKASI13.Native integration with MS Outlook, The Bat!, MicrosoftOutlook Express, Windows Mail and Mozilla Thunderbird.14.Shall support deployment by the following mechanisms:i.Any corporate management solution that supportMicrosoft Installer (MSI)i.Log-in scriptii.Client Packageiii.Windows Domain Group Policyiv.Push Methodv.Active DirectoryKUANTITI15.Shall provide real-time lock down of client configuration –allow or prevent users from changing settings orunloading/uninstalling the software16.Shall provide password protection to prevent AV softwarefrom being uninstalled by end users (even withAdministrator privileges)17.Shall be able to perform updates regardless of whether theclient is connected to the management serverShall1support the following update propagation sources4i.Administration Server (push & pull)i.Network Shares (SMB protocol)4MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BIL18.SPESIFIKASIii.HTTP and FTP sitesiii.The antivirus manufacturer’s siteKUANTITIShall provide the following protection to workstationsi.File anti-virus : with iSwift and iChecker technologyi.Mail anti-virusii.Web anti-virusiii.IM Anti-virusiv.System watcherv.Network Attack Blockervi.Application controlvii.Registry xi.IDS5MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BILSPESIFIKASIxii.19.KUANTITIExternal device control (example, disable USBthumb drive, disable modem/broadband)Must provide the following application control functioni.Integrated with vendor cloud servicei.Application startup controlii.Application privilege controliii.Golden category – with known trusted applicationsupdated by vendoriv.Possibility to apply to particular groups ofusers/computersv.Possibility to restrict some particular actions forspecified applications/groups (device access,registry access, self copying, spawning ownprocesses etc)vi.Provide software inventorya. Network wide application inventoryb. Company wide application inventoryvii.Test rulesviii.Cloud based object reputationix.Application trust elevation (user is able to sendrequest to administrator via interface)x.Ability to restrict vulnerable application6MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BILSPESIFIKASIxi.KUANTITIProvide categorizationc. Provide about 100 defined categoriesd. At least 300 million known good filesi.Integration with AD/LDAPi.Provide the following blacklistinge. Blacklisting applicationsf. Blacklisting groupsg. Blacklisting categoriesh. Blacklisting by Security rating20.Shall be able to perform damage cleanup of Trojans andworms21.The anti-virus enginei.Shall use single scanning agenti.Shall not require opening port at host level forupdatesii.Shall be able to detect all types of viruses(Trojan/Worm, joke, Hoax, Dialer etc)iii.Shall be able to scan only file types which arepotential virus carriers (based on true file type)iv.Shall be able to cure infected files, quarantinesuspicious files22.Shall support list of trusted application / processes23.Shall be able to restrict some particular actions forspecified applications/groups (device access, registryaccess, self-copying, spawning own processes etc.)24.Shall support on-demand antivirus scanning launch usingcommand line with customizable parameters7MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BIL25.SPESIFIKASIKUANTITIShall provide Smart Phone protectioni.Shall support the following platforma) Windows Mobile 8.1, 10b) Android 4.0 – 6.0c) iOS 7.0 – 9.0ii.Shall provide the following functiona) Can be deployed and managed by administrationservera) Anti-virusb) Encryptionc) Firewalld) Privacy protectione) Anti-theft- Remotely lock mobile device- Remotely wipe mobile device- Remotely locate mobile device using RGA

Jadual 1BILSPESIFIKASI26.Shall provide frequent database update, with at least 10updates per day (average)27.Shall be able to hide the presence of Anti-virus softwareon user machines (on Microsoft Windows platform)28.Must provide the following application control functioni.Integrated with vendor cloud servicei.Application startup controlii.Application privilege controliii.Golden category – with known trusted applicationsupdated by vendoriv.Possibility to apply to particular groups ofusers/computersv.Possibility to restrict some particular actions forspecified applications/groups (device access,registry access, self copying, spawning ownprocesses etc.)vi.Provide software inventorya) Network wide application inventoryb) Company wide application inventoryvii.Test Rulesviii.Cloud based object reputationix.KUANTITIApplication trust elevation (user is able to sendrequest to administrator via interface)9MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BILSPESIFIKASIx.xi.Ability to restrict vulnerable applicationProvide categorizationa) Provide about 100 defined categoriesb) At least 300 million known good filesi.Integration with AD/LDAPi.a)b)c)d)29.Provide the following blacklistingBlacklisting applicationsBlacklisting groupsBlacklisting categoriesBlacklisting by Security ratingMust provide the following reputation servicesi.Application activity monitor: reputationi.Monitoring running applications (even trusted one)ii.Grouping applications based on trustworthiness,evaluation across the following sources;a) Signature basesb) Analytical protection modulesc) Cloud(1) Trusted programs(2) Trusted websites(3) Suspicious program(4) Suspicious websitesiii.30.KUANTITIUrgent detection systemMust provide advanced Proactive technologies andheuristics as follows;10MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BIL31.32.SPESIFIKASIi.System TItechnologyMust provide the following Web controls and contentfilteringi.Filtering of Web resources by URL, content anddata typei.Flexible controls to grant permission, prohibit, limitor conduct user audits for certain categories ofwebsitesii.Flexible scheduling of web usage rules enable webaccess during certain hoursiii.Integration with Active Directoryiv.Possibility to test new rules created before they areapplied effectivelyv.Reports detailing PC usage for web browsingMust integrate with KSN cloud for getting information onfile and URL reputationi.A KSN proxy is provided to reduce network trafficand provide faster responsei.With over 3 billion files in the reputation databaseii.(With more than 300 million unique clean files11MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BILSPESIFIKASIiii.KUANTITIGlobally deployed cloud infrastructure thatintegrates a network of at least 300 millioncustomers33.Must support QScan technology. A deep scanningtechnology that works at the lowest levels of the operatingsyste to remove any malware detected at the root of auser’s system34.Shall be able to view action against detected malware thathas been quarantined and to do back-up storage beforeproceeding with remedial actions35.Shall provide scanning of ICQ/MSN/AIM traffic36.Shall analyze the behavior of all processes running in thesystem and saves all changes made in the file system andthe registry37.Shall detects most implementation of existing root kits,which are capable of concealing files, folders and registrykeys from the user, as well as hiding running programs,system services, drivers, network connection and networkactivities38.Shall detect phishing attacksi.when receiving messages containing links tophishing sitesi.when opening web pages in the browser39.Shall support automated virus outbreak prevention onserver platform40.Shall have protection from hacker attacks41.Shall have terminal server protection42.Shall be able to update signature databases for betterdetection of malicious files and lower signature update size12MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BILSPESIFIKASIKUANTITI(a) signature based technology43.PROTECTION FROM KNOWN, UNKNOWNAND ADVANCED MALWARE on Corporate ServerThe solution shall ensures faster scans and less impacton system resources, providing the highest detection ratesupported by cloud-assisted securityThe solution shall provide unprecedented security byusing configured rules to allow or block the startupof executable files, scripts, and MSI packages,or the loading of DLL modules onto servers.The solution shall protect shared folders from cryptomalware (Anti-Cryptor). The application blocks theoriginating machine from accessing any network fileresources when file encryption activity is detected,The solution shall block access from hosts withsuspicious activity, blocks computer access to sharednetwork folders on a protected server while runningthe Real-Time File Protection or Anti-Cryptor tasks.The solution shall scan the operating system’s criticalareas. A dedicated task can be run to scan those areas ofthe operating system that are most exposed to infection.Scope of flexible scan setting enable Administrator to :i) Exempt certain processes from scanningii)Set the depth of protectioniii) Specify which file types must always be scannedand which should be exemptediv) Pre-set responses to suspicious and infectedobjects according to threat type13MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1BILSPESIFIKASIKUANTITIThe solution shall allocate resources between EndpointServer and other applications according to pre-assignedpriorities: anti-malware scans can also run in backgroundmode.The solution shall able to select trusted processesfrom scanning for performance optimization purposes.The solution shall able to prevent uninterrupted serveroperation such as reboot whenever anti-malwareprotection is installed or updated.The solution shall support flexible administration overi)Selection of management tools.ii) Easy-to-use installation and management tools.iii) Control over administrator privileges.iv) Flexible setting of scan times.Notification system.The solution shall compatible with virtualization platformsand operational systems.14MEMATUH(YA/TIDAK)CADANGANPENYEBUTHARGA

Jadual 1i)BIL.SOFTWARE SPECIFICATION FOR ENTERPRISE MANAGEMENT CONSOLE FUNCTIONALITY FOR CENTRALIZEDVIRUS CONTROL (MINIMUM CATATANEnterprise Management Console functionality for centralized virus control for automatic dissemination of thelatest Anti-Virus Signatures across the Enterprise1.Shall be able to manage the anti-virus programson a local area network (LAN) from a singleconsole2.Shall be able to manage anti-virus programs onwide area network (WAN) from a single console3.Shall be able to build a multiple layer ofAdministration server relationship for exampleMother-child / Master-slave relationship, andsupport unlimited number of sub-leveladministration server4.Shall provide ability to limit data transfer ratebetween administration server during peakhours5.Shall be able to create and apply customizedpolicy to multiple workstations on a logicalnetwork6.Shall allow the anti-virus administration serverto remotely install anti-virus “at the background”without interrupting the target workstationactivities7.Shall be able to manage quarantine and backupstorage base on disk space size and daystored. Quarantine files are scanned after eachupdate and backup can be stored to the originalfolder15

Jadual 1BIL.SPESIFIKASI8.Shall provide notification for Error, Warning,Critical and Info (E.g. License Key Expired, antivirus database, updates missed, virus deleted,not scanned for a long period)9.Shall provide the following notification toadministrator(a) Email(b) SNMP(c) Netsend(d) Event log10.Shall give limited access to workstation tochange the anti-virus setting for securitypurpose11.Shall provide password to avoid user make anychanges on the policy12.If the workstation failed to run at the scheduledtime, it shall automatically update Anti-Virusdatabase when Windows is launched in thefuture13.Shall be able to scan automatically whenwindows is start –up after it failed to run duringthe scheduled time14.Management console must provide both MCCcompliance and Web interface15.Shall provide policy and tasks inheritancethroughout the administration servers hierarchy16.Shall provide a possibility to lock client settingon a higher level of hierarchy, thus preventingthem from being changed in the lower levelpoliciesKUANTITI16MEMATUHI(YA/TIDAK)CATATAN

Jadual 1BIL.SPESIFIKASI17.Shall be able to perform centralized update foranti-virus database and software update18.Shall enable the administration server at thebranch to get anti-virus database updatesand/or application updates from the Central AntiVirus server in the headquarters. If the CentralAnti Virus server fails, it can get updates fromthe internet19.Shall support the following update propagationsources20.(a) Administration Server (push & pull)KUANTITI(b) Update Agent(c) Network Shares (SMB protocol)(d) HTPP and FTP sites(e) The anti-virus manufacturer’s site21.Shall provide the function for automateddatabase update testing on a model machine,before the database update are allowed to bedistributed to managed machines22.Shall support deployment by the followingmechanisms:(a) Any corporate management solution thatsupport Microsoft Installer (MSI)(b) Log-in script(c) Client Package(d) Windows Domain Group Policy(e) Push Method17MEMATUHI(YA/TIDAK)CATATAN

Jadual 1BIL.SPESIFIKASIKUANTITI(f) Active Directory23.Shall provide the creation of modifiedinstallation package24.Shall provide the creation of installationpackage that include the latest database update25.Shall provide the ability to install third-partysoftware through administration server26.Shall provide policy enforcement and updatespropagation when the client is located behind aNAT or any Firewall that allows only clientinitiated connections27.Shall be able to monitor remote locations overWAN links for antivirus activity28.Shall provide incident monitoring andnotification29.System reporting shall provide informationcollected throughout the network hierarchy foranalysis of activity, graphical report generation(templates provided)30.Support centralized view and management ofquarantined objects across the AV network fromadministration console31.Shall provide a mechanism for randomization ofclient task execution schedule in order todecrease number of simultaneous clientrequests to the administration server32.Shall have a mechanism for backup andRestore of Administration Server18MEMATUHI(YA/TIDAK)CATATAN

Jadual 1BIL.SPESIFIKASI33.Shall provide automatic virus attack detectionwith automatic activation of specific policy34.Shall be able to perform all necessary outbreakrelated tasks from a single interface35.Shall be able to have different operatorassigned separate access to individual locationfor job delegation and separation of task andresponsibility36.Shall support integration with Windows securitysubsystem for administrator/operatorauthentication37.Shall utilize SSL-encrypted communicationsbetween management server and managedproduct(s)38.Shall support customization of the virussignatures update interval39.Workstation can be categorized based on itscritical condition such as “Critical status”,“Warning-need attention” and “Detection” ofnew workstation in the network40.Shall perform real-time information status of theanti virus on administration serverKUANTITI(a) Start and Stop anti-virus activity(b) On demand scan and update(c) Real time protection status(d) Workstation system information41.Shall be able to control devices by:19MEMATUHI(YA/TIDAK)CATATAN

Jadual 1BIL.SPESIFIKASIKUANTITI(a) Type of devices (Removable drive, printers,Portable devices etc)(b) Device control on bus level (Infrared, SerialPort etc)(c) Device control by trusted devices ( DeviceID, Device Model)(d) Default deny for devices(e) Read/write permission granularity(f) Integration with AD20MEMATUHI(YA/TIDAK)CATATAN

Jadual 1ii) KASPERSKY SERVER MANGEMENT INCLUSIVE PREVENTIVE AND CORRECTIVE MAINTENANCEBIL.SPESIFIKASIMEMATUHI(YA/TIDAK)Dell server Support Solution (One (1) Year Warranty Extension From Dell)1Technical support access- 24x72Part and labour response- NBD or Mission Critical3TechDirect online cases and despatch4SupportAssist remote monitoring5Dispatch monitoring and crisis management6Escalation management7Hypervisor and OS support8SupportAssist automated support9Direct access to elite ProSupport Plusengineers10Dedicated Technical Account Manager11Health check and performancerecommendations during PreventiveMaintenance12System maintenance21CATATAN

Jadual 1iii) SKOP PERKHIDMATAN SOKONGANNO.SKOPPERKHIDMATANCATATANMANDATORI (M)M8 jam x 5 hariseminggu1.Memperbaharui 2500 unit lesenantivirus Kaspersky di Pejabat SUKSelangor (Bangunan SSAAS), SPN(SUK 2) dan Sembilan (9) PejabatDaerah dan Tanah Selangor2.Software CoverageM8 jam x 5 hariseminggu3.Centralised Antivirus SystemM8 jam x 5 hariseminggu4.On-site technical SupportM- 8 jam x 5 hariseminggu- 55 jamsetahun bagiaduan insidendi HQ SUK(BangunanSSAAS &SPN)termasuk 9PejabatDaerahseluruhSelangor- 5 insidensetahun di HQSUK22MEMATUHI(YA/TIDAK)CADANGANPEYEBUTHARGA

Jadual 1NO.SKOPPERKHIDMATANMANDATORI (M)5.Preventive Maintenance (Perisianantivirus & Server)M6.On-Site Training (instalation,configuration and antivirus operationfor Administrator) - 3 orang pentadbirM7.Corrective Maintenance (Perisianantivirus, OS, alat ganti server,labour)M8.Memastikan pelaksanaan antivirusadalah secara berpusat berjaya danberfungsi dengan baik iaitu semuaclient mendapat update daripadaserverMemastikan password ditukarkepada yang baharu. (tertaklukkepada persetujuan Pej. SUKSelangor)M9.CATATAN(BangunanSSAAS &SPN) dan 9PejabatDaerahseluruhSelangor padahari Sabtu danAhad2 kali setahundi HQ SUK(BangunanSSAAS &SPN) dan CADANGANPEYEBUTHARGA

Jadual 1NO.SKOP10.Jaminan extended satu (1) tahunbagi server hendaklah diperolehidaripada pihak prinsipal server bagimemastikan alat ganti tulen dandijamin oleh prinsipal. Sila lampirkansurat Authorization DAN suratExtended Warranty daripadaprincipal;Tarikh atau bulan pembaharuanlesen Kaspersky dan extendedwarranty bagi server antivirushendaklah sama supayapemantauan dapat dibuat denganlebih berkesan;Penyelenggaraan pencegahan (PM)bagi 2500 pengguna lesen perisianantivirus dan sepuluh (10) unit severantivirus sebanyak dua (2) kalisetahun dan laporan penuh (bukansekadar job sheet/checklist)hendaklah dikemukakan dalamtempoh empat belas (14) hariselepas kerja-kerja PM dijalankan;11.12.PERKHIDMATANMANDATORI (M)MM13.Melaksanakan pengujian backupand restore terhadap konfigurasisecurity center atau yang berkaitandan database server antivirus dilokasi-lokasi yang telah dinyatakan diatas;M14.Penyelenggaraan pembaikan dibuatoleh pihak syarikat yang dilantik olehKerajaan meliputi pembaikanperisian antivirus dan HARGA

Jadual 1NO.SKOP15.Penyelenggaraan pembaikan serverhendaklah termasuk operatingsystem (OS) bagi server dan kerjakerja formatting server sekiranyadiperlukan;16.Tindakbalas aduan hendaklah dalammasa 4 jam selepas aduan dibuatM17.Pertukaran perkakasan setara atauloan unit hendaklah disediakan bagiperkakasan yang memerlukan masauntuk dibaiki dengan syaratdipersetujui oleh pegawai BTM;Pertukaran/penggantian parthendaklah dilakukan dalam masaNext Business Day (NBD) secaraonsite;M19.Pihak syarikat hendaklah datang kelokasi aduan (onsite support) dibuatuntuk mengambil perkakasan yangrosak dan mengembalikan semulaselepas kerja-kerja pembaikan dibuatatau menggantikan dengan alat gantiyang baru dengan kos yangditanggung oleh pihak syarikat;M20.Semua kos penggantian spare partperkakasan server yang dinyatakandi dalam Jadual 1 adalah di bawahtanggungjawab pihak syarikat danpihak Kerajaan Negeri Selangor tidakakan membayar kos pembaikan danpenghantaran yang terlibatsepanjang tempoh kontrak dan;M18.PERKHIDMATANMANDATORI ARGA

Jadual 1NO.SKOPPERKHIDMATANMANDATORI (M)21.Tempoh penyempurnaanpembaharuan lesen, pengujian danpengesahan oleh pegawai BTMuntuk keseluruhan 2500 unit lesenadalah selama 60 hari dari tarikhSST ditandatangan (sila kemukakanGantt Chart)M22.Penyebutharga hendaklahbekerjasama dengan pihak principalKaspersky untuk memaklumkankepada Kerajaan Negeri Selangorsekiranya terdapat seranganmalware/virus/ancaman baru yangmerbahaya yang boleh mengancamkeselamatan rangkaian danperkakasan di Negeri Selangor.CATATANNota : Sila ambil maklum bahawa tempoh keseluruhan kontrak adalah bagi tempoh SATU (1) TAHUN.26MEMATUHI(YA/TIDAK)CADANGANPEYEBUTHARGA

8. Shall be able to scan more than 2000 version of executable packers 9. Shall protect from all types of malicious programs including viruses, ad ware, spy ware, dialers, trojans and rootkit within one fully functional standard product 10. Must integrate with KSN cloud assisted technology for