To obtain documents, log on:
:
Not registered? Register me now
 

Public Higher Education Bulletin

 
University of Illinois System
RFP #1RMM204
Request for Proposal: Endpoint Security Software
Award InfoPublished Wednesday October 27, 2010
Awarded to:
Vendor: En Pointe, Gardena, CA
Amount: An estimated $250,000
Terms:
An estimated start date of 11/15/2010 through 6/30/2013

This vendor has agreed to extend their offer to other state universities of Illinois.

Renewals:
3 one-year
Number of Unsuccessful, Responsive Respondents: 2
The University award process may be delayed up to thirty days as this award goes through a state approval process.
This notice has been modified
Published Friday December 18, 2009
To obtain the pricing spreadsheets for this solicitation, please visit http://publicnotices.wi.gov/NoticeView.asp?lnid=1054456 to download all information.
First published Wednesday, December 9, 2009
Sealed proposals will be accepted at the address below until 3:00 PM, Thursday January 7, 2010:

Dean Friermood
CICPC Purchasing Coordinator
2024 Anna Street
Schererville, IN 46375

The University of Illinois is currently collaborating with the the Committee on Institutional Cooperation Purchasing Consortium (CICPC) on a Request for Proposals (RFP) for endpoint security controls. In compliance with the requirements of the Illinois Procurement Code for competitive sealed proposals (30 ILCS 500/20-15), the University is posting information regarding this bid.
For the purpose of this RFP, an "Endpoint" is defined as smartphones/PDA's, laptops, desktops, servers and portable removable storage media and devices, such as USB drives. Endpoint security controls are software or hardware that manages security. Examples include full disk encryption, file/folder encryption, access control, anti-virus/anti malware, host based intrusion detection and data leak prevention.
The CIC Campuses host a variety of endpoint devices that run various operating systems. Security controls are required for the gamut of endpoints. Examples include: Windows XP, Mac OS X, iPhone, RIM OS (Blackberry), Windows mobile, Palm OS, Linux, Solaris, AIX, Android, and Windows Vista. We are seeking proposals from various vendors who can provide products that assist CIC Campuses meet our security goals.
The intent of the solicitation is to award a Master CIC Contract(s) with the provider(s) of these services that are deemed to best meet the needs of the participating universities. The CICPC reserves the right to make such determination, and to award single or multiple awards. At time of issuing this RFP, all universities within the consortium have represented an interest in using the resulting contract(s) to meet their endpoint security needs.
Vendors should direct ALL inquiries regarding this solicitation to Mr. Jim Lowe, University of Wisconsin-Madison Chief Information Security Officer. Email: cicendpoint@doit.wisc.edu.

For additional information, contact:
Rosey Murton
616 E. Green Street, Suite 202
Champaign, IL 61820
E-Mail: rmurton@uillinois.edu
Submit original and three copies of proposals, along with one electronic copies of the response as defined in the specifications. The University reserves the right to accept or reject any and all responses or parts thereof.

This transaction is subject to the State Board of Elections registration and certification requirements of Public Act 095-0971.

Bulletin Navigation

 
To obtain documents, log on:
Other Public Documents
  • CICEndpointRFP.pdf (195 KB)