Number of Unsuccessful, Responsive Respondents:
Vendor: En Pointe, Gardena, CA
Amount: An estimated $250,000
An estimated start date of 11/15/2010 through 6/30/2013
The University award process may be delayed up to thirty days as this award goes through a state approval process.
To obtain the pricing spreadsheets for this solicitation, please visit http://publicnotices.wi.gov/NoticeView.asp?lnid=1054456 to download all information.
First published Wednesday, December 9, 2009
Sealed proposals will be accepted at the address below until 3:00 PM, Thursday January 7, 2010:
CICPC Purchasing Coordinator
2024 Anna Street
The University of Illinois is currently collaborating with the the Committee on Institutional Cooperation Purchasing Consortium (CICPC) on a Request for Proposals (RFP) for endpoint security controls. In compliance with the requirements of the Illinois Procurement Code for competitive sealed proposals (30 ILCS 500/20-15), the University is posting information regarding this bid.
For the purpose of this RFP, an "Endpoint" is defined as smartphones/PDA's, laptops, desktops, servers and portable removable storage media and devices, such as USB drives. Endpoint security controls are software or hardware that manages security. Examples include full disk encryption, file/folder encryption, access control, anti-virus/anti malware, host based intrusion detection and data leak prevention.
The CIC Campuses host a variety of endpoint devices that run various operating systems. Security controls are required for the gamut of endpoints. Examples include: Windows XP, Mac OS X, iPhone, RIM OS (Blackberry), Windows mobile, Palm OS, Linux, Solaris, AIX, Android, and Windows Vista. We are seeking proposals from various vendors who can provide products that assist CIC Campuses meet our security goals.
The intent of the solicitation is to award a Master CIC Contract(s) with the provider(s) of these services that are deemed to best meet the needs of the participating universities. The CICPC reserves the right to make such determination, and to award single or multiple awards. At time of issuing this RFP, all universities within the consortium have represented an interest in using the resulting contract(s) to meet their endpoint security needs.
Vendors should direct ALL inquiries regarding this solicitation to Mr. Jim Lowe, University of Wisconsin-Madison Chief Information Security Officer. Email: firstname.lastname@example.org.
For additional information, contact:
Submit original and three copies of proposals, along with one electronic copies of the response as defined in the specifications.
The University reserves the right to accept or reject any and all responses or parts thereof.