Search results for: univ. brady apt.

Refine your Search
Apply several filters to get precise search results
Showing opportunity 1 - 10 of 14
  • Provide Grounds Maintenance - Nicholls State Univ. Brady Apt. Complex

    Type : Bid Notification

    Due : 21 May, 2020 (about 4 years ago)
    Posted : about 4 years ago
    Started : 29 Apr, 2020 (about 4 years ago)

    Provide Grounds Maintenance - Nicholls State Univ. Brady Apt. Complex Bid Number: 50008-SB01797 Date Issued: 04/29/2020 Bid Open Date/Time: 05/21/2020 3:00:00 PM CT Original: https://wwwcfprd.doa.louisiana.gov/osp/lapac/agency/pdf/7380000.pdf

    From: Louisiana (State)

  • Cisco Managed Services

    Type : Bid Notification

    Due : 29 Jun, 2023 (10 months ago)
    Posted : 10 months ago
    Started : 16 Jun, 2023 (10 months ago)

    . #: NOI-1004 Type: NOI Status: Open Open Date: Jun 16th 2023, 5:00 PM EDT Questions Due Date: Jun 22nd 2023, 3:00 PM EDT Close Date: Jun 29th 2023, 9:00 AM EDT Days Left: 3 Project Description:Managed Services provides StealthWatch, a security system for the Cisco Network which detects a range of attacks from a variety of threats including advanced persistent threats (APTs), distributed denial-of-service (DDoS), zero-day malware, and insider threats

    From: Ocean County College (Higher Education)

  • Enterprise Logging Xtreme

    Type : Bid Notification

    Due : 05 May, 2022 (about 2 years ago)
    Posted : about 2 years ago
    Started : 21 Apr, 2022 (about 2 years ago)

    Instead of deleting old logs, we'll have the ability to correlate them with older contextual network and system information to paint a full picture of adversary activity, enable true hunting and detection of advanced persistent threats to the network.The LTAC software for the ELX effort is designed to meet this logging need by facilitating the collection and aggregation of logs from across 196 AF bases to a centralized location in the cloud. 

    From: Federal Government (Federal)

  • Security at the Edge Cyber Challenge

    Type : Bid Notification

    Due : 07 May, 2022 (about 2 years ago)
    Posted : about 2 years ago
    Started : 07 Apr, 2022 (about 2 years ago)

    The need for protection against advanced persistent threats (APTs), nation state sponsored cyber attacks, data integrity capabilities, and overall zero trust solutions for the main three components of edge computing devices are critical for the current and future SOF operational environments.Why You Should ParticipateUSSOCOM seeks to enter into non-FAR or FAR-based agreements with Industry, Academic, and National Lab partners whose solutions are favorably

    From: Federal Government (Federal)

  • Enterprise Logging Xtreme -Software

    Type : Bid Notification

    Due : 06 May, 2022 (about 2 years ago)
    Posted : about 2 years ago
    Started : 05 May, 2022 (about 2 years ago)

    Instead of deleting old logs, we'll have the ability to correlate them with older contextual network and system information to paint a full picture of adversary activity, enable true hunting and detection of advanced persistent threats to the network.The LTAC software for the ELX effort is designed to meet this logging need by facilitating the collection and aggregation of logs from across 196 AF bases to a centralized location in the cloud. 

    From: Federal Government (Federal)

  • Request for Information (RFI) for Defensive Cyber Operations for Space (DCO-S)

    Type : Pre-Bid Notification

    Due : 10 Jul, 2019 (about 4 years ago)
    Posted : about 4 years ago
    Started : 07 Jun, 2019 (about 4 years ago)

    This RFI is conducted to gather information and identify potential sources capable of meeting the requirements for the Space and Missile Systems Center (SMC), Range and Network (RN) Division, Defensive Cyber Operations for Space.The Air Force Space Enterprise requires advanced persistent cyber defenses against nation state threats to operations.

    From: Federal Government (Federal)

  • Online Cyber Security Training Courses

    Type : Award

    Due : 13 Aug, 2019 (about 4 years ago)
    Posted : about 4 years ago
    Started : 22 Aug, 2019 (about 4 years ago)

    •·Memory forensics to find evidence of worms, rootkits, PowerShell scripting, and advanced malware used in advanced persistent threats with the use of Volatility and Rekall. Analysis of memory infected systems with: rootkits, rundll32, bots, and beaconing C2 malware to compare against a baselined system.

    From: Federal Government (Federal)