SOURCES SOUGHT
D -- EPS-Twistlock
- Notice Date
- 8/14/2017
- Notice Type
- Sources Sought
- NAICS
- 541519
— Other Computer Related Services
- Contracting Office
- Other Defense Agencies, Virginia Contracting Activity, Virginia Contracting Activity (ZD50), 200 MacDill Boulevard, Post Office Box 46563, Washington, District of Columbia, 20035-6563
- ZIP Code
- 20035-6563
- Solicitation Number
- HHM402-15-D-0014-000302
- Archive Date
- 9/2/2017
- Point of Contact
- Cheryl Hyatt, Phone: 7037356417, Katelyn Rowland, Phone: 7037356414
- E-Mail Address
-
Cheryl.Hyatt@dodiis.mil, Katelyn.Rowland@dodiis.mil
(Cheryl.Hyatt@dodiis.mil, Katelyn.Rowland@dodiis.mil)
- Small Business Set-Aside
- N/A
- Description
- The Virginia Contracting Activity intends to solicit to procure Licenses on contract HHM402-15-D-0014-0003, Enterprise Platform Services (EPS), based on the authority of FAR Part 6.302-1, Only one responsible source and no other supplies or services will satisfy agency requirement. This task order is a current award under the Enhanced Solutions for the Information Technology Enterprise (E-SITE) contract. The Government intends to have Booz Allen Hamilton procure the Twistlock Enterprise Licenses. The licenses are intended to be purchased under the Materials CLIN on the contract. This notice of intent is not a request for competitive proposals. However, any responsible source who believes it is capable of meeting the requirement may submit a capability statement or proposal which may be considered by the agency, only if received by the closing date and time of this notice. A determination not to compete the proposed requirement based upon the responses to this notice is solely within the discretion of the Government. •· Description of Supplies or Services: The requirement is to Provide multiple licenses of a leading container security scanning software Twistlock, in order to allow Security Control Assessors to perform application security assessment funtions. The container scanning software must be able to support the following cases: Runtime defense to protect your containers against exploits, compromises, program mistakes and configuration errors. Vulnerability Management scanning which integrates with DevOpsSec pipelines. Access Control solution which can define and enforce fine-grained policies governing user access to Docker and Kubernetes resources. Compliance enforcement of standard configurations, container best practices, the use of trusted registries and recommended deployment templates. Continuous integration with plugins for Information Community Information Technology Enterprise (IC ITE) tool platforms like Jenkins as well as a standalone scanner. Control of container deployment and dashboard view of deployed containers Scanning of multiple container types (e.g. not limited to only Docker, etc.).
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/spg/ODA/DIA/ZD50/HHM402-15-D-0014-000302/listing.html)
- Record
- SN04627751-W 20170816/170814232059-9ea551c6310a0a0f6ac58d350fef48a2 (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |