Intrusion Detection. Protection and Firewall Appliances — Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)
Appears in 4 contracts
Samples: Cooperative Contract, Cooperative Contract, bidopportunities.iowa.gov
Intrusion Detection. Protection and Firewall Appliances — ― Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)
Appears in 4 contracts
Samples: Cooperative Contract, End User License Agreement, Service and License Agreement
Intrusion Detection. Protection and Firewall Appliances — ― Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)
Appears in 1 contract
Samples: End User License Agreement
Intrusion Detection. Protection and Firewall Appliances — ― Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)
Appears in 1 contract
Samples: www.ok.gov
Intrusion Detection. Protection and Firewall Appliances — Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPISPl) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)
Appears in 1 contract
Samples: Cooperative Contract
Intrusion Detection. Protection and Firewall Appliances — - Provide comprehensive inline network firewall security from worms, Trojans, spyware, ,key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of blockingof attacks. Intrusion Detection/Protection and Firewall Appliances should provideshouldprovide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-directory- based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)
Appears in 1 contract