Security assessment, monitoring and incident response services

Back to all procurements

OPEN Tender Procedure (2 Lots)

Interested tenderers may bid for one Lot - or both Lots.

LOT 1 – Security Assessment Services:

Maximum budget: €1.600.000,00 over 4 years

This Lot will conclude with the award of minimum 3 framework contracts to successful bidders with actual projects being tendered via ‘Re-opening of Competition’ (RoC).

Objective:

The IT systems/tools are either hosted on ENISA premises or outsourced. In spite of the hosting location of the systems/tools that ENISA owns, an expected or required level of security shall be assured. Therefore, vulnerability assessments, penetration tests, red team exercises and vulnerability management should be done regularly. These services shall be provided for systems, networks and applications.

Indicatively, ENISA assets make use of the following technologies:

-           VMware

-           Docker

-           Linux based systems, e.g. Centos, Ubuntu etc

-           Windows based systems, e.g. ADFS, SharePoint, Active Directory

-           Content Management Systems, e.g. Plone, Discourse

-           Atlassian platforms, e.g. Jira, Confluence

-           Databases, e.g. Oracle Mysql DB, SQL server DB, postgres, MariaDB

-           Instant Messaging platforms, e.g. Mattermost

-           Firewalls, e.g. Cisco, Fortinet

LOT 2 - Monitoring, analysis, threat hunting and incident response consultancy services:

 Maximum budget: €1.100.000,00 over 4 years

This Lot will conclude with the award of multiple framework contracts using the cascade system with a minimum of two successful bidders.

The IT systems/tools are either hosted on ENISA premises or outsourced. In spite of the hosting location of the systems/tools that ENISA owns, an expected or required level of security shall be assured, by means of sound monitoring, analysis, threat hunting and incident response services.  

The above services are expected to be provided for ENISA assets that are either hosted on premises or are outsourced. The logs collection is done on Splunk servers which are hosted on the premises.

ENISA IT assets that need to be monitored are (non-exhaustive indicative list):

  • VMs
  • Dockers
  • Web applications
  • Infrastructure like Firewalls, DNS servers, proxies etc

The IT assets to be monitored are either Windows or Linux based systems.

The tender documentation will be available on 16th February 2022 via the TED eTendering platform, which gives exclusive access to the eSubmission portal for submitting your offer - please use this link: https://etendering.ted.europa.eu/cft/cft-display.html?cftId=10190

The documentation is also provided below for reference purposes only - by first clicking on the tender title link above.

This could be interesting

Register your interest

If you download call documents, email us with the tender reference code in the subject to receive updates and clarifications directly.

Email contact form

Privacy statement

The ENISA Privacy Statement for the processing of personal data related to procurement procedures, is available for download via this link.

Download Privacy Statement

European Ombudsman

ENISA is available for info requests or complaints about its procurement procedures. You may also contact the European Ombudsman.

The web site of the European Ombudsman.