Inactive
Notice ID:11198598
This is sources sought only. Solicitation will follow in approximately 4 weeks. If interested in this requirement, please send email to jeffrey.w.meyer4.civ@mail.mil with subject "Data Governance Soft...
This is sources sought only. Solicitation will follow in approximately 4 weeks. If interested in this requirement, please send email to jeffrey.w.meyer4.civ@mail.mil with subject "Data Governance Software". Include cage code for your business. The Texas National Guard has a requirement for a software solution that will govern the data in the current enterprise environment for the organization. Requirements are as follows: - Approved Certificate of Networthiness through NETCOM - Collects critical metadata, generates metadata where existing metadata is lacking (e.g. its file system filters and content inspection technologies), pre?processes it, normalizes it, analyzes it, stores it, and presents it to IT administrators in an interactive interface. - Audit Access to unstructured Data - Verify and report potential access, and actual access to data - Provide a detailed audit trail for enterprise data - Real time queries regarding access permissions of users and administrators - Ability to identify and successfully implement the least privilege model - Determine normal data usage habits for users - Alert administrators for out of the normal data access patterns - Have the ability to discover PII in unstructured data - Have the ability to segregate PII from unstructured data to an authorized area until action is taken by an administrator - Provide behavior alerts via email - Provide a mechanism for automatic actions to be taken based on alerts - Provide alerts when administrators behave abnormally - Provide alerts when service accounts behave abnormally - Provide a method to tag or associate a user as an "owner" of a data object or group - Provide a method for the data owners to effect permissions and group changes on their owned objects without elevating end user privileges - Report on unused or empty security groups - Provide a report on inactive data and inactive users - Provide a report of disabled users still in security groups - Provide graphical identification of abnormal access activity levels