Ministry of Foreign Affairs and Trade

Request for Information for a 2 Factor Authentication and Encryption

Reference No: MOFAT/ICT/2017/R1

REQUEST FOR INFORMATION

2FACTORAUTHENTICATION

AND ENCRYPTION

Table of Contents

1.Introduction

2.Objective

3.Background

4.Scope of Requirement

4.1Technical Proposal

4.2Commercial Proposal

5.Instruction for Responding

5.1Eligibility Criteria

5.2Terms and Conditions

5.3Submission of RFI

5.4Submission Format

1.Introduction

The purpose of this Request for Information (RFI) is to invite vendor to propose solutions for 2-FACTOR AUTHENTICATION AND ENCRYPTION.

2.Objective

The Ministry of Foreign Affairs and Trade through its ICT Department is seeking for 2-Factor authentication and encryption solutions to improve the existing security features.The proposed solutions must be able to provide better and stronger security features to protect unauthorized access to MOFAT ICT systems, data and information.

3.Background

3.1The ICT Department, Ministry of Foreign Affairs and Trade (MOFAT) provides ICT services to MOFAT employees in Brunei Darussalam and abroad.

3.2One of the ICT services is the email system that has a very high volume of usage. The email system is built using Microsoft Exchange server and the users are able to access email via Microsoft Outlook, Outlook Web Access (OWA) and Exchange ActiveSync over the internet and intranet.

3.3The existing system support desktop, laptop and mobile devices. Active Directoryis used to authenticate and authorize all devices and users to access MOFAT ICT services.

4.Scope of Requirement

4.1Technical Proposal

4.1.1The vendor shall propose solutions for the following requirements:-

  1. Two-factor authentication

The two-factor authentication (2FA) solutionmust providestrong authentication features for employee to access ICT systems such as email and file-sharing usingdesktop, laptop and mobile devices via intranet or internet.

  1. Encryption

An encryption mechanism shall be incorporated into the existing email and file-sharing systems.In addition, the encryption solution should include end user hard drive encryption.

4.1.2The proposed solutions should support Microsoft Windows, Mac OS, Android and iOS.

4.1.3The proposed solutions must be compatible with the existing systems and proven to be workable.

4.1.4The implementation of the proposed solutions shall not interrupt the operation of the existing systems.

4.1.5The proposed security features shall not outweigh the convenience of the users.

4.2Commercial Proposal

4.2.1The 2- Factor Authentication Solution(Table 1)

# / Item / Description / Quantity / Unit Price(BND$) / (BND$)
1 / Hardware / Software
a / User - Hardware / 700 units
b / User - Software License / 700 units
c / Server - Hardware / 1 Lot
d / Server licenses / 1 Lot
2 / Implementation Fee / 1 Lot
3 / Product Maintenance and Support Services – 1 Year / 1 Lot
TOTAL

4.2.2The Encryption Solution(Table 2)

# / Item / Description / Quantity / Unit Price(BND$) / (BND$)
1 / Hardware / Software
A / User - Software License / 700 units
B / Server - Hardware / 1 Lot
C / Server licenses / 1 Lot
2 / Implementation Fee / 1 Lot
3 / Product Maintenance and Support Services – 1 Year / 1 Lot
TOTAL

5.Instruction for Responding

5.1Eligibility Criteria

5.1.1All ICT companies but preferably the respondents should have an office locally in Brunei Darussalam.

5.1.2ICT companies are able to commit to Local Business Development Quadrant.

5.2Terms and Conditions

5.2.1The Government reserves to itself all copyrights in this RFI.The information contained in this RFI document is confidential and proprietary toThe Ministry of Foreign Affairs and Trade, Brunei Darussalam.

5.2.2All responses received shall become the property of the Government and will not be returned.

5.2.3The Government will not accept any responsibility for costs incurred in responding to this RFI.

5.2.4Submitting a response does not present a commitment for Government to proceed further in this process or plan with any Respondent.

5.2.5The Government representative may at its discretion, enter into discussions or negotiations with any Respondent, request further information from the marketplace, or pursue other options.

5.2.6The Government may request for a presentation for the solution request in this RFI requirement for further review.

5.2.7The RFI does not constitute a commitment to offer of a Contract or prospective Contract.

5.3Submission of RFI

5.3.1The RFI shall be written in English.

5.3.2One (1) hard copy and One (1) electronic copy clearly marked “REQUEST FOR INFORMATION FOR A 2 FACTOR AUTHENTICATION AND ENCRYPTION” (MOFAT/ICT/2017/R1)” should be submitted not later than2:00pm local time on (Thursday, 29th June2017) addressed to the following:

DEPARTMENT OF ICT

MINISTRY OF FOREIGN AFFAIRS AND TRADE

Jalan Subok, Bandar Seri Begawan BD 2710

Negara Brunei Darussalam

Email:

5.3.3A participating company seeking clarification of any of the requirements of this RFI prior to the RFI Closing Date may only do so in writing in by email to

5.3.4The Government will endeavour to provide any clarification as soon as possible. Each and every request for clarification (without any details as to who they are from), together with the relevant clarification, shall be distributed to all participating companies.

5.3.5The Government will NOT accept any request for clarification that is submitted within three (3) days prior to the RFI Closing Date.

5.4Submission Format

Respondents shall submit the RFI in the following format:

Title Page / The title page should indicate the title “Request for Information for a 2-Factor Authentication and Encryption”, Respondent name, address, telephone and fax number, email address and contact person’s name.
Table of Contents / Summary of Contents
Section 1: / Corporate Experience
  1. Describe the type of company (e.g. Limited Companies)
  2. Describe the company profile, size and history
  3. Provideclient references related to the proposed solution
Name and Address of Client / Name of Solution / Location where & when system was implemented
Section 2: / Corporate Capability
  1. Describe capability (financial, experience and workload capacity) to undertake this project
  2. Track record and experience in ICT security services
  3. Team Competencies and certifications in ICT security services

Section 3: / Proposed Model/Solution
A summarized brief description for each of the proposed solution inclusive with the information but not limited to the following:
  1. Approach for the solution
  2. Technology use for the 2FA
  3. Technology use for the encryption
  4. Project plan with deliverible time for overall site
  5. Support Services structure (local & international)

Section 4: / Respondent is required to complete Table 1 and Table 2 to indicate price(s) for the proposed solution and services.
Section 5: / Other applicable attachments can be included and listed under Additional Information.

Page 1 of 7