This will lead you to GeM website.
Some cases have been reported where bidders have claimed non receipt of prior intimation of RA start. In order to ensure that no prospective eligible bidder is left out due to non intimation on time, it has been decide that RA will henceforth start 24 hours after the buyer proceeds for the RA creation and initiated RA. RA Start date and End Date will be notified to both buyer and sellers.
GeM system maintenance activity is planned from 17/06/2023 9:00 PM until 18/06/2023 02:00 PM. While we will work towards avoiding any outages, the system may be unstable intermittently. As a preventive measure, you are requested to either prepone or postpone Bid related activities such as Bid creation, Evaluation, Seek Clarification, Reply Representation and Negotiations etc, to other dates as per your convenience. Also, you may like to avoid keeping Bid end date and Bid Opening dates on or near these dates if feasible.
Please find enclosed OM dated 28.04.2023 on revised format for Registration of bidders from countries sharing land border with India under Rule 144 (xi) for your kind information and necessary action.
Notification regarding Cyber Security Control matrix
Please note that insecure products, solutions, and services lead to exposure to threats and cyber security breaches which affects procuring entities. Assuring cyber security as a feature of products and services require ensuring cyber security compliances as a part of procurement This will also help in building a cyber-security culture. Building awareness in government agencies to adopt cyber security controls as part of the procurement of ICT products and services, as well as engaging industry to put cyber security control requirements into practise, is crucial for meeting the objective of ensuring cyber security.
It is noted that many times due to lack of awareness various clauses, provisions, and guidelines regarding cyber security requirements mandated by MeitY are not being incorporated while making procurements by buyer organisations. In order to give inputs to the procuring authorities regarding these aspects, Indian Computer Emergency Response Team (CERT-In) drafted a discussion paper regarding cyber security control matrix for the procurement of services and solutions by government organisations. The control matrix includes governance and policy, confidentiality, availability, regulatory complexity, audits and situational awareness, data security, application security, and network security. Discussion paper indicates the specification and requirements of different controls as well as indicative methods for verification for each control matrix. A copy of the discussion paper is enclosed herewith.
It may be noted that procuring entities may select and include appropriate and applicable controls from the control matrix indicated in the discussion paper as a part of their procurement of ICT services and solutions. Procuring entities may also consider adding additional specific controls as per their risk profile and scope of services.
It may also be noted that the adoption of cyber security controls by procuring entities in the procurement process may be kept voluntary (as best practises). However, after a year, based on the outcomes, learning control may be mandated as a part of all ICT-related procurement by government entities.
All buyer organization as well as seller/service providers are requested to note the above.
Push Button Procurement (PBP) functionality enhanced - No need for buyer to certify reasonableness of rates:
GeM has enhanced the Push button Procurement functionality enabled as per DoE OM number F.6/7/2022-PPD dated 11th January 2023. The new guidelines for PBP are as follow:
Please refer push button procurement Manual for detailed guidelines. The details of Categories enabled for PBP are available here.
Buyers are advised to comply the latest OM No.F.7/10/2021-PPD (1) dated 23.02.2023 issued by DoE for the restrictions under Rule 144(xi) of the General Financial Rules (GFRs), 2017 while procuring on GeM.
With reference to the clause 4, Section xiii, Sub-section 'm' of GeM GTC, it is to bring to your kind attention that the following categories of Sellers are exempted from furnishing Bid Security:
Note: No EMD to be taken from exempt category of sellers even by way of specific clauses mentioned in ATC / STC by the Buyers. Such clauses which are against the GeM GTC, will be treated as null and void.
Get immediate financing through TReDS to pay your MSMEs and show compliance with MSMED Act.
Benefits of TReDS:
How to avail benefits of TReDS?
Not registered with TReDS? Start registration NOW
With reference to the OM No.F.6/1/2023-PPD dated 06.01.2023, from Dept. of Expenditure, the minimum service charges for the commission based Manpower Outsourcing services has been revised to 3.85%. Procuring entities can also fix the service charges above 3.85% with proper justification on file, wherever required. However, such service charges should not exceed 7% in any case. It is also recommended to use the Least Cost Selection (LCS) especially in High Value Bids, the template for which can be assessed on this link.
DPIIT has issued OM P-45014/33/2021-BE-II (E-64737) dated December 20th, 2022 related to common examples of "Restrictive and discriminatory conditions against the local suppliers" and "Other conditions which make the bid non compliant to PPP-Mll Order''. Buyers are advised to comply with the same and ensure that their tenders are compliant with PPP-MII Order and don't include restrictive and discriminatory conditions against the local suppliers.
Single packet bid has been enabled on GeM and buyers can procure using it. In single packet bidding both technical and financial offerings are being opened simultaneously and buyers evaluate both financial and technical offers simultaneously and publish the evaluation results. Please refer to the user manual for details.
Additional disclaimer and recommendation for buyers for procurement of Drugs/Medicine through Custom/BOQ bids:
All Provisions of Drugs and Cosmetics Act, 1940 and Rules made there under as amended till date will always be applicable. This will include all notifications issued by Central Drugs Standard Control Organisation (CDSCO), Ministry of Health & Family Welfare (MoHFW) and Department of Pharmaceuticals (DOP), Ministry of Chemicals & Fertilizers from time to time in this regard.
The sellers are registered on GeM based on self-declaration of valid Drug License, product certification, test reports etc. However, buyers mandatorily check and validate the details at their end for all applicable licenses and certifications e.g., validity and authenticity/genuineness of drug license, product certification, manufacturer certification/licenses, test reports etc.
In case of custom/BOQ bid, it is recommended to take Notarized Undertaking from private drug manufacturers for necessary compliances. (attached format of "Notarized Undertaking")
Only manufacturers for particular drugs/medicine may be eligible to participate in the bid or quote for the drugs/medicine.
The service category “Healthcare Human Resource Outsourcing Service” has been merged with the other existing manpower outsourcing services which are Manpower Outsourcing Services - Minimum Wage and Manpower Outsourcing Services - Fixed Remuneration . Hence, it has been disabled from the market for all new bids. Buyers can hire the healthcare resources from these 2 manpower outsourcing service categories. There will be no impact on already published bids.
GeM has launched the Push button procurement functionality on experimental basis enabling buyer to buy upto 5 lakhs simplifying the procurement process and require minimal intervention from buyer. This is system driven procurement enabled for the limited 50 categories . This has been enabled vide DoE OM number F.6/7/2022-PPD dated 11th January 2023. The buyer may refer the push button procurement manual for further details. The details of categories enabled for PBP is available here. The key guidelines for PBP are as follow
Load Based Bidding
Bids are currently being evaluated on GeM based on the price quoted by the bidder at the time of bid participation. However, there are some use cases when the buyer publishes a bid and expects certain technical and commercial parameters to be used to evaluate the price, resulting in the evaluated price being different from the bidder's offered price.
To capture detailed technical and commercial parameters, GeM has added another feature whereby a buyer can declare the Technical and Commercial Loading Criteria for Bid Evaluation during Bid Creation itself, which will be printed for the bidders' reference in the Bid document.
The selection of the Techno Commercial for Bid Evaluation will be optional for the buyer and the same can be saved as "No," if buyer doesn’t wish to go with the same.
This will be used by the buyer for the limited categories available in the GeM marketplace.
Categories where Load based will be applicable - BIOMASS and types of pumps like HSD, Screw , Fuel, Petrol pump.
Bunching of predefined categories has been enabled now for bidding. Buyer can create bunch bid of items from same category. Buyer can also create bunch bid of items from different categories if such categories are enabled for bunching by GeM. If the item categories that you are trying to bunch are not enabled to be bunched together and you feel that these are items are having same Supplier / OEM base and are required to be bought together and bunching will not lead to restriction in competition, then you may please send an email request to GeM at request-bunch@gem.gov.in for enabling bunching of such categories. Please mention exact name of GeM categories that you are requesting for enabling bunching. Your request would be examined by GeM team and if it is found that such bunching would not lead to restrictive bidding, GeM would enable bunching of those categories. This is a one time exercise and once enabled, all buyers can bunch those categories in all their future bids. Custom and BoQ items are by default enabled to be bunched with other regular categories.
The option of acceptance/ rejection of Direct Purchase/ L1 orders will be discontinued on GeM from 29th July 22 onwards. All the orders placed on GeM shall be auto accepted unless the buyer is red flagged or the order is for a freight intensive item. Only in these cases, the sellers will get an option to Accept/ Reject the order. Even in these cases, the order shall be auto accepted in 5 days if no action is taken by the seller.
The functionality for the collection of interest amount on the delayed payments as per DoE OM No.F.6/18/2019-PPD dated 3rd July 2020 is being made live from 01st August 2022, which would be applicable on all CRAC issued/generated on or after 01st August 2022. If the payment is delayed beyond prescribed timelines, the buyer will be liable to deposit interest as per DoE OM. Interests due showing in the Buyer dashboards for older contracts are being reset to zero and all future interests would have to be paid using online functionality deployed on the GeM using the SBI payment gateway.
Please read DO from CEO GeM regarding misuse of Custom / BoQ based bids.
DP and L-1 purchase for multiple consignee is not allowed. Buyer can add multiple consignees during bid creation.
Bunching of the items has been disabled for Direct Purchase and L1 purchase. For ordering multiple items put the items in separate carts and proceed to checkout in each cart.
GeM is in process to phase out the use of OTP based on authentication process at various stages of procurement like bid floating, bid submissions, invoicing, CRAC generation, Bill process, payment etc. For seamless and hassle-free transition it is advised to get yourself registered for esign or DSC based authentication services and complete all associated formalities. The exact date of disablement of the OTP based authentication will be communicated in near future.
GeM is in a process of development of functionality to deal the statutory variations of contract like GST, VAT etc online. In meantime till such functionality is deployed buyers and sellers are advised to deal variation of taxes OFFLINE at their end with due verification and scrutiny as per enforced tax rates, contract clause and applicable guidelines of organization.
Direct RA is being disabled. Please use BID to RA in place of Direct RA.
Escalation of Tickets – Please raise a ticket while flagging any issue to GeM, it helps better tracking, monitoring, and faster resolution. Further it helps in escalating it to higher level if issue is not resolved within defined timeline. Now tickets can be escalated https://gem.gov.in/gemtickets/create to higher level.
Training for registration and bidding for buyers and sellers - GeM offers self-help trainings for buyers and sellers to register and procure services from the GeM portal without any external help. The link to access these training programs is https://gem.gov.in/training/training_module.
Input Tax Credit - Input Tax Credit and Reverse Charge Mechanism feature in BID has been implemented. Input Tax Credit is required by Buyers who are eligible for Input Tax Credit on GST and GST cess (wherever applicable) in their purchase. Since they get credit of GST therefore, they require financial evaluation of BID considering input tax credit (ITC) so that L1 evaluation is on Net landed Cost to the Buyer. There are three types of sellers in this case. One is regular GST registered seller, unregistered seller and seller registered under composition scheme. This functionality is for all goods and services except services on commission base.
Custom bid and BOQ Bid- GeM strongly recommend use of category based bids - Use of Custom Bid / BoQ bid is not allowed for items for which regular category is available on GeM. Buyer can use the features of Additional parameters also to suit its requirement. Any bid created under Custom / BoQ category shall be cancelled by GeM without any notice, if it is found that regular category is available on GeM for similar items.
Creation of secondary user under different primary user with same mail id: The secondary user registration using an existing email address should be allowed for all the roles - Buyer, Consignee and PAO/DDO.
GeM has revised its Transaction Charge policy. This can be accessed at here
Vaccines and Generic Drugs/Medicine categories - Categories of Vaccines required under the Universal Immunization Program (UIP) of MoHFW have been made live in consultation with them. The categories of TB medicines required under National TB program of MoHFW and other generic drugs/medicines have been made live.
Unlimited RA Auto Extensions - Now there is NO limit on number auto-extensions allowed in reverse auctions, GeM recommends use of unlimited auto extension for best price discovery.
Bid opening from 3 days instead of 10 days only for central Gov & Central CPSE buyers and not applicable on BOQ and custom bids.
BID Life cycle from system has been removed from the system for all types of bids/RA.
Technical evaluator: Evaluation can be based on Single/Multiple evaluator(s) or self, selection for Tender Committee (TC) option shall also be available
Re-blocking of funds - Buyers will now be able to block funds which they had not done at the time of order placement due to reasons like change of financial years etc.
New Functionalities on Services
L1 negotiation: Buyer now gets an option to negotiate with L1 discovered from the financial evaluation. In case service provider has uploaded the price breakup then service provider gets the option to upload revised price breakup after conducting their negotiations with the buyer.
MSE preference: If buyer has selected MSE preference in bid then buyer will get option to send price match request to MSE if Non MSE bidder is selected as L1 and MSE price quoted is within L1+X% (X as defined in bid) range. In case buyer has not opted for MSE preference then buyer needs to provide competent authority approval with detail of approving authority.
Minimum floor price: A new feature has made live to solve the above problem, minimum floor price feature is available for buyers to define the minimum floor price below which no service provider would be able to quote in bid. This feature will help buyers to get reasonable price offers in bids. This feature is available for all PSUs/CPSEs/State Buyers and MoD.
Online invoicing for services - In order to introduce end to end procurement on GeM Invoicing has been made live on GeM for service providers and buyers to streamline the complete process.
Invoice rejection by consignee - Once the invoice raised by service provider, consignee now has the feature to reject the invoice against some rejection reasons which will be visible to service provider. Based on the comments, service provider will be able to update the invoice and then submit again.
Provision to upload additional SLA and SOW and ATC - Buyer has provision to write or upload document files for all of above features which will further become part of bid document and contract document and service provider has to abide by that. The terms and condition, scope of work or SLA mentioned by buyer will supersede by default conditions mentioned in SLA of the service.
Price breakup - GeM has introduced the functionality where Buyer can request for Price Breakup, Format to be uploaded by buyer for the breakup of components on cost/price offered by Service Provider in the Bid. Format uploaded by buyer may be used by service provider as reference for providing financial breakup. L1 will be evaluated by system basis on lowest price offered. GeM restricts this document to be available only during financial evaluation step, buyer will be able to open this document after financial will be open.
Custom filter for buyer - GeM has introduced feature to choose “Others” option from the list of values of technical parameters in case desired parameter is not available. Buyer has to select “Intent of Buying” as “Bid” to enter the Customized Requirement.
GeM system maintenance activity is planned from 25/06/2022 9:00 PM until 26/06/2022 12:00 Noon. While we will work towards avoiding any outages, the system may be unstable intermittently. As a preventive measure, you are requested to either prepone or postpone Bid related activities such as Bid creation, Evaluation, Seek Clarification, Reply Representation and Negotiations etc, to other dates as per your convenience. Also, you may like to avoid keeping Bid end date and Bid Opening dates on or near these dates if feasible. Please note, during this period Buyers can access all previous and ongoing Bid/RA status and details from their panel.
Forward Auction is a new feature addition into GeM platform enabling integrated B2B (Business to Business) and B2C (Business to Customer) auction featuring pan India auctioneers and bidders. As a GeM registered buyer, user can create “Auction” to sell off goods/materials/immovable assets within GeM portal using Forward Auction application and can reach out pan India bidders at a larger scale. To know more, click here
Advanced Search- https://bidplus.gem.gov.in/advance-search
Please click here to view the service approval process flow.
"Buyer Selected Non-Golden Parameters are now mandatory Bid requirement” - Buyers can now choose both Golden and Non-Golden Parameters for defining the Bid Requirements. This will enable Buyers to impose a non-golden parameter as a mandatory specification for their Bids.
All Golden parameters of the category and only those non-Golden parameters which Buyer has selected while creating bid (with values as selected by the Buyer or better than that), will now form part of the overall item specifications in Bid and will be published in the Bid document. Please note that the Non-Golden Parameters which are not specifically selected by the Buyer will now be discarded from bid and will not be published in bid and Sellers can offer a product with any of the allowed values for such non-golden parameters. If buyer want to make any non-golden parameter a part of bid, he must select that parameter and select its allowed values while creating bid, else GeM system would presume that buyer has no specific choice for that parameter and will accept any value for that parameter. No bid can then be rejected for such non selected parameter.
It is also to be noted that the values of the reference product are no longer part of the bid and only allowed values will be part of bid. For Golden parameters, by default GeM would incorporate all values that are better than the reference product's values in the bid. Buyer can select and allow any more values that he feels appropriate so that the bid is as generic as possible to attract maximum competition. Similarly for Buyer chosen non-golden parameters also, reference product's value and better values would be allowed by default and Buyer can add more values of his choice.
Sellers would now need to mandatorily comply with complete Bid specifications to proceed with Bid participation. Since bidders will now be pre-filtered and allowed to offer only those products which are matching with allowed values of Golden as well as non-Golden parameters (Buyer selected), there would now be no need for Buyer's to check or reject any bid on the ground of specification mis-match as far as GeM catalogues are concerned.
Incident management policy has been revised, please click here to view the new policy.
As per the OM issued by the Department of Expenditure, Ministry of Finance (No.F.6/18/2019.PPD), the following provisions have been enabled on GeM -
Proof of Delivery Submission
The system would not allow the seller to generate an invoice, if the delivery period of an order has passed. The sellers must also submit the proof of their delivery to the consignee's location before the delivery date of the orders has passed, for their shipments to be eligible for Auto PRC and Auto CRAC
Auto PRC and Auto CRAC
Auto PRC
In case if the seller has submitted the proof of delivery before the order's delivery date has passed, their shipments would be eligible for auto PRC. This means that if the consignee does not generate the PRC within 4 days from the date of delivery as per the proof of delivery submitted by the seller, then the system would generate an auto PRC, marking all the shipped quantities as PRC accepted. At this point, the consignee would have 2 more days to make any modifications. In case, if still no action has been taken by the consignee within these 2 days, then this system generated auto PRC would be considered as the final PRC which could no longer be modified.
Auto CRAC
In case if the seller has submitted the proof of delivery before the order's delivery date has passed and the final PRC is also completed (through the system or by the consignee), then their shipments would be eligible for auto CRAC. This means that if the consignee has not generated the CRAC within 10 days from the date of delivery as per the proof of delivery submitted by the seller, then the system would generate an auto CRAC, marking all the PRC quantities as CRAC accepted. At this point, the consignee would have 3 more days to make any modifications. In case, if still no action has been taken by the consignee within these 3 days, then this system generated auto CRAC would be considered as the final CRAC which could no longer be modified.
Supplementary Invoice
For product orders where the consignee has made some rejections at the PRC or CRAC stage, the sellers would now have an option to issue a supplementary invoice against these rejected quantities. This option would be available to the seller before the delivery date of the order has passed.
For more information on the OM, please click here.
Category | DNS SECURITY SOFTWARE / APPLIANCE |
Name of Software | CiscoUmbrella |
Name of the OEM | CISCO |
OEM Model / Part No | Essentials |
Brief Product Description | CiscoUmbrella |
Types of Licence | Subscription |
" Duration of Subscription (in Years) (Hint : - Select '0' if not applicable ) " | 1 |
OEM Licensing policy | Per User |
Number of Users incorporated in the scope of License (Hint : - Select '0' if not applicable) | 1 |
Number of IP incorporated in the scope of License (Hint : - Select '0' if not applicable) | 1 |
Number of Query per second offered in the scope of supply(Hint : - Select '0' if not applicable) | 1 |
Licence Delivery Mode | Electronic Licence |
Scope of Installation | Installation,Demonstration,Integration,Configuration,End to End Workflow Implementation.,User Acceptance Testing of offered modules. |
The offered product have support from OEM for | Unlimited updation for Patches and Bug fixes within support period.,Unlimited upgradation of version within support period |
Number of Years upto which support is available from OEM for Updation (Patches and Bug fixes) (Hint :- Select' 0 ' if not applicable ) | 1 |
Number of Years upto which support is available from OEM for Upgradation of version (Hint :- Select' 0 ' if not applicable ) | 1 |
Training Options | NA |
No of days Training Provided | 0 |
The offered product work on | Leverage predictive intelligence |
The offered product capable to detect and block malware | Using protocols different from HTTP/HTTPS,Regardless of the specific ports or protocols used by the malware.,Used for both opportunistic attacks and targeted attacks targeted for this specific organisation. |
Type of Malware categories can be protected by the offered product | Botnets,Exploit kits,Drive-by,Phishing. |
Capability of offered product to block DNS Request (In millions) | 1000 |
The threat intelligence can be automatically updated in the offered product after the discovery of a new threat (In minutes) | 15 |
Security Features | The offered product capable to detect and blockSuspicious DNS requests returning RFC1918 compliant IP addresses not allowed to be routed on the Internet, or directed to Dynamic DNS services.,Capable to prevent infections.,Capable to block the DNS requests towards malware distribution domains or drive-by domains,,Capable to contain the pre-existing infections.,Capable to block the DNS requests towards command and control infrastructures.,The predictive intelligence is created via the DNS traffic analysis on a global scale.,Predictive detectors capable to identify in real time, where attacks are staged and consequently predict and prevent the next move of attackers.,The offered product includes a transparent intelligent proxy configurable inside each security policy and capable to analyse both HTTP and HTTPS traffic.,The transparent proxy is enforced without any explicit mechanism such as a proxy PAC file or an adapter inside the network device.,The offered product capable to enforce Web filtering policies, and the Web filtering policy independently form the security policy.,Offered product capable to add custom whitelist & blacklist domains.,Allow to visualise the IoCs and the features of this domain inside a dedicated investigation dashboard for each domain detected as malicious,,Capability for the administrator to classify public SaaS applications . |
Management Interface Roles Supported for | Administrator,Reporting User,Read-Only Users |
Management Policy Features | The management interface is web-based.,The management interface provides a graphical policy editor to define security and web filtering policies.,The policy editor allows the creation of security policies based on identities such as networks, users, computers.,Security Policies allows the creation of distinct security and web filtering profiles.,The policy editor has a test function to verify the identities matching a security policy prior to its deployment in production.,The policy editor allows to define a blocking page for the blocked DNS connections.,Provision to customise the blocking page for each policy entry. The customisation is include the ability to define a custom message, insert a custom logo, or an administrator email address.,The policy editor allows to define a different blocking page for each identity and category of events,The policy editor allows to create users, on a local database, with the ability to bypass the blocking page.,The policy editor allows to create special codes that allow to bypass the block pages for the users who have them. |
Management Features | The events related to all the DNS queries analysed appears in real time.,The events related to the DNS queries associated to security events appears in real time.,All the filters applicable define a custom time (filter by date).,All the filters applicable selecting web filtering categories and/on security categories.,Provision to selectively enable the IP Layer Enforcement inside each security policy.,The network used to deliver the DNS security service is use Anycast. |
The offered product capable to configure filters based on | Identity,,Destination,,Source IP,Response type and date. |
Authentication mechanism for the administrators supported by the offered product | Two Factor Authentication mechanisms,SAML integration with a SSO provider. |
DNS Support | Incremental zone transfer,AD / BIND DNS and DHCP Management with clientless integration.,Traffic re-direction based on Source IP, Server availability and network topology,Traffic distribution methods : pools, global availability, ratio, round robin and topology,Topology rule based on user defined attributes, subnets and geography,.Traffic control health monitors based on Http, https, ICMP, PDP, SIP, SNMP, TCP.,Dynamic DNS update to support application and Services.,Recursion access control.,Security features such as configuration of ACL (Access Control Lists),GSLB reports,Resource availability status,Resource availability trend,Pool availability trends and status,Traffic response distribution trends |
Number of apps can be blocked by the offered product | 1000 |
Apps features | Ability to calculate risk score of apps compiled from various elements like Business/ Usage/ Vendor Compliance.,Capable to show App Details/Informations like risk score, type, category, users that have used it and detection date.,Ability to show Workflow management via labeling of unreviewed and recently discovered apps to facilitate healthy cloud adoption.,Ability to show DNS Requests by App Risk & assigns a risk score to apps, based on a number of factors. |
Agent features | The agent capable to provide a profile for the VPN Client.,The agent capable to enforce a dedicated set of security and web filtering policies for the external users,,The agent capable to transparently extend the internal security policies when the endpoint is outside the organization.,The roaming agent can be deployed via GPO or an MSI package.,The roaming agent is lightweight, running in user mode, and transparent.,The roaming agent is able to apply an additional level of enforcement based on the analysis of the connections trying to connect directly to an IP without generating and DNS queries (IP Layer Enforcement).,Capable to extend the protection off the network through the installation of a lightweight roaming agent on the Windows and OSX devices. |
Deployment Features | Minimal impact with the existing DNS infrastructure,Threat intelligence feed to be provided by the OEM who serve the recursive DNS requests.,Easily deployable, simply changing the forwarders to the OEM recursive DNS.,Offered product is applicable simultaneously to all users connecting from wired and wireless networks, with the possibility to define different policies based on different public IPs, and or internal networks, or Active Directory attributes . |
Deployment Options | Cloud,On premises,An internal virtual forwarder,Pointing the forwarder of the existing authoritative DNS to the recursive service,,Pointing the DNS configured on the Internal Proxy to the recursive service, without any additional physical hardware. |
3rd Party Integration / Security Integration Features | SIEM - DNS security event correlation,NAC - automating and deployment of NAC policies to malware infected client, identified by DNS security,Firewall Integration : - automating and deployment of firewall policies to malware infected client, identified by DNS security,Vulnerability Scanner Integration : automating and deployment of VA Scan to malware infected client, identified by DNS security,SOAR Integration - DNS security event correlation and automation of security policies deployment.,The DNS Security solution to support API integration with infrastructure security solution using Rest API or ready available framework. |
Generic Parameters | Flushing the live cache without restarting the server.,DNS architecture capable to load the DNS query and distributed across many locations for dynamic application delivery.,Automated DNSSEC lifecycle management,Capable to configure and perform aging and scavenging of stale resource records stored by the server,Capable to administrator to monitor the contents of the server cache and as needed, clear it.,DNS64 functionality,The Active DNS server to notify the standby DNS to update the records in real time in case any change happens in zone files located on active server.,Capable to automatically synchronize with other DNS servers in the cluster to enhance the data reliability.,IPV6 support with DNS 6 to DNS 4 & DNS 4 to DNS 6 translation based health check for intelligent traffic routing and failover.,Support full DNS server functionality to support all kind of DNS records,Support Multi-homing function for inbound IPv4 and/or IPv6 traffic Load Balancing by enabling DNS relay or DNS authoritative server function.,Capability to be configured either authoritative (both primary and secondary) or caching DNS or Stealth.,The DNS component to support the query for all IANA Resource Records (For eg: NAPTR, SRV, A, AAAA, NS, MX, CNAME etc.),.The DNS component to support both types of query mechanism: Recursive and Iterative. |
Dashboard features | The dashboard allows to reclassify a domain related to a security event, directly from the event record.,Provision on dashboard to link for allowing to open a ticket towards the security OEM research team.,Dashboard capable to show the global DNS activity on each configured site, identifying in real time the targeted attacks comparing the local DNS traffic to a specific domain with the worldwide DNS traffic for the same domain.,Dashboard capable to show an overview of all the traffic of the local organisation, with the ability to identify the prevented infections, the contained infections, and the blocks due to the web filtering policy. |
Management Platform capable to generate reports for | Total requests,Activity volume,Top Domains,Top Categories,Top Identities. |
Reporting features | The management platform is have advanced reporting capabilities to identify cloud services or Shadow IT devices, in order to determine which services are used inside the organization by traditional or embedded devices and eventuallly detect anomalies in their usage.,All the reports is exported in csv format or scheduled to be sent via email.,All the activities made by administrators is logged inside an Admin Audit Log Report. |
Scope of Technical Support | Unlimited updation for Patches and Bug fixes and Repair of known Issues within terchnical service support period.,Unlimited upgradation of version within technical service support period.,Troubleshooting of Sofware Malfunctions;,Remote (via Telephone, Email, Video Calling, etc.) Support beyond L1;,Support from Monday through Friday from 9:30 AM to 6:00 PM IST (Except Vendor Holidays),24 x 7 Hour Support |
Additional Features | NA |
Hyper link to Data sheet | http://www.cisco.com |
Please select "Allowed Values" for different specifications for properly defining your product. You can select multiple values as "Allowed Values" against any parameter to allow more competition.