Cyber security contract

This contract provides access to cyber security products and services.

Summary

This closed panel provides access to suppliers that offer cyber tower products and services, which includes:

  • endpoint protection 
  • vulnerability management 
  • application control 
  • third party risk management

Lead agency: Department of Government Services

Conditions of use: Non mandatory

Contract reference number: DGS-ICT-03-2023 

Arrangement type: Closed panel 

Start date: 1 May 2024 

End date: 30 April 2027 

Key benefits

Key benefits of this contract include:

  • better cyber security outcomes through reduced time, effort and costs to procure commonly used cyber products and services
  • helps different systems work better together by using fewer types of technology
  • achieve continuous contract value by comparing industry standards 
  • competition amongst panel members, which helps get the best deal and price 
  • inclusion of procurement-related policies, such as:
    • Social Procurement Framework 
    • Fair Jobs Code
    • Local Jobs First 

What's covered

This contract provides the cyber security licenses and services for the following tower products and services:  

Products and/or servicesDescription
Endpoint protection

Protection of computer networks that are remotely bridged to client devices

  • Fortinet : Centorrino Technologies Pty Ltd
  • MS Defender : CyberCX Pty Ltd
  • CrowdStrike : Ernst & Young
Vulnerability management 

Integral to computer security and network security, a cyclical practice of identifying, classifying, prioritising, remediating, and mitigating software vulnerabilities

  • Tenable : CyberCX Pty Ltd
  • Qualys : Ernst & Young
Application control

Security technology that recognises good files and blocks bad files passing through any endpoint in an enterprise network

  • Airlock Digital : AC3
  • Ivanti : Logicalis Australia Pty Ltd
  • VMware : NTT Australis Pty Ltd
Third party risk management

Involves identifying, assessing, and controlling risks that occur due to interactions with third parties

  • CyberGRX : Sparx Solutions

Supplier details

How buyers join this contract

Buyers need to request access to the confidential information system to join this contract.

How buyers use this contract

Buyers must follow these steps to use this contract.

Step 1: Review services offered

Access the confidential information system to review prices and services offered for this panel.

Step 2: Contact the supplier Account Manager 

Select the goods and services tower category required, email the Account Manager to discuss pricing and services. See, Supplier details section above.

The prices shown in the contract are the maximum prices. Buyers should always consider if there is an opportunity to negotiate a lower price.

Step 3: Seek approval

When the price and service have been agreed, follow local Agency procurement process to seek approval.

Step 4: Complete the Agreement

Complete the Customer Service level agreement in the confidential information system.

Check if the services selected requires an additional Addenda.

Make sure the Agency's financial delegate signs the Agreement and/or Addenda.

Step 5: Return the completed Agreement

Return the completed Agreement and/or Addenda via email to the Account Manager.
 

Updated