Settle Intelligence
Settle helps teams find, evaluate, and respond to public RFPs. We continuously surface new opportunities, score them against your company strengths, and draft proposal responses so you can focus on the work that wins business.
Publish RFO: April 29th, 2026
Deadline for submitting questions: May 6th, 2026
Deadline for submitting responses to RFO: May 14th, 2026
Evaluation, oral presentations, negotiations, and contract execution: May 15th, 2026 – until completed
Texas Cyber Command
Organization overview and procurement intelligence available on paid plans.
A government authority in Texas is seeking a vendor to provide a Networks Operational Maneuver Service. The selected vendor must deliver a managed Full Content Inspection capability that offers defensive protection to TCP/IP network sessions across agency-designated boundaries. The solution should support inline, bi-directional inspection of designated network traffic at production scale, with a focus on maintaining low latency and high availability.
The engagement requires a fully managed agency solution encompassing all necessary hardware, software, licenses, subscriptions, deployment services, documentation, monitoring, support, maintenance, and regular updates. The vendor will be responsible for the solution's design, installation, configuration, integration, testing, and production cutover. Comprehensive services must include 24x7 monitoring, alerting, support, and operational tuning, as well as continuous updates for threat detection content, signatures, rules, and analytics.
Additional responsibilities include documentation, training, knowledge transfer, transition-out support, and maintaining agency-mandated service levels. The vendor must respond promptly to incidents, outages, and degradations per severity-based response targets, coordinate planned maintenance, and carry out ongoing tuning, rule maintenance, and software updates. Ensuring agency data confidentiality and supporting evidentiary handling when directed are mandatory. Defensive cybersecurity activities—such as monitoring, inspection, prevention, containment, sanitization, reporting, evidence preservation, and restoration support—are limited to those authorized by the agency.
Source attribution
This Settle analysis is based on the issuing organization’s public RFP listing.