RFI for Generation and Vulnerability Analysis Solution

Location:

Texas, United States

Posted on:

Feb 6, 2026

Deadline:

Feb 19, 2026

Summary:

Texas seeks an enterprise solution for SBOM generation, container analysis, and vulnerability scanning to support DevSecOps initiatives.

Get full access to this RFP

Settle helps teams find and win opportunities with AI through RFPs

Vendor needs to provide enterprise Software Bill of Materials (SBOM) generation, container analysis, and vulnerability scanning capability to support DevSecOps and Platform One operations. 1. The product must support generating SBOMs that comply with accepted industry standards (e.g., SPDX, CycloneDX). 2. The product must support generating SBOMs for common programming languages and ecosystems (e.g., npm, Maven, PyPI, Go modules, NuGet, RubyGems, Cargo). 3. The product must provide an API and or CLI to generate SBOMs during the build process (CI/CD). 4. The product should represent direct and transitive dependencies, including their relationships (e.g., which package depends on which). 5. Must support scanning container images. 6. The product must include optional metadata about repository URLs and commit hashes for each component, when available. 7. Packages listed in SBOMs should also have the PURL format. 8. The software must integrate with standard vulnerability databases, such as the National Vulnerability Database (NVD), RHSA, GHSA, and other vendor–specific feeds. 9. The product must be able to automatically check the discovered components in the SBOM against known vulnerabilities. 10. The product must map identified vulnerabilities to industry–standard severity metrics (e.g., CVSS scores). 11. The product should have mechanisms for users to mark or override false positives and provide context for false negatives. 12. The software must track changes over time to detect new vulnerabilities that affect older versions of the software. 13. Vulnerability feed content should be supplemented by custom data from security researchers to minimize false positives, especially when filtering out vulnerabilities that does not apply to containers. 14. Product need to take a container image as an input and output a vulnerability result for the container image.

BG

Submit your next proposal, within 48 hours or less

Stay ahead with the latest advancement in proposal automation.

BG

Submit your next proposal, within 48 hours or less

Stay ahead with the latest advancement in proposal automation.

BG

Submit your next proposal, within 48 hours or less

Stay ahead with the latest advancement in proposal automation.