Mobile Threat Defense and Mobile Endpoint Detection & Response (MTD / Mobile EDR) Department of Justice (DOJ)
Overview
Buyer
Place of Performance
NAICS
PSC
Set Aside
Original Source
Timeline
Qualification Details
Fit reasons
- NAICS alignment with historical contract wins in similar service areas.
- Scope strongly matches core technical capabilities and delivery model.
Risks
- Past performance thresholds may require one additional teaming partner.
- Potential clarification needed on staffing minimums before bid/no-bid.
Next steps
Validate eligibility requirements, assign capture owner, and schedule partner outreach to confirm teaming strategy before submission planning.
Quick Summary
The Department of Justice (DOJ) is conducting market research through a Request for Information (RFI) to understand industry capabilities for Mobile Threat Defense (MTD) and Mobile Endpoint Detection & Response (EDR) solutions for government-managed mobile devices. This RFI is for information-gathering purposes only and does not constitute a solicitation. Responses are due by March 23, 2026.
Purpose & Background
DOJ seeks to assess modern market offerings that provide deeper mobile EDR-style capabilities, including investigative visibility, post-compromise analysis, and SOC-driven response, while supporting enterprise-scale deployment, privacy protection, and federal compliance. Mobile devices are critical endpoints for DOJ operations and are increasingly targeted by sophisticated threat actors.
Scope of Interest
DOJ is interested in solutions that can provide:
- Detection of advanced mobile threats across iOS and Android devices.
- Visibility into device state, configuration, and behavioral anomalies.
- Support for investigation and threat hunting on mobile endpoints.
- Integration with security operations (SIEM, SOAR, identity, MDM).
- Privacy-preserving telemetry collection aligned with federal expectations. Respondents may address traditional MTD, mobile EDR, or hybrid approaches.
Requested Information
Respondents should provide concise information on:
- Company Overview: Name, HQ, years in operation, federal experience.
- Solution Overview: Description, supported platforms (iOS, Android), deployment model, licensing.
- Threat Detection Capabilities: Ability to detect OS compromise, zero-day threats, network attacks, malicious apps, and phishing.
- Mobile EDR and Investigative Capabilities: Telemetry, post-compromise investigation, threat hunting, alert distinction.
- Security Operations and Integration: Integration with SIEM, SOAR, SOC, identity, and MDM platforms.
- Privacy, Data Handling, and Sovereignty: Data collected, user content protection, data residency, subprocessors, U.S. government data sovereignty controls.
- Scalability and Operations: Deployment scale, performance, availability, access controls.
- Compliance and Security Posture: Alignment with NIST, federal cybersecurity, FedRAMP status, supply chain risk management.
- Product Roadmap: High-level overview for the next 24-36 months.
- Pricing Model: High-level description of structure, licensing, and cost drivers.
Response Instructions
- Responses should not exceed 15 pages.
- Marketing material may be included as appendices.
- Submissions must be in PDF format.
Contract & Timeline
- Type: Request for Information (RFI) / Special Notice
- Set-Aside: None specified
- Response Due: March 23, 2026, 9:00 PM ET
- Published: March 19, 2026