Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server"

Transcription

1 Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Srno 1 Current RFP clause Clause Details Bidder Query Our Response 2.2 (Eligibilty Criteria), Page Parent company s 100% subsidiary also no. 5 For bidding consortium is not allowed. allowed. Please be guided by RFP (Scope of no. 5 Hosting company should have a security policy and should have implemented the best practices for the webserver as per CERT-In/RBI guidelines/govt. of India Which location should be setup as DC and DR? Is DR set up for webserver,database required? What is network design envisaged? Please confirm if Bidder will also be responsible for setting up website? Pls let us know the Expectations on All security front as per cert, Kindly elaborate 1. DC & DR setup location is not fixed, however DC & DR should be in separate sesimic zone. 2. Yes, Network design should be Tier III architecture, web application and database. 3. Bidder will only be responsible for hosting developed website. 4. All the guidelines issued by CERT-IN/RBI/Govt. of India on webserver, network security shoild be adhered (Scope of no. 6 The bidder shall provide secured access at hosting infrastructure for updating the contents on the website. Please provide info if anyother secure access like verisign is required? TCL will provide the access through IPSEC encrypted session. The bidder shall be responsible for providing secured access at hosting infratructure using perimeter security devices viz. Firewall, IPS, UTM etc. The hosting websites will be having Bank's procured SSL Certificates ensuring that the websession is encrypted (Scope of The bidder shall ensure the uptime of 99.90% for web hosting infrastructure & relevant managed services TCL will provide 99.9 % on datacenter services Infra uptime and 99.5 % on web hosting service Please be guided by RFP

2 (Scope of 3.18 (Scope of The bidder should have its infrastructure and Web servers audited by auditors empanelled by CERT-In. The bidder should also have their web servers tested by Attack & Penetration testing experts quarterly and should let us know the empanneled auditors list? It take immediate steps to plug the is recommended to have 3rd party auditors security weakness unearthed. do the audit The bidder will have to trouble-shoot any problems with the website hosting at a short notice This should be just for webservices not for the applications. Bank has the right to conduct third party IS audit by its auditor. The empanelled list is available on CERT-In website The bidder has to troubleshoot problems related to website hosting services (Scope of The web server hosting bidder should have proper backup policy & Disaster Recovery Centre to ensure 99.90% uptime for the Website. Some of the features of back-up policy may include: A proper backup policy should be enforced and ensure regular backup of files. Maintain a latest copy of Web site content on a secure host or on media. The Disaster Recovery Site should be in state of readiness to take over the website hosting in case of disaster. Please specify 1. Back up policy ( eg daily incremental, weekly full etc) 2. Expected daily incremental data 3. Type of back up required?(san,nas etc?) 4. RPO and RTO envisaged for the service 5. Dedicated firewall, switches and other required network element required, or PNB is ok with shared network infra? 6. Database and webserver to be configured on single machine or different? 99.9 on datacenter services Infra uptime and 99.5 on web hosting service. This would help all bidders to be on same page. be met alongwith required RPO (30 min) and RTO (45 min)

3 (Scope of The bidder should provide all the necessary equipments, system software and other software for successfully hosting of a secured website and should be conform to Bank s Information System Security Policy (ISSP). We understand bidder needs to provide all the required components for the hosting website.please advise if all infrastructure would be required in HA mode? And what parameters are comprised in Bank's ISSP? Best security policies are covered under ISSP. All infrastructure are required in High Availability mode. Parameter's covered under Bank's ISSP are Confidentiality, Integrity, Availability (Signing of Contract), Page No (Uptime Requirement), Page no (Project Duration), Page no. 16 Annex D (Technical Specification-A), Page no. 22 The successful bidder (hereinafter referred to as vendor) shall be required to enter into a Service level Agreement (SLA) with PNB, within 7 days of the award of the tender or within such extended period as may be specified by the Bank but before start of the services by the vendor. The uptime requirement for PNB hosting infrastructure at DC & DR location is 99.90%. The downtime shall be calculated on quarterly basis in number of hours during which the services provided by bidder remains inaccessible 7 days is less time atleast 2 weeks is required to sign the SLA? Which location PNB wants DR site? And what needs to be mode of conncectivity between DC and DR i.e MPLS point to point? TCL will provide 99.9 % on datacenter services Infra uptime and 99.5 % on web hosting service 1. DC & DR setup location is not fixed, however DC & DR should be in separate sesimic zone. 2. Any mode of connectivity. The vendor should host the Bank s website or any other website as requested by the bank within 30 days from date of purchase order TCL requests the timelines to be 6-8 weeks. Redundant domain hosting for two domains on Domain name servers PNB should do the Registration of the domains? It s a config part, Registration has to be done by client Domain registration will be done by PNB. The hosting vendor has to do the supporting webserver configuration

4 Annex D (Technical Specification-C, Point 8), Page no. 22 Annex E (Data Center Requirements), Page no. 25 Annex E (Data Center Requirements), Page no (Scope of no (Scope of no. 6 The bidder shall ensure the uptime of 99.90% for web hosting infrastructure & relevant managed services TCL will provide 99.9 % on datacenter services Infra uptime and 99.5 % on web hosting service The source code review of web application to be done by the service provider through a third party. Necessary certificate for the same need to be provided by the successful bidder after deployment. The application ownership by PNB not by Service Provider Fault-tolerant site infrastructure with electrical power storage and distribution facilities guaranteeing % availability The bidder shall have the dedicated web hosting infrastructure of Tier level III compliant and above Data Centre for Window based (Window Operating System, IIS webserver,.net Framework, Anti Virus Protection, Firewall) web hosting services. The bidder shall provide secured access at hosting infrastructure for updating the contents on the website. As per Tier 3 Standards the utpime should be Read as:- Can we propose a Dedicated Blade or Virtual Instance in place of Dedicated server. Please Clarify if secured access to hosting infrastructure refers to VPN access or limited to access via the Firewall, IPS, UTM etc The source code review shall be taken care by Bank but the bidder has to provide the licensed copy of OS, Database, webserver application. As per RFP, the % availability is applicable for Tier IV Data Center. The bidder shall be responsible for providing secured access at hosting infratructure using perimeter security devices viz. Firewall, IPS, UTM etc.

5 (Scope of no (Scope of no (Scope of The bidder shall monitor the server and all security devices on 24X7 basis and protect them adequately by use of different security devices such as firewall, IPS, unified threat management system etc. The bidder should provide access logs of the security devices placed for dedicated servers, to the Bank for monitoring purposes. The bidder should ensure that the Antivirus installed at the server must be updated regularly with latest antivirus definitions. The system should be scheduled for daily scan. The bidder shall ensure the uptime of 99.90% for web hosting infrastructure & relevant managed services. The bidder shall ensure the uptime of 99.90% for web hosting infrastructure & relevant managed services. Read as:- what would be the log frequency ( Monthly, Quartely, yearly) Read As:- Any specific anti virus is needed Please confirm if active DR setup is required, since 99.9% uptime is expected. Read As:- who will declare the Disaster, who will handle DR Management, Replication management The Logs analysis report should be submitted monthly or on demand. No specific Antivirus. The AV edition should be corporate. The bidder has to ensure for 99.9% uptime which is expected to meet with Concurrently maintainable site infrastructure Bidder shall be responsible for declaring the DR and handling the DR management. The uptime requirement of 99.9% should be met. Read As:- in concerned to Disaster recovery what would be the RPO/RTO defined Read as:- if failover happens then all the services should -fully available immediately after the switch-over? The uptime requirement is 99.9%. The RTO is 45 minutes and RPO is 30 minutes. All the services should be available immediately.

6 Read as :- Please confirm if PNB would declare the disaster? If not, would PNB provide access to DC Infrastructure for disaster detection? Bidder shall be responsible for declaring the DR and handling the DR management. The uptime requirement of 99.9% should be met. Details of parameter regarding Datacenter is already mentioned (Scope of Read As:- What would be growth in terms of no of applications, storage /data, users for the next five years on annual basis. Read As:- Would you like Sify to manage the DR site for Connectivity, Consultation, Design, Supply, Implement and Management,Conduct Drills? Present requirement is for hosting the corporate website of the Bank. In future other Bank's website can be hosted. Requirement can't be ascertained at present. be met alongwith required RPO and RTO. Read As:- DR Tool: - Would you like to consider automation software to increase reliability of DR site functioning and successful failovers? Do you have any specific DR Tool preference? Read As:- Please confirm the frequency of DR drills - Once/ Twice in a year and if the same can be done in phases be met alongwith required RPO and RTO. Drill to be conducted quaterly Is PNB looking for a fully redundant network architecture? be met alongwith required RPO and RTO Annexure D- A. Minimum Read As:- Please confirm if there are requirement for load balancer for the web servers. be met alonwith required RPO and RTO.

7 a Point 1 Please clarify if 4 GB or 8 GB RAM is required? Minimum requirement if 8 GB DDR3. b c 23 a b c Point 4 & 13 page-23, B-1 Annexure D- B. Security Specifications/ Requirements with respect to Webserver: Point 4 The Web servers should be placed in the secure Server Security segment (i.e. DMZ or screened subnet) isolated from the public network and company s internal network. Necessary control should be applied on the router to stop unwanted traffic and attacks at network perimeter itself. IPS/NIPS/HIPS should be installed to analyze the data stream to and from web server and identify & prevent attempts to hack or break into the server. Please clarify if Internet Bandwidth is required in Data Transfer Model (i.e. 700 GB etc) or fixed Bandwidth (i.e. 5 Mbps etc). IS PNB looking for a dedicated firewall/router/switches. Please specify the specification of required hardware.are they planning to add more network component in same infrstructure Is PNB looking for a specific type of attack protection, like DOS, DDOS attack on a router level. Is PNB looking for dedictaed NIPS/HIPS, please clarify the specification, type of server OS? Minimum 5 Mbps internet connection capability is required. Best security policies are covered under ISSP. All infrastructure are required in High Availability mode. Parameter's covered under Bank's ISSP are Confidentiality, Integrity, Availability. Reasonable security practices should be deployed to implement network security. No dedicated NIPS/HIPS is not required. The IPS/NIPS/HIPS should be configurable as per Bank's requirement. Is PNB looking for any dedicated log/event corelation, log analysis, please clarify The Logs analysis report should be submitted monthly or on demand. Who is going to manage Sify or any third party? Bidder has to manage log/event co-relation, log analysis.

8 Point 7 Microsoft Windows 2008 Server (Enterprise Edition), IIS Webserver (latest version), ASP,.NET Application Server. OS & IIS Web server Support Read as:- Please clarify if the bidder will provide Licensing Details ( O/S, Database, Antivirus, etc.) on an annual chargable basis. Bidder has to provide complete managed services. d Annexure D- C. Specifications/ Requirements with respect to Website hosting 3.20 (Scope of The source code review of web application to be done by the service provider through a third party. Necessary certificate for the same need Read as:- Please share does your Web Site Support/requires SSL certificate encryptions Read as:- Please share do you provides Domain Names or you have exisiting Domain names registered with you. Read as:- Please share/explain proposes of requiring redundent domain name for hosting. Any other specific information or requirement that you may like to share. 1) Purpose / Type of application 2) Application developed language 3) No of static and Dynamic pages 4) No of input fields 5) Lines of code? to be provided by the successful bidder The bidder should provide all the necessary equipments, system software and other software for successfully hosting of a secured website and should be conform to Bank s Information System Security Policy Request you to please share details about (ISSP). PNB's ISSP. Yes. We have existing domain names registered. Domain name will be provided by the Bank. The source code review of the we application will be got done by the Bank and certificate shall be provided to hosting bidder. Bank's ISSP details may be shared with sucessful bidder only after signing Non-Disclosure agreement.

9 (Scope of no (Payment Terms), Page no 16 Bidder shall appoint an experienced Project Manager for the project execution. The bidder should provide CV of the Program Manager that demonstrates proven experience in executing projects similar in scope and complexity. Payment shall be made on half yearly basis in arrears on submission of invoices applicable from the date of LIVE launch. Request you to please clarify if CV of Project manager or Program Manager is required. Request you to please change this clause to " Payment shall be made on quarterly advance basis" as we have quarterly billing cycle. Yes (Project Duration), Page no. 17 The vendor should host the Bank s website or any other website as requested by the bank within 30 days from date of purchase order. Request you to please change the clause to " The vendor should host the Bank s website or any other website as requested by the bank within 45 days from date of purchase order." Annexure B, Page mo 20 Annexure F (Technical Evaluation Table), Page no. 26 Annexure B : Details of support Team for hosting services. The Data Centre of following Tier levels compliant: Level 4 Request you to please elaborate what all details would be required to be submitted. Request you to please delete this clause as most of the Datacentre in india are Tier III compliant. Number of officals involved for hosting services, along with qualifications, work-experience. Scores will be allocated on the basis of Tier of Datacenter. For further queries please be guided by RFP. No further queries will be taken by the Bank.

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held

More information

Response to Queries Received for RFP of Security Integrator - Tender No. 63

Response to Queries Received for RFP of Security Integrator - Tender No. 63 Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for

More information

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest. Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought

More information

To follow are answers to questions submitted regarding the Request for Proposals (RFP) Packet distributed on Friday, March 6, 2015.

To follow are answers to questions submitted regarding the Request for Proposals (RFP) Packet distributed on Friday, March 6, 2015. Request for Proposals Website Services and Hosting for Drupal Sites Response to Questions To follow are answers to questions submitted regarding the Request for Proposals (RFP) Packet distributed on Friday,

More information

Amendment 1 - Annexure 5 (C) Technical Criteria

Amendment 1 - Annexure 5 (C) Technical Criteria 1 - Annexure 5 (C) Technical Criteria S. Eligibility Criteria Documents required Complied Y/N Formatted: Heading 2, Indent: Left: 0", Hanging: 0.4" C) Technical Criteria (Experience and other Technical

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

The Institute of Chartered Accountants of India

The Institute of Chartered Accountants of India The Institute of Chartered Accountants of India Summary of Resolution to Queries as provided in Responder(s) Conference on Expression of Interest for provision, implementation and maintenance of IT Infrastructure

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

REQUEST FOR PROPOSAL FOR DATA CENTRE CO-LOCATION AND NETWORK CONNECTIVITY SOLUTION Pre-Bid Meeting Held On : May 18, 2010, 15:30 Hrs

REQUEST FOR PROPOSAL FOR DATA CENTRE CO-LOCATION AND NETWORK CONNECTIVITY SOLUTION Pre-Bid Meeting Held On : May 18, 2010, 15:30 Hrs REQUEST FOR PROPOSAL FOR DATA CETRE CO-LOCATIO AD ETWORK COECTIVITY SOLUTIO Pre-Bid Meeting Held On : May 18, 2010, 15:30 Hrs S. Section o Description 1 Present Setup 2.2.1 The servers are under AMC with

More information

IDBI Bank Ltd. value which should be sized on this appliance second for 2048 Bit SSL encryption." appliance/hardware and should be upgrade to 15 Gbps

IDBI Bank Ltd. value which should be sized on this appliance second for 2048 Bit SSL encryption. appliance/hardware and should be upgrade to 15 Gbps 1 2 3 4 Point 1-Hardware Specifications Setup A: Point C 1-Hardware Specifications Setup A: Point E 2-Hardware Specifications Setup B: point B 2-Hardware Specifications Setup B: point E The Solution should

More information

Is Cloud-Based WMS an Option for Complex Distribution Centers?

Is Cloud-Based WMS an Option for Complex Distribution Centers? Welcome to Session 233 Is Cloud-Based WMS an Option for Complex Distribution Centers? Presented by: Sponsored by: Chuck Fuerst 2012 Material Handling Industry. Copyright claimed as to audiovisual works

More information

Description Bidder s Queries GSPC s Reply

Description Bidder s Queries GSPC s Reply Tender No.: GSPC/KG-OSN-2001/3/FMS for IT & Allied Services/2015-16/275 Pre-Bid Clarification No. 2 dated. 3 rd August 2015 Sr No. 1 2 3 4 5 Clause No. Clause 2 Clause 3 Clause 4 Clause 6 Description Bidder

More information

Secure networks are crucial for IT systems and their

Secure networks are crucial for IT systems and their ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential

More information

said period logs can be moved to Service

said period logs can be moved to Service Replies to Queries by Various by vendors for Centralised Desktop management Solution S# Page# Clause Point in the RFP Queries Clarification by UIIC e) Backup and Restore: Successful bidder should provide

More information

Disaster Recovery Hosting Provider Selection Criteria

Disaster Recovery Hosting Provider Selection Criteria Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What

More information

CAPA in the Cloud Keith Williams CEO GXPi 12 th June 2013

CAPA in the Cloud Keith Williams CEO GXPi 12 th June 2013 CAPA in the Cloud Keith Williams CEO GXPi 12 th June 2013 Controlling Pharma data in the Cloud- Overview Example of a CAPA from 3 years ago (2010) Example of a CAPA today (2013) Example of CAPA in Azure(2014)

More information

Data Center Optimization. Disaster Recovery

Data Center Optimization. Disaster Recovery Data Center Optimization Disaster Recovery Presentation Overview Introduction to PlateSpin PlateSpin Products and Solutions Overview The Current State of Disaster Recovery Planning Comparing DR Alternatives

More information

Active Directory Infrastructure Design Document

Active Directory Infrastructure Design Document Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document

More information

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Website Security and Security Counter Measures for e-e Governance Project and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

Logicalis Enterprise Cloud Frequently Asked Questions

Logicalis Enterprise Cloud Frequently Asked Questions Logicalis Enterprise Cloud Frequently Asked Questions Getting Started What is the Logicalis Enterprise Cloud and why is it a great solution? The Logicalis Enterprise Cloud (LEC) is a shared computing environment

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN) Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN

More information

COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS

COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS Updated June 13, 2014 *Subject to Change* Table of Contents 1-2 Overview of Virtual Private Servers 2-3 Benefits 2 Reduce IT Cost and

More information

At dincloud, Cloud Security is Job #1

At dincloud, Cloud Security is Job #1 At dincloud, Cloud Security is Job #1 A set of surveys by the international IT services company, the BT Group revealed a major dilemma facing the IT community concerning cloud and cloud deployments. 79

More information

Sl. No. Ref Sections/Clause requiring Clarification. RFP (Page No.)

Sl. No. Ref Sections/Clause requiring Clarification. RFP (Page No.) Sl. No. RFP (Page No.) Ref Sections/Clause requiring Clarification Pre-Bid Queries for RFP Reference No: OBC/HO/DIT/RFP/SECURITY EQUIPMENTS/47/2014 Points of clarification given in the RFP Clarification

More information

Best Practices in Developing an IT Disaster Recovery Plan. Vijaykumar Kulkarni AGM Product Management

Best Practices in Developing an IT Disaster Recovery Plan. Vijaykumar Kulkarni AGM Product Management Best Practices in Developing an IT Disaster Recovery Plan Vijaykumar Kulkarni AGM Product Management PRESENTER PROFILE Vijaykumar Kulkarni Assistant General Manager - Product Management in Netmagic Solutions,

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429

JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 ADDENDUM #1 September 21, 2015 REQUEST FOR PROPOSALS #16-033 FOR CLOUD BASED BACKUP & RECOVERY

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05

allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05 Corrigendum for the Tender for Web Based Project Monitoring Tool & MIS System Bidders Clarification Sl. Clause /Page no Tender Clause Clarification Sought Clarification No. 1 Page No:4 No consortium Consortium

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA RFP FOR SELECTION OF SYSTEM INTEGRATOR CORRIGENDUM RELEASED BY: Goa Police Government

More information

Request for Proposal (RFP) for Provisional Accreditation of Cloud Service Offerings of Private Service Providers (CSPs)

Request for Proposal (RFP) for Provisional Accreditation of Cloud Service Offerings of Private Service Providers (CSPs) Request for Proposal (RFP) for Provisional Accreditation of Cloud Service Offerings of Private Service Providers (CSPs) Department of Electronics and Information Technology Electronics Niketan, 6, CGO

More information

CSC BizCloud VPE Service Offering Summary. CSC i

CSC BizCloud VPE Service Offering Summary. CSC i Table of Contents OVERVIEW... 1 BIZCLOUD VPE SOLUTION SUMMARY... 1 BIZCLOUD VPE INFRASTRUCTURE... 1 Hardware and Virtualization Layer... 2 Compute Components... 2 Storage 2 CSC SUPPORT FOR THE BIZCLOUD

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com Contents Scope of this Document... 2 Product Overview... 2 Virtual Data Centre and VDC Dedicated Infrastructure... 2 Service Levels... 3 Severity and Support Response Times... 4 On-boarding... 5 Incident

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

State Health Society, Bihar Pariwar Kalyan Bhawan, Sheikhpura, Patna-14

State Health Society, Bihar Pariwar Kalyan Bhawan, Sheikhpura, Patna-14 fcgkj ljdkj lllllljdkj State Health Society, Bihar Pariwar Kalyan Bhawan, Sheikhpura, Patna-14 NOTICE INVITING TENDER From Companies/Agencies for Hiring Four Dedicated Servers (1 Linux Application Server

More information

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

Table of Contents. CSC CloudCompute Service Description Summary CSC 1 Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...

More information

VMware for your hosting services

VMware for your hosting services VMware for your hosting services Anindya Kishore Das 2009 VMware Inc. All rights reserved Everybody talks Cloud! You will eat your cloud and you will like it! Everybody talks Cloud - But what is it? VMware

More information

Questions for Vermont Hosting RFI

Questions for Vermont Hosting RFI Questions for Vermont Hosting RFI 1. Will the physical Oracle RAC servers be able to be picked up and moved to the new data center location or will new servers need to be purchased? SOV Response: New servers

More information

Ocean Park IT Cloud Solution

Ocean Park IT Cloud Solution Ocean Park IT Cloud Solution Request for Expressions of Interest for Design, Implementation and Maintenance of Ocean Park IT Cloud Solution The Ocean Park Corporation (the Corporation) invites expressions

More information

Remote Voting Conference

Remote Voting Conference Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Service Definition. Asta Powerproject. Project, Portfolio & Resource Management Software

Service Definition. Asta Powerproject. Project, Portfolio & Resource Management Software Asta Powerproject Service Definition Asta Powerproject Project, Portfolio & Resource Management Software Asta Development plc Kingston House, Goodsons Mews Wellington Street Thame OX9 3BX Table of Contents

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

e2e Managed Customer Private Cloud Infrastructure Service Definition Document

e2e Managed Customer Private Cloud Infrastructure Service Definition Document e2e Managed Customer Private Cloud Infrastructure Service Definition Document Overview A range of Private Cloud infrastructure managed services where the customer buys or already owns the physical equipment

More information

Request for Information (RFI) for Managed Hosting Service

Request for Information (RFI) for Managed Hosting Service FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS ORGANISATION DES NATIONS UNIES POUR L ALIMENTATION ET L AGRICULTURE ORGANIZACION DE LAS NACIONES UNIDAS PARA LA AGRICULTURA Y LA ALIMENTACION Viale

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

AVLOR SERVER CLOUD RECOVERY

AVLOR SERVER CLOUD RECOVERY AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties

More information

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000 Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business

More information

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments March 13, 2015 Abstract To provide redundancy and disaster recovery, most organizations deploy multiple data

More information

Solutions as a Service N.Konstantinidis Technical Director - MNG

Solutions as a Service N.Konstantinidis Technical Director - MNG Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Course Outline: 6435- Designing a Windows Server 2008 Network Infrastructure

Course Outline: 6435- Designing a Windows Server 2008 Network Infrastructure Course Outline: 6435- Designing a Network Infrastructure Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day course will provide students with an understanding

More information

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,

More information

Pricing Guide. Service Overview

Pricing Guide. Service Overview Service Overview tolomy s G Cloud services are designed to give you the best possible degree of control and transparency over your costs. To maximise cost efficiency on offer to our customers a wide range

More information

CONSOLIDATION OF TELECOMMUNICATION SERVICES

CONSOLIDATION OF TELECOMMUNICATION SERVICES Business Case Template CONSOLIDATION OF TELECOMMUNICATION SERVICES Terms of reference PREPARED BY: ICT UNIT Provision of Telecommunication Services Page 1 of 11 CONTENTS DOCUMENT INFORMATION AND CONTROL...

More information

vcloud Air Disaster Recovery Technical Presentation

vcloud Air Disaster Recovery Technical Presentation vcloud Air Disaster Recovery Technical Presentation Agenda 1 vcloud Air Disaster Recovery Overview 2 What s New 3 Architecture 4 Setup and Configuration 5 Considerations 6 Automation Options 2 vcloud Air

More information

Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.

Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here. Procurement of Services to Design, Develop, Implement and Maintain Centralized e-governance Application for Urban Local Bodies in Tamil Nadu Explanatory Notes 2 / Dated 17-December--2013 Explanatory Notes

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

BUILT FOR YOU. Contents. Cloudmore Exchange

BUILT FOR YOU. Contents. Cloudmore Exchange BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai

Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai Explanation for Queries Received Assignment Title: Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai Reference No: CMA/ 56898 /ITC/2009 # Document Reference

More information

S.No COMPANY NAME CLAUSE NO. RFP DISCRIPTION QUERIES RESPONSE

S.No COMPANY NAME CLAUSE NO. RFP DISCRIPTION QUERIES RESPONSE 1 Airtel Page 22, Category A Uptime penalty for secondary link As per our understanding this is single lastmile solution with 16 separate MPLS Network, Service providers need to Meet SLA per site, There

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Page 1 Instsanda FAQs v1.2 Instanda FAQs Contents Hosting, Security, Monitoring and Management... 3 Where is Instanda hosted?... 3 What is the hosting datacentre compliance?...

More information

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend: CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway PLANET Product Guide 2011 Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

ADB/RFP/CGSP/2013/0158. Implementation of High Speed Point-To-Point Clear Channel Link- MPLS Backbone Connectivity

ADB/RFP/CGSP/2013/0158. Implementation of High Speed Point-To-Point Clear Channel Link- MPLS Backbone Connectivity ADB/RFP/CGSP/2013/0158 Implementation of High Speed Point-To-Point Clear Channel Link- MPLS Backbone Connectivity Third Set of Responses by the AfDB to Bidders Questions 1 2 Bidder's Questions What Class

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh

RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh MAP_IT Madhya Pradesh Agency for Promotion of Information Technology Corrigendum 2 RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh Sr.No. RFP Reference Existing

More information

Request for Proposal to

Request for Proposal to Request for Proposal to ( 2016 /ح ك/ 3 ) No. Tender General Response for All Raised Questions Taking into consideration the requirements outlined in the RFP and this Q&A document, bidders need to respond

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

Overcoming PCI Compliance Challenges

Overcoming PCI Compliance Challenges Overcoming PCI Compliance Challenges Randy Rosenbaum - Security Services Exec. Alert Logic, CPISM Brian Anderson - Product Manager, Security Services, SunGard AS www.sungardas.com Goal: Understand the

More information

BSNL IDC Hosted Firewall Service. Total Network Security

BSNL IDC Hosted Firewall Service. Total Network Security Total Network Security Advantage BSNL IDC India s first Uptime Institute Certified Tier-III data centres with combined connectivity and IT services availability from BSNL Low latency Internet Data Centres

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Play IT Safe. I love that everything just works with Unitrends. Unitrends Disaster Recovery as a Service. Backup, Archiving & Disaster Recovery

Play IT Safe. I love that everything just works with Unitrends. Unitrends Disaster Recovery as a Service. Backup, Archiving & Disaster Recovery Unitrends Disaster Recovery as a Service (DRaaS) Frequently Asked Questions (FAQ) Backup, Archiving & Disaster Recovery Play IT Safe Unitrends Disaster Recovery as a Service (DRaaS) is a white-glove service

More information

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

Schedule 2Z Virtual Servers, Firewalls and Load Balancers

Schedule 2Z Virtual Servers, Firewalls and Load Balancers Schedule 2Z Virtual Servers, Firewalls and Load Balancers Definitions Additional Charges means the charges payable in accordance with this schedule. Customer Contact Centre means Interoute s Incident management

More information