Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.

Size: px
Start display at page:

Download "Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here."

Transcription

1 Procurement of Services to Design, Develop, Implement and Maintain Centralized e-governance Application for Urban Local Bodies in Tamil Nadu Explanatory Notes 2 / Dated 17-December Explanatory Notes The notes below are for explanation purposes issued based on the queries received from prospective bidders. While these do not constitute a change to the Bid documents, these are provided to be used as guidelines for more clarification on the queries raised. Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here. Page 1 of 6

2 Routers with WAN Optimizer Request for modification as Routers VPN Concentrator specifications are mentioned G. TECHNICAL SPECIFICATIONS FOR COMPLIANCE G. TECHNICAL SPECIFICATIONS FOR COMPLIANCE - HIPS HIPS Licenses - 16 Nos. HIPS Licenses - 32 Nos. As per RFP scope branch wan opt solution has to be dedicated appliance based solution. It is requested to modify the clause. The RFP is seeking SSL VPN along with specification but the same is not mentioned in the BOM followed by the price bid and the quantity The RFP calls for Database servers with encryption Hardware whereas BoM is mentioned as Database Servers only. Request you to change the Bill of material description as Database Server with Encryption Hardware for clarity HIPS should perform log analysis, integrity checking Log Analysis and Integrity Checking is a functionality of SIEM and not a functionality HIPS. RFP calls for an HIPS solution as an extension of existing TNSDC whereas McAfee HIPS available in TN SDC does not support these functionalities. Hence request to delete this clause. The minimum BoM calls for 32 Servers and HIPS security to be incorporated with every server, hence minimum 32 HIPS license to be supplied together for DC and DR Anti-Virus Software Anti-Virus Software specification has been given in the RFP but missing in the Bill of Materials. Hence request to add Anti-Virus software licenses of 32 No s for the servers at DC and DR in the BoM Please refer to clarifications issued to the bidders Serial 298, where it has been clarified that the solution can be based on hardware, software or module. Bidder is free to provide a dedicated appliance based solution Please refer the Addenda No 1 document issued where the price bid contains the VPN Concentrator Price Bid refers to the specifications & items description/names mentioned in the price bid are for bidder convenience only. The quoted price shall however meet the product which completely meets the specification The log analysis & integrity checking needs to be done by solution proposed by the bidder i.e. either through the HIPS/EMS/etc. The quantity in the Price Bid of Addendum may be read as "As required" The required anti-virus licenses which comply with technical specification mentioned in Page of the RFP may be sized by SI and quoted in provision given in the table reading as "S.No. 2.3 Other Page 2 of 6

3 7. RFP Pg. 375 & Corr. Page 22. Routers with WAN Optimizer Routing and WAN Optimization are different functionalities and Products. Having both functionalities in the routing appliance will compromise the operation of each functionality; hence they require being on independent appliances. Most OEM Routers do not have WAN Optimizer on Routers, The only OEM who has does this is Cisco. In order to achieve 100% throughput on each functionality and also to have transparency in Bidding process against one vendor solution, we request to treat WAN Optimizer and Router as two different components Routers with WAN Optimizer WAN Optimizer Solution at HUB Location -1 No. WAN Optimizer Solution for remote location - 1 No. WAN Optimization and routing are separate solutions and these are to be implemented in a network where DC, DR and edge locations are available. Hence it recommended to have separate line item to be provided for DC and Edge locations so that Department can use these solution as required Routers with WAN Optimizer Solution should be from Vendors with presence in the Gartner Magic quadrant for Wan-op solution Routers with WAN Optimizer Each user can be dynamically assigned an amount of bandwidth (using a dynamic partition). Attached the last 3 years Gartner report on WAN Optimization. As per the clause mentioned in the RFP, only Riverbed as an OEM only will qualify. Hence requested to relax the clause so that all the leading OEMs can participate To be deleted associated costs (if any may be captured & respective price may be quoted here)." If the proposed solution doesn't have a Router integrated WAN ops solution then bidders may quote prices for the router, hub & remote locations as separate entities. Bidders are encouraged to prepare separate and detailed line items in their proposals refer above given clarifications refer above given clarifications This is a vendor specific clause and specific to Riverbed. Hence request you to delete the clause Hierarchical control and policies allow all This is a vendor specific clause and specific to refer above given clarifications Page 3 of 6

4 control capabilities to be nested within each other. For example, a customer could allocate a subnet 1 Mbps, an application 500 Kbps, and each user of that application at least 50 Kbps Access/Application Switch 128 Gbps and higher Access/Application Switch Port Density : Up to 300 ports or higher in a stack Routers with WAN Optimizer Should support MPLS, MPLS- TE, MPLS- FRR, VPLS and L2 & L3 MPLS VPN from day 1 of commissioning Layer 7 Inspected Throughput of 1 Gigabit scalable to 3 Gigabit Riverbed. Hence request you to delete the clause. 140 Gbps and higher RFP calls for 48 port 1 G and 2 No s of 2 nos. 10 G which in turn require minimum 136 Gbps of switching capacity to work switch in a nonblocking architecture. Hence requested to increase the switching capacity to 140 Gbps. Port Density: Up to 192 ports or higher in a stack Any Switch with true stacking will support only 192 ports. Anything more is not supported in true stacking. It will be called as cascading which can be done for any switches. If the dept. is looking for true stacking, it needs to be relaxed to 192 ports. Should support MPLS, MPLS- TE, MPLS-FRR and L2 & L3 MPLS VPN from day 1 of commissioning VPLS protocol will be supported in Service Provider Class high end routers only and does not require in Edge Routers. This is a vendor specific clause and increase the cost of the product which will not have any benefit for the department. Hence requested to remove Layer 7 Inspected Throughput of 1 Gigabit scalable to 2 Gigabit 100% Scalability is the maximum industry standard. Asking 3 Gigabit will cause overpricing which will not have any benefit to the department. Please review the explanation in Explanatory notes, item No. 274 Bidder may achieve the same through a single IP management as well. Bidders may provide appropriate solution that manages this requirement. There is no change in this clause. There is no change in this clause. Page 4 of 6

5 Minimum 4 Numbers of Gigabit segments scalable to 7 numbers of Gigabit segments Minimum 4 Numbers of Gigabit segments scalable to 6 numbers of Gigabit segments There is no change in this clause External Firewall / Intrusion Prevention System (IPS) 4 ports itself will not be utilized as it is a Gateway device. Hence request you to reduce the salacity to 6 no s which will give considerable price reduction To be deleted Firewall and IPS integrated in a single box is against security policies of organization and is against the Industry practice and standard. All major projects specially EGovernance MMP projects insists that Firewall and IPS should be from two different OEM so that they have different algorithms to avoid security threats, avert single point of failure and thereby avoid compromising security. Hence we request you delete this VPN Concentrator To be added in the BoM VPN Concentrator - 1 for DC and 1 for DR RFP gives the specification of VPN Concentrator and also talks about the usage and requirement of it in the corrigendum and response to queries. However, VPN Concentrator is not mentioned in the Bill of Materials. Hence requested to add it in the BoM 19. Hardware Security Module To be Added in the BoM and technical specifications Considering the sensitivity of the data involved and as security of the data is of paramount importance, Data Integrity of the data flowing from the application servers is utmost important for secured architecture. Data integrity is being achieved using Digital Signing.Security of the digital signatures (keys) is very important and for these CCA guidelines mandates the The Firewall & IPS to be integrated without any performance degradation however both need not be a single a device Please refer addendum released earlier, <revised price bid template> Bidders are encouraged to provide additional and better products that meet and exceed the requirements of the RFP. Page 5 of 6

6 use of FIPS certified hardware s. FIPS certified hardware modules should be used at the server level for securing the digital signing keys and also perform the signing's using its crypto processor i.e. offloading the signing process from the application server. Will make the infrastructure compliant to IT ACT and CCA guidelines. These hardware will provide security of the keys and increase the performance by accelerating the signing speed via there crypto processors. 20. To be Added in the BoM and technical specifications VTL specifications are missing in RFP though it is asked in the RFP 21. To be Added in the BoM and technical specifications SAN Switch specification is missing in the RFP 22. To be Added in the BoM and technical specifications When servers are overwhelmed with high-volume traffic, processing capabilities decelerate and data retrieval becomes slow or, in some cases, impossible. The process of evenly distributing multiple user requests across a number of servers supporting a network. Utilized effectively, this traffic optimization method can increase productivity and performance of a network by allowing users in a variety of locations access to critical information and applications without slow response times or failed connections. Hence recommended to have Server Load Balancer solution incorporated in the RFP. VTL not required since Tape Library of existing TNSDC infrastructure is planned to be leveraged SAN Switch not required since SAN Switch of existing TNSDC infrastructure is planned to be leveraged; SLB not required since new SLB may not accommodated in the existing TNSDC architecture & the existing SLB in TNSDC is planned to be leveraged; Page 6 of 6

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA RFP FOR SELECTION OF SYSTEM INTEGRATOR CORRIGENDUM RELEASED BY: Goa Police Government

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Sought. Why only 400 Mbps? We recommend upto 2Gbps. HTTP Requests /Sec Why 12500? We recommend upto 100000

Sought. Why only 400 Mbps? We recommend upto 2Gbps. HTTP Requests /Sec Why 12500? We recommend upto 100000 Request for Proposal For Supply, Installation, Integration, Commissioning and Maintenance Of LOAD BALANCERS (with SSL ACCELERATOR,COMPRESSION AND CACHING) For the EPS Project of Life Insurance Corporation

More information

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

IDBI Bank Ltd. value which should be sized on this appliance second for 2048 Bit SSL encryption." appliance/hardware and should be upgrade to 15 Gbps

IDBI Bank Ltd. value which should be sized on this appliance second for 2048 Bit SSL encryption. appliance/hardware and should be upgrade to 15 Gbps 1 2 3 4 Point 1-Hardware Specifications Setup A: Point C 1-Hardware Specifications Setup A: Point E 2-Hardware Specifications Setup B: point B 2-Hardware Specifications Setup B: point E The Solution should

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5 Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

RFP 21/2013 Network Carrier and Infrastructure Services

RFP 21/2013 Network Carrier and Infrastructure Services RFP 21/2013 Network Carrier and Infrastructure Services Communication #4 Date of Issue: 24 January 2014 1. Answers to questions posed by Bidders. This communication is issued in terms of paragraph 9.3

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

Purchasing and Property Services AOC 200 4202 East Fowler Avenue Tampa, Florida 33620 (813) 974-2481

Purchasing and Property Services AOC 200 4202 East Fowler Avenue Tampa, Florida 33620 (813) 974-2481 Purchasing and Property Services AOC 200 4202 East Fowler Avenue Tampa, Florida 33620 (813) 974-2481 Web Address: http://usfweb2.usf.edu/purchasing/purch2.htm December 13, 2013 Invitation to Bid No. Entitled:

More information

Acceleration, Optimization, Security and the Data Center: Application Delivery s Next Step

Acceleration, Optimization, Security and the Data Center: Application Delivery s Next Step Acceleration, Optimization, Security and the Data Center: Application Delivery s Next Step Robin Layland Layland Consulting April 2009 The economic downturn is putting pressure on IT to reduce costs and

More information

Check Point taps the power of virtualization to simplify security for private clouds

Check Point taps the power of virtualization to simplify security for private clouds Datasheet: Check Point Virtual Systems Check Point taps the power of virtualization to simplify security for private clouds Looking for ways to reduce complexity and simplify network security in your private

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held

More information

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN) Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN

More information

Cisco PIX vs. Checkpoint Firewall

Cisco PIX vs. Checkpoint Firewall Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.

More information

said period logs can be moved to Service

said period logs can be moved to Service Replies to Queries by Various by vendors for Centralised Desktop management Solution S# Page# Clause Point in the RFP Queries Clarification by UIIC e) Backup and Restore: Successful bidder should provide

More information

NOTICE TO BIDDERS ADDENDUM #1 AB2009-43

NOTICE TO BIDDERS ADDENDUM #1 AB2009-43 NOTICE TO BIDDERS ADDENDUM #1 AB2009-43 SPECIFICATIONS FOR CONVERGED NETWORK WITH SIP TRUNKING AND MANAGED CISCO UNIFIED COMMUNICATIONS PLATFORM FOR PERIOD OF WITH THE OPTION TO EXTEND TWO YEARS AB2009-43

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications

More information

Print4 Solutions fully comply with all HIPAA regulations

Print4 Solutions fully comply with all HIPAA regulations HIPAA Compliance Print4 Solutions fully comply with all HIPAA regulations Print4 solutions do not access, store, process, monitor, or manage any patient information. Print4 manages and optimize printer

More information

RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh

RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh MAP_IT Madhya Pradesh Agency for Promotion of Information Technology Corrigendum 2 RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh Sr.No. RFP Reference Existing

More information

ENQUIRY NO.NIE/PS/2014-15 DATE: 02/09/2014

ENQUIRY NO.NIE/PS/2014-15 DATE: 02/09/2014 NATIONAL INSTITUTE OF EPIDEMIOLOGY (INDIAN COUNCIL OF MEDICAL RESEARCH) (AN AUTONOMOUS UNIT UNDER GOVT. OF INDIA MINISTRY OF HEALTH & FAMILY WELFARE) T.N.H.B., AYAPAKKAM, (AMBATTUR), CHENNAI - 600 077

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Sl. No. Ref Sections/Clause requiring Clarification. RFP (Page No.)

Sl. No. Ref Sections/Clause requiring Clarification. RFP (Page No.) Sl. No. RFP (Page No.) Ref Sections/Clause requiring Clarification Pre-Bid Queries for RFP Reference No: OBC/HO/DIT/RFP/SECURITY EQUIPMENTS/47/2014 Points of clarification given in the RFP Clarification

More information

How To Improve The Humano-Uganda Satellite Network

How To Improve The Humano-Uganda Satellite Network Regarding manner of submission: an original and 5 copies of the proposal are requested. Is this just for the technical component or for the pricing component as well? A) Both Who are the persons we have

More information

DALLAS INDEPENDENT SCHOOL DISTRICT PURCHASING DEPARTMENT ADDENDUM No. 2 NETWORK ELECTRONICS

DALLAS INDEPENDENT SCHOOL DISTRICT PURCHASING DEPARTMENT ADDENDUM No. 2 NETWORK ELECTRONICS DALLAS INDEPENDENT SCHOOL DISTRICT PURCHASING DEPARTMENT ADDENDUM No. 2 REQUEST FOR PROPOSAL NO. BID #TF- 203970 NETWORK ELECTRONICS Amendment to RFP #TF-203970 NETWORK ELECTRONICS The purpose of Addendum

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

Secure networks are crucial for IT systems and their

Secure networks are crucial for IT systems and their ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential

More information

ADDENDUM 9 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE

ADDENDUM 9 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE ADDENDUM 9 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT 1 1 OVERVIEW Managed Network Services may be provided for customers requiring WAN bandwidth with Managed Router or

More information

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015 MARINE PRODUCTS EXPORT DEVELOPMENT AUTHORITY (Ministry of Commerce and Industry, Govt. of India) Panampilly Avenue, Cochin 682 036 (Ph: 0484-2311979, e-mail: ho@mpeda.gov.in) QUOTATION FOR UTM 4/26(1)/2009/EDP-HO

More information

Appendix D: Content Management System: Technical Platform Specification

Appendix D: Content Management System: Technical Platform Specification Appendix D: : Technical Platform Specification 1. Scope... 2 1 Key Words, Abbreviations and Acronyms... 2 2... 3 2.1 Introduction... 3 2.2 Desktop Specifications... 3 2.3 Desktop support... 3 2.4 Database

More information

Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com. Securing application delivery in the cloud

Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com. Securing application delivery in the cloud Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com Securing application delivery in the cloud 2 The Leader in Application Delivery Networking Users Data Center At Home In the

More information

VPN Lesson 2: VPN Implementation. Summary

VPN Lesson 2: VPN Implementation. Summary VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users

More information

State of California RFP DGS 1002-023 Department of General Services Data Storage Requests for Changes 2 06/15/2012

State of California RFP DGS 1002-023 Department of General Services Data Storage Requests for Changes 2 06/15/2012 # Section Request for Change Answer 1 1.5 2.2.2 2 6.6.2 3 Exhibit 11.29A Exhibit 11.29B Will the State please incorporate a questions deadline as it relates to this solicitation and Amendment 15? Requested

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware. Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware

More information

How To Improve Nts Information Technology

How To Improve Nts Information Technology Brief Introduction to NTS Information Technologies & Tools March 2012 Company Profile 1000+ Employees Corporate HQ Calabasas, CA Founded 1961 25 Locations Worldwide NASDAQ: NTSC $144 MM Revenue (FY2011)

More information

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai

Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai Explanation for Queries Received Assignment Title: Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai Reference No: CMA/ 56898 /ITC/2009 # Document Reference

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

More information

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Securing Virtualization with Check Point and Consolidation with Virtualized Security Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized

More information

Application Delivery Networking

Application Delivery Networking Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at: 8-1 Overview

More information

- Introduction to PIX/ASA Firewalls -

- Introduction to PIX/ASA Firewalls - 1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Overlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO

Overlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO Overlay Networks: Connecting and Protecting Across Regions with Docker Patrick Kerpan, CEO Agenda Background: Cohesive and the cloud Cloud Networking: Limitations Overlay networks: To the rescue Enter

More information

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage Data Sheet Cisco WAAS Express Product Overview Organizations today face several unique WAN challenges: the need to provide employees with constant access to centrally located information at the corporate

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 FIREWALL AND VPN APPLIANCES FOR SMALL BUSINESSES AND BRANCH OFFICES Today, complete Internet security goes beyond a firewall. Firebox SOHO 6tc and SOHO 6 are dedicated

More information

DCADLEC RFP Clarifications

DCADLEC RFP Clarifications Referenced RFP Section 1 Section 2.07 2 Section 2.03, Item C 3 4 Section 1.04 5 6 DCADLEC RFP Clarifications Question Answer The Cisco phones are all Gigabit where specified. Since the Cisco phones are

More information

Implementing the Application Control Engine Service Module

Implementing the Application Control Engine Service Module Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application

More information

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9 NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document

More information

Failsafe WAN, VoIP, IVRS & LAN connectivity

Failsafe WAN, VoIP, IVRS & LAN connectivity Failsafe WAN, VoIP, IVRS & LAN connectivity Client : Asia 's biggest integrated Jewellery manufacturer Customer's requirement: The customer wanted to establish WAN and VoIP connectivity between their offices

More information

WAN Optimization. Riverbed Steelhead Appliances

WAN Optimization. Riverbed Steelhead Appliances WAN Optimization Riverbed Steelhead Appliances Steelhead appliances deliver the highest performance and the most scalable wide-area data services solution available, overcoming both bandwidth and latency

More information

Response to Queries Received for RFP of Security Integrator - Tender No. 63

Response to Queries Received for RFP of Security Integrator - Tender No. 63 Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Achieving Low-Latency Security

Achieving Low-Latency Security Achieving Low-Latency Security In Today's Competitive, Regulatory and High-Speed Transaction Environment Darren Turnbull, VP Strategic Solutions - Fortinet Agenda 1 2 3 Firewall Architecture Typical Requirements

More information

Securing the Intelligent Network

Securing the Intelligent Network WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.

More information

How To Choose A Network Firewall

How To Choose A Network Firewall Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

WATCHGUARD FIREBOX VCLASS

WATCHGUARD FIREBOX VCLASS FIREBOX VCLASS WATCHGUARD FIREBOX VCLASS ENTERPRISE-LEVEL SECURITY The Firebox Vclass brings high-speed network security to enterprise-class businesses, remote offices, service providers, and data centers.

More information

SAN MATEO COUNTY OFFICE OF EDUCATION

SAN MATEO COUNTY OFFICE OF EDUCATION SAN MATEO COUNTY OFFICE OF EDUCATION CLASS TITLE: NETWORK ENGINEER BASIC FUNCTION: Under the direction of the Manager, Network Services, perform a variety of highly complex and specialized activities involved

More information

Network Security Solution. Arktos Lam

Network Security Solution. Arktos Lam Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security

More information

Nationwide WAN + VoIP connectivity

Nationwide WAN + VoIP connectivity Nationwide WAN + VoIP connectivity Client: Multi-state network of universities based in a Southern state. Customer's requirement: The customer wanted to establish WAN connectivity between the Head office

More information

Firewalls and Network Defence

Firewalls and Network Defence Firewalls and Network Defence Harjinder Singh Lallie (September 12) 1 Lecture Goals Learn about traditional perimeter protection Understand the way in which firewalls are used to protect networks Understand

More information

Cisco 3745. Cisco 3845 X X X X X X X X X X X X X X X X X X

Cisco 3745. Cisco 3845 X X X X X X X X X X X X X X X X X X Data Sheet Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module

More information

Load Balancing Security Gateways WHITE PAPER

Load Balancing Security Gateways WHITE PAPER Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...

More information

ADB/RFP/CGSP/2013/0158. Implementation of High Speed Point-To-Point Clear Channel Link- MPLS Backbone Connectivity

ADB/RFP/CGSP/2013/0158. Implementation of High Speed Point-To-Point Clear Channel Link- MPLS Backbone Connectivity ADB/RFP/CGSP/2013/0158 Implementation of High Speed Point-To-Point Clear Channel Link- MPLS Backbone Connectivity Third Set of Responses by the AfDB to Bidders Questions 1 2 Bidder's Questions What Class

More information

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Choosing Remote-Access VPN Technologies, Securing the VPN Deployment Defining Remote-Access VPNs Remote-access VPNs allow

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Introduction to Cloud Networking. Meraki Solution Overview

Introduction to Cloud Networking. Meraki Solution Overview Introduction to Cloud Networking Meraki Solution Overview 1 About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed Initial technology developed at MIT - tradition of

More information

This chapter covers four comprehensive scenarios that draw on several design topics covered in this book:

This chapter covers four comprehensive scenarios that draw on several design topics covered in this book: This chapter covers four comprehensive scenarios that draw on several design topics covered in this book: Scenario One: Pearland Hospital Scenario Two: Big Oil and Gas Scenario Three: Beauty Things Store

More information

RESPONSES TO CLARIFICATIONS REQUEST FOR PROPOSAL FOR FOR IMPLEMENTATION OF A HUB STATION AND BROADBAND VSAT WAN CONNECTIVITY ADB/ICB/CGSP/2013/0157

RESPONSES TO CLARIFICATIONS REQUEST FOR PROPOSAL FOR FOR IMPLEMENTATION OF A HUB STATION AND BROADBAND VSAT WAN CONNECTIVITY ADB/ICB/CGSP/2013/0157 RESPONSES TO CLARIFICATIONS REQUEST FOR PROPOSAL FOR FOR IMPLEMENTATION OF A HUB STATION AND BROADBAND VSAT WAN CONNECTIVITY ADB/ICB/CGSP/2013/0157 ADB/ICB/CGSP/2013/0157 No. Question or Clarification

More information

Service Descriptions

Service Descriptions Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application

More information

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network

More information

Technology Trends in the Current Economic Scenario. A 3Com Presentation, Manoj Kanodia CEO

Technology Trends in the Current Economic Scenario. A 3Com Presentation, Manoj Kanodia CEO Technology Trends in the Current Economic Scenario A 3Com Presentation, Manoj Kanodia CEO Agenda Technology Trends & IT Direction How 3Com Addresses Current Trends 3Com s Way: No Compromise Infrastructure

More information

White Paper: Virtual Leased Line

White Paper: Virtual Leased Line Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices

More information

Preparing Your IP network for High Definition Video Conferencing

Preparing Your IP network for High Definition Video Conferencing White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network

More information

Application Delivery Testing at 100Gbps and Beyond

Application Delivery Testing at 100Gbps and Beyond Application Delivery Testing at 100Gbps and Beyond The Need for Speed 10 Gigabit Ethernet (GE) rapidly became the technology of choice for high speed connections to servers and network devices. Advancements

More information

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Course Overview: The Securing Networks with Cisco Routers and Switches (SECURE) 1.0 course is a five-day course that aims at providing network

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

SCHEDULE M Security Services

SCHEDULE M Security Services SCHEDULE M Security Services MANAGED SECURITY SERVICES The Managed Security Services Rate structure is generally composed of a Non- Recurring Charge (NRC) and a Monthly Recurring Charge (MRC). The NRC

More information