E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME AND CRIMINAL TRACKING NETWORK & SYSTEMS RFP FOR SELECTION OF SYSTEM INTEGRATOR ANNEXURE III
|
|
- Florence Green
- 8 years ago
- Views:
Transcription
1 E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME AND CRIMINAL TRACKING NETWORK & SYSTEMS RFP FOR SELECTION OF SYSTEM INTEGRATOR ANNEXURE III INFRASTRUCTURE REQUIREMENTS RELEASED BY: Delhi Police Government of Delhi
2 Contents 1 INTRODUCTION PROPOSED NETWORK ARCHITECTURE USER LOAD MATRIX PRIMARY SITE ARCHITECTURAL ASPECT DC Design Description Set-up at Data Centre and DR Site Hardware and Security Components at Primary Data center Network Components at primary data centre SERVERS AND STORAGE REQUIRED IN DATA CENTER HARDWARE AT THE PRIMARY SITE DR SITE HARDWARE AND SECURITY COMPONENTS AT SECONDARY DATA CENTER HARDWARE AT THE DR SITE CLIENT/USER LOCATIONS REQUIREMENTS AT CLIENT LOCATION INFRASTRUCTURE AT CLIENT LOCATION SOFTWARE REQUIREMENT STORAGE MANAGEMENT SOFTWARE (SMS) ENTERPRISE MANAGEMENT SYSTEM HIPS (HOST INTRUSION PREVENTION SYSTEM) ANTIVIRUS MAIL AND MESSAGING SOLUTION DOCUMENT MANAGEMENT SYSTEM BACKUP SOFTWARE MINIMUM TECHNICAL SPECIFICATIONS SERVER LOAD BALANCER BLADE CHASSIS SPECIFICATION BLADE SERVERS (WEB, PORTAL, APPLICATION, SSO) BLADE SERVERS FOR INFRASTRUCTURE SERVICES (EMS, BACKUP, DMS, ANTIVIRUS, MAIL AND MESSAGING) DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 2 of 80
3 8.5 DATABASE SERVER (INTEL / AMD 64) STORAGE AND BACKUP SOLUTION Storage Area Network (SAN) Tape Library SAN switch FC-IP Router KVM SWITCH CORE ROUTER IDS/IPS EXTERNAL FIREWALL GLOBAL LOAD BALANCER SPECIFICATIONS L3/ CORE SWITCH (48 PORTS 10/100/1000) MINIMUM TECHNICAL SPECIFICATIONS REQUIREMENT AT CLIENT SITE Desktops Multi-Function Laser (Print/ Scan/ Copy) Duplex Laser Printer UPS with 2KVA rated output KVA Generator Set Port L2 Switch Digital Camera Electronic Pen UPS 1 KVA OPTIONAL HARDWARE FOR WHICH PRICE QUOTES ARE REQUIRED Generator Set (3KVA silent) KVA Silent Generator Set Multi-Function Laser (Print) - Colored HARDWARE SPECIFICATIONS FOR TRAINING CENTERS Desktops Servers UPS MFD Switch LCD Projector DETAILS OF TECHNOLOGY STACK CAS (STATE) AND CAS (CENTER) DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 3 of 80
4 List of Figures and Tables Figure 1: Suggested End User Connectivity... 6 Figure 2: Proposed Connectivity at DC Figure 3: Proposed DR Table 1: Number of Internal Users... 7 Table 2: Bandwidth Requirement... 9 Table 3: Suggested BoM for DC Table 4: Proposed BoM for DR Table 5: Client Location Scope Table 6: Number of Mail Users DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 4 of 80
5 Table of Contents Annexure 3: IT Infrastructure Requirement 1 DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 5 of 80
6 1 Introduction This Annexure will outline the minimum technical specifications required for meeting the scope of CCTNS Delhi Project. This will cover, but is not limited to the 1) Data Center Site 2) Disaster Recovery Site 3) Client Site The specifications given in this document are indicative and the System integrator is free to suggest a different specification which could be over and above the minimum specification indicated here. 2 Proposed Network Architecture Network architecture is a blueprint of the complete computer communication network, which provides a framework and technology foundation for designing, building and managing a communication network. It typically has a layered structure. Layering is a modern network design principle which divides the communication tasks into a number of smaller parts, each part accomplishing a particular sub-task and interacting with the other parts in a small number of well-defined ways. Layering allows the parts of a communication to be designed and tested without a combinatorial explosion of cases, keeping design relatively simple. In the centralized architecture, the main site is known and primary site and the alternate site is known as Disaster recovery site. ACP / DCP Office Printer DC Multi-functional devices Ethernet Cyber Highway Users Users Switch Router Cyber Highway Cyber Highway Cache Server PHQ / Comissionrate Router Switch Multi-functional devices Ethernet Police Station Router Users Users Printer Multi-functional devices Ethernet Switch Printer Users Users Figure 1: Suggested End User Connectivity DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 6 of 80
7 3 User load matrix The application will be accessed by both Internal and external users. The estimated number of users (Internal) for Delhi CCTNS is given in the following table Table 1: Number of Internal Users S. No Entity Estimated no. of users per location 1 Police Station 15 ( 1 * SHO, 10 * Investigating Officer, 2 * Computer Operators,1 * HM, 1 * record Management) 2 Higher Offices 10(5 Officer, 2* Operator, 3* Records) 3 SDPO 4 ( 1 * ACP, 1 * Computer Operator, 2 * Record Management) 4 Range Jt CP 12 ( 2 * Officers, 4 * Crime Sec, 2 * DSB, 2 * Staff, 2 * PA) 5 PHQ (medium) 14* 6 ( 6 users per department) Total locations Total Users SCRB 10 * 6 ( 6 users per dept) 7 Commissionerates 10 * 6 ( 6 users per dept) RTCs/PTCs/DTCs District Offices 12 ( 2 * Officers, 4 * Crime Sec, 2 * DSB, 2 * Staff, 2 * PA) 10 District Control Rooms FSL & FPB Total number of users 4782 The calculation for estimated number of external users is as below. DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 7 of 80
8 Total Users Estimated is 1% of Internet Penetration Total Internet penetration in Delhi: ( Total Polpulation in Delhi : (2001: Cencus Data) The total number of external users expected to use the CCTNS is application is estimated at 27000and assuming a 10% concurrency, a total of 2700 Users at a time. This is just a suggested figure, and the number may rise owing to stabilization of application, increased internet penetration and increased public awareness. The tables below depict the bandwidth requirement suggested for Network connectivity. Bandwidth for central connectivity is not in scope of the SI, the same will be provisioned in Cyber Highway, an independent network being implemented by Delhi Police. Detailed below is suggestive bandwidth requirements, the final availability will be as per the contract between Delhi Police and MTNL, the developer of Cyber Highway. DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 8 of 80
9 Sr. No. Locations Number of users Expected Concurrent Users (50%) CCTNS (30 kb/s) Mail and Messaging (8 kb/s) Others (Antivirus, SSO, etc.) (5 kb/s) Estimated Required Bandwidth (Kb/s) 1 Police Station Higher Offices PHQ ( Medium) District Offices Range Offices Sub-Divisional Police Offices Commisionerate Data Centre (considering 5 users in each of 457 locations) SCRB Table 2: Bandwidth Requirement Delhi Police is implementing a Gigabit Ethernet named as Cyber highway as the backbone network for data, voice and video communications throughout the dept. This would act as the vehicle for effective implementation of all police applications across the state. The Delhi Police Dept is determined to make efforts to effectively use Information Technology for delivering quality services to citizens and quicken the overall development of the State through improvement of G2G and G2C Interface. This state of art integrated communication network (Cyber Highway) is to be used for convergent services. Initially the network shall accommodate the key applications of Delhi Police such as CCTNS, CIMS (Computerized Inventory Management System), AVTS (Automatic Vehicle Tracking System) etc. The network is being established through MTNL on MPLS/VPN Network. MTNL has designed the network for Delhi Police and will install the fixed component at police premises for connectivity. They will provide the bandwidth among different nodes as per the requirement. Introduction of Cyber Highway will provide a series of benefits and ensure a qualitative jump in the over-all operational efficiency of Delhi Police. Some of the expected benefits are as follows a) Convergent services, integrated data, voice and video and shall be the primary mode of connectivity of PHQ, DCPs, ACPs, Police stations etc. b) Diversified range of Internet/ Intranet access services including support for VPN c) Simple to use and SLA based maintenance d) Scalable and Flexible DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 9 of 80
10 e) Will meet a wide range of requirements including security, Quality of Service etc. f) Will offer fully managed Services to Delhi police g) Will support VOIP, Message Broadcast etc. h) Seamless integration with existing networks. 4 Primary Site Primary data centre will be at Delhi at Police IT Centre and will be established in a co-location model. Required modules of the CCTNS application will be developed and deployed at this Primary DC. All the users across the locations will access this data securely and store the database in main storage area at Primary DC. Details of indicative network architecture, required items and specifications are given in succeeding paragraphs. 4.1 Architectural Aspect The proposed application will be N-tier Service oriented Architecture with separation of business logic from application, database and presentation. The application will be on the central servers at Data Center in Delhi and the Disaster Recovery (DR) site as decided by the department at Hyderabad. The proposed application will be on Web services model. The application shall be architected with traditional 3-tier architecture. i. Database Tier: This shall be diagonally scaling and deployed on a DC class server as specified in this document. Database servers shall be deployed in n+1 cluster. If n is 1 (as per ISV sizing) then Data base servers shall be deployed in 1+1 cluster. ii. Application Server: Application servers shall be deployed in multiple servers (horizontal scaling) iii. Web Tier: Web servers shall be deployed in multiple servers (horizontal scaling) There should be a database for application servers and web servers. The web servers shall be deployed with external load balancers for high availability. The proposed network and security architecture solution and diagram for primary data centre is only a representative and is subject to the overall requirement of all functionalities listed in this section. The feature of the proposed network and security architecture is as below Figure 2: Proposed Connectivity at DC DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 10 of 80
11 10 Mbps SDC : Govt. building Internet Link / VPN over broadband MPLS connectivity from District Data Centre Client Client 210 mbps Web Servers Core Routers External Firewall External Firewall IDS / IPS Access Switch (L2) DNS / Antivirus / Mail Server/ AAA SLB IDS / IPS Core Switch (L3) Global Load Balancer 4 Mbps Leased Line Internal Firewall Internal Firewall DC-DR replication router MPLS connectivity to DR Site Access Switch (L2) Access Switch (L2) State DR Site SAN Switch Storage Area Network Other Servers Application Servers Database Servers Tape Library DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 11 of 80
12 4.1.1 DC Design Description The router at DC would also have capability to handle the data traffic and multiple SSL/VPN encapsulations for secured data transfer between any of the department offices. The router would also connect to the internet and would offer Server connectivity to external users. The router should be capable to handle both MPLS and Internet connectivity. The DC- DR replication router shall replicate data across MPLS connectivity to the DR site and vice versa Intrusion Prevention system (IPS) should detect malicious traffic and further protects the DC DR sites. Intrusion system would also detect (and prevent) any intrusion from Internet/extranet network. The Network Infrastructure (Switches, firewalls, IDS / IPS, routers, server load balancer, etc) would be configured in active active and in high availability mode Firewalls would provide next layer of protection between the extranets and DMZ (which has hosted the application server). Web server Users: All the servers would be connected to high capacity L2 Switch, which can process million of packets within seconds, depending on the Users and Application and its contents. The Application servers would be accessing the database from the backend in order to process the user / citizens queries/requests. The Database servers (RDBMS) are further hosted in higher security layer, comprising of components such as Firewall and Intrusion Prevention system. The SDC is required to provide Infrastructure Services such as Firewall Service, Directory Service, Web Service, Database Service, messaging and data storage services etc. which would be utilized for the application. In this secure infrastructure it has to be ensured that the security devices in the network such as Firewalls, are in high-availability mode, and these devices should be evenly distributed to optimize performance. The set up shall have the AAA, antivirus, web server, DNS servers connected and configured The application can be accessed through VPN over broadband and through MPLS connectivity The DR replication would happen through MPLS cloud Set-up at Data Centre and DR Site The DC & DR would be hosting the CCTNS application along with the other identified applications. The following highlights the different server zone available at the Data Centre Militarized and De-Militarized Zone at Data center De-militarized zone will contain the following: Server Zone DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 12 of 80
13 Militarized zone will contain the following: Critical Server Zone Server Zone: The server zone will host the following applications: Mail and Messaging solution Antivirus solution Single Sign on Directory Services Portal Server Critical Server Zone: The critical server zone will host the following applications: CCTNS Application EMS Application Other Module of CAS State Document Management Systems Hardware and Security Components at Primary Data center Following Server Components are proposed at the Primary Data Centre for the CCTNS application: Portal Server: Web based applications are easily accessible from any sort of the network, Intranet, internet or extranet. Therefore, portal server plays a vital role this initiative. The portal server would be used for providing access to the CCTNS application through internet / intranet. Using portal, relevant contents of the applications can be easily enabled, updated and deployed at the earliest. Portal would provide a base template to users who want to access the application via internet. The portal server shall allow users to access the application from internet and the same shall be configured in cluster mode. Application Server: Application would be required as middle tier for various web based applications. Application server would take care of the necessary workflow and portal server would be required for the interfacing with the end user. Both the portal and application server would be seamlessly integrated to provide high availability and performance. With the use of load balancers, user requests would be distributed among various clustered/common servers. The application servers will be configured in active active and in cluster mode and shall also have the database configured accordingly. Database Servers: The database/repository provides all the relevant information required to process the applications. Database server would be required to store and access data with ease. This would also be integrated with multiple applications, residing at the DC. Enterprise Access Server: Using Directory services DC administrator should be able to define DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 13 of 80
14 centralized authentication & authorization mechanisms for users. This would enable associate policies such as security, management etc on all servers/systems from a centralized console and enhances security, reduces IT complexity and increase overall efficiency. It should be LDAP v3 compliant, in order to have integrated interoperability, security & manageability. It would also enable central authentication thus enabling single sign-on (SSO) mechanism. Therefore this user directory would enable easy manageability that is creation, modification and deletion of user records. It would further help to integrate with various other services like messaging, proxy, etc. The directory services would also be able to cater the requirements for Client workstations also. The AAA server shall be hosted at both the DC and DR site and shall be configured accordingly Development Server There shall be provision in the hardware for separate Test & Development System for each software application so that production system shall not get affected in case of application of patches, versions change etc. The development server shall make provision for all different system software platform used along with all required compilers and libraries. It shall have all application software and utilities along with the provision to customize and test the applications. It shall also have provision for version control and version management. Test and Development set up shall be the exact miniature replication of production environment in 3-tier architecture with hardware as per sizing from application vendor. Backup server: Backup server would be used for backing up the key data on regular interval. The backing up of the data would be an automated process. Whenever desired the backed up data can be restored/retrieved to the desired system configuration Training Server: There shall be a provision for Training server for CCTNS system. Training set up shall be the exact miniature replication of production environment in 3-tier architecture with hardware as per sizing from application vendor. Server : The server would provide ing solution to the users of Delhi Police Enterprise Management Server: For overall management of the Data center components, an Enterprise Management System (EMS) will be provided and would be integrated with the CCTNS application. SI shall have to prepare a category wise detailed list of elements to be monitored, monitoring parameters and the monitoring frequency in terms of critical, semi critical and non-critical categories in each Data Center and the application Network Components at primary data centre Router: Router will be installed in a redundant mode at the primary data center. There routers will be the customer premises equipment which will be connected with an Intranet / VPN over Broad band link Core Switch: Access switch will control and automate network access for both managed and un- DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 14 of 80
15 managed users. IDS/IPS: An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, Trojan horses, and worms). IDS/IPS will be deployed in a redundant mode at server and critical server zone to provide high availability and fault tolerance. Firewall: A firewall will be a part of network that is designed to block unauthorized access while permitting outward communication. Firewall will be installed in redundant mode at server zone and critical server zone to provide features like high-availability and fault tolerance. Load Balancer: The load balancer would be required for distributing workloads to a set of networked computer servers in such a manner that the computing resources are used in an optimal manner. The load balancer will support segmentation/virtualization to distribute load for multiple services, servers. This would increase the availability of the server and will also increase the performance as multiple servers would be sharing the service load. The load balancer would be used for the following servers: Mail Servers Application Server Database Servers Web Server Collation with Data center Primary Data center will be collocated in the data center in the PHQ. The following components may be used commonly and hence will not be included in the cost: Rack Space Power and Cooling SNMP based UPS, DG set power backup Fire prevention Physical security surveillance Common Data Centre facility Maintenance and Support 4.2 Servers and Storage required in Data center The section below suggests the numbers and types of servers, storage and other hardware devices for the envisaged CCTNS other applications. However the correct configuration of the requirements would be available after the product has been finalized. The System Integrator will have the liberty to suggest their own sizing based on the user load as defined above. DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 15 of 80
16 4.3 Hardware at the Primary Site The sizing estimates below describe the hardware required to support the proposed CCTNS application for the project. For minimum specifications of the hardware mentioned below please refer to section 8 Table 3: Suggested BoM for DC Environment Server/box Estimated number of boxes Development Development Servers 1 Test/QA Test/QA Servers 1 Training Training Servers 1 Production CCTNS Application Servers in High Availability Mode 2 Production Database Servers 2 Production Server ( in High availability) 2 Production Web server ( in High availability and load sharing) 2 Production Back up Server 1 Production Access Control Server (Access Management)/ Single Sign On server 1 Production DMS Server ( In high availability ) 2 Production Enterprise Management Server (EMS)(In standalone mode) 4 Production Antivirus Server 1 Total 20 Storage Production External Storage Box 1 Production Tape Library 1 Other Components Storage Component SAN Switch 2 Software KVM switch 1 DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 16 of 80
17 Environment Server/box Estimated number of boxes EMS Software HIPS Antivirus Solution Back up software Document Management System Mail and Messaging solution Needed for Enterprise wide management solution Host based intrusion prevention system needed for protecting unauthorized access to servers Needed for managing enterprise wide antivirus solution Needed for backup of the production system to Tape Library Needed for Document management Needed for the mail and messaging solution Network Components L3 Core Switch 2 L2 Switch 4 IDS/IPS 2 Firewall (External) 2 Firewall (Internal) 2 Global Load Balancer 1 Server Load Balancer 1 Core Router 2 FC-IP Router (DC-DR replication) 1 5 DR Site The proposed DR site for Delhi Police would be located independently at Hyderabad. The decision to locate independently/co-location with the DR site would be taken at a later stage whenever the implementation of CCTNS is under way. The following figure depicts the proposed DR architecture DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 17 of 80
18 DC Connectivity (MPLS) Internet Link Core Router Web Servers Bandwidth Optimizer Access Switch (L2) External Firewall Global Load Balancer IDS / IPS Core Switch (L3) Internal Firewall Access Switch (L2) SAN Switch Storage Area Network Application Servers Database Servers Tape Library DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 18 of 80
19 Figure 3: Proposed DR Connectivity at secondary data center o DR site will be located in Hyderabad and will be connected with an MPLS / Leased Line Link with the Data centre at Police Head Quarter in Delhi. Militarized and De-Militarized Zone at secondary data centre: De-militarized zone will contain the following: Server Zone Militarized zone will contain the following: Critical Server Zone Server Zone: The server zone will host the following applications: Mail and Messaging solution Single Sign on Directory Services Critical Server Zone: The critical server zone will host the following applications: CCTNS Application 5.1 Hardware and Security Components at Secondary Data center Following hardware components will be deployed at the Secondary Data center: Router: Router will be installed in the secondary data center. Core Switch: Access switch will control and automate network access for both Managed and unmanaged users. IDS/IPS: The Intrusion prevention systems shall carryout state-full inspection and multiple layers of Firewalls shall manage the access control. At the same time more specific content level scanning products like Anti-Spam, network anti-virus gateways should be provisioned at appropriate points to DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 19 of 80
20 ensure content level scanning, blocking and access. Firewall: A firewall will be a part of network that is designed to block unauthorized access while permitting outward communication. Firewall will be installed at server zone and critical server zone to provide features like high-availability and fault tolerance. Replication with Primary site: The replication from Primary site to DR site will happen through logshipping. Log shipping will allow automatically sending transaction log backups from a primary database on a primary server instance to one or more secondary databases on separate secondary server instances. The transaction log backups are applied to each of the secondary databases individually. An optional third server instance, known as the monitor server or log server records the history and status of backup and restores operations and, optionally, raises alerts if these operations fail to occur as scheduled. Collation with SDC DR Site: In case the Disaster Recovery site is collated with the common CCTNS DR site, the following components may be used commonly: DR Site civil works DR Site components (cooling, cabling etc.) Firewalls Network Components Physical Security 5.2 Hardware at the DR Site Table 4: Proposed BoM for DR Environment Server/box Estimated number of boxes Servers Production Application Servers 1 Production Database Servers 1 Production Mail and messaging solution 1 Production SSO servers 1 Production Anti virus server 1 Production Back up server 1 DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 20 of 80
21 Environment Server/box Estimated number of boxes Production Web server 1 Total 7 Storage Production External Storage Box 1 Production Tape Library 1 Other Components NA SAN Switch 2 NA KVM Switch 1 Network L3 Core Switch 1 L2 Switch 2 IDS/IPS 1 Firewall (External) 1 Firewall (Internal) 1 Core Router 1 Global Load Balancer 1 FC-IP Router 1 DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 21 of 80
22 6 Client/User Locations 6.1 Requirements at Client Location The following table highlights the number of locations at client side and also the primary scope at these sites Table 5: Client Location Scope Component Number Site Preparation Client Site Infrastructure Additional Hardware (HDD, Digital camera, Electronic pen, Generator and 16 port switch) Police Station CIPA Phase No Yes Yes Police Station 52 Yes As per section 6.2 Other offices (Higher 276 Yes As per Section office/training 6.2 centres/fsl/fpb/district control rooms) As per Section 6.2 As per section 6.2 The complete breakup of the locations is given as below : Range District Sub Division Police Station Southern 1. South-East 1 New Friends Colony 1 New Friends Colony 2 Jamia Nagar 3 Hazrat Nizamuddin 4 Sunlight Colony 2 Lajpat Nagar 5 Lajpat Nagar 6 Amar Colony 7 Greater Kailash 3 Kalkaji 8 Kalkaji 9 Govind Puri 10 Okhla Ind. Area 4 Sarita Vihar 11 Sarita Vihar 12 Badar Pur 13 Jait Pur 5 Ambedkar Nagar 14 C.R. Park 15 Sangam Vihar 16 Ambedkar Nagar 17 Pul Prahladpur 2. South 6 Defence Colony 18 Defence Colony DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 22 of 80
23 19 Lodhi Colony 20 Kotla Mubarak Pur 7 Hauz Khas 21 Hauz Khas 8 Mehrauli (No Hardware) 22 Malviya Nagar 23 Saket 24 Mehrauli 25 Fatehpur Beri 26 Neb Sarai 9 Vasant Vihar 27 Vasant Vihar 28 Vasant Kunj North 29 Vasant Kunj South 30 Dhaula kuan 10 Safdarjung Enclave 31 R.K. Puram 32 Sarojini Nagar 33 Safdarjung Enclave 3. South West 11 Delhi Cantt. 34 Delhi Cantt. 35 Inder Puri 36 Naraina 12 Dwarka 37 Sec.23 Dwarka 38 Dwarka North 39 Kapashera 40 Dwarka South 13 Dabri 41 Dabri 42 Palam Village 43 Binda Pur 44 Sagar Pur 14 Najaf Garh 45 Najaf Garh 46 Jaffarpur Kalan 47 Chhawla 48 Baba Haridas Nagar Southern 4. West 15 Tilak Nagar 49 Tilak Nagar 50 Hari Nagar 51 Maya Puri 16 Vikas Puri 52 Vikas Puri 53 Janak Puri 54 Uttam Nagar 17 Rajouri Garden 55 Rajouri Garden 56 Kirti Nagar 57 Khyala DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 23 of 80
24 58 Moti Nagar 18 Punjabi Bagh 59 Punjabi Bagh 60 Mianwali Nagar 61 Paschim Vihar 19 Nangloi 62 Madipur 63 Nangloi 64 Nihal Vihar 65 Ranhola 66 Mundka New Delhi 5. New Delhi 20 Parliament Street 67 Parliament Street 68 Mandir Marg 21 Connaught Place 69 Connaught Place 70 Barakhamba Road 71 Tilak Marg 22 Chanakya Puri 72 Chanakya Puri 73 Tughlak Road 6. East 23 Gandhi Nagar 74 Gandhi Nagar 75 Geeta Colony 76 Krishna Nagar 24 Vivek Vihar 77 Vivek Vihar 78 Anand Vihar 79 Farsh Bazar 25 Preet Vihar 80 Preet Vihar 81 Shakar Pur 82 Jagat Puri 26 Madhu Vihar 84 Madhu Vihar 85 Mandawali 86 Pandav Nagar 27 Kalyan Puri 87 Kalyan Puri 88 New Ashok Nagar 89 Mayur Vihar 90 Ghazi Pur New Delhi 7. North East 28 Seelam Pur 91 Seelam Pur 92 Zafrabad 93 New Usman Pur 29 Khajuri Khas 94 Khajuri Khas 95 Sonia Vihar 96 Karawal Nagar 30 Gokul Puri 97 Gokul Puri DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 24 of 80
25 98 Bhajan Pura 99 Jyoti Nagar 31 Shahdara 100 Shahdara 101 Mansarovar Park 102 Welcome 32 Seema Puri 103 Seema Puri 104 Nand Nagri 105 Harsh Vihar 106 G.T.B. Enclave Northern 8. North 33 Civil Line 107 Civil Lines 108 Maurice Nagar 109 Timar Pur 110 Burari 34 Sarai Rohilla 111 Sarai Rohilla 112 Gulabi Bagh 113 Roop Nagar 35 Sadar Bazar 114 Sadar Bazar 115 Bara Hindu Rao 116 Subzi Mandi 36 Kotwali 117 Kotwali 118 Lahori Gate 119 Kashmere Gate 9. Central 37 Darya Ganj 121 Darya Ganj 122 Chandni Mahal 123 Jama Masjid 38 Kamla Market 124 Kamla Market 125 Hauz Quazi 126 I.P. Estate 39 West Pahar Ganj 127 West Pahar Ganj 129 DBG Road 130 Nabi Karim 40 Karol Bagh 131 Karol Bagh 132 Parshad Nagar 133 Rajinder Nagar 41 Patel Nagar 134 Patel Nagar 135 Anand Parbat 136 Ranjit Nagar Northern 10. North West 42 Ashok Vihar 137 Ashok Vihar 138 Keshav Puram DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 25 of 80
26 Joint CP/Ops Joint CP/Crime (Special CP/Crime) 139 Bharat Nagar 43 Saraswati Vihar 140 Saraswati Vihar 141 Maurya Enclave 142 Rani Bagh 44 Model Town 143 Model Town 45 Shalimar Bagh (No Hardware) 144 Adarsh Nagar 145 Mukherjee Nagar 146 Shalimar Bagh 147 Mahendra Park 46 Jahangir Puri 148 Jahangir Puri 149 Swarup Nagar 150 Bhalswa Dairy 11. Outer 47 Alipur 151 Alipur 152 Narela 48 Rohini 153 South Rohini 154 Mangol Puri 155 Vijay Vihar 49 Sultan Puri 156 Sultan Puri 50 Bawana (No Hardware) 157 Aman Vihar 158 Begum Pur 159 Bawana 160 Kanjhawala 161 Shahbad Dairy 51 Samaipur Badali 162 Samaipur Badali 163 K.N. Katju Marg 52 Prasant Vihar 164 Prasant Vihar 165 North Rohini 12. DCP IGI 53 Palam 166 IGI Airport 13. Addl. CP Crime & Rlys 167 Palam Airport 54 Metro 168 Raja Garden 169 Sastri Park 170 Kashmiri Gate 171 Rithala 172 Yamuna Depot 173 Kalkaji Mandir 174 Qutab Minar 175 I.G.I Airport 55 Railways 176 H.Nizamuddin 174 New Delhi Rly.Stn. DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 26 of 80
27 Joint EOW CP Joint CP SPUW&C( Special Police Unit for Women & Children) Special CP/Special Cell 175 Old Delhi Rly. Stn. 176 Sarai Rohilla 56 Crime 177 Anand Vihar 178 Crime Branch 14. DCP EOW 57 EOW 179 Economic Offence Wing 15. DCP SPUW&C Cell (Special Police Unit for Women & Children) 16.DCP/Special Cell 58 SPUW&C Cell (Special Police Unit for Women & Children) 180 SPUW&C 59 Special Cell 181 Special Cell 60 Narcotics List of Offices equivalent to SDPO (Within District ACP office) S.No District Name of Offices Equivalent to SDPO 1. Central ACP/CAW Cell, Central Distt., Near Ranjit Singh Flyover, New Delhi ACP/CAW 2. East ACP/CAW Cell, East, PS Krishna Nagar, Delhi. ACP/CAW 3. New Delhi ACP/CAW Cell, New Delhi, Parliament Street, New Delhi. 4. North ACP/CAW Cell, North Distt. Police Station Sabzi Mandi, Delhi 5. North East ACP/CAW Cell, North East Distt. C-Block Nand Nagari, New Delhi. 6. North West ACP/CAW Cell, North West Distt., PS Maurya Enclave, Delhi 7. Outer ACP/CAW Cell, Outer, PP Dost near Pitam Pura Police Lines, Delhi. 8. South ACP/CAW Cell, South, PS Vasant Vihar, New Delhi 9. South East ACP/CAW Cell, South East, PP Sri Niwas Puri, New Delhi 10. South West ACP/CAW Cell, South West, Sector 9 Dwarka, New Delhi ACP/CAW ACP/CAW ACP/CAW ACP/CAW ACP/CAW ACP/CAW ACP/CAW ACP/CAW 11. West ACP/CAW Cell, PS Kirti Nagar, West District ACP/CAW 12. Central ACP/DIU, Central Distt Daryaganj Delhi ACP/DIU DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 27 of 80
28 13. East ACP/DIU, East, DCP Office Complex, Vishwas Nagar, New Delhi. 14. New Delhi ACP/DIU, New Delhi, PS Tilak Marg, New Delhi 15. North ACP/DIU, North Distt.,Police Station Bara Hindu Rao, Delhi 16. North East ACP/DIU, North East Distt. P.S. bhajan Pura New Delhi. 17. North West ACP/DIU, North West Distt., Community Centre Sector-11, Rohini, Delhi 18. Outer ACP/DIU, Outer, PP Dost near Pitam Pura Police Lines, Delhi. ACP/DIU ACP/DIU ACP/DIU ACP/DIU ACP/DIU ACP/DIU 19. South ACP/DIU, South, PS Vasant Vihar, New Delhi ACP/DIU 20. South East ACP/DIU, South East, PS Sarita Vihar, New Delhi. 21. South West ACP/DIU, South West, Sector 9 Dwarka, New Delhi 22. West ACP/DIU, PP, MIF Flats, Rajouri Garden, West District 23. South ACP/Operation, South, PP Pushp Vihar, New Delhi 24. Central ACP/Operation, Central Distt. P.S.Kamla Market 25. East ACP/Operation, East, Mayur Vihar, Phase-II, Delhi 26. New Delhi ACP/Operation, New Delhi, Parliament Street, New Delhi. 27. North ACP/Operation, North Distt., Maurice Nagar Line behind Daulat Ram College Delhi. 28. North East ACP/Operation, North East Distt., Near DCP Office Complex,GT Road Seelam Pur, New Delhi 29. North West ACP/Operation, North West Distt., Community Centre Sector-11, Rohini, Delhi 30. Outer ACP/Operation, Outer, PP Dost near Pitam Pura Police Lines, Delhi. 31. South East ACP/Operation, South East, PS Sarita Vihar, New Delhi. 32. South West ACP/Operation, South West, PP Dhaula Kuan, New Delhi ACP/DIU ACP/DIU ACP/DIU ACP/Operation ACP/Operation ACP/Operation ACP/Operation ACP/Operation ACP/Operation ACP/Operation ACP/Operation ACP/Operation ACP/Operation 33. West ACP/Operation, Tegore Garden, West District ACP/Operation 34. Central ACP/PG Cell, Central Distt, P.S. Darya Ganj, New Delhi ACP/PG DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 28 of 80
29 35. East ACP/PG Cell, East, DCP Office Complex, Vishwas Nagar, New Delhi. 36. New Delhi ACP/PG Cell, New Delhi, Parliament Street, New Delhi. 37. North East ACP/PG Cell, North East Distt. Near DCP Office Complex,GT Road Seelam Pur, New Delhi 38. North West ACP/PG Cell, North West Distt., DCP Office Complex, Ashok Vihar, Delhi 39. Outer ACP/PG Cell, Outer, PP Dost near Pitam Pura Police Lines, Delhi. 40. South ACP/PG Cell, South, DCP Office Complex, Hauz Khas, New Delhi 41. South East ACP/PG Cell, South East, PS Sarita Vihar, New Delhi. 42. South West ACP/PG Cell, South West, Sector 9 Dwarka, New Delhi ACP/PG ACP/PG ACP/PG ACP/PG ACP/PG ACP/PG ACP/PG ACP/PG 43. West ACP/PG Cell, PS Rajouri Garden, West District ACP/PG 44. North ACP/PG Cell, North Distt., behind Police Station Civil Line, Delhi 45. Central Special Executive Magistrates, Central Distt. P.S.Daryaganj, New Delhi 46. East Special Executive Magistrate, East, Krishna Nagar, New Delhi 47. New Delhi Special Executive Magistrate, New Delhi, PS Parliament Street, New Delhi 48. North Special Executive Magistrate, North Distt., PS Sarai Rohilla, New Delhi 49. North East Special Executive Magistrate, North East Distt., DCP Office Complex, Seelam Pur, New Delhi 50. North West Special Executive Magistrates, North West Distt., Ashok Vihar, Delhi 51. Outer Special Executive Magistrate, Outer, PS Ali Pur, Delhi 52. South Special Executive Magistrate, South, Amar Colony, New Delhi 53. South East Special Executive Magistrates, South East, PS Sarita Vihar, New Delhi. 54. South West Special Executive Magistrate, South West, Sector 9 Dwarka, New Delhi ACP/PG SEM Court SEM Court SEM Court SEM Court SEM Court SEM Court SEM Court SEM Court SEM Court SEM Court 55. West Special Executive Magistrate, West District SEM Court DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 29 of 80
30 Districts S.No District Name of Sub Division Category 1. South DCP/South District, DCP Office Complex Hauz Khas, New Delhi 2. South East DCP/South East District, PS Sarita Vihar, New Delhi 3. South West DCP/South West District, Sector- 19 Dwarka, New Delhi 4. West DCP/West District, PS Rajauri Garden, New Delhi. 5. New Delhi DCP/New Delhi District, Parliament Street, New Delhi. District District District District District 6. East DCP/East District, Vishwas Nagar, New Delhi District 7. North East DCP/North East District,G.T. Road, Seelam Pur New Delhi District 8. Central DCP/Central District,Daryaganj, New Delhi District 9. North DCP/North District, behind Police Station Civil Line, Delhi. 10. North West DCP/Norh West District, DCP Office Complex, Ashok Vihar, Delhi. 11. Outer DCP/Outer District, PP Dost near Pitam Pura Police Lines, Delhi. District District District 12. Crime DCP/Crime, MSO Building I.P. Estate, New Delhi Equivalent District 13. IGI DCP/IGI District, IGI Air Port, New Delhi Equivalent to District 14. SPUW&C DCP/CAW District, Nanak Pura, South Moti Bagh, New Delhi 15. EOW DCP/EOW District, C-22/23, Udyog Sadan, Qutab Industrial Area, New Delhi 16. Special Cell DCP/Spl. Cell District, MSO Building, I.P. Estate, New Delhi Equivalent District Equivalent District Equivalent District to to to to Ranges & Equivalent to Ranges S.No District Name of Sub Division Category 1. Jt.CP Joint CP/Southern Range, MSO Building I.P Estate, New Delhi 2. Jt.CP Joint CP/Northern Range, MSO Building I.P Estate, New Delhi Range Range DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 30 of 80
31 3. Jt.CP Joint CP/New Delhi Range, MSO Building I.P Estate, New Delhi 4. Jt.CP Joint CP/Crime (Equivalent to Range), MSO Building I.P Estate, New Delhi 5. Jt.CP Joint CP/SPUW&C (Equivalent to Range), Nanak Pura, South Moti Bagh, New Delhi. 6. Jt.CP Joint CP/Special Cell (Equivalent to Range), MSO Building I.P Estate, New Delhi 7. Jt.CP Joint CP/Operation (Equivalent to Range), MSO Building I.P Estate, New Delhi Range Equivalent to Range Equivalent to Range Equivalent to Range Equivalent to Range 8. Jt.CP Joint CP/EOW (Equivalent to Range) Equivalent to Range Proposed Training Centers S.No District Name of Sub Division Type 1. PTC Training Centre PTC PTC 2. PTC Training Centre RTC-1 RTC 3. PTC Training Centre RTC-2 RTC 4. SCRB Training Centre-CCTNS Lab Connaught Place SCRB 5. South District Training Centre South District DTC 6. South East District Training Centre South East District, DTC 7. South West District Training Centre South West District DTC 8. West District Training Centre West District DTC 9. New Delhi District Training Centre New Delhi District. DTC 10. East District Training Centre /East District, DTC 11. North East District Training Centre /North East District DTC 12. Central District Training Centre Central District DTC 13. North District Training Centre North District. DTC 14. North West District Training Centre /Norh West District DTC 15. Outer District Training Centre /Outer District. DTC 16. Crime District Training Centre /Crime DTC Equivalent to SDPO ( Treated like Districts ACP Office) S.No District Name of Sub Division Training Centre 1. Crime ACP/Inter State Cell, Crime, Chankya Puri, New Delhi 2. Crime ACP/Kidnapping, Crime, PS Prashant Vihar, New Delhi ACP/Inter State Cell ACP/Kidnapping DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 31 of 80
32 3. Crime ACP/Anti Auto Theft Squad, Crime, PS Crime Branch, Nehru Place, New Delhi 4. Crime ACP/Anti Extortion Cell, Crime, Sector 8, R.K. Puram, N Delhi 5. Crime ACP/Anti Forgery, EOW, C-22/23, Udyog Sadan, Qutab Industrial Area, New Delhi. 6. Crime ACP/Anti Homicide Cell, Crime, Amar Colony Rohini Sect.-18, Delhi 7. Crime ACP/Anti Robbery Cell, Crime, PS Crime Branch, Nehru Place, New Delhi 8. Crime ACP/Research Cell, Crime, MSO Building, IP Estate, New Delhi 9. Crime ACP/SCRB, Crime, MSO Building, IP Estate, New Delhi 10. Crime ACP/Special Investigation Team, Crime, Amar Colony, Rohini Sector -18, New Delhi 11. Crime ACP/Special Operation Squad, Crime, PP Sun Light Colony, New Delhi 12. Crime ACP/Special Team, Crime, PS Prashant Vihar, New Delhi 13. EOW ACP/CBT, EOW, C-22/23, Udyog Sadan, Qutab Industrial Area, New Delhi. 14. EOW ACP/Cyber Cell, EOW, PTS Malviya Nagar, New Delhi. 15. EOW ACP/F & C, EOW, C-22/23, Udyog Sadan, Qutab Industrial Area, New Delhi. 16. EOW ACP/IPR, EOW, PTS Malviya Nagar, New Delhi. 17. EOW ACP/LBR, EOW, C-22/23, Udyog Sadan, Qutab Industrial Area, New Delhi. 18. EOW ACP/TMM, EOW, PTS Malviya Nagar, New Delhi. 19. Special Cell ACP Computer (NDR), Special Cell, Lodhi Colony, New Delhi 20. Special Cell ACP/CSS/OC, Special Cell, PS Chankya Puri, New Delhi 21. Special Cell ACP/HQ (Ops. Cell), Special Cell, Lodhi Colony, New Delhi 22. Special Cell ACP/NDR/OC, Special Cell, Lodhi Colony, New Delhi 23. Special Cell ACP/NR/OC, Special Cell, Sector 6, Rohini, Delhi ACP/Anti Auto Theft Squad ACP/Anti Cell Extortion ACP/Anti Forgery ACP/Anti Cell ACP/Anti Cell Homicide Robbery ACP/Research Cell ACP/SCRB ACP/Special Investigation Team ACP/Special Operation Sq ACP/Special Team ACP/CBT, EOW ACP/Cyber Cell ACP/F & C ACP/IPR, EOW ACP/LBR, EOW ACP/TMM, EOW ACP/Computer,/ Special Cell ACP/CSS,OC/ Special Cell ACP/HQ/Special Cell ACP/NDR / Special Cell ACP/NR /Special Cell 24. Special Cell ACP/SR/OC, Special Cell, New Friends ACP/SR/ Special Cell DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 32 of 80
33 Colony, Maharani Bagh, New Delhi 25. SPUW&C ACP/CAW Cell, Juvenile Justice & National Commission for Women 26. SPUW&C ACP/CAW Cell-NGO Mahila Panchayat, Nanak Pura New Delhi 27. SPUW&C ACP/CAW Cell-PS & Domestic Violence Nanak Pura New Delhi 28. SPUW&C ACP/CAW Cell-Self Defence, Help Line & Counseling, Nanak Pura New Delhi 29. SPUW&C ACP/CAW Cell-SIU & HQ, Nanak Pura New Delhi ACP/CAW Juvenile Justice Cell, ACP/CAW Cell.NGO ACP/CAW Cell-PS & Domestic Violence ACP/CAW Cell-Self Defence, Help Line & Counseling ACP/CAW Cell-SIU & HQ Higher offices S.No Unit Office Type 1. Licensing Addl.CP/Licensing Higher Offices 2. Licensing Addl. DCP/Licensing Higher Offices 3. Licensing Addl. DCP/ Cinema & Amusement Higher Offices 4. Licensing ACP/Hotel & restaurants Higher Offices 5. Licensing ACP/Arms &Explosives Higher Offices 6. Finger Print Bureau Director Higher Offices 7. Special Branch Spl.CP/ Int. & Ops 8. Special Branch Addl.CP/ Special Branch 9. Special Branch DCP/ Special Branch 10. Special Branch ACP/CBR & APP Special Branch 11. Special Branch ACP/Communal, Central,Y&S Special Branch 12. Special Branch ACP/Sikh, Labor, Political Special Branch 13. Special Branch ACP/PAK Special Branch 14. Special Branch ACP/HQ Special Branch 15. Special Branch ACP Outer Zone and NGO 16. Special Branch ACP/ West Zone Control Room Special Branch 17. PCR Addl. CP/ PCR 18. PCR Addl. DCP/GA, PCR 19. PCR Addl. DCP/CPCR PCR 20. PCR Addl. DCP/Ops PCR 21. PCR Addl. DCP/MT, PCR 22. PCR ACP/Admin PCR DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 33 of 80
34 23. PCR ACP/Estt. PCR 24. PCR ACP/GA PCR 25. PCR ACP/CPCR-1,PCR 26. PCR ACP/CPCR II,PCR 27. PCR ACP/CPCR-III, PCR 28. PCR ACP/NR PCR 29. PCR ACP/SR PCR 30. PCR ACP/NDR PCR 31. PCR ACP Checking PCR 32. PCR ACP/MT & Training PCR 33. Traffic Jt.CP/Traffic 34. Traffic Jt.CP/Traffic (HQ) 35. Traffic DCP/HQ Traffic 36. Traffic DCP/SR Traffic 37. Traffic DCP/VIP Traffic 38. Traffic DCP/CRTraffic 39. Traffic DCP/NR Traffic 40. Traffic DCP/WR Traffic 41. Traffic DCP/ER Traffic 42. Traffic ACP/HQ Traffic 43. Traffic ACP/PRG, Traffic 44. Traffic ACP/North East Traffic 45. Traffic ACP/Computer & TE Traffic 46. Traffic ACP/RSC Traffic 47. Traffic ACP/Central Traffic 48. Traffic ACP/North Traffic 49. Traffic ACP/Lines (RND) Traffic 50. Traffic ACP/South East Traffic 51. Traffic ACP/South Traffic 52. Traffic ACP/North West Traffic 53. Traffic ACP/South West Traffic 54. Traffic ACP/New Delhi Traffic 55. Traffic ACP/West Traffic 56. Traffic ACP/East Traffic 57. Traffic ACP/Route Traffic DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 34 of 80
35 58. Vigilance Special CP/Vigilance 59. Vigilance Jt.CP/ Vigilance 60. Vigilance Addl. CP/ Vigilance 61. Vigilance ACP/RTI Vigilance 62. Vigilance ACP/HQ Vigilance 63. Vigilance ACP Vigilance 64. Vigilance ACP/Vigilance 65. Communication DCP/Communication 66. Communication ACP/Admin Communication 67. Communication ACP/SR Communication 68. Communication ACP/HQ, Communication 69. Communication ACP/NR Communication 70. Communication ACP/Route Communication S, No. Type Districts or equivalent ends 1 District control room North 2 District control room North East 3 District control room North West 4 District control room South East 5 District control room South West 6 District control room South 7 District control room Central 8 District control room New Delhi 9 District control room Outer 10 District control room East 11 District control room West 12 District control room Crime and Railways 13 District control room IGI Airport 14 District control room SPUW&C 15 District control room EOW 16 District control room Special Cell S.No. Type Location 1 State Forensic Science Laboratory Rohini DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 35 of 80
36 2 State Finger Print Bureau Kamla Market 6.2 Infrastructure at Client Location Given below are the hardware/site preparation details considered for Police stations and higher offices : Police stations: Item Quantity Client Systems 4 HDD 160 GB 1 Duplex Printer 1 MFD Printer 1 UPS 60 Min Backup 2 KVA 1 Generator 2 KVA 1 Switch 16 Port 1 Digital Camera + Electronic Pen 1 Site Preparation 1 Opn Expense (paper / toner) 3 ACP office/equivalent ACP offices/sdpo : Item Quantity Client Systems 3 HDD 160 GB 0 Duplex Printer 0 MFD Printer 1 UPS 60 Min Backup 2 KVA 1 Generator 2 KVA 0 Switch 16 Port 1 Digital Camera 0 Site Preparation 1 Opn Expense (paper / toner) 3 Ranges/Jt CP offices : Item Quantity Client Systems 4 HDD 160 GB 0 Duplex Printer 0 MFD Printer 1 UPS 60 Min Backup 2 KVA 1 DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 36 of 80
37 Generator 2 KVA 0 Switch 16 Port 1 Digital Camera 0 Site Preparation 1 Opn Expense (paper / toner) 3 District/DCP/Addl DCP offices: Item Quantity Client Systems 10 HDD 160 GB 0 Duplex Printer 0 MFD Printer 10 UPS 60 Min Backup 1 KVA 10 Generator 2 KVA 0 Switch 16 Port 1 Digital Camera 0 Site Preparation 1 Opn Expense (paper / toner) 3 PHQ (Large) (1) Item Quantity Client Systems 50 HDD 160 GB 0 Duplex Printer 0 MFD Printer 50 UPS 60 Min Backup 1 KVA 50 Generator 2 KVA 0 Switch 16 Port 4 Digital Camera 0 Site Preparation 1 Opn Expense (paper / toner) 3 PHQ medium: (2) DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 37 of 80
38 Item Quantity Client Systems 25 HDD 160 GB 0 Duplex Printer 0 MFD Printer 25 UPS 60 Min Backup 1 KVA 25 Generator 2 KVA 0 Switch 16 Port 2 Digital Camera 0 Site Preparation 1 Opn Expense (paper / toner) 3 SCRB (1): Item Quantity Client Systems 4 HDD 160 GB 0 Duplex Printer 0 MFD Printer 1 UPS 60 Min Backup 2 KVA 1 Generator 2 KVA 0 Switch 16 Port 1 Digital Camera 0 Site Preparation 1 Opn Expense (paper / toner) 3 District control rooms (16) Item Quantity Client Systems 5 MFD Printer 1 UPS 60 Min Backup 2 KVA 1 Site Preparation 1 Opn Expense (paper / toner) 3 FSL &FPB (2) Item Quantity Client Systems 2 MFD Printer 1 UPS 60 Min Backup 2 KVA 1 DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 38 of 80
39 Site Preparation 1 Opn Expense (paper / toner) 3 7 Software Requirement 7.1 Storage Management Software (SMS) Storage management software should protect the organization from the risks of data loss and will help in reducing complexity, managing costs and address compliance with data retention and availability requirements. Storage Management Software should improve the business continuity by shortening backup and recovery times and maximizing application availability with advanced data recovery management technologies. Storage Management Software should employ data duplication and a hierarchy of storage to increase efficiencies and conserve resources. SMS should enhance data security with innovative access and encryption features. SMS should help the department to adapt to changes within the IT infrastructure to minimize service disruptions and speed restorations and backups. SMS should increase the visibility into the data protection environment by providing advanced features for operational monitoring and historical reporting. SMS should allow Host based replication and failover to IP based network. SMS should be able to create, manage and protect file shares and network application storage. 7.2 Enterprise Management System Enterprise management system will provide a centralized point of control that will offer a close and efficient control of events happening across CCTNS systems, creating a "mission control" centre for the distributed environment. EMS will filter, correlate, process, and respond to the thousands of events that are created daily from network devices, systems, databases, and applications. The EMS product family will address the challenges related to providing true application quality of service to the business: EMS solution will be deployed at primary data centre for centralized managing and monitoring the infrastructure. EMS technology will map the complex dependencies between managed elements. EMS will be able to immediately determine the impact of a component failure on the overall application service, because not every problem in the infrastructure impacts the business or the end user. This information will allow staff to prioritize problem-solving efforts. The desired EMS's goal is the DOCUMENT REFERENCE: CCTNS/CCTNS Delhi /03/007 Page 39 of 80
E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA
E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA RFP FOR SELECTION OF SYSTEM INTEGRATOR CORRIGENDUM RELEASED BY: Goa Police Government
More informationGuidelines for Infrastructure & Application Hosting in SDC
Guidelines for Infrastructure & Application Hosting in SDC V 1.0 Department of Electronics & Information Technology, Ministry of Communications and Information Technology, Government of India Abstract
More informationMukesh 9728635719 HR55 J 4162 Rohini Rohini Sec.
Mukesh 9728635719 HR55 J 4162 Rohini Rohini Sec. 6:45am RITHALA METRO Station MADHUBAN CHOWK 6:50 7:00 Sarasvati Vihar 7:05 Jaipur Golden 7:08 Police Line Batti 7:15 Peeragarhi 7:20 Meya wali Nagar 7:22
More informationHOSPITALS. EMERGENCY NUMBERS POLICE Control Room 100 Commissioner of Police 23319661 PRO 23319404. AMBULANCE Ambulance 102 Accident & Trauma 10999
EMERGENCY NUMBERS POLICE Control Room 100 Commissioner of Police 23319661 PRO 23319404 AMBULANCE Ambulance 102 Accident & Trauma 10999 FIRE Fire Control Room 101 Chief Fire Officer 23312222, 23314400 Hospitals
More informationRFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh
MAP_IT Madhya Pradesh Agency for Promotion of Information Technology Corrigendum 2 RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh Sr.No. RFP Reference Existing
More informationCRIME & CRIMINAL TRACKING NETWORK AND SYSTEMS (CCTNS)
Hardware & Site Preparation Gap for Non CIPA Police Stations 167 Locations Detailed Hardware List for Each PS Desktop System 4 HDD 160 GB 1 Duplex Laser Printer 1 UPS for 120 min back (2KVA) 1 DG Set (2.5
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationNEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
More informationWherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.
Procurement of Services to Design, Develop, Implement and Maintain Centralized e-governance Application for Urban Local Bodies in Tamil Nadu Explanatory Notes 2 / Dated 17-December--2013 Explanatory Notes
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
More informationGMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
More informationSolutions as a Service N.Konstantinidis Technical Director - MNG
Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation
More informationAL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
More informationComputerized Bus Pass System. Project Details
Computerized Bus Pass System Project Details *Project Dtls *Tech Used *Contact person Project Computerized Bus Pass System Name of Department DTC Project Details What It Does Issue of computerized bus-pass
More informationGuidelines For Technical and Financial Support For Establishment of State Data Centre (SDC)
Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Department of Information Technology, Govt. of India, Electronics Niketan, New Delhi 110 003. 1.0 Preamble 1.1
More informationRequest for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
More informationSupplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationRetention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationSecurity Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those
More informationInformation Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
More informationS.No. Name of Branch Location
To facilitate the consumers the following branches of Corporation Bank are also authorized to collect the payment of water bills on behalf of Delhi Jal Board:- S.No. Name of Branch Location 1. Alipur-505
More informationINCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
More informationBSNL IDC Hosted Firewall Service. Total Network Security
Total Network Security Advantage BSNL IDC India s first Uptime Institute Certified Tier-III data centres with combined connectivity and IT services availability from BSNL Low latency Internet Data Centres
More informationTelecom Consumer Charter
Telecom Consumer Charter FOR MAHANAGAR TELEPHONE NIGAM LIMITED Delhi unit O/o Executive Director: 2nd Floor, Khurshid Lal Bhawan Janpath New Delhi-110050 Website: www.mtnldelhi.in Corporate office: 5th
More informationFirewall Security. Presented by: Daminda Perera
Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network
More informationAchieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
More informationHardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA
Hardware/Software Deployment Strategies Introduction to Information System Components Chapter 1 Part 4 of 4 CA M S Mehta, FCA 1 Hardware/Software Deployment Strategies Learning Objectives Task Statements
More informationData Center Establishment to Run the IT System in Power Utilities
Global Journal of Computer Science and Technology Volume 12 Issue 2 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
More informationInnovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
More informationNetwork Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
More informationChapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
More informationsaid period logs can be moved to Service
Replies to Queries by Various by vendors for Centralised Desktop management Solution S# Page# Clause Point in the RFP Queries Clarification by UIIC e) Backup and Restore: Successful bidder should provide
More informationTENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
More informationFive keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
More information74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
More informationFIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationCloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
More informationCyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
More informationThe Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
More informationResponse of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server
Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Srno 1 Current RFP clause Clause Details Bidder Query Our Response 2.2 (Eligibilty Criteria), Page Parent company
More informationCisco Network Switches Juniper Firewall Clusters
Cisco Network Switches Juniper Firewall Clusters Cisco Network Infrastructure Cisco Network Infrastructure Core Network Consists of 4 Cisco 4506 switches 10 Gig E Fiber Optic Connections between switches
More informationIT Security Standard: Network Device Configuration and Management
IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding
More informationVirtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
More informationTechnology Services Division Infrastructure Major Deliverables by Calendar Year
Technology Services Division Infrastructure Major Deliverables by Calendar Year Year 2002 Network INFRASTRUCTURE Green Screen Technology DELIVERABLES Migrated courthouse network devices to Multi-Protocol
More informationLIST OF RECOGNISED PRIVATE HOSPITALS UNDER DGEHS in DELHI Sr. No. Name of the institution Recognized for facilities CENTRAL DISTRICT
LIST OF RECOGNISED PRIVATE HOSPITALS UNDER DGEHS in DELHI Sr. No. Name of the institution Recognized for facilities CENTRAL DISTRICT 1. Delhi Heart and Lung Institute, Panchkuian Rd., New Delhi 55 2. Jeevan
More informationSecurity for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
More informationBusiness Case for the Brocade Carrier Ethernet IP Solution in a Metro Network
Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network Executive Summary The dramatic rise of multimedia applications in residential, mobile, and business networks is continuing
More informationDISASTER RECOVERY WITH AWS
DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationIP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
More informationHuawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationOPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
More informationINTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
More informationChapter 14! Enterprise Computing!
Chapter 14 Enterprise Computing Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationStorage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationTable of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3 Improve Processes... 3 Innovation... 4 IT Planning & Alignment
More informationDCADLEC RFP Clarifications
Referenced RFP Section 1 Section 2.07 2 Section 2.03, Item C 3 4 Section 1.04 5 6 DCADLEC RFP Clarifications Question Answer The Cisco phones are all Gigabit where specified. Since the Cisco phones are
More informationSWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
More informationState of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
More informationCompulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink
More informationNetwork Documentation Checklist
Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation
More informationBME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationGE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationAnnexure - " SERVICE REQUIREMENTS"
General - Compliance Sl. No. Description of the Requirements Compliance (Yes/No) Comment 1 RBAC for all Servers & Networking Equipments for Operator, System Administrator & System Manager or Super Users
More informationLas Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
More informationInformation Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
More informationCity of Coral Gables
City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:
More informationVladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
More informationManaged Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
More informationSonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
More informationDESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
More informationQuestions & Answers. Request for Proposal RFP# ELCMDM2014-003 for Enterprise Network Support and Hosting Services for Miami-Dade and Monroe Counties
Questions & Answers Request for Proposal RFP# ELCMDM2014-003 for Enterprise Network Support and Hosting Services for Miami-Dade and Monroe Counties 1. Does this project include an email migration? We are
More informationCompany Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
More informationPCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com What What is PCI A global forum launched in September 2006 for ongoing enhancement
More informationSince 2005 E-SPIN SDN BHD. All Right Reserved. www.e-spincorp.com. SIEM - Log Consolidation Management (LCM) Solution
Since 2005 E-SPIN SDN BHD. All Right Reserved. www.e-spincorp.com SIEM - Log Consolidation Management (LCM) Solution Copyrighted Copyright Since 2005-2011 and respective update by E-SPIN Sdn. Bhd. All
More informationConsensus Policy Resource Community. Lab Security Policy
Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More informationNetwork Enabled Cloud
Network Enabled Cloud Your company network is the company s vital circulatory system that quickly moves information to people so they can make informed decisions about ways to accelerate your business
More informationPerceptive Software Platform Services
Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationNetwork Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationResponse to Queries Received for RFP of Security Integrator - Tender No. 63
Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for
More informationIntegrated Challan cum Return (ICR) - Scope of Work for ICR Platform
Integrated Challan cum Return (ICR) - Scope of Work for ICR Platform 1. Proposed System Modules: a) User Portal b) ICR Management Platform c) Integration with Bankers Core Banking platform d) Messaging
More informationPCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
More information