CounselorMax and ORS Managed Hosting RFP 15-NW-0016

Size: px
Start display at page:

Download "CounselorMax and ORS Managed Hosting RFP 15-NW-0016"

Transcription

1 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting services for CounselorMax and Online Reporting System (ORS) web-based applications and is seeking a contractor to implement secure and reliable web-based access to both of these key external customer facing applications. Specifically, NeighborWorks America seeks to purchase application hosting services that will allow it to: Provide the CounselorMax and ORS software applications with secure web-based hosting services which will enable NeighborWorks affiliate organizations, and other organizations, the ability to collect and report data to NeighborWorks as required for surveys, quarterly and annual reports, and other required online reporting requirements. Provide CounselorMax user organizations with the ability to collect the required data and produce the necessary reports to meet the National Foreclosure Mitigation Program reporting requirements. Provide CounselorMax user organizations with the ability to manage their HUD Housing Counseling Grant required data and services and to meet the HUD 9002 reporting requirements. Provide user organizations with the ability to collect extensive client and service data required to effectively manage their service delivery. Provide the CounselorMax application with a redundant failover site to be activated quickly in case of primary system outage (ORS does not require a failover site) in order to ensure uninterrupted access to critical CounselorMax service data. Provide user organizations with the ability to exchange data with other key management systems increasing efficiency and management capacity. Provide NeighborWorks America and NeighborWorks America authorized vendors with access to the CounselorMax and ORS application for data analysis and maintenance through an effective remote access technology such as remote desktop connection. These activities are part of NeighborWorks Americas ongoing management program and are focused on increasing the organization s efficiency and management capacity by providing secure and reliable online management and reporting tools. NeighborWorks America anticipates a contract award to an outside independent organization to provide high quality hosting services for these two applications. A firm fixed

2 price contract type is anticipated with a four (4) year period of performance (inclusive of a base year and 3 one year options). NeighborWorks America will issue the options unilaterally without further competition if the services are required and the contractor s performance has been acceptable. Background on NeighborWorks America NeighborWorks America is a national non-profit organization created by Congress in 1978 to provide financial support, technical assistance and training for community-based revitalization efforts. It is composed of three major parts: NeighborWorks America, the founder of the NeighborWorks network, provides support to and strengthens NeighborWorks organizations by providing training, technical assistance, funding and organizational assessments. NeighborWorks America was created by Congress in 1978 in order to revitalize older urban neighborhoods by mobilizing public, private, and community resources at the neighborhood level. Today, NeighborWorks America supports more than 240 organizations revitalizing their communities in rural and urban America. The NeighborWorks Network is a national network of more than 240 independent, community-based nonprofit organizations working to revitalize urban, suburban, and rural communities through the work of thousands of residents, business people, government officials and other partners. Several Related Capital Corporations work with NeighborWorks America to build partnerships, develop loan products, and support financing vehicles that expand affordable housing opportunities in communities served by local NeighborWorks organizations. Background on Division/Program Division Background Information Technology & Services (IT&S) is a division of NeighborWorks America which provides and supports the information technology environment that enables NeighborWorks America staff to effectively meet the goals of the corporation. In addition, IT&S provides tools and applications development for NeighborWorks Network Organizations and for the community development field. IT&S also provides information technology consulting and planning services to the corporation s business units to address the growing technology needs in support of the Corporation s strategic plan. IT&S is comprised of a Program Management Office, IT Operations, Enterprise Architecture, Business Applications, IT Security and Compliance and Database Engineering. Our staff is committed to providing quality products and timely support to assist our clients in meeting their business goals, while at the same time preserving the security and stability of our corporate network.

3 Program Background The business purpose of the CounselorMax application is to provide NeighborWorks Network users with housing counseling client tracking and reporting functionality. Currently there are approximately 900 subscriber organizations and 8,000 individual users. The business purpose of the ORS (Online Reporting System) application is to collect and validate NeighborWorks compliance data from NeighborWorks Organizations. It has an MS SQL DB component, a Windows IIS Web Server component and a Windows and IIS Server application component. The application is developed in a.net environment. Scope of Services NeighborWorks requires managed hosting services for two applications (CounseloMax and ORS). The contractor shall provide hosting services that will meet or exceed the following requirements as detailed below. The contractor shall provide the following features and functionality: 1. Hosted Environments A. Production Database (DB) Server Environment Dedicated Windows environment with SQL Server 2008, or later, capable of handling the current transaction volume and current storage requirements with sufficient room for growth based on the historical growth trajectory as detailed below. CounselorMax application database metrics: Current Database Size as of March 20, 2015 = 178 GB Growth rate: December 2014 = 170 GB (current) December 2013 = 115 GB August 2012 = 50 GB December 2011 = 30 GB December 2010 = 9 GB December 2009 = 4.3 GB Average daily data base transaction volume = 3.1 million transactions

4 ORS application database metrics: Current Database Size March 20, 2015 = 11.3 GB Growth rate: December 2014 = 12.0 GB December 2013 = 9.5 GB December 2012 = 8.1 GB December 2011 = 6.3 GB B. Production Environment Application and Web Server The contractor shall also provide Windows dedicated or virtualized environments with IIS capable of handling the current transaction volume. The application and Web servers shall contain sufficient room to grow on a planned and as-needed basis. Currently the production environment application server runs Microsoft terminal services for remote access by application support staff and development staff, as well as Microsoft Access for reporting purposes, and a Tomcat web server for processing Credit Reports. The proposed production Application and Web Server configuration should allow for the following transaction volume as well as having capacity for future growth. CounselorMax metrics: Average daily web hits January, 2015 = 637,000. Average daily bandwidth usage = 2 GB/day web traffic. ORS metrics: Average daily web hits = 46,000 hits/day Average daily bandwidth = 1.5 GB/day of web traffic C. Pre-Production Redundancy and Failover Environment: The contractor shall also provide a pre-production redundancy/failover environment. This environment is needed for business continuity in case of any disaster or other event rendering the primary production environment inoperable for more than 15 minutes. The CounselorMax application is considered mission critical for many user organizations. As such, we require redundancy in case of catastrophic failure of the primary production site. CounselorMax requires a failover system capable of going into production within 15 minutes of catastrophic loss of service at the primary site. This requirement includes a failover system capable of meeting all of the production environment requirements plus a viable routine replication method that will ensure little or no loss of data (maximum loss of data in the current environment is 15 minutes via log shipping). This environment does not have to be identical to the full

5 production environment but must have sufficient resources to ensure that the CounselorMax application is available to end-users and functional. In your proposal you must detail any expected performance limitation of the Pre-production Redundant Failover environment. D. Testing environment: The contractor shall also provide a testing. This environment may be a virtualized environment that replicates the production environment for internal testing and quality assurance work. This system should replicate the architecture of the production system but should not be open to general internet traffic. A secure remote desktop or other remote access technology for internal staff and authorized contractors is required. E. Development environment: The contractor shall also provide a development environment. This environment may be a virtualized environment that replicates the production environment for development work. This system should replicate the architecture of the production system, but should not be open to general internet traffic. A secure remote desktop or other remote access technology for internal staff and authorized contractors is required. NeighborWorks will want to load software and tools on this environment for development and source control purposes. Appendix B provides a diagram of the current CounselorMax hosted environment and configuration at a high-level. We are not necessarily seeking to replicate this environment, and in fact recognize that this environment should be upgraded and expanded with the new contract. It is presented for informational purposes to help you identify the minimum level of system requirements that are acceptable. 2. Other Hosing Services A. Managed Telecommunications The contractor shall provide managed, redundant internet connection for CounselorMax and ORS. The telecommunications technology should include redundant routers and firewall. B. Operating System Administration Operating system administration of the CounselorMax and ORS servers and assistance to the development team in troubleshooting application problems. This should include installation of operating system patches as called for by security best practice and as required to maintain compliance with FISMA requirements and our information security policy. Patches should be tested first on internal test and development servers before installing them to production. C. SQL Server DB administration The contractor shall provide administration of SQL Server databases, including status checks of SQL Servers, backup jobs, maintenance jobs, availability, performance and

6 error logs, and installation of patches, upgrades, troubleshooting, and performance tuning. D. Backups The contractor shall provide daily backups of the production QA and Development environments stored on disk for rapid restores. We seek weekly and monthly backups, written to encrypted tape storage and secured in an offsite vault for long-term storage. Virtual Machines may be replicated to the DR site daily or hourly. E. Availability and Performance Monitoring The contractor shall provide ongoing monitoring of the network, hardware, operating system, and SQL Server availability and performance counters. Automated alerts should be in place based on standard thresholds and custom monitors. F. Automated Log Analysis The contractor shall provide automated log analysis of the network, information security, and other infrastructure components, as well as operating systems, web server, and SQL server logs forwarded to a central, indexing log repository where automated analysis generates alerts and daily tickets for review by hosting provider staff. G. Network Security The contractor shall provide managed network security services including clustered enterprise firewall protection with intrusion prevention, firewall administration, intrusion detection and web proxying. H. Integration Requirements The CounselorMax application communicates via Web services with several other online systems. The proposal must address your services ability to securely provide Web services availability. I. Host-Based Security Services The contractor shall provide managed host-based security services with antivirus and host intrusion detection, including file integrity monitoring. J. Security and System Incident Response The contractor shall provide proactive incident response including initial diagnosis and notification to the NeighborWorks point of contact(s). K. Domain Name Server Hosting (DNS) The contractor shall provide DNS hosting for and report.nw.org (ORS). L. Secure Sockets Layer Certificates (SSL) The contractor shall provide SSL certificates for and report.nw.org (ORS). M. Routine Vulnerability Scans The contractor shall provide routine vulnerability scans of the CounselorMax and ORS environments, which are reviewed by hosting service information security engineers,

7 including follow-up notification of any newly discovered vulnerabilities by the automated scans. N. Reporting The contractor shall provide routine reports on system and environment metrics to include but not limited to the following: 1. Monthly bandwidth consumption per site: daily average, daily max, daily minimum. 2. Monthly average daily Web hits per site (counselormax.net and report.nw.org). 3. Monthly Top 10 Max bandwidth consumption by external IP address 4. Monthly average daily data base transactions 5. Monthly page hits by form 6. Monthly data base size and growth rate How to Submit a Proposal Proposals become the property of NeighborWorks America. Proprietary information that you wish to remain confidential should not be included in your response materials. Intent to Propose to the RFP shall be submitted electronically to: procurement@nw.org. The subject line shall include: Intent 15-NW-0016 (CounselorMax and ORS Management Hosting). Deadline for submission of Intent to Propose is no later than May 8, 2015, 5:00 PM ET Questions related to the RFP should be submitted electronically to: procurement@nw.org. The subject line shall include:questions 15-NW-0016 (CounselorMax and ORS Management Hosting). Deadline for submission of Questions is no later than April 29, 2015, 5:00 PM ET. Proposals shall be submitted electronically to: procurement@nw.org. The subject line shall include: Proposal 15-NW-0016 (CounselorMax and ORS Management Hosting). Deadline for submission of proposals is no later than May 15, 2015, 5:00 PM ET. Hard copy proposals will not be accepted. The proposal submission shall include a Technical and Price Proposal as well as past performance information. Each (Technical, Past Performance and Price Proposal) shall be submitted in seperate files. The Technical Proposal and Past performance files shall not include any cost information. I. Technical Proposal The technical proposal shall include the following sections and attachments labeled and itemized as below: A. Executive summary A high level statement summarizing scope and approach suitable for consumption by senior management. Any exceptions your firm takes to the scope of services must be addressed in this summary section and shall also include:

8 Official registered name (Corporate, D.B.A., Partnership, etc.), Dun & Bradstreet Number, Primary and secondary SIC numbers, address, main telephone number, tollfree numbers, and facsimile numbers. Key contact name, title, address (if different from above address), direct telephone and fax numbers. Person authorized to contractually bind the organization for any proposal against this RFP. Brief history, including year established and number of years your company has been offering this service. B. Technical Approach and Methodology to the RFP Scope of Services. This section shall include your firm s technical approach and methodology to meet or exceed the RFP s Scope of services. Include descriptions of how you plan on achieving the needed deliverables and meeting the stated requirements including a separate detailed breakdown of the proposed technology and configuration for each application (CounselorMax and ORS). Detailed discussion of migration process from current hosting environment, and implementation plan including time frame, resources required, testing plan and other relevant information. A time frame for the implementation of each environment will be helpful if the time-frame for each may vary. Detailed discussion of the proposed technology to be used for each requested environment including specifics on proposed hardware specification, software specifications, bandwidth allocation and metering scheme, etc. Methodology or approach to implement each of the relevant requirements found in the scope of services (e.g., backup methodology and practices, vulnerability scanning approach, replication procedure for Production to Pre-Production/Failover, Preproduction failover testing plan, etc). Relevant policy and practices information: technology upgrade cycles, staff certification requirements, etc. Details on security certifications and letters held by your organization (SSAE 16, PCI compliance, SOC 1, SOC 2, SOC 3, etc.). A transition plan at contract end, and the level of support provided when ending the services. This should include the level of support you will provide to safely transition or terminate the hosting services. C. Management and Staffing Plan The proposal shall include a Management and Staffing Plan that, at a minimum provides the names, position title, and resumes (no more than 2 pages for each resume) of key personnel to implement the contractor s proposed Technical Approach and Methodology. The resumes shall include all certifications the proposed employee has obtained. The plan shall also include your firm s bonding process and levels of coverage for employees.

9 II. Past Performance: The contractor shall provide three references and description of three completed projects for which you have performed work similar in scope, size, and complexity to the RFP Scope of services within the past three years. For each past-project/reference include: a. Company name b. Company address c. Contact name and telephone number/ d. Date of project e. Description of work performed At least one of the references should be a current or past client for whom you provided migration services from another environment, if available, in addition to set-up and implementation of standard hosting services. III. Price Proposal The price proposal shall be submitted in a separate file and must use the format found in Appendix A. Prices must be proposed for the base and each option year and shall include the following: - A separate document detailing any assumptions you made in developing your technical proposal (technical approach and methodology, deliverables, and Management and Staffing Plan). - Details/back up information (proposed labor categories, hourly rates, number of hours, licensing fees, unit costs, etc.) to substantiate how you arrived at the proposed price for the specified requirements found in Appendix A. - In order to submit a complete price proposal you must include the anticipated frequency of the cost for each line item (monthly, quarterly, annually, etc.). You should add lines to Appendix A to reflect additional costs required to provide the proposed services. Proposal Evaluation and Selection Process/Basis of Award NeighborWorks America reserves the right to determine which bidders have met the requirements of this RFP. In addition, NeighborWorks America may reject, in whole or in part, any and all proposals, waive minor irregularities in proposals, allow a bidder to correct minor irregularities and negotiate with all responsible efforts in any matter deemed necessary to serve the best interest of NeighborWorks America. NeighborWorks America reserves the right to reject any and all proposals when such rejection is in the interest of NeighborWorks America, to reject the proposal of a bidder who has not met the prerequisites of the bid proposal or who has previously failed to perform properly or complete on time contracts of a similar nature, and to reject the proposal of a bidder who is not, in the sole opinion of NeighborWorks America, able to perform the contract to the sole satisfaction of NeighborWorks America. NeighborWorks America also reserves the right to waive any informalities and technicalities in the bidding. NeighborWorks America reserves the right, however, to award the contract in accordance with its best interest, and will not be required to accept the lowest bid.

10 NeighborWorks America, may, at their discretion and without explanation to the prospective Vendors, at any time choose to discontinue this RFP without obligation to such prospective Vendors. NeighborWorks may, upon its discretion, establish a competitive range of qualified proposals for award consideration. NeighborWorks will not conduct discussions or negotiations with firms not within the competitive range and those firms will not be considered for award. The proposal will be evaluated on the following criteria: Technical Approach and Methodology: The proposal sets out a logical approach/technical methodology and demonstrates a strong technical capability and ability to meet and/or exceed the requirements of the RFP and scope of services. Management and Staffing Plan: The firm demonstrates the availability, credentials and related experience of key staff levels proposed to successfully execute the technical approach and methodology. Past Performance: The firm has recent (2 year) successful past performance that is relevant to the proposed project in terms of similar size, scope and complexity. Price (inclusive of base and option years) Summary of Key Dates Request for Proposal is posted 4/22/2015 All Questions must be received by 5:00 PM ET 4/29/2015 Questions and Answers posted to NeighborWorks.org 5/1/2015 Vendor submission of intent to propose must be received by 5:00PM ET 5/8/2015 Proposal Submission must be received by 5:00 PM ET 5/15/2015 Anticipated service start date (Estimated) 7/1/2015 Qualified bidders will be alerted to any schedule changes.

11 Security of NeighborWorks America (NW) Data within Third Party Environment 1. Security Measures. Third Party agrees to implement data security measures that are consistent with industry best practices and standards so that it: a) Protects the privacy, confidentiality, integrity and availability of NW data; b) Protects against accidental, unauthorized, unauthenticated or unlawful access, copying, use, processing disclosure, alteration, transfer, loss or destruction of NW data; c) Complies with all applicable federal and state laws, rules, regulations, directives and decisions that are relevant to the handling, processing, and use of NW data in accordance with this Agreement. 2. Risk Assessments. Third Party shall perform comprehensive internal and external risk assessments (at least annually and/or after major changes) and provide results to NW. a) Third Party agrees to send completed Third Party Information Gathering Questionnaire to NW for review after vendor intent to bid. b) Third Party agrees to provide NW with any information technology audit report as to provide an understanding of Third Party security controls and requirements in place currently. c) Upon request by NW, Third Party agrees to provide NW with the results of their most recent vulnerability scans conducted for review. d) Upon request by NW, Third Party agrees to allow NW to conduct an information security control review as it pertains to the scope of service outlined within the agreement. 3. Organizational Security Responsibility. Third Party shall assign responsibility for information security management to a senior management officer or a designated data steward to maintain the security of NW data. Third Party will provide their contact information to NW. Third Party agrees to provide NWA with evidence of destruction of NWA information upon end or termination of this agreement. 4. Third Party or Shared Hosting Service Provider. If Third Party uses any third party or shared hosting service provider, NWA requests to receive independent security assessment reports (e.g. ISO 2700x Certification and Report, SSAE 16 SOC Reports, Shared Assessment Program Agreed Upon Procedures Review, PCI DSS Report on Compliance, or IT Audit External) from those parties and\or hosting service providers. The third party must protect each entity s hosted environment and data. NWA reserves the right to move NWA data within its own data center at its discretion.

Request for Proposals

Request for Proposals Request for Proposals RFP Title: Recruiting & Applicant Tracking System Posting Date: 09/17/2014 Proposal submission deadline: 10/8/2014 Purpose of the RFP The NeighborWorks America Human Resources team

More information

Prepared by: OIC OF SOUTH FLORIDA. May 2013

Prepared by: OIC OF SOUTH FLORIDA. May 2013 OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should

More information

Introduction and Background

Introduction and Background Request for Bid Network Security Assessment March 28, 2016 Introduction and Background Purpose of the Request for Proposal The Library Network operates a wide area telecommunications network for 70 public

More information

UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034

UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034 UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034 REQUEST FOR PROPOSAL Information Technology Security Audit RFP#UCA-15-072 PROPOSALS MUST BE RECEIVED BEFORE:

More information

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services:

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services: TOWN OF NORTH HAVEN REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY NETWORK SUPPORT SERVICES Issue Date: March 7, 2016 Due Date: 10:00 AM, Monday, March 28, 2016 I. Introduction The Town of North Haven is

More information

REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES

REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Isothermal Planning & Development Commission (IPDC) REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the IPDC for Information Technology Support Services. Interested

More information

Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307

Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307 Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307 REQUEST FOR PROPOSAL Information Security Assessment/External Penetration Testing PROPOSALS MUST BE RECEIVED VIA EMAIL BEFORE:

More information

Office of Information Technology Hosted Services Service Level Agreement FY2009

Office of Information Technology Hosted Services Service Level Agreement FY2009 Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support

More information

Request for Proposal Managed IT Services 7 December 2009

Request for Proposal Managed IT Services 7 December 2009 Request for Proposal Managed IT Services 7 December 2009 BuzzBack, LLC 25 West 45 th Street Suite 202 New York, NY 10036 Table of Contents 1 Summary... 1 2 Proposal Guidelines and Requirements... 1 2.1

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due: REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES

REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES CITY OF RICHLAND HILLS, TEXAS REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the City of Richland Hills for Information Technology Support Services. Interested

More information

Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org

Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org IMPORTANT NOTICE All proposal question and inquiries must be sent by email to

More information

Collaborative Asset Management System (CAMS) Load Balancer Solution. Request for Proposal (RFP) Distributed by:

Collaborative Asset Management System (CAMS) Load Balancer Solution. Request for Proposal (RFP) Distributed by: Collaborative Asset Management System (CAMS) Load Balancer Solution Request for Proposal (RFP) Distributed by: Oakland County Information Technology 1200 N. Telegraph Road, Bldg. 49W Pontiac, MI 48341

More information

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008 Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the

More information

Data Classification Technical Assessment

Data Classification Technical Assessment Data Classification Update: February 13th, 2015 Statement of Confidentiality This Confidential Information is being provided to Customer ABC as a deliverable of this consulting engagement. The sole purpose

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Infrastructure Technical Support Services. Request for Proposal

Infrastructure Technical Support Services. Request for Proposal Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

Penobscot County IT Department Technology Modernization: Server and Storage Virtualization

Penobscot County IT Department Technology Modernization: Server and Storage Virtualization Penobscot County IT Department Technology Modernization: and Storage Virtualization RFP NO. 20150501IT 85 Hammond Street Bangor, ME. 04401 p. 207-561-6177 f. 207-561-6179 support@penobscot-county.net www.penobscot-county.net

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

REQUEST FOR PROPOSAL

REQUEST FOR PROPOSAL Tel 902.720.7812 Suite 200, Park Place II Toll Free 800.380.7775 238A Brownlow Avenue Fax 902.720.7873 Dartmouth, NS B3B 2B4 www.pvsc.ca REQUEST FOR PROPOSAL Procurement of Hosting Solution Components

More information

Vendor Audit Questionnaire

Vendor Audit Questionnaire Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be

More information

REQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES

REQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES REQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES Midvale City is inviting qualified vendors to submit a Proposal to recommend, provide and potentially install a Desktop Management

More information

NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES

NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES 1. Definitions. The definitions below shall apply to this Schedule. All capitalized terms not otherwise defined herein

More information

1 OPPORTUNITY SUMMARY

1 OPPORTUNITY SUMMARY REQUEST FOR PROPOSALS: MANAGED SERVICES FOR INFRASTRUCTURE AND IT SUPPORT SERVICES Posting Date: Thursday, January 7, 2016 Due Date: Friday, February 5, 2016 1 OPPORTUNITY SUMMARY The Massachusetts Clean

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Ancero Backup & Disaster Recovery (BDR) Service Guide

Ancero Backup & Disaster Recovery (BDR) Service Guide Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day 70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include

More information

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

Request for Proposals

Request for Proposals Request for Proposals Procurement of a Utility Billing System Issue date: September 14, 2015 Owner: City of Evans 1100 37 th Street Evans, CO 80634 Page 1 of 12 Table of Contents I. Introduction 3 II.

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

City of Richmond Business and Financial Services Department. Contract 4595P. Security Information Event Management System

City of Richmond Business and Financial Services Department. Contract 4595P. Security Information Event Management System Business and Financial Services Department Request for Proposal Security Information Event Management System 1. Introduction The City of Richmond (the City ) requires a Security Information and Event Management

More information

Network Support. Request for Proposals

Network Support. Request for Proposals Request for Proposals Network Support Worksystems is seeking one or more qualified and experienced organizations to provide back-up network support, develop system documentation, and develop a Disaster

More information

To follow are answers to questions submitted regarding the Request for Proposals (RFP) Packet distributed on Friday, March 6, 2015.

To follow are answers to questions submitted regarding the Request for Proposals (RFP) Packet distributed on Friday, March 6, 2015. Request for Proposals Website Services and Hosting for Drupal Sites Response to Questions To follow are answers to questions submitted regarding the Request for Proposals (RFP) Packet distributed on Friday,

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

Music Recording Studio Security Program Security Assessment Version 1.1

Music Recording Studio Security Program Security Assessment Version 1.1 Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility. FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

Ancero Network Attached Storage (NAS) Service Guide

Ancero Network Attached Storage (NAS) Service Guide Ancero Network Attached Storage (NAS) Service Guide Contents Service Overview... 3 Ancero Network Attached Storage... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard Introduction Purpose Audience Implications Sensitive Digital Data Management In an effort to protect credit card information from unauthorized access, disclosure

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING 4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the

More information

Request for Proposal: Catholic Charities of the Archdiocese of Miami, Inc. is accepting proposals until May 20th, 2016 for IT managed services.

Request for Proposal: Catholic Charities of the Archdiocese of Miami, Inc. is accepting proposals until May 20th, 2016 for IT managed services. Request for Proposal: Catholic Charities of the Archdiocese of Miami, Inc. is accepting proposals until May 20th, 2016 for IT managed services. Objective Catholic Charities of the Archdiocese of Miami,

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

ANNEX A.1 TECHNICAL SPECIFICATIONS. OPEN CALL FOR TENDERS No F-SE-12-T10 WEB APPLICATIONS HOSTING SERVICES

ANNEX A.1 TECHNICAL SPECIFICATIONS. OPEN CALL FOR TENDERS No F-SE-12-T10 WEB APPLICATIONS HOSTING SERVICES ANNEX A.1 TECHNICAL SPECIFICATIONS OPEN CALL FOR TENDERS No F-SE-12-T10 WEB APPLICATIONS HOSTING SERVICES Table of Contents 1 Technical specifications 4 1.1 Objectives 4 1.2 Definitions and Abbreviations

More information

Business process efficiency is improved with task management, alerts, notifications and automated process workflows.

Business process efficiency is improved with task management, alerts, notifications and automated process workflows. UNCLASSIFIED 23/02/2015 v3.3 Cobweb Hosted SharePoint 3.0 Service Description Cobweb Hosted SharePoint is a web-based document collaboration tool that helps you maximise productivity in a truly flexible,

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

REQUEST FOR PROPOSAL. #9-11-13 Storage Solution RFP

REQUEST FOR PROPOSAL. #9-11-13 Storage Solution RFP REQUEST FOR PROPOSAL #9-11-13 Storage Solution RFP Issue Date: September 11, 2013 Due Date: Friday, October 11, 2013, 4:00pm Anticipated Award Date: January 1, 2014 Issued by Jackson County Information

More information

ediscovery Implementation Services Statement of Work To be Executed under State Blanket Contract ITS53 Cat2B

ediscovery Implementation Services Statement of Work To be Executed under State Blanket Contract ITS53 Cat2B ediscovery Implementation Services Statement of Work To be Executed under State Blanket Contract ITS53 Cat2B Overview: The Massachusetts Water Resources Authority is looking for a vendor to provide business

More information

Enterprise Scheduler Rev. 0 Bid #24078582. Scope of Work

Enterprise Scheduler Rev. 0 Bid #24078582. Scope of Work Scope of Work I. Scope of Solicitation II. Instructions to Offerors III. Scope of Work / Specifications IV. Terms and Conditions - Special V. Appendices to Scope of Work (if required) VI. Bidding Schedule

More information