Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)"

Transcription

1 Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN 2. How much throughput must the IPS support long-term? Answer: 3 GB IPS 3. Are all interfaces for VPN / IPS connections expected to be copper 10/100/1000 Mbps? Answer: Gigabyte 4. Does the customer have existing switches that these devices (IPS, VPN, servers) will connect into, or do switches have to be provided? If so, what are the requirements for the switches? Answer: No, MHBE does not have switches. All ports must be Gigabit capable with uplink capacity. 5. The RFP required that the VPN support 4500 VPN users. Many VPN solutions are licensed by concurrent connected users, which is typically a smaller percentage of the maximum number of potential users. Should the VPN solution be quoted to license for 4500 users? Answer: No, the solution should be quoted for a minimum 500 concurrent users, expandable to 4500 users 6. Are redundant IDS/IPS required? Answer: Yes. Needs to be separate devices 7. Would it be possible to provide guidance on how many years of licensing / maintenance for all vendors to bid? For example, if multiple Offeror s pass technical review, an Offeror priced for one year will come in cheaper than an Offeror bidding three years, even though a multi-year discount may be a better solution for MHBE. Answer: MHBE is requiring 3-5 year license/maintenance from vendor warranty. In addition, MHBE is requiring only one year management, service, and maintenance from Offerors. 8. Will MHBE remediate the data center to accommodate all of the systems (appropriate cooling, rack space, power)? Are there any constraints? Answer: Yes MHBE has appropriate space, cooling and power 9. What are the rack requirements (open/closed, size, etc.)? Answer: Closed

2 10. What are the minimum requirements of the server besides 12TB of disk space? Are there specific CPU / RAM requirements? Offerors want to make sure that they provide ample capacity if future virtual machines are anticipated. Answer: CPU Quad core capable with minimum RAM 96 GB. HP servers are preferred. Integrated management NIC (i.e. ILO) 11. For a virtual solution, should the Offeror provide all virtualization licensing? Are there any specific requirements for the virtualization environment in terms of preferred vendor (VMware, Microsoft, RedHat, and Citrix), functionality, etc. Answer: Yes, VMware. Two physical virtual hosts are required with Vmotion capability. Vsphere should be installed and configured according RFP. 12. Are the two domain controllers to be on separate physical servers to start with? Or can they be virtualized on a single server to start and in the future have a purchase for a second server for the other location outside the scope of this bid? Answer: DC should be on 2 separate virtual hosts 13. What are the requirements for the backup solution, for ex, retention, backup/restore performance, deduplication, etc.? Answer: Backup solutions should allow portable media to be stored at an offsite location. Retention should be at least 3 years. 14. What platforms are required for anti-malware check - Windows only, or Mac, etc.? Answer: All platforms 15. There is a requirement for Network Access Control for VPN users. If the VPN appliances can support this functionality, is it adequate that the solution does not include a separate dedicated NAC system? Answer: NAC should be separate/dedicated 16. How many internal computers are on the network? Answer: Varies 17. The RFP states the need for a high availability VPN appliance. Does this include the backend hardware needed to support the RSA solution as well? Answer: Yes

3 18. The RFP also states that the offer shall provide endpoint virus protection and security for all OS based systems. Is this only required for items being added to the environment or items that are currently in place? Answer: Only items proposed in the RFP 19. Do you have a dedicated set of HW for VPN today? Answer: No 20. If so could you please provide the manufacturer? Answer: n/a 21. SW based VPN typically requires HW for termination at the head in. Do you have a manufacturer in mind or would you like us to make the best recommendation? Answer: Cisco 22. The Offeror shall provide installation of a two-factor token based VPN access solution for, at minimum, 4500 users. Question: Are we looking for a solution which is scalable to a higher user count in near future? VPN termination appliance can allow up to users. We can either procure a license to cater 4500 users and have a device capable to accommodate a higher number or have a device and license only considering 4500 users. Answer: No, we need 500 currently with expandability for users 23. The Offeror shall have the ability to install VPN Client software to serve MHBE and partners throughout the state of Maryland. Question: Will we be shipping the RSA physical token to all users? Answer: No, the Offeror will provide the token at the time of the installation of the client software at remote sites 24. Will end user be contacting us directly for support in case of issues with installation & provisioning? Answer: Yes, for the 1 st year of service 25. A solution that provides a high Availability VPN appliance cluster on the Maryland Statewide Government Intranet (SwGI) network for access to the HIX Application. The VPN solution will need to provide DNS, DHCP, and Network Time Protocol services to clients. MHBE will provide the VPN security setting policy for the VPN appliances. Question: Do we have DNS, DHCP and NTP server in the network already? If not, do we need to setup these servers as part of the solution offering?

4 Answer: No, we do not have the server in the network already. Yes, you must set up these severs. 26. Virtual technology should be used for servers and other hardware systems where applicable. Question: Do we have any existing virtual infrastructure which can be leveraged to deploy servers? Answer: No 27. NAC/NAS security appliances that provide a secure scan of VPN client computers. MHBE will provide the security policy of the NAC/NAS. Question: Will it be okay, if we provision secure scan on VPN appliance as a perpetual & onetime cost for all users. Or we need a NAC device to perform posture assessment to get end point details and perform secure scan. To perform secure scan using a NAC/NAS solution involves: 1. Recurring cost for license depending on user count 2. License available for minimum 3 yrs. (1yr not available) Answer: The Offeror will propose the best solution 28. From attachment 1: A solution that includes acquiring and registering any and all digital Certificates needed for this VPN solution and accompanying systems. Question: Are you looking forward for 3 rd party CA service for our PKI requirements or setup an enterprise PKI infrastructure for device certificates and user certificates? Answer: Third-party CAs are required 29. Upon notification of two or more simultaneous connections established by the same device certificate, the Certificate Authority Administrator must revoke the device certificate and provide an updated Certificate Revocation List (CRL) to the Security Administrator. The Security Administrator must immediately drop the session upon notification of two or more simultaneous connections established by the same device certificate. Question: As per the requirement, we are doing 2 factor authentication using domain password and RSA token. Are we intending to use certificates also? Answer: Yes, third-party CAs are required 30. Any escalation of user privileges must be logged on a continuous basis. Please elaborate more on this requirement. Answer: The system must be able to log user actions 31. A backup solution for server and system data that will provide the ability for offsite storage data. Question: Are we including the 12 TB file log server for back up as well? Answer: A file server is not to be included as part of the backup solution

5 32. Endpoint virus protection and security for all OS based systems. Question: Do we need to provision anti-virus/malware solution on all user endpoints? Answer: No, EVP must be installed on systems included in the RFP 33. An Intrusion Detection System/Protection System solution. This must be a unique hardware device. Question: Please elaborate on unique hardware device. Are we looking for a standalone device or hardware/software module on VPN appliance is acceptable? Answer: Standalone Device 34. What is the actual due date of this RFP? Section 1.12 says the 17 th and section 2.1 says the 21 st. Answer: January 17 th is the due date 35. What is your current firewall appliance? Answer: None 36. What level of support are you requesting for the warranty? How long should the warranty be? Answer: MHBE is requiring 3-5 year license/maintenance from vendor warranty. In addition, MHBE is requiring only one year management, service, and maintenance from Offerors. 37. Are you looking for a redundant, high-available solution? Active/Active or Active/Standby? Answer: Based on vendor options and proposition from Offerors 38. How many tokens are needed for the RSA solution? Answer: Approximately How many concurrent VPN sessions are you expecting? Answer: Approximately What is your internet throughput? Answer: 100 MB Circuit 41. Time between receiving the answers to questions so you can complete the proposal is extremely short. Would like to request moving the date to the 20th. This would allow a weekend for packaging and final review. Answer: N/A

6 42. Are two Domain controllers part of the solution? Answer: Yes. 43. Page 17: What format is the user data being provided that is to be used for auto import. Answer: Based on format supported by Vendor. 44. Page 17: The requirement is for RSA style tooks. Please eliberate on the use of digital Certificates. Answer: See question 29 above. 45. Does the solution have to map to the products listed in the "Guidance for Secure Remote Access" document? Answer: Yes 46. You require three client references for staff who are currently licensed to install the proposed solution. Will you allow a company with a successfully history of VPN deployments to use those references? Will you allow vendor references of successful deployments? Answer: Yes 47. You require three client references for staff who are currently licensed to install the proposed solution. Does license mean the same as certified? Answer: Yes, Licensed means the same as Certified. 48. What is the size of the Internet connection to your ISP? Answer: 100 MB 49. What is the total number of concurrent VPN connections do want the solution to support? Answer: 500 users, expandable to 5000 users. 50. Are you open to SSL and IPSEC based VPN solutions? Answer: IPSEC is the preferred method 51. Is a FIPS certified client really required since the algorithms in FIPS are not the latest? Answer: Yes - FIPS140-2 is the requirement

7 52. Endpoint virus protection and security for all OS based systems. Are you asking for an A/V solution and also want a posture assessment performed by the VPN client? Answer: refer to question # 19. Answer: The proposals are due on January 17th 53. A Light Weight Directory Access Protocol (LDAP) directory for user authentication. (This will be the first of the Microsoft active directory domain for MHBE). MHBE needs at least two domain controllers, both of which will need to be located at 750 E. Pratt Street, with one of the Domain Controllers must be designed to be relocated to a separate facility in the future. Could you please provide a bit of clarity around this requirement, are we to include an AD environment? Answer: Possibly- An AD environment is one example of a LDAP environment. The RFP is requesting two Domain Controllers to meet the redundancy requirements. Each Domain Controller shall be a virtual server and reside on separate physical hosts. 54. {See page 18} Are bids due on the 17 th, or the 21 st? These two dates are in the document. Which of the above is correct? Answer: The proposals are due on January 17 th 55. Please Note Proposal Submission Requirements: Proposals may only be submitted in person or via postal/delivery service. Proposals may not be submitted by emm, or facsimile.

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

FINANCIAL SERVICES BOARD

FINANCIAL SERVICES BOARD PROVISIONING OF AN ICT SERVICE MANAGEMENT SOLUTION The following questions were received by the Financial Services Board on bid FSB2013/011 and are answered accordingly: QUESTION 1 The bid response format

More information

ERP Infrastructure Guide APPENDIX B

ERP Infrastructure Guide APPENDIX B ERP Infrastructure Guide APPENDIX B for State of Georgia State Road and Tollway Authority 47 Trinity Avenue, SW Atlanta, GA 30334 June 2013 Updated by: Updated on: Description of Update: Revision # DRY

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008 Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the

More information

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the

More information

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved. Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and

More information

Chabot Las Positas Community College District

Chabot Las Positas Community College District Chabot Las Positas Community College District Information Technology Services Disaster Recovery Plan Supplement to August 1, 2014 Plan (General Version) Note: Selected charts and tables are blanked out

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

ADDENDUM NO. 03 August 22, 2014

ADDENDUM NO. 03 August 22, 2014 ADDENDUM NO. 03 August 22, 2014 The following changes, additions, deletions or corrections shall become a part of the Contract Documents dated, July 22, 2014 for the RFP named below and all other conditions

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

Critical Considerations in Choosing a Network Firewall. Version 5.4.3 July 2014

Critical Considerations in Choosing a Network Firewall. Version 5.4.3 July 2014 Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No

More information

Hardware/Software Guidelines

Hardware/Software Guidelines There are many things to consider when preparing for a TRAVERSE v11 installation. The number of users, application modules and transactional volume are only a few. Reliable performance of the system is

More information

Junos Pulse Supported Platforms

Junos Pulse Supported Platforms Supported Platforms Guide Junos Pulse Supported Platforms Release 2.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Sep 25, 2011

More information

Who s Endian? www.cloudrouter.dk

Who s Endian? www.cloudrouter.dk Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held

More information

Hardware and Software Requirements for Server Applications

Hardware and Software Requirements for Server Applications Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Networks Holding Corporation All Rights Reserved. Rev 9/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Course VM-03 5 Days Instructor-led, Hands-on Course Description This is a 5-day intense introduction to virtualization using VMware s

More information

36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate

36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate 1 RFP 14-001 Addendum 1. What version of AD - Forest Functional, Domain Functional, DC OS Version(s) - is currently deployed? Domain functional level Windows Server2008 Forest functional level Windows

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429

JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 ADDENDUM #1 September 21, 2015 REQUEST FOR PROPOSALS #16-033 FOR CLOUD BASED BACKUP & RECOVERY

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

State of Wisconsin. Virtual Private Network (VPN) Service Offering Definition (SOD)

State of Wisconsin. Virtual Private Network (VPN) Service Offering Definition (SOD) State of Wisconsin Virtual Private Network (VPN) Service Offering Definition (SOD) Document Revision History Date Version Creator Notes 9/15/11 1.5 Amy Dustin Annual review minor edits Table of Contents

More information

Cisco Identity Services Engine

Cisco Identity Services Engine Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

More information

DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6)

DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6) Infrastructure as a DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6) All customer data is located entirely in the contiguous United States. When required the data will be located

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on

More information

Addendum 03. This is the Final Extension in response and due to the above received request:

Addendum 03. This is the Final Extension in response and due to the above received request: RFP 13-44 Questions 05-29-2013: Can the due date be extended 1 week? There is very little time between posting of answers and the proposal due date. We want to be sure we have sufficient time to prepare

More information

Customer Service Description Next Generation Network Firewall

Customer Service Description Next Generation Network Firewall Customer Service Description Next Generation Network Firewall Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Interoute Communications Limited

More information

Department of Information Technology

Department of Information Technology S.No. Page no & clause 1. Technical 2. Technical Existing RFP Clause Vendor Queries Bank Reply Appliance should have minimum of 16 GB RAM or more expandable up to 64GB. Firewall should have dual power

More information

Response to Questions CML 15-018 Managed Information Security

Response to Questions CML 15-018 Managed Information Security Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation Following are the questions submitted on or before September 18, 2015, in accordance with RFP specifications. All questions are published verbatim as received, without regard to errors in spelling, punctuation,

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array

System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array System Requirements The system requirements are shown below for each type of installation, software, and peripherals. Should you have questions about the system requirements or replacement peripherals

More information

Hosting Solutions Made Simple. Managed Services - Overview and Pricing

Hosting Solutions Made Simple. Managed Services - Overview and Pricing Hosting Solutions Made Simple Managed Services - Overview and Pricing NETRACKservers Internet Security Package: NETRACKservers's Internet Security Package is an ideal security service for business that

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

Virtual Private Servers

Virtual Private Servers Virtual Private Servers Application Form Guide Internode Pty Ltd ACN: 052 008 581 150 Grenfell St Adelaide SA 5000 PH: (08) 8228 2999 FAX: (08) 8235 6999 www.internode.on.net Internode VPS Application

More information

Upgrade to Webtrends Analytics 8.7: Best Practices

Upgrade to Webtrends Analytics 8.7: Best Practices Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

HP E-PCM Plus Network Management Software Series

HP E-PCM Plus Network Management Software Series Data sheet Product overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security

More information

NetScaler VPX FAQ. Table of Contents

NetScaler VPX FAQ. Table of Contents NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

Sophos Certified Architect Course overview

Sophos Certified Architect Course overview Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting

More information

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2 RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

Virtual Desktop Infrastructure for IGIDR

Virtual Desktop Infrastructure for IGIDR Virtual Desktop Infrastructure for IGIDR Sealed quotations are invited from authorized partners of OEM providing VDI solutions. The sealed quotations should be supplied in two parts Technical Bid (Part

More information

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest. Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought

More information

City of Montpelier Requests for Proposal. Purchase of Onsite and Remote File / Data Backup Devices

City of Montpelier Requests for Proposal. Purchase of Onsite and Remote File / Data Backup Devices City of Montpelier Requests for Proposal Purchase of Onsite and Remote File / Data Backup Devices Issued by the City of Montpelier, Vermont Finance Department September 26, 2011 Purpose This document provides

More information

QHR Accuro EMR IT Hardware Requirements

QHR Accuro EMR IT Hardware Requirements QHR Accuro EMR IT Hardware Requirements Hardware Requirements for Accuro EMR Table of Contents Local Install Platform:... 3 Server Requirements:... 3 Workstation Requirements:... 4 Peripheral Requirements:...

More information

enicq 5 Technical FAQ

enicq 5 Technical FAQ enicq 5 Technical FAQ Classification Q: What is the purpose of the enicq 5 application? A: The enicq 5 application is a Windows-based application provided by Vermont Oxford Network ( VON ) to its members

More information

Mobile Admin Deployment Guide

Mobile Admin Deployment Guide Hardware Selection Mobile Admin Deployment Guide This document is provided to help you best deploy Mobile Admin within your network infrastructure. The diagram below represents a possible deployment of

More information

Getting Started with HC Exchange Module

Getting Started with HC Exchange Module Getting Started with HC Exchange Module HOSTING CONTROLLER WWW.HOSTINGCONROLLER.COM HOSTING CONTROLLER Contents Introduction...1 Minimum System Requirements for Exchange 2013...1 Hardware Requirements...1

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

Hosting topology SMS PASSCODE 2015

Hosting topology SMS PASSCODE 2015 Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: info@avendasys.com email: sales@avendasys.com Avenda

More information

Hardware and Software Requirements for Server Applications

Hardware and Software Requirements for Server Applications Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Enterprise Solutions, Inc. All Rights Reserved. Rev 7/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum Hardware

More information

Building Your Complete Remote Access Infrastructure on Windows Server 2012

Building Your Complete Remote Access Infrastructure on Windows Server 2012 Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

Cisco Expressway Series

Cisco Expressway Series Data Sheet Cisco Expressway Series Advanced Collaboration Gateways for Simple and Secure Unified Communications Product Overview Cisco Expressway Series gateways for Cisco Unified Communications Manager

More information

StruxureWare TM Data Center Expert

StruxureWare TM Data Center Expert StruxureWare TM Data Center Expert Infrastructure management from rack to row to room to building Deploy in minutes, manage from anywhere, analyze instantly, integrate with other management systems. End

More information

System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array

System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array System Requirements The system requirements are shown below for each type of installation, software, and peripherals. Should you have questions about the system requirements or replacement peripherals

More information

alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management

alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management streamline management and cut administrative costs with the alcatel-lucent VitalQIP

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010

More information

VMware Cost-Per-Application Calculator Results Report

VMware Cost-Per-Application Calculator Results Report 1 / 12 VMware -Per-Application Calculator Results Report The VMware -Per-Application Calculator compares the cost of virtualizing applications on VMware vsphere 4 versus other commodity virtualization

More information

Oregon Enterprise Technology Services Architecture Request for Proposals (RFP) Guidelines

Oregon Enterprise Technology Services Architecture Request for Proposals (RFP) Guidelines Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Service Descriptions

Service Descriptions Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application

More information

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation

More information

F5 BIG-IP V9 Local Traffic Management EE0-511. Demo Version. ITCertKeys.com

F5 BIG-IP V9 Local Traffic Management EE0-511. Demo Version. ITCertKeys.com F5 BIG-IP V9 Local Traffic Management EE0-511 Demo Version Question 1. Which three methods can be used for initial access to a BIG-IP system? (Choose three.) A. Serial console access B. SHH access to the

More information

DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index

DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index Infrastructure as a Service DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index All customer data is located entirely in the contiguous United States. When required the data will be located in a

More information

IOmark- VDI. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Report Date: 27, April 2015. www.iomark.

IOmark- VDI. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Report Date: 27, April 2015. www.iomark. IOmark- VDI HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Copyright 2010-2014 Evaluator Group, Inc. All rights reserved. IOmark- VDI, IOmark- VM, VDI- IOmark, and IOmark

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

FortiClient EMS - Release Notes VERSION 1.0.0

FortiClient EMS - Release Notes VERSION 1.0.0 FortiClient EMS - Release Notes VERSION 1.0.0 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

RESPONSES TO QUESTIONS AND REQUESTS FOR CLARIFICATION Updated 7/1/15 (Question 53 and 54)

RESPONSES TO QUESTIONS AND REQUESTS FOR CLARIFICATION Updated 7/1/15 (Question 53 and 54) RESPONSES TO QUESTIONS AND REQUESTS FOR CLARIFICATION Updated 7/1/15 (Question 53 and 54) COLORADO HOUSING AND FINANCE AUTHORITY 1981 BLAKE STREET DENVER, CO 80202 REQUEST FOR PROPOSAL Intranet Replacement

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information