Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Size: px
Start display at page:

Download "Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)"

Transcription

1 Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN 2. How much throughput must the IPS support long-term? Answer: 3 GB IPS 3. Are all interfaces for VPN / IPS connections expected to be copper 10/100/1000 Mbps? Answer: Gigabyte 4. Does the customer have existing switches that these devices (IPS, VPN, servers) will connect into, or do switches have to be provided? If so, what are the requirements for the switches? Answer: No, MHBE does not have switches. All ports must be Gigabit capable with uplink capacity. 5. The RFP required that the VPN support 4500 VPN users. Many VPN solutions are licensed by concurrent connected users, which is typically a smaller percentage of the maximum number of potential users. Should the VPN solution be quoted to license for 4500 users? Answer: No, the solution should be quoted for a minimum 500 concurrent users, expandable to 4500 users 6. Are redundant IDS/IPS required? Answer: Yes. Needs to be separate devices 7. Would it be possible to provide guidance on how many years of licensing / maintenance for all vendors to bid? For example, if multiple Offeror s pass technical review, an Offeror priced for one year will come in cheaper than an Offeror bidding three years, even though a multi-year discount may be a better solution for MHBE. Answer: MHBE is requiring 3-5 year license/maintenance from vendor warranty. In addition, MHBE is requiring only one year management, service, and maintenance from Offerors. 8. Will MHBE remediate the data center to accommodate all of the systems (appropriate cooling, rack space, power)? Are there any constraints? Answer: Yes MHBE has appropriate space, cooling and power 9. What are the rack requirements (open/closed, size, etc.)? Answer: Closed

2 10. What are the minimum requirements of the server besides 12TB of disk space? Are there specific CPU / RAM requirements? Offerors want to make sure that they provide ample capacity if future virtual machines are anticipated. Answer: CPU Quad core capable with minimum RAM 96 GB. HP servers are preferred. Integrated management NIC (i.e. ILO) 11. For a virtual solution, should the Offeror provide all virtualization licensing? Are there any specific requirements for the virtualization environment in terms of preferred vendor (VMware, Microsoft, RedHat, and Citrix), functionality, etc. Answer: Yes, VMware. Two physical virtual hosts are required with Vmotion capability. Vsphere should be installed and configured according RFP. 12. Are the two domain controllers to be on separate physical servers to start with? Or can they be virtualized on a single server to start and in the future have a purchase for a second server for the other location outside the scope of this bid? Answer: DC should be on 2 separate virtual hosts 13. What are the requirements for the backup solution, for ex, retention, backup/restore performance, deduplication, etc.? Answer: Backup solutions should allow portable media to be stored at an offsite location. Retention should be at least 3 years. 14. What platforms are required for anti-malware check - Windows only, or Mac, etc.? Answer: All platforms 15. There is a requirement for Network Access Control for VPN users. If the VPN appliances can support this functionality, is it adequate that the solution does not include a separate dedicated NAC system? Answer: NAC should be separate/dedicated 16. How many internal computers are on the network? Answer: Varies 17. The RFP states the need for a high availability VPN appliance. Does this include the backend hardware needed to support the RSA solution as well? Answer: Yes

3 18. The RFP also states that the offer shall provide endpoint virus protection and security for all OS based systems. Is this only required for items being added to the environment or items that are currently in place? Answer: Only items proposed in the RFP 19. Do you have a dedicated set of HW for VPN today? Answer: No 20. If so could you please provide the manufacturer? Answer: n/a 21. SW based VPN typically requires HW for termination at the head in. Do you have a manufacturer in mind or would you like us to make the best recommendation? Answer: Cisco 22. The Offeror shall provide installation of a two-factor token based VPN access solution for, at minimum, 4500 users. Question: Are we looking for a solution which is scalable to a higher user count in near future? VPN termination appliance can allow up to users. We can either procure a license to cater 4500 users and have a device capable to accommodate a higher number or have a device and license only considering 4500 users. Answer: No, we need 500 currently with expandability for users 23. The Offeror shall have the ability to install VPN Client software to serve MHBE and partners throughout the state of Maryland. Question: Will we be shipping the RSA physical token to all users? Answer: No, the Offeror will provide the token at the time of the installation of the client software at remote sites 24. Will end user be contacting us directly for support in case of issues with installation & provisioning? Answer: Yes, for the 1 st year of service 25. A solution that provides a high Availability VPN appliance cluster on the Maryland Statewide Government Intranet (SwGI) network for access to the HIX Application. The VPN solution will need to provide DNS, DHCP, and Network Time Protocol services to clients. MHBE will provide the VPN security setting policy for the VPN appliances. Question: Do we have DNS, DHCP and NTP server in the network already? If not, do we need to setup these servers as part of the solution offering?

4 Answer: No, we do not have the server in the network already. Yes, you must set up these severs. 26. Virtual technology should be used for servers and other hardware systems where applicable. Question: Do we have any existing virtual infrastructure which can be leveraged to deploy servers? Answer: No 27. NAC/NAS security appliances that provide a secure scan of VPN client computers. MHBE will provide the security policy of the NAC/NAS. Question: Will it be okay, if we provision secure scan on VPN appliance as a perpetual & onetime cost for all users. Or we need a NAC device to perform posture assessment to get end point details and perform secure scan. To perform secure scan using a NAC/NAS solution involves: 1. Recurring cost for license depending on user count 2. License available for minimum 3 yrs. (1yr not available) Answer: The Offeror will propose the best solution 28. From attachment 1: A solution that includes acquiring and registering any and all digital Certificates needed for this VPN solution and accompanying systems. Question: Are you looking forward for 3 rd party CA service for our PKI requirements or setup an enterprise PKI infrastructure for device certificates and user certificates? Answer: Third-party CAs are required 29. Upon notification of two or more simultaneous connections established by the same device certificate, the Certificate Authority Administrator must revoke the device certificate and provide an updated Certificate Revocation List (CRL) to the Security Administrator. The Security Administrator must immediately drop the session upon notification of two or more simultaneous connections established by the same device certificate. Question: As per the requirement, we are doing 2 factor authentication using domain password and RSA token. Are we intending to use certificates also? Answer: Yes, third-party CAs are required 30. Any escalation of user privileges must be logged on a continuous basis. Please elaborate more on this requirement. Answer: The system must be able to log user actions 31. A backup solution for server and system data that will provide the ability for offsite storage data. Question: Are we including the 12 TB file log server for back up as well? Answer: A file server is not to be included as part of the backup solution

5 32. Endpoint virus protection and security for all OS based systems. Question: Do we need to provision anti-virus/malware solution on all user endpoints? Answer: No, EVP must be installed on systems included in the RFP 33. An Intrusion Detection System/Protection System solution. This must be a unique hardware device. Question: Please elaborate on unique hardware device. Are we looking for a standalone device or hardware/software module on VPN appliance is acceptable? Answer: Standalone Device 34. What is the actual due date of this RFP? Section 1.12 says the 17 th and section 2.1 says the 21 st. Answer: January 17 th is the due date 35. What is your current firewall appliance? Answer: None 36. What level of support are you requesting for the warranty? How long should the warranty be? Answer: MHBE is requiring 3-5 year license/maintenance from vendor warranty. In addition, MHBE is requiring only one year management, service, and maintenance from Offerors. 37. Are you looking for a redundant, high-available solution? Active/Active or Active/Standby? Answer: Based on vendor options and proposition from Offerors 38. How many tokens are needed for the RSA solution? Answer: Approximately How many concurrent VPN sessions are you expecting? Answer: Approximately What is your internet throughput? Answer: 100 MB Circuit 41. Time between receiving the answers to questions so you can complete the proposal is extremely short. Would like to request moving the date to the 20th. This would allow a weekend for packaging and final review. Answer: N/A

6 42. Are two Domain controllers part of the solution? Answer: Yes. 43. Page 17: What format is the user data being provided that is to be used for auto import. Answer: Based on format supported by Vendor. 44. Page 17: The requirement is for RSA style tooks. Please eliberate on the use of digital Certificates. Answer: See question 29 above. 45. Does the solution have to map to the products listed in the "Guidance for Secure Remote Access" document? Answer: Yes 46. You require three client references for staff who are currently licensed to install the proposed solution. Will you allow a company with a successfully history of VPN deployments to use those references? Will you allow vendor references of successful deployments? Answer: Yes 47. You require three client references for staff who are currently licensed to install the proposed solution. Does license mean the same as certified? Answer: Yes, Licensed means the same as Certified. 48. What is the size of the Internet connection to your ISP? Answer: 100 MB 49. What is the total number of concurrent VPN connections do want the solution to support? Answer: 500 users, expandable to 5000 users. 50. Are you open to SSL and IPSEC based VPN solutions? Answer: IPSEC is the preferred method 51. Is a FIPS certified client really required since the algorithms in FIPS are not the latest? Answer: Yes - FIPS140-2 is the requirement

7 52. Endpoint virus protection and security for all OS based systems. Are you asking for an A/V solution and also want a posture assessment performed by the VPN client? Answer: refer to question # 19. Answer: The proposals are due on January 17th 53. A Light Weight Directory Access Protocol (LDAP) directory for user authentication. (This will be the first of the Microsoft active directory domain for MHBE). MHBE needs at least two domain controllers, both of which will need to be located at 750 E. Pratt Street, with one of the Domain Controllers must be designed to be relocated to a separate facility in the future. Could you please provide a bit of clarity around this requirement, are we to include an AD environment? Answer: Possibly- An AD environment is one example of a LDAP environment. The RFP is requesting two Domain Controllers to meet the redundancy requirements. Each Domain Controller shall be a virtual server and reside on separate physical hosts. 54. {See page 18} Are bids due on the 17 th, or the 21 st? These two dates are in the document. Which of the above is correct? Answer: The proposals are due on January 17 th 55. Please Note Proposal Submission Requirements: Proposals may only be submitted in person or via postal/delivery service. Proposals may not be submitted by emm, or facsimile.

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008 Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the

More information

FINANCIAL SERVICES BOARD

FINANCIAL SERVICES BOARD PROVISIONING OF AN ICT SERVICE MANAGEMENT SOLUTION The following questions were received by the Financial Services Board on bid FSB2013/011 and are answered accordingly: QUESTION 1 The bid response format

More information

ERP Infrastructure Guide APPENDIX B

ERP Infrastructure Guide APPENDIX B ERP Infrastructure Guide APPENDIX B for State of Georgia State Road and Tollway Authority 47 Trinity Avenue, SW Atlanta, GA 30334 June 2013 Updated by: Updated on: Description of Update: Revision # DRY

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

Chabot Las Positas Community College District

Chabot Las Positas Community College District Chabot Las Positas Community College District Information Technology Services Disaster Recovery Plan Supplement to August 1, 2014 Plan (General Version) Note: Selected charts and tables are blanked out

More information

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved. Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429

JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 ADDENDUM #1 September 21, 2015 REQUEST FOR PROPOSALS #16-033 FOR CLOUD BASED BACKUP & RECOVERY

More information

ADDENDUM NO. 03 August 22, 2014

ADDENDUM NO. 03 August 22, 2014 ADDENDUM NO. 03 August 22, 2014 The following changes, additions, deletions or corrections shall become a part of the Contract Documents dated, July 22, 2014 for the RFP named below and all other conditions

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

enicq 5 Technical FAQ

enicq 5 Technical FAQ enicq 5 Technical FAQ Classification Q: What is the purpose of the enicq 5 application? A: The enicq 5 application is a Windows-based application provided by Vermont Oxford Network ( VON ) to its members

More information

Cisco Identity Services Engine

Cisco Identity Services Engine Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

How To Choose A Network Firewall

How To Choose A Network Firewall Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No

More information

36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate

36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate 1 RFP 14-001 Addendum 1. What version of AD - Forest Functional, Domain Functional, DC OS Version(s) - is currently deployed? Domain functional level Windows Server2008 Forest functional level Windows

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held

More information

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

State of Wisconsin. Virtual Private Network (VPN) Service Offering Definition (SOD)

State of Wisconsin. Virtual Private Network (VPN) Service Offering Definition (SOD) State of Wisconsin Virtual Private Network (VPN) Service Offering Definition (SOD) Document Revision History Date Version Creator Notes 9/15/11 1.5 Amy Dustin Annual review minor edits Table of Contents

More information

Addendum 03. This is the Final Extension in response and due to the above received request:

Addendum 03. This is the Final Extension in response and due to the above received request: RFP 13-44 Questions 05-29-2013: Can the due date be extended 1 week? There is very little time between posting of answers and the proposal due date. We want to be sure we have sufficient time to prepare

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

Who s Endian? www.cloudrouter.dk

Who s Endian? www.cloudrouter.dk Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated

More information

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the

More information

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010

More information

Hardware/Software Guidelines

Hardware/Software Guidelines There are many things to consider when preparing for a TRAVERSE v11 installation. The number of users, application modules and transactional volume are only a few. Reliable performance of the system is

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Hardware and Software Requirements for Server Applications

Hardware and Software Requirements for Server Applications Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Networks Holding Corporation All Rights Reserved. Rev 9/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum

More information

Hosting Solutions Made Simple. Managed Services - Overview and Pricing

Hosting Solutions Made Simple. Managed Services - Overview and Pricing Hosting Solutions Made Simple Managed Services - Overview and Pricing NETRACKservers Internet Security Package: NETRACKservers's Internet Security Package is an ideal security service for business that

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation Following are the questions submitted on or before September 18, 2015, in accordance with RFP specifications. All questions are published verbatim as received, without regard to errors in spelling, punctuation,

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Request for Proposal Infrastructure Hosting

Request for Proposal Infrastructure Hosting Request for Proposal Infrastructure Hosting June 10, 2013 Revision Date: 6/19/2013 Table of Contents Executive Summary and Company Background... 4 Summary Overview of Request for Proposal (RFP) and Services

More information

Getting Started with HC Exchange Module

Getting Started with HC Exchange Module Getting Started with HC Exchange Module HOSTING CONTROLLER WWW.HOSTINGCONROLLER.COM HOSTING CONTROLLER Contents Introduction...1 Minimum System Requirements for Exchange 2013...1 Hardware Requirements...1

More information

Upgrade to Webtrends Analytics 8.7: Best Practices

Upgrade to Webtrends Analytics 8.7: Best Practices Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

Bosch Video Management System High Availability with Hyper-V

Bosch Video Management System High Availability with Hyper-V Bosch Video Management System High Availability with Hyper-V en Technical Service Note Bosch Video Management System Table of contents en 3 Table of contents 1 Introduction 4 1.1 General Requirements

More information

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2 RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Virtual Private Servers

Virtual Private Servers Virtual Private Servers Application Form Guide Internode Pty Ltd ACN: 052 008 581 150 Grenfell St Adelaide SA 5000 PH: (08) 8228 2999 FAX: (08) 8235 6999 www.internode.on.net Internode VPS Application

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...

More information

System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array

System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array System Requirements The system requirements are shown below for each type of installation, software, and peripherals. Should you have questions about the system requirements or replacement peripherals

More information

NetScaler VPX FAQ. Table of Contents

NetScaler VPX FAQ. Table of Contents NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5

More information

HP JETADVANTAGE SECURITY MANAGER

HP JETADVANTAGE SECURITY MANAGER HP JETADVANTAGE SECURITY MANAGER Release Notes v2.1.4 CONTENTS Overview... 2 Version Information... 2 What s New in Security Manager 2.1.4?... 5 Key Features... 6 Solutions... 6 Supported Operating Systems

More information

Cisco Secure Control Access System 5.8

Cisco Secure Control Access System 5.8 Data Sheet Cisco Secure Control Access System 5.8 Cisco Secure Access Control System ties together an enterprise s network access policy and identity strategy. It is the world s most trusted policy-based

More information

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest. Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought

More information

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Mobile Admin Deployment Guide

Mobile Admin Deployment Guide Hardware Selection Mobile Admin Deployment Guide This document is provided to help you best deploy Mobile Admin within your network infrastructure. The diagram below represents a possible deployment of

More information

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay

More information

Service Descriptions

Service Descriptions Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application

More information

VMware Workspace Portal Reference Architecture

VMware Workspace Portal Reference Architecture VMware Workspace Portal 2.1 TECHNICAL WHITE PAPER Table of Contents Executive Summary.... 3 Overview.... 4 Hardware Components.... 5 VMware vsphere.... 5 VMware Workspace Portal 2.1.... 5 VMware Horizon

More information

Junos Pulse Supported Platforms

Junos Pulse Supported Platforms Supported Platforms Guide Junos Pulse Supported Platforms Release 2.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Sep 25, 2011

More information

KEMP Exchange Overview

KEMP Exchange Overview KEMP Exchange Overview Tim Quinn Director of Strategic Partnerships TQuinn@kemptechnologies.com Jim Schneider Pre-Sales Engineer JSchneider@kemptechnologies.com Maryann McIntosh Northeast Territory Account

More information

HP E-PCM Plus Network Management Software Series

HP E-PCM Plus Network Management Software Series Data sheet Product overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security

More information

DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6)

DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6) Infrastructure as a DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6) All customer data is located entirely in the contiguous United States. When required the data will be located

More information

Information Technology Division Technology Operations & Systems Management

Information Technology Division Technology Operations & Systems Management Over the past decade, Texas Tech University has made great strides in protecting the critical information resources of its colleges, institutions and departments. (TOSM) has a 4000 sq/ft data center that

More information

Next Generation Network Firewall

Next Generation Network Firewall Next Generation Network Firewall Overview Next Generation Network Firewalls are an important part of protecting any organisation from Internet traffic. Next Generation Firewalls provide a central point

More information

CounterACT 7.0 Single CounterACT Appliance

CounterACT 7.0 Single CounterACT Appliance CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on

More information

Product Overview. UNIFIED COMPUTING Managed Hosting Compute Data Sheet

Product Overview. UNIFIED COMPUTING Managed Hosting Compute Data Sheet Product Overview Interoute provide our clients with a diverse range of compute options delivered from our 10 carrier-class data centre facilities. Leveraging our extensive and diverse next generation IP

More information

Infrastructure solution Options for

Infrastructure solution Options for RFP 16-01 EXHIBIT L Infrastructure solution Options for Corporations and Charities System Contributors: Sanjeev Batta Contents Introduction... 1 Conceptual Infrastructure Design... 2 Corporations and Charities

More information

SolarWinds Log & Event Manager

SolarWinds Log & Event Manager Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

How To Create A Virtual Desktop In Gibidr

How To Create A Virtual Desktop In Gibidr Virtual Desktop Infrastructure for IGIDR Sealed quotations are invited from authorized partners of OEM providing VDI solutions. The sealed quotations should be supplied in two parts Technical Bid (Part

More information

MAYA ANGELOU PUBLIC CHARTER SCHOOL

MAYA ANGELOU PUBLIC CHARTER SCHOOL MAYA ANGELOU PUBLIC CHARTER SCHOOL REQUEST FOR PROPOSAL For RFP FY16 School Network Infrastructure 1. Overview Maya Angelou Public Charter School (the School ) is a Public Charter School operating in Northeast

More information

Cisco WebEx Meetings Server System Requirements

Cisco WebEx Meetings Server System Requirements First Published: October 21, 2012 Last Modified: October 21, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 8 526-00 800 553-NETS

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

CAPABILITIES STATEMENT

CAPABILITIES STATEMENT CAPABILITIES STATEMENT TABLE OF CONTENTS About Entity Data 1 Customer Benefits 2 Why Choose Entity Data 3 Our Data Centre 5 Our Solutions > Solutions Overview 6 > Enterprise Virtualisation 7 > Host Security,

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: info@avendasys.com email: sales@avendasys.com Avenda

More information

SAN RFP Questions and Answers

SAN RFP Questions and Answers SAN RFP Questions and Answers Questions for week ending 10/4/13 Questions from Sterling Computers What is the snapshot retention policy is and percent of change for the primary SAN? a. Is it just a 1 day

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information