Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
|
|
- Stewart Blake
- 8 years ago
- Views:
Transcription
1 Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN 2. How much throughput must the IPS support long-term? Answer: 3 GB IPS 3. Are all interfaces for VPN / IPS connections expected to be copper 10/100/1000 Mbps? Answer: Gigabyte 4. Does the customer have existing switches that these devices (IPS, VPN, servers) will connect into, or do switches have to be provided? If so, what are the requirements for the switches? Answer: No, MHBE does not have switches. All ports must be Gigabit capable with uplink capacity. 5. The RFP required that the VPN support 4500 VPN users. Many VPN solutions are licensed by concurrent connected users, which is typically a smaller percentage of the maximum number of potential users. Should the VPN solution be quoted to license for 4500 users? Answer: No, the solution should be quoted for a minimum 500 concurrent users, expandable to 4500 users 6. Are redundant IDS/IPS required? Answer: Yes. Needs to be separate devices 7. Would it be possible to provide guidance on how many years of licensing / maintenance for all vendors to bid? For example, if multiple Offeror s pass technical review, an Offeror priced for one year will come in cheaper than an Offeror bidding three years, even though a multi-year discount may be a better solution for MHBE. Answer: MHBE is requiring 3-5 year license/maintenance from vendor warranty. In addition, MHBE is requiring only one year management, service, and maintenance from Offerors. 8. Will MHBE remediate the data center to accommodate all of the systems (appropriate cooling, rack space, power)? Are there any constraints? Answer: Yes MHBE has appropriate space, cooling and power 9. What are the rack requirements (open/closed, size, etc.)? Answer: Closed
2 10. What are the minimum requirements of the server besides 12TB of disk space? Are there specific CPU / RAM requirements? Offerors want to make sure that they provide ample capacity if future virtual machines are anticipated. Answer: CPU Quad core capable with minimum RAM 96 GB. HP servers are preferred. Integrated management NIC (i.e. ILO) 11. For a virtual solution, should the Offeror provide all virtualization licensing? Are there any specific requirements for the virtualization environment in terms of preferred vendor (VMware, Microsoft, RedHat, and Citrix), functionality, etc. Answer: Yes, VMware. Two physical virtual hosts are required with Vmotion capability. Vsphere should be installed and configured according RFP. 12. Are the two domain controllers to be on separate physical servers to start with? Or can they be virtualized on a single server to start and in the future have a purchase for a second server for the other location outside the scope of this bid? Answer: DC should be on 2 separate virtual hosts 13. What are the requirements for the backup solution, for ex, retention, backup/restore performance, deduplication, etc.? Answer: Backup solutions should allow portable media to be stored at an offsite location. Retention should be at least 3 years. 14. What platforms are required for anti-malware check - Windows only, or Mac, etc.? Answer: All platforms 15. There is a requirement for Network Access Control for VPN users. If the VPN appliances can support this functionality, is it adequate that the solution does not include a separate dedicated NAC system? Answer: NAC should be separate/dedicated 16. How many internal computers are on the network? Answer: Varies 17. The RFP states the need for a high availability VPN appliance. Does this include the backend hardware needed to support the RSA solution as well? Answer: Yes
3 18. The RFP also states that the offer shall provide endpoint virus protection and security for all OS based systems. Is this only required for items being added to the environment or items that are currently in place? Answer: Only items proposed in the RFP 19. Do you have a dedicated set of HW for VPN today? Answer: No 20. If so could you please provide the manufacturer? Answer: n/a 21. SW based VPN typically requires HW for termination at the head in. Do you have a manufacturer in mind or would you like us to make the best recommendation? Answer: Cisco 22. The Offeror shall provide installation of a two-factor token based VPN access solution for, at minimum, 4500 users. Question: Are we looking for a solution which is scalable to a higher user count in near future? VPN termination appliance can allow up to users. We can either procure a license to cater 4500 users and have a device capable to accommodate a higher number or have a device and license only considering 4500 users. Answer: No, we need 500 currently with expandability for users 23. The Offeror shall have the ability to install VPN Client software to serve MHBE and partners throughout the state of Maryland. Question: Will we be shipping the RSA physical token to all users? Answer: No, the Offeror will provide the token at the time of the installation of the client software at remote sites 24. Will end user be contacting us directly for support in case of issues with installation & provisioning? Answer: Yes, for the 1 st year of service 25. A solution that provides a high Availability VPN appliance cluster on the Maryland Statewide Government Intranet (SwGI) network for access to the HIX Application. The VPN solution will need to provide DNS, DHCP, and Network Time Protocol services to clients. MHBE will provide the VPN security setting policy for the VPN appliances. Question: Do we have DNS, DHCP and NTP server in the network already? If not, do we need to setup these servers as part of the solution offering?
4 Answer: No, we do not have the server in the network already. Yes, you must set up these severs. 26. Virtual technology should be used for servers and other hardware systems where applicable. Question: Do we have any existing virtual infrastructure which can be leveraged to deploy servers? Answer: No 27. NAC/NAS security appliances that provide a secure scan of VPN client computers. MHBE will provide the security policy of the NAC/NAS. Question: Will it be okay, if we provision secure scan on VPN appliance as a perpetual & onetime cost for all users. Or we need a NAC device to perform posture assessment to get end point details and perform secure scan. To perform secure scan using a NAC/NAS solution involves: 1. Recurring cost for license depending on user count 2. License available for minimum 3 yrs. (1yr not available) Answer: The Offeror will propose the best solution 28. From attachment 1: A solution that includes acquiring and registering any and all digital Certificates needed for this VPN solution and accompanying systems. Question: Are you looking forward for 3 rd party CA service for our PKI requirements or setup an enterprise PKI infrastructure for device certificates and user certificates? Answer: Third-party CAs are required 29. Upon notification of two or more simultaneous connections established by the same device certificate, the Certificate Authority Administrator must revoke the device certificate and provide an updated Certificate Revocation List (CRL) to the Security Administrator. The Security Administrator must immediately drop the session upon notification of two or more simultaneous connections established by the same device certificate. Question: As per the requirement, we are doing 2 factor authentication using domain password and RSA token. Are we intending to use certificates also? Answer: Yes, third-party CAs are required 30. Any escalation of user privileges must be logged on a continuous basis. Please elaborate more on this requirement. Answer: The system must be able to log user actions 31. A backup solution for server and system data that will provide the ability for offsite storage data. Question: Are we including the 12 TB file log server for back up as well? Answer: A file server is not to be included as part of the backup solution
5 32. Endpoint virus protection and security for all OS based systems. Question: Do we need to provision anti-virus/malware solution on all user endpoints? Answer: No, EVP must be installed on systems included in the RFP 33. An Intrusion Detection System/Protection System solution. This must be a unique hardware device. Question: Please elaborate on unique hardware device. Are we looking for a standalone device or hardware/software module on VPN appliance is acceptable? Answer: Standalone Device 34. What is the actual due date of this RFP? Section 1.12 says the 17 th and section 2.1 says the 21 st. Answer: January 17 th is the due date 35. What is your current firewall appliance? Answer: None 36. What level of support are you requesting for the warranty? How long should the warranty be? Answer: MHBE is requiring 3-5 year license/maintenance from vendor warranty. In addition, MHBE is requiring only one year management, service, and maintenance from Offerors. 37. Are you looking for a redundant, high-available solution? Active/Active or Active/Standby? Answer: Based on vendor options and proposition from Offerors 38. How many tokens are needed for the RSA solution? Answer: Approximately How many concurrent VPN sessions are you expecting? Answer: Approximately What is your internet throughput? Answer: 100 MB Circuit 41. Time between receiving the answers to questions so you can complete the proposal is extremely short. Would like to request moving the date to the 20th. This would allow a weekend for packaging and final review. Answer: N/A
6 42. Are two Domain controllers part of the solution? Answer: Yes. 43. Page 17: What format is the user data being provided that is to be used for auto import. Answer: Based on format supported by Vendor. 44. Page 17: The requirement is for RSA style tooks. Please eliberate on the use of digital Certificates. Answer: See question 29 above. 45. Does the solution have to map to the products listed in the "Guidance for Secure Remote Access" document? Answer: Yes 46. You require three client references for staff who are currently licensed to install the proposed solution. Will you allow a company with a successfully history of VPN deployments to use those references? Will you allow vendor references of successful deployments? Answer: Yes 47. You require three client references for staff who are currently licensed to install the proposed solution. Does license mean the same as certified? Answer: Yes, Licensed means the same as Certified. 48. What is the size of the Internet connection to your ISP? Answer: 100 MB 49. What is the total number of concurrent VPN connections do want the solution to support? Answer: 500 users, expandable to 5000 users. 50. Are you open to SSL and IPSEC based VPN solutions? Answer: IPSEC is the preferred method 51. Is a FIPS certified client really required since the algorithms in FIPS are not the latest? Answer: Yes - FIPS140-2 is the requirement
7 52. Endpoint virus protection and security for all OS based systems. Are you asking for an A/V solution and also want a posture assessment performed by the VPN client? Answer: refer to question # 19. Answer: The proposals are due on January 17th 53. A Light Weight Directory Access Protocol (LDAP) directory for user authentication. (This will be the first of the Microsoft active directory domain for MHBE). MHBE needs at least two domain controllers, both of which will need to be located at 750 E. Pratt Street, with one of the Domain Controllers must be designed to be relocated to a separate facility in the future. Could you please provide a bit of clarity around this requirement, are we to include an AD environment? Answer: Possibly- An AD environment is one example of a LDAP environment. The RFP is requesting two Domain Controllers to meet the redundancy requirements. Each Domain Controller shall be a virtual server and reside on separate physical hosts. 54. {See page 18} Are bids due on the 17 th, or the 21 st? These two dates are in the document. Which of the above is correct? Answer: The proposals are due on January 17 th 55. Please Note Proposal Submission Requirements: Proposals may only be submitted in person or via postal/delivery service. Proposals may not be submitted by emm, or facsimile.
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
More informationWhat s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationProof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access
More informationA Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
More informationInvitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008
Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the
More informationFINANCIAL SERVICES BOARD
PROVISIONING OF AN ICT SERVICE MANAGEMENT SOLUTION The following questions were received by the Financial Services Board on bid FSB2013/011 and are answered accordingly: QUESTION 1 The bid response format
More informationERP Infrastructure Guide APPENDIX B
ERP Infrastructure Guide APPENDIX B for State of Georgia State Road and Tollway Authority 47 Trinity Avenue, SW Atlanta, GA 30334 June 2013 Updated by: Updated on: Description of Update: Revision # DRY
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationCity of Coral Gables
City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:
More informationChabot Las Positas Community College District
Chabot Las Positas Community College District Information Technology Services Disaster Recovery Plan Supplement to August 1, 2014 Plan (General Version) Note: Selected charts and tables are blanked out
More informationCisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
More informationProfessional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
More informationJOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429
JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 ADDENDUM #1 September 21, 2015 REQUEST FOR PROPOSALS #16-033 FOR CLOUD BASED BACKUP & RECOVERY
More informationADDENDUM NO. 03 August 22, 2014
ADDENDUM NO. 03 August 22, 2014 The following changes, additions, deletions or corrections shall become a part of the Contract Documents dated, July 22, 2014 for the RFP named below and all other conditions
More informationData Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration
More informationPHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
More informationenicq 5 Technical FAQ
enicq 5 Technical FAQ Classification Q: What is the purpose of the enicq 5 application? A: The enicq 5 application is a Windows-based application provided by Vermont Oxford Network ( VON ) to its members
More informationCisco Identity Services Engine
Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent
More informationData Sheet. NCP Secure Enterprise Management. General description. Highlights
Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server
More informationStorage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
More informationInterworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
More informationHow To Choose A Network Firewall
Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No
More information36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate
1 RFP 14-001 Addendum 1. What version of AD - Forest Functional, Domain Functional, DC OS Version(s) - is currently deployed? Domain functional level Windows Server2008 Forest functional level Windows
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationIgnify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
More informationRe-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries
Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held
More informationJOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI
JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing
More informationCalifornia Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
More informationSecurity Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
More informationvshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationState of Wisconsin. Virtual Private Network (VPN) Service Offering Definition (SOD)
State of Wisconsin Virtual Private Network (VPN) Service Offering Definition (SOD) Document Revision History Date Version Creator Notes 9/15/11 1.5 Amy Dustin Annual review minor edits Table of Contents
More informationAddendum 03. This is the Final Extension in response and due to the above received request:
RFP 13-44 Questions 05-29-2013: Can the due date be extended 1 week? There is very little time between posting of answers and the proposal due date. We want to be sure we have sufficient time to prepare
More informationWilliamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
More informationWho s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
More informationTerminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
More informationExternal authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
More informationHardware/Software Guidelines
There are many things to consider when preparing for a TRAVERSE v11 installation. The number of users, application modules and transactional volume are only a few. Reliable performance of the system is
More informationWhite Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
More informationSecondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
More informationSymantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
More informationHardware and Software Requirements for Server Applications
Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Networks Holding Corporation All Rights Reserved. Rev 9/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum
More informationHosting Solutions Made Simple. Managed Services - Overview and Pricing
Hosting Solutions Made Simple Managed Services - Overview and Pricing NETRACKservers Internet Security Package: NETRACKservers's Internet Security Package is an ideal security service for business that
More informationMobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
More informationADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation
Following are the questions submitted on or before September 18, 2015, in accordance with RFP specifications. All questions are published verbatim as received, without regard to errors in spelling, punctuation,
More informationServer Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
More informationRequest for Proposal Infrastructure Hosting
Request for Proposal Infrastructure Hosting June 10, 2013 Revision Date: 6/19/2013 Table of Contents Executive Summary and Company Background... 4 Summary Overview of Request for Proposal (RFP) and Services
More informationGetting Started with HC Exchange Module
Getting Started with HC Exchange Module HOSTING CONTROLLER WWW.HOSTINGCONROLLER.COM HOSTING CONTROLLER Contents Introduction...1 Minimum System Requirements for Exchange 2013...1 Hardware Requirements...1
More informationUpgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
More informationCloud Optimize Your IT
Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release
More informationVirtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
More informationBosch Video Management System High Availability with Hyper-V
Bosch Video Management System High Availability with Hyper-V en Technical Service Note Bosch Video Management System Table of contents en 3 Table of contents 1 Introduction 4 1.1 General Requirements
More informationRSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2
RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
More informationvcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationVirtual Private Servers
Virtual Private Servers Application Form Guide Internode Pty Ltd ACN: 052 008 581 150 Grenfell St Adelaide SA 5000 PH: (08) 8228 2999 FAX: (08) 8235 6999 www.internode.on.net Internode VPS Application
More informationYubiRADIUS Deployment Guide for corporate remote access. How to Guide
YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
More informationSecurely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More informationCisco TrustSec How-To Guide: Planning and Predeployment Checklists
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...
More informationSystem Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array
System Requirements The system requirements are shown below for each type of installation, software, and peripherals. Should you have questions about the system requirements or replacement peripherals
More informationNetScaler VPX FAQ. Table of Contents
NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5
More informationHP JETADVANTAGE SECURITY MANAGER
HP JETADVANTAGE SECURITY MANAGER Release Notes v2.1.4 CONTENTS Overview... 2 Version Information... 2 What s New in Security Manager 2.1.4?... 5 Key Features... 6 Solutions... 6 Supported Operating Systems
More informationCisco Secure Control Access System 5.8
Data Sheet Cisco Secure Control Access System 5.8 Cisco Secure Access Control System ties together an enterprise s network access policy and identity strategy. It is the world s most trusted policy-based
More informationFor windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.
Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought
More informationHow To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook
SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents
More informationVMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationMobile Admin Deployment Guide
Hardware Selection Mobile Admin Deployment Guide This document is provided to help you best deploy Mobile Admin within your network infrastructure. The diagram below represents a possible deployment of
More informationRequest for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project
Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay
More informationService Descriptions
Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application
More informationVMware Workspace Portal Reference Architecture
VMware Workspace Portal 2.1 TECHNICAL WHITE PAPER Table of Contents Executive Summary.... 3 Overview.... 4 Hardware Components.... 5 VMware vsphere.... 5 VMware Workspace Portal 2.1.... 5 VMware Horizon
More informationJunos Pulse Supported Platforms
Supported Platforms Guide Junos Pulse Supported Platforms Release 2.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Sep 25, 2011
More informationKEMP Exchange Overview
KEMP Exchange Overview Tim Quinn Director of Strategic Partnerships TQuinn@kemptechnologies.com Jim Schneider Pre-Sales Engineer JSchneider@kemptechnologies.com Maryann McIntosh Northeast Territory Account
More informationHP E-PCM Plus Network Management Software Series
Data sheet Product overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security
More informationDIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6)
Infrastructure as a DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6) All customer data is located entirely in the contiguous United States. When required the data will be located
More informationInformation Technology Division Technology Operations & Systems Management
Over the past decade, Texas Tech University has made great strides in protecting the critical information resources of its colleges, institutions and departments. (TOSM) has a 4000 sq/ft data center that
More informationNext Generation Network Firewall
Next Generation Network Firewall Overview Next Generation Network Firewalls are an important part of protecting any organisation from Internet traffic. Next Generation Firewalls provide a central point
More informationCounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
More informationVirtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
More informationA Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
More informationRestricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
More informationProduct Overview. UNIFIED COMPUTING Managed Hosting Compute Data Sheet
Product Overview Interoute provide our clients with a diverse range of compute options delivered from our 10 carrier-class data centre facilities. Leveraging our extensive and diverse next generation IP
More informationInfrastructure solution Options for
RFP 16-01 EXHIBIT L Infrastructure solution Options for Corporations and Charities System Contributors: Sanjeev Batta Contents Introduction... 1 Conceptual Infrastructure Design... 2 Corporations and Charities
More informationSolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
More informationACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationHow To Create A Virtual Desktop In Gibidr
Virtual Desktop Infrastructure for IGIDR Sealed quotations are invited from authorized partners of OEM providing VDI solutions. The sealed quotations should be supplied in two parts Technical Bid (Part
More informationMAYA ANGELOU PUBLIC CHARTER SCHOOL
MAYA ANGELOU PUBLIC CHARTER SCHOOL REQUEST FOR PROPOSAL For RFP FY16 School Network Infrastructure 1. Overview Maya Angelou Public Charter School (the School ) is a Public Charter School operating in Northeast
More informationCisco WebEx Meetings Server System Requirements
First Published: October 21, 2012 Last Modified: October 21, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 8 526-00 800 553-NETS
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationCAPABILITIES STATEMENT
CAPABILITIES STATEMENT TABLE OF CONTENTS About Entity Data 1 Customer Benefits 2 Why Choose Entity Data 3 Our Data Centre 5 Our Solutions > Solutions Overview 6 > Enterprise Virtualisation 7 > Host Security,
More informationPolicy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: info@avendasys.com email: sales@avendasys.com Avenda
More informationSAN RFP Questions and Answers
SAN RFP Questions and Answers Questions for week ending 10/4/13 Questions from Sterling Computers What is the snapshot retention policy is and percent of change for the primary SAN? a. Is it just a 1 day
More informationGetting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationRSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationDell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy
Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
More information