Texas Comptroller of Public Accounts

Size: px
Start display at page:

Download "Texas Comptroller of Public Accounts"

Transcription

1 Texas Comptroller of Public Accounts Susan Combs, Comptroller Request for Information for Mobile Device Management Products and Services RFI#0313VC March 20, 2013 Page 1 of 7

2 A. Summary 1. Type of Document: Request for Information (RFI) 2. Issuing Office: Comptroller of Public Accounts Purchasing Section Room G-2, Attn: RFI# 0313VC 111 E. 17 th Street Austin, Texas OR Comptroller of Public Accounts Purchasing Section Attn: RFI# 0313VC P O Box Austin, Texas Responses Requested From: Qualified Respondents that have a commercially available Mobile Device Management (MDM) product and/or service offering. 4. Type: Mobile Device Management Products and Services 5. Responses to RFI: Must be Addressed to CPA s Point of Contact for this RFI 6. Deadline for Responding to RFI: April 5, 2013; 3:00 p.m., Central Zone Time 7. CPA Point of Contact for this RFI: Vanessa Contreras, CTPM Phone Number: (512) vanessa.contreras@cpa.state.tx.us Fax Number: (512) Faxed and ed Responses: Acceptable 9. Questions and Answers: Questions regarding this RFI must be in writing and must be submitted to CPA s Point of Contact specified above in Item 7, no later than March 28, :00 p.m. CZT. Telephone inquiries will not be accepted. CPA intends to post answers to these questions on the Electronic State Business Daily on or about April 1, Respondents are solely responsible for verifying CPA s timely receipt of their questions by the deadline specified above. 10. Respondent Presentations: In CPA s sole discretion and to assist in additional information gathering, CPA may invite one or more Qualified Respondents to present and explain in further detail the functionality of the MDM solution described in the RFI Response. CPA will notify the Respondent(s) invited to conduct additional information gathering presentations on or about April 15, 2013 Presentations will be performed at CPA offices located at LBJ Building, 111 E. 17 th Street, Austin, Texas; presentation dates and times to be arranged. Page 2 of 7

3 11. Building Security: Due to building access procedures at CPA s LBJ State Office Building location, a Respondent selected to provide a presentation is encouraged to allow additional time to obtain a visitor s pass on the scheduled date of the presentation. Respondent personnel must carry and present a valid and current photo identification card to the Security Desk in order to receive an escort to the Issuing Office. B. Introduction The Texas Comptroller of Public Accounts (CPA) issues this Request for Information (RFI) to gather information regarding products and services related to Mobile Device Management (MDM) solutions. Responses to this RFI will aid CPA s general understanding of the types of MDM products and service offerings which are commercially available in the industry. CPA is exploring the possibility of utilizing MDM products and services in order to provide more efficient mobile business administration. In order to aid CPA in gathering information regarding the industry availability and performance of MDM solutions, CPA is seeking information from Qualified Respondents which are defined as companies that: have commercially available MDM product(s) and service offering(s); offer solutions that manage all aspects of MDM including software management, hardware management, network service management and security management; and provides flexible pricing models that accommodate expansion from smaller user populations within a division to larger user populations. C. CPA Environment CPA has over 3,000 employees located in Austin as well as thirty-seven (37) field offices. The information below is a high-level description of the CPA environment for purposes of this RFI: Many CPA employees work remotely, employees shall have the ability to utilize mobile devices if desirable. Initially, a typical use case will be sending and receiving via the agency platform (Microsoft Exchange), sending and receiving text messages, view and update users business calendars and general web browsing. It is CPA s intent to leverage the use of an MDM solution to facilitate the implementation of the agency s mobile device policy. Initially, CPA anticipates deploying an MDM solution in a limited pilot of approximately ten (10) agencyowned ios mobile devices. For purposes of the RFI responses, CPA will want latitude to expand the device portfolio beyond a single device type and offer broader support for a heterogeneous mix of devices. Based on pilot results, CPA anticipates expanding its MDM footprint and offering to its employees. CPA is interested in considering MDM off-premise (i.e. Cloud, Vendor Hosted) or on-premise solutions. However, all data flowing between authorized mobile devices must flow through CPA s existing computing infrastructure. D. CPA Inquiries Regarding Commercially Available MDM Solutions CPA is seeking general information from Qualified Respondents regarding the various MDM products and services which are commercially available. CPA is particularity interested in the following information: Page 3 of 7

4 1. Network a. Does your MDM solution provide options for an off-premise solution with high availability? Please provide SLA's for off-premise solution and provide details for accomplishing a highly available solution. b. Does your MDM solution have the ability to apply controls to ensure that no agency data is stored offpremise? c. If your MDM solution is used in an on-premise option, does your product have the ability to be deployed or run on a Linux server or Windows virtual server with the option of concurrently hosting multiple users at multiple facilities? Please describe any limitations or alternative approaches. d. Is your MDM solution capable of storing agency specific data separately on the mobile device, ensuring security and privacy? Please describe how this separation or compartmentalization is achieved and ensured. e. What is your policy related to ensuring that off-premise solutions will only be hosted in the U.S. including all data, backups as well as Disaster Recover sites? f. Is your MDM product compatible with Cisco s Virtual Private Network (VPN) client product? Please describe any limitations. g. Can your product/solution be configured to ensure that agency data passes only through a specified infrastructure? (Note: Data includes what is generated from browsing, , text, IM, etc.). Please describe how this will be accomplished and ensured. Are there any limitations? 2. Security a. In the event an employee-owned device is utilized, will your product provide complete segregation of agency data from the employee s personal data? This includes , text, document and applications (including third-party or proprietary applications). b. Will your MDM product ensure that there will be no agency access to an employee s personal data stored on their employee-owned device and only allows access to agency business data and applications in the agency container? c. Does your product have the capability to set-up and provision devices from an MDM management console administered by an agency designated administrator? d. Does the administrative console support or have the capability to support multi-factor authentication? If yes, then describe how multi-factor authentication is implemented on the end-point device when accessing the secure containers on the device (i.e. - does access to the device container with the business information support MFA as well?). e. Does your product have the capability to create and modify configuration profiles in an MDM Management Console and to apply the profiles to devices either selectively, by group or all devices? f. Does your product have the capability to support setup, administration, and entitlement for security groups as well as assignment of users for group-inherited entitlement? g. Does your product have the capability to set complex passwords where passwords are at least eight (8) characters in length and contain characters from three (3) of the following four (4) categories? o Uppercase characters (A through Z) o Lowercase characters (a through z) o Base 10 digits (0 through 9) Page 4 of 7

5 o Non-alphanumeric characters (e.g.,!, $, #, h. Does your product offer methods of segregating agency data from personal data to be password protected? i. Does your product have the capability to reset the agency segregated data password at the MDM Management Console and on the device? j. Does your product provide encryption of data in all states (i.e., Data-At-Rest, Data-in-Motion, Data-In- Use); Minimum of 128-bit? Please respond with your product's encryption options and description of how this safeguard is accomplished for each state. k. Does your solution provide device and MDM antivirus installation and management? Please describe options on how this might be accomplished. l. Does your product have the capability to detect and/or prevent Jail Breaking? Please describe how this is accomplished. m. Does your solution provide tools for monitoring authorized security entitlements, including application rights? Please describe any limitations. n. Does your product have the capability to selectively locate. track and deactivate individually selected devices via GPS if lost? o. Is your product capable of performing a device session auto-lock to the password screen after a configurable period of inactivity? Please describe your configurable settings. p. Does your product have the capability to remotely lock the password to agency segregated data on a device without affecting access to personal data? q. Does your product have the capability to perform a selective wipe or a total wipe of agency segregated data of a device without affecting the personal data? r. Does your product have the capability to auto-wipe the segregated agency data on a device after a configurable number of failed login attempts? Please describe your configurable settings. s. Does your product have the capability to push updates, upgrades, patches, and fixes for both agency business applications and OS to the device? Please elaborate on: o how this would work for off-premise and on-premise hosted solutions, o support for the Microsoft SCCM deployment tool, o definable or selectable options for synchronization of system updates. t. Does your product have the capability to prohibit/restrict backups to non-approved CPA locations? u. Does your product have the capability whereby the MDM administration console configures backups and administers device restores? Please describe any limitations or beneficial features. 3. Device Management a. Describe your MDM product provide capabilities to easily add a device and/or users. b. Describe your product s capability of supporting multiple operating systems and multiple versions of a single operating system. Page 5 of 7

6 Page 6 of 7 RFI #0313VC c. Does your product allow software and data synchronization in the background while not prohibiting device usage in either the business or personal containers for business or personal use? Please describe any limitations or additional features. 4. Application Control a. Does your MDM product integrate with Microsoft Exchange Server? b. Does your MDM product have the capability for user-definable options for synchronizing either real-time push or manual sync , calendar, tasks, and/or contacts? Please describe any limitations or additional features. c. Will your MDM product allow access utilizing Cisco s VPN client product for browsing, instant messaging, and texting? Please describe any limitations. d. Does your MDM product have the capability to push/install other third party or custom applications that will connect to servers utilizing Cisco s VPN client? Please describe any limitations or additional features. 5. Vendor Support a. Describe how your MDM solution is able to provide full lifecycle product support, with service level agreements and options for software asset management monitoring and compliance tools. b. Describe your MDM solution s ability to provide contractual and technical capabilities for expanding the number of managed devices. Please describe any limitations or additional features. c. Describe your organization s ability to provide technical consultation, support, training and documentation for administrators in the implementation, administration, and ongoing support of the MDM product. Please describe any limitations or additional features. d. Describe your organization s ability to provide end user training materials and documentation at a customer s location(s) to a number of users defined by the customer. e. Describe your MDM product s ability to monitor and capture usage and performance, such as connections, data flow, logins, device location, etc. Please describe any limitations or additional features. f. Describe your MDM product s ability to provide predefined system management reports including listing of devices, device status, device owner, etc. g. Describe your MDM product s ability in having report writer capability for ad-hoc querying and reporting on system management information. E. Required RFI Response Materials Respondents to this RFI must send an or fax titled Response to RFI for Mobile Device Management to the CPA Point of Contact for this RFI on or before the deadline specified in Section A (Summary) of this RFI. The RFI Response should include the items listed below and be organized in the following order: Company s name and address; Point of Contact information for Respondent, to include name, title, telephone number and address; A brief summary (no more than one page in length) describing each item requested in Section D of this RFI, in the order listed; and Any other information that the Respondent deems pertinent or relevant to this RFI (e.g., brochures or other company literature).

7 CPA prefers that the RFI responses be submitted via or fax. For a RFI Response that is not submitted via or fax, Respondent should submit one (1) original and three (3) copies of its response. F. Questions regarding RFI Questions regarding this RFI may be submitted by hand delivery or or fax to the CPA Point of Contact for this RFI no later than the deadline specified in Section A (Summary) of this RFI. G. Deadline and Delivery Location Responses to this RFI must be received in the Issuing Office no later than the deadline specified in Section A (Summary) of this RFI. ed and faxed copies of the responses will be accepted. Respondents are solely responsible for ensuring timely receipt of their responses at the location set forth above on or before the deadline; responses received after this time and date will not be considered. H. No Contract Results from this RFI This RFI is issued solely for the purpose of obtaining information that may assist CPA in preparing specifications for a possible issuance of a solicitation. This RFI is not a Request for Offer (RFO), purchase, solicitation, commitment to conduct procurement, or an offer of a contract or potential contract. CPA is under no obligation whatsoever to issue a solicitation. Respondent submission of a response or participation in a presentation is voluntary. Failure to respond to this RFI will not disqualify a vendor from receipt of award of any future contract. I. No Compensation or Cost Recovery CPA shall pay no costs, expenses, or any other amounts to any Respondent or any other entity incurred under or related to this RFI. J. Ownership of Responses and Open Records Responses to this RFI will be the property of CPA. CPA, in its sole discretion, may consider or disregard any information submitted in response to this RFI. Responses to this RFI will not be returned to Respondents. Responses will be public information and available to any requestor; as a result, Respondent should not provide any information to CPA that Respondent believes to be confidential or proprietary information. Copyrighted responses or responses marked Confidential or Proprietary are not acceptable and will be rejected as non-responsive. Page 7 of 7

PUBLIC UTILITY COMMISSION OF TEXAS

PUBLIC UTILITY COMMISSION OF TEXAS PUBLIC UTILITY COMMISSION OF TEXAS REQUEST FOR INFORMATION For A Document Management System Public Utility Commission of Texas William B. Travis Building 1701 North Congress Ave. Austin, Texas 78711 Closing

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Infrastructure Technical Support Services. Request for Proposal

Infrastructure Technical Support Services. Request for Proposal Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable

More information

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING 4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the

More information

Request for Proposal Mobile Device Management System

Request for Proposal Mobile Device Management System Request for Proposal Mobile Device Management System Introduction The Hall County School System (HCSS) in Northeast Georgia has thirty-three schools with approximately 27,000 students and 3,000 staff members.

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Corporate-level device management for BlackBerry, ios and Android

Corporate-level device management for BlackBerry, ios and Android B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and

More information

IBM Managed Security Services (Cloud Computing) hosted mobile device security management

IBM Managed Security Services (Cloud Computing) hosted mobile device security management IBM Managed Security Services (Cloud Computing) hosted mobile device security management Z125-8855-00 11-2011 Page 1 of 15 Table of Contents 1. Scope of Services... 3 2. Definitions... 3 3. Services...

More information

Request for Proposal Managed IT Services 7 December 2009

Request for Proposal Managed IT Services 7 December 2009 Request for Proposal Managed IT Services 7 December 2009 BuzzBack, LLC 25 West 45 th Street Suite 202 New York, NY 10036 Table of Contents 1 Summary... 1 2 Proposal Guidelines and Requirements... 1 2.1

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org

Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org IMPORTANT NOTICE All proposal question and inquiries must be sent by email to

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

REQUEST FOR INFORMATION (RFI) DRCI-16-2209 PREVENTATIVE MAINTENANCE OPTIMIZATION SYSTEM

REQUEST FOR INFORMATION (RFI) DRCI-16-2209 PREVENTATIVE MAINTENANCE OPTIMIZATION SYSTEM Date February 1, 2016 Page 1 REQUEST FOR INFORMATION (RFI) PREVENTATIVE MAINTENANCE OPTIMIZATION SYSTEM RESPONSE DEADLINE: RFI responses are due by to Noon, Local Time on Tuesday, February 16, 2016 ADDRESS

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

State of Iowa REQUEST FOR INFORMATION. RFI #1217005002 State of Iowa ERP System Maintenance, Upgrades and Services

State of Iowa REQUEST FOR INFORMATION. RFI #1217005002 State of Iowa ERP System Maintenance, Upgrades and Services State of Iowa REQUEST FOR INFORMATION RFI #1217005002 State of Iowa ERP System Maintenance, Upgrades and Services Section 1- Background and Objectives 1.1 Purpose The objective of this Request for Information

More information

How We Deployed BYOD Using Mobile Device Management

How We Deployed BYOD Using Mobile Device Management How We Deployed BYOD Using Mobile Device Management Providing mobile access to company resources safely and securely by Frank Grogan and Robert Dalrymple Table of Contents 1. Introduction 2. Understanding

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

A Radicati Group Web Event

A Radicati Group Web Event The Radicati Group, Inc. www.radicati.com A Radicati Group Web Event ** Please dial-in by phone to listen to the audio portion of this event. The dial-in number is in your registration confirmation email

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Request for Proposal Outsourced IT & Managed Services

Request for Proposal Outsourced IT & Managed Services Request for Proposal Outsourced IT & Managed Services Issue Date: January 2, 2015 Submission Deadline: January 30, 2015 at 5:00 p.m. CST RFP Coordinator: Katie Kosseff, Operations Manager kkosseff@womenventure.org

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

AirWatch for Android Devices

AirWatch for Android Devices Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

211 LA County. Technology Infrastructure Assessment. Request for Proposals. August 2012 Request for Proposals- 211 LA County 1

211 LA County. Technology Infrastructure Assessment. Request for Proposals. August 2012 Request for Proposals- 211 LA County 1 211 LA County Technology Infrastructure Assessment Request for Proposals August 2012 Request for Proposals- 211 LA County 1 1. General conditions and proposers directions 1.1. Overview 1.1.1. 211 LA County

More information

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

3.1. Broad Use. 3.2. Presence

3.1. Broad Use. 3.2. Presence City of Asheville Specifications Enterprise Asset Management RFP # 298-WaterAssetManagement July 1, 2016 Jade Dundas, Water Resources Director (828) 259-5955 Table of Contents 1. Introduction... 2 2. General

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

NHSmail mobile configuration guide Apple iphone

NHSmail mobile configuration guide Apple iphone Only the Apple iphone 3GS and iphone 4 support encryption at rest. The iphone 3G and iphone 2G will not connect to NHSmail NHSmail mobile configuration guide Apple iphone Version: V.6 Date: November 2011

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

1 Introduction 2. 2 Document Disclaimer 2

1 Introduction 2. 2 Document Disclaimer 2 Important: We take great care to ensure that all parties understand and appreciate the respective responsibilities relating to an infrastructure-as-a-service or self-managed environment. This document

More information

AirWatch for ios Devices

AirWatch for ios Devices Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

REQUEST FOR INFORMATION Issued: October 21, 2015 Solicitation for: Website Development Responses Due: 2:00 p.m. (Local Time) on November 18, 2015

REQUEST FOR INFORMATION Issued: October 21, 2015 Solicitation for: Website Development Responses Due: 2:00 p.m. (Local Time) on November 18, 2015 REQUEST FOR INFORMATION Issued: October 21, 2015 Solicitation for: Website Development Responses Due: 2:00 p.m. (Local Time) on November 18, 2015 INTRODUCTION: Because this procurement involves a service,

More information

Request for Information RFI #15/16-300 for Enterprise Password Management Software

Request for Information RFI #15/16-300 for Enterprise Password Management Software Company Name: This RFI response has been submitted by: Address: (Street, Su. # City, State, Zip) Request for Information RFI #15/16-300 for Enterprise Password Management Software Contact Name: Telephone

More information

AVLOR SERVER CLOUD RECOVERY

AVLOR SERVER CLOUD RECOVERY AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties

More information

Request for Proposal. Contract Management Software

Request for Proposal. Contract Management Software Request for Proposal Contract Management Software Ogden City Information Technology Division RETURN TO: Ogden City Purchasing Agent 2549 Washington Blvd., Suite 510 Ogden, Utah 84401 Attn: Sandy Poll 1

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

SPRINGVILLE CITY, UTAH

SPRINGVILLE CITY, UTAH SPRINGVILLE CITY, UTAH REQUEST FOR PROPOSALS ENTERPRISE ASSET MANAGEMENT AND WORK ORDER SOFTWARE AND SERVICES RFP #2013 02 1 Table of Contents PROJECT BACKGROUND:... 4 SCOPE OF WORK:... 4 ALTERNATE SCOPE

More information

University at Buffalo Learning Management and Performance Management System Request for Information # 14CBW0036

University at Buffalo Learning Management and Performance Management System Request for Information # 14CBW0036 University at Buffalo Learning Management and Performance Management System Request for Information # 14CBW0036 Background The University at Buffalo (UB), The State University of New York is a major public

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Windows Phone 8.1 Mobile Device Management Overview

Windows Phone 8.1 Mobile Device Management Overview Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

ADOBE PSLT - ADOBE EXPERIENCE MANAGER: MANAGED SERVICES BASIC (2015V2.1)

ADOBE PSLT - ADOBE EXPERIENCE MANAGER: MANAGED SERVICES BASIC (2015V2.1) 1. Development Consultant. Any Development Consultant(s) appointed by Customer under this PSLT work expressly and exclusively at Customer s direction and Customer is responsible for any acts or omissions

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

Mobile Data Security Essentials for Your Changing, Growing Workforce

Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager

Managing Enterprise Devices and Apps using System Center Configuration Manager Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains

More information

How To Use Adobe Software For A Business

How To Use Adobe Software For A Business EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved.

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved. KASEYA CLOUD SOLUTION CATALOG 2016 Q1 UPDATED & EFFECTIVE AS OF: February 1, 2016 Kaseya Catalog - 1 - Overview of the Kaseya Cloud Subscription Solutions The Kaseya Cloud solutions are designed to meet

More information

IBM MobileFirst Managed Mobility

IBM MobileFirst Managed Mobility Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the

More information

How to Obtain an APNs Certificate for CA MDM

How to Obtain an APNs Certificate for CA MDM How to Obtain an APNs Certificate for CA MDM Contents How to Obtain an APNs Certificate for CA MDM Verify Prerequisites Obtaining Root and Intermediate Certificates Create a Certificate Signing Request

More information

Oracle Mobile Security

Oracle Mobile Security Oracle Mobile Security What s New in OMSS 11gR2 Patch Set 3 ORACLE WHITE PAPER MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

M O B I L E C O L L A B O R A T I O N S O L U T I O N S

M O B I L E C O L L A B O R A T I O N S O L U T I O N S BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR UNIFIED COMMUNICATIONS M O B I L E C O L L A B O R A T I O N S O L U T I O N S January 2015 V2.00 D E P A R T M E N T O F

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Florida Department of Environmental Protection Bob Martinez Center 2600 Blair Stone Road Tallahassee, Florida 32399-2400

Florida Department of Environmental Protection Bob Martinez Center 2600 Blair Stone Road Tallahassee, Florida 32399-2400 Florida Department of Environmental Protection Bob Martinez Center 2600 Blair Stone Road Tallahassee, Florida 32399-2400 Rick Scott Governor Herschel T. Vinyard Jr. Secretary April 5, 2013 Letter to Prospective

More information

Website Design, Development & Hosting Services

Website Design, Development & Hosting Services REQUEST FOR PROPOSAL Website Design, Development & Hosting Services Oscoda AuSable Chamber of Commerce October 28, 2015 INTRODUCTION The Oscoda AuSable Chamber of Commerce is requesting proposals for three

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

Kaspersky Security Center 10 Getting Started

Kaspersky Security Center 10 Getting Started Kaspersky Security Center 10 Getting Started A P P L I C A T I O N V E R S I O N : 1 0 M A I N T E N A N C E R E L E A S E 1 Dear User, Thank you for choosing our product. We hope that this document will

More information