REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM
|
|
|
- Nora Howard
- 9 years ago
- Views:
Transcription
1 REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008
2 TABLE OF CONTENTS 1 - INTRODUCTION STATEMENT OF PURPOSE EXISTING ENVIRONMENT TELEPERFORMANCE GROUP INTERNATIONAL OVERVIEW AND LOCATIONS SUPPLIER REQUIREMENTS & INSTRUCTIONS RFP INSTRUCTIONS QUESTIONS RFP RESPONSE FORMAT RFP REQUIRED OUTLINE IMPORTANT DATES TERMS AND CONDITIONS CONTRACT DURATION RFP EXPENSES PRICING IS BEST AND FINAL EVALUATION CRITERIA AWARDING OF POTENTIAL BIDS CUSTOMER REFERENCES INVOICING NOTE TO SUPPLIER P a g e
3 1 - INTRODUCTION Teleperformance is a leading CRM contact center aka Call Center. Security is becoming increasingly important and Teleperformance is preparing to improve its log management system for all of its critical data environments and security perimeters. We are inquiring about information for a log management system. This implies we are interested in a log management solution; however we must first evaluate each solution to determine which will be best for our many environments. Teleperformance has over 281 call centers throughout 45 different countries. Teleperformance has various Different security logging requirements including but not limited windows event log, CISCO, Netscreen, Check Point, Linux/Unix (various), Norton, CA, Trend, McAfee, RSA. This RFP solicitation intent is to identify the best solution(s) for the best price to use at our various call center locations. Our initial project includes gathering information and determining the best possible log management solution to fit our needs. However, we are soliciting information to find the preferred solution based on a variety of requirements to meet the needs of our various locations, functionality and best price. Teleperformance Reserves the right to do nothing in response to the proposal. We also reserve the right to award business to one or more vendors. 3 P a g e
4 2 STATEMENT OF PURPOSE The purpose of this RFP is to solicit information for supplying a log management solution for Teleperformance. This solution must be flexible and satisfy the different needs of each location including but not limited to: Normalization of various different log formats. Ability to move log data events to remote locations including off-shore locations without causing bandwidth issues. This is due to our hub and spoke model. Identify a global solution provider(s) based on functionality and price. We anticipate selecting vendor(s) who offers a variety of configurations accommodating different needs. Some of these needs are in the following areas: 1. Teleperformance requires a solution that can consolidate logs back to a central point with minimal network impact. 2. The solution should have the ability to push or pull events, agent or agent-less, based on our needs. 3. The solution needs to be compatible with the following source types out of the box or with minimal effort. Source types Windows Event Log Syslog XML SDEE SNMP databases, and flat files 4. The solution needs the ability to collect logs from, but not limited to, the following vendor formats. OS Windows Server 2003 Windows Server 2008 (32/64) (SP2/R2) (32/64) Windows Vista (32/64) Windows XP (32/64) Windows 2000 Professional Windows 2000 Server Solaris 8, 9, 10 BSD (open, free) Red Hat Linux Mac OS X Cent OS Debian HP-UX AIX Firewalls: Cisco FWSM Cisco ASA Barracuda Spam Firewall Juniper Networks Secure Access Cisco PIX Cisco VPN Concentrator Linux 2.4+ Check Point (IPTables/Netfilter) Net Screen Microsoft Windows Firewall Microsoft ISA 2006 IP Filter Microsoft ISA 2000 Microsoft ISA P a g e
5 5 P a g e August 20, 2008 [TELEPERFORMANCE LOG MANAGEMENT SYSTEM RFP] Citrix Secure Access SecureGuard Gateway Nortel Switched Firewall SonicWall IDS/IPS: Cisco ASA w/ AIP-SSM Cisco IPS 4200 Series Cisco IDSM-2 Cisco NM-CIDS Juniper IDP TippingPoint McAfee IntruShield Tripwire SourceFire Symantec Gateway IDS ISS Proventia ISS RealSecure IDS AV and Spyware CA ITM Clam AV Symantec AV Trend Micro AV AVG AV Windows Defender Mcafee AV Kaspersky AV Security apps: CA access control Microsoft's MBSA* CA Secure Content manager Cisco Secure ACS RSA SecureID HID access card systems Shavlik Microsoft Identity EnterpriseInspector* Integration Server 2003 Foundstone FoundScan Microsoft Windows IAS RADIUS eeye Retina Nessus SAINT Others (web server, Microsoft IIS apache SQL, custom logs): Cisco NAC VMWare Citrix Windows Terminal Server Microsoft Exchange Microsoft SQL Server 2000 Microsoft SQL Server 2005 Customized or in-house logs 5. The system must prevent loss of logs if the management system fails to work for whatever reason. 6. The solution should have high availability support. 7. The system must require access approval to view logs set policies and mange user rights to the solution. 8. The system must support various compliance acts for rules and reports. Most important would be PCI, HIPAA, and ISO It would also be recommended to support Safe Harbor (European Union). 9. The system must be scalable and have aggressive pricing. 10. The system will be installed, in most cases in our data centers and collect from those centralized sources as well as collect from sources based on our hub and spoke model. 11. The system must be easy to implement with education and training from the vendor, no professional service must be required. 12. Technical Support for the solution must be 24x7x365 to properly support our global requirements.
6 13. The solution must be able to trigger notifications via , sms, script execution, and integrate with help desk ticketing systems. 14. The solution rule and correlation engine must have: a. Out of the box rules for supported formats must be available. b. Wizards to create new rules must be comprehensive, yet not complicated. c. Correlation rules should not take a lot of time to write and test. d. All rule building components must be easy to identify and understand. 15. The solution s reports must have: a. Various types of reports based on compliance, and business needs out of the box. b. Reports need to have the ability to be customized, and create new reports based on the needs of the business. c. Generating and scheduling reports needs to be easy to understand and implement for Teleperformance administrators of the preferred solution. d. Reports systems should have built in functions to be sent to of various groups that need to review these reports. 16. The solution must ensure encryption of data in transit and at rest. 17. The solution must ensure tamper control during capture, transfer, and storage. 18. The storage area, data warehouse, for the logs must meet the ability to store logs online for at least 90 days. 19. The solution should have some kind of storage compression ability for archiving and backup. 20. The solution provider must provide resources, testing, training, and well defined documentation to ensure that all installations are completed quickly and that our staff can manage, maintain, and implement future installments. 21. Teleperformance is based upon a hub and spoke design where one centralized location is capable of controlling several satellite offices. Each satellite office could contain up to as many as 300 devices in need of monitoring. Furthermore, each location is required to maintain a log collection device capable of storing the audit logs. These locations should be capable of being controlled by one separate site, but may be controlled locally in the event of network connectivity issues. Please provide us with architecture examples of how your solution would integrate into this type of infrastructure. a. Be as detailed as possible with your answer to this question. b. If possible, provide a diagram of this example with the response given. c. Provide an inventory listing of devices and/or software used in your architecture examples required for your solution. d. Please explain how your example provides best practices in logging for compliance and regulations. 6 P a g e
7 Our primary objectives in implementing this log management system are as follows: 1. We Require that the solution have the ability to support our log management needs related to PCI, HIPAA, ISO, and best practices. 2. We need to increase the ability to get alerts out to system owners and others faster. We need to ensure that these alerts are unique and can be customized to the situation. 3. We must be able to deploy solutions to mission critical servers and networking devices with minimal system impact. Having the ability to use agents and agent less solutions would be recommended. 4. We must be able to bring reports outs faster, and more readily available. 5. We must have support for all countries that we deploy the solution to. 7 P a g e
8 3 EXISTING ENVIRONMENT 3.1 TELEPERFORMANCE GROUP INTERNATIONAL OVERVIEW AND LOCATIONS Teleperformance has over 281 call centers throughout 45 different countries. Additional information can be found at: Teleperformance owns over workstations and 2300 servers worldwide. 8 P a g e
9 9 P a g e August 20, 2008 [TELEPERFORMANCE LOG MANAGEMENT SYSTEM RFP] 4 SUPPLIER REQUIREMENTS & INSTRUCTIONS 4.1 RFP INSTRUCTIONS All vendors are required to follow the instructions in order to be considered in the final evaluation. Failure to comply with these instructions may result in disqualification from consideration. 4.2 QUESTIONS All suppliers must submit questions to [email protected] no later than September 9, :00 p.m. MST. A copy of all questions and their associated responses will be ed to all participants that submitted a question. 4.3 RFP RESPONSE FORMAT Each supplier must provide 1 hard copy response and one softcopy response. RFP responses (both hard copy and softcopy) must be submitted no later than September 16, :00 p.m. MST. PLEASE SUBMIT HARDCOPY TO: Gavin Bailey 1991 South 4650 West Salt Lake City, Utah PLEASE SUBMIT SOFTCOPY TO: [email protected] 4.4 RFP REQUIRED OUTLINE The following table summarizes the mandatory information contents and format requirements of your proposal. Section Section Title Page 1 Executive Summary X 2 Suppliers Background X 3 Customer References X 4 Pricing Structure X 5 Implementation Services & Pricing X 6 Technology Specifics & Compatibility X
10 7 Invoicing Requirements X 8 Detailed System Requirements X Executive Summary please provide your standard corporate executive summary. Supplier Background we are seeking information regarding the background of your organization in order to access the ability of your organization to fulfill the requirements of this RFP in a timely and efficient manner. Please include answers to the following: Provide, company name and headquarters location. Provide length of time of which you have been offering these security technology solutions and services. Provide the names, role, telephone, fax and addresses of primary points of contact within your company. Disclose fully all your relationships with any and all security system providers for Teleperformance. Indicate whether your company is currently in litigation with any organization regarding fulfillment of contractual obligations, performance, or copyright and patent infringement. Conflict of Interest Certification: certify that your firm has no real or potential conflicts of interest which would prevent the supplier from acting in the best interests of Teleperformance. If you are a public company, provide audited financial statements for the past 2 years. Include annual reports if available. If you are a subsidiary of another corporation, include the holding company annual report. If you are a privately held company and will not disclose any financial information, provide the information indicated using either true dollars or percentage information. If you are providing data on a percentage basis, make sure that you scale everything to total sales. That is, assume total sales represents 100% and scale all sales and cost items as a percentage of this number. Any additional information the supplier deems useful for Teleperformance s evaluation of the supplier s qualifications. 4.5 IMPORTANT DATES Date to be received Sept 9, :00 p.m. MST Sept 16, :00 p.m. MST Items to be returned Final Day to Submit Questions Completed RFP Response 10 P a g e
11 5 TERMS AND CONDITIONS 5.1 CONTRACT DURATION For purposes of this RFP, prices quoted for solutions and services are to be valid for a minimum period of 3 years if contract is awarded. 5.2 RFP EXPENSES Any costs incurred by you in preparing and providing a response to this RFP are solely the responsibility of your organization. 5.3 PRICING IS BEST AND FINAL Teleperformance is soliciting a solution to identify a global log management solution(s) and provider(s). Teleperformance plans to implement these solutions globally. This will be heavily weighted to the vendor who provides an acceptable solution with the most attractive pricing. We are looking for global capacity pricing but are not committing to any single purchase or any number of purchases. Our intent is to identify the best solution at the best price, and a global provider or channel partner that offers us the ability to purchase that solution anywhere at that set price. The solution(s) selected will become the standard for all future purchases. Your pricing should include aggressive discounts to be considered as the vendor of choice. Your best and final pricing should be based on the purchase of one 1 solution and not a commitment to more than one. Pricing shall include: Detailed solution costs. Detailed education and training pricing, and availability. Detailed maintenance costs. Any and all other costs must be explained in detail. 11 P a g e
12 5.4 EVALUATION CRITERIA This request for proposal is designed to provide Teleperformance with the ability to determine which supplier will best satisfy the requirements of Teleperformance with the most attractive pricing. The evaluation scoring criteria are listed below. Each category will receive a score in the range of 1-5 with 5 as a high score. Each category will be multiplied by the weight factor to identify the total category score. The total category scores will be added together to determine the vendor solution final score. Category Weight Financials (vendors financial stability) 2 Customer references 2 Scalability 5 Compatibility with our existing security systems, meeting our requirements 5 Additional features of value to us not specified in RFP 2 Total price (solution, implementation and maintenance) 5 Global delivery/sales distribution 4 Teleperformance will reduce the potential suppliers to one or two based upon the evaluation scoring. Teleperformance expects to invite the one or two top suppliers on site to make a formal presentation regarding their proposal to a team of Teleperformance representatives. 5.5 AWARDING OF POTENTIAL BIDS Teleperformance, at its sole discretion, reserves the right to either accept or reject any and all proposals, and do nothing. The existence of this request for information shall not, in any way, obligate Teleperformance to any contractual obligation. The supplier(s) with the highest score will be considered. Teleperformance reserves the right to identify the correct solution and still cancel the RFP if our budget does not support the purchase. 12 P a g e
13 5.6 CUSTOMER REFERENCES Supplier must provide a list of three references that use the proposed solution. Teleperformance will contact these references only at the end of the selection process as part of the due diligence phase of supplier selection. In addition, Teleperformance will only contact these references after the supplier has specifically been asked to arrange for such contact. It is expected that if the supplier lists a reference in their proposal they will have the ability to arrange for a reference call. Include for each reference: Company name Contact name Company address Contact telephone number Contact address 5.7 INVOICING Supplier must include your proposed fee schedule and terms in the proposal. Indicate payment terms in regard to any available percentage discount for early payment. Teleperformance standard payment term is net 45 days. 5.8 NOTE TO SUPPLIER It is expected that all information submitted would be in accordance with what has been clearly outlined in the RFP. Once information has been submitted it is final. The time for questions is clearly detailed in this RFP. Once completed, your signature or that of a duly authorized individual of your company must be affixed, in order for us to acknowledge the fact that you have read the RFP thoroughly and have completed the information request within the stipulated guidelines. 13 P a g e
Detecting a Hacking Attempt
Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6
Symantec Security Information Manager Version 4.7
Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM
ArcSight Supports a Wide Range of Security Relevant Products
ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the
Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF Tripwire Log Center HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards and
REQUEST FOR PROPOSAL
CITY OF MUKILTEO 11930 Cyrus Way Mukilteo, Washington 98275 425-263-8030 www.ci.mukilteo.wa.us REQUEST FOR PROPOSAL IT SERVICES ACQUISTION SCHEDULE The Acquisition Schedule is as follows, with all times
Supported Devices (Event Log Sources)
Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110
REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:
REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,
Configuration Audit & Control
The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration
RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method
RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server
ProtectID. for Financial Services
ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2
Peter Dulay, CISSP Senior Architect, Security BU
CA Enterprise Log Manager 12.5 Peter Dulay, CISSP Senior Architect, Security BU Agenda ELM Overview ELM 12.5: What s new? ELM to CA Access Control/PUPM Integration CA CONFIDENTIAL - Internal Use Only Overview
VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM
VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM 2 REDUCE COSTS. IMPROVE EFFICIENCY. MANAGE RISK. MaxPatrol from Positive Technologies provides visibility and control of security compliance across your entire
REQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES
REQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES Midvale City is inviting qualified vendors to submit a Proposal to recommend, provide and potentially install a Desktop Management
Request for Proposal Managed IT Services 7 December 2009
Request for Proposal Managed IT Services 7 December 2009 BuzzBack, LLC 25 West 45 th Street Suite 202 New York, NY 10036 Table of Contents 1 Summary... 1 2 Proposal Guidelines and Requirements... 1 2.1
CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
REQUEST FOR PROPOSAL STORAGE AREA NETWORK SOLUTIONS FOR THE PARK CITY SCHOOL DISTRICT RFP # 032612
REQUEST FOR PROPOSAL STORAGE AREA NETWORK SOLUTIONS FOR THE PARK CITY SCHOOL DISTRICT RFP # 032612 The Park City School District is soliciting RFP s from qualified professional firms with the intention
Request for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B4400024
RFR Number: (Reference BPO Number) Functional Area (Enter One Only) Section 1 General Information R00B4400024 Functional Area 10 - IT Management Consulting Services Position Title/s or Service Type/s (Short
III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services:
TOWN OF NORTH HAVEN REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY NETWORK SUPPORT SERVICES Issue Date: March 7, 2016 Due Date: 10:00 AM, Monday, March 28, 2016 I. Introduction The Town of North Haven is
CiscoWorks SIMS(Netforensics)
Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture
Acquisition & Implementation of Software Information Systems
SAMPLE REQUEST FOR PROPOSAL Acquisition & Implementation of Software Information Systems Proposal Release Date: Proposal Due Date: TABLE OF CONTENTS Information Technology 1 INTRODUCTION...4 2 STATEMENT
Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org
Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org IMPORTANT NOTICE All proposal question and inquiries must be sent by email to
Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No. 210802
Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No. 210802 Introduction The Pacific Northwest National Laboratory (PNNL) is located in Richland Washington
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
PCI DSS. Get Compliant, Stay Compliant Seminar
PCI DSS Get Compliant, Stay Compliant Seminar ValueSYS Solutions & Services Wael Hosny CEO ValueSYS [email protected] Solutions you Need, with Quality you Deserve Seminar Agenda Time 09:00 10:00
Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month
SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone
Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments
Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5
Monitoring Windows Workstations Seven Important Events
Monitoring Windows Workstations Seven Important Events White Paper 8815 Centre Park Drive Publication Date: October 1, 2009 Columbia MD 21045 877.333.1433 ABSTRACT Monitoring event logs from workstations
1.0 Purpose of Solicitation
Information Technology Consulting Services Notice of Request for Proposal Information Technology Managed Services and Support South Adams County Water and Sanitation District 1.0 Purpose of Solicitation
IBM Endpoint Manager for Server Automation
IBM Endpoint Manager for Server Automation Leverage advanced server automation capabilities with proven Endpoint Manager benefits Highlights Manage the lifecycle of all endpoints and their configurations
REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES
REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES The City of Palmer, AK (hereinafter City) is issuing a Request for Proposal (hereinafter RFP) to obtain the services of a qualified firm to
Prepared by: OIC OF SOUTH FLORIDA. May 2013
OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should
City of Richmond Business and Financial Services Department. Contract 4595P. Security Information Event Management System
Business and Financial Services Department Request for Proposal Security Information Event Management System 1. Introduction The City of Richmond (the City ) requires a Security Information and Event Management
REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES
Isothermal Planning & Development Commission (IPDC) REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the IPDC for Information Technology Support Services. Interested
custom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
How To Manage Your Information Systems At Aerosoft.Com
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Request for Proposal Environmental Management Software
Request for Proposal Date Issued: November 4, 2010 Due Date: December 1, 2010 @ 2:00:00 p.m. (local time), Contact Information: Jeff Yanew Planning & Engineering Telephone: (780) 418-6615 Fax: (780) 458-1974
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Request for Expressions of Interest 3777EOI Fleet Management Software
City of Richmond77 EO Request for Expressions of Interest 3777EOI 1. Introduction 1.1. The City of Richmond (the City ) requires the services of a company experienced in providing Fleet Management Information
PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015
QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):
FUNCTIONAL OVERVIEW www.amdosoft.com
Business Process Protectors Business Service Management Active Error Identification Event Driven Automation Error Handling and Escalation Intelligent Notification Process Reporting IT Management Business
Symantec IT Management Suite 7.5 powered by Altiris
Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,
Oracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services
Sagari Ltd Service Catalogue and Service Level Agreement For Outsource IT Services Managed Services Service Level Agreement 1 Introduction This Service Catalogue and Service Level Agreement (SLA) constitutes
Cisco Security Agent (CSA) Network Admission Control (NAC)
Cisco Security Agent (CSA) Network Admission Control (NAC) Pascal Delprat Security Consultant Cisco France Vincent Bieri Marketing Manager, Security EMEA Technology Marketing Organisation 1 Agenda CSA
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
List of Supported Systems & Devices
List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
AdvancedHosting SM Solutions from SunGard Availability Services
AdvancedHosting SM Solutions from SunGard Availability Services A SINGLE POINT OF CONTACT A COMPLETE MANAGED SERVICES SOLUTION Higher levels of availability Continuous investment in people, technology
SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
Infrastructure Technical Support Services. Request for Proposal
Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
CITY OF GOLETA, CALIFORNIA REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES
CITY OF GOLETA, CALIFORNIA REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES I. PURPOSE The purpose of this Request for Proposals (RFP) is to solicit and select the most qualified consultant
Request for Proposals
Request for Proposals Procurement of a Utility Billing System Issue date: September 14, 2015 Owner: City of Evans 1100 37 th Street Evans, CO 80634 Page 1 of 12 Table of Contents I. Introduction 3 II.
SapphireIMS Business Service Monitoring Feature Specification
SapphireIMS Business Service Monitoring Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission
Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0
Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004 Addendum 1.0 ISSUE DATE: February 23, 2012 Receipt of this addendum should be acknowledged on the Proposal Form. Inquiries
Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
Whitepaper. Business Service monitoring approach
Whitepaper on Business Service monitoring approach - Harish Jadhav Page 1 of 15 Copyright Copyright 2013 Tecknodreams Software Consulting Pvt. Ltd. All Rights Reserved. Restricted Rights Legend This document
Eaton NetWatch v5.0 NetWatch on Microsoft Hyper-V server 2008 Installation and configuration guide
Eaton NetWatch v5.0 NetWatch on Microsoft Hyper-V server 2008 Installation and configuration guide Hyper-V 6.0 NetWatch Main operating system: 2008 Enterprise x64 (hosting Hyper-V) Eaton UPS Eaton NetWatch
IBM Tivoli Remote Control
Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and
ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)
ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
Request for Proposal For Cloud Based Office Productivity Services
Request for Proposal For Cloud Based Office Productivity Services Issue Date: Monday May 16, 2016 Due Date and Time: Wednesday June 8, 2016, 3:00 PM Mountain Time Receipt Location: City of Cottonwood Heights
Symantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
Security Information and Event Management (SIEM) Hardware & Software RFP #15-109309
CITY OF FARMINGTON 800 Municipal Drive Farmington, NM 87401-2663 (505) 599-1373 Fax (505) 599-1377 http://www.fmtn.org REQUEST FOR PROPOSALS FOR Security Information and Event Management (SIEM) Hardware
SapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
Heroix Longitude Quick Start Guide V7.1
Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: [email protected] Notice Heroix provides
Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools
WHATSUP GOLD BUYER S GUIDE Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools 4 Critical Components of Successful Layer 2 Discovery INTRODUCTION TO AUTOMATIC LAYER 2 DISCOVERY & MAPPING Layer
Citadel Security Software Inc.
i Citadel Security Software Inc. Hercules Vulnerability Assessment and Remediation Overview Document Number: 205-01-0007 Hercules v4.1 Document Version: 1.0 May 2006 Acknowledgements THIS SOFTWARE AND
HP PCM Plus v3 Network Management Software Series Overview
Overview HP PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security and extensibility for
How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
PROPOSALS REQUESTED THE TOWN OF OLD ORCHARD BEACH POLICE DEPARTMENT FOR IP-BASED VOICE COMMUNICATION SYSTEM
PROPOSALS REQUESTED BY THE TOWN OF OLD ORCHARD BEACH POLICE DEPARTMENT FOR IP-BASED VOICE COMMUNICATION SYSTEM The Town of Old Orchard Beach will receive sealed bids for an IP based phone system. The project
REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS
REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3
Secospace elog. Secospace elog
Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page
Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success
Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success Copyright 2008 EMC Corporation. All rights reserved.
GFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
How To Write A Request For Information (Rfi)
Request for Information No. 15-200-ACCO Litigation Hold & ediscovery Tool Posting Date: November 14, 2014 Event Timeline: This Request for Information (RFI) is issued by Washington State Department of
ACL Compliance Director FAQ
Abstract Cyber Operations, Inc., Cyber Operations, Inc. Copyright 2008 Cyber Operations, Inc. This document contains frequently asked questions about ACL Compliance Director with answers. Table of Contents...
Citadel Security Software Inc.
i Citadel Security Software Inc. Hercules Vulnerability Assessment and Remediation Overview Document Number: 205-01-0007 Hercules v3.5.1 Document Version: 1.0 February 2005 Acknowledgements THIS SOFTWARE
Eoin Thornton Senior Security Architect Zinopy Security Ltd.
RSA envision: Transform your Security Operations A Technical overview & demo of RSA envision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Perimeter Service... 3 Subscription and Activation... 3 Multi Scanner Support...
Virtualization Journey Stages
Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey
ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER
QUICKSTART GUIDE: ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER TABLE OF CONTENTS Introduction...2 Getting Started...4 Configuring Log Sources...4 Common Log Sources...5 INTRODUCTION A FRESH APPROACH TO IDENTIFYING
