Question & Answer Amendment for the Mainframe Security Auditing Software SSN Submission Deadline: Monday, June 22, UNCHANGED
|
|
|
- Jody Lyons
- 9 years ago
- Views:
Transcription
1 Question & Answer Amendment for the Mainframe Security Auditing Software SSN Submission Deadline: Monday, June 22, UNCHANGED Below highlighted in yellow - are the questions received in reply to the subject SSN and the FRTIB s responses to those questions - highlighted in gray: The mainframe (z/os) security auditing software shall: o Gather/collect system hardware and software information to create a baseline. o What types of systems and hardware are within scope of this requirement? All define OS hardware components and peripheral devices? All installed software on the system? o The FRTIB recognizes that different software solutions will/may be limited in what details can be collected for hardware and software. Our desire is to collect such information as to provide potential auditors with a baseline of the overall mainframe infrastructure including, to the best of the ability of the security auditing software, the type of hardware and the installed software. The basic list of hardware currently used includes, but is not limited to: IBM EC12 mainframe; IBM 3494 tape library; EMC VMAX 20K storage array; the basic list of software includes but is not limited to: z/os; FDR; CA-Top Secret (and other CA products); EMC storage software; and Compuware software. Automate audit and compliance reporting. o Automate in what manner? Is the requirement to be able to batch run on a scheduling system of predefined audit and compliance reports? Are these reports to be event triggered? What is the definition of audit and compliance reporting? Are there specific guidelines like PCI/DSS, DISA STIG or other specific events that are to be captured and reported on? o The DISA STIGs framework is used at the FRTIB. Automated reporting may include scheduled batch reports and ad-hoc, on-demand reporting. Monitor, track, and report on changes to started tasks. o Is this a real-time requirement or a post forensic type of requirement? Are alerts also required for critical started tasks should a change occur to it. Does this requirement apply to the underlying JCL/PROC/loadlibs the started task executes or the running task itself? o The monitoring, tracking, and reporting features will be used to report on and alert to changes to the JCL/PROCs/ & loadlibs of system level data sets & members, primarily through batch reporting. Monitor and report on privileged users to detect possible insider abuses and compliance violations. o What type of parameters constitute insider abuses? Can you provide a specific use case that identifies what type of activity is considered abusive? If an organization is invited in for a demonstration, this can be discussed at that time. o Compliance is a very broad category of violations can you define what compliance means specifically? Are there specific regulatory guidelines you are trying to adhere to like PCI/DSS, DISA STIG and what are they? If an organization is invited in for a demonstration, this can be discussed at that time.
2 Other desired features include: o Identify and report security weaknesses. What is considered a security weakness? Is there a set of definitions that describe the minimum acceptable level of security for the resources on the system? Examples of security weaknesses are: unprotected systems level datasets, changes to system level data sets and members, started tasks being stopped, etc. Part of our desire to explore different solution is that we will use the abilities of the selected tool to assist with defining potential weaknesses. Analyze and report activity to detect, prioritize, and remediate security risks. o What is the criteria for analysis to determine what a specific priority should be for a detected security risk event? Is remediation to be real-time and automated or is the requirement to provide a workflow capability to track, report on identified security risks from a project management perspective much like a service desk tool or source management type of tool would do for their respective areas? o We do not expect the security auditing tool to actually mediate security risks. If multiple risks are detected though a recommended prioritization report it is desired to assist with the mediation planning. o Please define what type of reporting is to be performed real-time? Is it just an alert on a console? A to a predefined set of recipients? A report that is automatically triggered and routed somewhere? What is the scope of Security alert? Is there a set of predefined minimum levels that are acceptable and only if exceeded are to be reported on? o Reporting may be real-time to a monitored console, ed alerts, automatic reports (via batch jobs) and ad-hoc reporting. The FRTIB recognizes that different tools/solutions may provide different capabilities and therefore wants to review all potential solutions. Monitor and report on system file (data set) usage. o What is the definition of system file (data set) usage? Is it who accessed it when? How many time over a given period? Does the level of usage matter for example if it was read from the file, write to the file, etc.? Is this a real-time need or a post forensic need? o This is a requirement to report on changes (who, what, when) to data sets such as (but not limited too) SYS1.PROCLIB, SYS1.PARMLIB, etc. We would expect that the FRTIB will be able to identify which datasets we want to monitor. Can we get more clarification on the section: Reliability, Availability, Maintainability: The Agency seeks to discover a software solution that is reliable, available, and maintainable in accordance with industry standard performance. We are unsure of what 'industry standard performance' FRTIB is referencing. o The term industry standard performance for this request is simply defined as a solution that will not consume inordinate resources (CPU, I/O cycles, memory, etc.) and will operate (produce reports, respond to ad-hoc queries, produce alerts) in a timely fashion.
3 Clarifying Note: In developing the desired requirements detailed below, the FRTIB attempted to use language and terms taken directly from the publically accessible web page of multiple solution providers. The FRTIB recognizes that not all terms equate directly to all solutions.
4 Sources Sought Notice: z/os Mainframe Security Auditing & Reporting Software for the Federal Retirement Thrift Investment Board NOTE: This Sources Sought Notice (SSN) is issued to obtain information and aid the Federal Retirement Thrift Investment Board s (FRTIB s) planning efforts. It is not a solicitation and shall not be considered as a commitment by the Government. All firms responding to this SSN are advised that submissions will not be considered as quotations, bids or offers eligible for contract award. Introduction: The FRTIB s Office of Technology Services (OTS) seeks to obtain capability statements, information and a free capabilities demonstration of Mainframe Security Auditing & Reporting software to provide internal auditing and reporting capabilities for the FRTIB s mainframe. Information regarding desired software capabilities may be found in Appendix A. Appendix B provides a brief overview of existing hardware and software infrastructure. The FRTIB invites potential respondents to provide information detailing any baseline requirements for implementation of their software within submissions. This document requests vendor information along with software capabilities, installation, integration, training, and support information. The FRTIB will review responses received and may contact qualified submitters to arrange a capability demonstration. Following the conclusion of all market research and requirement definition activities, if the FRTIB determines that a defined need exists it will issue an appropriate solicitation with anticipated contract award and implementation of the Auditing software beginning during the Fall/Winter of Questions regarding this SSN must be submitted to the Contracting Officer Ms. H. Elease Sanders solely via by sending a message to [email protected] by 11:59 p.m. E.T. on Monday, June 8, Interested parties must submit formal responses to this SSN solely via by sending a message to [email protected] by 11:59 p.m. E.T. on Monday, June 22, Late submissions will not be considered unless doing so is determined to be in the best interest of the FRTIB. Training Requirements: Please make your recommendations for Agency (contractor staff and FRTIB employees) training for 7 to 12 administrators (systems programmers, security administrators, and management). Demonstration: Developers and authorized resellers shall propose a plan for further explaining the capabilities of qualified offered products during a capability demonstration. Respondents invited to participate in on-site demonstrations shall have 120 minutes to provide a capability demonstration that, while not viewed as an oral presentation as defined within FAR 15, displays system functionality to illustrate, how the offered solution satisfies the identified requirement and explains how the product shall be purchased and set-up in order to achieve the stated functionality.
5 Prices: Submitted price and cost information must include amounts for all material (e.g., user manuals), software, user licenses, recommended maintenance and recommended training as individual line items along with pricing for ongoing hosting fees, if any. Reliability, Availability, Maintainability: The Agency seeks to discover a software solution that is reliable, available, and maintainable in accordance with industry standard performance. Appendix A: The mainframe (z/os) security auditing software shall: o Be compatible with CA-TopSecret. o Gather/collect system hardware and software information to create a baseline. o Document, track and monitor the current baseline and system library changes. o Automate audit and compliance reporting. o Operate under z/os 1.12, 1.13, 2.1 and future expected releases. o Monitor, track, and report on changes to privileged programs. o Monitor, track, and report on changes to started tasks. o Monitor and report on privileged users to detect possible insider abuses and compliance violations. Other desired features include: o Identify and report security weaknesses. o Analyze and report activity to detect, prioritize, and remediate security risks. o Report real-time security alerts. o Monitor and report on system file (data set) usage. Appendix B: The FRTIB basic mainframe infrastructure is comprised of an IBM zec H43, Model 703 mainframe in the primary data center and an IBM zbc H06, Model A01 at the alternate site. The alternate site is for disaster recovery (DR) and DR testing only. The operating system is z/os. CA-TopSecret is used for access control and security. Major applications include: CICS, DB2, Oracle, and OMNI applications.
State of Iowa REQUEST FOR INFORMATION. RFI #1217005002 State of Iowa ERP System Maintenance, Upgrades and Services
State of Iowa REQUEST FOR INFORMATION RFI #1217005002 State of Iowa ERP System Maintenance, Upgrades and Services Section 1- Background and Objectives 1.1 Purpose The objective of this Request for Information
Request for Proposal Environmental Management Software
Request for Proposal Date Issued: November 4, 2010 Due Date: December 1, 2010 @ 2:00:00 p.m. (local time), Contact Information: Jeff Yanew Planning & Engineering Telephone: (780) 418-6615 Fax: (780) 458-1974
REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925
I. PURPOSE REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925 The State of Florida, Agency for State Technology (AST), hereby issues this Request for
OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire
OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic
Title: Contract Management Software Solutions (CMS) and Procurement Front-End System
Page 1 Universal Service Administrative Company (USAC) Request for Information (RFI) for Contract Management Software Solutions and Procurement Front-End System RFI Number: USAC-FI-2016-02-005-RFI Title:
Auditing in an Automated Environment: Appendix C: Computer Operations
Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations
Application Backup and Restore using Fast Replication Services. Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973
Application Backup and Restore using Fast Replication Services Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973 Session Agenda What is IBM Tivoli Advanced Backup and Recovery
Document Management System Request for Proposals April 22, 2013
FINANCE DEPARTMENT Office (402) 562-4231 Fax (402) 563-1380 Document Management System Request for Proposals April 22, 2013 Overview: The City of Columbus, Nebraska (hereafter referred to as City ) is
Samples of Management Consulting Assignments. Performed by DCAG are. Provided in the following pages.
Samples of Management Consulting Assignments Performed by DCAG are Provided in the following pages. Thomas Bronack 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Cell: (917) 673-6992 Email:
City of Vallejo REQUEST FOR PROPOSAL WORKERS COMPENSATION CLAIMS AUDIT
City of Vallejo REQUEST FOR PROPOSAL WORKERS COMPENSATION CLAIMS AUDIT Date original issued: September 28, 2015 Qualifications Statements due: The City of Vallejo will consider Proposals submitted in response
City of Kenmore, Washington
City of Kenmore, Washington Financial Management Software System Request for Proposals Issued: November 2, 2015 Date Due: December 4, 2015 Time Due: 5:00 p.m. Pacific Standard Time Page 1 of 10 1. Introduction
Analyzing IBM i Performance Metrics
WHITE PAPER Analyzing IBM i Performance Metrics The IBM i operating system is very good at supplying system administrators with built-in tools for security, database management, auditing, and journaling.
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER
BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER Table of Contents Executive Summary............................................... 1 New Functionality...............................................
Request for Proposal Permitting Software
Request for Proposal Permitting Software Date Issued: October 7, 2015 Proposals Due no later than: 2:00pm EST on November 10, 2015 Page 1 of 10 Revised 10/5/2015 TABLE OF CONTENTS Section I Introduction
How To Move From Iseries To Iseries Content Manager On A Microsoft Computer (For A Non-Profit)
Enterprise Content Management Request For Information Issue Date: October 18, 2013 Table of Contents Request for Information: Purpose, Scope, and Objectives 4 Louisiana State Employees Retirement System
Scope Statement for DST IT Disaster Recovery Services
Scope Statement Administrative Services Division Information Technology Section AUTHORIZATION TO AWARD 3/23/01 VENDOR: IBM BUSINESS CONTINUITY AND RECOVERY SERVICES Scope Statement for DST IT Disaster
Q1. Have the item specifications & attached documents been uploaded? If so could you provided the URL to access?
Response to Industry Questions Q1. Have the item specifications & attached documents been uploaded? If so could you provided the URL to access? A1. Yes, all item specifications and attached documents have
CA Tape Encryption Key Manager
PRODUCT BRIEF: CA TAPE ENCRYPTION KEY MANAGER Manager CA TAPE ENCRYPTION KEY MANAGER IS THE FIRST z/os-based, SOFTWARE TAPE ENCRYPTION KEY SOLUTION THAT CONSOLIDATES AND UNIFIES MANAGEMENT ACROSS MULTIPLE
REQUEST FOR PROPOSAL (RFP)
REQUEST FOR PROPOSAL (RFP) Subject: Due Date/Time: Submit To: Financial Management & Utility Billing Software March 28, 201412:00 pm Eastern Standard Time Chris Wilson Village of Beverly Hills 18500 W
ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE
ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE CONFIGURATION MANAGEMENT PACK FEATURES Automated discovery of dependency relationships between services, systems and Oracle
IT Service Management
RL Consulting People Process Technology Organization Integration IT Service Management Change Management Methods and Implementation Best Practices White Paper Prepared by: Rick Leopoldi June 19, 2002 Change
CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS
CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS to provide INFORMATION TECHNOLOGY SUPPORT SERVICES Issued: November 2, 2009 Submit completed application to: City of Milton 1000 Laurel Street Milton, WA
UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment
UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose
REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING
4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the
City of Winooski. Request for Proposals Department of Public Works ASSET MANAGEMENT SOFTWARE, IMPLEMENTATION AND TRAINING
City of Winooski Request for Proposals Department of Public Works ASSET MANAGEMENT SOFTWARE, IMPLEMENTATION AND TRAINING Issued: February 29, 2016 Deadline for Submissions: 4:00 p.m., March 25, 2016 INTRODUCTION
REQUEST FOR PROPOSAL: GIS MANAGEMENT AND DESIGN SUPPORT: FOR UTILITY SERVICES OCTOBER 21, 2011 CITY OF ALEXANDRIA DIVISIONS OF FINANCE AND UTILITIES
REQUEST FOR PROPOSAL: GIS MANAGEMENT AND DESIGN SUPPORT: FOR UTILITY SERVICES OCTOBER 21, 2011 CITY OF ALEXANDRIA DIVISIONS OF FINANCE AND UTILITIES Table of Contents 1 Introduction...2 1.1 Overview...
CA Scheduler Job Management r11
PRODUCT SHEET CA Scheduler Job Management CA Scheduler Job Management r11 CA Scheduler Job Management r11 (CA Scheduler JM), part of the Job Management solution from CA Technologies, is a premier z/oscentric
ADDENDUM NUMBER TWO (2) TO THE REQUEST FOR PROPOSAL (RFP) FOR FINANCIAL PLANNER POOL, RFP NUMBER 2P200815.
March 27, 2009 California State Teachers Retirement System Vikki Eszlinger, Contract Services 7667 Folsom Boulevard, MS #30 Sacramento, CA 95826-2614 (916) 229-4111 FAX (916) 229-3881 [email protected]
The Operating System Lock Down Solution for Linux
The Operating System Lock Down Solution for Linux The Challenge: Meeting Organizational Security Requirements Linux Operating System Security Operating system (OS) security is a priority for System Administrators
REQUEST FOR INFORMATION for Procurement Front-End System Modernization for The CITY OF PHILADELPHIA PROCUREMENT DEPARTMENT
REQUEST FOR INFORMATION for Procurement Front-End System Modernization for The CITY OF PHILADELPHIA PROCUREMENT DEPARTMENT Issued by: The Office of Innovation and Technology (OIT) June 25, 2014 Vendor
Request for Proposal For Document Management System
Request for Proposal For Document Management System June 13, 2014 1708 East Arlington Blvd. Greenville, NC 27858-5872 This solicitation should not be interpreted as a contract (implicit, explicit, or implied),
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
APPENDIX 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT MAINFRAME & SERVER SERVICES SOW EXHIBIT P TO AMENDMENT NO.
EHIBIT P TO AMENDMENT NO. 60 APPENDI 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT P TO AMENDMENT NO. 60
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
Request for Proposal (RFP) K3311 Disaster Recovery as a Service (DRaaS)
1. SCHEDULE EVENT Request for Proposal (RFP) K3311 Disaster Recovery as a Service (DRaaS) DATES & TIME Issue Solicitation April 27, 2015 Question & Answer Period April 27 May 4, 2015 Complaint Period Begins
IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions
IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions What You Will Learn Businesses increasingly use IT automation tools to meet the challenge of managing their data centers. This document
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services:
TOWN OF NORTH HAVEN REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY NETWORK SUPPORT SERVICES Issue Date: March 7, 2016 Due Date: 10:00 AM, Monday, March 28, 2016 I. Introduction The Town of North Haven is
LACKAWANNA COUNTY BOARD OF COMMISSIONERS REQUEST FOR QUALIFICATIONS FOR ELECTRONIC DOCUMENT MANAGEMENT SOLUTION. November 22, 2011
LACKAWANNA COUNTY BOARD OF COMMISSIONERS REQUEST FOR QUALIFICATIONS FOR ELECTRONIC DOCUMENT MANAGEMENT SOLUTION November 22, 2011 NOTICE IS HEREBY GIVEN that pursuant to a fair and open process, sealed
Request for Information RFI #15/16-300 for Enterprise Password Management Software
Company Name: This RFI response has been submitted by: Address: (Street, Su. # City, State, Zip) Request for Information RFI #15/16-300 for Enterprise Password Management Software Contact Name: Telephone
REQUEST FOR INFORMATION (RFI) DRCI-16-2209 PREVENTATIVE MAINTENANCE OPTIMIZATION SYSTEM
Date February 1, 2016 Page 1 REQUEST FOR INFORMATION (RFI) PREVENTATIVE MAINTENANCE OPTIMIZATION SYSTEM RESPONSE DEADLINE: RFI responses are due by to Noon, Local Time on Tuesday, February 16, 2016 ADDRESS
Symantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM
STATE OF TENNESSEE Alcohol Beverage Commission REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM DATE: JUNE 3, 2015 RFI # 31603-15001 IS AMENDED AS FOLLOWS:
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
Brown County Information Technology Aberdeen, SD. Request for Proposals For Document Management Solution. Proposals Deadline: Submit proposals to:
Brown County Information Technology Aberdeen, SD Request for Proposals For Document Management Solution Proposals Deadline: 9:10am, January 12, 2016 Submit proposals to: Brown County Auditor 25 Market
Questions and Answers (1) to HQ0034-FVAP-11-BAA-0001
Questions and Answers (1) to HQ0034-FVAP-11-BAA-0001 1. Would you explain a little more about it? If we were to be awarded funds, what would they be used for etc. Answer: Provided in the grant announcement
RFP Questions and Clarifications Memorandum
RFP Questions and Clarifications Memorandum To: Vendors Responding to RFP Number 3798 for the Mississippi Department of Human Services (MDHS) From: Craig P. Orgeron, Ph.D. Date: September 18, 2015 Subject:
Infrastructure Technical Support Services. Request for Proposal
Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable
DAIDS Appendix 2 No.: DWD-POL-DM-01.00A2. Data Management Requirements for Central Data Management Facilities
DAIDS Appendix 2 No.: DWD-POL-DM-01.00A2 Data Management Requirements for Central Data Management Facilities The following clinical trial data management requirements must be met in order to ensure the
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
REQUEST FOR INFORMATION (RFI) Health Interface Engine Solution
City of Philadelphia Department of Public Health 1401 JFK Blvd Suite 600 Philadelphia, PA 19102 REQUEST FOR INFORMATION (RFI) This document contains a Request for Information (RFI) for an interface engine
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
AUSTIN PEAY STATE UNIVERSITY RFQ 16-090 Package Tracking System Questions & Answers
1) Is any type of SSO (single sign-on) integration required for your system installation? If yes, please specify if there is a preference between CAS or SAML2. We will want to authenticate against our
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
REQUEST FOR PROPOSAL (RFP) for Provide Document Imaging & Archiving Solution And Develop Application Process Workflow on MS SharePoint
REQUEST FOR PROPOSAL (RFP) for Provide Document Imaging & Archiving Solution And Develop Application Process Workflow on MS SharePoint May 2016 Housing Development Finance Corporation Plc. Information
SOLICITATION NO.: DHCF-HCOA-2009-P-0001 RESPONSES TO SUBMITTED QUESTIONS
Department of Health Care Finance Government of the District of Columbia Office of Contracts and Compliance 825 North Capitol Street NE, Suite 5135 Washington, DC 20002 Phone: 202-442-5988 SOLICITATION
City and County of San Francisco Office of the Treasurer & Tax Collector TTX Debt Collection Software RFI
The City and County of San Francisco is requesting information from businesses that can provide comprehensive software solutions in Debt Collection and Delinquency Management software for the Bureau of
MARION COUNTY Information Technology. REQUEST FOR INFORMATION Integrated IT Help Desk Client Management Software Suite
MARION COUNTY Information Technology REQUEST FOR INFORMATION Integrated IT Help Desk Client Management Software Suite DATE & TIME RESPONSES ARE DUE: January 2, 2015, at 2:00 PM Envelope(s) shall be sealed
Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
TSM Backup Service. Standard Service Level Agreement
TSM Backup Service Standard Service Level Agreement University Of Michigan Information Technology and Services 7/1/2008 1.0 Overview Service Level Agreements (SLAs) are between Information Technology and
Ms. Debbie Davenport Auditor General Office of the Auditor General 2910 North 44 th Street, Suite 410 Phoenix, Arizona 85018. Dear Ms.
Janet Napolitano Governor ARIZONA DEPARTMENT OF ECONOMIC SECURITY 1717 W. Jefferson P.O. Box 6123 Phoenix, AZ 85005 David A. Berns Director Ms. Debbie Davenport Auditor General Office of the Auditor General
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
CA IT Client Manager Asset Inventory and Discovery
DATA SHEET: ASSET INVENTORY AND DISCOVERY CA IT Client Manager Asset Inventory and Discovery CA IT CLIENT MANAGER DELIVERS EXTENSIVE ASSET INVENTORY AND DISCOVERY CAPABILITIES THAT HELP YOU MAINTAIN ACCURATE
SCOPE: Role Descriptions/Job Profiles
SCOPE: Role Descriptions/Job Profiles a) Computing Infrastructure 1. Exchange Administrator Assists with ensuring the availability of email servers and applications, configuring new implementations, and
BID SPECIFICATION PACKAGE
REQUEST FOR PROPOSALS: E-RATE TELEPHONE SYSTEM & COMPLETE INTERNAL CONNECTIONS BID SPECIFICATION PACKAGE FOR: HOUSTON GATEWAY ACADEMY, INC. REQUEST FOR PROPOSAL Telephone System for Houston Gateway Academy,
Department of Economic Opportunity
Department of Economic Opportunity REQUEST FOR INFORMATION Information Acknowledgement Form Page 1 of 9 pages SUBMIT RESPONSE TO: Department of Economic Opportunity DEPARTMENT RELEASE DATE: May 1, 2013
December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.
Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,
Request for Proposal For: CQ5 Java Developer. ABA Information Systems April 11, 2013. Table of Contents
Request for Proposal For: CQ5 Java Developer ABA Information Systems April 11, 2013 Table of Contents Bid Timetable [2] 1.0 General Information [3] 2.0 Proposal Requirements [6] 3.0 Criteria for Selection
Hosted Contact Center RFQC 98000-0000001097 Questions and Answers
Hosted Contact Center Q&A s 1-4, Released 4/24/14 1. Appendix A I noticed that on the Appendix A there is only 5 pages and that pages 6 and 7 are not yet provided. Will they be updated soon? 2. Section
SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02. IT Backup, Recovery and Disaster Recovery Planning
SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02 IT Backup, Recovery and Disaster Recovery Planning Executive Summary Introduction As part of the 2011/12 Audit Plan and following discussions
[UNIFIER USER MANUAL]
2015 [UNIFIER USER MANUAL] This manual is intended to provide HRSD commissioned Engineers and Contractors guidance on using the Unifier Enterprise Project Management System TABLE OF CONTENTS 1. UNIFIER
PATROL From a Database Administrator s Perspective
PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks
Cloud-based Managed Services for SAP. Service Catalogue
Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...
Request for Proposal Technology Services Maintenance and Support
Request for Proposal Technology Services Maintenance and Support Maintenance and Support July 19, 2014 Celerity Educational Group is seeking an IT consulting firm to manage Maintenance of our Network Systems
City of Woodinville, Washington
City of Woodinville, Washington Telecommunications Analysis and Options Report Request for Proposal Issue Date: December 22nd, 2014 Due Date: January 22nd, 2015 Due Time: 4:00 PM Page 1 of 10 TABLE OF
