Question & Answer Amendment for the Mainframe Security Auditing Software SSN Submission Deadline: Monday, June 22, UNCHANGED

Size: px
Start display at page:

Download "Question & Answer Amendment for the Mainframe Security Auditing Software SSN Submission Deadline: Monday, June 22, UNCHANGED"

Transcription

1 Question & Answer Amendment for the Mainframe Security Auditing Software SSN Submission Deadline: Monday, June 22, UNCHANGED Below highlighted in yellow - are the questions received in reply to the subject SSN and the FRTIB s responses to those questions - highlighted in gray: The mainframe (z/os) security auditing software shall: o Gather/collect system hardware and software information to create a baseline. o What types of systems and hardware are within scope of this requirement? All define OS hardware components and peripheral devices? All installed software on the system? o The FRTIB recognizes that different software solutions will/may be limited in what details can be collected for hardware and software. Our desire is to collect such information as to provide potential auditors with a baseline of the overall mainframe infrastructure including, to the best of the ability of the security auditing software, the type of hardware and the installed software. The basic list of hardware currently used includes, but is not limited to: IBM EC12 mainframe; IBM 3494 tape library; EMC VMAX 20K storage array; the basic list of software includes but is not limited to: z/os; FDR; CA-Top Secret (and other CA products); EMC storage software; and Compuware software. Automate audit and compliance reporting. o Automate in what manner? Is the requirement to be able to batch run on a scheduling system of predefined audit and compliance reports? Are these reports to be event triggered? What is the definition of audit and compliance reporting? Are there specific guidelines like PCI/DSS, DISA STIG or other specific events that are to be captured and reported on? o The DISA STIGs framework is used at the FRTIB. Automated reporting may include scheduled batch reports and ad-hoc, on-demand reporting. Monitor, track, and report on changes to started tasks. o Is this a real-time requirement or a post forensic type of requirement? Are alerts also required for critical started tasks should a change occur to it. Does this requirement apply to the underlying JCL/PROC/loadlibs the started task executes or the running task itself? o The monitoring, tracking, and reporting features will be used to report on and alert to changes to the JCL/PROCs/ & loadlibs of system level data sets & members, primarily through batch reporting. Monitor and report on privileged users to detect possible insider abuses and compliance violations. o What type of parameters constitute insider abuses? Can you provide a specific use case that identifies what type of activity is considered abusive? If an organization is invited in for a demonstration, this can be discussed at that time. o Compliance is a very broad category of violations can you define what compliance means specifically? Are there specific regulatory guidelines you are trying to adhere to like PCI/DSS, DISA STIG and what are they? If an organization is invited in for a demonstration, this can be discussed at that time.

2 Other desired features include: o Identify and report security weaknesses. What is considered a security weakness? Is there a set of definitions that describe the minimum acceptable level of security for the resources on the system? Examples of security weaknesses are: unprotected systems level datasets, changes to system level data sets and members, started tasks being stopped, etc. Part of our desire to explore different solution is that we will use the abilities of the selected tool to assist with defining potential weaknesses. Analyze and report activity to detect, prioritize, and remediate security risks. o What is the criteria for analysis to determine what a specific priority should be for a detected security risk event? Is remediation to be real-time and automated or is the requirement to provide a workflow capability to track, report on identified security risks from a project management perspective much like a service desk tool or source management type of tool would do for their respective areas? o We do not expect the security auditing tool to actually mediate security risks. If multiple risks are detected though a recommended prioritization report it is desired to assist with the mediation planning. o Please define what type of reporting is to be performed real-time? Is it just an alert on a console? A to a predefined set of recipients? A report that is automatically triggered and routed somewhere? What is the scope of Security alert? Is there a set of predefined minimum levels that are acceptable and only if exceeded are to be reported on? o Reporting may be real-time to a monitored console, ed alerts, automatic reports (via batch jobs) and ad-hoc reporting. The FRTIB recognizes that different tools/solutions may provide different capabilities and therefore wants to review all potential solutions. Monitor and report on system file (data set) usage. o What is the definition of system file (data set) usage? Is it who accessed it when? How many time over a given period? Does the level of usage matter for example if it was read from the file, write to the file, etc.? Is this a real-time need or a post forensic need? o This is a requirement to report on changes (who, what, when) to data sets such as (but not limited too) SYS1.PROCLIB, SYS1.PARMLIB, etc. We would expect that the FRTIB will be able to identify which datasets we want to monitor. Can we get more clarification on the section: Reliability, Availability, Maintainability: The Agency seeks to discover a software solution that is reliable, available, and maintainable in accordance with industry standard performance. We are unsure of what 'industry standard performance' FRTIB is referencing. o The term industry standard performance for this request is simply defined as a solution that will not consume inordinate resources (CPU, I/O cycles, memory, etc.) and will operate (produce reports, respond to ad-hoc queries, produce alerts) in a timely fashion.

3 Clarifying Note: In developing the desired requirements detailed below, the FRTIB attempted to use language and terms taken directly from the publically accessible web page of multiple solution providers. The FRTIB recognizes that not all terms equate directly to all solutions.

4 Sources Sought Notice: z/os Mainframe Security Auditing & Reporting Software for the Federal Retirement Thrift Investment Board NOTE: This Sources Sought Notice (SSN) is issued to obtain information and aid the Federal Retirement Thrift Investment Board s (FRTIB s) planning efforts. It is not a solicitation and shall not be considered as a commitment by the Government. All firms responding to this SSN are advised that submissions will not be considered as quotations, bids or offers eligible for contract award. Introduction: The FRTIB s Office of Technology Services (OTS) seeks to obtain capability statements, information and a free capabilities demonstration of Mainframe Security Auditing & Reporting software to provide internal auditing and reporting capabilities for the FRTIB s mainframe. Information regarding desired software capabilities may be found in Appendix A. Appendix B provides a brief overview of existing hardware and software infrastructure. The FRTIB invites potential respondents to provide information detailing any baseline requirements for implementation of their software within submissions. This document requests vendor information along with software capabilities, installation, integration, training, and support information. The FRTIB will review responses received and may contact qualified submitters to arrange a capability demonstration. Following the conclusion of all market research and requirement definition activities, if the FRTIB determines that a defined need exists it will issue an appropriate solicitation with anticipated contract award and implementation of the Auditing software beginning during the Fall/Winter of Questions regarding this SSN must be submitted to the Contracting Officer Ms. H. Elease Sanders solely via by sending a message to [email protected] by 11:59 p.m. E.T. on Monday, June 8, Interested parties must submit formal responses to this SSN solely via by sending a message to [email protected] by 11:59 p.m. E.T. on Monday, June 22, Late submissions will not be considered unless doing so is determined to be in the best interest of the FRTIB. Training Requirements: Please make your recommendations for Agency (contractor staff and FRTIB employees) training for 7 to 12 administrators (systems programmers, security administrators, and management). Demonstration: Developers and authorized resellers shall propose a plan for further explaining the capabilities of qualified offered products during a capability demonstration. Respondents invited to participate in on-site demonstrations shall have 120 minutes to provide a capability demonstration that, while not viewed as an oral presentation as defined within FAR 15, displays system functionality to illustrate, how the offered solution satisfies the identified requirement and explains how the product shall be purchased and set-up in order to achieve the stated functionality.

5 Prices: Submitted price and cost information must include amounts for all material (e.g., user manuals), software, user licenses, recommended maintenance and recommended training as individual line items along with pricing for ongoing hosting fees, if any. Reliability, Availability, Maintainability: The Agency seeks to discover a software solution that is reliable, available, and maintainable in accordance with industry standard performance. Appendix A: The mainframe (z/os) security auditing software shall: o Be compatible with CA-TopSecret. o Gather/collect system hardware and software information to create a baseline. o Document, track and monitor the current baseline and system library changes. o Automate audit and compliance reporting. o Operate under z/os 1.12, 1.13, 2.1 and future expected releases. o Monitor, track, and report on changes to privileged programs. o Monitor, track, and report on changes to started tasks. o Monitor and report on privileged users to detect possible insider abuses and compliance violations. Other desired features include: o Identify and report security weaknesses. o Analyze and report activity to detect, prioritize, and remediate security risks. o Report real-time security alerts. o Monitor and report on system file (data set) usage. Appendix B: The FRTIB basic mainframe infrastructure is comprised of an IBM zec H43, Model 703 mainframe in the primary data center and an IBM zbc H06, Model A01 at the alternate site. The alternate site is for disaster recovery (DR) and DR testing only. The operating system is z/os. CA-TopSecret is used for access control and security. Major applications include: CICS, DB2, Oracle, and OMNI applications.

State of Iowa REQUEST FOR INFORMATION. RFI #1217005002 State of Iowa ERP System Maintenance, Upgrades and Services

State of Iowa REQUEST FOR INFORMATION. RFI #1217005002 State of Iowa ERP System Maintenance, Upgrades and Services State of Iowa REQUEST FOR INFORMATION RFI #1217005002 State of Iowa ERP System Maintenance, Upgrades and Services Section 1- Background and Objectives 1.1 Purpose The objective of this Request for Information

More information

Request for Proposal Environmental Management Software

Request for Proposal Environmental Management Software Request for Proposal Date Issued: November 4, 2010 Due Date: December 1, 2010 @ 2:00:00 p.m. (local time), Contact Information: Jeff Yanew Planning & Engineering Telephone: (780) 418-6615 Fax: (780) 458-1974

More information

REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925

REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925 I. PURPOSE REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925 The State of Florida, Agency for State Technology (AST), hereby issues this Request for

More information

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic

More information

Title: Contract Management Software Solutions (CMS) and Procurement Front-End System

Title: Contract Management Software Solutions (CMS) and Procurement Front-End System Page 1 Universal Service Administrative Company (USAC) Request for Information (RFI) for Contract Management Software Solutions and Procurement Front-End System RFI Number: USAC-FI-2016-02-005-RFI Title:

More information

Auditing in an Automated Environment: Appendix C: Computer Operations

Auditing in an Automated Environment: Appendix C: Computer Operations Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations

More information

Application Backup and Restore using Fast Replication Services. Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973

Application Backup and Restore using Fast Replication Services. Ron Ratcliffe rratcliffe@rocketsoftware.com March 13, 2012 Session Number 10973 Application Backup and Restore using Fast Replication Services Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973 Session Agenda What is IBM Tivoli Advanced Backup and Recovery

More information

Document Management System Request for Proposals April 22, 2013

Document Management System Request for Proposals April 22, 2013 FINANCE DEPARTMENT Office (402) 562-4231 Fax (402) 563-1380 Document Management System Request for Proposals April 22, 2013 Overview: The City of Columbus, Nebraska (hereafter referred to as City ) is

More information

Samples of Management Consulting Assignments. Performed by DCAG are. Provided in the following pages.

Samples of Management Consulting Assignments. Performed by DCAG are. Provided in the following pages. Samples of Management Consulting Assignments Performed by DCAG are Provided in the following pages. Thomas Bronack 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Cell: (917) 673-6992 Email:

More information

City of Vallejo REQUEST FOR PROPOSAL WORKERS COMPENSATION CLAIMS AUDIT

City of Vallejo REQUEST FOR PROPOSAL WORKERS COMPENSATION CLAIMS AUDIT City of Vallejo REQUEST FOR PROPOSAL WORKERS COMPENSATION CLAIMS AUDIT Date original issued: September 28, 2015 Qualifications Statements due: The City of Vallejo will consider Proposals submitted in response

More information

City of Kenmore, Washington

City of Kenmore, Washington City of Kenmore, Washington Financial Management Software System Request for Proposals Issued: November 2, 2015 Date Due: December 4, 2015 Time Due: 5:00 p.m. Pacific Standard Time Page 1 of 10 1. Introduction

More information

Analyzing IBM i Performance Metrics

Analyzing IBM i Performance Metrics WHITE PAPER Analyzing IBM i Performance Metrics The IBM i operating system is very good at supplying system administrators with built-in tools for security, database management, auditing, and journaling.

More information

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data

More information

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments. Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover

More information

BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER

BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER Table of Contents Executive Summary............................................... 1 New Functionality...............................................

More information

Request for Proposal Permitting Software

Request for Proposal Permitting Software Request for Proposal Permitting Software Date Issued: October 7, 2015 Proposals Due no later than: 2:00pm EST on November 10, 2015 Page 1 of 10 Revised 10/5/2015 TABLE OF CONTENTS Section I Introduction

More information

How To Move From Iseries To Iseries Content Manager On A Microsoft Computer (For A Non-Profit)

How To Move From Iseries To Iseries Content Manager On A Microsoft Computer (For A Non-Profit) Enterprise Content Management Request For Information Issue Date: October 18, 2013 Table of Contents Request for Information: Purpose, Scope, and Objectives 4 Louisiana State Employees Retirement System

More information

Scope Statement for DST IT Disaster Recovery Services

Scope Statement for DST IT Disaster Recovery Services Scope Statement Administrative Services Division Information Technology Section AUTHORIZATION TO AWARD 3/23/01 VENDOR: IBM BUSINESS CONTINUITY AND RECOVERY SERVICES Scope Statement for DST IT Disaster

More information

Q1. Have the item specifications & attached documents been uploaded? If so could you provided the URL to access?

Q1. Have the item specifications & attached documents been uploaded? If so could you provided the URL to access? Response to Industry Questions Q1. Have the item specifications & attached documents been uploaded? If so could you provided the URL to access? A1. Yes, all item specifications and attached documents have

More information

CA Tape Encryption Key Manager

CA Tape Encryption Key Manager PRODUCT BRIEF: CA TAPE ENCRYPTION KEY MANAGER Manager CA TAPE ENCRYPTION KEY MANAGER IS THE FIRST z/os-based, SOFTWARE TAPE ENCRYPTION KEY SOLUTION THAT CONSOLIDATES AND UNIFIES MANAGEMENT ACROSS MULTIPLE

More information

REQUEST FOR PROPOSAL (RFP)

REQUEST FOR PROPOSAL (RFP) REQUEST FOR PROPOSAL (RFP) Subject: Due Date/Time: Submit To: Financial Management & Utility Billing Software March 28, 201412:00 pm Eastern Standard Time Chris Wilson Village of Beverly Hills 18500 W

More information

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE CONFIGURATION MANAGEMENT PACK FEATURES Automated discovery of dependency relationships between services, systems and Oracle

More information

IT Service Management

IT Service Management RL Consulting People Process Technology Organization Integration IT Service Management Change Management Methods and Implementation Best Practices White Paper Prepared by: Rick Leopoldi June 19, 2002 Change

More information

CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS

CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS to provide INFORMATION TECHNOLOGY SUPPORT SERVICES Issued: November 2, 2009 Submit completed application to: City of Milton 1000 Laurel Street Milton, WA

More information

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose

More information

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING 4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the

More information

City of Winooski. Request for Proposals Department of Public Works ASSET MANAGEMENT SOFTWARE, IMPLEMENTATION AND TRAINING

City of Winooski. Request for Proposals Department of Public Works ASSET MANAGEMENT SOFTWARE, IMPLEMENTATION AND TRAINING City of Winooski Request for Proposals Department of Public Works ASSET MANAGEMENT SOFTWARE, IMPLEMENTATION AND TRAINING Issued: February 29, 2016 Deadline for Submissions: 4:00 p.m., March 25, 2016 INTRODUCTION

More information

REQUEST FOR PROPOSAL: GIS MANAGEMENT AND DESIGN SUPPORT: FOR UTILITY SERVICES OCTOBER 21, 2011 CITY OF ALEXANDRIA DIVISIONS OF FINANCE AND UTILITIES

REQUEST FOR PROPOSAL: GIS MANAGEMENT AND DESIGN SUPPORT: FOR UTILITY SERVICES OCTOBER 21, 2011 CITY OF ALEXANDRIA DIVISIONS OF FINANCE AND UTILITIES REQUEST FOR PROPOSAL: GIS MANAGEMENT AND DESIGN SUPPORT: FOR UTILITY SERVICES OCTOBER 21, 2011 CITY OF ALEXANDRIA DIVISIONS OF FINANCE AND UTILITIES Table of Contents 1 Introduction...2 1.1 Overview...

More information

CA Scheduler Job Management r11

CA Scheduler Job Management r11 PRODUCT SHEET CA Scheduler Job Management CA Scheduler Job Management r11 CA Scheduler Job Management r11 (CA Scheduler JM), part of the Job Management solution from CA Technologies, is a premier z/oscentric

More information

ADDENDUM NUMBER TWO (2) TO THE REQUEST FOR PROPOSAL (RFP) FOR FINANCIAL PLANNER POOL, RFP NUMBER 2P200815.

ADDENDUM NUMBER TWO (2) TO THE REQUEST FOR PROPOSAL (RFP) FOR FINANCIAL PLANNER POOL, RFP NUMBER 2P200815. March 27, 2009 California State Teachers Retirement System Vikki Eszlinger, Contract Services 7667 Folsom Boulevard, MS #30 Sacramento, CA 95826-2614 (916) 229-4111 FAX (916) 229-3881 [email protected]

More information

The Operating System Lock Down Solution for Linux

The Operating System Lock Down Solution for Linux The Operating System Lock Down Solution for Linux The Challenge: Meeting Organizational Security Requirements Linux Operating System Security Operating system (OS) security is a priority for System Administrators

More information

REQUEST FOR INFORMATION for Procurement Front-End System Modernization for The CITY OF PHILADELPHIA PROCUREMENT DEPARTMENT

REQUEST FOR INFORMATION for Procurement Front-End System Modernization for The CITY OF PHILADELPHIA PROCUREMENT DEPARTMENT REQUEST FOR INFORMATION for Procurement Front-End System Modernization for The CITY OF PHILADELPHIA PROCUREMENT DEPARTMENT Issued by: The Office of Innovation and Technology (OIT) June 25, 2014 Vendor

More information

Request for Proposal For Document Management System

Request for Proposal For Document Management System Request for Proposal For Document Management System June 13, 2014 1708 East Arlington Blvd. Greenville, NC 27858-5872 This solicitation should not be interpreted as a contract (implicit, explicit, or implied),

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

APPENDIX 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT MAINFRAME & SERVER SERVICES SOW EXHIBIT P TO AMENDMENT NO.

APPENDIX 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT MAINFRAME & SERVER SERVICES SOW EXHIBIT P TO AMENDMENT NO. EHIBIT P TO AMENDMENT NO. 60 APPENDI 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT P TO AMENDMENT NO. 60

More information

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information

More information

Request for Proposal (RFP) K3311 Disaster Recovery as a Service (DRaaS)

Request for Proposal (RFP) K3311 Disaster Recovery as a Service (DRaaS) 1. SCHEDULE EVENT Request for Proposal (RFP) K3311 Disaster Recovery as a Service (DRaaS) DATES & TIME Issue Solicitation April 27, 2015 Question & Answer Period April 27 May 4, 2015 Complaint Period Begins

More information

IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions

IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions What You Will Learn Businesses increasingly use IT automation tools to meet the challenge of managing their data centers. This document

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services:

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services: TOWN OF NORTH HAVEN REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY NETWORK SUPPORT SERVICES Issue Date: March 7, 2016 Due Date: 10:00 AM, Monday, March 28, 2016 I. Introduction The Town of North Haven is

More information

LACKAWANNA COUNTY BOARD OF COMMISSIONERS REQUEST FOR QUALIFICATIONS FOR ELECTRONIC DOCUMENT MANAGEMENT SOLUTION. November 22, 2011

LACKAWANNA COUNTY BOARD OF COMMISSIONERS REQUEST FOR QUALIFICATIONS FOR ELECTRONIC DOCUMENT MANAGEMENT SOLUTION. November 22, 2011 LACKAWANNA COUNTY BOARD OF COMMISSIONERS REQUEST FOR QUALIFICATIONS FOR ELECTRONIC DOCUMENT MANAGEMENT SOLUTION November 22, 2011 NOTICE IS HEREBY GIVEN that pursuant to a fair and open process, sealed

More information

Request for Information RFI #15/16-300 for Enterprise Password Management Software

Request for Information RFI #15/16-300 for Enterprise Password Management Software Company Name: This RFI response has been submitted by: Address: (Street, Su. # City, State, Zip) Request for Information RFI #15/16-300 for Enterprise Password Management Software Contact Name: Telephone

More information

REQUEST FOR INFORMATION (RFI) DRCI-16-2209 PREVENTATIVE MAINTENANCE OPTIMIZATION SYSTEM

REQUEST FOR INFORMATION (RFI) DRCI-16-2209 PREVENTATIVE MAINTENANCE OPTIMIZATION SYSTEM Date February 1, 2016 Page 1 REQUEST FOR INFORMATION (RFI) PREVENTATIVE MAINTENANCE OPTIMIZATION SYSTEM RESPONSE DEADLINE: RFI responses are due by to Noon, Local Time on Tuesday, February 16, 2016 ADDRESS

More information

Symantec Control Compliance Suite Standards Manager

Symantec Control Compliance Suite Standards Manager Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance

More information

REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM

REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM STATE OF TENNESSEE Alcohol Beverage Commission REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM DATE: JUNE 3, 2015 RFI # 31603-15001 IS AMENDED AS FOLLOWS:

More information

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database

More information

Brown County Information Technology Aberdeen, SD. Request for Proposals For Document Management Solution. Proposals Deadline: Submit proposals to:

Brown County Information Technology Aberdeen, SD. Request for Proposals For Document Management Solution. Proposals Deadline: Submit proposals to: Brown County Information Technology Aberdeen, SD Request for Proposals For Document Management Solution Proposals Deadline: 9:10am, January 12, 2016 Submit proposals to: Brown County Auditor 25 Market

More information

Questions and Answers (1) to HQ0034-FVAP-11-BAA-0001

Questions and Answers (1) to HQ0034-FVAP-11-BAA-0001 Questions and Answers (1) to HQ0034-FVAP-11-BAA-0001 1. Would you explain a little more about it? If we were to be awarded funds, what would they be used for etc. Answer: Provided in the grant announcement

More information

RFP Questions and Clarifications Memorandum

RFP Questions and Clarifications Memorandum RFP Questions and Clarifications Memorandum To: Vendors Responding to RFP Number 3798 for the Mississippi Department of Human Services (MDHS) From: Craig P. Orgeron, Ph.D. Date: September 18, 2015 Subject:

More information

Infrastructure Technical Support Services. Request for Proposal

Infrastructure Technical Support Services. Request for Proposal Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable

More information

DAIDS Appendix 2 No.: DWD-POL-DM-01.00A2. Data Management Requirements for Central Data Management Facilities

DAIDS Appendix 2 No.: DWD-POL-DM-01.00A2. Data Management Requirements for Central Data Management Facilities DAIDS Appendix 2 No.: DWD-POL-DM-01.00A2 Data Management Requirements for Central Data Management Facilities The following clinical trial data management requirements must be met in order to ensure the

More information

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,

More information

REQUEST FOR INFORMATION (RFI) Health Interface Engine Solution

REQUEST FOR INFORMATION (RFI) Health Interface Engine Solution City of Philadelphia Department of Public Health 1401 JFK Blvd Suite 600 Philadelphia, PA 19102 REQUEST FOR INFORMATION (RFI) This document contains a Request for Information (RFI) for an interface engine

More information

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Using Technology to Automate Fraud Detection Within Key Business Process Areas Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd

More information

AUSTIN PEAY STATE UNIVERSITY RFQ 16-090 Package Tracking System Questions & Answers

AUSTIN PEAY STATE UNIVERSITY RFQ 16-090 Package Tracking System Questions & Answers 1) Is any type of SSO (single sign-on) integration required for your system installation? If yes, please specify if there is a preference between CAS or SAML2. We will want to authenticate against our

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]

More information

REQUEST FOR PROPOSAL (RFP) for Provide Document Imaging & Archiving Solution And Develop Application Process Workflow on MS SharePoint

REQUEST FOR PROPOSAL (RFP) for Provide Document Imaging & Archiving Solution And Develop Application Process Workflow on MS SharePoint REQUEST FOR PROPOSAL (RFP) for Provide Document Imaging & Archiving Solution And Develop Application Process Workflow on MS SharePoint May 2016 Housing Development Finance Corporation Plc. Information

More information

SOLICITATION NO.: DHCF-HCOA-2009-P-0001 RESPONSES TO SUBMITTED QUESTIONS

SOLICITATION NO.: DHCF-HCOA-2009-P-0001 RESPONSES TO SUBMITTED QUESTIONS Department of Health Care Finance Government of the District of Columbia Office of Contracts and Compliance 825 North Capitol Street NE, Suite 5135 Washington, DC 20002 Phone: 202-442-5988 SOLICITATION

More information

City and County of San Francisco Office of the Treasurer & Tax Collector TTX Debt Collection Software RFI

City and County of San Francisco Office of the Treasurer & Tax Collector TTX Debt Collection Software RFI The City and County of San Francisco is requesting information from businesses that can provide comprehensive software solutions in Debt Collection and Delinquency Management software for the Bureau of

More information

MARION COUNTY Information Technology. REQUEST FOR INFORMATION Integrated IT Help Desk Client Management Software Suite

MARION COUNTY Information Technology. REQUEST FOR INFORMATION Integrated IT Help Desk Client Management Software Suite MARION COUNTY Information Technology REQUEST FOR INFORMATION Integrated IT Help Desk Client Management Software Suite DATE & TIME RESPONSES ARE DUE: January 2, 2015, at 2:00 PM Envelope(s) shall be sealed

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

TSM Backup Service. Standard Service Level Agreement

TSM Backup Service. Standard Service Level Agreement TSM Backup Service Standard Service Level Agreement University Of Michigan Information Technology and Services 7/1/2008 1.0 Overview Service Level Agreements (SLAs) are between Information Technology and

More information

Ms. Debbie Davenport Auditor General Office of the Auditor General 2910 North 44 th Street, Suite 410 Phoenix, Arizona 85018. Dear Ms.

Ms. Debbie Davenport Auditor General Office of the Auditor General 2910 North 44 th Street, Suite 410 Phoenix, Arizona 85018. Dear Ms. Janet Napolitano Governor ARIZONA DEPARTMENT OF ECONOMIC SECURITY 1717 W. Jefferson P.O. Box 6123 Phoenix, AZ 85005 David A. Berns Director Ms. Debbie Davenport Auditor General Office of the Auditor General

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

CA IT Client Manager Asset Inventory and Discovery

CA IT Client Manager Asset Inventory and Discovery DATA SHEET: ASSET INVENTORY AND DISCOVERY CA IT Client Manager Asset Inventory and Discovery CA IT CLIENT MANAGER DELIVERS EXTENSIVE ASSET INVENTORY AND DISCOVERY CAPABILITIES THAT HELP YOU MAINTAIN ACCURATE

More information

SCOPE: Role Descriptions/Job Profiles

SCOPE: Role Descriptions/Job Profiles SCOPE: Role Descriptions/Job Profiles a) Computing Infrastructure 1. Exchange Administrator Assists with ensuring the availability of email servers and applications, configuring new implementations, and

More information

BID SPECIFICATION PACKAGE

BID SPECIFICATION PACKAGE REQUEST FOR PROPOSALS: E-RATE TELEPHONE SYSTEM & COMPLETE INTERNAL CONNECTIONS BID SPECIFICATION PACKAGE FOR: HOUSTON GATEWAY ACADEMY, INC. REQUEST FOR PROPOSAL Telephone System for Houston Gateway Academy,

More information

Department of Economic Opportunity

Department of Economic Opportunity Department of Economic Opportunity REQUEST FOR INFORMATION Information Acknowledgement Form Page 1 of 9 pages SUBMIT RESPONSE TO: Department of Economic Opportunity DEPARTMENT RELEASE DATE: May 1, 2013

More information

December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.

December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS. Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,

More information

Request for Proposal For: CQ5 Java Developer. ABA Information Systems April 11, 2013. Table of Contents

Request for Proposal For: CQ5 Java Developer. ABA Information Systems April 11, 2013. Table of Contents Request for Proposal For: CQ5 Java Developer ABA Information Systems April 11, 2013 Table of Contents Bid Timetable [2] 1.0 General Information [3] 2.0 Proposal Requirements [6] 3.0 Criteria for Selection

More information

Hosted Contact Center RFQC 98000-0000001097 Questions and Answers

Hosted Contact Center RFQC 98000-0000001097 Questions and Answers Hosted Contact Center Q&A s 1-4, Released 4/24/14 1. Appendix A I noticed that on the Appendix A there is only 5 pages and that pages 6 and 7 are not yet provided. Will they be updated soon? 2. Section

More information

SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02. IT Backup, Recovery and Disaster Recovery Planning

SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02. IT Backup, Recovery and Disaster Recovery Planning SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02 IT Backup, Recovery and Disaster Recovery Planning Executive Summary Introduction As part of the 2011/12 Audit Plan and following discussions

More information

[UNIFIER USER MANUAL]

[UNIFIER USER MANUAL] 2015 [UNIFIER USER MANUAL] This manual is intended to provide HRSD commissioned Engineers and Contractors guidance on using the Unifier Enterprise Project Management System TABLE OF CONTENTS 1. UNIFIER

More information

PATROL From a Database Administrator s Perspective

PATROL From a Database Administrator s Perspective PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks

More information

Cloud-based Managed Services for SAP. Service Catalogue

Cloud-based Managed Services for SAP. Service Catalogue Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...

More information

Request for Proposal Technology Services Maintenance and Support

Request for Proposal Technology Services Maintenance and Support Request for Proposal Technology Services Maintenance and Support Maintenance and Support July 19, 2014 Celerity Educational Group is seeking an IT consulting firm to manage Maintenance of our Network Systems

More information

City of Woodinville, Washington

City of Woodinville, Washington City of Woodinville, Washington Telecommunications Analysis and Options Report Request for Proposal Issue Date: December 22nd, 2014 Due Date: January 22nd, 2015 Due Time: 4:00 PM Page 1 of 10 TABLE OF

More information