S.No RFP Reference Clarification Sought Modified Clause/ Clarification

Size: px
Start display at page:

Download "S.No RFP Reference Clarification Sought Modified Clause/ Clarification"

Transcription

1 The clarification for the queries submitted by the biders in response to RFP for Managed Security Services dated is as follows: S.No RFP Reference Sought Modified Clause/ 1. The bidder will be responsible for any hardware, software upgrade, for the proposed solutions and any kind of upgradation of existing infrastructure while implementing the solutions proposed under the project. 2. Ensure that all aspects of Installation, De - Installation, Configuration, Re- configuration, relocation (within the listed locations), enhancements, updates, upgrades, bug fixes, problem analysis, performance analysis, audits, on - site as well as off - site support. 3. Bidders SOC and DR Site should be connected to Banks MPLS Network to the nearest POP centers with minimum 256 KBPS MPLS link. Vendor has to coordinate and maintain the above link. Please clarify -our understanding - existing production infra upgrade refers to the proposed setup or the production setup of bank. Please clarify -our understanding is that device management of the proposed solutions is required -- need more clarity on the same. Please clarify that does bank requires the remote SOC to be connected to banks infra via MPLS and also the remote SOC-DR to be connected to bank. Is our understanding correct. The bidder is expected to provide end to end management of software/hardware proposed for delivering the MSS services. For e.g. the vender will be responsible for the implementation, configuration, integration, management, support, upgrades, renewal of the licenses etc of the SIEM tool, server or any other solution proposed under this RFP.

2 S.No RFP Reference Sought Modified Clause/ 4. The log transfer and device management should happen over an encrypted channel.( log & device) 5. Bidder should perform Vulnerability Assessment & Penetration Testing for critical devices/ servers /applications 6. Bidders should support all types and models of the product range such as Cisco, Checkpoint, Nokia, Fortigate, Netscreen, ISS and any other standard Make introduced by Union Bank from time to time. 7. Information Security consultancy for newer technology deployment for new and existing applications and products X7 log monitoring of operating systems, network & security devices using log analysis tools Support at central location for encryption to be enabled is available -- is our understanding correct. Pl provide network connectivity topology with min bandwidth. Can bidder propose VA & PT in opex model solution or Banks has its own VA & PT tool. Please clarify Extending the SOC scope of work to new device introduced can be handled through additional commercials. In our understanding - pl confirm or should we consider 10% growth. Extending the SOC scope of work to new device introduced can be handled through additional commercials. In our understanding - pl confirm or should we consider 10% growth. Can Bidder propose SIEM solution in OPEX model or bank wants to procure the SIEM tool & leverage the same tool to bidder's remote team for security log monitoring. Please clarify The bidder is expected to deploy automated vulnerability scanner tool for VA onsite at the bank. However penetration Testing can be performed from the SOC. The vendor is expected to propose VA & PT on opex model. The new devices will be introduced under the scope of work at the rate finalized through the RFP process for the particular services Bank will avail such services under the consultancy services at rates discovered through the RFP process. 9. Anti-Phishing services Please clarify how many web sites consider for Anti-Phishing. How many take down would

3 S.No RFP Reference Sought Modified Clause/ consider per Year 10. Advisories to bank on relevant threats and vulnerabilities supported with mitigation against identified risk exposure 11. Anti Malware and Anti Trojan Scanning 12. Establishing process for preventing, detecting, analyzing & reporting what is the periodicity of such services expected? Standard practices can be suggested, clarify otherwise. Please clarify how many web sites consider for Anti-malware & Anti-Trojan solution. which kind of process needs to be established? Standard processes/practices can be suggested, clarify otherwise These advisories are expected to be delivered as when applicable threats are identified for the in scope devices 13. Dash Board which and how many (number) customizable reports are expected? Need more clarity on the same. 14. Service Desk bank need service desk 24*7 or 12*6 shift Please clarify 15. Service Desk Does the bank have an existing service desk tool? Or we should propose for an tool along with this solution. what kind of reports are expected? 16. Audit of new applications, systems, implemented by the bank Compliance report would be provided as a solution however audit requirements needs to be shared by the bank. Extending the scope work to additional requirements can be handled through additional commercials. Service desk is required on 24X7 basis Bidder is expected to propose service desk tool through their SOC. The bidder is expected to provide reports as mentioned under specifications & SLA for traffic analysis, log corelation,phishing incidents etc.

4 S.No RFP Reference Sought Modified Clause/ 17. Security Log monitoring How many devices would be coming under security log monitoring scope 18. Vendor should have atleast 1 resource onsite dedicated for the device management activities during regular business hours. Do you need people to be staffed at both DC & DR. Onsite support with 3xL1 & 1XL2 is already mentioned in the RFP. 19. VA & PT How many devices would be coming under VA & PT scope The frequency of assessments needs to be defined. 20. The risk baseline should be integrated with the asset register Risk analysis can be provided as per the reports generated out of the solution. Kindly confirm what additional solution is expected. Our understanding is the bank having an existing asset management tool - pl confirm 21. Security Service Desk Does bank has its own Service desk tool or Bank wants to procure the tool & leverage the same for the SOC project. What is expected from the reports which would be pulled out from the service desk portal. Bidder is expected to propose service desk tool through their SOC. 22. A drill down of assets affected by new threats, vulnerabilities and status of mitigation should be supported. is there a requirement of CMDB to be integrated? If yes pl share the details.

5 S.No RFP Reference Sought Modified Clause/ 23. Limitation of Liability :Vendor s aggregate liability for actual direct damages shall be limited to contract value, provided that this limit shall not apply to (1) the infringement indemnity; or (2) bodily injury (including death) and damage to real property and tangible personal property caused by Vendor s negligence. For the purposes of this Section, Contract Value at any given point in time, means the aggregate value of purchase orders placed by Bank on the Vendor under this project. Request amendment to this clause to make it consistent with other RFP's of UBI :-Vendor s aggregate liability under the contract shall be limited to a maximum of the Contract value. This limit shall not apply to third party claims for 1) IP infringement indemnity; 2) bodily injury (including death) and damage to real property and tangible personal property caused by vendor s gross negligence. For the purpose of this section, Contract value at any given point of time, means the aggregate value of the purchase orders placed by Bank on the vendor that gave rise to claim, under this tender. Vendor shall not be liable for any indirect, incidental or special damages under the agreement/ purchase order. As per annexure-i 24. Payments We understand that payment for only two components i.e. Consulting Hours & Site Take down will be as per actuals consumption all other components & services will be paid as per the quantity/ period mentioned in commercial sheet. Please confirm 25. SIEM Tool Used Please clarify if bank is open to consider open source tool for SIEM? However it is recommended to use industry leading tools for such critical SOC having following features - a) OEM tool have both features such Security Incident analysis & Event monitoring. b)oem tool will come with in-built Storage facility c)oem tool has multiple compliance report facility comply with industry standards.d)oem tool has come with in-built database as well as compatible with other database such as Oracle & there is no limit of storing the data. e)oem tool has its own multiple

6 S.No RFP Reference Sought Modified Clause/ dashboards which can modify as per the requirement.f)oem tool can integrate with any services desk tool to measure the incidents. 26. The bank reserves the right to extend the agreement for a further period upto four (4) years at the option of the bank at the same cost, terms and conditions after negotiating the rates for any additional service identified by the bank. The bank reserves the right to extend the agreement for a further period upto four (4) years at the option of the bank at the revised cost, terms and conditions after negotiating the rates for any additional service identified by the bank. The bank reserves the right to extend the agreement year on year basis upto a maximum period of four (4) years after 1st year at the same cost, terms and conditions The rates for any additional services will be mutually decided by the bank & the bidder. 27. Indemnity Since "Vendor Name" is acting as a reseller of completed products, "Vendor Name" shall passthrough any and all warranties and indemnities received from the manufacturer or licensor of the products and, to the extent, granted by such manufacturer or licensor, the Customer shall be the beneficiary of such manufacturer s or licensor s warranties and indemnities. Further, it is clarified that "Vendor Name" shall not provide any additional warranties and indemnities with respect such products 28. The offer should remain valid for a period of at least 180 days from the date of the submission of offer. The offer should remain valid for a period of at least 30 days from the date of the submission of offer.

7 S.No RFP Reference Sought Modified Clause/ 29. Liquidated Damages Notwithstanding the Bank's right to cancel the order, liquidated damages at 0.5% of the cost of equipment per week will be charged for every week's delay in the delivery of the equipment beyond the specified delivery/installation period subject to a maximum of 2% of the value of total payout for the first year. Bank reserves its right to recover these amounts by any mode such as adjusting from any payments to be made by the Bank to the company. Notwithstanding the Bank's right to cancel the order, liquidated damages at 0.5% of the cost of services of project cost of one year per week will be charged for every week's delay in the starting of all the services beyond the specified period subject to a maximum of 2% of the value of total payout for the first year. Bank reserves its right to recover these amounts by any mode such as adjusting from any payments to be made by the Bank to the company. 30. For log monitoring the existing HIPS agents installed on the assets can be used. Security log monitoring Service The solution is expected to be agent less as per specifications on page 15 whereas page 16 specifies "Solution should support filtering of noise events from being sent to SOC by the agents deployed on bank assets". These points are contradictory. We recommend removing the point on page 16. Filtering on logs is not recommended. For assets on which HIPS agents are not installed SNMP traps or proposed agents can be installed.however, performance degradation should not be there due to these agents.

8 S.No RFP Reference Sought Modified Clause/ Also the solution should support existing/ proposed appliance such as firewall management server, & Internet gateway etc used for the management & monitoring. 31. Security log monitoring Service The log monitoring system will not suffice with current threats. SIEM to look for intrusions, not exfiltration. An intrusion is when employees, unknown individuals, or other malicious actors are poking around inside the network and perhaps accessing data that they should not have access to, while exfiltration is when that data actually leaves the organization and turns into a data breach. We recommend including a security analytics tool in the same. Bank has asked SIEM tool for log monitoring and analysis of logs through remote SOC. The minimum specification of SIEM is mentioned in the RFP. However, Bidders can quote solution supporting additional requirements in addition to minimum requirement mentioned in the RFP. 32. Anti-Phishing Services "Vendor should monitor the previously identified phishing domain/site on periodic basis for identifying any reopen case and close the old/ new phishing url identified during the monitoring without levying any additional charge to the bank as per SLA" We cannot guarantee that the offender will not repeat his/her offence. If the fraudster is leveraging a vulnerability on some server where he is hosting the phishing site. If the vulnerability is not fixed he will be able to break in again and recreate a phishing attack. All the phishing sites are expected to be taken down as per the SLA and terms & condition mentioned in RFP. The vendor will give the reports of such takendown sites as mentioned in the RFP.

9 S.No RFP Reference Sought Modified Clause/ 33. Malware and Trojan scanning services No mention about service s capability to identify specific financial Trojans targeting netbanking users to steal user credentials, passwords, account details etc. to detect and shutdown such malware attacks including infection points, command and control centre and the drop points to recover data stolen by such financial malware The service should obtain the above information from sources of attacks/ malware/ collection of compromised data, IP addresses used in attacks, bot net addresses, etc. The Forensic data to be collected for the Trojans should include but not limited to the following o Tools used in attacks o Compromised data o Account Information o Compromised credit cards /debit cards issued by Bank o addressees o Customer profiles 34. Security Service desk system requirements No mention about: Identify malware infected corporate systems trying to connect from inside to the outside malware infection points, command and control centre and the drop points Provide data feeds of malicious host IP addresses into web proxies / SIEM to alert about infected botnets inside the corporate network as they try to connect to external malware servers In addition to specifications mentioned on pg no. 22 the solution proposed by the bidder should comply to following additional specifications: Identify malware infected corporate systems trying to connect from inside to the outside malware infection

10 S.No RFP Reference Sought Modified Clause/ points, command and control centre and the drop points Provide data feeds of malicious host IP addresses into web proxies / SIEM to alert about infected botnets inside the corporate network as they try to connect to external malware servers 35. Security Dashboard is the dashboard expected to have a feature to track how vulnerabilities are assigned to owners and tracked that remediation is completed? Yes dashboard is expected to track & assign vulnerabilities to owners 36. Security Dashboard is the dashboard expected to compare the issues identified by Union bank's vendors, with the issues identified by the vulnerability scanners? Are these expected to map in any way? Yes, the dashboard is expected to compare the issues identified by Union Bank's vendor with the issues identified by the vulnerability scanners 37. Security Dashboard Is there a plan to integrate device information from multiple sources, such as AD, CMDB and bank's provisioning process to give you a greater view of your device and threat landscape? 38. Methodology of commercial selection of vendor Request bank to follow normal bidding process since we as an organization policy do not follow the reverse auction process.

11 S.No RFP Reference Sought Modified Clause/ 39. The bidder should own and have been managing well established Security Operations Centre (SOC) in India since last 3 year s. 40. The bidder should have the DR Site of similar capacity for their SOC in India Request bank to consider the bidder to own and manage SOC in India or Abroad since last 3 years. Request bank to consider DR site of similar capacity in India or anywhere in the world 41. The bidder should have provided/be providing SOC/Managed Security Services including log monitoring & corelation for minimum 75 device to atleast two customers out of which atleast one should be a bank in India 42. The bidder should have provided/be providing SOC/Managed Security Services including log monitoring & corelation for minimum 75 device to atleast two customers out of which atleast one should be a bank in India (Please provide purchase order copy & reference site details for the same). Request bank to dilute the criteria for one Indian bank reference to allow for global customers We would request Bank to modify the said clause as "Bidder Atleast Two customer where min 75 devices is managed remotely from SOC,out of which one customer should be from BFSI in India. The above modified clause will help us to participate in the said RFP as "Vendor" is very strong in the said domain and have expertise to deliver said services as per SOW mentioned in the RFP.

12 S.No RFP Reference Sought Modified Clause/ 43. The bidder should have the DR Site of similar capacity for their SOC in India (Self Declaration with details of DR infrastructure as per Annexure-XX). We would request Bank to delete the said clause from RFP as "Vendor" has only primary SOC active for all their BFSI customer. We assure is the managed security, consulting & network technology arm of "Vendor Name" having its diversified and highly skilled expertise into giving audits and consultancy solutions for the various compliances norms namely: ISO 27001, BS , PCI- DSS, VA & PT. Bidder is required to submit self declaration as per annexure -I 44. Performance Bank Guarantee Request Bank to limit PBG to 15% of the Contract value. 45. Indemnity Indemnity cannot be provided for warranties, covenants, representations or obligations under this Agreement. Request exclusion 46. Limitation of Liability Uncapped limitation of liability as the liability should be capped at indirect or consequential losses or loss of profits or revenue or goodwill or anticipated savings. As per annexure-i Further direct liability need to be capped at 12 months charges under the Agreement (i.e. for all SOW taken together).since it is suggested that the agreement may be extended for 4 years at the discretion of Bank

13 S.No RFP Reference Sought Modified Clause/ 47. Force Majeure We recommend that the Suppler should have the liberty to withdraw / terminate in case Force Majeure continues for more than 1 month 48. Liquidated Damages Further right of recovery should be limited to the present Agreement only with effect any other Agreements. Request Bank to delete "Bank reserves the right to recover these amounts by any mode such as adjusting from any payments to be made by the Bank to the company. " 49. Annexure H, PBG undertaking PBG draft not shared, kindly clarify as to same and the bidder should have the liberty to negotiate as to terms/value/maturity. The format for the performance Bank Guarantee will be provided by the Bank to the selected bidder 50. Annexure E In addition to providing log monitoring and log management solution for all 103 devices listed in Annexure-E, Should the Bidder scope also includes to provide Security Infrastructure (Remote) Management for 40 Security Devices listed in Annexure-E? Please clarify. Log Monitoring & Log Management is required for Critical Servers, Network & Security devices. Security Infrastructure management for 40 security devices is expected to be done by the onsite team during business hours and by remote SOC during non-business hours 51. Log Monitoring Requirement table Please specify the list of application logs that needs to be integrated for 24x7 security log monitoring services.

14 S.No RFP Reference Sought Modified Clause/ 52. Log Monitoring Requirement table Log Monitoring Requirement spec shows that, The solution must give real time compliance monitoring of standards like PCI DSS, ISO 27001, GLBA, SOX, HIPAA, FISMA, Indian IT Act 2000 etc. Generally SIEM OEM's would have packages for compliance reporting. Can Bank be specific about the regulations for which reporting will be needed so that bidder can provide the relevant packages in our solution. 53. Log Monitoring Requirement table Requirement table shows that local log retention (ONLINE LOGS) for minimum of six months period, could you also please specify the retention period for archived logs (OFFLINE LOGS)? 54. Eligibility Criteria As of 30-Jun-2012, the bidder should own and have been managing well established Security Operations Centre (SOC) in India including DC & DR SOC Sites since last 3 year s. We have Global SOCs spread around the globe but not in India and these are running for moe than three years. Will SOCs outside India be acceptable to bank 55. Eligibility Criteria Will customers outside of banking be considered?

15 S.No RFP Reference Sought Modified Clause/ 56. minimum 10 skilled staff with CISA/CISSP/CISM/ professional certification from Net screen/ Check Point Firewall. Request UBI to extend this clause to the following certifications- CISA/CISSP/CISM/CEH/ISO27001 LA, CISC, CPH, CCIE, CCSA, CCSP 57. Anti-phishing Services Please clarify whether these services can be provided through a third party however "vendor" will remain the single point of contact for the engagement. 58. Anti-Malware and Anti Trojan scanning Services 59. Closure of Raised Alerts as in SLA 60. The bidder should be registered company in India and providing IT security services / business (i.e. in the area of implementation of Firewall / IPS / IDS / UTM) for a minimum of five year as on (Please submit proof, such as Registration Certificate etc for existence and purchase order/work order showing implementation of Firewall / IPS / IDS / UTM since last five years. ) Please clarify whether these services can be provided through a third party however "vendor" will remain the single point of contact for the engagement. Is it regarding closure of Incidents for which Alerts are raised or closure of Alert tickets by taking/initiating action on the raised alerts? Need more on this clause. Bank has asked for providing IT Security Services, Please confirm whether MSS will be treated as IT security Service. As specialized information security firm, we do Managed Security services for many PSU and Global Banks. Hence we request bank to consider the Proof or Purchase order for the Managed Security Services (MSS) offered to the clients since last five years. Bank can consider Managed Security Services experience as IT Security Services supported by purchase order/work order/ reference letter from the organization.

16 S.No RFP Reference Sought Modified Clause/ 61. The bidder should own and have been managing well established Security Operations Centre (SOC) in India since last 3 year s. (Year wise Copies of purchase orders showing SOC services provided to customer/s). 62. Bidders SOC and DR Site should be connected to Banks MPLS Network to the nearest POP centers with minimum 256 KBPS MPLS link. Vendor has to coordinate and maintain the above link. Bank has MPLS Network through M/s BSNL. Bank may provide the required Letter in this Apart from the bidder having the established SOC for last 3 years, we request the bank to consider The SIEM used in the SOC should be in the Gartner's Magic Quadrant for last three years (Year 10, 11 & 2012). Does the site connectivity will be provided by the bank and the bidder will have to maintain the link alone or the bidder has to provide the link as well? Kindly provide more clarity on this requirement. 63. Along with remote monitoring from the vendor SOC, the bidder should ensure that the solution provides for local retention of logs at bank s premises for a minimum period of 6 months. Log Retention onsite is this a mandatory requirement or optional. Also is log retention for 6 months a mandatory requirement. The bidder is expected to retain the logs at bank's premises for a minimum period of 6 months. The vendor is required to deploy required hardware/software for the same. 64. Service Desk Is the bank already using a service desk or the bidder should provide the same? Kindly provide more clarity on this requirement Bidder is required to provide the service desk as mentioned in the RFP

17 S.No RFP Reference Sought Modified Clause/ 65. IV. Anti-phishing Services Vendor should monitor the previously identified phishing domain/site on periodic basis for identifying any reopen case and close the old/ new phishing url identified during the monitoring without levying any additional charge to the bank as per SLA After how much time period will the take down of a phishing site will be counted as a new incident if the phishing site is up again. 66. Profile of Onsite Engineers for DC and DR Site Can the experience and certification requirements of the resources as requested by the bank be reduced? 67. Anitphishing services are required for following: a) online.co.in with all the sub domains Annexure E List of devices and locations Antiphishing Kindly provide the number of URL's in each domain. b) dia.co.in /with all the sub domain. c) co.in d) a.co.in/ with all the sub domain.

18 S.No RFP Reference Sought Modified Clause/ However vendor is expected to monitor web referral logs of both corporate website and internet banking website. 68. Bank should be able to search, extract, and generate reports, if required, from the local logs. Is this a mandatory requirement or can the vendor provide reports as agreed from the SOC. 69. Section V: Service level agreement Are the following SLA acceptable with the bank? Real Time Alert SLA Category Time Window [Mins]High Alerts 30Medium Alerts 45Low Alerts 60Daily Reports SLA Category Time Window All Devices Daily Reports 11 AM 70. Bank Working hours Request the bank to confirm the number of working days per week? Will it be a 5 day working or 6 day working in a week. Bank is operating on 6 days a week basis. However the onsite team is required to attend DR Drills and other planned/nonplanned activities. 71. Vulnerability Assessment Are you looking for a configuration review in this particular requirement? 72. Vulnerability Assessment How many devices/servers are there in total on which this activity has to be performed.

19 S.No RFP Reference Sought Modified Clause/ 73. Vulnerability Assessment Do you expect us to perform a black box application security test on the applications hosted on the servers.if yes please provide the number of applications hosted. 74. Vulnerability Assessment Number of Ips on which Penetration Test (Internal and External) has to be performed? 75. Vulnerability Assessment Do you expect us to perform a black box application security test on the applications hosted on these Ips. If yes please provide the number of applications hosted. 76. Application Security Assessment What kind of assessment are you looking for? White box (Source Code review), Greybox (Tests on generic threats like OWASP top 10 and Privilege escalation checks from an attackers perspective)? If Source Code review is required, please fill in Table 2in Details sheet 77. Application Security Assessment How many Applications are there? 78. Application Security Assessment Are there any mobile applications in scope? If yes please specify it with the application name in the below table

20 Annexure-I Annexure K- Self Declaration with details of DR infrastructure Place: Date: To: The Dy. General Manager Union Bank of India Department of Information Technology, Technology Center, Adi Shankaracharya Marg, (JVLR), Opp. Powai Lake, Andheri East, Mumbai Self Declaration with details of DR infrastructure We (bidder name), hereby confirm that as required in the RFP, we have DR Site of similar capacity for proposed SOC services in India. Brief details are as under: Sl no Description Primary SOC DR SOC 1 Address of 2 Floor area in Sq ft 3 Total no of engineers 4 No of engineers in each shift 5 Whether ISO Certified 6 SIEM Tool used(with the version) Yours faithfully, Authorized Signatories (Name, Designation and Seal of the Company) Date:

21 Limitation of Liability Vendor s aggregate liability under the contract shall be limited to a maximum of the Contract value. This limit shall not apply to third party claims for 1) IP infringement indemnity; 2) bodily injury (including death) and damage to real property and tangible personal property caused by vendor s gross negligence. For the purpose of this section, Contract value at any given point of time, means the aggregate value of the purchase orders placed by Bank on the vendor that gave rise to claim, under this tender. Vendor shall not be liable for any indirect, incidental or special damages under the agreement/ purchase order.

Response to Queries Received for RFP of Security Integrator - Tender No. 63

Response to Queries Received for RFP of Security Integrator - Tender No. 63 Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for

More information

Annexure1: Pre-qualification criteria for Common SOC RFP

Annexure1: Pre-qualification criteria for Common SOC RFP Annexure1: Pre-qualification criteria for Common SOC RFP Table 1: Prequalification Criteria for Financial of SI S. No Pre-qualification Criteria 1 2 The Bidder should be a registered company in India providing

More information

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest. Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought

More information

IDBI Bank Ltd. value which should be sized on this appliance second for 2048 Bit SSL encryption." appliance/hardware and should be upgrade to 15 Gbps

IDBI Bank Ltd. value which should be sized on this appliance second for 2048 Bit SSL encryption. appliance/hardware and should be upgrade to 15 Gbps 1 2 3 4 Point 1-Hardware Specifications Setup A: Point C 1-Hardware Specifications Setup A: Point E 2-Hardware Specifications Setup B: point B 2-Hardware Specifications Setup B: point E The Solution should

More information

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held

More information

Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai

Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai Explanation for Queries Received Assignment Title: Procurement of Hosted Exchange Email Services by Commissionerate of Municipal Administration, Chennai Reference No: CMA/ 56898 /ITC/2009 # Document Reference

More information

Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.

Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here. Procurement of Services to Design, Develop, Implement and Maintain Centralized e-governance Application for Urban Local Bodies in Tamil Nadu Explanatory Notes 2 / Dated 17-December--2013 Explanatory Notes

More information

Amendment 1 - Annexure 5 (C) Technical Criteria

Amendment 1 - Annexure 5 (C) Technical Criteria 1 - Annexure 5 (C) Technical Criteria S. Eligibility Criteria Documents required Complied Y/N Formatted: Heading 2, Indent: Left: 0", Hanging: 0.4" C) Technical Criteria (Experience and other Technical

More information

IDBI Bank Ltd. RFP for Setting up of a captive Security Operation Centre(SOC) Responses to Bidder Queries

IDBI Bank Ltd. RFP for Setting up of a captive Security Operation Centre(SOC) Responses to Bidder Queries IDBI Bank Ltd. for Setting up of a captive Security Operation Centre(SOC) Responses to Bidder Queries (IDBI/Pcell//2014-15/24) dated 24th March, 2015 Sr. Clause 1 6 - Document Control Sheet Schedule for

More information

Sl. No. Ref Sections/Clause requiring Clarification. RFP (Page No.)

Sl. No. Ref Sections/Clause requiring Clarification. RFP (Page No.) Sl. No. RFP (Page No.) Ref Sections/Clause requiring Clarification Pre-Bid Queries for RFP Reference No: OBC/HO/DIT/RFP/SECURITY EQUIPMENTS/47/2014 Points of clarification given in the RFP Clarification

More information

allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05

allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05 Corrigendum for the Tender for Web Based Project Monitoring Tool & MIS System Bidders Clarification Sl. Clause /Page no Tender Clause Clarification Sought Clarification No. 1 Page No:4 No consortium Consortium

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server

Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Srno 1 Current RFP clause Clause Details Bidder Query Our Response 2.2 (Eligibilty Criteria), Page Parent company

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Current IBAT Endorsed Services

Current IBAT Endorsed Services Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

REQUEST FOR PROPOSAL SUPPLY, INSTALLATION AND CUSTOMIZATION OF HELPDESK SOFTWARE. Tender No. ECIL / CSD / 10-3053 dated 27.05.2011

REQUEST FOR PROPOSAL SUPPLY, INSTALLATION AND CUSTOMIZATION OF HELPDESK SOFTWARE. Tender No. ECIL / CSD / 10-3053 dated 27.05.2011 REQUEST FOR PROPOSAL FOR SUPPLY, INSTALLATION AND CUSTOMIZATION OF HELPDESK SOFTWARE Tender No. ECIL / CSD / 10-3053 dated 27.05.2011 ELECTRONICS CORPORATION OF INDIA LTD ( A Government of India Enterprise

More information

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

Response to Questions CML 15-018 Managed Information Security

Response to Questions CML 15-018 Managed Information Security Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

ADDENDUM TENDER: TENDER FOR MANAGED SERVICES - I.T SECURITY OPERATIONS CENTER (SOC) ADDENDUM NO.1 CLARIFICATIONS

ADDENDUM TENDER: TENDER FOR MANAGED SERVICES - I.T SECURITY OPERATIONS CENTER (SOC) ADDENDUM NO.1 CLARIFICATIONS ADDENDUM TENDER: TENDER FOR MANAGED SERVICES - I.T SECURITY OPERATIONS CENTER (SOC) ADDENDUM NO.1 CLARIFICATIONS In accordance with the RFP for the Tender for Managed Services - I.T Security Operations

More information

IT Security Strategy and Priorities. Stefan Lager CTO Services [email protected]

IT Security Strategy and Priorities. Stefan Lager CTO Services stefan.lager@addpro.se IT Security Strategy and Priorities Stefan Lager CTO Services [email protected] Cyberthreat update Why would anyone want to hack me? I am not a bank! Security Incidents with Confirmed Data Loss Source:

More information

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited Practice Good Enterprise Security Management Presented by Laurence CHAN, MTR Corporation Limited About Me Manager Information Security o o o o Policy formulation and governance Incident response Incident

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

www.obrela.com Swordfish

www.obrela.com Swordfish Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

MANAGED SECURITY SERVICES (MSS)

MANAGED SECURITY SERVICES (MSS) MANAGED SECURITY SERVICES (MSS) The Cyber Security Initiative. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The

More information

N e t w o r k E n g i n e e r Position Description

N e t w o r k E n g i n e e r Position Description Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority

More information

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security Breach Findings for Large Merchants 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security Disclaimer The information or recommendations contained herein are

More information

PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS

PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS Punjab National Bank HO: Information Technology Division 5, Sansad Marg, New Delhi-01 Information Technology Division

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Request For Quotation from Service Providers. for. Web Security & Performance Testing for Web-based Applications for UTIITSL

Request For Quotation from Service Providers. for. Web Security & Performance Testing for Web-based Applications for UTIITSL Request For Quotation from Service Providers for Web Security & Performance Testing for Web-based Applications for Release Date: 06-Aug-2015 Page 1 of 8 UTI Infrastructure Technology And Services Limited

More information

Office of the Competition Commission of India 18-20 Hindustan Times House, K.G. Marg, New Delhi - 110001

Office of the Competition Commission of India 18-20 Hindustan Times House, K.G. Marg, New Delhi - 110001 Office of the Competition Commission of India 18-20 Hindustan Times House, K.G. Marg, New Delhi - 110001 F.No- D-33011/1/2010-CCI (42) Dated: 11/02/2015 Limited Tender Enquiry To ---------------------------

More information

Automate PCI Compliance Monitoring, Investigation & Reporting

Automate PCI Compliance Monitoring, Investigation & Reporting Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently

More information

High End Information Security Services

High End Information Security Services High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

More information

Corrigendum to Managed Security Services Jan2013 to Dec2014

Corrigendum to Managed Security Services Jan2013 to Dec2014 Corrigendum No.1 To Request for Proposal for Procurement of Managed Security IDBI Bank Ltd. dated 8 h October, 2012 19 th October 2012 IDBI Bank Ltd. 1 of 1 Please note, the following corrections are being

More information

Dell Advanced Network Monitoring Services Service Description

Dell Advanced Network Monitoring Services Service Description Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day

More information

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Security strategies to stay off the Børsen front page

Security strategies to stay off the Børsen front page Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Performanta Pty Ltd. Company Profile. May 2012. Trust. Practical. Performanta.

Performanta Pty Ltd. Company Profile. May 2012. Trust. Practical. Performanta. May 2012 Trust. Practical. Performanta. Company Overview Performanta Pty Ltd is an information security organisation that has a practical approach, competitively priced services, strong client commitment,

More information

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business

More information

Under the Hood of the IBM Threat Protection System

Under the Hood of the IBM Threat Protection System Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE [email protected] 1 You are an... IT Security Manager at a retailer

More information

Simphony v2 Antivirus Recommendations

Simphony v2 Antivirus Recommendations DECLARATIONS WARRANTIES Although the best efforts are made to ensure that the information in this document is complete and correct, MICROS Systems, Inc. makes no warranty of any kind with regard to this

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

2012 Data Breach Investigations Report

2012 Data Breach Investigations Report 2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information

More information

IT Security & Compliance. On Time. On Budget. On Demand.

IT Security & Compliance. On Time. On Budget. On Demand. IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount

More information

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps

More information

MDM Solution subscription period starts from the date of Go- Live 4. 15 D4.1 Document sharing and management Clause - Deleted

MDM Solution subscription period starts from the date of Go- Live 4. 15 D4.1 Document sharing and management Clause - Deleted apts Andhra Pradesh Technology Services Limited 4 th Floor, B-Block, BRKR Bhavan, Tankbund Road, Hyderabad 500063, India Phone: (40) 2322 4935, 23221760; Fax: 23227458 Email:[email protected]:

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project. chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital

More information

PCI DSS. Payment Card Industry Data Security Standard. www.tuv.com/id

PCI DSS. Payment Card Industry Data Security Standard. www.tuv.com/id PCI DSS Payment Card Industry Data Security Standard www.tuv.com/id What Is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is the common security standard of all major credit cards brands.the

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

Enforcive / Enterprise Security

Enforcive / Enterprise Security TM Enforcive / Enterprise Security End to End Security and Compliance Management for the IBM i Enterprise Enforcive / Enterprise Security is the single most comprehensive and easy to use security and compliance

More information

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg. STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication

More information

Terms and Conditions.

Terms and Conditions. Terms and Conditions. We ask that you read them through and keep a copy for your own records, just in case you need to refer back to them at any time. By ordering or using a Systems Integration (UK) Ltd.service

More information

Head Office : Information Technology Division 5, Parliament Street, New Delhi 110 001. Request For Proposal (RFP) For

Head Office : Information Technology Division 5, Parliament Street, New Delhi 110 001. Request For Proposal (RFP) For Head Office : Information Technology Division 5, Parliament Street, New Delhi 110 001 Request For Proposal (RFP) For Monitoring of Internet & Identification of Threats & Providing Remedies Relating to

More information

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

Department of Management Services. Request for Information

Department of Management Services. Request for Information Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley

More information

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1 I.T. Security Specialists Cyber Security Solutions and Services Caretower Corporate Brochure 2015 1 about us As an independent IT security specialist, with over 17 years experience, we provide tailored

More information

Spyders Managed Security Services

Spyders Managed Security Services Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built

More information

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify

More information

Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.

Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary. Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and

More information

SECURITY 2.0 LUNCHEON

SECURITY 2.0 LUNCHEON PROTECTING YOUR ORGANIZATION SECURITY 2.0 LUNCHEON AGAINST CYBER THREATS Tommy Montgomery, Principal Consultant Viral Dhimar, Consultant Adam Ferguson, VP October 22, 2014 #SWCEvents Security 2.0: Next

More information

Managed Security Services Portfolio

Managed Security Services Portfolio Managed Security Services Portfolio Managed Security Services Professional Services Security Hardware and Software What is on the truck IBM ISS Agenda An introduction and statement of capability Virtual

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA [email protected] Copyright 2006 - The OWASP Foundation Permission is granted to copy,

More information

Modular Network Security. Tyler Carter, McAfee Network Security

Modular Network Security. Tyler Carter, McAfee Network Security Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

Symantec Security Information Manager 4.7.4 Administrator Guide

Symantec Security Information Manager 4.7.4 Administrator Guide Symantec Security Information Manager 4.7.4 Administrator Guide Symantec Security Information Manager 4.7.4 Administrator Guide The software described in this book is furnished under a license agreement

More information