Social Islami Bank Ltd.
|
|
|
- Oswin James
- 10 years ago
- Views:
Transcription
1 Social Islami Bank Ltd. IT Division, Level-19, City Center 90/1, Motijheel C/A, Dhaka 1000, Bangladesh Request For Proposal Supply and implementation of Next Generation Firewall in perimeter to secure infrastructure and Security Solution for comprehensive protection of enterprise system for SIBL Infrastructure. Schedule No. : SIBL-IT NG Firewall and security. Submission Date : 29 January, 2015 DISCLAIMER: The document briefly describes the Technical requirements and Financial for supply and implementation of Next Generation Firewall in perimeter to secure infrastructure and Security Solution for comprehensive protection of enterprise system for SIBL Infrastructure. Your access to it does not imply a license to reproduce and / or distribute this information and you are not allowed to any such act without the prior approval of Social Islami Bank Limited.
2 Table of Contents 1. Introduction: Network Topology Technical Requirements and Specifications Next generation firewall requirement Security Solution Financial Offer: Terms and Conditions: Submission Form Evaluation Criteria...18 Proprietary & Confidential 2 of 18
3 1. Introduction: Social Islami Bank Ltd is running Core Islami Banking Solution since Total no of Branches/ Users is increasing per year. Now, Bank has a robust network infrastructure and communication system to perform banking activities. At present Social Islami Bank Ltd have layer four firewall for its internet security and no security solution in its IT infrastructure. Now a day s internet system has become so complex and threats coming from internet cannot be detected by a legacy layer four firewall and same for the system. Therefore, we need to deploy a Next generation layer seven (7) firewall and security system to secure its infrastructure. 1.1 Network Topology Internet Internet Router security Eamil server Eamil server Eamil server DMZ switch Internet Firewall 1 Internet Firewall 2 Access Core switch Core Core banking servers Proprietary & Confidential 3 of 18
4 2. Technical Requirements and Specifications: Supply, Installation and Configure below item Next generation firewall requirement (Palo Alto Model: PA 3020): General Feature Performance and Capacity Bank s Requirement To protect the internet perimeter from external attacks Should be a leader in the Gartner for past four years or above. The proposed firewall must run on a hardened OS and delivered on purpose built hardware (i.e. no server architecture) The proposed firewall must be optimized for layer 7 application level content processing and have special ASICS to handle signature matching and processing in a single pass parallel processing architecture The proposed firewall must allow policy rule creation for application identification, user identification, threat prevention, QOS and scheduling in a single rule and not in multiple locations in the management console. The proposed firewall should have a minimum application layer throughput of at least 2Gbps The proposed firewall should support Application layer plus IPS and Treat Prevention and should have a throughput of 1Gbps The proposed firewall should support Application layer plus IPS, Anti Virus, Anti Spyware/Malware and all other Treat Prevention features turn on throughput of 1Gbps The proposed firewall should have least 120Gb Hard drive for storage The proposed firewall should have at least 12x10/100/1000 interfaces and minimum of 8x 1GE SFP interfaces The proposed firewall should have dedicated management interface for out of band management and a console port The proposed firewall should support IPSec VPN throughput of 500 Mbps The proposed firewall should support 250,000 concurrent sessions The proposed firewall should support 50,000 new sessions per second The proposed firewall should support at least 1000 IPSec VPN tunnels The proposed firewall should support at least 1000 SSL / Remote VPN users The proposed firewall should support at least 05 Virtual Systems The proposed firewall should support at least 40 security zones The proposed firewalls effective throughput (all features turned ON) should be at least 45% of the raw stated throughput (vanilla firewall throughput) to ensure minimal degradation of performance The firewall should have separation of processing between data flow and management/control (separate planes/processors) The proposed firewall must be able to be administered locally on the box without additional management or logging software. The proposed firewall should be able to generate all functional reports out of the box with no additional hardware or software from the vendor or any third party solution The proposed vendor must be in the Leader s quadrant of the Enterprise Firewalls Gartner Magic Quadrant for at least 3 years Vendor Response Proprietary & Confidential 4 of 18
5 Operation Mode The proposed firewall must allow policy creation for application identification, user identification, threat prevention in a single location: -Application Detection -IPS -Anti-Virus -Anti-Spyware -Botnet detection -Data Content Filtering -URL Filtering -IPSec VPN -SSL-VPN -High Availability -Virtual Systems -QoS (marking and/or traffic shaping) -SSL Decryption -SSH Decryption The proposed firewall must be able to operate in routing/nat mode The proposed firewall must be able to support Network Address Translation (NAT) The proposed firewall must be able to support Port Address Translation (PAT) The proposed firewall must be able to support Policy-based NAT The proposed firewall must be able to support Traffic Management QoS per policy The proposed firewall must be able to support Network attack detection The proposed firewall must be able to support DoS and DDoS protection The proposed firewall must be able to support TCP reassembly for fragmented packet protection The proposed firewall must be able to support Brute force attack mitigation The proposed firewall must be able to support SYN cookie protection The proposed firewall must be able to support IP spoofing The proposed firewall must be able to support Malformed packet protection The proposed firewall must support tap mode (via mirrored, taped, or SPAN port) The proposed firewall must support transparent mode (layer 1, or bump on the wire) The proposed firewall must support layer 2 deployment The proposed firewall must support layer 3 deployment The proposed firewall must support simultaneous deployment with interfaces servicing layer 3 connections, transparent and tap modes within a single piece of hardware The proposed firewall shall support 802.1Q VLAN tagging The proposed firewall shall support Dual Stack IPv4 / IPv6 application control and threat inspection support in: - Tap Mode - Transparent mode - Layer 2 Proprietary & Confidential 5 of 18
6 - Layer 3 The proposed firewall shall support standards based Link aggregation (IEEE 802.3ad) to achieve higher bandwidth. The proposed firewall shall support logical Ethernet sub-interfaces tagged and untagged. The proposed firewall must be able to support Dynamic IP/Port NAT (Many -to- 1, and Many-Many) The proposed firewall must be able to support Dynamic IP NAT (Manyto-Many) The proposed firewall must be able to support Static IP Nat (1-to-1, Many-to-Many, IP's) The proposed firewall must be able to support 1-to-1 bidirectional static NAT The proposed firewall must be able to support Virtual IP (VIP) The proposed firewall must be able to support Port Address Translation (PAT) The proposed firewall must be able to support source NAT The proposed firewall must be able to support destination NAT The proposed firewall must be able to support source and destination NAT simultaneously independent of security policy The proposed firewall must be able to provide NAT traversal capabilities, supporting VoIP applications and services The proposed firewall must support the following routing protocols: - Static - RIP v2 - OSPF - BGP v4 The proposed firewall must have IPv6 Routing Support even for virtual routers. The proposed firewall must have Virtual Router capability that supports all L3 capability (minimum 20) The proposed firewall must support Policy Based forwarding based on: - Zone - Source or Destination Address - Source or destination port - Application (not port based) - AD/LDAP user or User Group The proposed firewall shall support DNS proxy The proposed firewall shall support DHCPv6 relay The proposed firewall solution must be able to support Active/Active HA configuration The proposed firewall solution must be able to support Active/Passive HA configuration The proposed firewall solution must be capable to detect device failure The proposed firewall solution must be capable to detect link and path High Availability failure The proposed firewall solution must be able to support encryption of HA heartbeat & control traffic The proposed firewall solution must be able to support session and configuration synchronization The proposed firewall shall synchronize the following for HA - All sessions Proprietary & Confidential 6 of 18
7 Central Management Policy Based Controls - Decryption Certificates - All VPN security associations - All threat and application signatures - All configuration changes - FIB tables The proposed firewall HA shall support hitless upgrades for both major and minor code releases The proposed management system shall also needs to be able to provide a customizable 'Application command center' or at least system monitor to provide overall status of the network traffic and attack going through the firewall, including potential problems that may need attention The proposed management should use simple HTTPS/SSL base UI for management The management server shall provide the ability to generate and deploy numerous policies to multiple firewall system through an intuitive policy management user interface The management server must be capable of providing rich reports based on application, users and threats or in any combination. The management server must be able to monitor system and status that will send out s to the administrator regarding the health of the appliance based on the threshold been set. The management server must support the report generation on a manual or schedule (Daily, Weekly, Monthly, etc. ) basis The management server must allow the report to be exported into other format such as PDF, HTML, CSV, XML etc. The logs from management server must be able to allow archiving and backup of configurations and historical logs to tapes or similar devices. The management system must be able to provide different level of users account and access management, with support for external authentication server, specifically RSA Secure ID and/or Active Directory The management system must be able to audit any changes made to rules or configuration with full details. The management system must support systems configuration rollback to previously saved configurations on box The management system must support validation of policy for shadowed rules before rule application The management system must support the ability to lock configuration while modifying it, avoiding administrator collision when there are multiple people configuring the appliance The management system must support the ability to view delta's between current, staged, or past configurations on the appliance The management system must be able to integrate with third-party SIEM vendors The proposed firewalls must be via central management and locally without causing synchronization issues The proposed firewall must have built in XML API for management purposes; custom logging capabilities. The proposed firewall shall control parameters by security Zone, Users, IP, Application, Schedule, QOS The proposed firewall shall be application based (even for unknown applications running on non-standard ports) and not port-based and Proprietary & Confidential 7 of 18
8 Application Security Policy protocol based. The proposed firewall shall support the following policy types/capabilities: -Policy-based control by port and protocol -Policy-based control by application and/or application category (nonport based) -Policy-based control by user, group or IP address -Policy-based control by country code (SG, VN, USA, UK, RUS) -Per policy SSL decryption & inspection (forward or reverse proxy) -Per policy SSH decryption & inspection -Block files by type: bat, cab, dll, exe, pif, and reg -Data filtering: Social Security Numbers, Credit Card Numbers, -Data filtering: Custom Data Patterns -QoS Policy-based traffic shaping (priority, guaranteed, maximum) -QoS Policy-based diffserv marking -Policy support of IPv6 rules/objects -Policy support of multicast rules/objects -Policy support for scheduled time of day enablement The proposed firewall shall control parameters by security Zone, Users, IP, Application, Schedule, QOS etc. The proposed firewall shall support network traffic classification which identifies applications across all ports irrespective of port/protocol/evasive tactic The proposed firewall shall have multiple mechanisms for classifying applications The proposed firewall shall have application identification technology based upon IPS or deep packet inspection The proposed firewall shall be able to handle unknown/unidentified applications e.g. alert, block or allow The proposed firewall shall be able to create custom application signatures and categories The proposed firewall shall include a searchable list of currently identified applications with explanation and links to external sites for further clarification The proposed firewall shall allow updating the application database automatically or manually via the control or traffic plane The proposed firewall shall allow dynamic updates of the application DB and not require a service restart or reboot The proposed firewall shall warn the end-user with a customizable page when the application is blocked The proposed firewall shall allow port-based controls to be implemented for all applications as well in the same rule The proposed firewall shall delineate specific instances of peer2peer traffic (Bit torrent, emule, neonet, etc.) The proposed firewall shall delineate specific instances of instant messaging (AIM, YIM, Facebook Chat, etc.) The proposed firewall shall delineate different parts of the application such as allowing Facebook chat but blocking its file-transfer capability The proposed firewall shall delineate specific instances of Proxies (ultrasurf, ghostsurf, freegate, etc.) The proposed firewall shall support Voice based protocols (H.323, SIP, SCCP, MGCP etc.) The proposed firewall shall be able to create filters to control groups Proprietary & Confidential 8 of 18
9 Threat Prevention of application based on category, sub category, technology, risk or characteristics etc. The proposed firewall shall support user-identification allowing Active Directory, LDAP, RADIUS groups, or users to access a particular application, while denying others The proposed firewall shall support IPS features on the proposed firewall hardware The proposed firewall shall support Anti-Virus and Anti-Spyware (phone home attacks) on the proposed firewall across all product line offerings The proposed firewall shall block application vulnerabilities on all proposed firewall models The proposed firewall IPS shall be supported by a world-class research organization dedicated to the discovery and analysis of threats, applications and their respective network behavior. The threat and vulnerability information that the IPS protect against shall be publicly accessible on the internet. The proposed firewall shall block spyware and malware on all proposed firewall models The proposed firewall shall block known network and application-layer vulnerability exploits The proposed firewall shall block buffer overflow attacks The proposed firewall shall block DoS/DDoS attacks The proposed firewall shall perform stream-based Anti-Virus and not store-and-forward traffic inspection The proposed firewall shall perform stream-based Anti-Spyware and not store-and-forward traffic inspection The proposed firewall shall be able to perform Anti-virus scans for SMB traffic The proposed firewall shall support attack recognition for IPv6 traffic the same way it does for IPv4 The proposed firewall shall support Built in Signature and Anomaly based IPS engine on the proposed firewall The proposed firewall shall support the ability to create custom userdefined signatures The proposed firewall shall support be able to exclude certain hosts from scanning of particular signatures The proposed firewall shall support granular tuning with option to configure overrides for individual signatures The proposed firewall shall support automatic security updates directly over a secure connection (i.e. no dependency of any intermediate device) The proposed firewall Threat/Anti-Virus/Anti-Spyware updates shall not require reboot of the unit. The proposed firewall shall support the same signature packages across all platforms and models The proposed firewall shall support several prevention techniques including drop packet, tcp rst (Client, Server & both) etc. List all prevention options The proposed firewall shall support response adjustment on a per signature basis. The proposed firewall shall support notifications via alerts, notifications, SNMP traps and packet logs Proprietary & Confidential 9 of 18
10 URL Filtering Data Filtering Modern Malware Prevention User Identification The proposed firewall shall not have a performance hit when IPS, Anti- Virus, and Anti-Spyware is enabled below the threat prevention throughput. Please state in percentage and absolute throughput figures if any The proposed IPS should be capable of adding threat exceptions based on IP address The proposed firewall shall support URL-Filtering The proposed firewall shall have the database located locally on the device The proposed firewall shall support custom URL-categorization The proposed firewall shall support customizable block pages The proposed firewall shall support block and continue (i.e. allowing a user to access a web-site which potentially violates policy by presenting them a block page with a warning with a continue option allowing them to proceed for a certain time) The proposed firewall shall support logs populated with end user activity reports for site monitoring within the local firewall The proposed firewall shall support logs populated with end user activity reports for site monitoring within the central manager The proposed firewall shall support Drive-by-download control The proposed firewall shall support URL Filtering policies by AD user, group, machines and IP address/range Full-path Categorization of URLs only to block re categories the malicious malware path not the full domain or website The proposed firewall shall support file identification by signature and not file extensions The proposed firewall shall support identification and optionally preventing the transfer of various files (i.e. MS Office, PDF, etc.) via identified applications (i.e. P2P, IM, SMB, etc.) The proposed firewall shall support compressed information stored in zipped format and be able to unpack and filter per policy The firewall shall be capable of identifying and optionally preventing the transfer of files containing sensitive information (i.e. credit card numbers) via regular expression Should support DNS based botnet signature to control DNS look ups of known malicious domains The proposed firewall must have sand box-based protection of unknown viruses. The proposed firewall must have automated signature generation for discovered malware The proposed firewall must have inline control of malware infection and command/control traffic The proposed firewall shall support SLA based signature delivery for unknown malware The proposed firewall must have modern malware protection that identifies unknown malicious files by directly and automatically executing them in a virtual cloud-based environment to expose malicious behavior even if the malware has never been seen in the wild before without the need for additional hardware. The proposed firewall shall support authentication services for useridentification: - Active Directory - LDAP Proprietary & Confidential 10 of 18
11 QoS SSL/SSH Decryption - edirectory - RADIUS - Kerberos - Client Certificate The proposed firewall should support the creation of security policy based on Active Directory Users and Groups in addition to source/destination IP within the same hardware platform The proposed firewall shall support user-identification in policy, logs, reports and other parameters without any external agent installation The proposed firewall shall support user-identification from Citrix and terminal services environments in policy and logs The proposed firewall shall populate and correlate all logs with user identity (traffic, IPS, data, etc.) without any additional products or modules in real-time The proposed firewall should support the ability to create QoS policy on a per rule basis: (across product line) - by source address - by destination address - by user/user group as defined by AD - by application (such as Skype, Bittorrent, YouTube, Facebook, twitter) - by static or dynamic application groups (such as Instant Messaging or P2P groups) - by port The proposed firewall shall define QoS traffic classes with: - guaranteed bandwidth - maximum bandwidth - priority queuing The proposed firewall should support real-time prioritization of voice based protocols like H.323, SIP, SCCP, MGCP and applications like Skype The proposed firewall should support diffserv marking of packets The proposed firewall should support real-time bandwidth statistics of QoS classes The proposed firewall shall be able to identify, decrypt and evaluate SSL traffic in an outbound connection (forward-proxy) The proposed firewall shall be able to identify, decrypt and evaluate SSL traffic in an inbound connection The proposed firewall shall be able to identify, decrypt and evaluate SSH / SSH Tunnel traffic in an outbound connection The proposed firewall shall be able to identify, decrypt and evaluate SSH / SSH Tunnel traffic in an inbound connection The NGFW shall support the ability to have a SSL inspection policy differentiate between personal SSL connections i.e. banking, shopping, health and non-personal traffic Is the proposed firewall able to decrypt in the following network modes: -Tap mode -Transparent mode -Layer 2 mode -Layer 3 mode SSL decryption must be supported on any port used for SSL i.e. SSL decryption must be supported on non standard SSL port as well Proprietary & Confidential 11 of 18
12 VPN Authentication TCP Dump / PCAP Power supply Report and The proposed firewall must be capable of IPSec VPN The proposed firewall must be capable of SSL VPN The proposed firewall must have the ability to establish VPN connections to protect the traffic, enforces policy to manage access to applications and data, and provides protection against mobile threats. Solution must be capable of permitting users to enjoy the native enterprise network facilities in their preferred devices while connected in internet from anywhere. The proposed firewall should have the provision to integrate mobile device manager and mobile device threat management system from the same vendor. The proposed firewall shall support IPSec VPN or SSL VPN without additional licensing. IPSec VPN should be integrated with NGFW and support full encryption standards suites- - DES, 3DES, AES - MD5 and SHA 1 authentication - Diffie Hellman Group 1, Group 2 and Group 5 - Internet Key Exchange (IKE) algorithm - AES 128, 192 & 256 (Advanced Encryption Standard) The proposed firewall should support automatic establishment of SL VPN tunnel when the end point is detected to be outside of the corporate network The proposed firewall should support global load balancing for SSL connections based on response times from the different gateways The proposed firewall administrative module shall support the following authentication protocols: - LDAP - Radius (vendor specific attributes) - Token-based solutions (i.e. Secure-ID) - Kerberos The proposed firewall s SSL VPN shall support the following authentication protocols - LDAP - Radius - Token-based solutions (i.e. Secure-ID) - Kerberos - Any combination of the above The proposed firewall shall support on box packet captures based on: - Source Address - Destination Address - Applications - Unknown Applications - Port - any threat - data-filters - any combination of the above The proposed firewall shall support PCAP downloads of specific traffic sessions from the GUI from the logging screen Internal power supply having input voltage 230 V and 13Amp power cable should be available. The proposed vendor must have a track record of continuous 3 years Proprietary & Confidential 12 of 18
13 Analysis / Industry Recognition Warranty and Support improvement in threat detection and must have successfully completed NSS recommended category on NSS-Next Generation Firewall Product Analysis Report. Should be listed on Gartner leaders quadrant for Enterprise network firewalls for last 3 years. Three (3) years Comprehensive warranty, support and subscription Security Solution (Barracuda Model: BSF-400) Feature Capacity Active Users Domains Message Log Storage Quarantine Storage Hardware Rack mount Chassis Dimensions (in) Weight (lb) Ethernet AC Input Current (amps) Redundant Disk Array (RAID) Features Outbound Filtering Encryption Cloud Protection Layer MS Exchange/LDAP Accelerator Per-User Settings and Quarantine Delegated Help Desk Role Syslog Support Clustering & Remote Clustering Per Domain Settings Single Sign-On SNMP/API Warranty, support and subscription Requirement System should support at least 5000 users. System should be capable of handling at least 500 domains. Log storage capacity should be at least 22 GB. Quarantine Storage should be at least 58 GB. Standard. Standard. Standard. 1 x Gigabit. Standard. Should support RAID. System Should Support Outbound filtering capacity with no degradation of performance. Encryption capacity should be there at the highest level System should have provision of Cloud protection layer System should be capable to hook in to Active Directory or LDAP server and checks the validity of an address before accepting the . System should be able to quarantine according to user and user setting can customizable. System should support help desk role System should be capable to integrate any syslog server Clustering option should be there System can be configured as per domain Single sign-on feature should be supported. System should support standard SNMP and API for any system integration 01 year Comprehensive warranty, support and subscription. Vendor Response Proprietary & Confidential 13 of 18
14 3. Financial Offer: [*The full specification of the item is as per Technical Offer.] Name of the Company : Financial Proposal : SN Particulars Qty Unit Price (Tk.) Total Price (Tk.) Subscription / AMC (%) from 2 nd Year onwards Delivery Period 1 Palo Alto Networks PA with Redundancy 02 SN Particulars Qty Unit Price (Tk.) Total Price (Tk.) Subscription / AMC (%) from 2 nd Year onwards Delivery Period 2 Barracuda BSF Training on Palo Alto and Barracuda (Person) 05 Seal & Signature With Name of the participating vendor Proprietary & Confidential 14 of 18
15 4. General Terms and Conditions: i. Submission of the bid document: The participant company must submit the offer in two (02) separate envelopes. One envelope will contain the technical offer and the other envelope will contain the financial offer. The two envelopes must be covered in a large envelope. All the envelopes will contain the full name and address of the participant company. The name, address and telephone number of the contact person should be mentioned in the forwarding letter submitted with the technical offer. The technical offer should also be submitted as softcopy as well in CD/DVD/Flash drive in PDF format including relevant supporting documents as proof. ii. iii. iv. Time & date of submission: Up to 4:00 pm as on Jan 29, The sealed tender must be submitted in the tender box kept in the IT Division, Level-19, SIBL Corporate Office, 90/1, Motijheel, Dhaka mentioning Quotation for supply and implementation of Next Generation Firewall in perimeter to secure infrastructure and Security Solution for comprehensive protection of enterprise system Social Islami Bank Ltd. The Technical proposals submitted against the subject RFP will be opened on 29th January, 2014 at 4:30 PM in front of the purchase committee of Social Islami Bank Limited. The Financial offer will be opened at a later date, which will be notified earlier. Only Technically qualified offers will be opened. Proper documents and data sheet have to be provided for indicating all the specification is present in the offered hardware which is stated in the required specification, features and description along with brochure and road maps. v. 2 % (Two percent) of the quoted price to be submitted as Bank Guarantee (BG) with the offer in favor of "Social Islami Bank Limited" as earnest money for the period of 6 (Six) months. vi. vii. The awarded bidder shall submit a Bank guarantee of 2.5% of the quoted value as performance guarantee for the entire warranty period. The earnest money will be released upon receive of performance guarantee. All the prices should be mentioned in BDT and payment will also be made in BDT. All quoted price should include delivery, installation, testing and training cost and VAT, Tax, etc., if any. viii. Payment terms : a. 50% on delivery on SIBL premises. b. 50% on successful installation, testing and commissioning and submission of regulatory compliance report. ix. Warranty period will start after delivery, installation & successful commissioning. The AMC will start after the end of the warranty period as set forth in the tender schedule. During warranty vendor will replace or repair the defected / corrupted hardware and correct the software bug within 24 hours of reporting of the problem. The vendor will attend the problem with 2 hours of reporting. Proprietary & Confidential 15 of 18
16 x. Photocopy of all the relevant documents should be submitted with the offer including: a) Copy of Valid Trade License. b) Copy of Certificate of Incorporation c) Copy of TIN certificate. d) Copy of VAT registration certificate to be submitted. e) Copy of Manufacturer Authorization Letter f) Copies of Audited Annual Report for the last three (03) financial year(s). g) List of major clients in Financial Institutions and copies of certificates issued by such financial institutions regarding supply, installation and configurations of quoted products to such financial institutions xi. xii. xiii. The bidder should have experience in business of Supplying, installing, commissioning, operating of similar goods and providing support service in Bangladesh for the last one year in renowned organization. Should submit a realistic project implementation plan along with Gantt chart. The successful bidder must supply and install the hardware & software within 6-8 weeks from the date of issuance of the work order. In case of failure, the Performance Security of the bidder will be forfeited. The Bank shall not be under any obligation to accept the lowest quotation. The Bank authority reserves the right to accept or reject any or all, in part or full offers without assigning any reason. The Bank reserves the right to flexible, change or drops any of the terms and conditions of the schedule without any further notice. I/we have completely read the terms and conditions & specifications and understood the total responsibility of the job. I/we have quoted this bid taking all the responsibility and liability. Name of the Bidder: Signature: Telephone No: VAT Registration Number: Address: Seal: Proprietary & Confidential 16 of 18
17 5. Submission Form (To be submitted on the pad of the bidder) IT Division, Level-19, SIBL Corporate Office, Social Islami Bank Ltd. 90/1 Motijheel, Dhaka Bangladesh. Date: Subject: Submission of proposal for supply and implementation of Next Generation Firewall in perimeter to secure infrastructure and Security Solution for comprehensive protection of enterprise system. Dear Sir, With reference to your Tender Notice published in the Daily. Dated., I/We, being agreed to the terms and conditions as contained in the relative schedule SIBL-IT NG Firewall and security of Social Islami Bank Ltd, hereby submitted our proposal for Supply and implementation of Next Generation Firewall in perimeter to secure infrastructure and Security Solution for comprehensive protection of enterprise system which includes the Technical Proposal and Financial Proposal sealed under separate envelopes. I/we would also like to provide the following the information of our company: 1. Company Name, Address :. 2. Name of the Proprietor/ Partner/ :. Director 3. Date of commencement of Business :. 4. Nature of the business :. 5. Total number of permanent :. employee 6. Particulars of identical projects with :. other Bank/ financial Institution (related papers are attached with the Technical Proposal) 7. Relevant papers mentioned in the schedule are enclosed herewith : a). b). c). d). e). I/we solemnly declare that the statements made above are correct. I/We agree that any misstatement made by us, if detected later on, shall render our application unacceptable to the Bank. (Signature) (Name & designation of Authorized Signatory) (Name & Address of the Bidder with Seal) Proprietary & Confidential 17 of 18
18 6. Evaluation Criteria STAGE 1: Evaluation of the Technical Bid 70 Marks The bidder s technical offer will open first. Below are the evaluation criteria of Technical bid. The following factors will be considered when evaluating proposals. 1. Compliance with requirements 25 a. Does the proposal comply with technical specifications as set forth in this tender schedule? i. Palo Alto Networks ii. Barracuda 5 b. Does the proposal comply with all terms as set forth under general terms and conditions in this tender schedule? Vendors organization capacity 45 a. Resumes of the certified resources who will be involved in the installation, commissioning, UAT and on-going after sales support. Minimum 2 (two) local certified engineer should be available as regular employees of the bidder. i. Palo Alto Networks 10 ii. Barracuda 5 15 [Furnish a resume for proposed key personnel, both supervisory and technical. Field personnel should be included with relevant experience, background, accomplishments, and relevant certifications] b. Relevant Experiences of the vendor (5)/ History of recent deployment in last 12 months (5) 10 c. Support & Services Methodology [Vendor must have ability to provide with the replacement box / hardware for 10 critical support; please mention the number of ready stock with serial numbers] d. Local Support 24/7 - Call Center [Vendor must have the ability to response within 2 hours in critical cases (24/7 5 call center will get preference)] e. Years of Operation field (Each 2 Years carry 1 Mark) 5 STAGE 2: Evaluation of the Financial Bid 30 Marks The successful bidders at the end of Stage 1 of the evaluation process will be considered for evaluation under stage 2. The evaluation of the financial bid also will be calculate separately, as follows: The points/marks for the other successful quotes will be computed as per the following formula: Financial Bid Rating= (Lowest Bid Bidder s Price) 30. STAGE 3: Overall Rating The overall rating will be finalized as under considering 70% of Technical and 30% of Financial Bid ratings: i.e. OVERALL RATING = [Technical Bid Rating (stage1)] + [Financial Bid Rating (stage2)] The award of the contract may be made to the bidder scoring the highest overall rating. Proprietary & Confidential 18 of 18
Firewall Feature Overview
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project
Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay
QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015
MARINE PRODUCTS EXPORT DEVELOPMENT AUTHORITY (Ministry of Commerce and Industry, Govt. of India) Panampilly Avenue, Cochin 682 036 (Ph: 0484-2311979, e-mail: [email protected]) QUOTATION FOR UTM 4/26(1)/2009/EDP-HO
Gigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Palo Alto Networks Next-Generation Firewall Overview
Palo Alto Networks Next-Generation Firewall Overview The firewall is the most strategic network security infrastructure component, it sees all traffic, and as such, is in the most effective location to
Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide
Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide Welcome to the wonderful world of Palo Alto Networks Certification! We are very excited you have decided to embark upon such
TENDER FOR. SUPPLY, INSTALLATION, TESTING & COMMISSIONING OF UTMs. Tender No. IT/ 01/IIMP/ 05/2015
INDIAN INSTITUTE OF MANAGEMENT AMRITSAR INDIAN INSTITUTE OF MANAGEMENT KOZHIKODE (Mentoring IIM of IIM Amritsar) Website: https://www.iimk.ac.in/iimamritsar/ TENDER FOR SUPPLY, INSTALLATION, TESTING &
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Next Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Gigabit Multi-Homing VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband
PALO ALTO SAFE APPLICATION ENABLEMENT
PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa [email protected] @jsherlow Palo Alto Networks at a Glance Corporate Highlights
PassGuide.PCNSE6 (48Q)
PassGuide.PCNSE6 (48Q) Number: PCNSE6 Passing Score: 800 Time Limit: 120 min File Version: 4.9 http://www.gratisexam.com/ PCNSE6 Palo Alto Networks Certified Network Security Engineer 6.0 1. I was so happy
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers
Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Secure Remote Access at the Heart of the Small Business Network Highlights Dual WAN connections for load balancing and connection redundancy
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
USG6600 Next-Generation Firewall
USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239
ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239 Check Point Firewall Software and Management Software I. Description of the Item Up gradation, installation and commissioning of Checkpoint security gateway
Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.
chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event
APV9650. Application Delivery Controller
APV9650 D a t a S h e e t Application Delivery Controller Array Networks APV Series of Application Delivery Controllers optimizes the availability, user experience, performance, security and scalability
Palo Alto Networks Overview
Palo Alto Networks Overview campu[s]³ Christian Etzold Sr. System Engineer About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and networking
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
27-12-05/2011-12/Res Dated 30.12.2011 INVITATION FOR BIDS
27-12-05/2011-12/Res Dated 30.12.2011 INVITATION FOR BIDS Sub: Supply and installation of Internet Load balancing Switch and Firewall Security Appliance at RRII. The RRII invites sealed tenders for the
Next-Generation Firewall Overview
Next-Generation Firewall Overview Recent changes in application behavior and usage patterns have steadily eroded the protection that the traditional firewall once provided. Users are accessing any application,
Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall
Government of Canada Managed Security Service (GCMSS) Date: July 12, 2012 TABLE OF CONTENTS 1 FIREWALL... 1 1.1 SECURITY...1 1.2 STANDARDS...1 1.3 FAILOVER...2 1.4 PERFORMANCE...3 1.5 REPORTING...3 1.6
Network Security. Protective and Dependable. Pioneer of IP Innovation
Network Protective and Dependable Pioneer of IP Innovation Why PLANET Network Solution? With the growth of the threats, network security becomes the fundamental concerns of home and enterprise network.
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Next-Generation Firewall Overview
Next-Generation Firewall Overview Business and technology advancements have steadily eroded the protection that the traditional firewall provided. Users have come to expect to be able to work from any
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
Applications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
Gigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Gigabit Multi-Homing VPN Security Router
Gigabit Multi-Homing VPN Security Router Physical Port 1~2 x 10/100/1000 Base-T RJ-45, configurable with LAN 1 (Mirror Port) 3~4 x 10/100/1000 Base-T RJ-45, configurable with WAN 4 (WAN 4 / LAN2 / DMZ)
USG6300 Next-Generation Firewall
USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Cisco RV 120W Wireless-N VPN Firewall
Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
PCI DSS Compliance. with the Barracuda NG Firewall. White Paper
PCI DSS Compliance with the Barracuda NG Firewall White Paper About Payment Card Industry Data Security Standard (PCI DSS) Requirements In response to the increase in identity theft and security breaches,
How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses
Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer
Hillstone Intelligent Next Generation Firewall
Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,
Network Security Firewall
DFL-210 Multi-Function Security + Network Firewall + VPN Server + Content Manager + Bandwidth Manager + Transparent Firewall Mode Ports + 1 Ethernet WAN + 4 Ethernet LAN + 1 Ethernet DMZ/WAN2 Advanced
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013 Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic
APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600
APV x600 Series D a t a S h e e t Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600 Array Networks APV Series of Application Delivery Controllers optimizes the
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
Next-Generation Firewall Overview
Next-Generation Firewall Overview Fundamental shifts in the application and threat landscape, user behavior, and network infrastructure have steadily eroded the security that traditional port-based firewalls
Customer Service Description Next Generation Network Firewall
Customer Service Description Next Generation Network Firewall Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Interoute Communications Limited
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
NEN Community REANNZ. Design Statement: NEN Edge Device
TO FROM NEN Community REANNZ DATE June 2010 SUBJECT Design Statement: NEN Edge Device Background This National Education Network (NEN) design statement was developed by REANNZ with input from the relevant
REPORT & ENFORCE POLICY
App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics
High Availability Solutions & Technology for NetScreen s Security Systems
High Availability Solutions & Technology for NetScreen s Security Systems Features and Benefits A White Paper By NetScreen Technologies Inc. http://www.netscreen.com INTRODUCTION...3 RESILIENCE...3 SCALABLE
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers
Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
EdgeMarc 4508T4/4508T4W Converged Networking Router
Introduction The EdgeMarc 4508T4W combines multiple voice and data features into a single, easy to use converged networking router. It includes models that have up to 4 T1 WAN interfaces or a single Ethernet
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
SourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 [email protected] Our Customers Biggest Security Challenges Maintaining security posture
Introduction of Quidway SecPath 1000 Security Gateway
Introduction of Quidway SecPath 1000 Security Gateway Quidway SecPath 1000 security gateway is new generation security equipment developed specially for enterprise customer by Huawei-3Com. It can help
Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack
Network Security Total solution for your network security With the growth of the Internet, malicious attacks are happening every minute, and intruders are trying to access your network, using expensive
Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED
Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826 5222 F: +1 (519) 826 5228 Netsweeper Whitepaper Deploying Netsweeper Internet Content
Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway
PLANET Product Guide 2011 Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
INDIAN INSTITUTE OF TECHNOLOGY BOMBAY MATERIALS MANAGEMENT DIVISION : (+91 22) 2576 8800 (DR)
Item CORE SWITCH: 24 Ports Item Description 1)General requirements: Switch- modular operating system, non-blocking wire speed performance. Switch solution-capable of providing complete redundancy by using
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
Barracuda IM Firewall Administrator s Guide
Barracuda IM Firewall Administrator s Guide Version 3.0 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2007, Barracuda Networks www.barracuda.com
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
WATCHGUARD FIREBOX VCLASS
FIREBOX VCLASS WATCHGUARD FIREBOX VCLASS ENTERPRISE-LEVEL SECURITY The Firebox Vclass brings high-speed network security to enterprise-class businesses, remote offices, service providers, and data centers.
Vyatta Network OS for Network Virtualization
Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components
Fortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
IPCOM S Series Functions Overview
Multi Service Security Appliance IPCOM Sseries Multi Service Security Appliance IPCOM S Series Functions Overview July 2005 FUJITSU Ltd. 1 All Right Reserved, Copyright(c) FUJITSU Ltd.2005 Bandwidth Control
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Solicitation RFI-FTB-1415-SIEM Project. SIEM Project. Bid designation: Public. State of California
5 Solicitation RFI-FTB-1415-SIEM SIEM Bid designation: Public 6/19/2014 10:56 AM p. 1 6 SIEM 5 Bid Number Bid Title RFI-FTB-1415-SIEM SIEM Bid Start Date Jun 19, 2014 9:56:09 AM PDT Bid End Date Jul 7,
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.
SOLUTION GUIDE Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Cisco RV220W Network Security Firewall
Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and
