T19/03/13 REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION

Size: px
Start display at page:

Download "T19/03/13 REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION"

Transcription

1 T19/03/13 REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION CLOSING DATE: WEDNESDAY, 27 MARCH 2013 AT 12:00 NOON

2 Industrial Development Corporation TABLE OF CONTENTS SECTION 1: GENERAL CONDITIONS OF BID 3 1. Proprietary Information 4 2. Enquiries 4 3. Bid Validity Period 4 4. Instructions on submission of Tenders 4 5. Preparation of Bid Response 5 6. Supplier Performance Management 5 7. IDC s Rights 6 8. Undertakings by the Bidder 6 9. Reasons for disqualification Response Format (Returnable Schedules) Evaluation Criteria and Weightings 9 SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION Special instructions to bidders Background Information Scope of Work/ Terms of Reference Project Timelines Error! Bookmark not defined. 5. Technical Evaluation Criteria 13 SECTION 3: PRICE PROPOSAL 17 SECTION 4: ANNEXURES 20 Page 2

3 Industrial Development Corporation SECTION 1: GENERAL CONDITIONS OF BID Page 3

4 1. Proprietary Information Industrial Development Corporation of SA Ltd (IDC) considers this Tender and all related information, either written or verbal, which is provided to the respondent, to be proprietary to IDC. It shall be kept confidential by the respondent and its officers, employees, agents and representatives. The respondent shall not disclose, publish, or advertise this specification or related information to any third party without the prior written consent of IDC. 2. Enquiries All communication and attempts to solicit information of any kind relative to this Bid should be channelled to: Contact person (all technical questions should be in writing) Name: Ms Tebatso Lewele Telephone Number: Fax Number: address: 3. Bid Validity Period Responses to this tender received from vendors will be valid for a period of 120 days counted from the closing date of the tender. 4. Instructions on submission of Tenders 4.1 Tenders should be submitted in duplicate (2 hard copies) all bound in a sealed envelope endorsed, T19/03/13: REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION and one electronic copy (on CD) in PDF format. The sealed envelope must be placed in the tender box at the Main Reception area of the IDC Building, 19 Fredman Drive Sandton by no later than 12:00 noon on Wednesday, 27 March Tenders must be submitted in a prescribed response format herewith reflected as Response Format. 4.3 The closing date, company name and the return address must also be endorsed on the envelope. 4.4 If a courier service company is being used for delivery of the tender document, the tender description must be endorsed on the delivery note/courier packaging and the courier must ensure that documents are placed / deposited into the tender box. The IDC will not be held responsible for any delays where tender documents are handed to the IDC Receptionist. Page 4

5 4.5 No tender received by telegram, telex, , facsimile or similar medium will be considered. 4.6 Where a tender document is not in the tender box at the time of the tender closing, such a tender document will be regarded as a late tender. The IDC reserves the right not to evaluate any late tender response. 4.7 Amended tenders may be sent in an envelope marked Amendment to tender and should be placed in the tender box before the closing time. 5. Preparation of Bid Response 5.1 All the documentation submitted in response to this bid must be in English. 5.2 The tenderer is responsible for all the cost that they shall incur related to the preparation and submission of the tender document. 5.3 Tenders submitted by Companies must be signed by a person or persons duly authorised thereto by a resolution of a Board of Directors, a copy of which Resolution, duly certified be submitted with the Tender. 5.4 Bidders should check the numbers of the pages to satisfy themselves that none are missing or duplicated. No liability will be accepted by IDC in regard to anything arising from the fact that pages are missing or duplicated. 5.5 A list of all references (minimum of 3) must be included in the bid response. 5.6 A valid tax clearance certificate must be included in the bid response. 5.7 A copy(s) of certificates from the organizations/ bodies that the tenderer is affiliated to must be included in the bid response. 6. Supplier Performance Management Supplier Performance Management is viewed by the IDC as critical component in ensuring value for money acquisition and good supplier relations between the IDC and all its suppliers. The successful bidder shall upon receipt of written notification of an award, be required to conclude a Service Level Agreement (SLA) with the IDC, which will form an integral part of Page 5

6 the supply agreement. The SLA will l serve as a tool to measure, monitor and assess the supplier s performance level and ensure effective delivery of service, quality and valueadd to IDC s business. Bidders are required to comply with the above condition, and also provide a scorecard on how their product / service offering is being measured to achieve the objectives of this condition. 7. IDC s Rights 7.1 The IDC is entitled to amend any tender conditions, validity period, specifications, or extend the closing date of tenders before the closing date. All tenderers, to whom the tender documents have been issued, will be advised in writing of such amendments in good time. 7.2 The IDC reserves the right not to accept the lowest tender or any tender in part or in whole. It normally awards the contract to the tenderer who proves to be fully capable of handling the contract and whose tender is technically acceptable and/or financially advantageous to the IDC. 7.3 The IDC reserves the right to award this tender to a purely empowerment company or may award this tender on condition that a joint venture with an empowerment company is formed. This will be added to the criteria when evaluating the tenders. 7.4 The IDC reserves the right to award this tender as a whole or in part without furnishing reasons. 7.5 IDC reserves the right at all material times to extend the scope of work relating to this tender to include all or some of the IDC s Subsidiaries. Should this be the case, as a result thereof all the relevant implications will be negotiated between the IDC and the successful tenderer. 8. Undertakings by the Bidder 8.1 The bidder hereby offer to render all or any of the services described in the attached documents to the IDC on the terms and conditions and in accordance with the specifications stipulated in this Tender documents (and which shall be taken as part of, and incorporated into, this Proposal at the prices inserted therein). 8.2 Tenders submitted by Companies must be signed by a person or persons duly authorised thereto by a resolution of a Board of Directors, a copy of which Resolution, duly certified be submitted with the Tender. Page 6

7 8.3 The bidder shall prepare for a possible presentation should IDC require such and the tenderer shall be notified thereof no later than 4 (four) days before the actual presentation date. 8.4 The bidder hereby agree that the offer herein shall remain binding upon him/her and receptive for acceptance by the IDC during the validity period indicated and calculated from the closing hour and date of the Tender; this Proposal and its acceptance shall be subject to the terms and conditions contained in this tender document. 8.5 The bidder furthermore confirm that he/she has satisfied himself/herself as to the correctness and validity of his/her Tender response that the price(s) and rate(s) quoted cover all the work/item(s) specified in the Tender response documents and that the price(s) and rate(s) cover all his/her obligations under a resulting contract and that he/she accept that any mistakes regarding price(s) and calculations will be at his/her risk. 8.6 The bidder hereby accept full responsibility for the proper execution and fulfilment of all obligations and conditions devolving on him/her under this agreement as the Principal(s) liable for the due fulfilment of this contract. 9. Reasons for disqualification 9.1 The IDC reserves the right to disqualify any bidder which does any one or more of the following, and such disqualification may take place without prior notice to the offending bidder, however the bidder will be notified in writing of such disqualification: bidders who do not submit a valid and original Tax Clearance Certificate on the closing date and time of the bid; bidders who submitted incomplete information and documentation according to the requirements of this bid document; bidders who submitted information that is fraudulent, factually untrue or inaccurate information; bidders who received information not available to other vendors through fraudulent means; and/or bidders who do not comply with mandatory requirements as stipulated in this bid document. Page 7

8 10. Response Format (Returnable Schedules) Tenderers shall submit their responses in accordance with the response format specified below (each schedule must be clearly marked): 10.1 Cover Page: (the cover page must clearly indicate the tender reference number, tender description and the tenderer s name) 10.2 Schedule 1: Executive Summary Annexure 1 of this tender document (duly completed and signed) 10.3 Schedule Original and Valid tax clearance certificate(s); Certified copies of your CIPRO company registration documents listing all members with percentages, in case of a CC. Or latest certified copies of all share certificates in case of a company; Annexure 2 of this tender document (duly completed) BEE Certificate verified by a SANAS accredited verification agency or a letter from the supplier s auditor (option only for Exempted Micro Enterprises with annual turnover less than R5 million); Note: If a Consortium, Joint Venture or Subcontractor, the documents listed above ( ) must be submitted for each Consortium/ JV member or subcontractor Schedule 3: Response to Section 2 of this document 10.5 Schedule 4: Price Proposal (response to Section 3 of this bid document) (Must be submitted in a separate envelope) Page 8

9 11. Evaluation Criteria and Weightings Tenders shall be evaluated in terms of the following parameters: 11.1 Technical Bids will be evaluated in accordance with the following technical criteria: Mandatory Requirements All bid responses that do not meet technical mandatory requirements may be disqualified and may not be considered for further evaluation on the Non- Mandatory technical Preference Point System All tenders that will achieve the minimum qualifying score (acceptable bids) will be evaluated further in terms of the preference point system as follows: CRITERIA POINTS Price 80 BEE 20 TOTAL 100 points. Page 9

10 Industrial Development Corporation SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION Page 10

11 SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION 1. Special instructions to bidders 1.1 Bidders shall provide full and accurate answers to the questions posed in this document, and, where required explicitly state either Comply/Not Comply regarding compliance with the requirements. Bidders must substantiate their response to all questions, including full details on how their proposal/solution will address specific functional/ technical requirements, failure to substantiate may lead to the bidder being disqualified. All documents as indicated must be supplied as part of the bid response. Failure to comply with Mandatory Requirements may lead to the bidder being disqualified. 2. Background Information Enterprises are increasingly online and data-centric, connecting partners, personnel, suppliers, or customers with applications that face a growing danger of cyber-attacks. These targeted threats are greater and more sophisticated than ever before, and data security compliance requirements become more stringent every day. The IDC needs uncompromising security that will enable the company to modernize the datacenter with virtualization and cloud computing without reducing performance. The solution must provide advanced security for physical, virtual, and cloud servers and virtual desktops. Whether implemented as software, virtual appliance, or in a hybrid approach, this solution should minimize overhead and streamline management but provides strong agentless security for virtual machines. The solution must also address a wide range of compliance requirements, including seven major PCI compliance requirements with multiple protection modules in one consolidated solution. 3. Scope of Work The scope of work includes: 3.1 Solution The bidder must provide the IDC with advanced protection for systems in the datacenter from virtual desktops to physicals, virtual or cloud servers. The solution must combine intrusion detection and prevention, firewall, integrity monitoring, log inspection, and agentless anti-malware capabilities to help prevent data breaches and ensure business continuity. This dynamic, centrally managed solution should also supports compliance with important standards and regulations such as PCI, FISMA, and HIPAA 3.2 Support Repair of faults and configuration problems Minimum response time of 60 minutes to a logged call and a maximum of 4 hours to repair Weekly health check of deployed solution Page 11

12 3.3 Maintenance Providing the IDC with pro-active information regarding new releases, software versions, patches and end-of-life announcements, including recommendations about whether and when the IDC should upgrade A single configuration check and report per annum A single software version check and report per annum Monthly check and report on possible necessary patches Upgrade of software, firmware and loading of patches as and when necessary 3.4 Growth Integrate or re-design additional sites, as the IDC grows Advise on new technologies, functionalities and best practices Buying of additional hardware and Licenses as and when required 4. Current Infrastructure and Hardware list The IDC has a new greenfield Active Directory (new forest) services solution that is based on Windows 2008 R2 to enable and support its Sandton head office and regional offices which are currently located in Durban, East London, Cape Town, Kimberley, Rustenburg, Polokwane, Bloemfontein, Pietermaritzburg, Port Elizabeth, Brits, Nelspruit and Upington. The IDC has also virtualized all production, high availability and disaster recovery server environments on VMware and is in the planning phase of upgrading to version 5.1. The IDC s production and high availability server sites at Sandton head office, are within close proximity in separate buildings linked with fiber. Both sites are equipped with an HP EVA 8400, one for production and the other for replication, snap shots, snap clones and disk base backups of all business critical data. Business Copy is currently been used to replicate production data to the high availability HP EVA All business critical servers have dual connectivity to network and storage. The current backup software and library is HP Data Protector, Veeam and Quantum s ADIC i2000 Tape Library respectively. The high availability server site has virtualized servers through which duplicates all business critical application servers from the production server site. The IDC have standardized on Hewlett Packard (HP) server hardware. Currently there are about 130 virtualized servers (VMware), which run on C-class blades. All but two regional servers run on Microsoft Server 2008 R2 operating system and Microsoft SQL 2005/2008R2 (where applicable). The other two regional servers run Windows Server 2003 The new Windows 2008 directory services solution is running Windows 2008 R2. The IDC has also deployed Microsoft System Centre Configuration and System Center Operations Manager in the new greenfield Active Directory infrastructure. Page 12

13 5. Technical Evaluation Criteria 5.1 Mandatory Technical Requirements Deployment and Integration Integration with vshield Endpoint and VMsafe APIs as well as VMware vcenter that will enable rapid deployment on ESX servers as a virtual appliance to immediately and transparently protect vsphere virtual machines. Detailed, server-level security events must be provided to a SIEM system, including ArcSight, Intellitactics, NetIQ, RSA Envision, Q1Labs, Loglogic, and other systems through multiple integration options. Directory integration with enterprise-scale directories, including Microsoft Active Directory. Comply: Yes/No Comply: How (Substantiate/Comments) The solution must cover the following security postures/modules The solution must have agent less Malware Protection for VMware Environments. Optimizes security operations to avoid security brown-outs commonly seen in full system scans and pattern updates Tamper-proofs security from sophisticated attacks by isolating malware from antimalware Deep Packet Inspection; Examines all incoming and outgoing traffic for protocol deviations, policy violations, or content that signals an attack Operates in detection or prevention mode to protect operating systems and enterprise application vulnerabilities Provides automatic notification that outlines who attacked, when they attacked, and what they attempted to exploit Intrusion Detection and Prevention; Protects against known and zero-day attacks by shielding known vulnerabilities from unlimited exploits. Automatically shields newly discovered vulnerabilities within hours, pushing protection to thousands of servers in minutes without a system reboot. Includes out-of-the-box vulnerability protection for over 100 applications, including database, web, , and FTP servers. Comply: Yes/No Comply: How (Substantiate/Comments) Page 13

14 5.1.2 The solution must cover the following security postures/modules Web Application Protection; Assists compliance (PCI DSS 6.6) to protect web applications and the data they process. Defends against SQL injection, crosssite scripting, and other web application vulnerabilities. Shields against vulnerabilities until code fixes can be completed. Application Control; Provides increased visibility into, or control over applications accessing the network Uses application control rules to identify malicious software accessing the network Reduces vulnerability exposure of servers Comply: Yes/No Comply: How (Substantiate/Comments) Bidirectional Stateful Firewall; Decreases the attack surface of physical, cloud, and virtual servers with fine-grained filtering, design policies per network, and location awareness for all IP-based protocols and frame types. Centrally manages server firewall policy, including templates for common server types. Prevents denial of service attacks and detects reconnaissance scans. Integrity Monitoring: Monitors critical operating system and application files, such as directories, registry keys, and values, to detect malicious and unexpected changes. Detects modifications to existing file systems and new file creations and reports them in real time. Enables on-demand, scheduled, or real-time detection; checks file properties (PCI ); and monitors specific directories. Page 14

15 5.1.2 The solution must cover the following security postures/modules Log Inspection; Collects and analyses operating system and application logs for suspicious behaviour, security events, and administrative events across your datacenter. Assists compliance (PCI DSS 10.6) to optimise the identification of important security events buried in multiple log entries. Forwards events to SIEM system or centralised logging server for correlation, reporting and archiving. Current Product: Briefly describe the capabilities and functionality of the current version of your proposed product, and identify features that were new with this release. Comply: Yes/No Comply: How (Substantiate/Comments) The management console should run on a Microsoft Server. Performance overheads; What is the impact on the RAM, CPU utilization and the file space needed. Agent based monitoring Network based monitoring How does your proposed solution architecture scale to support large centralized or distributed environments? Differentiation: Briefly describe the reasons why your offering is a leader in the market (list three to five unique, quantifiable and succinct points). Does your product do continuously Monitor for File Integrity changes in Operating Systems such as Windows Server 2000/2003/2008/, AIX, HPUX, Solaris, Linux etc. Monitor Changes on Active Directory activities such as: User creation/deletion/disabling/modification Groups Deletion/creation/Modification i.e. New members added - Active Directory Group Domain policy and Group Security Policy Changes -Organization Units deletion/creation/modification. Does your product have the ability to monitor file and folder integrity changes at a granular level, e.g. Report on File permission and ownership changes but Auto-promote file content changes. Does your product have the ability Monitor Data Integrity changes on major Database software s such as Oracle, Microsoft SQLManage Database Changes: The ability for your solution to captures all changes to database users, schemas, stored procedures, triggers and critical operational data. Notify respective teams of unauthorized changes on the systems through sending alerts and periodic Reports as well as online web based reports. Provide support for custom and scheduled reporting Page 15

16 5.1.2 The solution must cover the following security postures/modules Facilitate Change Management Process through creation of change windows and creation of reports showing changes that have occurred inside/outside of change windows. Ability to perform Rollback on Changes that occurred thus restoring the file to the original state before the change was done. For all changes in the virtual environment, can the following information be provided on the Reports: What changed -Change Nature i.e. Deletion, modification etc. -Who did the change - Timestamp What time did the change occur. Integration with other monitoring systems such as antivirus, filters, network monitors to give a consolidated position for ease of management. Assess IT system configurations against a wide range of policy and standards i.e. PCI DSS and ISO etc.. Detect changes to configuration states in real time, including changes that occur at the server, database, directory server, and network device level. Ability to capture unauthorized or new software installations in the IT environment installed. Ability to perform Change impact analysis before changes are approved. System should enable trend analysis. Capability to integrate with ticketing system and leading CMDB solutions in the market. Can the solution support role-based access control for the following roles: Administrator Read-only user Normal user Can the solution combine log Management and event data with real-time change data to immediately reveal events of interest that impact policy or threaten security. Comply: Yes/No Comply: How (Substantiate/Comments) Product Road Map Future Product Road Map: Briefly describe plans for future proposed product and service enhancements, including the capabilities and functionality of the next planned releases or versions, the timetable for those capabilities, major upgrades and sunset considerations. Provide Seamless or single console integration with event management solutions. Ability to distinguish between high- and low-risk changes. Identify transient violations; if a file is changed inappropriately and then changed back, it should be able to create a transient compliance violation. Comply: Yes/No Comply: How (Substantiate/Comments) Page 16

17 SECTION 3: PRICE PROPOSAL Page 17

18 SECTION 3: Cost Proposal 1 Please indicate your total bid price here: R (compulsory) 2 NOTE: All prices must be VAT exclusive and must be quoted in South African Rand (ZAR). 3 Are the rates quoted firm for the full period of the contract? YES NO Important: If not firm for the full period, provide details of the basis on which adjustments shall be applied e.g. CPI, and also details of the cost breakdown. 4 The bidder must indicate CLEARLY which portion of the bid price is linked to the exchange rate. Substantiate / Comments Comply Not Comply 5 All additional costs must be clearly specified and included in the total bid price. Comply Not Comply Substantiate / Comments 6 Payments will be linked to the specified deliverables after such deliverables have been approved by the IDC. Substantiate / Comments Comply Not Comply 7. COSTING MODEL 7.1 SOFTWARE Cost Element Virtualised Datacenter Security Solution Cost (VAT Excl.) Year 1 Maintenance and Support Year 2 Year 3 Sub-Total (A) (VAT Excl.) 7.2 SERVICES Activity/ Deliverable Resource(s) Rate/Hour per resource Number of hours Cost (VAT Excl.) Installation Training of 4 administrators Other Costs (if applicable) Sub-Total (B) (VAT Excl.) Note: Other Costs must be clearly defined here. TOTAL BID PRICE (A+B) (VAT EXCL.) Page 18

19 Price Declaration Form Dear Sir, Having read through and examined the Request For Proposal (RFP) Document, RFP no. T19/03/13 the General Conditions, The Requirement and all other Annexures to the RFP Document, we offer to supply, install, maintain and support a Virtualised Datacenter Security Solution, as detailed in the RFQ document for a period of one (1) year including escalation Fees: R... (Excluding VAT) In words R...(Excluding VAT) We confirm that this price covers all activities associated with the project management and consulting service, as called for in the Tender document. We confirm that IDC will incur no additional costs whatsoever over and above this amount in connection with the provision of this service. We undertake to hold this offer open for acceptance for a period of 120 days from the date of submission of offers. We further undertake that upon final acceptance of our offer, we will commence with the provision of service when required to do so by the IDC. We understand that you are not bound to accept the lowest or any offer and that we must bear all costs which we have incurred in connection with preparing and submitting this tender. We hereby undertake for the period during which this tender remains open for acceptance not to divulge to any persons, other than the persons to which the tender is submitted, any information relating to the submission of this tender or the details therein except where such is necessary for the submission of this tender. SIGNED DATE (Print name of signatory) Designation FOR AND ON BEHALF OF: COMPANY NAME Tel No Fax No Cell No Page 19

20 SECTION 4: ANNEXURES Page 20

21 Industrial Development Corporation Annexure 1 Acceptance of Bid Conditions And Bidder s Details Request for Proposal No: Name of Bidder: Authorised signatory: Name of Authorised Signatory Position of Authorised Signatory By signing above the bidder hereby accept full responsibility for the proper execution and fulfilment of all obligations and conditions devolving on him/her under this agreement as the Principal(s) liable for the due fulfilment of this contract. [Note to the Bidder: The Bidder must complete all relevant information set out below.] BIDDING STRUCTURE Indicate the type of Bidding Structure by marking with an X : Individual Bidder Joint Venture/ Consortium Sub Contractors Other REQUIRED INFORMATION If Individual Bidder: Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Page 21

22 If Joint Venture or Consortium, indicate the following for each partner: Partner 1 Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Partner 2 Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Page 22

23 If using sub-contractors, indicate the following: Prime Contractor Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Sub contractors Name of Company Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Page 23

24 Annexure 2 - Supply chain management practices questionnaire Request for Proposal No: Name of Respondent: Authorised signatory: [Note to the Respondent: the Respondent must complete the information set out below. If the Respondent requires more space than is provided below it must prepare a document in substantially the same format setting out all the information referred to below and return it with Returnable Schedule 2.] The Respondent must complete the following questionnaire. Respondent's past supply chain management practices: Item Question Yes No 3.1 Is the Respondent or any of its directors listed on the South African National Treasury s database as companies or persons prohibited from doing business with the public sector? (Companies or persons who are listed on this database were informed in writing of this restriction by the South African National Treasury after the audi alteram partem rule was applied). Yes No If so, provide particulars: 3.2 Is the Respondent or any of its directors listed on the Register for Tender Defaulters in terms of section 29 of the Prevention and Combating of Corrupt Activities Act No 12 of 2004? To access this Register enter the National Treasury s website, click on the icon Register for Tender Defaulters or submit your written request for a hard copy of the Register to facsimile number Yes No If so, provide particulars: 3.3 Was the Respondent or any of its directors convicted by a court of law (including a court outside of the Republic of South Africa) for fraud or corruption during the past five years? Yes No

25 Item Question Yes No If so, provide particulars: 3.4 Was any contract between the Respondent and any organ of state (within the Republic of South Africa or within any foreign territory) terminated during the past five years on account of failure to perform on or comply with the contract? Yes No If so, provide particulars: Page 25

T54/09/14 APPOINTMENT OF A PANEL OF STOCK BROKERS TO PROVIDE BROKERAGE SERVICES TO THE IDC BID CLOSING DATE: WEDNESDAY, 08 OCTOBER 2014 AT 12:00 NOON

T54/09/14 APPOINTMENT OF A PANEL OF STOCK BROKERS TO PROVIDE BROKERAGE SERVICES TO THE IDC BID CLOSING DATE: WEDNESDAY, 08 OCTOBER 2014 AT 12:00 NOON T54/09/14 APPOINTMENT OF A PANEL OF STOCK BROKERS TO PROVIDE BROKERAGE SERVICES TO THE IDC BID CLOSING DATE: WEDNESDAY, 08 OCTOBER 2014 AT 12:00 NOON Industrial Development Corporation TABLE OF CONTENTS

More information

T28/05/13. Supply and Installation of Video Conferencing Equipment to IDC CLOSING DATE: FRIDAY, 17 MAY 2013 AT 12:00 NOON

T28/05/13. Supply and Installation of Video Conferencing Equipment to IDC CLOSING DATE: FRIDAY, 17 MAY 2013 AT 12:00 NOON T28/05/13 Supply and Installation of Video Conferencing Equipment to IDC CLOSING DATE: FRIDAY, 17 MAY 2013 AT 12:00 NOON Industrial Development Corporation TABLE OF CONTENTS SECTION 1: GENERAL CONDITIONS

More information

T01/01/14 REQUEST FOR PROPOSAL TO CONDUCT ANNUAL CUSTOMER SATISFACTION SURVEYS CLOSING DATE: FRIDAY, 31 JANUARY 2014 AT 12:00 NOON

T01/01/14 REQUEST FOR PROPOSAL TO CONDUCT ANNUAL CUSTOMER SATISFACTION SURVEYS CLOSING DATE: FRIDAY, 31 JANUARY 2014 AT 12:00 NOON T01/01/14 REQUEST FOR PROPOSAL TO CONDUCT ANNUAL CUSTOMER SATISFACTION SURVEYS CLOSING DATE: FRIDAY, 31 JANUARY 2014 AT 12:00 NOON Industrial Development Corporation TABLE OF CONTENTS SECTION 1: GENERAL

More information

T34/02/16 PROVISION OF SECURITY ALARM SYSTEM, MONITORING AND ARMED RESPONSE SERVICES TO 14 IDC REGIONAL OFFICES

T34/02/16 PROVISION OF SECURITY ALARM SYSTEM, MONITORING AND ARMED RESPONSE SERVICES TO 14 IDC REGIONAL OFFICES T34/02/16 PROVISION OF SECURITY ALARM SYSTEM, MONITORING AND ARMED RESPONSE SERVICES TO 14 IDC REGIONAL OFFICES BID CLOSING DATE: MONDAY, 14 MARCH 2016 AT 12:00 NOON Industrial Development Corporation

More information

T29/05/13 REQUEST FOR PROPOSAL FOR THE APPOINTMENT OF EPC CONTRACTOR FOR THE DESIGN PHASE OF THE CONSTRUCTION OF FOSKOR PLANT

T29/05/13 REQUEST FOR PROPOSAL FOR THE APPOINTMENT OF EPC CONTRACTOR FOR THE DESIGN PHASE OF THE CONSTRUCTION OF FOSKOR PLANT T29/05/13 REQUEST FOR PROPOSAL FOR THE APPOINTMENT OF EPC CONTRACTOR FOR THE DESIGN PHASE OF THE CONSTRUCTION OF FOSKOR PLANT A NON COMPULSORY BRIEFING SESSION WILL BE HELD ON THURSDAY, 16 MAY 2013 AT

More information

Trend Micro. Advanced Security Built for the Cloud

Trend Micro. Advanced Security Built for the Cloud datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

Comprehensive security platform for physical, virtual, and cloud servers

Comprehensive security platform for physical, virtual, and cloud servers datasheet Trend Micro deep security 9 Comprehensive security platform for physical, virtual, and cloud servers Virtualization and cloud computing have changed the face of today s data center. Yet as organizations

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Request for proposals (RFP) The supply of a computer based Library Management System for the CSIR. RFP No. 579/29/05/2015

Request for proposals (RFP) The supply of a computer based Library Management System for the CSIR. RFP No. 579/29/05/2015 Request for proposals (RFP) The supply of a computer based Library Management System for the CSIR RFP No. 579/29/05/2015 Date of Issue: 15 May 2015 Closing Date: Friday, 29 th May 2015 Place: Tender box,

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Request for proposals (RFP) The Provision of transcription services to the CSIR for a Human Language Technology data pipeline optimisation project

Request for proposals (RFP) The Provision of transcription services to the CSIR for a Human Language Technology data pipeline optimisation project CSIR TENDER DOCUMENTATION Request for proposals (RFP) The Provision of transcription services to the CSIR for a Human Language Technology data pipeline optimisation project RFP No. 667/30/10/2015 Date

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Knysna Municipality is inviting quotations from suitable suppliers for the goods described below. Category Computer Software

Knysna Municipality is inviting quotations from suitable suppliers for the goods described below. Category Computer Software Knysna Municipality is inviting quotations from suitable suppliers for the goods described below. Category Computer Software ADVERTISEMENT DATE: 15 th May 2014 RFQ NUMBER: 40/2014 DESCRIPTION OF GOODS/SERVICES:

More information

Trend Micro Deep Security

Trend Micro Deep Security Trend Micro Deep Security Server Security Protecting the Dynamic Datacenter A Trend Micro White Paper August 2009 I. SECURITY IN THE DYNAMIC DATACENTER The purpose of IT security is to enable your business,

More information

Trend Micro deep security 9.6

Trend Micro deep security 9.6 datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving

More information

Total Cloud Protection

Total Cloud Protection Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased

More information

11:00 a.m. The closing time will be as per the clock at the RAF reception

11:00 a.m. The closing time will be as per the clock at the RAF reception RFB NUMBER: RAF/2015/00019 DESCRIPTION: Request for Information: ICT Security Solutions PUBLISH DATE: 18 September 2015 VALIDIY PERIOD: 120 days from the closing date CLOSING DATE: 20 October 2015 CLOSING

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013

More information

SUPPLIER DATABASE REGISTRATION QUESTIONNAIRE - CONSULTANTS

SUPPLIER DATABASE REGISTRATION QUESTIONNAIRE - CONSULTANTS SUPPLIER DATABASE REGISTRATION QUESTIONNAIRE - CONSULTANTS Name of company Town / City Revision 0, October 2012 1 ALL SUPPLIER INFORMATION WILL BE TREATED STRICTLY CONFIDENTIAL. NOTE: a) The information

More information

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

ADVERTISEMENT DATE 3 December 2014 Marketing & Communications RFQ NUMBER JCPZ/RFQ/MKT14 2014 DATE)

ADVERTISEMENT DATE 3 December 2014 Marketing & Communications RFQ NUMBER JCPZ/RFQ/MKT14 2014 DATE) QUOTATIONS ARE HEREBY REQUESTED IN ACCORDANCE WITH THE SCM REGULATIONS SECTION 18 OF THE LOCAL GOVERNMENT MUNICIPAL FINANCE MANAGEMENT ACT 56 OF 2003, FOR THE PURCHASE OF ITEM/S THAT COULD BE ABOVE R30

More information

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal P a g e 2 Table of Contents 1.

More information

Appointment of a service provider to assist with the development of Analytics Capability for PAYE and VAT. RFP No.: RFP 28/2014

Appointment of a service provider to assist with the development of Analytics Capability for PAYE and VAT. RFP No.: RFP 28/2014 Appointment of a service provider to assist with the development of Analytics Capability for PAYE and VAT. Briefing Session: 18 February 2015 at 14h00 RFP No.: RFP 28/2014 Closing Date: 10 March 2015,

More information

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Kindly furnish me with a written quotation for the supply of the following service: ENVIRONMENTAL IMPACT ASSESSMENT (EIA) CONSULTANCY SERVICES

Kindly furnish me with a written quotation for the supply of the following service: ENVIRONMENTAL IMPACT ASSESSMENT (EIA) CONSULTANCY SERVICES Request for formal written price quotations Kindly furnish me with a written quotation for the supply of the following service: ENVIRONMENTAL IMPACT ASSESSMENT (EIA) CONSULTANCY SERVICES The Johannesburg

More information

VENDOR APPLICATION FORM

VENDOR APPLICATION FORM INTRODUCTION AND GUIDELINES VENDOR APPLICATION FORM The purpose of this database is to give all current and prospective service providers, an equal opportunity to submit quotations to the University for

More information

PROCUREMENT OF VEEAM BACKUP & REPLICATION ENTERPRISE FOR VMWARE LICENCE

PROCUREMENT OF VEEAM BACKUP & REPLICATION ENTERPRISE FOR VMWARE LICENCE 1 SOL PLAATJE MUNICIPALITY INVITATION FOR QUOTATION Q 072 /2014: PROCUREMENT OF VEEAM BACKUP & REPLICATION ENTERPRISE FOR VMWARE LICENCE SUPPLIER ADRESS: TEL NO: CELL NO.: FAX NO: Prepared for:- Prepared

More information

Request for Proposal (RFP) Risk Management and Short Term Insurance Broking Services. RFP Number: 485/12/12/2014

Request for Proposal (RFP) Risk Management and Short Term Insurance Broking Services. RFP Number: 485/12/12/2014 Request for Proposal (RFP) Risk Management and Short Term Insurance Broking Services RFP Number: 485/12/12/2014 Date of Issue 23 November 2014 Compulsory Briefing Session Closing Date and Time Place 1

More information

INVITATION TO BID (SBD 1) BID DESCRIPTION BID DOCUMENTS ARE TO BE DEPOSITED AT:

INVITATION TO BID (SBD 1) BID DESCRIPTION BID DOCUMENTS ARE TO BE DEPOSITED AT: INVITATION TO BID (SBD 1) YOU ARE HEREBY INVITED TO BID FOR THE FOLLOWING SPECIFIED SUPPLY REQUIREMENTS BID : NRF/SAAO/2016/014 CLOSING DATE: 8 April 2016 CLOSING TIME 11:00 BID DESCRIPTION Service and

More information

LUKHANJI DIRECTORATE: FINANCE SUPPLY CHAIN MANAGEMENT UNIT

LUKHANJI DIRECTORATE: FINANCE SUPPLY CHAIN MANAGEMENT UNIT MUNICIPALITY UMASIPALA MUNISIPALITEIT LUKHANJI DIRECTORATE: FINANCE SUPPLY CHAIN MANAGEMENT UNIT Private Bag X7111 QUEENSTOWN 5320 Telephone: 045 807 2000 Fax: 045 807 2059 Website: www.lukhanji.gov.za

More information

Virtualization Journey Stages

Virtualization Journey Stages Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey

More information

Supplier prequalification Document

Supplier prequalification Document Table of Contents Part 1 Invitation to Applicants Invitation Notice Statement of Requirements Part 2 Application Procedures Section 1 Instructions to Applicants Section 2 Application submission control

More information

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed

More information

INVITATION TO QUOTE ITQ REF NO: NKF/BL/2015/015 Date: 30 September 2015

INVITATION TO QUOTE ITQ REF NO: NKF/BL/2015/015 Date: 30 September 2015 INVITATION TO QUOTE ITQ REF NO: NKF/BL/05/05 Date: 0 September 05 TITLE : FOR THE PROVISION OF DESIGN AND IMPLEMENTATION OF DISASTER RECOVERY SOLUTION FOR NKF. Introduction. The National Kidney Foundation

More information

EXTERNAL POLICY PROCUREMENT

EXTERNAL POLICY PROCUREMENT EXTERNAL POLICY PROCUREMENT Revision: 0 Page 1 of 8 TABLE OF CONTENTS 1 SCOPE 3 2 POLICY 3 2.1 Procurement objectives 3 2.2 Broad-Based Black Economic Empowerment (BBBEE) 3 2.3 Business ethics and governance

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

REQUEST FOR PROPOSALS FOR: DOCUMENT COLLECTION AND SCANNING FOR 36 MONTHS CONTRACT SCMN33 /2013

REQUEST FOR PROPOSALS FOR: DOCUMENT COLLECTION AND SCANNING FOR 36 MONTHS CONTRACT SCMN33 /2013 REQUEST FOR PROPOSALS FOR: DOCUMENT COLLECTION AND SCANNING FOR 36 MONTHS CONTRACT SCMN33 /2013 1 Table of Contents Item Page Number 1 Introduction 3 2 Background 3 3 Purpose 3 4 Bid Evaluation 3 5 Preference

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING 4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the

More information

City of Richmond Business and Financial Services Department. Contract 4595P. Security Information Event Management System

City of Richmond Business and Financial Services Department. Contract 4595P. Security Information Event Management System Business and Financial Services Department Request for Proposal Security Information Event Management System 1. Introduction The City of Richmond (the City ) requires a Security Information and Event Management

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)

More information

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc. Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical

More information

Next Generation Datacenters & the Realities of Virtualisation Security

Next Generation Datacenters & the Realities of Virtualisation Security Next Generation Datacenters & the Realities of Virtualisation Security Simon Young General Manager, Server Security EMEA Classification 10/7/2009 1 Agenda The Dynamic Data Center & New Security Challenges

More information

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3

More information

TENDER NUMBER: ITT/SACU/015/2015/O Information and Communication Technology (ICT) Audit IT Effectiveness Review

TENDER NUMBER: ITT/SACU/015/2015/O Information and Communication Technology (ICT) Audit IT Effectiveness Review TENDER NUMBER: ITT/SACU/015/2015/O Information and Communication Technology (ICT) Audit IT Effectiveness Review CLOSING DATE & TIME FRIDAY, 23 JANUARY 2015 17H00 (Namibian Time) POSTAL & PHYSICAL ADDRESS

More information

APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION

APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION To: Ecobank (Indicate country name) For bank use only Account Nº: Please read carefully and complete all relevant

More information

90 days (commencing from the RFB Closing Date) RENEWAL OF MICROSOFT LICENSES FOR THE CIDB FOR THE PERIOD OF 12 MONTHS

90 days (commencing from the RFB Closing Date) RENEWAL OF MICROSOFT LICENSES FOR THE CIDB FOR THE PERIOD OF 12 MONTHS Page 1 of 27 BID/RFQ NUMBER: RFB60419 CLOSING DATE: 7 DECEMBER 2015 CLOSING TIME: 11:00 AM BID VALIDITY PERIOD: 90 days (commencing from the RFB Closing Date) DESCRIPTION OF BID: RENEWAL OF MICROSOFT LICENSES

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

TENDER BOX LOCATION. The Tendering System

TENDER BOX LOCATION. The Tendering System GT/GDE/128/2015 SECTION 1-ISSUE DATE:2015-09-28 Page 1 of 50 Client Support Request for Proposal RFP NUMBER RFP DESCRIPTION Page 1 of 3 GT/GDE/128/ 2015 BIDDERS ARE HEREBY INVITED TO SUBMIT PROPOSALS FOR:

More information

2.1. Service Providers who do not comply with the mandatory requirements will not be considered for further evaluation.

2.1. Service Providers who do not comply with the mandatory requirements will not be considered for further evaluation. BID SPECIFICATION Infrastructure as a Service (IaaS) 1. BACKGROUND OF THE ROAD ACCIDENT FUND The Road Accident Fund (RAF) is a statutory body that, in terms of the provisions of the Road Accident Fund

More information

Eskom Holdings SOC Ltd s Standard Conditions of Tender

Eskom Holdings SOC Ltd s Standard Conditions of Tender 1. General Actions 1 The Employer, the Eskom Representative and each eligible er submitting a shall act timeously, ethically and in a manner which is fair, equitable, transparent, competitive and cost-effective.

More information

The purpose of this database is to give all prospective suppliers an equal opportunity to submit quotations.

The purpose of this database is to give all prospective suppliers an equal opportunity to submit quotations. TO ALL SUPPLIERS SEEKING REGISTRATION AS APPROVED SUPPLIERS ON DEPARTMENT OF CORRECTIONAL SERVICE S SUPPLIER DATABASE FOR THE PERIOD 1 APRIL 2015 TO MARCH 2016 The purpose of this database is to give all

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION

APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION To: Ecobank (Indicate country name) For bank use only Account Nº: Please read carefully and complete all relevant

More information

Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company

Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company Attention: Date: 08.02.2015 From: Our Reference: To whom it may concern Oman Rail Company SAOC Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company Tender No:- C-001-15 Tender

More information

Request for Proposal. Contract Management Software

Request for Proposal. Contract Management Software Request for Proposal Contract Management Software Ogden City Information Technology Division RETURN TO: Ogden City Purchasing Agent 2549 Washington Blvd., Suite 510 Ogden, Utah 84401 Attn: Sandy Poll 1

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

Effective End-to-End Cloud Security

Effective End-to-End Cloud Security Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of

More information

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz) Trend Micro Sicherheit in den Tiefen des Hypervisors Richard Javet und Gabriel Kälin Trend Micro (Schweiz) Lösungsausrichtung von Trend Micro Aktuelle Herausforderungen Deep Security: Sicherheit für Recheninfrastrukturen

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

PCI DSS 3.0 Compliance

PCI DSS 3.0 Compliance A Trend Micro White Paper April 2014 PCI DSS 3.0 Compliance How Trend Micro Cloud and Data Center Security Solutions Can Help INTRODUCTION Merchants and service providers that process credit card payments

More information

Provision of Internet Services at NNPC Corporate Headquarters, Abuja

Provision of Internet Services at NNPC Corporate Headquarters, Abuja Provision of Internet Services at NNPC Corporate Headquarters, Abuja Bid Document JULY 2015 Telecoms Department 1. Invitation to Bidders The invitation is to bid for the Provision of Internet Services

More information

Request for Quotation: Hosting and Pay Per Click Campaign: Shisa Solar

Request for Quotation: Hosting and Pay Per Click Campaign: Shisa Solar ENERGY OFFICE 19th Floor, 75 Dr Langalibalele Dube Street, Durban, 4001 P O Box 1014, Durban 4000 Tel: +27 31 311 1139, Fax; +27 31 311 1089 Email: [email protected] www.durban.gov.za 30 th September

More information

REQUEST FOR QUOTATION (RFQ) Encryption Key Management Solution. Date Posted: May 27, 2015. Solicitation Number RFQ-2015-0527

REQUEST FOR QUOTATION (RFQ) Encryption Key Management Solution. Date Posted: May 27, 2015. Solicitation Number RFQ-2015-0527 REQUEST FOR QUOTATION (RFQ) Date Posted: May 27, 2015 Solicitation Number Bid Due Date and Time June 9, 2015 12PM Noon Pacific Time The RFQ Coordinator is the SOLE POINT OF CONTACT at WSDOT for this procurement.

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes

More information

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due: REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,

More information

CITY OF LANCASTER RFP NO. 621-15 LANCASTER PERFORMING ARTS CENTER TICKETING SOFTWARE SUBMISSION DEADLINE. July 24, 2015 BY 11:00 A.M.

CITY OF LANCASTER RFP NO. 621-15 LANCASTER PERFORMING ARTS CENTER TICKETING SOFTWARE SUBMISSION DEADLINE. July 24, 2015 BY 11:00 A.M. CITY OF LANCASTER RFP NO. 621-15 LANCASTER PERFORMING ARTS CENTER TICKETING SOFTWARE SUBMISSION DEADLINE July 24, 2015 BY 11:00 A.M. SUBMIT TO: Office of the City Clerk Lancaster City Hall 44933 Fern Avenue

More information

SUPPLY CHAIN MANAGEMENT POLICY

SUPPLY CHAIN MANAGEMENT POLICY SOUTH AFRICAN MEDICAL RESEARCH COUNCIL SUPPLY CHAIN MANAGEMENT POLICY SUPPLY CHAIN MANAGEMENT POLICY Page 1 of 12 Document review and approval Revision history Version Author Date 1 National Manager Operations

More information

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

NCRCP3262 REQUEST FOR PROPOSALS FOR THE PROVISION OF A FUNERAL INSURANCE FOR ECRDA EMPLOYEES REFERENCE NUMBER: RFP 0011

NCRCP3262 REQUEST FOR PROPOSALS FOR THE PROVISION OF A FUNERAL INSURANCE FOR ECRDA EMPLOYEES REFERENCE NUMBER: RFP 0011 REQUEST FOR PROPOSALS FOR THE PROVISION OF A FUNERAL INSURANCE FOR ECRDA EMPLOYEES REFERENCE NUMBER: RFP 0011 1 UVIMBA FINANCE, 128 Alexandra Road, King William s Town, PO Box 495, 5601, Tel - 043 604

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation

More information