T19/03/13 REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION
|
|
|
- Helen McKenzie
- 10 years ago
- Views:
Transcription
1 T19/03/13 REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION CLOSING DATE: WEDNESDAY, 27 MARCH 2013 AT 12:00 NOON
2 Industrial Development Corporation TABLE OF CONTENTS SECTION 1: GENERAL CONDITIONS OF BID 3 1. Proprietary Information 4 2. Enquiries 4 3. Bid Validity Period 4 4. Instructions on submission of Tenders 4 5. Preparation of Bid Response 5 6. Supplier Performance Management 5 7. IDC s Rights 6 8. Undertakings by the Bidder 6 9. Reasons for disqualification Response Format (Returnable Schedules) Evaluation Criteria and Weightings 9 SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION Special instructions to bidders Background Information Scope of Work/ Terms of Reference Project Timelines Error! Bookmark not defined. 5. Technical Evaluation Criteria 13 SECTION 3: PRICE PROPOSAL 17 SECTION 4: ANNEXURES 20 Page 2
3 Industrial Development Corporation SECTION 1: GENERAL CONDITIONS OF BID Page 3
4 1. Proprietary Information Industrial Development Corporation of SA Ltd (IDC) considers this Tender and all related information, either written or verbal, which is provided to the respondent, to be proprietary to IDC. It shall be kept confidential by the respondent and its officers, employees, agents and representatives. The respondent shall not disclose, publish, or advertise this specification or related information to any third party without the prior written consent of IDC. 2. Enquiries All communication and attempts to solicit information of any kind relative to this Bid should be channelled to: Contact person (all technical questions should be in writing) Name: Ms Tebatso Lewele Telephone Number: Fax Number: address: 3. Bid Validity Period Responses to this tender received from vendors will be valid for a period of 120 days counted from the closing date of the tender. 4. Instructions on submission of Tenders 4.1 Tenders should be submitted in duplicate (2 hard copies) all bound in a sealed envelope endorsed, T19/03/13: REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION and one electronic copy (on CD) in PDF format. The sealed envelope must be placed in the tender box at the Main Reception area of the IDC Building, 19 Fredman Drive Sandton by no later than 12:00 noon on Wednesday, 27 March Tenders must be submitted in a prescribed response format herewith reflected as Response Format. 4.3 The closing date, company name and the return address must also be endorsed on the envelope. 4.4 If a courier service company is being used for delivery of the tender document, the tender description must be endorsed on the delivery note/courier packaging and the courier must ensure that documents are placed / deposited into the tender box. The IDC will not be held responsible for any delays where tender documents are handed to the IDC Receptionist. Page 4
5 4.5 No tender received by telegram, telex, , facsimile or similar medium will be considered. 4.6 Where a tender document is not in the tender box at the time of the tender closing, such a tender document will be regarded as a late tender. The IDC reserves the right not to evaluate any late tender response. 4.7 Amended tenders may be sent in an envelope marked Amendment to tender and should be placed in the tender box before the closing time. 5. Preparation of Bid Response 5.1 All the documentation submitted in response to this bid must be in English. 5.2 The tenderer is responsible for all the cost that they shall incur related to the preparation and submission of the tender document. 5.3 Tenders submitted by Companies must be signed by a person or persons duly authorised thereto by a resolution of a Board of Directors, a copy of which Resolution, duly certified be submitted with the Tender. 5.4 Bidders should check the numbers of the pages to satisfy themselves that none are missing or duplicated. No liability will be accepted by IDC in regard to anything arising from the fact that pages are missing or duplicated. 5.5 A list of all references (minimum of 3) must be included in the bid response. 5.6 A valid tax clearance certificate must be included in the bid response. 5.7 A copy(s) of certificates from the organizations/ bodies that the tenderer is affiliated to must be included in the bid response. 6. Supplier Performance Management Supplier Performance Management is viewed by the IDC as critical component in ensuring value for money acquisition and good supplier relations between the IDC and all its suppliers. The successful bidder shall upon receipt of written notification of an award, be required to conclude a Service Level Agreement (SLA) with the IDC, which will form an integral part of Page 5
6 the supply agreement. The SLA will l serve as a tool to measure, monitor and assess the supplier s performance level and ensure effective delivery of service, quality and valueadd to IDC s business. Bidders are required to comply with the above condition, and also provide a scorecard on how their product / service offering is being measured to achieve the objectives of this condition. 7. IDC s Rights 7.1 The IDC is entitled to amend any tender conditions, validity period, specifications, or extend the closing date of tenders before the closing date. All tenderers, to whom the tender documents have been issued, will be advised in writing of such amendments in good time. 7.2 The IDC reserves the right not to accept the lowest tender or any tender in part or in whole. It normally awards the contract to the tenderer who proves to be fully capable of handling the contract and whose tender is technically acceptable and/or financially advantageous to the IDC. 7.3 The IDC reserves the right to award this tender to a purely empowerment company or may award this tender on condition that a joint venture with an empowerment company is formed. This will be added to the criteria when evaluating the tenders. 7.4 The IDC reserves the right to award this tender as a whole or in part without furnishing reasons. 7.5 IDC reserves the right at all material times to extend the scope of work relating to this tender to include all or some of the IDC s Subsidiaries. Should this be the case, as a result thereof all the relevant implications will be negotiated between the IDC and the successful tenderer. 8. Undertakings by the Bidder 8.1 The bidder hereby offer to render all or any of the services described in the attached documents to the IDC on the terms and conditions and in accordance with the specifications stipulated in this Tender documents (and which shall be taken as part of, and incorporated into, this Proposal at the prices inserted therein). 8.2 Tenders submitted by Companies must be signed by a person or persons duly authorised thereto by a resolution of a Board of Directors, a copy of which Resolution, duly certified be submitted with the Tender. Page 6
7 8.3 The bidder shall prepare for a possible presentation should IDC require such and the tenderer shall be notified thereof no later than 4 (four) days before the actual presentation date. 8.4 The bidder hereby agree that the offer herein shall remain binding upon him/her and receptive for acceptance by the IDC during the validity period indicated and calculated from the closing hour and date of the Tender; this Proposal and its acceptance shall be subject to the terms and conditions contained in this tender document. 8.5 The bidder furthermore confirm that he/she has satisfied himself/herself as to the correctness and validity of his/her Tender response that the price(s) and rate(s) quoted cover all the work/item(s) specified in the Tender response documents and that the price(s) and rate(s) cover all his/her obligations under a resulting contract and that he/she accept that any mistakes regarding price(s) and calculations will be at his/her risk. 8.6 The bidder hereby accept full responsibility for the proper execution and fulfilment of all obligations and conditions devolving on him/her under this agreement as the Principal(s) liable for the due fulfilment of this contract. 9. Reasons for disqualification 9.1 The IDC reserves the right to disqualify any bidder which does any one or more of the following, and such disqualification may take place without prior notice to the offending bidder, however the bidder will be notified in writing of such disqualification: bidders who do not submit a valid and original Tax Clearance Certificate on the closing date and time of the bid; bidders who submitted incomplete information and documentation according to the requirements of this bid document; bidders who submitted information that is fraudulent, factually untrue or inaccurate information; bidders who received information not available to other vendors through fraudulent means; and/or bidders who do not comply with mandatory requirements as stipulated in this bid document. Page 7
8 10. Response Format (Returnable Schedules) Tenderers shall submit their responses in accordance with the response format specified below (each schedule must be clearly marked): 10.1 Cover Page: (the cover page must clearly indicate the tender reference number, tender description and the tenderer s name) 10.2 Schedule 1: Executive Summary Annexure 1 of this tender document (duly completed and signed) 10.3 Schedule Original and Valid tax clearance certificate(s); Certified copies of your CIPRO company registration documents listing all members with percentages, in case of a CC. Or latest certified copies of all share certificates in case of a company; Annexure 2 of this tender document (duly completed) BEE Certificate verified by a SANAS accredited verification agency or a letter from the supplier s auditor (option only for Exempted Micro Enterprises with annual turnover less than R5 million); Note: If a Consortium, Joint Venture or Subcontractor, the documents listed above ( ) must be submitted for each Consortium/ JV member or subcontractor Schedule 3: Response to Section 2 of this document 10.5 Schedule 4: Price Proposal (response to Section 3 of this bid document) (Must be submitted in a separate envelope) Page 8
9 11. Evaluation Criteria and Weightings Tenders shall be evaluated in terms of the following parameters: 11.1 Technical Bids will be evaluated in accordance with the following technical criteria: Mandatory Requirements All bid responses that do not meet technical mandatory requirements may be disqualified and may not be considered for further evaluation on the Non- Mandatory technical Preference Point System All tenders that will achieve the minimum qualifying score (acceptable bids) will be evaluated further in terms of the preference point system as follows: CRITERIA POINTS Price 80 BEE 20 TOTAL 100 points. Page 9
10 Industrial Development Corporation SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION Page 10
11 SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION 1. Special instructions to bidders 1.1 Bidders shall provide full and accurate answers to the questions posed in this document, and, where required explicitly state either Comply/Not Comply regarding compliance with the requirements. Bidders must substantiate their response to all questions, including full details on how their proposal/solution will address specific functional/ technical requirements, failure to substantiate may lead to the bidder being disqualified. All documents as indicated must be supplied as part of the bid response. Failure to comply with Mandatory Requirements may lead to the bidder being disqualified. 2. Background Information Enterprises are increasingly online and data-centric, connecting partners, personnel, suppliers, or customers with applications that face a growing danger of cyber-attacks. These targeted threats are greater and more sophisticated than ever before, and data security compliance requirements become more stringent every day. The IDC needs uncompromising security that will enable the company to modernize the datacenter with virtualization and cloud computing without reducing performance. The solution must provide advanced security for physical, virtual, and cloud servers and virtual desktops. Whether implemented as software, virtual appliance, or in a hybrid approach, this solution should minimize overhead and streamline management but provides strong agentless security for virtual machines. The solution must also address a wide range of compliance requirements, including seven major PCI compliance requirements with multiple protection modules in one consolidated solution. 3. Scope of Work The scope of work includes: 3.1 Solution The bidder must provide the IDC with advanced protection for systems in the datacenter from virtual desktops to physicals, virtual or cloud servers. The solution must combine intrusion detection and prevention, firewall, integrity monitoring, log inspection, and agentless anti-malware capabilities to help prevent data breaches and ensure business continuity. This dynamic, centrally managed solution should also supports compliance with important standards and regulations such as PCI, FISMA, and HIPAA 3.2 Support Repair of faults and configuration problems Minimum response time of 60 minutes to a logged call and a maximum of 4 hours to repair Weekly health check of deployed solution Page 11
12 3.3 Maintenance Providing the IDC with pro-active information regarding new releases, software versions, patches and end-of-life announcements, including recommendations about whether and when the IDC should upgrade A single configuration check and report per annum A single software version check and report per annum Monthly check and report on possible necessary patches Upgrade of software, firmware and loading of patches as and when necessary 3.4 Growth Integrate or re-design additional sites, as the IDC grows Advise on new technologies, functionalities and best practices Buying of additional hardware and Licenses as and when required 4. Current Infrastructure and Hardware list The IDC has a new greenfield Active Directory (new forest) services solution that is based on Windows 2008 R2 to enable and support its Sandton head office and regional offices which are currently located in Durban, East London, Cape Town, Kimberley, Rustenburg, Polokwane, Bloemfontein, Pietermaritzburg, Port Elizabeth, Brits, Nelspruit and Upington. The IDC has also virtualized all production, high availability and disaster recovery server environments on VMware and is in the planning phase of upgrading to version 5.1. The IDC s production and high availability server sites at Sandton head office, are within close proximity in separate buildings linked with fiber. Both sites are equipped with an HP EVA 8400, one for production and the other for replication, snap shots, snap clones and disk base backups of all business critical data. Business Copy is currently been used to replicate production data to the high availability HP EVA All business critical servers have dual connectivity to network and storage. The current backup software and library is HP Data Protector, Veeam and Quantum s ADIC i2000 Tape Library respectively. The high availability server site has virtualized servers through which duplicates all business critical application servers from the production server site. The IDC have standardized on Hewlett Packard (HP) server hardware. Currently there are about 130 virtualized servers (VMware), which run on C-class blades. All but two regional servers run on Microsoft Server 2008 R2 operating system and Microsoft SQL 2005/2008R2 (where applicable). The other two regional servers run Windows Server 2003 The new Windows 2008 directory services solution is running Windows 2008 R2. The IDC has also deployed Microsoft System Centre Configuration and System Center Operations Manager in the new greenfield Active Directory infrastructure. Page 12
13 5. Technical Evaluation Criteria 5.1 Mandatory Technical Requirements Deployment and Integration Integration with vshield Endpoint and VMsafe APIs as well as VMware vcenter that will enable rapid deployment on ESX servers as a virtual appliance to immediately and transparently protect vsphere virtual machines. Detailed, server-level security events must be provided to a SIEM system, including ArcSight, Intellitactics, NetIQ, RSA Envision, Q1Labs, Loglogic, and other systems through multiple integration options. Directory integration with enterprise-scale directories, including Microsoft Active Directory. Comply: Yes/No Comply: How (Substantiate/Comments) The solution must cover the following security postures/modules The solution must have agent less Malware Protection for VMware Environments. Optimizes security operations to avoid security brown-outs commonly seen in full system scans and pattern updates Tamper-proofs security from sophisticated attacks by isolating malware from antimalware Deep Packet Inspection; Examines all incoming and outgoing traffic for protocol deviations, policy violations, or content that signals an attack Operates in detection or prevention mode to protect operating systems and enterprise application vulnerabilities Provides automatic notification that outlines who attacked, when they attacked, and what they attempted to exploit Intrusion Detection and Prevention; Protects against known and zero-day attacks by shielding known vulnerabilities from unlimited exploits. Automatically shields newly discovered vulnerabilities within hours, pushing protection to thousands of servers in minutes without a system reboot. Includes out-of-the-box vulnerability protection for over 100 applications, including database, web, , and FTP servers. Comply: Yes/No Comply: How (Substantiate/Comments) Page 13
14 5.1.2 The solution must cover the following security postures/modules Web Application Protection; Assists compliance (PCI DSS 6.6) to protect web applications and the data they process. Defends against SQL injection, crosssite scripting, and other web application vulnerabilities. Shields against vulnerabilities until code fixes can be completed. Application Control; Provides increased visibility into, or control over applications accessing the network Uses application control rules to identify malicious software accessing the network Reduces vulnerability exposure of servers Comply: Yes/No Comply: How (Substantiate/Comments) Bidirectional Stateful Firewall; Decreases the attack surface of physical, cloud, and virtual servers with fine-grained filtering, design policies per network, and location awareness for all IP-based protocols and frame types. Centrally manages server firewall policy, including templates for common server types. Prevents denial of service attacks and detects reconnaissance scans. Integrity Monitoring: Monitors critical operating system and application files, such as directories, registry keys, and values, to detect malicious and unexpected changes. Detects modifications to existing file systems and new file creations and reports them in real time. Enables on-demand, scheduled, or real-time detection; checks file properties (PCI ); and monitors specific directories. Page 14
15 5.1.2 The solution must cover the following security postures/modules Log Inspection; Collects and analyses operating system and application logs for suspicious behaviour, security events, and administrative events across your datacenter. Assists compliance (PCI DSS 10.6) to optimise the identification of important security events buried in multiple log entries. Forwards events to SIEM system or centralised logging server for correlation, reporting and archiving. Current Product: Briefly describe the capabilities and functionality of the current version of your proposed product, and identify features that were new with this release. Comply: Yes/No Comply: How (Substantiate/Comments) The management console should run on a Microsoft Server. Performance overheads; What is the impact on the RAM, CPU utilization and the file space needed. Agent based monitoring Network based monitoring How does your proposed solution architecture scale to support large centralized or distributed environments? Differentiation: Briefly describe the reasons why your offering is a leader in the market (list three to five unique, quantifiable and succinct points). Does your product do continuously Monitor for File Integrity changes in Operating Systems such as Windows Server 2000/2003/2008/, AIX, HPUX, Solaris, Linux etc. Monitor Changes on Active Directory activities such as: User creation/deletion/disabling/modification Groups Deletion/creation/Modification i.e. New members added - Active Directory Group Domain policy and Group Security Policy Changes -Organization Units deletion/creation/modification. Does your product have the ability to monitor file and folder integrity changes at a granular level, e.g. Report on File permission and ownership changes but Auto-promote file content changes. Does your product have the ability Monitor Data Integrity changes on major Database software s such as Oracle, Microsoft SQLManage Database Changes: The ability for your solution to captures all changes to database users, schemas, stored procedures, triggers and critical operational data. Notify respective teams of unauthorized changes on the systems through sending alerts and periodic Reports as well as online web based reports. Provide support for custom and scheduled reporting Page 15
16 5.1.2 The solution must cover the following security postures/modules Facilitate Change Management Process through creation of change windows and creation of reports showing changes that have occurred inside/outside of change windows. Ability to perform Rollback on Changes that occurred thus restoring the file to the original state before the change was done. For all changes in the virtual environment, can the following information be provided on the Reports: What changed -Change Nature i.e. Deletion, modification etc. -Who did the change - Timestamp What time did the change occur. Integration with other monitoring systems such as antivirus, filters, network monitors to give a consolidated position for ease of management. Assess IT system configurations against a wide range of policy and standards i.e. PCI DSS and ISO etc.. Detect changes to configuration states in real time, including changes that occur at the server, database, directory server, and network device level. Ability to capture unauthorized or new software installations in the IT environment installed. Ability to perform Change impact analysis before changes are approved. System should enable trend analysis. Capability to integrate with ticketing system and leading CMDB solutions in the market. Can the solution support role-based access control for the following roles: Administrator Read-only user Normal user Can the solution combine log Management and event data with real-time change data to immediately reveal events of interest that impact policy or threaten security. Comply: Yes/No Comply: How (Substantiate/Comments) Product Road Map Future Product Road Map: Briefly describe plans for future proposed product and service enhancements, including the capabilities and functionality of the next planned releases or versions, the timetable for those capabilities, major upgrades and sunset considerations. Provide Seamless or single console integration with event management solutions. Ability to distinguish between high- and low-risk changes. Identify transient violations; if a file is changed inappropriately and then changed back, it should be able to create a transient compliance violation. Comply: Yes/No Comply: How (Substantiate/Comments) Page 16
17 SECTION 3: PRICE PROPOSAL Page 17
18 SECTION 3: Cost Proposal 1 Please indicate your total bid price here: R (compulsory) 2 NOTE: All prices must be VAT exclusive and must be quoted in South African Rand (ZAR). 3 Are the rates quoted firm for the full period of the contract? YES NO Important: If not firm for the full period, provide details of the basis on which adjustments shall be applied e.g. CPI, and also details of the cost breakdown. 4 The bidder must indicate CLEARLY which portion of the bid price is linked to the exchange rate. Substantiate / Comments Comply Not Comply 5 All additional costs must be clearly specified and included in the total bid price. Comply Not Comply Substantiate / Comments 6 Payments will be linked to the specified deliverables after such deliverables have been approved by the IDC. Substantiate / Comments Comply Not Comply 7. COSTING MODEL 7.1 SOFTWARE Cost Element Virtualised Datacenter Security Solution Cost (VAT Excl.) Year 1 Maintenance and Support Year 2 Year 3 Sub-Total (A) (VAT Excl.) 7.2 SERVICES Activity/ Deliverable Resource(s) Rate/Hour per resource Number of hours Cost (VAT Excl.) Installation Training of 4 administrators Other Costs (if applicable) Sub-Total (B) (VAT Excl.) Note: Other Costs must be clearly defined here. TOTAL BID PRICE (A+B) (VAT EXCL.) Page 18
19 Price Declaration Form Dear Sir, Having read through and examined the Request For Proposal (RFP) Document, RFP no. T19/03/13 the General Conditions, The Requirement and all other Annexures to the RFP Document, we offer to supply, install, maintain and support a Virtualised Datacenter Security Solution, as detailed in the RFQ document for a period of one (1) year including escalation Fees: R... (Excluding VAT) In words R...(Excluding VAT) We confirm that this price covers all activities associated with the project management and consulting service, as called for in the Tender document. We confirm that IDC will incur no additional costs whatsoever over and above this amount in connection with the provision of this service. We undertake to hold this offer open for acceptance for a period of 120 days from the date of submission of offers. We further undertake that upon final acceptance of our offer, we will commence with the provision of service when required to do so by the IDC. We understand that you are not bound to accept the lowest or any offer and that we must bear all costs which we have incurred in connection with preparing and submitting this tender. We hereby undertake for the period during which this tender remains open for acceptance not to divulge to any persons, other than the persons to which the tender is submitted, any information relating to the submission of this tender or the details therein except where such is necessary for the submission of this tender. SIGNED DATE (Print name of signatory) Designation FOR AND ON BEHALF OF: COMPANY NAME Tel No Fax No Cell No Page 19
20 SECTION 4: ANNEXURES Page 20
21 Industrial Development Corporation Annexure 1 Acceptance of Bid Conditions And Bidder s Details Request for Proposal No: Name of Bidder: Authorised signatory: Name of Authorised Signatory Position of Authorised Signatory By signing above the bidder hereby accept full responsibility for the proper execution and fulfilment of all obligations and conditions devolving on him/her under this agreement as the Principal(s) liable for the due fulfilment of this contract. [Note to the Bidder: The Bidder must complete all relevant information set out below.] BIDDING STRUCTURE Indicate the type of Bidding Structure by marking with an X : Individual Bidder Joint Venture/ Consortium Sub Contractors Other REQUIRED INFORMATION If Individual Bidder: Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Page 21
22 If Joint Venture or Consortium, indicate the following for each partner: Partner 1 Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Partner 2 Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Page 22
23 If using sub-contractors, indicate the following: Prime Contractor Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Sub contractors Name of Company Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number address Postal Address Physical Address Page 23
24 Annexure 2 - Supply chain management practices questionnaire Request for Proposal No: Name of Respondent: Authorised signatory: [Note to the Respondent: the Respondent must complete the information set out below. If the Respondent requires more space than is provided below it must prepare a document in substantially the same format setting out all the information referred to below and return it with Returnable Schedule 2.] The Respondent must complete the following questionnaire. Respondent's past supply chain management practices: Item Question Yes No 3.1 Is the Respondent or any of its directors listed on the South African National Treasury s database as companies or persons prohibited from doing business with the public sector? (Companies or persons who are listed on this database were informed in writing of this restriction by the South African National Treasury after the audi alteram partem rule was applied). Yes No If so, provide particulars: 3.2 Is the Respondent or any of its directors listed on the Register for Tender Defaulters in terms of section 29 of the Prevention and Combating of Corrupt Activities Act No 12 of 2004? To access this Register enter the National Treasury s website, click on the icon Register for Tender Defaulters or submit your written request for a hard copy of the Register to facsimile number Yes No If so, provide particulars: 3.3 Was the Respondent or any of its directors convicted by a court of law (including a court outside of the Republic of South Africa) for fraud or corruption during the past five years? Yes No
25 Item Question Yes No If so, provide particulars: 3.4 Was any contract between the Respondent and any organ of state (within the Republic of South Africa or within any foreign territory) terminated during the past five years on account of failure to perform on or comply with the contract? Yes No If so, provide particulars: Page 25
T54/09/14 APPOINTMENT OF A PANEL OF STOCK BROKERS TO PROVIDE BROKERAGE SERVICES TO THE IDC BID CLOSING DATE: WEDNESDAY, 08 OCTOBER 2014 AT 12:00 NOON
T54/09/14 APPOINTMENT OF A PANEL OF STOCK BROKERS TO PROVIDE BROKERAGE SERVICES TO THE IDC BID CLOSING DATE: WEDNESDAY, 08 OCTOBER 2014 AT 12:00 NOON Industrial Development Corporation TABLE OF CONTENTS
T28/05/13. Supply and Installation of Video Conferencing Equipment to IDC CLOSING DATE: FRIDAY, 17 MAY 2013 AT 12:00 NOON
T28/05/13 Supply and Installation of Video Conferencing Equipment to IDC CLOSING DATE: FRIDAY, 17 MAY 2013 AT 12:00 NOON Industrial Development Corporation TABLE OF CONTENTS SECTION 1: GENERAL CONDITIONS
T01/01/14 REQUEST FOR PROPOSAL TO CONDUCT ANNUAL CUSTOMER SATISFACTION SURVEYS CLOSING DATE: FRIDAY, 31 JANUARY 2014 AT 12:00 NOON
T01/01/14 REQUEST FOR PROPOSAL TO CONDUCT ANNUAL CUSTOMER SATISFACTION SURVEYS CLOSING DATE: FRIDAY, 31 JANUARY 2014 AT 12:00 NOON Industrial Development Corporation TABLE OF CONTENTS SECTION 1: GENERAL
T34/02/16 PROVISION OF SECURITY ALARM SYSTEM, MONITORING AND ARMED RESPONSE SERVICES TO 14 IDC REGIONAL OFFICES
T34/02/16 PROVISION OF SECURITY ALARM SYSTEM, MONITORING AND ARMED RESPONSE SERVICES TO 14 IDC REGIONAL OFFICES BID CLOSING DATE: MONDAY, 14 MARCH 2016 AT 12:00 NOON Industrial Development Corporation
T29/05/13 REQUEST FOR PROPOSAL FOR THE APPOINTMENT OF EPC CONTRACTOR FOR THE DESIGN PHASE OF THE CONSTRUCTION OF FOSKOR PLANT
T29/05/13 REQUEST FOR PROPOSAL FOR THE APPOINTMENT OF EPC CONTRACTOR FOR THE DESIGN PHASE OF THE CONSTRUCTION OF FOSKOR PLANT A NON COMPULSORY BRIEFING SESSION WILL BE HELD ON THURSDAY, 16 MAY 2013 AT
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
Comprehensive security platform for physical, virtual, and cloud servers
datasheet Trend Micro deep security 9 Comprehensive security platform for physical, virtual, and cloud servers Virtualization and cloud computing have changed the face of today s data center. Yet as organizations
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Request for proposals (RFP) The supply of a computer based Library Management System for the CSIR. RFP No. 579/29/05/2015
Request for proposals (RFP) The supply of a computer based Library Management System for the CSIR RFP No. 579/29/05/2015 Date of Issue: 15 May 2015 Closing Date: Friday, 29 th May 2015 Place: Tender box,
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Request for proposals (RFP) The Provision of transcription services to the CSIR for a Human Language Technology data pipeline optimisation project
CSIR TENDER DOCUMENTATION Request for proposals (RFP) The Provision of transcription services to the CSIR for a Human Language Technology data pipeline optimisation project RFP No. 667/30/10/2015 Date
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Knysna Municipality is inviting quotations from suitable suppliers for the goods described below. Category Computer Software
Knysna Municipality is inviting quotations from suitable suppliers for the goods described below. Category Computer Software ADVERTISEMENT DATE: 15 th May 2014 RFQ NUMBER: 40/2014 DESCRIPTION OF GOODS/SERVICES:
Trend Micro Deep Security
Trend Micro Deep Security Server Security Protecting the Dynamic Datacenter A Trend Micro White Paper August 2009 I. SECURITY IN THE DYNAMIC DATACENTER The purpose of IT security is to enable your business,
Trend Micro deep security 9.6
datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving
Total Cloud Protection
Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased
11:00 a.m. The closing time will be as per the clock at the RAF reception
RFB NUMBER: RAF/2015/00019 DESCRIPTION: Request for Information: ICT Security Solutions PUBLISH DATE: 18 September 2015 VALIDIY PERIOD: 120 days from the closing date CLOSING DATE: 20 October 2015 CLOSING
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
SUPPLIER DATABASE REGISTRATION QUESTIONNAIRE - CONSULTANTS
SUPPLIER DATABASE REGISTRATION QUESTIONNAIRE - CONSULTANTS Name of company Town / City Revision 0, October 2012 1 ALL SUPPLIER INFORMATION WILL BE TREATED STRICTLY CONFIDENTIAL. NOTE: a) The information
Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard
Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
ADVERTISEMENT DATE 3 December 2014 Marketing & Communications RFQ NUMBER JCPZ/RFQ/MKT14 2014 DATE)
QUOTATIONS ARE HEREBY REQUESTED IN ACCORDANCE WITH THE SCM REGULATIONS SECTION 18 OF THE LOCAL GOVERNMENT MUNICIPAL FINANCE MANAGEMENT ACT 56 OF 2003, FOR THE PURCHASE OF ITEM/S THAT COULD BE ABOVE R30
Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon
Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal P a g e 2 Table of Contents 1.
Appointment of a service provider to assist with the development of Analytics Capability for PAYE and VAT. RFP No.: RFP 28/2014
Appointment of a service provider to assist with the development of Analytics Capability for PAYE and VAT. Briefing Session: 18 February 2015 at 14h00 RFP No.: RFP 28/2014 Closing Date: 10 March 2015,
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES
SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
Kindly furnish me with a written quotation for the supply of the following service: ENVIRONMENTAL IMPACT ASSESSMENT (EIA) CONSULTANCY SERVICES
Request for formal written price quotations Kindly furnish me with a written quotation for the supply of the following service: ENVIRONMENTAL IMPACT ASSESSMENT (EIA) CONSULTANCY SERVICES The Johannesburg
VENDOR APPLICATION FORM
INTRODUCTION AND GUIDELINES VENDOR APPLICATION FORM The purpose of this database is to give all current and prospective service providers, an equal opportunity to submit quotations to the University for
PROCUREMENT OF VEEAM BACKUP & REPLICATION ENTERPRISE FOR VMWARE LICENCE
1 SOL PLAATJE MUNICIPALITY INVITATION FOR QUOTATION Q 072 /2014: PROCUREMENT OF VEEAM BACKUP & REPLICATION ENTERPRISE FOR VMWARE LICENCE SUPPLIER ADRESS: TEL NO: CELL NO.: FAX NO: Prepared for:- Prepared
Request for Proposal (RFP) Risk Management and Short Term Insurance Broking Services. RFP Number: 485/12/12/2014
Request for Proposal (RFP) Risk Management and Short Term Insurance Broking Services RFP Number: 485/12/12/2014 Date of Issue 23 November 2014 Compulsory Briefing Session Closing Date and Time Place 1
INVITATION TO BID (SBD 1) BID DESCRIPTION BID DOCUMENTS ARE TO BE DEPOSITED AT:
INVITATION TO BID (SBD 1) YOU ARE HEREBY INVITED TO BID FOR THE FOLLOWING SPECIFIED SUPPLY REQUIREMENTS BID : NRF/SAAO/2016/014 CLOSING DATE: 8 April 2016 CLOSING TIME 11:00 BID DESCRIPTION Service and
LUKHANJI DIRECTORATE: FINANCE SUPPLY CHAIN MANAGEMENT UNIT
MUNICIPALITY UMASIPALA MUNISIPALITEIT LUKHANJI DIRECTORATE: FINANCE SUPPLY CHAIN MANAGEMENT UNIT Private Bag X7111 QUEENSTOWN 5320 Telephone: 045 807 2000 Fax: 045 807 2059 Website: www.lukhanji.gov.za
Virtualization Journey Stages
Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey
Supplier prequalification Document
Table of Contents Part 1 Invitation to Applicants Invitation Notice Statement of Requirements Part 2 Application Procedures Section 1 Instructions to Applicants Section 2 Application submission control
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
INVITATION TO QUOTE ITQ REF NO: NKF/BL/2015/015 Date: 30 September 2015
INVITATION TO QUOTE ITQ REF NO: NKF/BL/05/05 Date: 0 September 05 TITLE : FOR THE PROVISION OF DESIGN AND IMPLEMENTATION OF DISASTER RECOVERY SOLUTION FOR NKF. Introduction. The National Kidney Foundation
EXTERNAL POLICY PROCUREMENT
EXTERNAL POLICY PROCUREMENT Revision: 0 Page 1 of 8 TABLE OF CONTENTS 1 SCOPE 3 2 POLICY 3 2.1 Procurement objectives 3 2.2 Broad-Based Black Economic Empowerment (BBBEE) 3 2.3 Business ethics and governance
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
REQUEST FOR PROPOSALS FOR: DOCUMENT COLLECTION AND SCANNING FOR 36 MONTHS CONTRACT SCMN33 /2013
REQUEST FOR PROPOSALS FOR: DOCUMENT COLLECTION AND SCANNING FOR 36 MONTHS CONTRACT SCMN33 /2013 1 Table of Contents Item Page Number 1 Introduction 3 2 Background 3 3 Purpose 3 4 Bid Evaluation 3 5 Preference
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
CLOUD SERVICE SCHEDULE
CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless
REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING
4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the
City of Richmond Business and Financial Services Department. Contract 4595P. Security Information Event Management System
Business and Financial Services Department Request for Proposal Security Information Event Management System 1. Introduction The City of Richmond (the City ) requires a Security Information and Event Management
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.
Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical
Next Generation Datacenters & the Realities of Virtualisation Security
Next Generation Datacenters & the Realities of Virtualisation Security Simon Young General Manager, Server Security EMEA Classification 10/7/2009 1 Agenda The Dynamic Data Center & New Security Challenges
REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS
REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3
TENDER NUMBER: ITT/SACU/015/2015/O Information and Communication Technology (ICT) Audit IT Effectiveness Review
TENDER NUMBER: ITT/SACU/015/2015/O Information and Communication Technology (ICT) Audit IT Effectiveness Review CLOSING DATE & TIME FRIDAY, 23 JANUARY 2015 17H00 (Namibian Time) POSTAL & PHYSICAL ADDRESS
APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION
APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION To: Ecobank (Indicate country name) For bank use only Account Nº: Please read carefully and complete all relevant
90 days (commencing from the RFB Closing Date) RENEWAL OF MICROSOFT LICENSES FOR THE CIDB FOR THE PERIOD OF 12 MONTHS
Page 1 of 27 BID/RFQ NUMBER: RFB60419 CLOSING DATE: 7 DECEMBER 2015 CLOSING TIME: 11:00 AM BID VALIDITY PERIOD: 90 days (commencing from the RFB Closing Date) DESCRIPTION OF BID: RENEWAL OF MICROSOFT LICENSES
CLOUD SERVICE SCHEDULE Newcastle
CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,
TENDER BOX LOCATION. The Tendering System
GT/GDE/128/2015 SECTION 1-ISSUE DATE:2015-09-28 Page 1 of 50 Client Support Request for Proposal RFP NUMBER RFP DESCRIPTION Page 1 of 3 GT/GDE/128/ 2015 BIDDERS ARE HEREBY INVITED TO SUBMIT PROPOSALS FOR:
2.1. Service Providers who do not comply with the mandatory requirements will not be considered for further evaluation.
BID SPECIFICATION Infrastructure as a Service (IaaS) 1. BACKGROUND OF THE ROAD ACCIDENT FUND The Road Accident Fund (RAF) is a statutory body that, in terms of the provisions of the Road Accident Fund
Eskom Holdings SOC Ltd s Standard Conditions of Tender
1. General Actions 1 The Employer, the Eskom Representative and each eligible er submitting a shall act timeously, ethically and in a manner which is fair, equitable, transparent, competitive and cost-effective.
The purpose of this database is to give all prospective suppliers an equal opportunity to submit quotations.
TO ALL SUPPLIERS SEEKING REGISTRATION AS APPROVED SUPPLIERS ON DEPARTMENT OF CORRECTIONAL SERVICE S SUPPLIER DATABASE FOR THE PERIOD 1 APRIL 2015 TO MARCH 2016 The purpose of this database is to give all
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION
APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION To: Ecobank (Indicate country name) For bank use only Account Nº: Please read carefully and complete all relevant
Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company
Attention: Date: 08.02.2015 From: Our Reference: To whom it may concern Oman Rail Company SAOC Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company Tender No:- C-001-15 Tender
Request for Proposal. Contract Management Software
Request for Proposal Contract Management Software Ogden City Information Technology Division RETURN TO: Ogden City Purchasing Agent 2549 Washington Blvd., Suite 510 Ogden, Utah 84401 Attn: Sandy Poll 1
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)
Trend Micro Sicherheit in den Tiefen des Hypervisors Richard Javet und Gabriel Kälin Trend Micro (Schweiz) Lösungsausrichtung von Trend Micro Aktuelle Herausforderungen Deep Security: Sicherheit für Recheninfrastrukturen
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
PCI DSS 3.0 Compliance
A Trend Micro White Paper April 2014 PCI DSS 3.0 Compliance How Trend Micro Cloud and Data Center Security Solutions Can Help INTRODUCTION Merchants and service providers that process credit card payments
Provision of Internet Services at NNPC Corporate Headquarters, Abuja
Provision of Internet Services at NNPC Corporate Headquarters, Abuja Bid Document JULY 2015 Telecoms Department 1. Invitation to Bidders The invitation is to bid for the Provision of Internet Services
Request for Quotation: Hosting and Pay Per Click Campaign: Shisa Solar
ENERGY OFFICE 19th Floor, 75 Dr Langalibalele Dube Street, Durban, 4001 P O Box 1014, Durban 4000 Tel: +27 31 311 1139, Fax; +27 31 311 1089 Email: [email protected] www.durban.gov.za 30 th September
REQUEST FOR QUOTATION (RFQ) Encryption Key Management Solution. Date Posted: May 27, 2015. Solicitation Number RFQ-2015-0527
REQUEST FOR QUOTATION (RFQ) Date Posted: May 27, 2015 Solicitation Number Bid Due Date and Time June 9, 2015 12PM Noon Pacific Time The RFQ Coordinator is the SOLE POINT OF CONTACT at WSDOT for this procurement.
VMware Integrated Partner Solutions for Networking and Security
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes
REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:
REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,
CITY OF LANCASTER RFP NO. 621-15 LANCASTER PERFORMING ARTS CENTER TICKETING SOFTWARE SUBMISSION DEADLINE. July 24, 2015 BY 11:00 A.M.
CITY OF LANCASTER RFP NO. 621-15 LANCASTER PERFORMING ARTS CENTER TICKETING SOFTWARE SUBMISSION DEADLINE July 24, 2015 BY 11:00 A.M. SUBMIT TO: Office of the City Clerk Lancaster City Hall 44933 Fern Avenue
SUPPLY CHAIN MANAGEMENT POLICY
SOUTH AFRICAN MEDICAL RESEARCH COUNCIL SUPPLY CHAIN MANAGEMENT POLICY SUPPLY CHAIN MANAGEMENT POLICY Page 1 of 12 Document review and approval Revision history Version Author Date 1 National Manager Operations
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
NCRCP3262 REQUEST FOR PROPOSALS FOR THE PROVISION OF A FUNERAL INSURANCE FOR ECRDA EMPLOYEES REFERENCE NUMBER: RFP 0011
REQUEST FOR PROPOSALS FOR THE PROVISION OF A FUNERAL INSURANCE FOR ECRDA EMPLOYEES REFERENCE NUMBER: RFP 0011 1 UVIMBA FINANCE, 128 Alexandra Road, King William s Town, PO Box 495, 5601, Tel - 043 604
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
