ADDENDUM TENDER: TENDER FOR MANAGED SERVICES - I.T SECURITY OPERATIONS CENTER (SOC) ADDENDUM NO.1 CLARIFICATIONS
|
|
|
- Domenic Bailey
- 10 years ago
- Views:
Transcription
1 ADDENDUM TENDER: TENDER FOR MANAGED SERVICES - I.T SECURITY OPERATIONS CENTER (SOC) ADDENDUM NO.1 CLARIFICATIONS In accordance with the RFP for the Tender for Managed Services - I.T Security Operations Center (SOC) sent on 16 th July 2014, Kenya Commercial Bank (KCB) hereby issues addendum No.1 as follows:- No. Section/Paragraph Request for Clarification Response by KCB 1. Section-2.1, Paragraph (2) 2. Section-2.1.2, Paragraph (1) As per the RFP it says that the Service provider should deliver the SOC services, is all the relevant tools to perform SOC operations are already available in KCB, tools like SIEM, performance monitoring tool etc. Please provide us the list of existing tools available. If not do the vendors have to propose the required tools as part of this RFP response? RSA envision, Tripwire, McAfee DLP, Websense Content Filter, Tivoli enterprise manager(tem), Imperva Secure sphere DAF/WAF, T24 Fraud Monitoring Tool, Mail marshal these are the security tools available with KCB currently and the vendor should leverage the existing tools to perform the SOC operations? is there any requirement for some other security products as well? if yes please provide the details. 3. Section-2.2, Table -1 KCB has requested for 7 FTE. Does KCB expect all 7 resources to be onsite at KCB premises? Can we suggest a remote monitoring model in which people will run SOC from our SOC in India and we SIEM- RSA Envision Performance monitoring tool none. Please quote for the tools you deem necessary. These tools and licenses will belong to KCB Please make the suggestion to us. Make sure you do not duplicate. On site -No Please Provide options for onsite, off site and or hybrid 1
2 4. Section-2.3.1, Paragraph (1) 5. Section , Paragraph (1) 6. Section-2.4, Paragraph (1) 7. Section-2.4, Paragraph (1) will have one or two resource for incident management onsite? We understand that SIEM has been deployed and devices already integrated. However the RFP states that vendor should integrate additional devices. Please specify the number of devices to be integrated and also the type and version of these devices It s mentioned in the RFP that the assets configured and included in the SIEM tools are to be monitored, please provide us with the count on number of devices which has already been integrated and which will be in scope for monitoring? Security Product Management activity is expected as an onsite activity? Vendor can propose the appropriate number of resource to manage this? Please provide us the complete details of the devices in scope for product management such as number of devices in scope, product brand and version etc If we feel the need for additional resources, do they also have to be onsite at KCB? Can we propose to do product management remotely from our SOC? 8. Section People provide is the number of assets and applications in scope for vulnerability management 9. Section Please suggest the frequency at which these assets need to assessed (quarterly, bi-yearly or yearly) 10. Section If we feel there is a need for a dedicated resource for vulnerability management, can we propose the resource remotely? Access to the assets should be It is not possible to give a comprehensive list. Because the environment keeps changing with new additions. Do not have the details now. This is a changing number as we continuously add more devices. Quote for onsite and off site. The number of devices keeps changing. It is not possible to give a comprehensive list now. Quote for onsite and offsite. And provide rational for additional resources. It is for the whole enterprise Provide best practice Quote for onsite, off site and or hybrid 2
3 given remotely 11. Section Please provide details on the number of websites in scope for malware monitoring, this information is very critical for us to consider the commercials. 12. Section-2.7 For SIEM gap assessment please provide the make of SIEM, the number and type of components (For example 1 correlation engine, 2 logging engine etc) and Top Request for extension to the submission date from page 13th August 2014 to Friday 29th August Page 19 Section Page 14 Section 2.2 Resource Count 7 ( L1 : 3 shifts & L2 : 2 shifts) 16. Page Which module of Tripwire you use? Further down on Page 15 the shift breakup gives a total count of 8 resources on weekdays and 6 additional for weekends. Please clarify What is the make of firewall? Firewall Management 17. Page 13 Section KCB requires VAPT to be conducted as and when required. Kindly let us know for how many devices? 18. Page How many assets would be included under SIEM Security Monitoring, Policy Compliance, and Malware Monitoring? 19. Page 30 Sec 2.9 Point no 6 Project Plan for delivering these services and resources ramp up required for project execution will be mutually decided by Bidder & KCB. Should One website RSA Envision The date of submission has been extended to Friday, 29 th August 2014 at 3:00pm (GMT+3) Enterprise 8.1 These are the FTE to provide the managed services on a 24X7X365 Checkpoint For the enterprise(kenya and subsidiaries) This can be concluded on engagement. Work with unit costs Yes If you have to charge. 3
4 20. Page 35 Section 2.21 we factor for this while working out the final cost? At least one certified expert (2 in general certification and specialized) and a back-up person are required in the technical areas. No Are these 2 resources in addition to the resource requirement (7 in total ) as stated in the RFP? 21. If current Security tools are outdated or out of warranty, what is the expectation of KCB from Service Providers? Give your proposal. If new tools are required please say so and quote for them. Please avoid duplication of tools 22. If the existing Tool/tools not meeting the expectations of KCB related to information security, What will be the role of SOC Service Provider? 23. Kindly share details of all the tools with warrantee & support terms from respective vendors if possible advanced threats and risks 1.2 Regulatory compliance with industry standards SECTION 2 : SCOPE OF WORK - Security Operations Center Is there any Software / Subscription to any communities to notify about the threats and risks? Is there any Standard communication channel between Compliance and IT SOC? (SOC) Services What is the Tool used for SIEM? 2.1 Master Scope What is the Uptime SLA for SIEM and Security Tools? Please provide your proposal. This is not necessary From our requirements, this should not have any direct impact on the bid. The question is not clear. RSA Envision 99.99% uptime. Failover mode. 27. Are they in Cluster or failover mode? 4
5 2.1 Master Scope Security incident and event management Any Vendor Support for Software/Hardware Tools used for Security Management? ( referred to Scope in RFP )? ( Ex: Anti-virus management, Firewall management etc ) There are vendor support Master Scope - Identity and Access Management (IAM) Vulnerability Management Services: b. Conduct VAPT and Application Security tests as in when required. Bidder has to provide tools / utilities and skilled resources to conducting them. The bidder s (SOC) team has to provide steps for closure of findings & provide reports on daily basis till closure. What is the SLA for Response and Resolution? Is Scope is limited to Application ( IAM) Management OR Server ( IAM is hosted) Management also? What Tools /Utilities are recommended for conducting VAPT? How Frequent do VAPT and Application Securuty tests need to be performed? 5 Quote for both separately. Suggest best tools you prefer to use and Best practice standard frequency. The Bank expects the response to the clarifications to assist in this understanding. We kindly request for a pre-bid meeting to 31. understand the expectation of the Bank. 32. What are PIM and FIM solutions? PIM personal information manager
6 FIM federated identity management Note: KCB does not have these tools. Please ignore this Does the bank have tokens? If so please advise From our requirements, this should not have any 33. model. direct impact on the bid. 34. Does the bank have a test environment? Bidder to simulate any changes independently. Kindly advise if the bidder is mandated to use the Yes 35. reuse the existing infrastructure to deliver the services 36. Please confirm that KCB Sudan is South Sudan only South Sudan only Will KCB allow the use of offshore resources to deliver parts of the services remotely from shared Global Delivery Centers Please confirm that all billing will be in USD to KCB Group Kenya, if not please elaborate. Please provide a list of additional tool types and quantities being considered for deployment over the 36 month contract period. Please provide additional details about the existing security tools deployed currently - are they all fully deployed / operational? Can KCB provide a list of licensed product sku's for these technologies? Can KCB provide additional information / diagrams with environmental details such as the number events per second (EPS) is the SIEM solution licensed for, does Tripwire have integrated change reconciliation implemented, how many Websense content policy filter rules have been implemented? Please provide the quantity of websites to be scanned 6 Please quote for both offshore, onsite and or hybrid USD The details you are asking for are too detailed and can be provided upon contractual agreements only. All the tools quoted in the RFP are in production except for DAM/WAF which is an ongoing project. 1 main website.
7 , 2.1.2, 2.1.3, 2.1.4, 2.2 Master Scope Will the supplier be required to implement new technologies? If so, please list the technologies to be implemented. The tools used by the Bidder include those technologies owned by KCB (RSA envision, Tripwire, etc). Please confirm the cost of these identified tools and OEM annual maintenance & support required to meet the SLA's outlined is OUTSIDE the scope of the Bidder. There are about 5 areas included in this RFP. a. Security Monitoring Services b. Security Product Management c. Vulnerability Management Services d. Malware Monitoring Services e. SIEM & Security Tools implementation GAP Analysis Services (onetime) Please advise if KCB is looking for any specific solutions or tools for the above mentioned 5 services, or is it entirely up to the Vendor to recommend specific solutions which we are experienced or accustomed with? Suggest any new technology you wish to implement and the cost. Please note that all the Tools and licenses will belong to KCB. But there cannot be any duplication to any existing tool which needs to be discussed This is inside the scope of the bidder. It is entirely up to the Vendor to recommend specific solutions which they are experienced or accustomed with? Please also note that the Bank has tools that cover these areas which you may have to use or provide the rational of using others We believe that KCB can gain significant cost and operational efficiencies by integrating activities for IT Monitoring, IT Security Operations and IT Service Desk. Hence in addition to responding to individual RFPs, we would like to submit a summary document that illustrates this integrated model and the associated cost and operational efficiencies. Is KCB open to evaluating such an You are open to do so but it may affect you suitability since your evaluation vis-a- vis the other bids will not one for one. However if a particular Vendor is selected, then this proposal to benefit be bank will be revisited and agreed 7
8 integrated approach? Section 1 Section 1 Section 1 Section 2.1 Section Section Scope - The RFP's Master Scope details a comprehensive list of Security Services; not all Services' Specification and Deliverables are detailed in the RFP. Please confirm that only following products are in scope for Security Management: RSA envision, Tripwire, Mcafee DLP, Netguadians T24 fraud monitoring tool, Imperva Secure sphere DAF/WAF, and any new product procured. Cognizant is aware that Kenya Commercial Bank has operations in five neighbouring countries. Does the bank has consolidated Enterprise IT Structure in a centralized datacenter or the subsidiaries have their own regional IT Structures. Does the consolidated datacenter configured as Hot or a Cold site. Does Kenya Commercial Bank have a distributed IT Architecture, please elaborate on distribution of information assets - Number of Servers and Applications. Please provide details on deployed PIM tool, the number of users and servers in scope and number of service requsets generated on a monthly basis. Cognizant understands through the RFP that the Kenya Commercial Bank requires a Dedicated Support Model for Managed Security, though not explicitly stated. Please confirm. Is the bank open for a Shared Managed Security Model. The Asset Scope section for Security Monitoring Service doesn't elaborate on the total number of devices being monitored and their types (Firewalls, IPS, Servers, Network Devices, etc). Please provide the details on device types being monitored, their The listed products are in use, but the bank could acquire any new product as need may arise. Some products are centralized while others are in the respective subsidiaries. To a large extent, the architecture is distributed. However we are moving into a new DC architecture which is expected to be much simpler than the present one This tool does not exist currently. Please ignore this section. Security Monitoring will have to be managed fully by the Vendor regardless of the delivery model. Please quote for onsite, offsite and or hybrid models This should be covered at the contractual level. 8
9 count, and overall Events per Second (EPS) on RSA Envision Section Section Section Section 2.3 Section 2.4 Seciton 2.4 Section 2.5 Section 2.5 Please share information on RSA Envision version details. If RSA Envision is reaching EOL, please provide information on upgrade/migration strategy. Please share information on Threat Intelligence third party feeds currently being utilized. The RFP states logs retention requirement at offsite location. Please confirm on the availability of sufficient storage infrastrucute for log retention for a period of one year. Please share the Security Monitoring ticket volume for the last 4-6 months with priority/severity classification. Please provide information on existing tools being used for Security Management of devices - Fault, Availability, and Performance Management. Please share the Security Management ticket volume for the last 4-6 months with priority/severity classification. Please state the vulnerability remediation schedule from corporate Security Policy. The schedule/frequency will decide the scan frequency and appropriate resource effort estimation. The RFP states the requirement of a Compliance Monitoring solution, though not stated explicitly. Please confirm and provide the overall count of IP Addresses in scope. We know our version is near end of life. Please propose way forward. Any new solution will belong to KCB. Please propose your suggested solution. Storage space is available. Average is 1000 calls per month and not limited to it We primarily use RSA envision. Please any additional tools. Average is 1000 calls per month and not limited to it Please propose solution based on your experience in other sites of similar nature. Please work with about 5000 employees 9
10 Section 2.5 Section 2.5 Section Section 1 Section 1 Section 1 Section 1 Section 1 Please share the details on overall scope - number of servers, devices, and applications and information on total count of IP addresses (internal and external). Please share the details on Penetration Testing scope - frequency and count of applications. Does the bank Enterprise Policy has constraints with SAAS model provisioning for Vulnerability Management servcie. Please share information on number of sites/pages in scope for Malware Scanning. Please provide the vendor support details (SLA) for Security Devices under scope? Do you have a TAC support contract in place for L3/L4 support? How is the remote site management done? Do you have dedicated resources working out of each remote site or is it centrally managed. Please describe the level of documentation maintained for your current Security? What tools/applications/portals do you use to make this documentation available, accessible and for updates (e.g. CMDB)? Do you follow the ITIL Process? The support level in scope is consideration to be end-to-end support (L1, L2, L3 and third party vendor coordination)? Please clarify if our assumption is correct. Please provide details of the international Security standards and regulations that your organization follow currently (ISO 27001, PCI, SOX etc.). Please work with about 5000 employees Pen test frequency to be agreed upon. Yes. The question is not clear Can be only shared after contractual agreement Centrally managed by the Vendor Please bid as per Industry best practice and experience in other sites of similar nature. Only L1, Monitor and escalate to the KCB onsite Engineer through different medium ISO 27001, PCI DSS. 10
11 Section 1 Please describe the level of documentation maintained for your current Network, Security and Telecom infrastructure? What tools/applications/portals do you use to make this documentation available, accessible and for updates (e.g. CMDB).E15 Do you follow the ITIL Process. Page 19 Section 2.4 Which module of Tripwire you use? Page 14 Section 2.2 Further down on Page 15 the shift Resource Count 7 ( breakup gives a count of 8 resources L1 : 3 shifts & L2 : 2 on weekdays and 6 additional for shifts) weekends. Please clarify Page Firewall Management Page 13 Section Page Page 30 Sec 2.9 Point no 6 Project Plan for delivering these services and resources ramp up required for project execution What is the make of firewall? KCB requires VAPT to be conducted as and when required. We want to know for how many devices? How many assets would be included under SIEM Security Monitoring, Policy Compliance, and Malware Monitoring? Should we factor for this while working out the cost? Please bid as per Industry best practice and experience in other sites of similar nature. Enterprise 8.1 Thse are the FTE required to provide the service 24X7X365, Vendor to come up with the right mix as long as the SLAs and the contractual agreements are met Checkpoint The whole enterprise. All core systems of the bank. Yes. If you must charge 11
12 will be mutually decided by Bidder & KCB. Page 35 Section 2.21 At least one certified expert (2 in general certification and specialized) and a back-up person are required in the technical areas Clarification Clarification Are this 2 resources in addition to the resource requirement (7 no s) given in the RFP? Confirmation of the number of sites were log collection will happen Can we please get any existing metrics on the current platform o Current EPS rate o Current Set of Use Cases No. The whole enterprise. Suggest/Use industry best practice 77. o Existing KPIs All resources to be onsite? Or remote We are open to Onsite, offsite and or hybrid. 78. management & administration is allowed? That the environment should be forensically What is expected as part of Forensic Analysis? 79. ready thus aiding any investigations 80. DLP at desktop, server or network level? all 81. What are the existing tools in use? Macfee DLP Will the responsibility lie only for providing Lease give us your best practice proposal 82. personnel, following process or also getting tools to manage? 83. Does KCB currently use any incident tracking solution? What are the areas not addressed by current tool? No incident tracking solution please make your proposal. 12
13 Is there a test environment for testing the changes before applying in production? In there a CAB in place for approval of changes? Is there a document available clearly highlighting the service requests from change requests? If the RCA and preventive measures have costs associates in terms of implementing a solution, how the process will be? Will it affect the uptime, if the approval process is time consuming? Will the projected business growth be shared with bidder for capacity planning? For obsolete products(hardware/software), though in working condition but out of support from OEM, will there be immediate replacement upon highlighting by the bidder?, as it may affect the uptime if any issues is encountered. What is a PIM & FIM solution? 13 no yes You have to justify and get approvals for any downtime No Make your proposal for replacements. Please note that all the equipment s and license will be owned by KCB PIM personal information manager FIM federated identity management Note: KCB does not have these tools. Please ignore this What is the best practice? Provide your proposals 89. Will the security subscriptions for defn. update, IOS upgrade, replacement support be managed by 90. KCB? If the database, network, server has a critical What is the best practice? patch which is important to patch a vulnerability, but the application or KCB network needs to be upgraded and needs time to support it. Will the risk 91. be borne by KCB? 92. Is consortium allowed? Procurement to guide on this. Bidder is required to make SOC for compliance & Please provide your proposals certification to ISO 27001, PCI DSS, ISO 20000, BS Can you elaborate? Is the bidder required 93. to comply to all standards in complete?
14 94. POCs should be supported from time to time what is the limit and types of POCs? 95. Section 2.1, Page Section Page 14, Resource Table Please provides the device volumes in-scope for the following services: 1. Anti-virus, number of management servers and agents 2. File Integrity Monitoring, number of management servers and agents 3. Host Intrusion Prevention, number of management servers and agents 4. Network Access Control, technology deployed 5. Network IPS, number of sensors 6. Firewalls, number of devices and management servers 7. security, number of servers deployed and mail-boxes monitored 8. Encryption, encyption type and volumes 9. Web Content Filter, number of servers/appliances 10. WAF product currently in use & its placement in the overall architecture 11. Imperva, please list the component and deployment details How many applications and servers are integrated with T24 Fraud Monitoring Tool Is the bidder expected to provide these services with 7 FTEs? Since this is a managed services requirement, can the bidder be provided the flexibility to decide on the number of resources required to deliver the services adhering to the functional and technical requirements of the RFP? To be agreed with successful bidder. This details cannot be provide now There is no integration, the tool analyses logs collected from other applications such as AD, DHCP, VPN e.t.c The bidder is expected to provide the services with the 7 FTEs or whatever deemed fit for meeting the contractual agreements and SLAs. 14
15 Section 2.4.2, point #25 Section 2.4.2, point #28 ANNEX 3 KCB IT RISK & SECURITY TECHNICAL SECURITY CHECKLIST (Pg 69)/ Availability - item b. Application security tests, >2.5.1 Asset Scope - > Application Scanning b. Application security tests, >2.5.1 Asset Scope - > Application Scanning b. Application security tests, >2.5.1 Asset Scope - > Application Scanning b. Application security tests, >2.5.1 Asset Scope - > Application Scanning Please elaborate what is meant by PIM solution. Is this through some additional tools, please specify. Please provide more details around what 2 FA solution is deployed in KCB. How many users are supported on 2 FA How does KCB propose to administer the disaster recovery and business continuity plans? Is KCB open to a governance layer as a part of the SOC governance model - which is independent from the operations team - to maintain oversight over day-to-day operations? How many web applications that will be in scope for security testing? How many of these applications are already in production and how many applications are under development? Are these applications internet facing or are there any internal applications in scope? Please provide an approx. estimate of the maximum number of static and dynamic pages we can expect in any application (e.g., 50 static and 50 dynamic pages) What is the technology landscape of the web applications? (e.g., Java,.NET, PHP etc.,)? Are the applications hosted internally or by 3rd party vendors or in cloud such as AWS? Does the application interface with any external systems? If yes how many? External systems like Content Management systems, third-party Payment Gateways, etc. 15 PIM personal information manager FIM federated identity management Note: KCB does not have these tools. Please ignore this The bidder is expected to provide the solution. Please suggest your best approach to this for consideration. 2 on production. On in the pipe line Internet facing -yes Technology landscape of the web applications include but is not limited to Java,.NET, PHP. Mostly hosted internally. Most applications interface with internal systems with limited external.
16 b. Application security tests, >2.5.1 Asset Scope - > Application Scanning b. Application security tests, >2.5.1 Asset Scope - > Application Scanning b. Application security tests, >2.5.1 Asset Scope - > Application Scanning Security Product Management Security Product Management Security Product Management Security Product Management How many application penetration tests need to be performed and what will be the frequency of these tests? Are these applications developed inhouse or by 3rd party vendors? Are you using File uploads or Card payment in your web applications? If Yes, pls specify the related application details What is the maximum number of user roles for which privilege escalation attacks have to be performed in any application? (e.g., 3 user roles) Are there any other capabilities that the WAF should provide, besides web traffic filtering - SSL, Data Loss Prevention, Logging, Load Balancing, etc Please provide the type & number of applications being protected through WAF? Please list the present technology / Version of DLP solution implemented at KCB along with the number of users supported. How many incidents on the average DLP solution registers per month? What all DLP components are rolled out currently in KCB, Please select from the list below. Data discovery (data discovery) Data in use (end point) Data in monition (network) Use industry best practice norms No card payments Use industry best practice norms This is project in progress. This is project in progress. McAfee DLP 9.2 Fine tuning of incidences is ongoing. So we can t the exact number. Data discovery (data discovery) Data in use (end point) Data in monition (network) 5,000 End points. 16
17 Security Product Management Security Product Management Security Product Management Please specify the number of end points (Laptops, Desktops, PDA, Other) that are currently under the scope of DLP How many databases are in KCB DAM scope. Pls give a split on the type of db- DB2, oracle, SQL etc. What is the volume of data contained in these databases How many datacenters are in scope for deployment of the DAM solution. How many incidents on the average DAM solution registers per month? Security Product Management Number of resources currently deployed for DAM? Page 27, Section Service Specificiation Provide the total number of websites would required to be scanned under Malware scanning scope 24*7 Page 27, Section point # 4 Can the bidder propose cloud based malware scanning service, through its associate partner, instead of on-premise, product based solution. Please confirm KCB concurrence on the same. ly applicable Section , point #1 Would the bidder team be supported by the existing KCB team for handling the demand for security monitoring and operations. What working model does KCB plans to have between the bidder team and its existing SOC team KBC indicates that bidder should monitor, detect and manage incidents for a minimum set of IT infrastructure events. Are correlation use-cases already built on KBC's existing SIEM platform or is the supplier expected to build them as part of service transition Ditto This is project in progress. 2 Data centres, need to be discussed This is project in progress. This is project in progress. 1 main website. KCB prefers on-premise. Yes. Bidder team does the monitoring and reporting as L1 and forwards any item that needs further investigations to KCB team. The supplier expected to build them as part of service transition. 17
18 Section , point #9 We assume that KBC will provide the underlying infrastructure including forensic tools required if any for this purpose and supplier is to utilize the relevant technologies. Please confirm on same Section , point #12 Section , point #12 Section , point #23 Section 2.5 Section Forensics is a specialized requirement which requires skills outside of security monitoring, what is KCB's expectation around the same. Does KCB expect the forensics to be performed by the proposed 7 staff itself? Forensics is a specialized requirement which requires skills outside of security monitoring with pricing typically provided on a per incident basis, please confirm if the bidder can provide this on a per incident basis as well Automatically reset the end-users password without the involvement of helpdesk technicians - Please elaborate on the user base for password reset, the user directory ( AD/LDAP ) to be integrated, the number of directories to be integrated For vulnerability management please specify: a. Number of internal IP addresses b. Number of external IP addresses c. Scan frequencies Please provide the number of log sources integrated with SIEM and the EPS handled by the current SIEM platform The bidder is expected to provide resources and tools if they not exist in KCB. KCB will eventually own the tools and licenses. Yes. Not to be provided on a per incident basis. Please propose a solution to achieve this. We use Microsoft AD. We have 6 AD s to be integrated. Use approx employees. The environment is dynamic and the number is expected to go up. 18
19 Master Scope: Identity and Access Management (IAM) 2.1 Master Scope: Identity and Access Management (IAM) 2.1 Master Scope: Identity and Access Management (IAM) To understand the Identity and Access Management (IAM) landscape, please provide the following information: 1) Which product of the Identity Manager is currently being used along with the product version e.g. Oracle Identity Manager 11gR2 2) Which product of the Access Manager is currently being used along with the product version e.g. Oracle Access Manager 11gR2 3) Which product of the Access Governance is currently being used along with the product version e.g. Oracle Identity Analytics 11gR2 Please specify the total No and types of applications (homegrown or product applications) which are integrated with Identity and Access Management (IAM) solution per IAM component e.g Inventory of the applications that are integrated with Identity Manager, Inventory of the applications that are integrated with Access Manager etc...? Please provide number of users categorized based on internal users(employee, Contractors) and external users(customers, Partners) 1) None. 2) None. 3) None. KCB does not have an IAM solution. Please provide your proposals Approximately 5,000 users. 19
20 Master Scope: Identity and Access Management (IAM) Please quantify the scope and provide support information for the past 6 months with reference to the following: 1)Total Ticket Volumes 2) Total Number of tickets for Identity Management 3) Total Number of tickets for Access Management 3) Total Number of tickets for Access Governance Solution 4) Total Number of tickets per severity 5) Number of environments to be supported e.g. Dev, Test, UAT and Prod Kindly share the asset list which includes number of devices for each type and location. Please specify the number of devices in High Availability 131. Please provide a list of assets which the bank plans to add to the existing scope 132. Does KCB have a DR site and are the devices in DR site also in scope of monitoring 133. Are all devices integrated with SIEM tool. If not, are they excluded from the scope of monitoring For all devices not integrated with the SIEM does the bank expect the bidder to integrate the 134. devices Please provide the current peak volumetric for the following 135. a. No of incident tickets daily b. Number of change and problem requests in a week. c. Number of IAM tickets in a day Ditto The environment is dynamic and the assets can change. The environment is dynamic and the assets can change. Yes. The bank has a DR site also in scope. Not all devices are integrated. The bank does expect the bidder to integrate the devices. Yes but gradually See comments above 20
21 d. Service requests which are part of the service catalogue in a day Please provide number of IP addresses or systems and network devices for Vulnerability Assessment. What is the scanning frequency for each asset type. (network. Systems and applications) 138. Please provide list of devices and systems for configuration assessment Vulnerability Management Services point F The RFP mentions The Bidder should perform the Application Security Scans. The team has to report and certify the application go live. How many applications are part of this ready for service assessment each year. Will KCB provide the tools or bidder is expected to use its on tools for scanning Please provide number of applications for Malware scans. What is frequency of the scans for each application? We understand bank uses RSA envision as its SIEM tool. Since this is EOL product, does the bank have any plans to upgrade the SIEM or migrate to another product? Can bidder offer its SIEM as a service? Are current operations insourced or outsourced to any other vendor. What is the average service transition timeline expected by KCB. SEE comments in this document Quote for Best practice. Too broad. To be discussed with successful bidder. Use unit cost for quoting. The environment is dynamic but the applications that go live are not quite many. Bidder expected to use its own tools for scanning. Bidder offer its SIEM as a service Please provide your proposal Current operations insourced 21
22 Section Performance Security Please confirm if the below understanding is No. the 7 to do all that correct a) 7 resources specified by KCB are for L1/L2 monitoring only b) The resources Product management, Vulnerability Assessment, Malware Scanning etc. will be additional to the 7 resources mentioned in point a Does the bank use any tool for service desk Bidder to use its own tool. Make your proposal management or it expects the bidder to use its too. own tool. What is the amount of Performance Security? 10% Is it 5% of total contract value? All resources to be onsite? Or remote management & administration is allowed? Please elaborate on Threat Intelligence (Security incident & event management) Encryption Is this disk encryption, data encryption or anything else? Provide proposal for onsite, offsite and or hybrid models Use RSA Envision Disk Encryption, Data encryption and data in use encryption Reconstruction of events as they occurred, What is expected as part of Forensic Analysis? 150. where, and by whom e.t.c 151. DLP at desktop, server or network level? Both Host and Network level What are the existing tools in use? As per the RFP. Will the responsibility lie only for providing Also getting tools to manage. personnel, following process or also getting tools to 153. manage? 154. Does KCB currently use any incident tracking solution? What are the areas not addressed by current tool? RSA Envision. Events correlation. 22
23 Is there a test environment for testing the changes before applying in production? In there a CAB in place for approval of changes? Is there a document available clearly highlighting the service requests from change requests? If the RCA and preventive measures have costs associates in terms of implementing a solution, how the process will be? Will it affect the uptime, if the approval process is time consuming? Will the projected business growth be shared with bidder for capacity planning? For obsolete products(hardware/software), though in working condition but out of support from OEM, will there be immediate replacement upon highlighting by the bidder?, as it may affect the uptime if any issues is encountered. POCs should be supported from time to time what is the limit and types of POCs? Bidder is required to make SOC for compliance & certification to ISO 27001, PCI DSS, ISO 20000, BS Can you elaborate? Is the bidder required to comply to all standards in complete? Yes. But not elaborate and not for all applications. Yes. There is a change management process in place. Yes it will affect uptime. This should be properly planned to avoid downtime that can negatively affect services. Yes. Under NDA. Replacement should be immediate but if it impacts on the bank s operations, appropriate time frame will be allocated. The environment is dynamic. The limit of the POCs will depend on what products the bank is looking forward to deploy. Yes. The bidder should comply to all standards in complete Is consortium allowed? Yes If the database, network, server has a critical patch which is important to patch a vulnerability, but the application or KCB network needs to be upgraded and needs time to support it. Will the risk be borne by KCB? By the bidder. 23
24 Clarification of Bidding Document (vi) Will the security subscriptions for defn. update, IOS upgrade, replacement support be managed by KCB? Request for more clarifications What is a PIM & FIM solution? By the bidder. The last date for receipt of requests for clarifications from bidders was on Friday, 25th July PIM personal information manager FIM federated identity management Note: KCB does not have these tools. Please ignore this This addendum has been sent to all bidders who had registered interest in the Tender. ACKNOWLEDGEMENT OF ADDENDUM NO. 1 WE, the undersigned hereby certify that the addendum is an integral part of the document Tender for Managed Services - I.T Security Operations Center (SOC) and that the understanding set out in the addendum has been incorporated in our tender proposal accordingly. Signed Name Tenderer Date 24
Response to Queries Received for RFP of Security Integrator - Tender No. 63
Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for
Response to Questions CML 15-018 Managed Information Security
Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?
Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries
Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,
RFP #3341-10 ADDENDUM #1 & ACKNOWLEDGMENT OF RECEIPT
RFP #3341-10 ADDENDUM #1 & ACKNOWLEDGMENT OF RECEIPT Description: Managed Services RFP #: 3341-10 Addendum #1 Date: January 28, 2016 This addendum includes the following information: Below are responses
Remote Infrastructure Support Services & Managed IT Services
Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
SIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
Statement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
CLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon
Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal P a g e 2 Table of Contents 1.
Vendors Questions for RFP DBA and System Administration Support
Vendors Questions for RFP DBA and System Administration Support Vendor A 1. Page 16 of 33 under scalability of services provided: "The Respondent should also be prepared to manage the transition of all
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
Get what s right for your business. Contact @lliance Technologies.
Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service
G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service 1 of 19 CONTACT INFORMATION Guy Silver T: 07733 008799 E: [email protected] W: www.dcggroup.com Data Continuity Group Limited, Bridge
Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
REQUEST FOR PROPOSAL
Tel 902.720.7812 Suite 200, Park Place II Toll Free 800.380.7775 238A Brownlow Avenue Fax 902.720.7873 Dartmouth, NS B3B 2B4 www.pvsc.ca REQUEST FOR PROPOSAL Procurement of Hosting Solution Components
Submitted to: Service Definition Document for Database Management for IT Infrastructure Management
Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Table of Contents 1 Service Description... 3 2 Support Process and Methodology... 10 3 Standard Questionnaire...
Sample Vulnerability Management Policy
Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Proactive. Professional. IT Support and Remote Network Monitoring.
Proactive. Professional. IT Support and Remote Network Monitoring. Watching Your Greatest Asset with the Latest Technology. Focus on your Business. We ll focus on your IT. Recent business trends coupled
Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
Security Information and Event Management (SIEM) Hardware & Software RFP #15-109309
CITY OF FARMINGTON 800 Municipal Drive Farmington, NM 87401-2663 (505) 599-1373 Fax (505) 599-1377 http://www.fmtn.org REQUEST FOR PROPOSALS FOR Security Information and Event Management (SIEM) Hardware
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Spyders Managed Security Services
Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built
Cloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server
Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Srno 1 Current RFP clause Clause Details Bidder Query Our Response 2.2 (Eligibilty Criteria), Page Parent company
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
Addendum 1 RFP #154D-16F CityWorks System Cloud Hosting
Addendum 1 CityWorks System Cloud Hosting This addendum is issued to answer questions submitted via email and to make the following revisions to this solicitation. All information provided herein is hereby
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015
QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):
Services Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Hosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint
Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint CUSTOMER Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and
Statement of Service Enterprise Services - MANAGE Microsoft IIS
Statement of Service Enterprise Services - MANAGE Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
How To Manage Your Information Systems At Aerosoft.Com
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org
Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org IMPORTANT NOTICE All proposal question and inquiries must be sent by email to
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
AL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
HIPAA SECURITY RISK ANALYSIS FORMAL RFP
HIPAA SECURITY RISK ANALYSIS FORMAL RFP ADDENDUM NUMBER: (2) August 1, 2012 THIS ADDENDUM IS ISSUED PRIOR TO THE ACCEPTANCE OF THE FORMAL RFPS. THE FOLLOWING CLARIFICATIONS, AMENDMENTS, ADDITIONS, DELETIONS,
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE WHAT IS PCI DSS? Payment Card Industry Data Security Standard Information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM,
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
Guardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Questions for Vermont Hosting RFI
Questions for Vermont Hosting RFI 1. Will the physical Oracle RAC servers be able to be picked up and moved to the new data center location or will new servers need to be purchased? SOV Response: New servers
Managed Security Service Providers vs. SIEM Product Solutions
White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
Office of Information Technology Hosted Services Service Level Agreement FY2009
Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support
N e t w o r k E n g i n e e r Position Description
Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST
RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST Questions and Answers Notice: Questions may have been edited for clarity and relevance. 1. How many desktops,
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
Information Technology Solutions. Managed IT Services
Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance
allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05
Corrigendum for the Tender for Web Based Project Monitoring Tool & MIS System Bidders Clarification Sl. Clause /Page no Tender Clause Clarification Sought Clarification No. 1 Page No:4 No consortium Consortium
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
AllianceIT Managed Services
AllianceIT Managed Services confidence predictability productivity focus Uncertainty is a business killer. To be successful, companies have to know that their critical IT systems will be available on demand
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
APPENDIX 5 TO SCHEDULE 3.3
EHIBIT K to Amendment No. 60 - APPENDI 5 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 5 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT K to Amendment No.
Sl. No. Ref Sections/Clause requiring Clarification. RFP (Page No.)
Sl. No. RFP (Page No.) Ref Sections/Clause requiring Clarification Pre-Bid Queries for RFP Reference No: OBC/HO/DIT/RFP/SECURITY EQUIPMENTS/47/2014 Points of clarification given in the RFP Clarification
ASIAN PACIFIC TELECOMMUNICATIONS PTY LTD STANDARD FORM OF AGREEMENT. Schedule 3 Support Services
ASIAN PACIFIC TELECOMMUNICATIONS PTY LTD STANDARD FORM OF AGREEMENT Schedule 3 Support Services December 2013 Table of Contents 1. SERVICE SCHEDULE 3 SUPPORT SERVICES... 3 1.1 OVERVIEW... 3 1.2 STANDARD
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
After reviewing all the questions, the most common and relevant questions were chosen and the answers are below:
2015 007 After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 1. Is there a proposed budget for this RFP? No 2. What is the expect duration for
For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.
Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought
