ájoƒ ùdg á«hô dg áµ ªŸG

Size: px
Start display at page:

Download "ájoƒ ùdg á«hô dg áµ ªŸG"

Transcription

1 ájoƒ ùdg á«hô dg áµ ªŸG ﻭﺛﻴﻘﺔ ﻃﻠﺐ ﻋﺮﻭﺽ ﻣﺸﺮﻭﻉ "ﺗﻨﻔﻴﺬ ﻭﺇﺩﺍﺭﺓ ﺍﻟﻤﻮﻗﻊ ﺍﻻﺣﺘﻴﺎﻃﻲ "ﻟﻤﺮﻛﺰ ﺑﻴﺎﻧﺎﺕ ﺍﻟﺘﻌﺎﻣﻼﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﺤﻜﻮﻣﻴﺔ

2 مقدم ث ق مػس ع "تيف ر امل ع تػػ ل االتحي طط ملسكص ب طىطت اليعطمالت االللرت ى احلل م " : دف املػس ع إىل تيف ر تػػ ل مسكص ب طىطت اتحي طط ي ح ضنط اضينساز اخلدمطت اإلللرت ى يف تحطل ع ع كطزث ال عدز اهلل يف مسكص الب طىطت السئ ط بطلس طض كرلم ش طد اللفطء اليػػ ل للنسكص السئ ط ذلم م خالل حتد ح تسع ادصاء م البي اليحي يف املسكص السئ ط أمتي اىيقطل الب طىطت بني مسكص الس طض املسكص االتحي طط د فقد أل ب طىطت. إ بسىطمر اليعطمالت اإلللرت ى احلل م " ط س" الساع السئ ط إلطالق ر املبطدز الي ع اليت ضيضن تقد ه خدمطت بطعينطد عطل تيذيب تأثريات الل ازخ لدعه السؤ اللل لليعطمالت اإلللرت ى احلل م يف املنلل العسب الطع د. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 2 of 29

3 أ ال : ىططق العنل: عل الػسكطت اليت لد ط خرب يف تيف ر تػػ ل مساكص الب طىطت االتحي طط أ تيقدو بعس ض ط ذلم -A( الػس ط تحطب امل اصفطت يف ث ق طلب العس ض القطه زعه أزبع مخط ضي امللحق )أ -H( ػنل ىططق العنل امل طو -B( عطئن اليعه يف امللحق )ح العطم اخلطص يف امللحق )ب اليطل : اليصن ه اليدط ط للنػس ع مج الب طىطت حتل ل ط ل ض اليصن ه املالئه ض اليصن ه اليفص ل للنػس ع جت ص مسكص الب طىطت االتحي طط o o o البيطء o غساء ت ز د تسك ب مج األد ص الربامر للنسكص االتحي طط حتد ح البي o اليحي للنسكص السئ ط تػنل: عيط اليلطمل احلل م الب اب ال طي لليعطمالت االللرت ى احلل م االىعن الداخل لربىطمر ط س غبل الب طىطت زبط املسكص االتحي طط بطملسكص السئ ط بطلس طض إدساء اليعد الت يف املسكص السئ ط إذا لصو ليحق ق السبط اليلطمل بني املسكص. إدساء مج االخيبطزات الالشم لألد ص الربامر اليأكد م حتق ق اليلطمل املطل ب بني املسكص االتحي طط املسكص السئ ط يف الس طض. تقد ه دلن ع كطمل ل ثطئق املػس ع. o o o االداز الضنط ت فري عدد كطف م اخلرباء )الفي ني اإلداز ني( املطئ لني ع الربامر ذلم عل أضطع د او كطمل ملد مخظ ضي ات. ت فري اتفطع د د مطي اخلدم.)SLA( إداز مج األد ص o o MCIT YESSER Program DRS Implementation and Operation Project RFP Page 3 of 29

4 o الق طو بطخيبطز لليعطو م خالل طسف ثطلح. االضيالو بعد اىي طء فرت اليػػ ل يف تحطل عدو زغب الربىطمر يف متد د عقد اليػػ ل ق و املقط ل ظن مط لصو ليقل املعسف إىل م ظف الربىطمر أ أ طسف ثطلح o املبطلؼ املػس ط لل شاز احلق يف ا تللف املقط ل بأعنطل إضطف ذات عالع بطملػس ع أثيطء ضس ط العقد. عل املقط ل ت فري تلم اخلدمطت تحطب مط تف ض ب ال شاز تصدق عل ذلم عل أضطع اليع ض ع اليللف اليت مي ط عل ضب ل املجطل ال احلصس االت : o أتعطب مصس فطت االضيػطز ني. ميطلبطت املسكص االتحي طط اليت تطسأ خالل تيف ر املػس ع. يمكن االطالع على تفاصيل المنافسة عند شراء كراسة الشروط والمواصفات من إدارة العقود والمناقصات بوزارة االتصاالت وتقنية المعلومات MCIT YESSER Program DRS Implementation and Operation Project RFP Page 4 of 29

5 Table of Contents Table of Contents... 5 List of Figures... 8 List of Tables... 8 List of Acronyms... 9 DISCLAIMER Introduction Background Purpose RFP Organization Section 2: Current Situation Section 3: Project Objectives Section 4: Scope of Work Section 5: Requirements Section 6: Proposal Format Section 7: Appendices Requirements Numbering Scheme Definitions Current Situation YESSER Program Architecture Yesser Data Center Government Service Bus (GSB) National e-government Portal Internal Yesser IT-systems Local Network (LAN) Architecture WAN Network Internet Network Government Secure Network (GSN) Project Objectives Scope of Work Requirements Colocation Requirement:... Error! Bookmark not defined. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 5 of 29

6 General Requirements... Error! Bookmark not defined Physical Security Requirement... Error! Bookmark not defined Space Requirements... Error! Bookmark not defined Agreements And Plans Requirements... Error! Bookmark not defined Operational Requirements... Error! Bookmark not defined Technical Solution Architecture Requirements... Error! Bookmark not defined DR Site 1 Architecture... Error! Bookmark not defined DR Site 1 Architecture Aspects... Error! Bookmark not defined Software Architecture... Error! Bookmark not defined Hardware Solution Architecture... Error! Bookmark not defined Solution Requirements... Error! Bookmark not defined Government Service Bus (GSB) Software Requirements... Error! Bookmark not defined Portal Software Requirements... Error! Bookmark not defined Yesser Internal Systems Software Requirements... Error! Bookmark not defined Professional Services... Error! Bookmark not defined Disaster Recovery Software... Error! Bookmark not defined Operating Systems... Error! Bookmark not defined Virtualization... Error! Bookmark not defined Management:... Error! Bookmark not defined Hardware Requirements... Error! Bookmark not defined Generic Requirements... Error! Bookmark not defined Integration Appliance... Error! Bookmark not defined Servers Chassis:... Error! Bookmark not defined Blade Server:... Error! Bookmark not defined High Density Servers... Error! Bookmark not defined High Specification Servers:... Error! Bookmark not defined Low Specification Servers:... Error! Bookmark not defined Administration Console... Error! Bookmark not defined Network Requirements... Error! Bookmark not defined Network Architecture Requirements... Error! Bookmark not defined Core Firewall... Error! Bookmark not defined Internet Firewall... Error! Bookmark not defined. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 6 of 29

7 Core Switch Requirements... Error! Bookmark not defined Server Farm Switch Requirements... Error! Bookmark not defined Server Farm Access Switch Requirement... Error! Bookmark not defined Core Load Balancer... Error! Bookmark not defined DMZ Load Balancer... Error! Bookmark not defined Internet Router... Error! Bookmark not defined WAN Router... Error! Bookmark not defined DMZ Switch... Error! Bookmark not defined Racking... Error! Bookmark not defined Backup Requirements... Error! Bookmark not defined Disaster Recovery Site... Error! Bookmark not defined Backup Appliance... Error! Bookmark not defined Tape Library... Error! Bookmark not defined Main Data Center... Error! Bookmark not defined Backup Appliance... Error! Bookmark not defined Tape Library... Error! Bookmark not defined Storage Requirements... Error! Bookmark not defined Disaster Recovery Site... Error! Bookmark not defined SAN Storage... Error! Bookmark not defined SAN Fabric... Error! Bookmark not defined Main Data Center Site... Error! Bookmark not defined SAN Storage... Error! Bookmark not defined SAN Fabric... Error! Bookmark not defined Implementation Requirements... Error! Bookmark not defined Project Management... Error! Bookmark not defined Project Documentation... Error! Bookmark not defined Project Organization... Error! Bookmark not defined Warranty... Error! Bookmark not defined Operations Requirements... Error! Bookmark not defined Quality Assurance & Acceptance Requirements... Error! Bookmark not defined Handover... Error! Bookmark not defined. 6. Proposal Format MCIT YESSER Program DRS Implementation and Operation Project RFP Page 7 of 29

8 6.1. General Instructions... Error! Bookmark not defined Proposal Preparation... Error! Bookmark not defined Technical Proposal Instructions... Error! Bookmark not defined Mandatory and Optional Requirements... Error! Bookmark not defined Required Sections... Error! Bookmark not defined Required Appendices... Error! Bookmark not defined Financial Proposal Instructions... Error! Bookmark not defined. 7. Overview of Appendices Appendix A: Instructions to Bidder, Proposal Submission and Evaluation Appendix B: Standard Terms & Conditions Appendix C: Requirements Compliance Matrix for Technical Proposal Appendix D: Bill of Materials & Information Tables for Technical Proposal Appendix F: Bidder Project References Templates for Technical Proposal Appendix F: Bill of Materials & Pricing Tables for Financial Proposal Appendix G: Bidders Qualifications Appendix H: Systems List List of Figures Figure 1 The main building blocks of the e-government Program... Error! Bookmark not defined. Figure 2: GSB Logical Application Architecture... Error! Bookmark not defined. Figure 3: Portal Logical Application Architecture... Error! Bookmark not defined. Figure 4: Internal -1 Logical Application Architecture... Error! Bookmark not defined. Figure 5: Internal 2 Logical Application Architecture... Error! Bookmark not defined. Figure 6: Yesser Main Data Center Network Architecture... Error! Bookmark not defined. Figure 7: Yesser DRS1 Colocation... Error! Bookmark not defined. Figure 8: Yesser DRS1 Architecture Aspects... Error! Bookmark not defined. Figure 9 YESSER DRS1 Network Architecture... Error! Bookmark not defined. List of Tables Table 1 Definitions Table 2: Datacenter Assets Table 3 YESSER DSP Providers Table 4 DRS1features... Error! Bookmark not defined. Table 5 Sample stages... Error! Bookmark not defined. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 8 of 29

9 Table 6 Sample Phases Documentation... Error! Bookmark not defined. Table 7 Proposal Packages Content... Error! Bookmark not defined. List of Acronyms Acronym MCIT LAN WAN DRP DRS RTO RPO GSB HO DMZ HW SW SLA GSN DSP GSS MQ DP MB WAS Details MINISTRY OF COMMUNICATION AND INFORMATION TECHNOLOGY LOCAL AREA NETWORK WIDE AREA NETWORK DISASTER RECOVERY PLANNING DISASTER RECOVERY SITE RECOVERY TIME OBJECTIVE RECOVERY POINT OBJECTIVE GOVERNMENT SERVICE BUS HEAD OFFICE DEMILITARIZED ZONE HARDWARE SOFTWARE SERVICE LEVEL AGREEMENT GOVERNMENT SECURE NETWORK DATA SERVICE PROVIDER GLOBAL SITE SELECTOR MESSAGE QUEUE DATAPOWER MESSAGE BROKER WEBSPHERE APPLICATION SERVER MCIT YESSER Program DRS Implementation and Operation Project RFP Page 9 of 29

10 DISCLAIMER THIS DOCUMENT IS A REQUEST FOR PROPOSAL (RFP), AND SHALL NOT BE CONSTRUED IN WHOLE OR PART AS A DIRECT OR INDIRECT ORDER. IT SHALL NOT BE CONSTRUED AS A REQUEST OR AUTHORIZATION TO PERFORM WORK AT THE EXPENSE OF YESSER PROGRAM. THE INFORMATION IN THIS RFP IS INTENDED TO ENABLE THE RECIPIENT TO FORMULATE A PROPOSAL IN RESPONSE TO THE PROJECT REQUIREMENTS SET FORTH. ALTHOUGH THIS RFP CONTAINS SUCH ENABLING INFORMATION, BIDDERS MUST MAKE THEIR OWN INDEPENDENT ASSESSMENTS AND INVESTIGATIONS REGARDING THIS RFP S SUBJECT MATTER. THE BIDDER REMAINS RESPONSIBLE FOR IDENTIFYING ANY FURTHER INFORMATION THAT IT REQUIRES TO PREPARE THE PROPOSAL. THIS RFP SHALL CONSTITUTE PART OF THE CONTRACT THAT YESSER WILL SIGN WITH THE SUCCESSFUL BIDDER. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 10 of 29

11 1. Introduction 1.1. Background The Government of Saudi Arabia attaches great significance to the e-government concept and the transformation process that leads to its realization. It strongly believes in the tremendous benefits the e-government will bring forth for the national economy. Accordingly, the supreme Royal Decree number 7/B/33181, dated 10/7/1424 (7/9/2003) included a directive to the Ministry of Communications and Information Technology to formulate a plan for providing government services and transactions electronically. Transformation to an information society cannot be achieved without comprehensive collaboration and concerted efforts to realize the set objectives. Therefore, the Ministry of Communications and Information Technology (MCIT) established the e-government Program YESSER (hereby referred to as YESSER throughout this RFP document) in conjunction with the Ministry of Finance and the Communication and Information Technology Commission (CITC). In order to safeguard its proprietary, mission critical data and functionality, YESSER has realized the importance of establishing a Disaster Recovery Site (DRS). While backups protect its data, YESSER aims to minimize its downtime in case of a disaster to a minimum acceptable level; especially concerning critical services provided to wide array of government agency categories. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 11 of 29

12 1.2. Purpose This Request for Proposal (RFP) provides interested bidders with the information needed to prepare and submit proposals that satisfy YESSER s Program Disaster Recovery Site (DRS) implementation and operation Project s requirements. Information provided herein is solely intended to assist bidders in the preparation of proposals to the best of MCIT YESSER Program knowledge, the information provided is accurate. However, The MCIT YESSER Program does not warrant such accuracy, and any variations subsequently determined shall not be construed as basis for invalidating the RFP. Furthermore, YESSER program management reserves the right to cancel this RFP at any time. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 12 of 29

13 1.3. RFP Organization Section 2: Current Situation This section provides an executive-level overview of the current situation from both business and technical perspectives. It discusses the YESSER Program s infrastructure and associated components such as application, hardware, and network infrastructure etc. Section 3: Project Objectives This section presents the Disaster Recovery Project Objectives. Section 4: Scope of Work This section details the project s scope of work. For the project to be complete and closed, the bidder must complete all items within the scope of work. Section 5: Requirements This section provides the Disaster Recovery requirements. Section 6: Proposal Format This section provides the requirements for the bidder s proposal content and submission. Section 7: Appendices This section lists the appendices in support of the RFP. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 13 of 29

14 1.4. Requirements Numbering Scheme The Requirements Numbering Scheme will facilitate referencing a specific functionality throughout the project s different phases. Bidders are encouraged to adopt the numbering scheme when compiling their proposals. The recommended requirements numbering scheme has the following format: Requirement Type Number- Description Where: Requirement Type is either Req Info for requirements concerning what the bidder is required to deliver, or additional information associated with certain requirement(s) to aid the Bidder in their proposals Number is a sequence number starting from 1 (one) up to the total number of compiled requirements; Description is the part of the requirement (regardless of the type) describing the requirement in more detail. Therefore, bidders must comply with the requirement and its description. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 14 of 29

15 1.5. Definitions Capitalized terms and all capitalized acronyms used in this document will have the following meaning: Term YESSER Bidder The Solution RFP Definition YESSER Program is the party officially requesting proposals A vendor officially responding to the Request for Proposal by submitting a proposal The total set of deliverables within the scope of the Request for Proposal that the bidder must deliver, whether Information Technology, documentation, intangible deliverables such as knowledge transfer, or any other deliverable included in the scope Request for Proposal Table 1 Definitions MCIT YESSER Program DRS Implementation and Operation Project RFP Page 15 of 29

16 2. Current Situation This section provides an overview of the current situation from both technical and business perspectives. It will discuss the services that YESSER Program provides YESSER Program Architecture The following diagram, Error! Reference source not found., reflects Yesser s Architecture. يمكن الشروط االطالع على تفاصيل المنافسة والمواصفات من إدارة العقود عند شراء بوزارة االتصاالت وتقنية المعلومات كراسة والمناقصات 2.2. Yesser Data Center Yesser Data Center is the hosting facility for all active hardware and software components (Networking infrastructure, storage devices, Internet connectivity, monitoring systems, and application, middleware and data base systems, e.g. GSB etc.) of the Yesser IT E-Government infrastructure. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 16 of 29

17 2.3. Government Service Bus (GSB) The Government Service Bus GSB is the e-government enabling infrastructure. The GSB provides the integration platform and access to shared government services, such as shared data, security, payment services, and notification engine. The GSB platform is totally based on IBM technology. The following diagram depicts the GSB platform logical application architecture. يمكن الشروط االطالع على تفاصيل المنافسة والمواصفات من إدارة العقود عند شراء بوزارة االتصاالت وتقنية المعلومات كراسة والمناقصات As can be seen in the diagram above the GSB platform is composed from the following GSN DMZ: this represents the WAN dematerialized zone and it hosts the Data Power components. IBM Data Power XI50 Application zone: The application zone hosts the following business applications: WebSphere Message Broker V6.1 WebSphere Message Queue V6.0 WebSphere Service Registry and Repository (WSRR) V6.1 Tivoli Federated Identity Manager V6.2 Secure Data zone: The secure data zone hosts the following components: IBM DB2 V9.5 Enterprise IBM Tivoli Directory Server V6.1 IBM Tivoli Access Manager V6.1 Agency Services zone: The agency zone is dedicated for hosting other agencies applications and MCIT YESSER Program DRS Implementation and Operation Project RFP Page 17 of 29

18 solutions (whenever they cannot host their own). This zone hosts the following components: DB2 Workgroup Server V9.1 WebSphere enterprise service bus Server V6.1.2 The current environment in YESSER is highly available with automatic fail over on the application level. The Databases are located on SAN. The monitoring system is composed of the following: Management Zone: Tivoli Enterprise Portal Client (TEPC) Web based application V Tivoli Enterprise Portal Server (TEPS) V Tivoli Enterprise Monitoring Server (TEMS) V6.2.2 with the following categories: o Primary TEMS (Manages the monitoring environments). o Remote TEMS (manages the connection to the monitoring agents). Monitoring Agents with the following categories: o BD2 o AIX o Windows o MQ o MB o HTTP server o WebSphere Portal o WebSphere Application Server o SOA MCIT YESSER Program DRS Implementation and Operation Project RFP Page 18 of 29

19 2.4. National e-government Portal The National e-government Portal ( is the central point for access to the electronic services offered by the Saudi government. It acts as the government e-gateway where it provides information about the e-government services and provides links and information about the available government directories. The Portal platform is totally based on IBM technology. The following diagram depicts the Portal platform logical application architecture. يمكن الشروط االطالع على تفاصيل المنافسة والمواصفات من إدارة العقود عند شراء بوزارة االتصاالت وتقنية المعلومات كراسة والمناقصات As can be seen in the diagram above the Portal platform is composed from the following Internet DMZ: this represent the internet dematerialized zone and it hosts the following components: IBM Http Server V7.0 Application zone: The application zone hosts the following applications: WebSphere Portal V7.0 WebSphere Content Management V7.0 IBM Content Analytics with Enterprise Search V3.0 WebSphere Mobile Portal V7.0 Secure Data zone: The data zone hosts the following components: IBM DB2 Enterprise Edition V9.5 IBM Directory Server V6.1 (Shared with GSB) MCIT YESSER Program DRS Implementation and Operation Project RFP Page 19 of 29

20 2.5. Internal Yesser IT-systems This section outlines high-level details of the existing hardware, applications and software systems that YESSER backend systems are currently employing. Information includes: operating systems, database managements systems, software applications technology, anticipated configuration endpoints, software products, network configuration, and storage configurations. The Yesser internal platform is hybrid environment most of its component based on Microsoft technology. The following diagrams depict the internal platform logical application architecture. يمكن الشروط االطالع على تفاصيل المنافسة والمواصفات من إدارة العقود عند شراء بوزارة االتصاالت وتقنية المعلومات كراسة والمناقصات Software and Hardware View The following table depicts Yesser Data center Application, Hardware and Database in the following manner: Table 2: Datacenter Assets MCIT YESSER Program DRS Implementation and Operation Project RFP Page 20 of 29

21 يمكن الشروط االطالع على تفاصيل المنافسة والمواصفات من إدارة العقود عند شراء بوزارة االتصاالت وتقنية المعلومات كراسة والمناقصات 2.6. Local Network (LAN) Architecture The Yesser network is based on a client/server setup that uses star topology with 1 GB Ethernet capability for standalone servers and 10 GB for blade and network backbone connectivity. The network uses UTP CAT 6 cables and Fiber channel connection to access switches. The network has several layers of security using firewalls. More than one zone is created on the Internal Firewalls to secure Yesser s internal network: 1- E-Government Zone, which contains front-end servers 2- Internal Zone, which contains back-end and internal servers 3- Monitoring Zone, which contains monitoring servers 4- Public Zone, which includes Web portals 5- Middleware Zone, which includes Data Base servers 6- Application zone, which contains GSB and portal application servers 7- Secure Data zone which contains GSB and portal database and directory servers 8- Management Administration zone, which contains monitoring and management servers 9- Agencies services, which contain agencies services application and database servers 10- Users Zone The following diagram depicts the main site network architecture. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 21 of 29

22 يمكن الشروط االطالع على تفاصيل المنافسة والمواصفات من إدارة العقود عند شراء بوزارة االتصاالت وتقنية المعلومات كراسة والمناقصات 2.7. WAN Network Yesser is utilizing two links to connect through the Government Secure Network (GSN) - (IP/VPN MPLS Cloud) to other Government Agencies. The Government Service Bus (GSB) enables government agencies to communicate via Web-Service invocations over the GSN network Internet Network Yesser has multiple connections to the internet to ease failover to either of the active connections. Moreover, Independent Address Space and BGP multi-homing are provided. These connections also use their own autonomous system registered with RIPE. Yesser DSP providers are detailed below in Table 3. DSP Provider Speed Connection Type Table 3 YESSER DSP Providers 2.9. Government Secure Network (GSN) In accordance with the executive work plan of the e-government Program "YESSER", a Communications Network for e-government Transactions had to be established by YESSER Program. Such a network has been envisioned to interconnect Government Agencies with the e-government Data Center, which has been established with highest international technical and security standards to be used as a host for the e-government National Portal "Saudi" and the e-government Program MCIT YESSER Program DRS Implementation and Operation Project RFP Page 22 of 29

23 "YESSER". This network has enabled the e-government Data Center to be the effective, cost-saving and unifying Link for interconnecting all Government Agencies with one another. GSN project implementer will be responsible to deploy the GSN equipment and links on the DRS1 and the winning bidder is expected to provide complete collaboration. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 23 of 29

24 3. Project Objectives The main objectives of YESSER s Disaster Recovery Site (DRS) Procurement, Implmentation and Operation project are to achieve the following: 1. Maintain all IT services in case of a major disaster occurrence at the main site. 2. Upgrade the government service bus and national portal infrastructure in the main data center. 3. Quickly and efficiently, restore the services back to normal operations. 4. Increase operational efficiencies through automation of failover and failback processes. 5. Provide 24/7 uptime and secure access to Yesser s main site and the DRS. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 24 of 29

25 4. Scope of Work This section documents this project s scope of work. It outlines what will be required from interested bidders to succesfully implement the project. The Disaster Recovery Site Preparation scope of work will include the following: Disaster recovery site: 1) Provide DRS colocation facility. 2) Deploy Government Service Bus infrastructure 3) Deploy National e-government Portal ( infrastructure 4) Deploy Yesser Internal Systems infrastructure Main data center: 1) Upgrade Government Service Bus infrastructure. 2) Upgrade National portal infrastructure. 3) Upgrade SAN & backup Infrastructure. This includes the respective infrastructure components: DRS colocation Applications (IBM application & Microsoft etc.) Operating Systems (Windows, UNIX, AIX etc.) Hardware (e.g. Servers etc.) Network Infrastructure (e.g. Firewalls, Routers IDS etc.) Monitoring Solution Backup Solution (Tape library, backup management software) Storage solution In summary, the scope requires interested bidders to deliver a turnkey solution for procurement, implementation and operation of YESSER s Disaster Recovery Site [DRS]. The bidder is required to design, test, deploy, and operate the Solution based on the following phased approach: I. Phase 1: Design Perform project management planning. Perform a complete information gathering and analysis to produce the Solution design. Perform a detailed disaster recovery design (high and Low level) for the required Solution components such as Portal, GSB, Network, Systems, and Security. II. Phase 2: Build Provide all necessary hardware and software procurement, delivery, and installation (configuration) for the Solution. Fully integrate with Yesser s main site in Riyadh and perform all necessary adjustments in the main site to ensure the Solution s full functionality. Implement and test all the Solution s hardware and software components. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 25 of 29

26 III. IV. Develop and deliver a complete set of the Solution s documentation; which includes (not limited to) the installation and configuration settings, failover & failback procedure and recovery procedures. Phase 3: Operations Provide fulltime human resources required to operate the solution without interruption. Provide the required technical support and maintenance for all parts of the Solution (five years mandatory). Provide Service Level Agreements (SLA) with venders. Perform testing with a third party. Phase 4: Handover After the operations phase, and incase that Yesser decided not to extend the contract; the Vendor shall ensure smooth transfer of knowledge and skills to Yesser or another third party. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 26 of 29

27 5. Requirements يمكن الشروط االطالع على تفاصيل المنافسة والمواصفات من إدارة العقود عند شراء بوزارة االتصاالت وتقنية المعلومات كراسة والمناقصات MCIT YESSER Program DRS Implementation and Operation Project RFP Page 27 of 29

28 6. Proposal Format يمكن الشروط االطالع على تفاصيل المنافسة والمواصفات من إدارة العقود عند شراء بوزارة االتصاالت وتقنية المعلومات كراسة والمناقصات MCIT YESSER Program DRS Implementation and Operation Project RFP Page 28 of 29

29 7. Overview of Appendices The following are the appendices in support of the RFP. Appendix A: Instructions to Bidder, Proposal Submission and Evaluation Appendix A provides Bidders with information regarding proposal review process, content and format, evaluation, and communications. Appendix B: Standard Terms & Conditions Appendix B provides YESSER s project standards terms and conditions in Arabic. Appendix C: Requirements Compliance Matrix for Technical Proposal Bidders should fill-in this sheet in its entirety; this table will be used to guide the technical proposal s evaluation process. Appendix D: Bill of Materials & Information Tables for Technical Proposal Appendix D provides all the software and hardware information tables that Bidders must provide for the Technical Proposal. Appendix F: Bidder Project References Templates for Technical Proposal Appendix F provides the templates for Bidders references in support of their Technical Proposals. Appendix F: Bill of Materials & Pricing Tables for Financial Proposal Appendix F provides all the pricing table templates that Bidders should complete with all required financial data and information for the Financial Proposal. Appendix G: Bidders Qualifications Appendix G provides the bidders qualifications. Appendix H: Systems List Appendix H provides report contain information about Yesser physical infrastructure overview describing the applications, systems and network. MCIT YESSER Program DRS Implementation and Operation Project RFP Page 29 of 29

Response to Bidder Questions and Amendment 2 to Request for Proposal 11 01 Disaster Recovery Services

Response to Bidder Questions and Amendment 2 to Request for Proposal 11 01 Disaster Recovery Services STATE OF NEW YORK DEPARTMENT OF TAXATION AND FINANCE Office of Budget & Management Analysis Bureau of Fiscal Services Building 9, Room 234 W.A. Harriman Campus Albany, NY 12227 Eric Mostert, Chief Financial

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! http://www.pass4test.com We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way! http://www.pass4test.com We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : C5050-280 Title : IBM Cloud Computing Infrastructure Architect V1 Vendors

More information

000-280. IBM Cloud Computing Infrastructure Architect V1. Version: Demo. Page <<1/9>>

000-280. IBM Cloud Computing Infrastructure Architect V1. Version: Demo. Page <<1/9>> 000-280 IBM Cloud Computing Infrastructure Architect V1 Version: Demo Page 1.Cloud architectures designed for service delivery and availability of services are extremely important. How is software

More information

How To Write An Ets Request For Proposal (Rfp)

How To Write An Ets Request For Proposal (Rfp) Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment

More information

C2030-280.Examcollection.Premium.Exam.34q

C2030-280.Examcollection.Premium.Exam.34q C2030-280.Examcollection.Premium.Exam.34q Number: C2030-280 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ Exam Code: C2030-280 Exam Name: IBM Cloud Computing Infrastructure

More information

ATTACHMENT 1 CURRENT NJ SVRS ENVIRONMENT

ATTACHMENT 1 CURRENT NJ SVRS ENVIRONMENT ATTACHMENT 1 CURRENT NJ SVRS ENVIRONMENT OVERVIEW The New Jersey Statewide Voter Registration System (SVRS) was purchased from Covansys, Inc in 2005 based on their ElectioNet application. While the core

More information

Request for Proposal to

Request for Proposal to Request for Proposal to ( 2016 /ح ك/ 3 ) No. Tender General Response for All Raised Questions Taking into consideration the requirements outlined in the RFP and this Q&A document, bidders need to respond

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

VERITAS Backup Exec 9.0 for Windows Servers

VERITAS Backup Exec 9.0 for Windows Servers WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS

More information

This presentation provides an overview of the architecture of the IBM Workload Deployer product.

This presentation provides an overview of the architecture of the IBM Workload Deployer product. This presentation provides an overview of the architecture of the IBM Workload Deployer product. Page 1 of 17 This presentation starts with an overview of the appliance components and then provides more

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain

More information

ájoƒ ùdg á«hô dg áµلªÿg Yesser Overall SDLC Process Definition

ájoƒ ùdg á«hô dg áµلªÿg Yesser Overall SDLC Process Definition ájoƒ ùdg á«hô dg áµلªÿg Yesser Overall SDLC Process Definition Version 0.6 - Page 3 / 43 Table of Contents 1. Process Introduction... 5 1.1. Process Scope... 5 1.2. Process Objectives and Benefits... 5

More information

Configuring and Deploying a Private Cloud. Day(s): 5. Overview

Configuring and Deploying a Private Cloud. Day(s): 5. Overview Configuring and Deploying a Private Cloud Day(s): 5 Course Code: M20247 Overview This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012

More information

Building the Virtual Information Infrastructure

Building the Virtual Information Infrastructure Technology Concepts and Business Considerations Abstract A virtual information infrastructure allows organizations to make the most of their data center environment by sharing computing, network, and storage

More information

Hardware. Maintenance

Hardware. Maintenance Government Services available through the portal 1. The scope of the work is limited to the portal and its integration with service provider applications. It doesn't include any work on the service provider

More information

EMC Disk Library with EMC Data Domain Deployment Scenario

EMC Disk Library with EMC Data Domain Deployment Scenario EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment

More information

What You Need to Know NOW about Next Generation Data Protection. Kenny Wong Senior Consultant June 2015

What You Need to Know NOW about Next Generation Data Protection. Kenny Wong Senior Consultant June 2015 What You Need to Know NOW about Next Generation Data Protection Kenny Wong Senior Consultant June 2015 The Changing Face of Data Protection Changing computing infrastructure Data protection silos Application

More information

Configuring and Deploying a Private Cloud

Configuring and Deploying a Private Cloud Course Code: M20247 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Deploying a Private Cloud Overview This course equips students with the skills they require to configure and

More information

ERP Infrastructure Guide APPENDIX B

ERP Infrastructure Guide APPENDIX B ERP Infrastructure Guide APPENDIX B for State of Georgia State Road and Tollway Authority 47 Trinity Avenue, SW Atlanta, GA 30334 June 2013 Updated by: Updated on: Description of Update: Revision # DRY

More information

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation Following are the questions submitted on or before September 18, 2015, in accordance with RFP specifications. All questions are published verbatim as received, without regard to errors in spelling, punctuation,

More information

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest. Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought

More information

EMC BACKUP-AS-A-SERVICE

EMC BACKUP-AS-A-SERVICE Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and

More information

MS 20247C Configuring and Deploying a Private Cloud

MS 20247C Configuring and Deploying a Private Cloud MS 20247C Configuring and Deploying a Private Cloud Description: Days: 5 Prerequisites: This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center

More information

How To Write An Architecture For An Bm Security Framework

How To Write An Architecture For An Bm Security Framework Security Reference Architecture James (Jimmy) Darwin [email protected] 2010 IBM Corporation 0 Reference Architectures As part of the Time-to-Value Initiative, Reference Architectures have been identified

More information

Configuring and Deploying a Private Cloud 20247C; 5 days

Configuring and Deploying a Private Cloud 20247C; 5 days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Configuring and Deploying a Private Cloud 20247C; 5 days Course Description

More information

ENTERPRISE DATA CENTER BACKUP AND RECOVERY OVERVIEW

ENTERPRISE DATA CENTER BACKUP AND RECOVERY OVERVIEW BACKUP AND RECOVERY OVERVIEW Version 2.15 Date: 09/16/2014 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized

More information

IT Service Management with System Center Service Manager

IT Service Management with System Center Service Manager Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies

More information

Brocade Network Advisor High Availability Using Microsoft Cluster Service

Brocade Network Advisor High Availability Using Microsoft Cluster Service Brocade Network Advisor High Availability Using Microsoft Cluster Service This paper discusses how installing Brocade Network Advisor on a pair of Microsoft Cluster Service nodes provides automatic failover

More information

An Oracle White Paper September 2011. Oracle Exadata Database Machine - Backup & Recovery Sizing: Tape Backups

An Oracle White Paper September 2011. Oracle Exadata Database Machine - Backup & Recovery Sizing: Tape Backups An Oracle White Paper September 2011 Oracle Exadata Database Machine - Backup & Recovery Sizing: Tape Backups Table of Contents Introduction... 3 Tape Backup Infrastructure Components... 4 Requirements...

More information

Abstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2

Abstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2 HP Insight Recovery Technical white paper Abstract... 2 Introduction... 2 Overview of Insight Dynamics VSE and Logical Servers... 2 Disaster Recovery Concepts... 4 Recovery Time Objective (RTO) and Recovery

More information

IT Service Management with System Center Service Manager

IT Service Management with System Center Service Manager Course 10965B: IT Service Management with System Center Service Manager Page 1 of 9 IT Service Management with System Center Service Manager Course 10965B: 3 days; Instructor-Led Introduction This Three-day

More information

Disaster Recovery Hosting Provider Selection Criteria

Disaster Recovery Hosting Provider Selection Criteria Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What

More information

HP StorageWorks Data Protection Strategy brief

HP StorageWorks Data Protection Strategy brief HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,

More information

e-gateway SOLUTION OVERVIEW Financials HCM ERP e-gateway Web Applications Mobile Devices SharePoint Portal

e-gateway SOLUTION OVERVIEW Financials HCM ERP e-gateway Web Applications Mobile Devices SharePoint Portal e-gateway SOLUTION OVERVIEW In an effort to manage mission critical information better, perform their daily tasks more efficiently, share information to key stakeholders more effectively, and ensure that

More information

CA arcserve Unified Data Protection virtualization solution Brief

CA arcserve Unified Data Protection virtualization solution Brief CA arcserve Unified Data Protection virtualization solution Brief Server and desktop virtualization have become very pervasive in most organizations, and not just in the enterprise. Everybody agrees that

More information

Module 5 Introduction to Processes and Controls

Module 5 Introduction to Processes and Controls IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development

More information

The 5 Most Commonly Used Disaster Recovery Process

The 5 Most Commonly Used Disaster Recovery Process DR Risk Assessment White Paper This document provides an overview of Equilibrium s disaster recovery risk analysis and remediation methodology. This methodology was developed over a period of 10+ years

More information

Logicalis Enterprise Cloud Frequently Asked Questions

Logicalis Enterprise Cloud Frequently Asked Questions Logicalis Enterprise Cloud Frequently Asked Questions Getting Started What is the Logicalis Enterprise Cloud and why is it a great solution? The Logicalis Enterprise Cloud (LEC) is a shared computing environment

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

S&T Outsourcing Services Portfolio. Zagreb, 03.11.2011.

S&T Outsourcing Services Portfolio. Zagreb, 03.11.2011. S&T Outsourcing Services Portfolio Zagreb, 03.11.2011. Definition Portfolio of product support and professional services that are brought together to provide the client with the IT infrastructure, enterprise

More information

Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server

Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Srno 1 Current RFP clause Clause Details Bidder Query Our Response 2.2 (Eligibilty Criteria), Page Parent company

More information

Addendum 5 STATE OF LOUISIANA. Division of Administration Office of Technology Services RFP #: 815200-20150506001

Addendum 5 STATE OF LOUISIANA. Division of Administration Office of Technology Services RFP #: 815200-20150506001 STATE OF LOUISIANA Division of Administration Office of Technology Services Addendum 5 For: Enterprise Architecture for DHH Medicaid Systems Modernization RFP #: 815200-20150506001 Amendment Date: June

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Ohio Mutual Insurance Group s Deployment of WebSphere Application Server on VMware ESX

Ohio Mutual Insurance Group s Deployment of WebSphere Application Server on VMware ESX Ohio Mutual Insurance Group s Deployment of WebSphere Application Server on VMware ESX April 2010 TECHNICAL CASE STUDY Table of Contents Executive Summary...1 Company Overview...1 Business Challenges...1

More information

Request for Information (RFI) for Managed Hosting Service

Request for Information (RFI) for Managed Hosting Service FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS ORGANISATION DES NATIONS UNIES POUR L ALIMENTATION ET L AGRICULTURE ORGANIZACION DE LAS NACIONES UNIDAS PARA LA AGRICULTURA Y LA ALIMENTACION Viale

More information

Interoute Virtual Data Centre. Hands on cloud control.

Interoute Virtual Data Centre. Hands on cloud control. Interoute Virtual Data Centre. Hands on cloud control. Scale your computing resource on demand Choose where in Europe you want your data Europe s most trusted and secure network www.interoute.com/vdc Interoute

More information

Using High Availability Technologies Lesson 12

Using High Availability Technologies Lesson 12 Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Appendix 3. Specifications for e-portal

Appendix 3. Specifications for e-portal Appendix 3. Specifications for e-portal 1. e-portal H/W and S/W No Equipment Specification Unit Q'ty 1 Web Server for users and administrator 2 WAS Server 3 LMS Server 4 DB Server 4U Rack Type 8 Core Intel

More information

Exam Name: IBM WebSphere Process Server V6.2,

Exam Name: IBM WebSphere Process Server V6.2, Vendor: IBM Exam Code: 000-375 Exam Name: IBM WebSphere Process Server V6.2, System Administration Version: DEMO 1.A company has an IBM WebSphere Process Server clustered environment running. A system

More information

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for

More information

1 OPPORTUNITY SUMMARY

1 OPPORTUNITY SUMMARY REQUEST FOR PROPOSALS: MANAGED SERVICES FOR INFRASTRUCTURE AND IT SUPPORT SERVICES Posting Date: Thursday, January 7, 2016 Due Date: Friday, February 5, 2016 1 OPPORTUNITY SUMMARY The Massachusetts Clean

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Statement of Work: SharePoint Migration Services. Supplement 1

Statement of Work: SharePoint Migration Services. Supplement 1 Statement of Work: SharePoint Migration Services Supplement Contents.0 SharePoint Migration Services...2.. Background and Overview...2 2.0 Project Requirements, Formal Deliverables and Scope of Work...2

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Secure Web Gateway 11.7 Upgrade Release Notes

Secure Web Gateway 11.7 Upgrade Release Notes Secure Web Gateway 11.7 Upgrade Release Notes August 2015 Trustwave is pleased to announce that the upgrade path for Secure Web Gateway to version 11.7 is now available. For more information on SWG 11.7,

More information

Migration guide for IBM WebSphere Message Broker on HP-UX

Migration guide for IBM WebSphere Message Broker on HP-UX Technical white paper Migration guide for IBM WebSphere Message Broker on HP-UX Migrating from WebSphere Message Broker on HP-UX for HP 9000 servers to WebSphere Message Broker on HP-UX for Integrity servers

More information

The Promise of Virtualization for Availability, High Availability, and Disaster Recovery - Myth or Reality?

The Promise of Virtualization for Availability, High Availability, and Disaster Recovery - Myth or Reality? B.Jostmeyer Tivoli System Automation [email protected] The Promise of Virtualization for Availability, High Availability, and Disaster Recovery - Myth or Reality? IBM Systems Management, Virtualisierung

More information

How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power

How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power Database Backup and Recovery using NetVault Backup and PowerVault MD3260 A Dell Technical White Paper Database Solutions Engineering Dell Product Group Umesh Sunnapu Mayura Deshmukh Robert Pound This document

More information

High Availability Implementation for JD Edwards EnterpriseOne

High Availability Implementation for JD Edwards EnterpriseOne High Availability Implementation for JD Edwards EnterpriseOne Ken Yeh, Manager, ERP Systems/JDE Enersource Colin Dawes, Director of Technology Services, Syntax Presentation Abstract Enersource Corporation

More information

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area

More information

Next-Gen Securitized Network Virtualization

Next-Gen Securitized Network Virtualization Next-Gen Securitized Network Virtualization Effective DR and Business Continuity Strategies Simplify when the lights go out www.ens-inc.com Your premiere California state government technology provider.

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

000-280. IBM Cloud Computing Infrastructure Architect V1 Exam. http://www.examskey.com/000-280.html

000-280. IBM Cloud Computing Infrastructure Architect V1 Exam. http://www.examskey.com/000-280.html IBM 000-280 IBM Cloud Computing Infrastructure Architect V1 Exam TYPE: DEMO http://www.examskey.com/000-280.html Examskey IBM 000-280 exam demo product is here for you to test the quality of the product.

More information

Request for Proposal Infrastructure Hosting

Request for Proposal Infrastructure Hosting Request for Proposal Infrastructure Hosting June 10, 2013 Revision Date: 6/19/2013 Table of Contents Executive Summary and Company Background... 4 Summary Overview of Request for Proposal (RFP) and Services

More information

SAP Disaster Recovery Solution with VMware Site Recovery Manager and EMC CLARiiON

SAP Disaster Recovery Solution with VMware Site Recovery Manager and EMC CLARiiON SAP Disaster Recovery Solution with VMware Site Recovery Manager and EMC CLARiiON Applied Technology Abstract This white paper demonstrates how VMware s Site Recovery Manager enables the design of a powerful

More information

DELL. Dell Microsoft Windows Server 2008 Hyper-V TM Reference Architecture VIRTUALIZATION SOLUTIONS ENGINEERING

DELL. Dell Microsoft Windows Server 2008 Hyper-V TM Reference Architecture VIRTUALIZATION SOLUTIONS ENGINEERING DELL Dell Microsoft Windows Server 2008 Hyper-V TM Reference Architecture VIRTUALIZATION SOLUTIONS ENGINEERING September 2008 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY 03/27/09 Version Approved April 30, 2009 Approval of Enterprise Security Architecture Policy (03/27/2009 Version) Douglas G. Mack IT Security

More information

Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC)

Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Department of Information Technology, Govt. of India, Electronics Niketan, New Delhi 110 003. 1.0 Preamble 1.1

More information

HP 3PAR Peer Persistence Software Installation and Startup Service

HP 3PAR Peer Persistence Software Installation and Startup Service Technical data HP 3PAR Peer Persistence Software Installation and Startup Service HP Care Pack Services HP 3PAR Peer Persistence Software Installation and Startup Service provides implementation of the

More information

RFP - Equipment for the Replication of Critical Systems at Bank of Mauritius Tower and at Disaster Recovery Site. 06 March 2014

RFP - Equipment for the Replication of Critical Systems at Bank of Mauritius Tower and at Disaster Recovery Site. 06 March 2014 RFP - Equipment for the Replication of Critical Systems at Bank of Mauritius Tower and at Disaster Recovery Site Response to Queries: 06 March 2014 (1) Please specify the number of drives required in the

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

Managed Services - A Paradigm for Cloud- Based Business Continuity

Managed Services - A Paradigm for Cloud- Based Business Continuity Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise

More information

Managing a Fibre Channel Storage Area Network

Managing a Fibre Channel Storage Area Network Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical

More information

IT Service Management with System Center Service Manager

IT Service Management with System Center Service Manager 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: [email protected] Web: www.discoveritt.com IT Service Management with System Center Service Manager

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

DeltaV Virtualization High Availability and Disaster Recovery

DeltaV Virtualization High Availability and Disaster Recovery DeltaV Distributed Control System Whitepaper October 2014 DeltaV Virtualization High Availability and Disaster Recovery This document describes High Availiability and Disaster Recovery features supported

More information

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 [email protected] Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

HBA Virtualization Technologies for Windows OS Environments

HBA Virtualization Technologies for Windows OS Environments HBA Virtualization Technologies for Windows OS Environments FC HBA Virtualization Keeping Pace with Virtualized Data Centers Executive Summary Today, Microsoft offers Virtual Server 2005 R2, a software

More information

Request for Proposal RFP No. IT-2015-101. Phone System Replacement

Request for Proposal RFP No. IT-2015-101. Phone System Replacement Request for Proposal RFP No. IT-2015-101 November 23 rd 2015 Phone System Replacement Deadline for Receipt of Proposals: January 18 th, 2016 at 4:30pm Proposals to be submitted by e-mail to Morgan Calvert

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information