11:00 a.m. The closing time will be as per the clock at the RAF reception



Similar documents
REQUEST FOR INFORMATION ON PERFORMANCE TEST TOOLS

Request for Information: Enterprise scanning and content management solutions, as well as architecture to suit RAF s current and future needs

2.1. Service Providers who do not comply with the mandatory requirements will not be considered for further evaluation.

APPOINTMENT OF SERVICE PROVIDERS TO PROVIDE AN ENTERPRISE PROJECT PORTFOLIO MANAGEMENT (EPPM) SOLUTION

T54/09/14 APPOINTMENT OF A PANEL OF STOCK BROKERS TO PROVIDE BROKERAGE SERVICES TO THE IDC BID CLOSING DATE: WEDNESDAY, 08 OCTOBER 2014 AT 12:00 NOON

Appointment of a service provider to assist with the development of Analytics Capability for PAYE and VAT. RFP No.: RFP 28/2014

SUPPLY, DELIVERY, INSTALLATION AND MAINTENANCE OF AIR CONDITIONERS REQUEST FOR INFORMATION (RFI)

T34/02/16 PROVISION OF SECURITY ALARM SYSTEM, MONITORING AND ARMED RESPONSE SERVICES TO 14 IDC REGIONAL OFFICES

Request for Proposal (RFP) The Management of CSIR Records. RFP Number: 336/30/05/ Rev

SEALED BID REQUEST FOR INFORMATION

City of Johannesburg Supply Chain Management Unit

TENDER NUMBER: ITT/SACU/015/2015/O Information and Communication Technology (ICT) Audit IT Effectiveness Review

T01/01/14 REQUEST FOR PROPOSAL TO CONDUCT ANNUAL CUSTOMER SATISFACTION SURVEYS CLOSING DATE: FRIDAY, 31 JANUARY 2014 AT 12:00 NOON

Information Technology Policy

Critical Controls for Cyber Security.

INVITATION TO BID (SBD 1) BID DESCRIPTION BID DOCUMENTS ARE TO BE DEPOSITED AT:

3.2 Seven (7) x HIGH PERFORMANCE WALK-THROUGH METAL DETECTOR. Detailed technical specification is illustrated on Annexure B.

ICT. Request for Quotation (RFQ) Off-site Tape Media Storage Services to the CSIR. Date of issue: 11 September Closing Date and Time:

Digital Signature Application

TERMS OF REFERENCE FOR THE APPOINTMENT OF A SERVICE PROVIDER TO SUPPLY AND INSTALL BIOMETRICS ACCESS CONTROL SYSTEMS AT THE DEPARTMENT OF ENERGY

Software Cost. Discounted STS Rate Units Total $0.00 $0.00 $0.00 $0.00 Total $0.00

T28/05/13. Supply and Installation of Video Conferencing Equipment to IDC CLOSING DATE: FRIDAY, 17 MAY 2013 AT 12:00 NOON

1. BACKGROUND 2. OBJECTIVES

Yagan Moodley Tel : (011)

REQUEST FOR QUOTATION YOU ARE HEREBY INVITED TO SUBMIT QUOTATIONS TO THE WATER RESEARCH COMMISSION. 60 Days (COMMENCING FROM RFQ CLOSING DATE)

REQUEST FOR QUOTATION YOU ARE HEREBY INVITED TO SUBMIT QUOTATIONS TO THE WATER RESEARCH COMMISSION. 60 Days (COMMENCING FROM RFQ CLOSING DATE)

Intel Enhanced Data Security Assessment Form

Paralegal Studies With one of the most employer recognised colleges

Request for proposals (RFP) The Provision of transcription services to the CSIR for a Human Language Technology data pipeline optimisation project

The Securities & Exchange Commission of Pakistan invites sealed bids from suppliers registered with Income Tax and Sales Tax Departments for:

General Business Courses

SPECIAL CONDITIONS OF CONTRACT RT

SUPPLIER DATABASE REGISTRATION QUESTIONNAIRE - CONSULTANTS

BANK OF UGANDA REPUBLIC OF UGANDA

BANK OF UGANDA REPUBLIC OF UGANDA

SOLVE THE PROBLEM OF IDENTITY THEFT. An online, real-time solution for KYC, POPI, RICA and FICA compliance. May

Human Resource Management

Certified Identity and Access Manager (CIAM) Overview & Curriculum

The National Gambling Board Private Bag X27, Hatfield, Tel: Fax

Request for Information RFI #15/ for Enterprise Password Management Software

VENDOR APPLICATION FORM

1. PURPOSE 2. BACKGROUND. 2.1 Functionalities of the Current GCIS ECMS. BID SPECIFICATIONS FOR GCIS SHAREPOINT Page 1 of 9

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

ITAR Compliance Best Practices Guide

Kindly furnish me with a written quotation for the supply of the following service: ENVIRONMENTAL IMPACT ASSESSMENT (EIA) CONSULTANCY SERVICES

Request for proposals (RFP) The supply of a computer based Library Management System for the CSIR. RFP No. 579/29/05/2015

Supplier prequalification Document

Approved by: Mike McKeever Chief Executive Officer. MM:TA:gg Attachment

Crime Scene and Corporate Forensic Investigating

T19/03/13 REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION

Records Information Management System Development and Implementation

Criminal Justice With one of the most employer recognised colleges

Draft Service Level Agreement between ECDC and Contractor

REQUEST FOR PROPOSAL ENTERPRISE RESOURCE PLANNING (ERP) BID NUMBER: CLOSING DATE FOR SUBMISSION: TIME:

REQUEST FOR PROPOSALS DEVELOPMENT OF THE MGSLG WEBSITE AND INTRANET

Aberdeen City Council IT Security (Network and perimeter)

How To Manage Two Web Portals In South Africa

REQUEST FOR QUOTATION YOU ARE HEREBY INVITED TO SUBMIT QUOTATIONS TO THE WATER RESEARCH COMMISSION.

FLORIDA DEPARTMENT OF TRANSPORTATION DISTRICT S. Marion Avenue, Mail Station 2015 Lake City, Florida

This Service Level Agreement applies to the Services as defined in the Service Supply Agreement.

10 Things IT Should be Doing (But Isn t)

NEC Managed Security Services

REQUEST FOR PROPOSAL FOR IT ASSET MANAGEMENT SERVICES

Professional Services Agreement

Event Planning With one of the most employer recognised colleges

Lawrence Livermore National Laboratory

Request for Proposal (RFP) Risk Management and Short Term Insurance Broking Services. RFP Number: 485/12/12/2014

May 20, Request for Information (RFI) VRS Platform Providers

F25: SUPPLIER LIST APPLICATION FORM SUPPLIER LIST APPLICATION FORM (F25) REQUIREMENTS

SECTION C SCHEDULE A: PROJECT BRIEF PART 1: SCOPE OF SERVICES

City of Johannesburg Supply Chain Management Unit

REQUEST FOR INFORMATION. Hosted Website Solution and Services RFI #E Closing: March 24, 2015 at 2:00 pm local time.

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Request for Information (RFI) Supply of information on an Enterprise Integration Solution to CSIR

16 Rankings On First Page. 30 Total Keywords. KEYWORD RANKINGS We are tracking Benchmark Date and Current Ranking. Ranking Changes Improved

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

EXPRESSION OF INTEREST PROVISION OF TRAINING SERVICES

REQUEST FOR BID: KNP IPZ EASTERN PERIMETER RIVER GAP DETECTION SECURITY SYSTEM

REQUEST FOR PROPOSAL [RFP]

Eskom Holdings SOC Ltd s Standard Conditions of Tender

CITY OF MARTINSVILLE REQUEST FOR PROPOSALS UTILITY BILL PRINTING & MAILING SERVICES SEPTEMBER 22, 2015

Transcription:

RFB NUMBER: RAF/2015/00019 DESCRIPTION: Request for Information: ICT Security Solutions PUBLISH DATE: 18 September 2015 VALIDIY PERIOD: 120 days from the closing date CLOSING DATE: 20 October 2015 CLOSING TIME: 11:00 a.m. The closing time will be as per the clock at the RAF reception Non Compulsory Briefing Session RFI RESPONSES MUST BE HAND DELIVERED / COURIERED TO: ATTENTION: Road Accident Fund (RAF) 420 Witch-Hazel Avenue, Eco Glades Office Park 2, Block F (at reception, on the ground floor) Centurion Date: 29 September 2015 Time: 10:00 Road Accident Fund (RAF) 420 Witch-Hazel Avenue, Eco Glades Office Park 2, Block F (at reception, on the ground floor) Centurion Noluthando Nyoka NB: Bidder(s) must ensure that they sign the register at the reception when delivering their bids. BIDDER NAME: Bidders should ensure that RFI responses are delivered in time to the correct address. If the RFI is late, it shall not be accepted for consideration. The RAF reception is generally accessible eight (8) hours a day (07h45 to 16h00); five (5) days a week (Monday to Friday). Bidders must ensure that they sign the relevant register at the reception when delivering bids. Bidders must advise their couriers of the instruction above to avoid misplacement of bid response RFI: ICT Security Solutions - RAF/2015/ 00019 Page 1 of 9

THE FOLLOWING PARTICULARS MUST BE FURNISHED. (FAILURE TO DO SO SHALL RESULT IN YOUR RFI BEING DISQUALIFIED.) BIDDING STRUCTURE Indicate the type of bidding structure by marking with an X : Individual bidder Joint venture Consortium Using subcontractors Other If individual bidder, indicate the following: Name of bidder Postal address If joint venture or consortium, indicate the following: (To be completed for each joint venture/ consortium member) Name of joint venture/consortium members RFI: ICT Security Solutions - RAF/2015/ 00019 Page 2 of 9

Postal address If using subcontractors, indicate the following: Name of prime contractor Postal address RFI: ICT Security Solutions - RAF/2015/ 00019 Page 3 of 9

If joint venture or consortium, indicate the following: Name of prime contractor Postal address If using subcontractors, indicate the following: (To be completed for each subcontractor) Name of subcontractor Postal address RFI: ICT Security Solutions - RAF/2015/ 00019 Page 4 of 9

ENQUIRIES Enquiries regarding this Request for Information should be submitted via e-mail to: Bid enquiries: Ms. N Nyoka noluthandon@raf.co.za Enquiries should reference specific paragraph numbers, where appropriate. All questions/ enquiries must be forwarded in writing not later than 11:00 on 30 September 2015 Questions/enquiries received after 11:00 on 30 September 2015 will not be entertained. Questions/ Answers will be published on the RAF website on 05 October 2015. RFI: ICT Security Solutions - RAF/2015/ 00019 Page 5 of 9

SCOPE OF WORK: ICT SECURITY SOLUTIONS OR SERVICES 1. The Road Accident Fund The Road Accident Fund (RAF) is a schedule 3A Public Entity established in terms of the Road Accident Fund Act, 1996 (Act No. 56 of 1996), as amended. Its mandate is the provision of compulsory social insurance cover to all users of South African roads, to rehabilitate and compensate persons injured as a result of the negligent driving of motor vehicles in a timely and caring manner, and to actively promote the safe use of our roads. The customer base of the RAF comprises not only the South African public, but all foreigners within the borders of the country. The RAF has regional offices in Pretoria, Johannesburg, East London, Durban, Nelspruit and Cape Town and a large number of satellite offices and hospital service centres across the country. 2. Background to the Request for Information (RFI) RAF is improving its Information Security infrastructure to ensure alignment to strategic objectives in both the Information Security & IT Risk Management strategies as well as compliance with legislation such as Protection of Personal Information (PoPI). The purpose of this RFI is to request appropriate best practice industry information that may be used in the drafting and publishing of a future bid process. 3. Scope of work The RAF is seeking information from bidders to provide ICT Security Solutions or Services for a period of three (3) years. We are specifically looking for information about on-premise, cloud based or hybrid solutions/services. In the event of cloud based solutions, preference is for local bound solutions within the borders of South Africa. Our current IT infrastructure is centralized in Gauteng. Bidders can respond to one or more of the following solutions: Identity and Access Management Solution (IAM); Personal information Identification and Marking; Database Activity Monitoring (DAM) Solution; Unstructured Data Solution; and Data Loss Prevention (DLP) Solution. The systems must have the capability to provide reports and analytics. NB: A Request for Proposal (RFP) will only be issued to the bidders who respond to this RFI. Bidders are encouraged to respond freely within the 5 solutions/services mentioned below. RFI: ICT Security Solutions - RAF/2015/ 00019 Page 6 of 9

3.1 The solutions/services scope covers: 3.1.1 Identity and Access Management Solution (IAM) key features: Enhanced security for the identification, authentication and authorization of employees. Centralization of authentication for easier user lifecycle management. Multifactor authentication mechanisms. Privileged user management. 3.1.2 Personal information Identification and Marking key features: Identify information stored on file servers, online portals, document management systems and notebook computers that may be sensitive information but not easily identifiable. Identification, alerting and remediation of sensitive information with poor access controls Definition of policies for protection, access rules and classification of personal information identified. Supports the implementation of legislative requirements e.g. POPI 3.1.3 Database Activity Monitoring (DAM) Solution key features: Enterprise database auditing and real-time protection. Generation of log data for import into log management system. Activity monitoring, intrusion prevention and risk management for business applications and databases Fingerprinting database and application interactions to protect against threats. Enforce information handling rules on databases and SharePoint Fraud protection on all systems using backend databases including SAP Real time monitoring of unauthorized database access and document management systems Detection of unauthorized access by administrators. Ability to detect and respond to unauthorized activity by preventing access to data operates like a database and application firewall Ease of compliance reporting 3.1.4 Unstructured Data Solution key features: The solution has the capability to identify, monitor and access control information that is stored in shared servers and other file storage. Authorized access to unstructured data is assured while audit trails are maintained for accessed data Information classification implementation is enhanced through identification of data and owners. 3.1.5 Data Loss Prevention (DLP) Solution key features: Identify RAF Information and implement access control for data in motion and data at rest Risk based tracking of data in motion and data at rest Addressing of insider threats to organization by enforcing what users are permitted to transfer out of the organization. RFI: ICT Security Solutions - RAF/2015/ 00019 Page 7 of 9

4. TECHNICAL MANDATORY & TECHNICAL FUNCTIONAL CRITERIA Technical Mandatory requirements Bidders must indicate compliance by ticking the relevant box Comply or "Not comply Note: The following technical mandatory requirement must be met by the bidders and it will be expected of bidders to supply proof or confirm their commitment during the potential RFP. Mandatory Comply Not Comply 4.1.1 The solutions/services must have been deployed in an enterprise information security environment preferably similar to the RAF industry. Substantiate / Comments RFI: ICT Security Solutions - RAF/2015/ 00019 Page 8 of 9

5. PRICING SCHEDULE: ICT SECURITY SOLUTIONS 5.1 NOTE: All prices must be VAT inclusive and must be quoted in South African Rand (ZAR), the quoted prices is for budget purposes only and not for award. 5.2 Please provide your total indicative bid price to be used as a guideline R.. (compulsory) a. This price will not be evaluated but will be for noting for budgetary purposes. b. NOTE: All prices must be VAT inclusive and must be quoted in South African Rand (ZAR). c. This RFI is not a solicitation and that there are no commitments with respect for future purchases or contracts. d. The below table is a guideline in terms of costing. Deliverable Solution cost Services cost Software cost R Licensing R R Hardware R R Implementation R R Knowledge, skills and training R R Support and Maintenance R R Professional services R R Any other: (specify) R R Total VAT exclusive R R VAT R R Total VAT inclusive R R RFI: ICT Security Solutions - RAF/2015/ 00019 Page 9 of 9