The due date for questions has been extended to 10 AM on Wednesday January 11, 2012.



Similar documents
University of Maryland University College Office of Procurement, Room University Boulevard East Adelphi, MD 20783

Deploying Cisco ASA VPN Solutions Exam.

Managed Security Services ISSUE DATE:

Service Description Overview

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Assistant Director, Technology Procurement RFP Network and Telephony Managed Services Addendum #1 dated 01/23/2015

Managing Enterprise Security with Cisco Security Manager

Security Information and Event Management (SIEM) Hardware & Software RFP #

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

All Shortlisted Proposers following the initial technical evaluation. RFP Document Management Solution Addendum #1 dated 10/29/2015

Symantec Security Information Manager Version 4.7

VPN Only Connection Information and Sign up

Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.

Product Summary RADIUS Servers

Cisco PIX vs. Checkpoint Firewall

SNMP Collector Supported Device Inventory

AUGUSTA TECHNICAL COLLEGE INFORMATION TECHNOLOGY PLAN

IPS AIM for Cisco Integrated Services Routers

Junos Pulse Supported Platforms Guide

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Case Study for Layer 3 Authentication and Encryption

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Purchasing and Property Services AOC East Fowler Avenue Tampa, Florida (813)

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Request for Proposal RFP No. IT Phone System Replacement

Bring Your Own Device:

(d-5273) CCIE Security v3.0 Written Exam Topics

Managing Enterprise Security with Cisco Security Manager

Curriculum Vitae. Name : Eerdekens. Steven. First name : Leuven, 26 th of April Place and date of birth : Marital status :

McAfee Product Entitlement Definitions

PROMAPP TECHNICAL INFORMATION

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

Enforcing PCI Data Security Standard Compliance

Cisco Intrusion Detection System Services Module (IDSM-2)

JOHNSON COUNTY COMMUNITY COLLEGE College Blvd., Overland Park, KS Ph Fax

COORDINATED THREAT CONTROL

Cisco IOS Advanced Firewall

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006

RFP Online Employee Rewards Program Addendum #3 dated 02/15/2016

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

How To Understand And Understand Cisco Security Specialist (For A Non-Profit)

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Internet Content Provider Safeguards Customer Networks and Services

Deploying Firewalls Throughout Your Organization

NOTICE TO BIDDERS ADDENDUM #1 AB

NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD. Debbie Montano, Chief Architect dmontano@juniper.net

Lab Testing Summary Report

Product catalogue 29/01/2013. Products donated by : Microsoft Cisco Symantec SAP Fluidsurveys easylearning

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Independent School District No. 9 (Union Public Schools) Tulsa County, Oklahoma

Juniper / Cisco Interoperability Tests. August 2014

Response to Questions CML Managed Information Security

Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications

Unprecedented Malware Growth

Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Cisco & Big Data Security

Request for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

Lab Configuring Access Policies and DMZ Settings

Implementing Cisco Secure AccessSolutions Exam

SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT

DALLAS INDEPENDENT SCHOOL DISTRICT PURCHASING DEPARTMENT ADDENDUM No. 2 NETWORK ELECTRONICS

TECHNOLOGY INTEGRATION GUIDE

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Check Point Positions

Implementing Cisco IOS Network Security

RFP # ADDENDUM #1 & ACKNOWLEDGMENT OF RECEIPT

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

Cisco AnyConnect Secure Mobility Solution Guide

IP Telephony Management

Total Protection for Enterprise-Advanced

Cisco QuickVPN Installation Tips for Windows Operating Systems

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP # Addendum 1.0

RFP 21/2013 Network Carrier and Infrastructure Services

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Modular Network Security. Tyler Carter, McAfee Network Security

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008

BlackBerry Enterprise Service 10. Version: Installation Guide

Extending Collaboration to BYOD Devices

Cisco Identity Services Engine

CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

Government of Canada Managed Security Service (GCMSS) Attachment 2.1: Historical Information

Dell Advanced Network Monitoring Services Service Description

DCADLEC RFP Clarifications

Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router

ACME Enterprises IT Infrastructure Assessment

Why a Reverse Proxy with My Instant Communicator for mobiles??

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

NATed Network Testing IxChariot

Move over, TMG! Replacing TMG with Sophos UTM

Supported Devices (Event Log Sources)

Configure ISE Version 1.4 Posture with Microsoft WSUS

Borderless Services Node (BSN) Delivers Integrated Wired, Wireless Policies

Transcription:

DATE: January 9, 2012 TO: FROM: RE: All Prospective Proposers Janet Foster AVP Procurement Services 240-684-5141 RFP 90986 Managed Security Services Addendum #3 dated 01/09/2012 The following amends the above referenced RFP documents. Receipt of this addendum is to be acknowledged by completing the enclosed "Acknowledgement of Receipt of Addenda Form and including it in the Technical Proposal. The due date for questions has been extended to 10 AM on Wednesday January 11, 2012. The due date and time for the Technical and Price Proposals is Tuesday, January 17, 2012 on or before 4:00 p.m. Proposals must be delivered to: Janet Foster University Center UC 310 4716 Pontiac Street College Park, MD Late proposals cannot be accepted. Proposals are to be delivered to the University's Procurement Office, University of Maryland University College, Procurement Office, Room UC-310, 4716 Pontiac Street, College Park, MD 20740. The University recommends against use of mail or delivery services which will not guarantee delivery directly to Suite 310. Directions to the UMUC Procurement Office can be found at the website http://www.umuc.edu/visitors/locations/uc_building.cfm. Page 1 of 6

Questions from Potential Proposing Firms Managed Security Services Addendum #3 dated 01/09/2012 1. Question: Which applications are you looking to protect? Please provide name of application and quantity of each. Please include the number SQL, Oracle or Exchange instances to be monitored. Response: All 2. Question: For desktop monitoring, what is/are the monitoring objective(s)? Basic system activity monitoring only or a full deployment which can include file integrity management and usb activity monitoring? Response: Full deployment to include of the above mentioned and the monitoring of any illegal communication traffic. 3. Question: What are the existing vulnerability scanning capabilities if any? Response: In the process of implementing Rapid 7. 4. Question: Do you want us to collect netflow data? Response: Yes 5. Question: What is your NAC or other endpoint solution if any? Response: In the process of rolling out Cisco NAC 6. Question: How many Data-Center and Remote locations is your network distributed? Response: We have 5 data centers, 3 US, 1 Germany & 1 Japan 7. Question: Please provide approximate Average and Peak EPS (Events per Second) of current Log volume generated by each device count in provided list of network components? Response: We are unable to provide this information 8. Question: Does your network infrastructure currently aggregate all logs to a central location or more than 1 location? Response: More than 1 location 9. Question: For NIDS/NIPS, what is the bandwidth of network connections from the internet each of your ISP network demarcation points? Response: 1 Gbps 10. Question: Please provide a high level Network Topology Map to include geographic location, of network components to be monitored/managed. Response: See attached document. 11. Question: For the purpose of sizing, please provide model numbers and physical chassis configuration (modules, interfaces) of each Firewall in list of network components? What are your current Network Management Platforms assigned to Manage and Monitor your firewall platforms? Response: See Exhibit A. 12. Question: For the purpose of sizing, please provide model numbers and physical chassis configuration (modules, interfaces) of each router/switch/wireless AP in list of network Page 2 of 6

components? What are your current Network Management Platforms assigned to Manage and Monitor your router/switch/wireless AP platforms? Response: o Cisco Catalyst Layer 3 6500 4500 3750 o Cisco Routers 4600 2800 3800 o Cisco Aironet Wireless WCS WLC -4400 WLC -5500 Ap-3500 13. Question: For the purpose of sizing, please provide model number and physical chassis configuration (modules, interfaces) of Juniper SSL VPN Gateway in list of network components? What is your current Network Management Platforms assigned to Manage and Monitor your SSL Gateway platform? Response: All Cisco ASAs are managed using Cisco CSM as well as standalone All Juniper IDPs are managed and monitored using Juniper NSM All Cisco PIX devices are managed standalone All Cisco IPS devices are managed using Cisco IDM and standalone All Juniper SSL VPN devices are managed standalone All Checkpoint firewalls are managed using Checkpoint Smartcenter All Juniper SRX firewalls are managed standalone using Jweb and CLI 14. Question: Can you share the release version of the CheckPoint IP690s? Response: Nokia IP690 15. Question: What type of endpoint AV client is deployed? Are the feeds from the clients going to a management console, and would it be acceptable to pull data from the manager versus the client? Response: McAfee EPO 4.0 (In the process of implementing 4.6) Client VirusScan Enterprise & AntiSpyware Enterprise 8.70i. Yes, we wouldn t be opposed to pulling data from the console. Page 3 of 6

ACKNOWLEDGEMENT OF RECEIPT OF ADDENDA FORM RFP NO.: 90986 TECHNICAL PROPOSAL DUE DATE: Tuesday, January 17, 2012 at 4 PM RFP FOR: Managed Security Services NAME OF PROPOSER: ACKNOWLEDGEMENT OF RECEIPT OF ADDENDA The undersigned, hereby acknowledges the receipt of the following addenda: Addendum No. 1 dated 01/03/2012 Addendum No. 2 dated 01/04/2012 Addendum No. 3 dated 01/09/2012 Addendum No. Addendum No. dated dated As stated in the RFP documents, this form is included in our Technical Proposal. Signature Name Printed Title Page 4 of 6

Exhibit A Sr. No. Device Location # of Interfaces 1 ICC TLS Firewall ASA 5550 Adelphi 4 in use 2 ICC-DC-Replication Fw (ASA- 5510) Adelphi 4 in use Platform ASA 5550 code 8.2.1 ASA5585 code 8.2.1 3 Checkpoint FW 1 Adelphi 7 in use Nokia IP690 4 Checkpoint FW 2 Adelphi 7 in use Nokia IP690 5 ICC-PIX515E (Backup TLS to PG) Adelphi 2 in use PIX 8.0.4 6 Lab-Marroit-ASA 5510 Adelphi 5 in use 7 Lab-Marroit-IPS Adelphi 1 IPS-SSM module 6 ISP Firewall ASA 5550 Largo 3 ASA 8.2.1 7 ISP Firewall ASA 5550 (Standby) Largo 3 ASA 8.2.1 8 TLS Firewall ASA 5520 Largo 1 ASA 8.2.1 9 TLS IPS ASA 5520 Largo IPS SSM 10 IDSM ISP - 1 Largo IDSM2 11 IDSM ISP - 2 Largo IDSM2 12 Juniper SRX (Active) Largo 8 in use JUNOS [10.4R3.4] 13 Juniper SRX (Standby) Largo 8 in use JUNOS [10.4R3.4] 39 Faculty Media Lab ASA5510 Largo 3 in ise ASA 8.2.1 40 IPS for the Faculty Lab ASA Largo 1 IPS SSM 14 PIX-535 firewall PG1 2 PIX 8.0.4 16 PG-PIX-515E (backup TLS) PG1 2 PIX 8.0.4 17 ASA 5510 Dorsey 3 ASA 8.2.1 18 IPS Dorsey 1 19 PIX 515E Travis CA 1 PIX 8.0.4 20 ASA 5510 Andrews 2 ASA 8.2.1 21 IPS Andrews 1 22 ASA 5540 (active) Europe 3 ASA 8.2.1 23 ASA 5540 (standby) Europe 3 ASA 8.2.1 24 IPS - (active) Europe 1 25 IPS - (standby) Europe 1 Page 5 of 6

Exhibit A (Continued) Sr. No. Device Location # of Interfaces 26 ASA 5520 (active) Asia 3 ASA 8.2.1 27 ASA 5520 (standby) Asia 3 ASA 8.2.1 28 IPS - (active) Asia 1 29 IPS - (standby) Asia 1 30 ASA-5510 Bolling 2 ASA 8.3 31 IPS Bolling 1 32 ASA-5510 33 IPS Ft. Meade Ft. Meade Platform 2 ASA 8.3 1 34 ASA -5540- ISP(active) DR 3 ASA 8.0.4 35 ASA -5540- ISP(standby) DR 3 ASA 8.0.4 36 IPS (active) DR 1 37 IPS (standby) DR 1 38 ASA5510--REPLICATION DR 3 ASA 8.2.1 39 SSL VPN Adelphi Adelph 2 Juniper SA 4000 40 SSL VPN DR -Pair DR 2 Juniper SA 4000 Page 6 of 6