T19/03/13 REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION



Similar documents
T54/09/14 APPOINTMENT OF A PANEL OF STOCK BROKERS TO PROVIDE BROKERAGE SERVICES TO THE IDC BID CLOSING DATE: WEDNESDAY, 08 OCTOBER 2014 AT 12:00 NOON

T28/05/13. Supply and Installation of Video Conferencing Equipment to IDC CLOSING DATE: FRIDAY, 17 MAY 2013 AT 12:00 NOON

T01/01/14 REQUEST FOR PROPOSAL TO CONDUCT ANNUAL CUSTOMER SATISFACTION SURVEYS CLOSING DATE: FRIDAY, 31 JANUARY 2014 AT 12:00 NOON

T34/02/16 PROVISION OF SECURITY ALARM SYSTEM, MONITORING AND ARMED RESPONSE SERVICES TO 14 IDC REGIONAL OFFICES

T29/05/13 REQUEST FOR PROPOSAL FOR THE APPOINTMENT OF EPC CONTRACTOR FOR THE DESIGN PHASE OF THE CONSTRUCTION OF FOSKOR PLANT

Trend Micro. Advanced Security Built for the Cloud

Devising a Server Protection Strategy with Trend Micro

Comprehensive security platform for physical, virtual, and cloud servers

Devising a Server Protection Strategy with Trend Micro

Request for proposals (RFP) The supply of a computer based Library Management System for the CSIR. RFP No. 579/29/05/2015

How To Protect Your Cloud From Attack

Request for proposals (RFP) The Provision of transcription services to the CSIR for a Human Language Technology data pipeline optimisation project

FISMA / NIST REVISION 3 COMPLIANCE

Knysna Municipality is inviting quotations from suitable suppliers for the goods described below. Category Computer Software

Trend Micro Deep Security

Trend Micro deep security 9.6

Total Cloud Protection

11:00 a.m. The closing time will be as per the clock at the RAF reception

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

SUPPLIER DATABASE REGISTRATION QUESTIONNAIRE - CONSULTANTS

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Netzwerkvirtualisierung? Aber mit Sicherheit!

ADVERTISEMENT DATE 3 December 2014 Marketing & Communications RFQ NUMBER JCPZ/RFQ/MKT DATE)

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon

Appointment of a service provider to assist with the development of Analytics Capability for PAYE and VAT. RFP No.: RFP 28/2014

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES

Kindly furnish me with a written quotation for the supply of the following service: ENVIRONMENTAL IMPACT ASSESSMENT (EIA) CONSULTANCY SERVICES

VENDOR APPLICATION FORM

PROCUREMENT OF VEEAM BACKUP & REPLICATION ENTERPRISE FOR VMWARE LICENCE

Request for Proposal (RFP) Risk Management and Short Term Insurance Broking Services. RFP Number: 485/12/12/2014

INVITATION TO BID (SBD 1) BID DESCRIPTION BID DOCUMENTS ARE TO BE DEPOSITED AT:

LUKHANJI DIRECTORATE: FINANCE SUPPLY CHAIN MANAGEMENT UNIT

Virtualization Journey Stages

Supplier prequalification Document

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

INVITATION TO QUOTE ITQ REF NO: NKF/BL/2015/015 Date: 30 September 2015

EXTERNAL POLICY PROCUREMENT

Data Management Policies. Sage ERP Online

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

REQUEST FOR PROPOSALS FOR: DOCUMENT COLLECTION AND SCANNING FOR 36 MONTHS CONTRACT SCMN33 /2013

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

GFI White Paper PCI-DSS compliance and GFI Software products

CLOUD SERVICE SCHEDULE

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/ ARCHIVING

City of Richmond Business and Financial Services Department. Contract 4595P. Security Information Event Management System

SANS Top 20 Critical Controls for Effective Cyber Defense

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Next Generation Datacenters & the Realities of Virtualisation Security

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS

TENDER NUMBER: ITT/SACU/015/2015/O Information and Communication Technology (ICT) Audit IT Effectiveness Review

APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION

90 days (commencing from the RFB Closing Date) RENEWAL OF MICROSOFT LICENSES FOR THE CIDB FOR THE PERIOD OF 12 MONTHS

CLOUD SERVICE SCHEDULE Newcastle

TENDER BOX LOCATION. The Tendering System

2.1. Service Providers who do not comply with the mandatory requirements will not be considered for further evaluation.

Eskom Holdings SOC Ltd s Standard Conditions of Tender

The purpose of this database is to give all prospective suppliers an equal opportunity to submit quotations.

Cloud and Data Center Security

APPLICATION TO OPEN AN ACCOUNT COMPANY / NGO / EMBASSY / GOVERNMENT / REGISTERED ASSOCIATION

Tender # C ; Implementation of Cloud ERP solution for Oman Rail Company

Request for Proposal. Contract Management Software

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Effective End-to-End Cloud Security

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Vulnerability Management

PCI DSS 3.0 Compliance

Provision of Internet Services at NNPC Corporate Headquarters, Abuja

Request for Quotation: Hosting and Pay Per Click Campaign: Shisa Solar

REQUEST FOR QUOTATION (RFQ) Encryption Key Management Solution. Date Posted: May 27, Solicitation Number RFQ

VMware Integrated Partner Solutions for Networking and Security

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:

CITY OF LANCASTER RFP NO LANCASTER PERFORMING ARTS CENTER TICKETING SOFTWARE SUBMISSION DEADLINE. July 24, 2015 BY 11:00 A.M.

SUPPLY CHAIN MANAGEMENT POLICY

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Ovation Security Center Data Sheet

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

A Decision Maker s Guide to Securing an IT Infrastructure

Meeting the Challenges of Virtualization Security

Deep Security Vulnerability Protection Summary

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

NCRCP3262 REQUEST FOR PROPOSALS FOR THE PROVISION OF A FUNERAL INSURANCE FOR ECRDA EMPLOYEES REFERENCE NUMBER: RFP 0011


HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

Transcription:

T19/03/13 REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION CLOSING DATE: WEDNESDAY, 27 MARCH 2013 AT 12:00 NOON

Industrial Development Corporation TABLE OF CONTENTS SECTION 1: GENERAL CONDITIONS OF BID 3 1. Proprietary Information 4 2. Enquiries 4 3. Bid Validity Period 4 4. Instructions on submission of Tenders 4 5. Preparation of Bid Response 5 6. Supplier Performance Management 5 7. IDC s Rights 6 8. Undertakings by the Bidder 6 9. Reasons for disqualification 7 10. Response Format (Returnable Schedules) 8 11. Evaluation Criteria and Weightings 9 SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION 10 1. Special instructions to bidders 11 2. Background Information 11 3. Scope of Work/ Terms of Reference 11 4. Project Timelines Error! Bookmark not defined. 5. Technical Evaluation Criteria 13 SECTION 3: PRICE PROPOSAL 17 SECTION 4: ANNEXURES 20 Page 2

Industrial Development Corporation SECTION 1: GENERAL CONDITIONS OF BID Page 3

1. Proprietary Information Industrial Development Corporation of SA Ltd (IDC) considers this Tender and all related information, either written or verbal, which is provided to the respondent, to be proprietary to IDC. It shall be kept confidential by the respondent and its officers, employees, agents and representatives. The respondent shall not disclose, publish, or advertise this specification or related information to any third party without the prior written consent of IDC. 2. Enquiries All communication and attempts to solicit information of any kind relative to this Bid should be channelled to: Contact person (all technical questions should be in writing) Name: Ms Tebatso Lewele Telephone Number: +27 11 269 3543 Fax Number: +27 86 210 3543 Email address: tebatsol@idc.co.za 3. Bid Validity Period Responses to this tender received from vendors will be valid for a period of 120 days counted from the closing date of the tender. 4. Instructions on submission of Tenders 4.1 Tenders should be submitted in duplicate (2 hard copies) all bound in a sealed envelope endorsed, T19/03/13: REQUEST FOR PROPOSAL FOR THE SUPPLY, INSTALLATION, MAINTENANCE AND SUPPORT OF VIRTUALISED DATACENTER SECURITY SOLUTION and one electronic copy (on CD) in PDF format. The sealed envelope must be placed in the tender box at the Main Reception area of the IDC Building, 19 Fredman Drive Sandton by no later than 12:00 noon on Wednesday, 27 March 2013. 4.2 Tenders must be submitted in a prescribed response format herewith reflected as Response Format. 4.3 The closing date, company name and the return address must also be endorsed on the envelope. 4.4 If a courier service company is being used for delivery of the tender document, the tender description must be endorsed on the delivery note/courier packaging and the courier must ensure that documents are placed / deposited into the tender box. The IDC will not be held responsible for any delays where tender documents are handed to the IDC Receptionist. Page 4

4.5 No tender received by telegram, telex, email, facsimile or similar medium will be considered. 4.6 Where a tender document is not in the tender box at the time of the tender closing, such a tender document will be regarded as a late tender. The IDC reserves the right not to evaluate any late tender response. 4.7 Amended tenders may be sent in an envelope marked Amendment to tender and should be placed in the tender box before the closing time. 5. Preparation of Bid Response 5.1 All the documentation submitted in response to this bid must be in English. 5.2 The tenderer is responsible for all the cost that they shall incur related to the preparation and submission of the tender document. 5.3 Tenders submitted by Companies must be signed by a person or persons duly authorised thereto by a resolution of a Board of Directors, a copy of which Resolution, duly certified be submitted with the Tender. 5.4 Bidders should check the numbers of the pages to satisfy themselves that none are missing or duplicated. No liability will be accepted by IDC in regard to anything arising from the fact that pages are missing or duplicated. 5.5 A list of all references (minimum of 3) must be included in the bid response. 5.6 A valid tax clearance certificate must be included in the bid response. 5.7 A copy(s) of certificates from the organizations/ bodies that the tenderer is affiliated to must be included in the bid response. 6. Supplier Performance Management Supplier Performance Management is viewed by the IDC as critical component in ensuring value for money acquisition and good supplier relations between the IDC and all its suppliers. The successful bidder shall upon receipt of written notification of an award, be required to conclude a Service Level Agreement (SLA) with the IDC, which will form an integral part of Page 5

the supply agreement. The SLA will l serve as a tool to measure, monitor and assess the supplier s performance level and ensure effective delivery of service, quality and valueadd to IDC s business. Bidders are required to comply with the above condition, and also provide a scorecard on how their product / service offering is being measured to achieve the objectives of this condition. 7. IDC s Rights 7.1 The IDC is entitled to amend any tender conditions, validity period, specifications, or extend the closing date of tenders before the closing date. All tenderers, to whom the tender documents have been issued, will be advised in writing of such amendments in good time. 7.2 The IDC reserves the right not to accept the lowest tender or any tender in part or in whole. It normally awards the contract to the tenderer who proves to be fully capable of handling the contract and whose tender is technically acceptable and/or financially advantageous to the IDC. 7.3 The IDC reserves the right to award this tender to a purely empowerment company or may award this tender on condition that a joint venture with an empowerment company is formed. This will be added to the criteria when evaluating the tenders. 7.4 The IDC reserves the right to award this tender as a whole or in part without furnishing reasons. 7.5 IDC reserves the right at all material times to extend the scope of work relating to this tender to include all or some of the IDC s Subsidiaries. Should this be the case, as a result thereof all the relevant implications will be negotiated between the IDC and the successful tenderer. 8. Undertakings by the Bidder 8.1 The bidder hereby offer to render all or any of the services described in the attached documents to the IDC on the terms and conditions and in accordance with the specifications stipulated in this Tender documents (and which shall be taken as part of, and incorporated into, this Proposal at the prices inserted therein). 8.2 Tenders submitted by Companies must be signed by a person or persons duly authorised thereto by a resolution of a Board of Directors, a copy of which Resolution, duly certified be submitted with the Tender. Page 6

8.3 The bidder shall prepare for a possible presentation should IDC require such and the tenderer shall be notified thereof no later than 4 (four) days before the actual presentation date. 8.4 The bidder hereby agree that the offer herein shall remain binding upon him/her and receptive for acceptance by the IDC during the validity period indicated and calculated from the closing hour and date of the Tender; this Proposal and its acceptance shall be subject to the terms and conditions contained in this tender document. 8.5 The bidder furthermore confirm that he/she has satisfied himself/herself as to the correctness and validity of his/her Tender response that the price(s) and rate(s) quoted cover all the work/item(s) specified in the Tender response documents and that the price(s) and rate(s) cover all his/her obligations under a resulting contract and that he/she accept that any mistakes regarding price(s) and calculations will be at his/her risk. 8.6 The bidder hereby accept full responsibility for the proper execution and fulfilment of all obligations and conditions devolving on him/her under this agreement as the Principal(s) liable for the due fulfilment of this contract. 9. Reasons for disqualification 9.1 The IDC reserves the right to disqualify any bidder which does any one or more of the following, and such disqualification may take place without prior notice to the offending bidder, however the bidder will be notified in writing of such disqualification: 9.1.1 bidders who do not submit a valid and original Tax Clearance Certificate on the closing date and time of the bid; 9.1.2 bidders who submitted incomplete information and documentation according to the requirements of this bid document; 9.1.3 bidders who submitted information that is fraudulent, factually untrue or inaccurate information; 9.1.4 bidders who received information not available to other vendors through fraudulent means; and/or 9.1.5 bidders who do not comply with mandatory requirements as stipulated in this bid document. Page 7

10. Response Format (Returnable Schedules) Tenderers shall submit their responses in accordance with the response format specified below (each schedule must be clearly marked): 10.1 Cover Page: (the cover page must clearly indicate the tender reference number, tender description and the tenderer s name) 10.2 Schedule 1: 10.2.1 Executive Summary 10.2.2 Annexure 1 of this tender document (duly completed and signed) 10.3 Schedule 2 10.3.1 Original and Valid tax clearance certificate(s); 10.3.2 Certified copies of your CIPRO company registration documents listing all members with percentages, in case of a CC. Or latest certified copies of all share certificates in case of a company; 10.3.3 Annexure 2 of this tender document (duly completed). 10.3.4 BEE Certificate verified by a SANAS accredited verification agency or a letter from the supplier s auditor (option only for Exempted Micro Enterprises with annual turnover less than R5 million); Note: If a Consortium, Joint Venture or Subcontractor, the documents listed above (10.3.1-3) must be submitted for each Consortium/ JV member or subcontractor. 10.4 Schedule 3: Response to Section 2 of this document 10.5 Schedule 4: Price Proposal (response to Section 3 of this bid document) (Must be submitted in a separate envelope) Page 8

11. Evaluation Criteria and Weightings Tenders shall be evaluated in terms of the following parameters: 11.1 Technical Bids will be evaluated in accordance with the following technical criteria: 11.1.1 Mandatory Requirements All bid responses that do not meet technical mandatory requirements may be disqualified and may not be considered for further evaluation on the Non- Mandatory technical. 11.2 Preference Point System All tenders that will achieve the minimum qualifying score (acceptable bids) will be evaluated further in terms of the preference point system as follows: CRITERIA POINTS Price 80 BEE 20 TOTAL 100 points. Page 9

Industrial Development Corporation SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION Page 10

SECTION 2: TECHNICAL REQUIREMENTS SPECIFICATION 1. Special instructions to bidders 1.1 Bidders shall provide full and accurate answers to the questions posed in this document, and, where required explicitly state either Comply/Not Comply regarding compliance with the requirements. Bidders must substantiate their response to all questions, including full details on how their proposal/solution will address specific functional/ technical requirements, failure to substantiate may lead to the bidder being disqualified. All documents as indicated must be supplied as part of the bid response. Failure to comply with Mandatory Requirements may lead to the bidder being disqualified. 2. Background Information Enterprises are increasingly online and data-centric, connecting partners, personnel, suppliers, or customers with applications that face a growing danger of cyber-attacks. These targeted threats are greater and more sophisticated than ever before, and data security compliance requirements become more stringent every day. The IDC needs uncompromising security that will enable the company to modernize the datacenter with virtualization and cloud computing without reducing performance. The solution must provide advanced security for physical, virtual, and cloud servers and virtual desktops. Whether implemented as software, virtual appliance, or in a hybrid approach, this solution should minimize overhead and streamline management but provides strong agentless security for virtual machines. The solution must also address a wide range of compliance requirements, including seven major PCI compliance requirements with multiple protection modules in one consolidated solution. 3. Scope of Work The scope of work includes: 3.1 Solution The bidder must provide the IDC with advanced protection for systems in the datacenter from virtual desktops to physicals, virtual or cloud servers. The solution must combine intrusion detection and prevention, firewall, integrity monitoring, log inspection, and agentless anti-malware capabilities to help prevent data breaches and ensure business continuity. This dynamic, centrally managed solution should also supports compliance with important standards and regulations such as PCI, FISMA, and HIPAA 3.2 Support Repair of faults and configuration problems Minimum response time of 60 minutes to a logged call and a maximum of 4 hours to repair Weekly health check of deployed solution Page 11

3.3 Maintenance Providing the IDC with pro-active information regarding new releases, software versions, patches and end-of-life announcements, including recommendations about whether and when the IDC should upgrade A single configuration check and report per annum A single software version check and report per annum Monthly check and report on possible necessary patches Upgrade of software, firmware and loading of patches as and when necessary 3.4 Growth Integrate or re-design additional sites, as the IDC grows Advise on new technologies, functionalities and best practices Buying of additional hardware and Licenses as and when required 4. Current Infrastructure and Hardware list The IDC has a new greenfield Active Directory (new forest) services solution that is based on Windows 2008 R2 to enable and support its Sandton head office and regional offices which are currently located in Durban, East London, Cape Town, Kimberley, Rustenburg, Polokwane, Bloemfontein, Pietermaritzburg, Port Elizabeth, Brits, Nelspruit and Upington. The IDC has also virtualized all production, high availability and disaster recovery server environments on VMware 5.0.0 and is in the planning phase of upgrading to version 5.1. The IDC s production and high availability server sites at Sandton head office, are within close proximity in separate buildings linked with fiber. Both sites are equipped with an HP EVA 8400, one for production and the other for replication, snap shots, snap clones and disk base backups of all business critical data. Business Copy is currently been used to replicate production data to the high availability HP EVA 8400. All business critical servers have dual connectivity to network and storage. The current backup software and library is HP Data Protector, Veeam and Quantum s ADIC i2000 Tape Library respectively. The high availability server site has virtualized servers through which duplicates all business critical application servers from the production server site. The IDC have standardized on Hewlett Packard (HP) server hardware. Currently there are about 130 virtualized servers (VMware), which run on C-class blades. All but two regional servers run on Microsoft Server 2008 R2 operating system and Microsoft SQL 2005/2008R2 (where applicable). The other two regional servers run Windows Server 2003 The new Windows 2008 directory services solution is running Windows 2008 R2. The IDC has also deployed Microsoft System Centre Configuration and System Center Operations Manager in the new greenfield Active Directory infrastructure. Page 12

5. Technical Evaluation Criteria 5.1 Mandatory Technical Requirements 5.1.1 Deployment and Integration Integration with vshield Endpoint and VMsafe APIs as well as VMware vcenter that will enable rapid deployment on ESX servers as a virtual appliance to immediately and transparently protect vsphere virtual machines. Detailed, server-level security events must be provided to a SIEM system, including ArcSight, Intellitactics, NetIQ, RSA Envision, Q1Labs, Loglogic, and other systems through multiple integration options. Directory integration with enterprise-scale directories, including Microsoft Active Directory. Comply: Yes/No Comply: How (Substantiate/Comments) 5.1.2 The solution must cover the following security postures/modules The solution must have agent less Malware Protection for VMware Environments. Optimizes security operations to avoid security brown-outs commonly seen in full system scans and pattern updates Tamper-proofs security from sophisticated attacks by isolating malware from antimalware Deep Packet Inspection; Examines all incoming and outgoing traffic for protocol deviations, policy violations, or content that signals an attack Operates in detection or prevention mode to protect operating systems and enterprise application vulnerabilities Provides automatic notification that outlines who attacked, when they attacked, and what they attempted to exploit Intrusion Detection and Prevention; Protects against known and zero-day attacks by shielding known vulnerabilities from unlimited exploits. Automatically shields newly discovered vulnerabilities within hours, pushing protection to thousands of servers in minutes without a system reboot. Includes out-of-the-box vulnerability protection for over 100 applications, including database, web, email, and FTP servers. Comply: Yes/No Comply: How (Substantiate/Comments) Page 13

5.1.2 The solution must cover the following security postures/modules Web Application Protection; Assists compliance (PCI DSS 6.6) to protect web applications and the data they process. Defends against SQL injection, crosssite scripting, and other web application vulnerabilities. Shields against vulnerabilities until code fixes can be completed. Application Control; Provides increased visibility into, or control over applications accessing the network Uses application control rules to identify malicious software accessing the network Reduces vulnerability exposure of servers Comply: Yes/No Comply: How (Substantiate/Comments) Bidirectional Stateful Firewall; Decreases the attack surface of physical, cloud, and virtual servers with fine-grained filtering, design policies per network, and location awareness for all IP-based protocols and frame types. Centrally manages server firewall policy, including templates for common server types. Prevents denial of service attacks and detects reconnaissance scans. Integrity Monitoring: Monitors critical operating system and application files, such as directories, registry keys, and values, to detect malicious and unexpected changes. Detects modifications to existing file systems and new file creations and reports them in real time. Enables on-demand, scheduled, or real-time detection; checks file properties (PCI 10.5.5); and monitors specific directories. Page 14

5.1.2 The solution must cover the following security postures/modules Log Inspection; Collects and analyses operating system and application logs for suspicious behaviour, security events, and administrative events across your datacenter. Assists compliance (PCI DSS 10.6) to optimise the identification of important security events buried in multiple log entries. Forwards events to SIEM system or centralised logging server for correlation, reporting and archiving. Current Product: Briefly describe the capabilities and functionality of the current version of your proposed product, and identify features that were new with this release. Comply: Yes/No Comply: How (Substantiate/Comments) The management console should run on a Microsoft Server. Performance overheads; What is the impact on the RAM, CPU utilization and the file space needed. Agent based monitoring Network based monitoring How does your proposed solution architecture scale to support large centralized or distributed environments? Differentiation: Briefly describe the reasons why your offering is a leader in the market (list three to five unique, quantifiable and succinct points). Does your product do continuously Monitor for File Integrity changes in Operating Systems such as Windows Server 2000/2003/2008/, AIX, HPUX, Solaris, Linux etc. Monitor Changes on Active Directory activities such as: User creation/deletion/disabling/modification Groups Deletion/creation/Modification i.e. New members added - Active Directory Group Domain policy and Group Security Policy Changes -Organization Units deletion/creation/modification. Does your product have the ability to monitor file and folder integrity changes at a granular level, e.g. Report on File permission and ownership changes but Auto-promote file content changes. Does your product have the ability Monitor Data Integrity changes on major Database software s such as Oracle, Microsoft SQLManage Database Changes: The ability for your solution to captures all changes to database users, schemas, stored procedures, triggers and critical operational data. Notify respective teams of unauthorized changes on the systems through sending alerts and periodic Reports as well as online web based reports. Provide support for custom and scheduled reporting Page 15

5.1.2 The solution must cover the following security postures/modules Facilitate Change Management Process through creation of change windows and creation of reports showing changes that have occurred inside/outside of change windows. Ability to perform Rollback on Changes that occurred thus restoring the file to the original state before the change was done. For all changes in the virtual environment, can the following information be provided on the Reports: What changed -Change Nature i.e. Deletion, modification etc. -Who did the change - Timestamp What time did the change occur. Integration with other monitoring systems such as antivirus, filters, network monitors to give a consolidated position for ease of management. Assess IT system configurations against a wide range of policy and standards i.e. PCI DSS and ISO 27001 etc.. Detect changes to configuration states in real time, including changes that occur at the server, database, directory server, and network device level. Ability to capture unauthorized or new software installations in the IT environment installed. Ability to perform Change impact analysis before changes are approved. System should enable trend analysis. Capability to integrate with ticketing system and leading CMDB solutions in the market. Can the solution support role-based access control for the following roles: Administrator Read-only user Normal user Can the solution combine log Management and event data with real-time change data to immediately reveal events of interest that impact policy or threaten security. Comply: Yes/No Comply: How (Substantiate/Comments) 5.1.3 Product Road Map Future Product Road Map: Briefly describe plans for future proposed product and service enhancements, including the capabilities and functionality of the next planned releases or versions, the timetable for those capabilities, major upgrades and sunset considerations. Provide Seamless or single console integration with event management solutions. Ability to distinguish between high- and low-risk changes. Identify transient violations; if a file is changed inappropriately and then changed back, it should be able to create a transient compliance violation. Comply: Yes/No Comply: How (Substantiate/Comments) Page 16

SECTION 3: PRICE PROPOSAL Page 17

SECTION 3: Cost Proposal 1 Please indicate your total bid price here: R (compulsory) 2 NOTE: All prices must be VAT exclusive and must be quoted in South African Rand (ZAR). 3 Are the rates quoted firm for the full period of the contract? YES NO Important: If not firm for the full period, provide details of the basis on which adjustments shall be applied e.g. CPI, and also details of the cost breakdown. 4 The bidder must indicate CLEARLY which portion of the bid price is linked to the exchange rate. Substantiate / Comments Comply Not Comply 5 All additional costs must be clearly specified and included in the total bid price. Comply Not Comply Substantiate / Comments 6 Payments will be linked to the specified deliverables after such deliverables have been approved by the IDC. Substantiate / Comments Comply Not Comply 7. COSTING MODEL 7.1 SOFTWARE Cost Element Virtualised Datacenter Security Solution Cost (VAT Excl.) Year 1 Maintenance and Support Year 2 Year 3 Sub-Total (A) (VAT Excl.) 7.2 SERVICES Activity/ Deliverable Resource(s) Rate/Hour per resource Number of hours Cost (VAT Excl.) Installation Training of 4 administrators Other Costs (if applicable) Sub-Total (B) (VAT Excl.) Note: Other Costs must be clearly defined here. TOTAL BID PRICE (A+B) (VAT EXCL.) Page 18

Price Declaration Form Dear Sir, Having read through and examined the Request For Proposal (RFP) Document, RFP no. T19/03/13 the General Conditions, The Requirement and all other Annexures to the RFP Document, we offer to supply, install, maintain and support a Virtualised Datacenter Security Solution, as detailed in the RFQ document for a period of one (1) year including escalation Fees: R... (Excluding VAT) In words R...(Excluding VAT) We confirm that this price covers all activities associated with the project management and consulting service, as called for in the Tender document. We confirm that IDC will incur no additional costs whatsoever over and above this amount in connection with the provision of this service. We undertake to hold this offer open for acceptance for a period of 120 days from the date of submission of offers. We further undertake that upon final acceptance of our offer, we will commence with the provision of service when required to do so by the IDC. We understand that you are not bound to accept the lowest or any offer and that we must bear all costs which we have incurred in connection with preparing and submitting this tender. We hereby undertake for the period during which this tender remains open for acceptance not to divulge to any persons, other than the persons to which the tender is submitted, any information relating to the submission of this tender or the details therein except where such is necessary for the submission of this tender. SIGNED DATE (Print name of signatory) Designation FOR AND ON BEHALF OF: COMPANY NAME Tel No Fax No Cell No Page 19

SECTION 4: ANNEXURES Page 20

Industrial Development Corporation Annexure 1 Acceptance of Bid Conditions And Bidder s Details Request for Proposal No: Name of Bidder: Authorised signatory: Name of Authorised Signatory Position of Authorised Signatory By signing above the bidder hereby accept full responsibility for the proper execution and fulfilment of all obligations and conditions devolving on him/her under this agreement as the Principal(s) liable for the due fulfilment of this contract. [Note to the Bidder: The Bidder must complete all relevant information set out below.] BIDDING STRUCTURE Indicate the type of Bidding Structure by marking with an X : Individual Bidder Joint Venture/ Consortium Sub Contractors Other REQUIRED INFORMATION If Individual Bidder: Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number Email address Postal Address Physical Address Page 21

If Joint Venture or Consortium, indicate the following for each partner: Partner 1 Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number Email address Postal Address Physical Address Partner 2 Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number Email address Postal Address Physical Address Page 22

If using sub-contractors, indicate the following: Prime Contractor Name of Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number Email address Postal Address Physical Address Sub contractors Name of Company Company Registration Number Vat registration Number Contact Person Telephone Number Fax Number Email address Postal Address Physical Address Page 23

- 24 - Annexure 2 - Supply chain management practices questionnaire Request for Proposal No: Name of Respondent: Authorised signatory: [Note to the Respondent: the Respondent must complete the information set out below. If the Respondent requires more space than is provided below it must prepare a document in substantially the same format setting out all the information referred to below and return it with Returnable Schedule 2.] The Respondent must complete the following questionnaire. Respondent's past supply chain management practices: Item Question Yes No 3.1 Is the Respondent or any of its directors listed on the South African National Treasury s database as companies or persons prohibited from doing business with the public sector? (Companies or persons who are listed on this database were informed in writing of this restriction by the South African National Treasury after the audi alteram partem rule was applied). Yes No If so, provide particulars: 3.2 Is the Respondent or any of its directors listed on the Register for Tender Defaulters in terms of section 29 of the Prevention and Combating of Corrupt Activities Act No 12 of 2004? To access this Register enter the National Treasury s website, www.treasury.gov.za, click on the icon Register for Tender Defaulters or submit your written request for a hard copy of the Register to facsimile number +27123265445. Yes No If so, provide particulars: 3.3 Was the Respondent or any of its directors convicted by a court of law (including a court outside of the Republic of South Africa) for fraud or corruption during the past five years? Yes No

- 25 - Item Question Yes No If so, provide particulars: 3.4 Was any contract between the Respondent and any organ of state (within the Republic of South Africa or within any foreign territory) terminated during the past five years on account of failure to perform on or comply with the contract? Yes No If so, provide particulars: Page 25