Corrigendum regarding Tender Document for providing three year licenses, installation, configuration, deployment,
|
|
- Julian Greene
- 5 years ago
- Views:
Transcription
1 National Bank for Agriculture and Rural Development, Department of Information Technology, 5th Floor, C Wing, Plot No C-24, G Block, Bandra-Kurla Complex, Bandra (East), Mumbai Corrigendum to Tender Document for providing three year licenses, installation, configuration, deployment, Tender No NBDIT/ 84 / DIT-011-1/ dated 05 th May 2017 Pre-Bid Meeting held on 11 th May 2017 Page Existing mentioned in RFP 1 Can bidder be exempted from payment of EMD and Tender Fee? 2 Additional clause requested - The Bidder may terminate this Agreement upon written notice to NABARD, if NABARD commits a default or material breach under this Agreement and does not remedy the default or material breach within 30 days of notice from the Bidder 3 Additional clause requested - The total liability of the selected bidder shall not exceed the total cost of the order value Neither party shall be liable for indirect and consequential damages under this RFP 4 Request to extend the RFP last date by 15 days as the RFP is of large magnitude this needs No While finalizing the contents of the agreement, suitable clause will be incorporated Request not accepted Request not accepted Page 1 of 13
2 Page Existing mentioned in RFP working and discussion with multiple team & OEM 5 We Request the bank to provide the Address of Locations of installation which will also be required for Billing If the Multi- State billing is required, kindly provide the GSTNID of those state/union Territory 6 Presently single antivirus is running in the organisation or Multiple antivirus? Presently which antivirus is running? 7 Will the Bank Provide necessary Hardware and Operating system, networking for hosting? 8 Pre-Qualifying Criterion in 21 (1) in PART II (Eligibility 9 Documents to be submitted in 21 (1) in PART II (Eligibility 10 Pre-Qualifying Criterion in 21 (3) in PART 28 The bidder should be registered as a company in India as per Company Act Copy of the Certificate of Incorporation issued by Registrar of Companies and full address of the registered office 28 The bidder should have made operating profit of at least Five Lakhs in each of Can a Partnership Firm participate in this Tender? What documentary proof to be submitted by Partnership Firm? Modification Requested: "The bidder should have made It is clarified that Multi-State billing is not required The information cannot be shared Yes The bidder should be registered as a company in India as per Companies Act or the bidder should be a registered Partnership Firm Registered Company has to submit Copies of the Certificate of Incorporation issued by Registrar of Companies and Articles of Association and Memorandum of Association and full address of the registered office Registered Partnership Firm has to submit copies of Partnership Deed and Proof of Registration of Partnership Firm and full address of the registered office Request not accepted Page 2 of 13
3 Page Existing mentioned in RFP II (Eligibility 11 Pre-Qualifying Criterion in 21 (4) in PART II (Eligibility 12 Documents to be submitted in 21 (4) in PART II the last three financial years ( , and ) 28 The Bidder should have supplied, implemented and maintained Centralized Antivirus Solution with 5000 licenses in at least one Govt organization (or Public Sector Bank) in India, for minimum period of 1 year within last 5 years operating profit of average Three Lakhs in the last three financial years ( , and )" OR We request you to change the years to ( , and )" and with provisional balance sheet certified by Chartered accounts to be considered i Request you to modify this point by mentioning it as "Offered Centralized Antivirus Solution Product should have been successfully running with 5000 licenses in at least one Govt or private organization (or any Bank) in India with sales and support from bidder, for minimum period of 1 year within last 5 years" ii Request you to modify this point - The Bidder/OEM should have supplied, implemented and maintained Centralized Antivirus Solution with 5000 licenses in at least one Govt organization (or Public Sector Bank) in India, for minimum period of 1 year within last 5 years 28 Whether the documents to be submitted for Client Eligibility should require Copy of Client Certification for successful The Bidder should have supplied, implemented and maintained Centralized Antivirus Solution with 5000 licenses in at least one Government organization / Central Public Sector Undertaking / Public Sector Financial Institution / Public Sector Insurance Company / Scheduled Commercial Bank in India, for minimum period of 1 year within last 5 years It is clarified that Certificate of successful completion and maintenance issued by Client is sufficient Page 3 of 13
4 Page Existing mentioned in RFP (Eligibility 13 Pre-Qualifying Criterion in 21 (5) in PART II (Eligibility 14 Documents to be submitted in 21 (5) in PART II (Eligibility 15 Pre-Qualifying Criterion in 21 (9) in PART II (Eligibility in Part IV 29 Offered Centralized Antivirus Solution Product should have been successfully running with 5000 licenses in at least one Govt organization (or any Bank) in India with sales and support from bidder, for minimum period of 1 year within last 5 years completion and maintenance with name and contact details of signatory - both from OEM / Vendor or either? Request you to modify this point by mentioning it as "centralised security solution for endpoint or AntiSpam or Mobile antimalware" rather than "centralised anti-virus solution" OR it should be "Offered Centralized Antivirus Solution Product should have been successfully running with 5000 licenses in at least one Govt or private organization (or any Bank) in India with sales and support from bidder, for minimum period of 1 year within last 5 years 29 Whether the documents to be submitted for Client Eligibility should require Copy of Client Certification for successful completion and maintenance with name and contact details of signatory - both from OEM / Vendor or either? 29 The Antivirus solution product offered should be part of Leader s quadrant in the latest Gartner Magic Quadrant for Endpoint Protection Platforms Report Although Bank desires antivirus solution for 4300 desktops / laptops, however, the actual number of installations may vary, We request you to relax this condition as it is not a regulatory requirement in India What will be the deviations in number and how it should be factored? Offered Centralized Antivirus Solution Product should have been successfully running with 5000 licenses in at least one Government organization / Central Public Sector Undertaking / Public Sector Financial Institution / Public Sector Insurance Company / Scheduled Commercial Bank in India with sales and support from bidder, for minimum period of 1 year within last 5 years It is clarified that Certificate of successful completion and maintenance issued by Client is sufficient Request not accepted Deviation may be up to 1-2% of total number of installations within a period of three years Page 4 of 13
5 Page Existing mentioned in RFP Point - 5 in 77 at the sole discretion of the bank within the period of 3 years Sub- (l) in Part IV Point - 9 in (Sub-Point l) in Part IV Point 12 in (Technical in Part IV Point 14 in l) Should support wireless devices such as Palm, Pocket PC, and EPOC at no extra cost Successful Bidder shall be responsible for supply/ upgrade of latest Antivirus Enterprise Edition Security Suite for all versions of Windows OS covering Antivirus, Desktop Firewall, Intrusion Prevention System, Device control, Application control, Web protection, External media control, Host Integrity, Integrated repair, detection and removal tool for Malware, Antispyware, Antispam, Adware, Trojan/Worms, etc All the tools / applications should be from single manufacturer s product This should be deployed in the desktops as a single client software The bidder shall provide an active response to all virus related incidents that happen within the Bank and may have to visit the sites at own expense if the problem is not resolved centrally Kindly clarify regarding wireless device type and model nos for palm, pocket PC or EPOC devices Vulnerability Protection and Application Control may Need Separate Client Requesting to modify this point where the endpoint security solution can be achieved by same manufacturer product but through different agents Does technical support cost on request (Call) basis includes for problems which not solve centrally? The line referred here in Sub- l) is modified as : l) Should support Operating System (OS) of portable wireless devices such as OS of PDA, tablet OS, mobile phone OS including android, ios, mobile OS built on linux, Windows mobile OS, etc Successful Bidder shall be responsible for supply/ upgrade of latest Antivirus Enterprise Edition Security Suite for all versions of Windows OS covering Antivirus, Desktop Firewall, Intrusion Prevention System, Device control, Application control, Web protection, External media control, Host Integrity, Integrated repair, detection and removal tool for Malware, Antispyware, Anti-spam, Adware, Trojan/Worms, etc All the tools / applications should be from single manufacturer s product This should be provided by one manufacturer and may be deployed in the desktops as client software manageable from Management Server(s) Console The bidder shall provide an active response to all virus related incidents that happen within the Bank and may have to visit the sites at own expense if the problem is not resolved centrally The Bidder has to provide one consolidated Cost for Support Page 5 of 13
6 Page Existing mentioned in RFP (Technical in Part IV Point - 17 in All the above points are applicable in respect of all branches / offices of the Bank throughout the country Required location details of Bank s RO, TE offices / Branches and Connectivity details of all users in Table B in Annexure J NABARD has Active Directory infrastructure and it is expected that the successful bidder (vendor) will resolve the problems in NABARD Offices from Head Office(HO) site by using Management Server or remote connection (to computer in Regional Office / Training Establishment) It is clarified that providing location details is not necessary as Antivirus will be deployed centrally through WAN and Active Directory in Part IV Point - 18 in The solution would be managed centrally using a web-based console that allows system monitoring, software updates, client configuration, and event reporting The central site administrator should have the ability to manage the software at all levels of the network and have the ability to remotely deploy product updates and modifications to all users The solution should support plug-in modules designed to add new security features without having to redeploy the entire solution, thereby reducing effort and time needed to deploy new security capabilities to clients and servers across the network It should be possible to install all features (antivirus, antispyware, Enterprise Client Firewall and damage clean-up) at the same time via client deployment methods and to Apart from Web Based console, we request you to consider MMC (Microsoft Managed Console) as well MMC's biggest advantage is, is it independent of any protocol and browsers and works as an application lowering down the risk of browser based attacks Request you to reframe it as "Web Based Console / MMC" The solution would be managed centrally using a web-based console / MMC (Microsoft Management Console) that allows system monitoring, software updates, client configuration, and event reporting The central site administrator should have the ability to manage the software at all levels of the network and have the ability to remotely deploy product updates and modifications to all users The solution should support plug-in modules designed to add new security features without having to redeploy the entire solution, thereby reducing effort and time needed to deploy new security capabilities to clients and servers across the network It should be possible to install all features (antivirus, anti-spyware, Enterprise Client Firewall and damage clean-up) at the same time via client deployment methods and to Page 6 of 13
7 Page Existing mentioned in RFP manage centrally via the web-based management console manage centrally via the web-based management console / MMC in Part IV Point 20 in ( Technical in Part IV Point 21 in ( Technical in Part IV Point 23 in The solution should provide customized web based reports for easy interpretation The central site management system must be capable of providing a daily report of found viruses, including locations and a report of incomplete or failed nodes updates for each location These reports must be accessible by the network administrator at the Central Server The solution should provide a secure Web-based management console to give administrators transparent access to all clients and servers on the network It should provide customized web based reports for easy interpretation It should also provide reports, that reflecting, the patch has been deployed It should offer centrally managed Client Firewall and IDS and should also have virtual patching and it should be an automated process Need clarification on "Web Based Reports" Would request to specify types of reports and reframe it as "Customized reports for easy interpretation" Need Clarification on the daily reports based on location The same can be achieved using Group based reporting where in every group would indicate a location to which a system belongs Please correct our understanding Need clarification on "Web Based Reports" Would request to specify types of reports and reframe it as "Customized reports for easy interpretation" Request to make Virtual Patching Generic and to reframe it as " and should also have Exploit prevention to prevent any attacks for any type of unpatched systems" The solution should provide customized reports for easy interpretation It is clarified that the requirement in this regard is unambiguous The solution should provide a secure Webbased management console/mmc to give administrators transparent access to all clients and servers on the network It should provide customized reports for easy interpretation It should also provide reports, reflecting, the patch has been deployed It should offer centrally managed Client Firewall and IDS The solution should offer virtual patching or mitigate vulnerabilities for any type of unpatched systems and it should be an automated process The Solution should preferably support scanning on Client Computer for the purpose of discovering and protecting Page 7 of 13
8 Page Existing mentioned in RFP the existing vulnerabilities on the computer in Part IV Point 24 in in Part IV The solution should update a particular PC in a ROs/TEs office from Central server All other PCs in the respective branch / office will get updates from that particular PC not from central server One Computer will work as update agent/repository of the centralized server at the ROs/TEs level This computer will get updates from the centralized server at off-working hours All other computers installed at respective ROs/TEs offices will get updates from the agent/repository computer automatically in a scheduled time or as and when required through Local Area Network (LAN) Solution should have facility to update patches on scheduler basis & zone basis The Client machine acting as update agent, thereby, delivering pattern updates to rest of the machines in the LAN, should have the capability to upgrade program upgrades also and no separate web server should be required The antivirus Server should have the capability to assign a client the privilege to act as an update agent for rest of the agents in the network The Management Server should be able to block access to Network in endpoint where host integrity is compromised without requiring any additional client Need Clarification "patch updatation is a different solution altogether, request you not to add it into an End Point solution Need Clarification on Host Integrity Check parameter The Solution should be able to configure one Computer to work as update agent/repository of the centralized server at the ROs/TEs level This computer will get updates from the centralized server at scheduled hours All other computers installed at respective ROs/TEs offices will get updates from the agent/repository computer automatically in a scheduled time or as and when required through Local Area Network (LAN) Solution should have facility to provide update on scheduler basis & zone basis The Client machine acting as update agent, thereby, delivering pattern updates to rest of the machines in the LAN, should have the capability to upgrade program upgrades also and no separate web server should be required The antivirus Server should have the capability to assign a client the privilege to act as an update agent for rest of the agents in the network It is clarified that Vendor is required to indicate availability of feature in Technical Compliance Sheet (Annexure - H) Page 8 of 13
9 Page Existing mentioned in RFP Point 32 in in Part IV Point-34 in in Part IV Point 35 in in Part IV Point - 38 in in Part IV deployment, management or administration The scan engine of the protection software must employ smart scanning that provides scanning of only those s which may contain viruses When a virus is detected in or attachments, the software must have the ability to automatically send notification to the sender, recipient(s) and network administrator Notification must include date and time of infection, location of server infected, infected file name, action taken on the infected file and recipient being infected The solution should provide the ability to remove virus and other malicious codes from desktops as well as repair of damage of the computer It should have the facility of quarantine of virus affected file system The Proposed Solution should support Backup and restore of Ransomware-encrypted files The antivirus Management server should have role based administration with Active Directory integration It should offer features to create custom role type Request to make the Term Smart Scanning generic Request you to modify this point by removing " and attachment" and the related sub point ie " sender and recipient" Backup and restore is not the solution to prevent ransomware attacks Request you to reframe it to "Providing anti-ransomware protection and prevention against exploits" Note - Anti Ransomware should work on behaviour analysis and should not dependent on the file backup - restore methodology Need Clarification: Does location awareness means different policies for same set of users when in the office and outside office? The scan engine of the protection software must have feature to provide smart / agile scanning of only those s which may contain viruses When a virus is detected, the software must have the ability to send notification to the user and network administrator Notification must include date and time of infection, location of computer infected, infected file name, action taken on the infected file and recipient being infected The solution should provide the ability to remove virus and other malicious codes from desktops as well as repair of damage of the computer It should have the facility of quarantine of virus affected file system The Proposed Solution should have feature to recover files damaged or encrypted by Ransomware Request not acceded, original requirement to be fulfilled Page 9 of 13
10 Page Existing mentioned in RFP Point -43 in in Part IV Point -51 in in Part IV Point - 54 in 81 and to add uses to a predefined role or to a custom role The antivirus Management server should support grouping of clients into domains for easier administration The antivirus Management server should provide Policy action based on location awareness and should allow establishing separate configuration for internally versus externally located machines The Security Compliance feature in Solution may leverage Microsoft Active Directory services to determine the security status of the computers in the network The solution should be able to do the following: a) Terminating all known virus processes, exploit content and threats in memory b) Repairing the registry c) Deleting any drop files created by viruses d) Removing any Microsoft Windows services created by viruses e) Restoring all files damaged by viruses f) Includes Clean-up for Spyware, Adware etc The antivirus solution should have CPU usage performance control during scanning It should Check the CPU usage level configured on the Web console and the actual CPU consumption on the computer and should adjust the scanning speed if: Security being a prime concern, should be strict for the users irrespective of the users being inside or outside the network Request you to make it Generic and dilute location awareness point Terminating all the processes might not be possible if the infections is using system process thread Moreover, AV generally isolates the infected details into quarantine which can be deleted and cleaned as and when required Request you to reframe it as "The solution should be able to block any sort of virus/malware/etc in its early stage before infecting the system" Request you to make it generic Request not accepted, original requirement to be fulfilled The antivirus solution may provide feature of System Utilization levels/ System Performance levels/ Resource Utilization levels/ Resource Performance levels (eg, Low, Below Normal, Medium, Normal level) during scheduled scans on the Client End-Point and this level should be Page 10 of 13
11 Page Existing mentioned in RFP The CPU usage level is Medium or Low Actual CPU consumption exceeds a certain threshold configurable from the Management Server console in Part IV Point - 55 in in Part IV Point - 56 in The antivirus solution should provide Outbreak Prevention to limit/deny access to specific shared folders, block ports, and deny write access to specified files and folders on selected clients in case there is an outbreak The antivirus solution should have a manual outbreak prevention feature that allows administrators to configure port blocking, block shared folder, and deny writes to files and folders manually The solution should maintain Integrity of endpoints to ensure endpoints are protected and compliant by enforcing policies, detecting unauthorized changes, and conducting damage assessments with the ability to isolate a managed system that does not meet requirements The antivirus solution should safeguard endpoint mail boxes by scanning incoming POP3 and Outlook folders for Threats Requesting to modify this point by "limit / deny access to shared folders" and to include "deny access to excutable compress file and mutex exclusion handling on malware process" The point refers to the requirement of Security The feature has got dependencies on the connectivity, Protocol used and various parameters security is full flegedly a part of Security solutions and should not be clubbed with the AV More ever Nabard should already be using gateway for providing security Request you to make The antivirus solution should provide Outbreak Prevention to block specific ports, deny write access to specified files and folders and deny access to executable compress file on selected clients in case there is an outbreak The antivirus solution should have a manual outbreak prevention feature that allows administrators to configure port blocking, block shared folder, and deny writes to files and folders manually The solution should maintain Integrity of endpoints to ensure endpoints are protected and compliant by enforcing policies, detecting unauthorized changes, and conducting damage assessments with the ability to isolate a managed system that does not meet requirements Request not accepted Page 11 of 13
12 Page Existing mentioned in RFP security optional or availability as a dedicated solution in Part IV Point - 57 in The antivirus solution should be able to manage both SaaS (Software as a Service) and on premise solution from the single management console Request you to make it generic The existing clause is generic, however, for clarity, it is clarified as under: The antivirus solution should be able to manage both On-premise and cloud users (users who are not regularly connected to Office WAN and are required to update antivirus through the Internet) console from Single Management Console The successful bidder/vendor shall, at his own expense, deposit with the Chief General Manager, Department of Information Technology, NABARD, Mumbai, within 15 days from the date of Purchase Order, an unconditional and irrevocable Performance Bank Guarantee, in format as per Annexure A, issued by any scheduled commercial bank equal to 10% of the order value valid for 42 months (36 Months+6 Months Claim Period) from the date of purchase order 37 Sub- 8 (Fall ) in Pre-Contract Integrity Pact ( Annexure-K) 81 The BIDDER undertakes that it has not supplied/s not supplying similar product/systems or sub systems at a price lower than that offered in the present bid in respect of any other Ministry/Department of the Government of India or PSU and it is found at any stage that similar product/systems or sub systems was supplied by the BIDDER to any other Ministry/Department of the Request to change - If the contract is awarded, the Vendor shall furnish a Performance Bank Guarantee in the format as required by NABARD to the extent of 10% of the value of the contract within 15 days from the date of from the date of acceptance of the purchase contract/ Work Order We request that this clause be deleted in its entirety as the pricing of the Bidder for similar products is based on several factors such as RFP terms, volume commitments and such other requirements, which may differ from Client to Client, and therefore it may not be possible to match the pricing between different clients Request not accepted Pre-Contract Integrity Pact has to be as per the format prescribed by Government of India No dilutions / modifications are allowed Page 12 of 13
13 Page Existing mentioned in RFP Government of India or a PSU at a lower price, then that very price, with due allowance for elapsed time, will be applicable to the present case and the difference in the cost would be refunded by the BIDDER to the BUYER, if the contract has already been concluded Clarification / Part Page Clarification Table B in Annexure J 88 The Bidder has to provide one total consolidated Cost for Support in Table B in Annexure J No breakup of Support Cost, apart from Tax Breakup, is required If the bidder mentions per call charges, the bid will be invalid Page 13 of 13
Annexure E Technical Bid Format
Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security
More informationNo. 10(02)/2016-NICSI
No. 10(02)/2016-NICSI NATIONAL INFORMATICS CENTRE SERVICES INC. (NICSI) (A Government of India Enterprise under NIC) Ministry of Electronics & Information Technology Hall No. 2 & 3, 6 th Floor, NBCC Tower
More informationTENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS LICENSES FOR USE AT NIT, KARACHI
1 TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS LICENSES FOR USE AT NIT, KARACHI 2 NATIONAL INVESTMENT TRUST LIMITED TABLE OF CONTENTS PAGE No 1. INTRODUCTION 3 2 SCOPE OF WORK 3 3 INFORMATION FOR
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationADMINISTRATION DEPARTMENT TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS TOTAL SECURITTY FOR BUSINESS LICENSES FOR USE AT NIT KARACHI
1 ADMINISTRATION DEPARTMENT Admn. 24(42-C)/03/2018 Date: December 21, 2018 TENDER FOR RENEWAL OF EXISTING KASPERSKY ANTIVIRUS TOTAL SECURITTY FOR BUSINESS LICENSES FOR USE AT NIT KARACHI National Investment
More informationDENA BANK INFORMATION TECHNOLOGY DEPARTMENT, HO, MUMBAI.
Replies to Queries during the Pre-bid meeting held on 12 th May, 2015 for Tender Managed Security Services [Tender Ref: HO/ITD/206/2015 Dated 06/05/2015]. Sr. No. RFP Reference No. Query Clarification/
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationManaged Service Proposal
Managed Service Proposal We offer a unique approach to how your network will be managed. With our complete offering, we can bring optimal network infrastructure to your environment at the best competitive
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationTrend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central
Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without
More informationTOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION
INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationSchedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management
More informationSCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service
More informationClient Computing Security Standard (CCSS)
Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices
More informationDell Service Level Agreement for Microsoft Online Services
Dell Service Level Agreement for Microsoft Online Services 1. Introduction. This Dell Service Level Agreement for Microsoft Online Services (this SLA ) is made by DELL PRODUCTS L.P., A TEXAS LIMITED PARTNERSHIP,
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationSurat Smart City Development Ltd. Surat Municipal Corporation 1
Surat Smart City Development Ltd. Surat Municipal Corporation 1 Surat Smart City Development Limited (SSCDL) ADDENDUM AND CORRIGENDUM-1 Name of the work: - [SSCDL-Network-01-2018] The Bidders are requested
More informationRequest for Proposal (RFP)
Request for Proposal (RFP) BOK PENETRATION TESTING Date of Issue Closing Date Place Enquiries Table of Contents 1. Project Introduction... 3 1.1 About The Bank of Khyber... 3 1.2 Critical Success Factors...
More informationAngelo Gentili Head of Business Development, EMEA Region, PartnerNET
Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why
More informationQuick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.
Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationRyan KS office thesee
SERVERR and WORKSTATION REMOTE MANAGEMENT SERVICES Ryan Dental Systems Dental Computer Systems Support and Sales 303 2 nd Street, PO Box 194, Inland NE 68954 5506 SW 31stPh: 402-461-5575 Terrace Topeka
More informationCLARIFICATION/AMENDMENTS REQUEST FOR PROPOSAL (RFP) FOR SUPPLY, IMPLEMENTATION AND MAINTENANCE OF SOLUTION
RFP Number: InfoTech Project SEWA 2015/Email/29.10.2015 Date: 19.11.2015 CLARIFICATION/AMENDMENTS REQUEST FOR PROPOSAL (RFP) FOR SUPPLY, IMPLEMENTATION AND MAINTENANCE OF EMAIL SOLUTION Agriculture Insurance
More informationQuick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.
Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth
More informationINSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic
Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationODISHA GRAMYA BANK Information Technology Department Head Office, Gandamunda, P.O.-Khandagiri, Bhubaneswar
ODISHA GRAMYA BANK Information Technology Department Head Office, Gandamunda, P.O.-Khandagiri, Bhubaneswar RFP Ref. No. OGB/RFP/ITD/HARDWARE/002/2018-19, Amendment_1 Date: 04-05-2018 AMENDMENT_1: REQUEST
More informationCarbon Black PCI Compliance Mapping Checklist
Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and
More informationOIL AND GAS REGULATORY AUTHORITY *******
T E N D E R N O T I C E PURCHASE OF LICENSED ANTI-VIRUS SOFTWARE UNDER TENDER ENQUIRY NO. 04 OF 2018. 1. The Oil and Gas Regulatory Authority (OGRA) invites sealed bids from well-reputed Authorized Suppliers/Dealers
More informationSub : ADDENDUM/CORRIGENDUM for Request for Proposal for Providing Managed Networking Solutions using SDWAN Technology for ESIC Offices across India
EMPLOYEES STATE INSURANCE CORPORATION ESIC Hqrs. Extension office, Express Building, BSZ Marg, Ground Floor, New Delhi-02 VOIP No. 10011008/10011048 PH: 011-23701356, email: ac_icthq@esic.nic.in F. No.
More informationRequest for Proposal (RFP) for setting up a Security Operations Centre (SOC), SIEM and Security Tools Implementation
BANK OF INDIA HEAD OFFICE INFOSEC CELL RFP for setting up a SOC, SIEM and Security Tools Implementation 16.12.2015 CORRIGENDUM 8 Request for Proposal (RFP) for setting up a Security Operations Centre (SOC),
More informationHOSTING SERVICES AGREEMENT
HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationService Level Agreement for Microsoft Online Services
Service Level Agreement for Microsoft Online Services Last updated on: January 1, 2015 1. Introduction. This Service Level Agreement for Microsoft Online Services (this SLA ) is made by Microsoft in connection
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationINCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationCORRIGENDUM. Corrigendum to RFP No. SBI/GITC/PMD/ /402 dated
CORRIGENDUM Corrigendum to RFP No. SBI/GITC/PMD/2017-18/402 dated 30.06.2017 For procurement of services for setting up Transformation Management Office (TMO) and for providing services to the Enterprise
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationMcAfee Public Cloud Server Security Suite
McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,
More informationIBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation
IBM Security Endpoint Manager- BigFix Daniel Joksch Security Sales Establish security as an immune system Malware protection Incident and threat management Identity management Device management Data monitoring
More informationFree Download BitDefender Client Security 1 Year 50 PCs softwares download ]
Free Download BitDefender Client Security 1 Year 50 PCs softwares download ] Description: The foundation of business security The security requirements for any new or existing company no matter how large
More informationISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that
More informationIBM Managed Security Services for Security
Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus
More informationIBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009
Services Announcement ZS09-0202, dated October 6, 2009 Security software for IBM Proventia Endpoint Secure Control, IBM ISS Data Security Services endpoint system protection - Digital Guardian software
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationMark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services
Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience
More informationDaxko s PCI DSS Responsibilities
! Daxko s PCI DSS Responsibilities According to PCI DSS requirement 12.9, Daxko will maintain all applicable PCI DSS requirements to the extent the service prov ider handles, has access to, or otherwise
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationQuick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.
Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to
More informationLast Date of Submission : March 19, 2012 up to 3:00 p.m.
TENDER NO: JMI/CIT/202/4 LIMITED TENDER DOCUMENT Subject: Renewal of McAfee Antivirus and Procurement of Additional Licenses Jamia Millia Islamia intends to renew the existing Licenses of McAfee Antivirus
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationHow We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.
How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study. Contents. Introduction... 3 Our initial findings... 5 The solution.... 6 Using Gateway Antivirus for multi-layer
More informationGet BitDefender Client Security 2 Years 30 PCs software suite ]
Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -
More informationGDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ
GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation
More informationSOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.
SOLUTION OVERVIEW Enterprise-grade security management solution providing visibility, management and reporting across all OSes. What is an endpoint security management console? ESET Security Management
More informationINCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security
More informationOIL AND GAS REGULATORY AUTHORITY *******
T E N D E R N O T I C E PURCHASE OF LICENSED ANTI-VIRUS SOFTWARE UNDER OGRA TENDER ENQUIRY NO. 1 OF 2015. 1. The Oil and Gas Regulatory Authority (OGRA) invites sealed tender from wellreputed Authorized
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationCYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I
DOCUMENT* PRESENTED BY CYBER SECURITY formerly Wick Hill * Nuvias and the Nuvias logo are trademarks of Nuvias Group. Registered in the UK and other countries. Other logo, brand and product names are trademarks
More informationTender Schedule No. Figure: Active-Active Cluster with RAC
Tender Schedule No SIBL-IT-2014-01- ORACLE_RAC_ADG Social Islami Bank Ltd is running Core Islami Banking Solution since 2009. Total no of Branches/Users is increasing per year. Now, Database Server Load
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationAnti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October
Anti-Virus Comparative Factsheet Business Test Language: English August-September 2018 Last revision: 11 th October 2018 https:// - 1 - Introduction This is a short fact sheet for our Business Main-Test
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationOUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB
CONTENTS Click on the section that you are interested in. 1 About the Mcafee endpoint protection Essential for SMB 2 2 Mcafee Endpoint Protection Essential for SMB applications 2 Eligibility 2 3 Charges
More informationData Security at Smart Assessor
Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5
More informationCisco NAC Network Module for Integrated Services Routers
Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco
More informationENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE
ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our
More informationCyber Essentials Questionnaire Guidance
Cyber Essentials Questionnaire Guidance Introduction This document has been produced to help companies write a response to each of the questions and therefore provide a good commentary for the controls
More informationItem Brand & specification Quantity Remarks Antivirus software user Licenses for windows. McAfee Complete Endpoint Protection Business Suite (CEB)
ISLAMI BANK BANGLADESH LIMITED OPERAIONS WING, ENGINEERING DIVISION PROCUREMENT OF COMPUTER HARDWARE AND ACCESSORIES DEPARTMENT 20, DILKUSHA C/A (9 th Floor), DHAKA 1000. Annexure-A NOTICE INVITING TENDER
More informationSophos. Allan Widell Channel Account Executive. 24. August 2017
Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationSecuring BYOD With Network Access Control, a Case Study
Research G00226207 29 August 2012 Securing BYOD With Network Access Control, a Case Study Lawrence Orans This Case Study highlights how an organization utilized NAC and mobile device management solutions
More informationTotal Security Management PCI DSS Compliance Guide
Total Security Management PCI DSS Guide The Payment Card Industry Data Security Standard (PCI DSS) is a set of regulations to help protect the security of credit card holders. These regulations apply to
More informationGet BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]
Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ] Description: FILE SERVERS - THE BACKBONE OF THE NETWORK File servers are not just a network repository for the company
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationConfiguring Symantec. device
Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be
More informationWhy ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection
Why ESET The only vendor with record-breaking protection ESET has the longest unbroken run of VB100 awards for malware detection of any IT security vendor. We ve been excelling at VB100 tests since May
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationSonicWall Security 9.0.6
SonicWall Email Security 9.0.6 December 2017 These release notes provide information about the SonicWall Email Security 9.0.6 release. Topics: About Email Security Features and Enhancements Resolved Issues
More informationCompTIA A+ Certification ( ) Study Guide Table of Contents
CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System
More information(A premier Public Sector Bank) Information Technology Division Head Office-Mangalore. Corrigendum 1 dated
(A premier Public Sector Bank) Information Technology Division Head Office-Mangalore. Corrigendum 1 dated 14.09.2017 No. 05/2017-18 dated 24.08.2017 for Empanelment, Supply & Installation of All-In-One
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationComodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business
Comodo HackerGuardian PCI Security Compliance The Facts What PCI security means for your business Overview The Payment Card Industry Data Security Standard (PCI DSS) is a set of 12 requirements intended
More information9 Steps to Protect Against Ransomware
9 Steps to Protect Against Ransomware IT Support Analyst Task Overview Security Manager Security Dashboard Self Service log Secur Devices With Vulnerabilities Critical Important/High Moderate/Medium 40
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More information