Solicitation NUES Next Generation Firewall RFP. Bid designation: Public
|
|
- Pauline Woods
- 5 years ago
- Views:
Transcription
1 Solicitation NUES Next Generation Firewall RFP Bid designation: Public Northeastern Utah 4/17/2014 2:07 PM p. 1
2 Bid Number Bid Title NUES Next Generation Firewall RFP NUES Next Generation Firewall RFP Bid Start Date Apr 17, :04:30 PM MDT Bid End Date May 7, :00:00 PM MDT Question & Answer End Date May 2, :00:00 PM MDT Bid Contact Duke Mossman ext 101 Contract Duration Contract Renewal Prices Good for One Time Purchase Not Applicable 3 months Bid Comments Please see the attached RFP document for the specifications for the RFP. Added on Apr 17, 2014: Please contact Don Remy at don@nucenter.org or x3 for questions on this RFP. Changes made on Apr 17, :06:03 PM MDT Item Response Form Item Quantity Unit Price Delivery Location Next Generation Firewall 9 each Northeastern Utah No Location Specified Morgan School District 240 E Young Street Qty 4 PO Box 530 Morgan UT Qty 1 Description Next Generation Firewall that includes the following: Required: IPv6 VPN for site to site links and mobile users IPS throughput exceeding 2 GBPS Firewall o Create IP Groups to apply firewall rules to o Throughput support should exceed 2 GBPS * Three years of support and updates Optional: Web filtering with throughput of 1.5 GBPS * Antivirus with throughput of 1.5 GBPS Daggett School District 2 North 2 West Manila UT Qty 1 North Summit School District Box 497 Coalville UT Qty 1 South Summit School District 375 East 300 South Kamas UT Qty 1 Rich School District 25 South 100 West Randolph UT Qty 1 4/17/2014 2:07 PM p. 2
3 4/17/2014 2:07 PM p. 3
4 4/17/2014 1:43:00 PM Northeastern Utah Next Generation Firewall Request for Proposal Northeastern Utah Educational Services 4/17/2014 2:07 PM p. 4
5 2 Table of Contents Northeastern Utah PROJECT OVERVIEW...3 INSTRUCTIONS FOR VENDOR RESPONSES...5 PROPOSED NFGW SOLUTION ARCHITECTURE CONFIGURATION, MGMT, AND COMPLIANCE...7 ACCESS CONTROLS AUTH AND ENCRYPTION...8 INTEGRATED NEXT-GEN FEATURES...9 OTHER CONSIDERATIONS...10 SOLUTION PRICING /17/2014 2:07 PM p. 5
6 3 I. PROJECT OVERVIEW Northeastern Utah Education Services is a rural services center in the State of Utah. We work with nine districts in the Northeastern section of the state. We have several districts in need of upgrading their current firewall solution at the district s network border. REQUESTING COMPANY INFORMATION Northeastern Utah will be facilitating the RFP process for the NGF (Next Generation Firewall). We will also be involved in implementing the chosen solution at each site. CURRENT IT ENVIRONMENT Currently the districts are using either a Linux based IPTables firewall solution at the border, or some older commercial firewalls. A NGF that can address IPS, Antivirus, and basic web filtering is needed to meet the current and future needs of the districts. SECURITY CHALLENGES The districts all have a 1 GBPS Internet connections to their facilities. With this level of throughput and with public IP addresses to the desktop, the networks are often the target of hackers. IPS is one of the key features that will be needed. The web filtering would only be used as backup to the current filtering solution the district has. CURRENT FIREWALL AND RELATED SECURITY PRODUCTS As stated most of the districts currently use a Linux IPTables firewall solution. Some of the districts are on older Juniper firewalls as well. 3. NUES 4/17/2014 2:07 PM p. 6
7 4 Northeastern Utah DESIRED NEXT GENERATION FIREWALL (NGF) FEATURES Required: IPv6 VPN for site to site links and mobile users IPS throughput exceeding 2 Gbps Firewall o o Create IP Groups to apply firewall rules to Throughput support should exceed 2 Gbps Optional: Web filtering with throughput of 1.5 Gbps Antivirus with throughput of 1.5 Gbps PROJECT PURPOSE Primary purpose of the project is to replace aging hardware that is currently deployed, and increase network security for devices on the network. The current connection speed is at 1 GBPS, but expected to reach 2 GBPS during the lifetime of the product. PROJECT SCOPE All quotes for the RFP must be valid until the end of July Some of the entities will be making their purchase before the end of the current fiscal year, with the remaining using next year s budget. Implementation is to be completed by August 31 st for each of the devices purchased. Training must also be provided on a single site unlimited seat basis. NUES /17/2014 2:07 PM p. 7
8 5 II. Instructions for Vendors Response Timeline and Evaluation: All responses are due by May 7 th. The three top vendors will be invited to give group presentations during the week of May 12 th through May 16 th. The final award will be made during the week of May 19 th through the 23 rd. All quotes must be valid until the end of July Some of the participants will be making the purchase out of the current budget year, and others out of the budget year. VENDOR QUESTIONS TO: Your contact for the RFP is: Name: Don Remy don@nucenter.org Phone: x3 5. NUES 4/17/2014 2:07 PM p. 8
9 6 Northeastern Utah SELECTION CRITERIA The below criteria will help to determine selection: Technical capabilities (IPS, Web Filter, AV throughput, VPN, IPv6, and firewall) 30% Feature sets 5% Typical deployment times 5% Implementation plan and support 10% Pricing 30% Clear overview of how their solution will help you achieve your project goals 5% Results of requested demonstrations and presentations 15% NUES /17/2014 2:07 PM p. 9
10 7 2. Proposed Next Generation Firewall Solution In this section, describe your NGF solution, including the security devices it consolidates into one solution. 2.1 ARCHITECTURAL OVERVIEW Do you propose an appliance-based or a virtual solution? Discuss the advantage of whichever one you are proposing. If this is a hardware-based solution, do you support multiple logical firewalls on the same hardware platform? 2.2 BASIC FIREWALL FEATURES Provide a concise overview of the table stakes features included in your solution, such as AV signatures, IP and port blocking, robust logging and blacklist/whitelist capabilities. Do you have any advantages in your basic feature set versus competitors? 2.3 POLICY CREATION AND ENFORCEMENT Discuss the ability administrators have to create policies, as well as how policies are enforced. 2.4 BANDWIDTH CONSIDERATIONS Current links at site are 1 GBPS, but during the lifetime of the devices we expect to see 2 GBPS brought into the districts. 7. NUES 4/17/2014 2:07 PM p. 10
11 8 2.5 TROUBLESHOOTING TOOLS AND FORENSICS Northeastern Utah Discuss troubleshooting capabilities, such as packet capture, traceroute and ping, etc. Are troubleshooting capabilities integrated? 2.6 VPN Does this solution have built-in VPN support? If so, does it support site-to-site IPSEC VPNs? Does it support client based SSL/TLS VPNs for remote users? 2.7 MAXIMUM CAPACITY What is the maximum capacity of devices behind the firewall with IPS turned on? 3. Configuration, Management How scalable is this solution and what is the maximum compliance capacity available per device or virtual machine? Discuss configuration, management and compliance variables. 3.1 DISCOVERY AND AUTO-CONFIGURATION TOOLS Which discovery and auto-configuration features do you offer? 3.2 CONFIGURATION AUDIT Any NGF under consideration must have configuration audit capabilities. Detail your product s audit features. NUES /17/2014 2:07 PM p. 11
12 9 3.3 QUALITY OF SERVICE Describe any features in the proposed solution that automatically adjust quality of service (QoS) levels. 3.4 ANALYSIS TOOLS AND REPORTS How are security incidents analyzed, and what reports are generated automatically? Can the reports be ed each day or require a manual export? 3.5 SECURITY MANAGEMENT How is your solution managed? How does it integrate with other security layers? If you have pre-built integration with specific partners or management tools, please list them. 3.6 PROACTIVE MANAGEMENT Provide an overview of your solution s real-time decision making tools. Discuss how your solution shares actionable intelligence to boost visibility into evolving risks, while also simplifying and speeding up incident reporting, trouble ticketing, remediation and management workflows. 9. NUES 4/17/2014 2:07 PM p. 12
13 10 Northeastern Utah 3.7 COMPLIANCE Explain how your solution streamlines the compliance process through any automatic reporting, enforcement and auditing capabilities. 4. Access Controls, Authentication and Encryption Access controls and authentication will be weighted heavily during the selection process. How do users authenticate into your system? How do you protect data in motion and at rest? How fine-grained are your policies for application access, roles and privileges? 4.1 ACCESS CONTROLS How granular are access controls in Web applications and legacy applications? 4.2 SEPARATION OF DUTIES To be considered, your NGF must provide tools to set up discretionary-based roles and privileges. It should also allow for the creation of separate access and control administrative privileges. 4.3 ACTIVE DIRECTORY (OR LDAP, ETC.) SUPPORT, and Two Factor Authentication List what LDAP integration options your firewall supports. Describe what two factor authentication options are available from login to management portal. 5. Other Considerations 5.1 CUSTOMER SUPPORT Explain your customer support policies. What is your normal response time? How much self-service support is built into the product? How long does the typical incident take to remediate? What is the escalation process? 5.2 PROFESSIONAL SERVICES Describe your Professional Services capability as it pertains to this project. Include services offered, locations provided, and whether in-sourced or outsourced personnel are used. 10. NUES 4/17/2014 2:07 PM p. 13
14 TRAINING Training will need to be part of your proposal. Include one-day single site training with unlimited seating at one of our facilities. Realistically the number of seats will match the number of purchased units +/ Solution Costs 6.1 PRICING SPECIFICS Please provide detailed pricing for your solution; include separate costs for hardware, software, deployment costs, training, support costs, professional services, and shipping. Describe any methods that you provide to help quantify the TCO and/or ROI of your solution. If you have any third party support for your TCO or ROI numbers, please provide it. 4/17/2014 2:07 PM p. 14
15 Question and Answers for Bid # NUES Next Generation Firewall RFP OVERALL BID QUESTIONS There are no questions associated with this bid. If you would like to submit a question, please click on the "Create New Question" button below. Question Deadline: May 2, :00:00 PM MDT 4/17/2014 2:07 PM p. 15
Solicitation TOSS8187. Notice of Proposed Sole Source: DVR's and External Hard Drives. State of Utah
Solicitation TOSS8187 Notice of Proposed Sole Source: DVR's and External Hard Drives Apr 22, 2008 7:52:38 AM MDT p. 1 Notice of Proposed Sole Source: DVR's and External Hard Drives Bid Number Bid Title
More informationE-RATE YEAR Request for Proposal Wireless Access Points and Control for Monson-Sultana Joint Union Elementary School District BEN#144060
E-RATE YEAR 2016-2017 Request for Proposal Wireless Access Points and Control for Monson-Sultana Joint Union Elementary School District BEN#144060 470 Application # 160043013 Submission Deadline: Thursday,
More informationNovember 1, 2018, RP Provision of Managed Security Services on an Annual Contract ADDENDUM #2
November 1, 2018, RP029-18 Provision of Managed Security Services on an Annual Contract ADDENDUM #2 Please see the below summation of the technical questions and answers that have been received regarding
More informationHow to Write an MSSP RFP. White Paper
How to Write an MSSP RFP White Paper Tables of Contents Introduction 3 Benefits Major Items of On-Premise to Consider SIEM Before Solutions Security Writing an RFP and Privacy 45 Benefits Building an of
More informationRequest for Proposal. I. Introduction. II. Scope of Work. IT Managed Services Support. IT Environment. Main Facility
Request for Proposal IT Managed Services Support I. Introduction The Hoh Indian Tribe ( Tribe or Hoh Tribe ) is located in western Washington State in Jefferson County, 28 miles South of Forks, Washington.
More informationRAMP DCIM Data Center Infrastructure Management Software
RAMP DCIM Data Center Infrastructure Management Software RFP TEMPLATE 1-866-612-3637 SALES@TUANGRU.COM TUANGRU.COM DCIM RFP TEMPLATE Dear Sir or Madam, Your company has been invited to submit your company
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationLincoln County, Georgia. Office 365 & Antivirus
Lincoln County, Georgia November 16, 2018 Office 365 & Antivirus Invitation for Bid RFP 18-006 The Lincoln County Board of Commissioners is requesting bids for migration to, and implementation of, the
More informationWhite Paper. How to Write an MSSP RFP
White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current
More informationUNL ebid # SCOPE OF WORK (CSN Network Management)
UNL has provided the following Scope of Work document in order to provide each bidder with specific and relevant background information related to this bid document. 1. History and Background a. The University
More informationIntroducing VMware Validated Design Use Cases. Modified on 21 DEC 2017 VMware Validated Design 4.1
Introducing VMware Validated Design Use Cases Modified on 21 DEC 2017 VMware Validated Design 4.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationWashington State Emergency Management Association (WSEMA) Olympia, WA
Washington State Emergency Management Association (WSEMA) Olympia, WA Request for Proposals Website Redesign and Content Management and Maintenance System Proposal Submittal Deadline: I. Introduction and
More informationCisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
More informationUniversity of Nebraska-Lincoln
University of Nebraska-Lincoln Bid Information Contact Information Ship to Information Bid Owner Claudette Biskup Sourcing Address 1700 Y Street Address 1110 S 67th Street Specialist Email claudette.biskup@unl.edu
More informationREQUEST FOR PROPOSALS
REQUEST FOR PROPOSALS January 15, 2015 Electronic Catalog Management System Project 2014-2015 Due 2:00 PM CST/CDT Friday, February 6, 2015 Company Name: Contact Information: Printed Name & Title E-mail
More informationRequest for Proposal: Wireless System
Request for Proposal: Wireless System December 19, 2014 Diller-Odell Public Schools 506 Perry Street Diller, NE 68415 Erate Identifier: Category Two RFP Wireless 1 Table of Contents Overview...3 1.1 Description
More informationRFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template
RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationLOS ANGELES COMMUNITY COLLEGE DISTRICT Contracts Office 770 Wilshire Boulevard, 6 th Floor Los Angeles, California 90017
LOS ANGELES COMMUNITY COLLEGE DISTRICT Contracts Office 770 Wilshire Boulevard, 6 th Floor Los Angeles, California 90017 RFP Number: 18-11 RFP Title: Workgroup Departmental and Print Center Digital Copiers,
More informationFile Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
More informationSERVICE DESCRIPTION MANAGED FIREWALL/VPN
Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...
More informationMT. PROSPECT PARK DISTRICT REQUEST FOR PROPOSAL REQUEST FOR STATEMENTS OF INTEREST, QUALIFICATIONS, PERFORMANCE DATA AND COST PROPOSAL
MT. PROSPECT PARK DISTRICT REQUEST FOR PROPOSAL REQUEST FOR STATEMENTS OF INTEREST, QUALIFICATIONS, PERFORMANCE DATA AND COST PROPOSAL WEB SITE DESIGN SERVICES Issue Date: December 19, 2017 Mt. Prospect
More informationREQUEST FOR PROPOSALS
REQUEST FOR PROPOSALS The City of Somerset is requesting proposals for migration to, and implementation of, the Office 365 hosted environment for its Exchange email system and the full suite of existing
More informationSupport for the HIPAA Security Rule
white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe
More informationICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL
INTERNATIONAL CENTER FOR BIOSALINE AGRICULTURE ICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL Imane Boujidane Procurement Officer +971 4 336 1100 ext. 201 i.boujidane@biosaline.org.ae International
More informationSnort: The World s Most Widely Deployed IPS Technology
Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,
More informationINCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security
More informationCisco Self Defending Network
Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate
More informationMARTINSVILLE CITY PUBLIC SCHOOLS RFP FOR INTERNET SERVICES NOVEMBER 1, 2014
MARTINSVILLE CITY PUBLIC SCHOOLS RFP FOR INTERNET SERVICES NOVEMBER 1, 2014 Overview Martinsville City Public Schools District (hereafter collectively referred to as MCPS) seeks a Request for Proposal
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationNOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY. Addendum No. 1 issued September 7, RFI responses are in red bold print
DEDICATED TO THE HEALTH OF OUR COMMUNITY www.hcdpbc.org NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY Addendum No. 1 issued September 7, 2018 RFI responses are in red bold print How many public
More informationINCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security
More informationWelcome to Staying Ahead Webinar
Welcome to Staying Ahead Webinar Migrating to NNMi 1 Footer Goes Here Agenda 1. NNMi features and benefits 2. PSQS / Education offerings around NNMi 3. Q&A 2 Footer Goes Here Streamline your network operations
More informationSeven Criteria for a Sound Investment in WAN Optimization
Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationREQUEST FOR INFORMATION (RFI) ELECTRONIC FORMS AUTOMATION DEP Solicitation Number: C
Request for Information Electronic Forms Automation DEP RFI No.: 2016040C REQUEST FOR INFORMATION (RFI) ELECTRONIC FORMS AUTOMATION DEP Solicitation Number: 2016040C This is a Request for Information (RFI)
More informationRequest for Proposal (RFP)
Request for Proposal (RFP) BOK PENETRATION TESTING Date of Issue Closing Date Place Enquiries Table of Contents 1. Project Introduction... 3 1.1 About The Bank of Khyber... 3 1.2 Critical Success Factors...
More informationIntroducing VMware Validated Design Use Cases
Introducing VMware Validated Design Use Cases VMware Validated Designs 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationATTACHMENT A FSD WLAN PROGRAM SCOPE OF WORK IFB I NETWORK EQUIPMENT AND RELATED SERVICES
I. EXECUTIVE SUMMARY A. The intent of this Invitation for Bid (IFB) is to solicit proposals to provide solutions for Wide Area Networking (WAN), Local Area Networking (LAN), and Wireless Local Area Networking
More informationMove Cyber Threats On To Another Target. Encrypt Everything, Everywhere. Imam Sheikh Director, Product Management Vormetric
Move Cyber Threats On To Another Target Encrypt Everything, Everywhere Imam Sheikh Director, Product Management Vormetric State of the Market Evolving Threats Today s spectrum of Insider Threats TRADITIONAL
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationHosted VoIP Unified Communications Service
Request for Proposals: Hosted VoIP Unified Communications Service June 2018 Hosted VoIP Unified Communications Service Published: July 3, 2018 Responses Due: July 27, 2018 Submit bid to: Goleta Union School
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationequote Practical Exercise Mobile Onsite Shredding Services
equote Practical Exercise Mobile Onsite Shredding Services Scenario: Create an equote for Mobile Onsite Shredding Services In this scenario, you will create a new equote for practice. You will have the
More informationNext Level Remote Access
Next Level Remote Access Next Generation Network Access Technology www.ncp-e.com Next Level Remote Access VPN Since the company was founded in 1986, NCP has been committed to making deploying, using and
More informationCorente Cloud Services Exchange
Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based service that enables distributed enterprises to deliver trusted IPSec VPN connectivity services to
More informationControl access to your super user accounts
Control access to your super user accounts Dell Solutions Tour 2015 Ingvar Johansson, Dell Software ingvar.johansson@software.dell.com What is? Privilege Privilege Ensure that privileged users can get
More informationREQUEST FOR PROPOSAL (RFP) TELECOMMUNICATIONS SERVICES
REQUEST FOR PROPOSAL (RFP) TELECOMMUNICATIONS SERVICES SUMMIT LEADERSHIP ACADEMY 12850 MUSCATEL HESPERIA, CA 92345 FEBRUARY 6, 2015 TABLE OF CONTENTS 1. SUMMARY AND BACKGROUND... 2 2. PROPOSAL GUIDELINES...
More informationStatement of Compliance Cloud Platform
Bidder Name Statement of Compliance Cloud Platform S. No. Functional Requirements of Virtual Private Cloud and Hybrid Cloud Platform Cloud services 1 Cloud services for both Windows hyper-v and Vmware
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationEnsuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard
Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure
More informationConRes IaaS Management Services for Microsoft Azure
ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...
More informationAdministrative & Operations Network Security Assessment
TAMPA-HILLSBOROUGH COUNTY EXPRESSWAY AUTHORITY Letter of Clarification No. 1 FOR REQUEST FOR QUALIFICATIONS (RFQ) Administrative & Operations Network Security Assessment RFQ No. O-00418 Page 1 of 15 Letter
More informationBOARD OF EDUCATION NO /04. Business Services and Information Technology Divisions for presentation to the Board of Education on October 14, 2003
BOARD OF EDUCATION NO.103 03/04 Business Services and Information Technology Divisions for presentation to the Board of Education on via Audit, Business and Technology Committee SUBJECT: RESULTS FROM INFORMATION
More informationCRETC, BCESD, CRUHSD Unified Threat Manager The Bullhead City Elementary School District (BCESD) and Colorado River Union High School District
CRETC, BCESD, CRUHSD Unified Threat Manager The Bullhead City Elementary School District (BCESD) and Colorado River Union High School District (CRUHSD) are seeking proposals for a unified threat management
More informationMUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions
Q: What are the pain points being experienced with the current IT setup? A: Age of the equipment, reliability of service, no redundancy for internet service. Q: How is technology managed today? A: Outsourced
More informationRequest for Proposal On Telecommunications and Internet Services for Funding Year BEN
Request for Proposal On Telecommunications and Internet Services for 2010 2011 Funding Year BEN 16046349 RFP Objectives Hiawatha Valley Education District is seeking bids for telecommunications and Internet
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationPurchasing Department Finance Group INVITATION TO BID
Purchasing Department Finance Group August 7, 2012 INVITATION TO BID The City of Norwalk, Information Technology Department, is soliciting bids for Computer Server Hardware and VMware vsphere Enterprise
More informationRequest for Proposal
Request for Proposal Troy School District Server Virtualization and Consolidation Thomas Noppe Director of Information Technology 03/15/2016 Proposals Due by 12:00 pm April 29, 2016 1 Contents Section
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationWainhouse Research BroadSoft Provider RFI
REQUEST FOR INFORMATION (RFI) BroadSoft Provider - Power Ranking Report Analysts: Dave Michels, Bill Haskins Wainhouse Research BroadSoft Provider RFI Thank you for your interest and participation in the
More informationSummary. Program Overview. Notice Type: Request for Proposal. Short Title: CEI Industrial Refrigeration Technical Support
Notice Type: Request for Proposal Short Title: CEI Industrial Refrigeration Technical Support Posted date: December 1, 2015 E-mail response date: December 31, 2015 Point of contact at VEIC: Greg Baker
More informationX 11/4/2016 N/A 12/8/2016
REQUEST FOR PROPOSAL (RFP) - SUMMARY PAGE ENTITY # 200244 SCHOOL NAME SOUTHWEST TECHNOLOGY CENTER ADDRESS 711 W TAMARACK CITY, STATE, ZIP ATLUS, OK 73521 Please submit bids/proposals to the school by email
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationOUR SECURITY DELIVERED YOUR WAY
M200 OUR SECURITY DELIVERED YOUR WAY U.S. Sales: 1.800.734.9905 International Sales: 1.206.613.0895 Web: www.watchguard.com WatchGuard Technologies, Inc. Partner with WatchGuard It s Just Easy Everything
More informationSERVICE DESCRIPTION DEDICATED SERVER
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationREQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES
REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES I. INTRODUCTION Coastal Plain Area Economic Opportunity Authority, Inc. (hereinafter CPAEOA) is requesting proposals from qualified, professional
More informationVirtualized Network Services SDN solution for service providers
Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationREQUEST FOR PROPOSAL (RFP)
REQUEST FOR PROPOSAL (RFP) Network Infrastructure Upgrade Issue Date: 11/06/2017 Bids Due 12/04/2017 470 #180003001 The purpose of this Request for Proposal (RFP) is to solicit sealed proposals to establish
More informationNC Education Cloud Feasibility Report
1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most
More informationRequest for Proposals (RFP) IT Infrastructure Upgrade & Storage Solution January 26, 2017 Proposal Deadline: February 8, 2017
Request for Proposals (RFP) IT Infrastructure Upgrade & Storage Solution January 26, 2017 Proposal Deadline: February 8, 2017 I. Overview Tipton County Government is seeking an IT Infrastructure Upgrade
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationWHITE PAPER SEPTEMBER VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT. Licensing, Pricing and Packaging
WHITE PAPER SEPTEMBER 2017 VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT Licensing, Pricing and Packaging Table of Contents Executive Summary 3 VMware vsphere with Operations Management Overview
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More information1 IAM Program Launch. 2 Agenda. 3 Introductions. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 IAM Program Launch Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Kickstart an IAM program with discovery of business and IT requirements 2 Agenda Who? Introductions. Why?
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationDenver Public Schools Purchasing Department 900 Grant Street, Room 301 Denver, CO Dear Vendor:
Denver, CO 80203 Dear Vendor: Thank you for obtaining this Request for Information on-line. is not currently using an on-line "Bid Provider", which would track and charge Vendors to obtain our solicitations;
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationMessage Board Questions and Answers
Message Board Questions and Answers Addendum No. 1 State of Florida Department of Management Services INVITATION TO BID Commercial Off-The-Shelf (COTS) Software ITB No.: 01-252-035-M December 16, 2013
More informationSEALED BID REQUEST Quote for Broadband Equipment Joplin Schools WiFi Access Points and Switchgear
SEALED BID REQUEST Quote for Broadband Equipment Joplin Schools WiFi Access Points and Switchgear Contact: Vincent Crossley (417) 625-5200 (ext. 2025) VincentCrossley@joplinschools.org INSTRUCTIONS: Award
More informationRequest For Proposal ONWAA Website & E-Learn Portal
Request For Proposal ONWAA Website & E-Learn Portal ONWAA 880 17 E, Garden River, Ontario P6A 6Z5 Table Of Contents General information Project Overview Statement of Needs Proposal Format Proposal Preparation
More informationGetting Started with Cybersecurity
2 Incidents per week: Since 2016, U.S. K-12 school districts have experienced more than two cyber incidents per week on average. Fastest growing cyber incidents in K12 schools Most common cyber incidents
More informationPTS Customer Protection Agreement
PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone
More informationSub : ADDENDUM/CORRIGENDUM for Request for Proposal for Providing Managed Networking Solutions using SDWAN Technology for ESIC Offices across India
EMPLOYEES STATE INSURANCE CORPORATION ESIC Hqrs. Extension office, Express Building, BSZ Marg, Ground Floor, New Delhi-02 VOIP No. 10011008/10011048 PH: 011-23701356, email: ac_icthq@esic.nic.in F. No.
More informationTender Schedule No. Figure: Active-Active Cluster with RAC
Tender Schedule No SIBL-IT-2014-01- ORACLE_RAC_ADG Social Islami Bank Ltd is running Core Islami Banking Solution since 2009. Total no of Branches/Users is increasing per year. Now, Database Server Load
More informationJUNIPER CARE SERVICES
DATASHEET SERVICES Product Overview Juniper Care Services provide rapid response from Juniper Networks technical service engineers and hardware replacement options that let you choose the right timing
More informationService Offering: Outsourced IdM Administrator Service
Service Offering: Outsourced IdM Administrator Service 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 The Outsourced IdM Administrator Service 1 2.1 Hitachi ID Systems and
More informationPurchasing Department Finance Group INVITATION TO BID
Purchasing Department Finance Group September 20, 2012 INVITATION TO BID The City of Norwalk, Information Technology Department, is soliciting bids for Computer Software Microsoft Server 2008 plus SQL
More informationArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young
ArcGIS Online A Security, Privacy, and Compliance Overview Andrea Rosso Michael Young ArcGIS Online A Multi-Tenant System Portal Portal Portal ArcGIS Online Agenda Online Platform Security Deployment Architecture
More informationRFQ OIT-1 Q&A. Questions and Answers, in the order received.
Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring
More informationNetworking Infrastructure
Unit 43: Networking Infrastructure Unit code: A/601/1964 QCF Level 5: BTEC Higher National Credit Value 15 Aim To provide learners with an understanding of networking infrastructures, the directory based
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationPURCHASE ORDER: The result of an approved requisition, the official document/contract with the vendor needed to purchase goods and services.
Training Manual 1 REQUISITION: Item necessary to initiate the procurement of all goods and services PURCHASE ORDER: The result of an approved requisition, the official document/contract with the vendor
More informationCORRIGENDUM- I. Sr. Page/Section Description Bidder s Query Clarification / Amendments. 1 Page 5 of Vol-I, and Page 15 of Vol-II
CORRIGENDUM- I Name of work: RFP for selection of agency for creation of Digital Project Management Platform comprising OSO, Supply, Implementation and Support of 5D-BIM & ERP for the Nagpur Metro Rail
More information