IT Managed Services. Schedule 1 Specification 11/07/18

Similar documents
OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

REPORT 2015/149 INTERNAL AUDIT DIVISION

CAPABILITY STATEMENT

Knowall Cloud. Performance Hosting Delivered

IBM Case Manager on Cloud

REQUEST FOR PROPOSALS

Marine Institute Job Description

IBM Security Intelligence on Cloud

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

UNITED NATIONS DEVELOPMENT PROGRAMME TERMS OF REFERENCE

QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS

Accelerate Your Enterprise Private Cloud Initiative

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Information Technology General Control Review

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

ROLE DESCRIPTION IT SPECIALIST

SERVICE DESCRIPTION DEDICATED SERVER

Google Cloud & the General Data Protection Regulation (GDPR)

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES

New Zealand Government IBM Infrastructure as a Service

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

COMPANY. Profile Information Technology GULF POWER ALLIANCE. Providing IT Solution for SME s. YOUR SUCCESS IS OUR BUSINESS

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Marine Institute Job Description

Maximize Your Assets Securely and Cost Effectively

Department of Management Services REQUEST FOR INFORMATION

TRACKVIA SECURITY OVERVIEW

DISASTER RECOVERY PRIMER

Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION

CITY OF MONTEBELLO SYSTEMS MANAGER

Request for Proposals for Data Assessment and Analysis

Version 1/2018. GDPR Processor Security Controls

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

Lincoln County, Georgia. Office 365 & Antivirus

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

MyCloud Computing Business computing in the cloud, ready to go in minutes

Managed Security Services - Endpoint Managed Security on Cloud

SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB)

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

STRATEGIC PLAN

Symantec Security Monitoring Services

Information Technology

The Common Controls Framework BY ADOBE

Transition Plan. Data Center Operations Outsourcing. Implementation: Final. Ref: TR0007

CompTIA Mobility+ Certification

Tender Schedule No. Figure: Active-Active Cluster with RAC

HPE Proactive 24 Service

Request for Proposal Technology Services, Maintenance and Support

Five Key Considerations for Selecting Cloud Recovery Services

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018

WHITE PAPER. Title. Managed Services for SAS Technology

1 Data Center Requirements

Disaster Recovery and Mitigation: Is your business prepared when disaster hits?

AUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014

Cloud solution consultant

Introduction to Business continuity Planning

NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director

Master Services Agreement:

Just-Property Ltd GDPR Client Data Register

General Data Protection Regulation

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

Invitation to Tender - Reply Form

Request for Proposal for Technical Consulting Services

CCISO Blueprint v1. EC-Council

Service Catalogue. Your secure data centric guardians. Units 1-3 Trinity Court, Brunel Rd, Totton, Hampshire SO40 3WX

Virtual Server Service

Juniper Vendor Security Requirements

A company built on security

ISO/ IEC (ITSM) Certification Roadmap

Clinical Information Security Pre-Purchase Security Assessment Vendor Packet Instructions

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

Overview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution.

Configuring and Deploying a Private Cloud DURATION: Days

Avanade s Approach to Client Data Protection

Enterprise Networking Solutions, Inc.

ServeRestore Service Description

White Paper. How to Write an MSSP RFP

StruxureWare TM Data Center Operation Periodic Maintenance. Statement Of Work. 2.0 Features & Benefits

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit

SUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009

WHITE PAPER- Managed Services Security Practices

Section A - Standards that Apply to All RFPs

DATA CENTRE SOLUTIONS

BT Connect Acceleration

New Zealand Government IbM Infrastructure as a service

Request for Proposal HIPAA Security Risk and Vulnerability Assessment. May 1, First Choice Community Healthcare

VMware vcloud Air Accelerator Service

REPORT 2015/186 INTERNAL AUDIT DIVISION

TEL2813/IS2820 Security Management

Bristol t e Exeter t e

Transcription:

` IT Managed Services Schedule 1 Specification 11/07/18

IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements... 4 3.1 Vendor Details... 4 3.2 Vendor Contact Details... 5 3.3 Managed IT as a Service... 6 3.3.1 IT Managed Service... 6 3.3.2 Backup as a Service (BaaS)... 6 3.3.3 Disaster Recovery as a Service (DRaaS)... 7 3.3.4 Security Assessment Report (Annual)... 7 3.3.5 Professional Services (IT Roadmap Upgrade Path)... 7 3.4 References... 8 3.5 Cost... 8 4.0 Evaluation Criteria... 9 4.1 Non-Cost Award Criteria... 9 4.2 Cost Award Criteria... 10 Page i

1.0 Introduction The RDS is Ireland s leading philanthropic society. It s Foundation Work Programme spans across science, the arts, agriculture, enterprise and equestrianism, and is funded by the commercial operations located in the RDS venue as well as philanthropic donations. The RDS is a registered charity. The purpose of all commercial activities is to ensure the continued delivery of its Foundation mission. The venue is a 40-acre campus with a mixture of facilities which hosts a wide range of events. In 2018, the RDS will host circa 320 commercial events attracting circa 1.8m visitors to the campus. In addition, the RDS will host hundreds of Foundation events. 1.1 Overview The Royal Dublin Society (RDS) wishes to engage an external supplier to provide IT Managed Services for the RDS Administrative Offices. The RDS Administrative office IT environment is a virtualized solution which includes a fully redundant virtual private cloud infrastructure based on VMware vsphere 6.5 technology (35 servers) with NetApp SAN and a Virtual Desktop environment on the VMWare Horizon 7 platform (90 desktops) with Windows 7 as the standardized operating system. 2.0 Scope The expected in-scope elements include managed services for: 1. Virtualised (VMware) Servers and Desktops and physical hardware (compute, storage, other) 2. System software (virtualisation, operating system, database, other) 3. Break/Fix support include hardware repair and replacement 4. Server, PC and laptop repair 5. Remote support 7.30am-6pm - Mon-Fri 6. Onsite support 9am-5.30pm - Mon-Fri 7. Software solution support for Microsoft, Sophos, Veeam backup and restore and Vmware 8. Monitoring of infrastructure including: a) Disk space b) Major services monitored c) Backup logs d) Server down/reboot activity e) CPU/memory usage above thresholds Page 2

f) Performance trending over time 9. Monthly Windows Patching 10. Extended support hours for RDS Dublin Horse Show - 24 x 7 support for duration of event. 11. Backup and disaster recovery provision 12. Security Audit 13. Professional Services (Project Management Upgrade Path) 14. Liaise with Firewall and Network service providers as required. 15. Liaise with Print Management solution providers as required. Out of scope is: 1. Support and maintenance of specific systems 2. Support and fix of Printer/MFP hardware 3. Support and fix of network switches and firewalls Page 3

3.0 Vendor Response Requirements The following sections outline the information that is required from the vendor in order to evaluate their response to the tender. Please note that off the shelf material can be provided as an appendix and the responses should be concise. The response requirements are broken into the following sections: 1. Vendor Details 2. Vendor Contact Details 3. Managed IT as a Service 4. References 5. Cost There is a separate Excel cost matrix. 3.1 Vendor Details The following information should be provided Information Requested Provide a brief outline of the history and background of the company, including corporate strategy, no. of years in the business, number of employees, etc. Where is the company located? List the locations of the following company facilities: Headquarters as well as Development Centres and Support Centres Identify and discuss any major business and technology partners (hardware, software and systems integrators) with which your company has aligned itself. The RDS requires proof of partnership with Microsoft (Azure and O365), Netapp, Sophos, Veeam and Vmware. Provide a high-level organizational overview of your Company Provide details of ISO27001 certification Confirmation that Insurance cover in place meets the RDS requirements as specified in Response Page 4

Information Requested the RDS standard supplier framework agreement Please note that the RDS will look for confirmation of insurance cover prior to contract signature. Confirmation that the vendor is prepared to accept the RDS standard supplier framework agreement. Any exceptions should be documented. Response 3.2 Vendor Contact Details Information Requested Name Title Address and Location Telephone No E-Mail Address Response Page 5

3.3 Managed IT as a Service The Vendor should provide the information outlined in the following sections. The responses should be tailored to RDS s specific context and should follow the defined structure. Off-theshelf material and brochures should be provided as an appendix and should not be built into the response. 3.3.1 IT Managed Service A description of: Hours of service Response times Incident Management Priority Assignment A description of Change Management process model A description of Event Management (monitoring) process model A description of Patch Management process model A description of Configuration Management process model A description of Event Management process model 3.3.2 Backup as a Service (BaaS) A description of the datacentre infrastructure proposed for provision of BaaS Page 6

A description of encryption and security measures to ensure secure transit and storage of RDS Data. A description of the monitoring and management solution for BaaS 3.3.3 Disaster Recovery as a Service (DRaaS) A description of the datacentre infrastructure proposed for provision of DRaaS A description of encryption and security measures to ensure secure transit and storage of RDS Data. A description of the monitoring and management solution for DRaaS 3.3.4 Security Assessment Report (Annual) A description of the security assessment to be conducted on the RDS IT Infrastructure annually A description of tools and software used to complete the assessment 3.3.5 Professional Services (IT Roadmap Upgrade Path) A description of the proactive measures provided to develop an IT roadmap for the RDS Page 7

3.4 References Please complete the following table for a minimum of three reference sites There is a preference for reference sites which are: Similar in nature to RDS Have a Vmware virtualized server and desktop environment Have BaaS and DRaaS in place Information Required Customer Name and Address Contact Details (name, e-mail, phone no) Type and Description of Customer Overall scope of the service provided. Responses 3.5 Cost The cost matrix provided in Schedule 2 in Excel must be completed and returned. An excel version of the matrix will be provided upon notification to the RDS of intention to submit a tender. Page 8

4.0 Evaluation Criteria The tenders will be evaluated according to the criteria in the table below. Criteria Marks Available IT Managed Service 300 BaaS and DRaaS solutions 200 Security Audit and Professional Services 100 References 50 Agreement on RDS Services Framework Agreement 50 Cost 300 4.1 Non-Cost Award Criteria Non-cost award criteria will be awarded marks using the following methodology: A 5-mark system will be used. A mark will be awarded to each criterion from 0 to 5. This mark, or multiplier, will be used to calculate the score to be awarded. Non Cost Award Criteria Excellent: Excellent response with very few or no weaknesses that exceeds requirements, and provides comprehensive, detailed, and convincing assurance that the Tenderer will deliver to an excellent standard. Very Good: A very good response that demonstrates real understanding of the requirements and assurance that the Tenderer will deliver to a high standard. Good: A satisfactory response which demonstrates a reasonable understanding of requirements and gives reasonable assurance of delivery to an adequate standard but does not provide sufficiently convincing assurance to award a higher mark. Poor: A response where reservations exist. Lacks full credibility/convincing detail, and there is a significant risk that the response will not be successful. Very Poor: Response fails to address the criterion under consideration Multiplier 5 4 3 2 1 Page 9

Example: For example, if a score of 300 is available, the base score is 60 (300/5). If the Tenderer is marked 5 (excellent), a score of 300 marks will be awarded (60 x 5). If the Tenderer is marked 2 (fair), a score of 120 marks will be awarded (60 x 2). 4.2 Cost Award Criteria Cost Award Criteria will be awarded marks using the following methodology The Tenderer whose Cost is the lowest shall be awarded the maximum marks available for Pricing, all other Tenders shall be marked relative to the lowest Ultimate Cost using the following formula: (The lowest Cost tendered) * (Maximum mark available for Pricing) -------------------------------------------------------------------------------------- Cost of Tender being evaluated for Pricing Page 10