request for proposals for the appointment … - 2016... · performance reporting obiee and ossm...

23
1 ANNEXURE A: SCOPE OF WORK REQUEST FOR PROPOSALS FOR THE APPOINTMENT OF A PANEL OF IT ENTERPRISE SUPPLIER DEVELOPMENT SERVICE PROVIDERS FOR A PERIOD OF FIVE YEARS AT AIRPORTS COMPANY SOUTH AFRICA. Tender Number: : COR42/2016 ANNEXURE A: SCOPE OF WORK Section 1: Introduction and Overview of scope of services The scope of work will vary depending on the type of projects being undertaken at that time. The Qualifying Small Enterprises (QSE) and Exempted Micro Enterprises (EME) will be appointed to serve on the panel of IT Enterprise Supplier Development (ESD) service providers. These service providers are categorised as follows: Category 1 is for the QSE bidders. EME bidder’s financial statements will be evaluated in order to split them into two “EME Categories”: Category 2 will be for companies with turnover of less than R 5 000 000.00. Category 3 will be for companies with turnover of between R 5 000 000.01 to R 10 000 000.00. The Bidders who are appointed to serve on the panel of EDS will be allocated work through issuing of work orders (as and when required) as follows: ACSA will issue the work order/s to the Principal Service Provider who will then be required to partner with the EDS service providers within a particular discipline to deliver on that work order. ACSA may also allocate work order/s directly to the appointed QSE within a particular discipline who will then be required to partner with the EME’s that are appointed in that discipline. In cases where a work order is issued to the PSP, then the financial spent will be distributed as follows: a maximum of 60% of the total contract price to the PSP and a minimum of 40% to the EDS. In cases where a work order is issued to the QSE, then the financial spent will be distributed as follows: maximum of 60% of the total contract price to the QSE and a minimum of 40% to the EMEs.

Upload: trinhnhu

Post on 17-Jul-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

1

ANNEXURE A: SCOPE OF WORK

REQUEST FOR PROPOSALS FOR THE APPOINTMENT OF A PANEL OF IT

ENTERPRISE SUPPLIER DEVELOPMENT SERVICE PROVIDERS FOR A PERIOD OF

FIVE YEARS AT AIRPORTS COMPANY SOUTH AFRICA.

Tender Number: : COR42/2016

ANNEXURE A: SCOPE OF WORK

Section 1: Introduction and Overview of scope of services

The scope of work will vary depending on the type of projects being undertaken at that time. The Qualifying

Small Enterprises (QSE) and Exempted Micro Enterprises (EME) will be appointed to serve on the panel of

IT Enterprise Supplier Development (ESD) service providers. These service providers are categorised as

follows:

Category 1 is for the QSE bidders.

EME bidder’s financial statements will be evaluated in order to split them into two “EME Categories”:

Category 2 will be for companies with turnover of less than R 5 000 000.00.

Category 3 will be for companies with turnover of between R 5 000 000.01 to R 10 000 000.00.

The Bidders who are appointed to serve on the panel of EDS will be allocated work through issuing of work

orders (as and when required) as follows:

ACSA will issue the work order/s to the Principal Service Provider who will then be required to partner

with the EDS service providers within a particular discipline to deliver on that work order.

ACSA may also allocate work order/s directly to the appointed QSE within a particular discipline who

will then be required to partner with the EME’s that are appointed in that discipline.

In cases where a work order is issued to the PSP, then the financial spent will be distributed as follows:

a maximum of 60% of the total contract price to the PSP and a minimum of 40% to the EDS.

In cases where a work order is issued to the QSE, then the financial spent will be distributed as

follows: maximum of 60% of the total contract price to the QSE and a minimum of 40% to the EMEs.

2

ANNEXURE A: SCOPE OF WORK

The final decision on the split of the 40% allocation will be made by ACSA prior to the work order being

issued.

The PSP and QSE’s will be expected to take insurance cover for particular work orders, the details will be

shared during the stage of issuing work orders. ACSA reserves the right to appoint other service provider/s

outside this panel should the service providers not address the business requirements and/or provide

uncompetitive quotes when responding to work orders.

3

ANNEXURE A: SCOPE OF WORK

Section 2: IT Structure

The IT organisational structure in support of the IT strategy balances efficiency with service delivery, whilst

enhancing IT Management capability.

Functional Area Description

IT Architecture and

Strategy

Planning and control of all activities related to IT Architecture & Strategy

including Business Relationship Management, IT Strategy & Innovation and

Enterprise Architecture.

IT Planning & Control IT Planning & Control including Financial Management, IT Commercialisation,

IT Sourcing, IT Asset Management and Asset Configuration Management.

IT Governance &

Resilience

Governance and Resilience including information Risk Management, Business

Continuity and Disaster Recovery Management and Data Governance and

Knowledge Management.

Service Development Planning, designing, building and implementation of IT services to meet

business needs. Oversight over Programme and Resource Management,

Change and Release Management, Business Analysis, Quality and Test

Management.

Service Integration Control of all activities related to Service integration including IT Project

Management and Solution Design.

Information Security Establish and management of information systems security including Security

Architecture and Security Operations oversight.

Service Management &

Operations

Management and monitoring of IT operational service levels and performance

with focus on Service Quality and Service Catalogue Management.

Enterprise Applications Key focus area is the implementation of Oracle as the ERP platform of choice

for ACSA. Enterprise Applications covers Channels, Information Management,

Business Enablement applications.

Airport Systems Management of all activities related to Airport Systems across all airport

operations (covering Airport Management, Landside, Passenger Processing,

Airside, Maintenance and Engineering, Security, Safety and Radio

Communications). This includes both electronic and airport operational

systems.

IT Infrastructure The IT Infrastructure has oversight over all network and technology

infrastructure for the nine airports and Corporate Office. This includes

amongst others:

Data centre management

Workplace and User Tools Management

Server management

Network and Connectivity

Communication tools and devices

4

ANNEXURE A: SCOPE OF WORK

Section 3: Supplying, Installing, Commissioning and Decommissioning Services

The QSE and EME’s are required to have experience in delivering IT projects as per the criteria set out below.

1. Implementing projects in the following areas:

Supplying, Installing and Configuration of Enterprise Applications projects and/or

Supplying, Installing and Configuration of Enterprise Applications - Oracle Technical Services projects

and/or

Supplying, Installing and Commissioning and decommissioning of Airport Systems - Security projects

and/or

Supplying, Installing and Commissioning and decommissioning of Airport Systems - Electronic

Systems projects and/or

Supplying, Installing and Commissioning and decommissioning of Airport Systems – Airport

Applications projects and/or

Supplying, Installing and Commissioning and decommissioning of IT Infrastructure - Physical projects

and/or

Supplying, Installing and Commissioning and decommissioning of IT Infrastructure - Core projects

and/or

Supplying, Installing and Commissioning and decommissioning of Information Security projects and/or

Delivery of Business Intelligence and Analytics (Big Data) projects and/or

Delivery of Enterprise Architecture and Planning projects.

2. Upgrading, Supporting and Maintaining new and existing systems within the disciplines listed above.

5

ANNEXURE A: SCOPE OF WORK

Below is a list of disciplines, technologies and service that are in operations within ACSA. Bidders responses should cover both the

(Supplying, Installing and Configuring and Commissioning/Decommissioning) and (Upgrade, Support and Maintenance) as the

appointment will be made for both areas for a specific discipline. Should a bidder respond to more than one discipline, the Bidders is

expected to indicate the priority of the disciplines they are applying for, should the bidder fail to provide the priority ACSA reserves

the right to prioritise the bidders response based on the evaluation scores.

QSE Bidders are expected to submit minimum of two (2) Original Equipment Manufacturer Certification/Accreditation/Implementation

Partnerships and/or Resale agreements in different technologies/services within the discipline they are applying for.

In cases where the OEM Certification/Accreditation/Implementation Partnerships and/or Resale agreements applies to multiple

technologies/services within a particular discipline, this will be counted as separate certifications for the purpose of allocating points.

6

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

1. Enterprise

Applications

IBM AIX AIX is an open operating system from IBM that is based on

a version of UNIX and ACSA is currently on version 6

IBM Websphere Message Broker

(including Java technologies)

Integration broker from the WebSphere product family that

allows business information to flow between disparate

applications across multiple hardware and software

platforms. It is used in conjunction with ESB.

IBM MQ Series IBM MQ is a standard for program-to-program messaging

across multiple platforms.

Systems Integration (ESB) IBM ESB is a service-oriented architecture (SOA). It

translates requests into the appropriate message types

and routes them to the appropriate provider.

BPM Development (IBM) IBM BPM is a comprehensive Business Process

Management Platform used to manage ACSA processes.

DB2 (IBM) DB2 is a Relational Database Management System that

runs on its Multiple Virtual Storage mainframe platform.

IBM DB2 contains database server products developed by

IBM. These products all support the relational model and

some products have been extended to support object-

relational features and non-relational structures.

Microsoft (.Net, SharePoint, SQL

Server, etc.)

SharePoint is a browser-based collaboration and

document management platform from Microsoft.

General Business Intelligence Business intelligence (BI) is an umbrella term that refers to

a variety of software applications used to analyze the

7

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

organisation raw data. BI as a discipline is made up of

several related activities, including data mining, online

analytical processing, querying and reporting.

2. Enterprise

Applications -

Oracle Technical

Services

E-Business Suite eBusiness suite

(R12.1.3)

Oracle E-Business Suite is a comprehensive suite of

integrated, business applications that enable organizations

to make better decisions, reduce costs, and increase

performance.

Human Resources Core Oracle's E-Business Suite Human Capital Management

HRMS delivers a robust set of best-in-class human

resources functionality that enables you to increase

productivity, accelerate business performance, and lower

your cost of ownership.

Cloud Solution Human

Resources

Modern HR differentiates the business with a talent centric

and consumer based strategy that leverages technology to

provide a collaborative, insightful, engaging and mobile

HR, employee and executive experience. Oracle HCM

Cloud enables modern human resources to find and retain

the best talent and increase global agility.

Supplier Lifecycle Management Oracle Supplier Lifecycle Management is the supplier

development application that transforms qualification,

administration, and assessment. With Oracle Supplier

Lifecycle Management organizations can streamline

registration and review of prospective suppliers, enable

cross functional performance evaluation, and assure

8

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

effective governance and risk mitigation. It is a key

component of Oracle Advanced Procurement, the

integrated suite that dramatically cuts all supply

management costs.

Finance Oracle E-Business Suite Financials allow you to increase

efficiency and reduce back-office costs with standardized

processes for shared services, productivity tools, and

integrated performance management.

Cloud Solution Finance Oracle Planning and Budgeting Cloud Service is a

planning, budgeting, and forecasting solution. PBCS

provides a rich Web and Microsoft Office work environment

that has solved a wide variety of financial, sales and

operational planning use cases across multiple industries.

Commercial Oracle Property Manager streamlines and automates lease

administration and space management, enabling you to

more intelligently manage your real estate portfolio.

Governance Oracle Fusion Governance, Risk, and Compliance (GRC),

a component of the Oracle Fusion Applications suite,

provides a complete enterprise GRC platform that gives

you:

The Power to Discover unified intelligence for insight into

the status of all GRC activities across the enterprise.

The Power to Manage end-to-end support for cross-

industry and industry-specific GRC processes.

9

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

The Power to Enforce best-in-class automated controls

that work across multiple business applications.

Endeca Oracle Endeca Information Discovery offers a complete

solution for agile data discovery across the enterprise,

empowering business user independence in balance with

IT governance. This unique platform offers fast, intuitive

access to both traditional analytic data, leveraging existing

enterprise investments, and non-traditional data, including

external and unstructured information. This allows

organizations unprecedented visibility into all relevant

information, to drive growth while saving time and reducing

cost.

Business Intelligence /

Performance Reporting OBIEE

and OSSM

Oracle Business Intelligence Enterprise Edition (OBIEE) is

an unmatched and comprehensive business intelligence

and analytics platform that delivers a full range of

capabilities—including interactive dashboards,

ad hoc queries, mobile analytics, notifications and alerts,

enterprise and financial reporting, scorecard and strategy

management, business process invocation, unstructured

search and collaboration, integrated systems management

and more.

OBIEE is built on a proven and modern technological

foundation that supports the highest workloads and most

complex deployments, while providing timely insights to

10

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

users across an enterprise at a low overall total cost of

ownership.

Database Services The oracle database is used for Oracle eBS, The database

is an object-relational database management system.

Development Services A service provided by developers in various programming

languages i.e. pl/sql, sql and java.

Supply Chain Management The Oracle E-Business Suite Supply Chain Management

family of applications integrates and automates all key

supply chain processes, from design, planning and

procurement to manufacturing and fulfilment, providing a

complete solution set to enable companies to power

information-driven value chains.

3. Airport Systems

– Security

Perimeter Intrusion Detection

System ( PIDS)

The system that is used to detect and prevent

unauthorised access to the airports perimeter.

Airport Permit Issuing System

(APIS)

Access Card Permit Issuing Systems.

Access Control and Permit

Issuing System

(Vehicle and Visitor Management

Systems)

Systems giving access to office and secure areas of the

airport.

Integrated Security Management

Systems (e.g. ISMS or PSIM)

Systems for integrating and managing all security systems.

2 Dimension Bar Code Systems The system is used to check passenger boarding pass

prior to accessing the secure site of the airport.

11

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

Digital Trunking Radio

Communication Systems and

Ground to Air Radio

Communication System

Two way digital radio communication systems used by

various departments.

Panic Alarm System Alarm systems used in an emergency situation.

Smart Security Integrated security system used at the security check point

for passenger processing.

Electronic Gates - Boarding and

Security Check Points

Electronic Gate Systems used to provide access to the

secure area of the airport and for processing passengers

through the boarding gates.

Security X-ray Training Software

( Safe Passage)

Training software used to training ACSA personnel on how

to use the X-Ray machines.

Close Circuit Television (CCTV),

Video Analytics and Facial

Recognitions

Surveillance system used for security and other

operational airport activities that require video footage.

4. Airport Systems

– Electronic

Services

Time and attendance ( time

keeper)

Time and attended systems used for employee clocking

purpose.

InfoGate Interactive KIOSK used for way finding and communication

to Passengers.

Display Technologies ( Screens

in different sizes, formats and

configuration)

Display systems includes TV and Large LED boards used

for flight information, advertising and television.

12

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

Common Use Terminal

Equipment and Common Use

Self Service

Self-service and common use equipment for passenger

processing (Boarding).

Foot Counting and Queue

Management System

Systems used to count number of people entering and

exiting the Airport or Specific area. This includes dwell time

and areas of high concentration.

Parking Solutions (Pay on foot,

License Plate Recognition

System, VMS and Bay

Detection) including merchant

bank interface for credit card

payment

All systems used at the parking areas to ensure passenger

are able to gain access, locate available parking. On

departure they are able to pay for parking using credit

cards and the vehicle are safe while parked at ACSA

airports through the LPR system.

Public Address (PA) and

Evacuation Systems

Public Address and evacuation system. Used for making

normal announcement and emergency announcement.

Community Access Television

(CATV)

Content Distribution Systems - Currently used to distribute

DSTV and Flight Information.

Building Management Systems Systems used to manage and monitor critical building

components - Travelator, Escalators and Lift etc.

Emergency and fire detection Systems used to detect fire and activate necessary sirens

and extinguishing equipment.

5. Airport Systems

– Airport

Application

Apex/Zeus Information platform for Airport Resources

Palladium (Health Safety Report) Safety Incident Reporting System.

Quality Management System Quality Management System.

13

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

Airport Management System Suite of systems for management of the airport used in the

main by AMC.

Security QMS/Incident Logging Security Incident Login System.

Viewing Deck SharePoint custom developed system to manage

passenger’s queries and feedback via short code SMS

services and emails

Slot Management (Score) System used for the management of the aircraft slot within

the airport.

Qlikview Business Intelligence tool.

SITATEX Custom developed system for airports used to update the

AODB with messages from airlines

6. Infrastructure -

Physical

Data Centres (Design, construct

and commission)

Physical IT Datacentres, and the construction.

Structured Cabling (Copper and

Fibre Systems)

All IT Cabling, Copper and Fibre, including Cable

management systems and trays

IT Environmental systems, IT Environmental monitoring systems, e.g., humidity,

temperature, leak detection

IT Fire suppression All types of IT Fire suppression and detection systems,

FM200, Argon etc.

IT Room construction Physical IT Rooms, and the construction

IT Power Systems (UPS, PDU) Uninterruptable Power Supplies, Power distributions

systems.

14

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

IT Cooling systems IT cooling systems, e.g. in-row cooling, down blow units,

free air-cooling.

7. Infrastructure –

CORE

Networks (CISCO) Switches and Routers. Access, distribution and Core.

Network security/Firewalls

(CISCO and CHECKPOINT)

All Network security related systems e.g. firewalls,

intrusion detection systems, intrusion prevention systems,

etc.

Servers (IBM and HP) Server hardware and related software, e.g. Blade systems,

rackmounts, etc.

Telephony (CISCO) IP Telephony systems including routers, handsets, video

conferencing

Storage (EMC VNX) Storage systems and related software. E.g.. Storage area

networks, Network attached storage, Flash systems

Storage Network (for Brocade

SAN Fabric Switches)

Fibre Channel switches.

Disaster Recovery Infrastructure

(EMC)

Systems to support Disaster recovery requirements, e.g.

RecoverPoint, Replication, etc.

Backups (for Avamar & Data

Domain)

Backup to disk systems.

End user devices (Laptops,

desktops, printer, screens,

projects etc.)

Laptops, desktops, printers, screens, projectors, tablets,

iPad, accessories.

Virtualisation (VMWare) VMware suite of products

Hyper Convergence (VMWare) Hyper converged infrastructure.

15

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

8. Business

Intelligence and

Analytics (Big

Data)

Presentation / Consumption /

Visualisation Capability (e.g.

Contextual Analytics, Business

Intelligence Tools etc.)

Business Intelligence and Analytics Layer that enables

delivery of business user / customer facing capabilities

thereby facilitating consumption of data, information,

intelligence and advanced analytics generated through

business data sourced from a variety of systems and

sources (internal and external, structured and unstructured

and streaming). The primary driver of this layer is

accessibility and ease with which data can be

discriminated. The capability takes many forms and varies

from business uses cases i.e. reports, dashboards with drill

down capability, advanced analytics and cognitive pattern

recognition capabilities.

Data Modelling Data Modelling is a concerned about development &

maintenance of conceptual data models, logical data

models and development & maintenance of physical data

models including physical databases design related data

structures. This is achieved through design of information

products for the development data modelling & database

design standards, review of data model & database design

quality and management of data model versioning and

integration.

Next Generation Enterprise Data

Warehouse / Big Data Platform

(e.g. Discovery Capability, etc.)

Data Modelling is a concerned about development &

maintenance of conceptual data models, logical data

models and development & maintenance of physical data

models including physical databases design related data

16

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

structures. This is achieved through design of information

products for the development data modelling & database

design standards, review of data model & database design

quality and management of data model versioning and

integration.

Integration Management Integration Management involves combining data residing

in different structured and unstructured sources and

providing users with a unified view of the data through an

extract load and transform (ETL) population processes.

Enterprise Service Bus (ESB) Enterprise Service Bus provides the messaging backbone

capability which does protocol conversion, message format

transformation, routing, accept and deliver messages from

various services and application which are linked to its

middleware. This is achieved through ESBs ability and

flexibility in allowing the services and applications to

interact with each other, independently of their location and

connectivity requirements.

Master Data Management Master and Meta Data Management is the single source of

basic business data used across all systems, applications,

and processes for an entire enterprise. This function

entails understanding of reference & master data

integration needs which informs definition and design of

data integration architecture. This includes implementation

and management of metadata environment, a process

which entails understanding meta data requirements,

17

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

defining, developing and maintaining the meta data

architecture and standards.

Enterprise Data Management Enterprise Data Management defines the data

management principles and standards against which data

efficacy can be achieved in order to facilitate delivery of

data that meets business requirements and to increase the

value derived from data assets. These include data

acquisition processes; data structures (taxonomy,

dictionary and classification) as well as data quality which

concerns itself with define data quality metrics & service

levels throughout its life cycle.

9. Enterprise

Architecture

Enterprise Architecture The Enterprise Architecture translate business vision and

strategy into effective enterprise change by creating,

communicating, and improving the key principles and

models that describe the enterprise’s future state and

enable its evolution. The focus is on enabling business and

IT leaders to make investment decisions that balance and

prioritise current operational demands, disruptions, and

opportunities with the longer-term strategic vision of the

organization

Business Process Architecture The Business Process Architecture conceptualises the

business process architecture at business operating and

capability / services model; designs the business process

landscape to support the key business functional areas

and develops an organisation wide business process

18

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

architecture framework that facilitates development of

business outcome based processes that are standardised,

repeatable, predictable and reliable

Application Architecture Application Architecture is designed to ensure that

application investments is informed by the business

requirements for supporting business outcomes in line with

the enterprise architecture operationalisation plans. This is

achieved through application portability, technology

independence, Interoperability, design for operations,

rationalisation of applications providing the same business

functionality as well as support, maintenance and

upgrades.

Technology Architecture Technology (Infrastructure) Architecture ensures designs

that enables cost effective delivery of the following

technology and infrastructure services; universal

connectivity, single logical network, mobility services, cloud

services and operations and maintenance of technologies

and infrastructure crucial to servicing business operational

needs. This is achieved through total cost of ownership

(TCO), minimise technology, product and configuration

diversity (Standardisation), technology outsourcing,

automated systems management, scalability and proactive

technology infrastructure renewal.

Security Architecture Security architecture is responsible for the development of

secure gateway services, security standards, assessment

19

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

protocols as well as monitoring of business security

exposure and risk, including ensuring that security

investments match the value of the assets being protected.

This is achieved by designing & Implementing data

security controls, manage data access permissions,

monitor user authentication & access behaviour, classify

information confidentiality, audit data security

Data/Information Architecture The Data / Information / Business Intelligence

Architecture’s primary function is to define, develop and

maintain an optimal enterprise data management and

business intelligence and analytics environment for the

organisation. Assess information needs vs leading practice

tools, platform in order to recommend appropriate steps to

ensure BI excellence. This function entails designing a

Morden Enterprise Information Architecture (EIA) in

coordination with Corporate IT practice and infrastructure

standards as well as ensuring that associated architectures

required to support business reporting and analytical

requirements are defined and in place.

Integration Architecture Integration Architecture is responsible for the enterprise

integration, reduction of integration complexity,

development of data exchange standards, shared

components and service orientated architecture.

10. Information

Security

Security Incident and Event

Solutions (SIEM)

SIEM software or hardware products and services that

combine security information management (SIM) and

20

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

security event management (SEM). They provide real-time

analysis of security alerts generated by network hardware

and applications.

Security Vulnerability Solutions Vulnerability management solutions are software or

hardware products that perform the cyclical practice of

identifying, classifying, remediating, and mitigating

vulnerabilities, especially in software and firmware.

End Point Security Solutions Endpoint security management refers to the security

processes or protocols for restricting network access from

individual mobile or computing devices as well as

performing malware protection.

Data Protection Solutions Data protection management (DPM) is the administration

of backup processes to ensure that tasks run on schedule,

and that data is securely backed up and recoverable. Good

data protection management means having effective

processes and methodologies in place to maintain data

integrity.

Web Content Scanning (Proxy)

Solutions

A secure Web gateway is a software or hardware product

or service that prevents unsecured traffic from entering an

internal network of an organization. It is used by

enterprises to protect their employees/users from

accessing and being infected by malicious Web traffic,

websites and viruses/malware.

Mail Content Scanning Solutions A secure Web gateway is a software or hardware product

or service that prevents unsecured traffic from entering an

21

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

internal network of an organization. It is used by

enterprises to protect their employees/users from

accessing and being infected by malicious email traffic or

viruses/malware.

Digital Certificate Solutions A software product or service that allows a person,

computer or organization to exchange information securely

over the Internet using the public key infrastructure (PKI).

A digital certificate may also be referred to as a public key

certificate.

Mobile Device Management

Solutions

Mobile device management (MDM) is an industry term for

the administration of mobile devices, such as

smartphones, tablet computers, laptops and desktop

computers. MDM is usually implemented with the use of a

third party product that has management features for

particular vendors of mobile devices.

Authentication and Access

Management Solutions

Identity and Access management (IAM) solutions are

software and hardware products that enable the right

individuals to access the right resources at the right times

and for the right reasons, and using the correct and verified

credentials.

Database Security Solutions Software or hardware products that perform measures

used to protect and secure a database or database

management software from illegitimate use and malicious

threats and attacks. It is a broad term that includes a

22

ANNEXURE A: SCOPE OF WORK

Discipline Technologies/Services Technologies/Services Descriptions

multitude of processes, tools and methodologies that

ensure security within a database environment.

Data Loss Prevention Solutions Software or hardware products that ensure that end users

do not send sensitive or critical information outside the

corporate network. The term is also used to describe

software products that help a network administrator control

what data end users can transfer.

IT Forensic Solutions Computer Forensics Solutions (also called cyberforensics)

refers to hardware and software products that perform

computer investigation and analysis techniques to gather

evidence of wrongdoing suitable for presentation in a court

of law.

The scope is not only limited to the systems/technologies listed above.

23

ANNEXURE A: SCOPE OF WORK

Section 4: Support and Maintenance Service

For every discipline applied for (except Discipline 10) under Section 3, the bidders are expected to provide the

services as listed on Discipline A below. For Discipline 10, the bidders are expected to provide the services as

per Discipline A, B and C below.

Discipline Technologies/Services

1. Support and Maintenance (A) Incident Management

Problem Management

Capacity Management

Performance Management

Configuration Management

Release Management

Change Control Management

2. Support and Maintenance (B) Software License Administration

Security Services

Service Continuity and Disaster Recovery

Security Incident and Event Management (SIEM)

Security Vulnerability Management (SVM)

End Point Security Management

Enterprise End Point Data Protection

3. Support and Maintenance (C) AntiVirus Management

Patch Management

Web Content Scanning (Proxy)

Mail Content Scanning

Digital Certificate Management

Mobile Device Management

Authentication and Access Management

Database Security Management

Data Loss Prevention Management

IT Forensic Services

The scope is not only limited to the systems/technologies listed above.