request for proposals for the appointment … - 2016... · performance reporting obiee and ossm...
TRANSCRIPT
1
ANNEXURE A: SCOPE OF WORK
REQUEST FOR PROPOSALS FOR THE APPOINTMENT OF A PANEL OF IT
ENTERPRISE SUPPLIER DEVELOPMENT SERVICE PROVIDERS FOR A PERIOD OF
FIVE YEARS AT AIRPORTS COMPANY SOUTH AFRICA.
Tender Number: : COR42/2016
ANNEXURE A: SCOPE OF WORK
Section 1: Introduction and Overview of scope of services
The scope of work will vary depending on the type of projects being undertaken at that time. The Qualifying
Small Enterprises (QSE) and Exempted Micro Enterprises (EME) will be appointed to serve on the panel of
IT Enterprise Supplier Development (ESD) service providers. These service providers are categorised as
follows:
Category 1 is for the QSE bidders.
EME bidder’s financial statements will be evaluated in order to split them into two “EME Categories”:
Category 2 will be for companies with turnover of less than R 5 000 000.00.
Category 3 will be for companies with turnover of between R 5 000 000.01 to R 10 000 000.00.
The Bidders who are appointed to serve on the panel of EDS will be allocated work through issuing of work
orders (as and when required) as follows:
ACSA will issue the work order/s to the Principal Service Provider who will then be required to partner
with the EDS service providers within a particular discipline to deliver on that work order.
ACSA may also allocate work order/s directly to the appointed QSE within a particular discipline who
will then be required to partner with the EME’s that are appointed in that discipline.
In cases where a work order is issued to the PSP, then the financial spent will be distributed as follows:
a maximum of 60% of the total contract price to the PSP and a minimum of 40% to the EDS.
In cases where a work order is issued to the QSE, then the financial spent will be distributed as
follows: maximum of 60% of the total contract price to the QSE and a minimum of 40% to the EMEs.
2
ANNEXURE A: SCOPE OF WORK
The final decision on the split of the 40% allocation will be made by ACSA prior to the work order being
issued.
The PSP and QSE’s will be expected to take insurance cover for particular work orders, the details will be
shared during the stage of issuing work orders. ACSA reserves the right to appoint other service provider/s
outside this panel should the service providers not address the business requirements and/or provide
uncompetitive quotes when responding to work orders.
3
ANNEXURE A: SCOPE OF WORK
Section 2: IT Structure
The IT organisational structure in support of the IT strategy balances efficiency with service delivery, whilst
enhancing IT Management capability.
Functional Area Description
IT Architecture and
Strategy
Planning and control of all activities related to IT Architecture & Strategy
including Business Relationship Management, IT Strategy & Innovation and
Enterprise Architecture.
IT Planning & Control IT Planning & Control including Financial Management, IT Commercialisation,
IT Sourcing, IT Asset Management and Asset Configuration Management.
IT Governance &
Resilience
Governance and Resilience including information Risk Management, Business
Continuity and Disaster Recovery Management and Data Governance and
Knowledge Management.
Service Development Planning, designing, building and implementation of IT services to meet
business needs. Oversight over Programme and Resource Management,
Change and Release Management, Business Analysis, Quality and Test
Management.
Service Integration Control of all activities related to Service integration including IT Project
Management and Solution Design.
Information Security Establish and management of information systems security including Security
Architecture and Security Operations oversight.
Service Management &
Operations
Management and monitoring of IT operational service levels and performance
with focus on Service Quality and Service Catalogue Management.
Enterprise Applications Key focus area is the implementation of Oracle as the ERP platform of choice
for ACSA. Enterprise Applications covers Channels, Information Management,
Business Enablement applications.
Airport Systems Management of all activities related to Airport Systems across all airport
operations (covering Airport Management, Landside, Passenger Processing,
Airside, Maintenance and Engineering, Security, Safety and Radio
Communications). This includes both electronic and airport operational
systems.
IT Infrastructure The IT Infrastructure has oversight over all network and technology
infrastructure for the nine airports and Corporate Office. This includes
amongst others:
Data centre management
Workplace and User Tools Management
Server management
Network and Connectivity
Communication tools and devices
4
ANNEXURE A: SCOPE OF WORK
Section 3: Supplying, Installing, Commissioning and Decommissioning Services
The QSE and EME’s are required to have experience in delivering IT projects as per the criteria set out below.
1. Implementing projects in the following areas:
Supplying, Installing and Configuration of Enterprise Applications projects and/or
Supplying, Installing and Configuration of Enterprise Applications - Oracle Technical Services projects
and/or
Supplying, Installing and Commissioning and decommissioning of Airport Systems - Security projects
and/or
Supplying, Installing and Commissioning and decommissioning of Airport Systems - Electronic
Systems projects and/or
Supplying, Installing and Commissioning and decommissioning of Airport Systems – Airport
Applications projects and/or
Supplying, Installing and Commissioning and decommissioning of IT Infrastructure - Physical projects
and/or
Supplying, Installing and Commissioning and decommissioning of IT Infrastructure - Core projects
and/or
Supplying, Installing and Commissioning and decommissioning of Information Security projects and/or
Delivery of Business Intelligence and Analytics (Big Data) projects and/or
Delivery of Enterprise Architecture and Planning projects.
2. Upgrading, Supporting and Maintaining new and existing systems within the disciplines listed above.
5
ANNEXURE A: SCOPE OF WORK
Below is a list of disciplines, technologies and service that are in operations within ACSA. Bidders responses should cover both the
(Supplying, Installing and Configuring and Commissioning/Decommissioning) and (Upgrade, Support and Maintenance) as the
appointment will be made for both areas for a specific discipline. Should a bidder respond to more than one discipline, the Bidders is
expected to indicate the priority of the disciplines they are applying for, should the bidder fail to provide the priority ACSA reserves
the right to prioritise the bidders response based on the evaluation scores.
QSE Bidders are expected to submit minimum of two (2) Original Equipment Manufacturer Certification/Accreditation/Implementation
Partnerships and/or Resale agreements in different technologies/services within the discipline they are applying for.
In cases where the OEM Certification/Accreditation/Implementation Partnerships and/or Resale agreements applies to multiple
technologies/services within a particular discipline, this will be counted as separate certifications for the purpose of allocating points.
6
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
1. Enterprise
Applications
IBM AIX AIX is an open operating system from IBM that is based on
a version of UNIX and ACSA is currently on version 6
IBM Websphere Message Broker
(including Java technologies)
Integration broker from the WebSphere product family that
allows business information to flow between disparate
applications across multiple hardware and software
platforms. It is used in conjunction with ESB.
IBM MQ Series IBM MQ is a standard for program-to-program messaging
across multiple platforms.
Systems Integration (ESB) IBM ESB is a service-oriented architecture (SOA). It
translates requests into the appropriate message types
and routes them to the appropriate provider.
BPM Development (IBM) IBM BPM is a comprehensive Business Process
Management Platform used to manage ACSA processes.
DB2 (IBM) DB2 is a Relational Database Management System that
runs on its Multiple Virtual Storage mainframe platform.
IBM DB2 contains database server products developed by
IBM. These products all support the relational model and
some products have been extended to support object-
relational features and non-relational structures.
Microsoft (.Net, SharePoint, SQL
Server, etc.)
SharePoint is a browser-based collaboration and
document management platform from Microsoft.
General Business Intelligence Business intelligence (BI) is an umbrella term that refers to
a variety of software applications used to analyze the
7
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
organisation raw data. BI as a discipline is made up of
several related activities, including data mining, online
analytical processing, querying and reporting.
2. Enterprise
Applications -
Oracle Technical
Services
E-Business Suite eBusiness suite
(R12.1.3)
Oracle E-Business Suite is a comprehensive suite of
integrated, business applications that enable organizations
to make better decisions, reduce costs, and increase
performance.
Human Resources Core Oracle's E-Business Suite Human Capital Management
HRMS delivers a robust set of best-in-class human
resources functionality that enables you to increase
productivity, accelerate business performance, and lower
your cost of ownership.
Cloud Solution Human
Resources
Modern HR differentiates the business with a talent centric
and consumer based strategy that leverages technology to
provide a collaborative, insightful, engaging and mobile
HR, employee and executive experience. Oracle HCM
Cloud enables modern human resources to find and retain
the best talent and increase global agility.
Supplier Lifecycle Management Oracle Supplier Lifecycle Management is the supplier
development application that transforms qualification,
administration, and assessment. With Oracle Supplier
Lifecycle Management organizations can streamline
registration and review of prospective suppliers, enable
cross functional performance evaluation, and assure
8
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
effective governance and risk mitigation. It is a key
component of Oracle Advanced Procurement, the
integrated suite that dramatically cuts all supply
management costs.
Finance Oracle E-Business Suite Financials allow you to increase
efficiency and reduce back-office costs with standardized
processes for shared services, productivity tools, and
integrated performance management.
Cloud Solution Finance Oracle Planning and Budgeting Cloud Service is a
planning, budgeting, and forecasting solution. PBCS
provides a rich Web and Microsoft Office work environment
that has solved a wide variety of financial, sales and
operational planning use cases across multiple industries.
Commercial Oracle Property Manager streamlines and automates lease
administration and space management, enabling you to
more intelligently manage your real estate portfolio.
Governance Oracle Fusion Governance, Risk, and Compliance (GRC),
a component of the Oracle Fusion Applications suite,
provides a complete enterprise GRC platform that gives
you:
The Power to Discover unified intelligence for insight into
the status of all GRC activities across the enterprise.
The Power to Manage end-to-end support for cross-
industry and industry-specific GRC processes.
9
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
The Power to Enforce best-in-class automated controls
that work across multiple business applications.
Endeca Oracle Endeca Information Discovery offers a complete
solution for agile data discovery across the enterprise,
empowering business user independence in balance with
IT governance. This unique platform offers fast, intuitive
access to both traditional analytic data, leveraging existing
enterprise investments, and non-traditional data, including
external and unstructured information. This allows
organizations unprecedented visibility into all relevant
information, to drive growth while saving time and reducing
cost.
Business Intelligence /
Performance Reporting OBIEE
and OSSM
Oracle Business Intelligence Enterprise Edition (OBIEE) is
an unmatched and comprehensive business intelligence
and analytics platform that delivers a full range of
capabilities—including interactive dashboards,
ad hoc queries, mobile analytics, notifications and alerts,
enterprise and financial reporting, scorecard and strategy
management, business process invocation, unstructured
search and collaboration, integrated systems management
and more.
OBIEE is built on a proven and modern technological
foundation that supports the highest workloads and most
complex deployments, while providing timely insights to
10
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
users across an enterprise at a low overall total cost of
ownership.
Database Services The oracle database is used for Oracle eBS, The database
is an object-relational database management system.
Development Services A service provided by developers in various programming
languages i.e. pl/sql, sql and java.
Supply Chain Management The Oracle E-Business Suite Supply Chain Management
family of applications integrates and automates all key
supply chain processes, from design, planning and
procurement to manufacturing and fulfilment, providing a
complete solution set to enable companies to power
information-driven value chains.
3. Airport Systems
– Security
Perimeter Intrusion Detection
System ( PIDS)
The system that is used to detect and prevent
unauthorised access to the airports perimeter.
Airport Permit Issuing System
(APIS)
Access Card Permit Issuing Systems.
Access Control and Permit
Issuing System
(Vehicle and Visitor Management
Systems)
Systems giving access to office and secure areas of the
airport.
Integrated Security Management
Systems (e.g. ISMS or PSIM)
Systems for integrating and managing all security systems.
2 Dimension Bar Code Systems The system is used to check passenger boarding pass
prior to accessing the secure site of the airport.
11
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
Digital Trunking Radio
Communication Systems and
Ground to Air Radio
Communication System
Two way digital radio communication systems used by
various departments.
Panic Alarm System Alarm systems used in an emergency situation.
Smart Security Integrated security system used at the security check point
for passenger processing.
Electronic Gates - Boarding and
Security Check Points
Electronic Gate Systems used to provide access to the
secure area of the airport and for processing passengers
through the boarding gates.
Security X-ray Training Software
( Safe Passage)
Training software used to training ACSA personnel on how
to use the X-Ray machines.
Close Circuit Television (CCTV),
Video Analytics and Facial
Recognitions
Surveillance system used for security and other
operational airport activities that require video footage.
4. Airport Systems
– Electronic
Services
Time and attendance ( time
keeper)
Time and attended systems used for employee clocking
purpose.
InfoGate Interactive KIOSK used for way finding and communication
to Passengers.
Display Technologies ( Screens
in different sizes, formats and
configuration)
Display systems includes TV and Large LED boards used
for flight information, advertising and television.
12
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
Common Use Terminal
Equipment and Common Use
Self Service
Self-service and common use equipment for passenger
processing (Boarding).
Foot Counting and Queue
Management System
Systems used to count number of people entering and
exiting the Airport or Specific area. This includes dwell time
and areas of high concentration.
Parking Solutions (Pay on foot,
License Plate Recognition
System, VMS and Bay
Detection) including merchant
bank interface for credit card
payment
All systems used at the parking areas to ensure passenger
are able to gain access, locate available parking. On
departure they are able to pay for parking using credit
cards and the vehicle are safe while parked at ACSA
airports through the LPR system.
Public Address (PA) and
Evacuation Systems
Public Address and evacuation system. Used for making
normal announcement and emergency announcement.
Community Access Television
(CATV)
Content Distribution Systems - Currently used to distribute
DSTV and Flight Information.
Building Management Systems Systems used to manage and monitor critical building
components - Travelator, Escalators and Lift etc.
Emergency and fire detection Systems used to detect fire and activate necessary sirens
and extinguishing equipment.
5. Airport Systems
– Airport
Application
Apex/Zeus Information platform for Airport Resources
Palladium (Health Safety Report) Safety Incident Reporting System.
Quality Management System Quality Management System.
13
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
Airport Management System Suite of systems for management of the airport used in the
main by AMC.
Security QMS/Incident Logging Security Incident Login System.
Viewing Deck SharePoint custom developed system to manage
passenger’s queries and feedback via short code SMS
services and emails
Slot Management (Score) System used for the management of the aircraft slot within
the airport.
Qlikview Business Intelligence tool.
SITATEX Custom developed system for airports used to update the
AODB with messages from airlines
6. Infrastructure -
Physical
Data Centres (Design, construct
and commission)
Physical IT Datacentres, and the construction.
Structured Cabling (Copper and
Fibre Systems)
All IT Cabling, Copper and Fibre, including Cable
management systems and trays
IT Environmental systems, IT Environmental monitoring systems, e.g., humidity,
temperature, leak detection
IT Fire suppression All types of IT Fire suppression and detection systems,
FM200, Argon etc.
IT Room construction Physical IT Rooms, and the construction
IT Power Systems (UPS, PDU) Uninterruptable Power Supplies, Power distributions
systems.
14
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
IT Cooling systems IT cooling systems, e.g. in-row cooling, down blow units,
free air-cooling.
7. Infrastructure –
CORE
Networks (CISCO) Switches and Routers. Access, distribution and Core.
Network security/Firewalls
(CISCO and CHECKPOINT)
All Network security related systems e.g. firewalls,
intrusion detection systems, intrusion prevention systems,
etc.
Servers (IBM and HP) Server hardware and related software, e.g. Blade systems,
rackmounts, etc.
Telephony (CISCO) IP Telephony systems including routers, handsets, video
conferencing
Storage (EMC VNX) Storage systems and related software. E.g.. Storage area
networks, Network attached storage, Flash systems
Storage Network (for Brocade
SAN Fabric Switches)
Fibre Channel switches.
Disaster Recovery Infrastructure
(EMC)
Systems to support Disaster recovery requirements, e.g.
RecoverPoint, Replication, etc.
Backups (for Avamar & Data
Domain)
Backup to disk systems.
End user devices (Laptops,
desktops, printer, screens,
projects etc.)
Laptops, desktops, printers, screens, projectors, tablets,
iPad, accessories.
Virtualisation (VMWare) VMware suite of products
Hyper Convergence (VMWare) Hyper converged infrastructure.
15
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
8. Business
Intelligence and
Analytics (Big
Data)
Presentation / Consumption /
Visualisation Capability (e.g.
Contextual Analytics, Business
Intelligence Tools etc.)
Business Intelligence and Analytics Layer that enables
delivery of business user / customer facing capabilities
thereby facilitating consumption of data, information,
intelligence and advanced analytics generated through
business data sourced from a variety of systems and
sources (internal and external, structured and unstructured
and streaming). The primary driver of this layer is
accessibility and ease with which data can be
discriminated. The capability takes many forms and varies
from business uses cases i.e. reports, dashboards with drill
down capability, advanced analytics and cognitive pattern
recognition capabilities.
Data Modelling Data Modelling is a concerned about development &
maintenance of conceptual data models, logical data
models and development & maintenance of physical data
models including physical databases design related data
structures. This is achieved through design of information
products for the development data modelling & database
design standards, review of data model & database design
quality and management of data model versioning and
integration.
Next Generation Enterprise Data
Warehouse / Big Data Platform
(e.g. Discovery Capability, etc.)
Data Modelling is a concerned about development &
maintenance of conceptual data models, logical data
models and development & maintenance of physical data
models including physical databases design related data
16
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
structures. This is achieved through design of information
products for the development data modelling & database
design standards, review of data model & database design
quality and management of data model versioning and
integration.
Integration Management Integration Management involves combining data residing
in different structured and unstructured sources and
providing users with a unified view of the data through an
extract load and transform (ETL) population processes.
Enterprise Service Bus (ESB) Enterprise Service Bus provides the messaging backbone
capability which does protocol conversion, message format
transformation, routing, accept and deliver messages from
various services and application which are linked to its
middleware. This is achieved through ESBs ability and
flexibility in allowing the services and applications to
interact with each other, independently of their location and
connectivity requirements.
Master Data Management Master and Meta Data Management is the single source of
basic business data used across all systems, applications,
and processes for an entire enterprise. This function
entails understanding of reference & master data
integration needs which informs definition and design of
data integration architecture. This includes implementation
and management of metadata environment, a process
which entails understanding meta data requirements,
17
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
defining, developing and maintaining the meta data
architecture and standards.
Enterprise Data Management Enterprise Data Management defines the data
management principles and standards against which data
efficacy can be achieved in order to facilitate delivery of
data that meets business requirements and to increase the
value derived from data assets. These include data
acquisition processes; data structures (taxonomy,
dictionary and classification) as well as data quality which
concerns itself with define data quality metrics & service
levels throughout its life cycle.
9. Enterprise
Architecture
Enterprise Architecture The Enterprise Architecture translate business vision and
strategy into effective enterprise change by creating,
communicating, and improving the key principles and
models that describe the enterprise’s future state and
enable its evolution. The focus is on enabling business and
IT leaders to make investment decisions that balance and
prioritise current operational demands, disruptions, and
opportunities with the longer-term strategic vision of the
organization
Business Process Architecture The Business Process Architecture conceptualises the
business process architecture at business operating and
capability / services model; designs the business process
landscape to support the key business functional areas
and develops an organisation wide business process
18
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
architecture framework that facilitates development of
business outcome based processes that are standardised,
repeatable, predictable and reliable
Application Architecture Application Architecture is designed to ensure that
application investments is informed by the business
requirements for supporting business outcomes in line with
the enterprise architecture operationalisation plans. This is
achieved through application portability, technology
independence, Interoperability, design for operations,
rationalisation of applications providing the same business
functionality as well as support, maintenance and
upgrades.
Technology Architecture Technology (Infrastructure) Architecture ensures designs
that enables cost effective delivery of the following
technology and infrastructure services; universal
connectivity, single logical network, mobility services, cloud
services and operations and maintenance of technologies
and infrastructure crucial to servicing business operational
needs. This is achieved through total cost of ownership
(TCO), minimise technology, product and configuration
diversity (Standardisation), technology outsourcing,
automated systems management, scalability and proactive
technology infrastructure renewal.
Security Architecture Security architecture is responsible for the development of
secure gateway services, security standards, assessment
19
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
protocols as well as monitoring of business security
exposure and risk, including ensuring that security
investments match the value of the assets being protected.
This is achieved by designing & Implementing data
security controls, manage data access permissions,
monitor user authentication & access behaviour, classify
information confidentiality, audit data security
Data/Information Architecture The Data / Information / Business Intelligence
Architecture’s primary function is to define, develop and
maintain an optimal enterprise data management and
business intelligence and analytics environment for the
organisation. Assess information needs vs leading practice
tools, platform in order to recommend appropriate steps to
ensure BI excellence. This function entails designing a
Morden Enterprise Information Architecture (EIA) in
coordination with Corporate IT practice and infrastructure
standards as well as ensuring that associated architectures
required to support business reporting and analytical
requirements are defined and in place.
Integration Architecture Integration Architecture is responsible for the enterprise
integration, reduction of integration complexity,
development of data exchange standards, shared
components and service orientated architecture.
10. Information
Security
Security Incident and Event
Solutions (SIEM)
SIEM software or hardware products and services that
combine security information management (SIM) and
20
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
security event management (SEM). They provide real-time
analysis of security alerts generated by network hardware
and applications.
Security Vulnerability Solutions Vulnerability management solutions are software or
hardware products that perform the cyclical practice of
identifying, classifying, remediating, and mitigating
vulnerabilities, especially in software and firmware.
End Point Security Solutions Endpoint security management refers to the security
processes or protocols for restricting network access from
individual mobile or computing devices as well as
performing malware protection.
Data Protection Solutions Data protection management (DPM) is the administration
of backup processes to ensure that tasks run on schedule,
and that data is securely backed up and recoverable. Good
data protection management means having effective
processes and methodologies in place to maintain data
integrity.
Web Content Scanning (Proxy)
Solutions
A secure Web gateway is a software or hardware product
or service that prevents unsecured traffic from entering an
internal network of an organization. It is used by
enterprises to protect their employees/users from
accessing and being infected by malicious Web traffic,
websites and viruses/malware.
Mail Content Scanning Solutions A secure Web gateway is a software or hardware product
or service that prevents unsecured traffic from entering an
21
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
internal network of an organization. It is used by
enterprises to protect their employees/users from
accessing and being infected by malicious email traffic or
viruses/malware.
Digital Certificate Solutions A software product or service that allows a person,
computer or organization to exchange information securely
over the Internet using the public key infrastructure (PKI).
A digital certificate may also be referred to as a public key
certificate.
Mobile Device Management
Solutions
Mobile device management (MDM) is an industry term for
the administration of mobile devices, such as
smartphones, tablet computers, laptops and desktop
computers. MDM is usually implemented with the use of a
third party product that has management features for
particular vendors of mobile devices.
Authentication and Access
Management Solutions
Identity and Access management (IAM) solutions are
software and hardware products that enable the right
individuals to access the right resources at the right times
and for the right reasons, and using the correct and verified
credentials.
Database Security Solutions Software or hardware products that perform measures
used to protect and secure a database or database
management software from illegitimate use and malicious
threats and attacks. It is a broad term that includes a
22
ANNEXURE A: SCOPE OF WORK
Discipline Technologies/Services Technologies/Services Descriptions
multitude of processes, tools and methodologies that
ensure security within a database environment.
Data Loss Prevention Solutions Software or hardware products that ensure that end users
do not send sensitive or critical information outside the
corporate network. The term is also used to describe
software products that help a network administrator control
what data end users can transfer.
IT Forensic Solutions Computer Forensics Solutions (also called cyberforensics)
refers to hardware and software products that perform
computer investigation and analysis techniques to gather
evidence of wrongdoing suitable for presentation in a court
of law.
The scope is not only limited to the systems/technologies listed above.
23
ANNEXURE A: SCOPE OF WORK
Section 4: Support and Maintenance Service
For every discipline applied for (except Discipline 10) under Section 3, the bidders are expected to provide the
services as listed on Discipline A below. For Discipline 10, the bidders are expected to provide the services as
per Discipline A, B and C below.
Discipline Technologies/Services
1. Support and Maintenance (A) Incident Management
Problem Management
Capacity Management
Performance Management
Configuration Management
Release Management
Change Control Management
2. Support and Maintenance (B) Software License Administration
Security Services
Service Continuity and Disaster Recovery
Security Incident and Event Management (SIEM)
Security Vulnerability Management (SVM)
End Point Security Management
Enterprise End Point Data Protection
3. Support and Maintenance (C) AntiVirus Management
Patch Management
Web Content Scanning (Proxy)
Mail Content Scanning
Digital Certificate Management
Mobile Device Management
Authentication and Access Management
Database Security Management
Data Loss Prevention Management
IT Forensic Services
The scope is not only limited to the systems/technologies listed above.