View
213
Download
0
Category
Preview:
Citation preview
REQUEST FOR PROPOSALS FOR THE APPOINTMENT OF A PANEL OF IT ENTERPRISE SUPPLIER DEVELOPMENT SERVICE PROVIDERS FOR A PERIOD OF FIVE YEARS AT AIRPORTS COMPANY SOUTH AFRICA.
Tender Number: : COR42/2016
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
1. Enterprise Applications
IBM AIX AIX is an open operating system
from IBM that is based on a version
of UNIX and ACSA is currently on
version 6
IBM Websphere
Message Broker
(including Java
technologies)
Integration broker from the
WebSphere product family that
allows business information to flow
between disparate applications
across multiple hardware and
software platforms. It is used in
conjunction with ESB.
IBM MQ Series IBM MQ is a standard for program-
to-program messaging across
multiple platforms.
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Systems Integration
(ESB)
IBM ESB is a service-oriented
architecture (SOA). It translates
requests into the appropriate
message types and routes them to
the appropriate provider.
BPM Development
(IBM)
IBM BPM is a comprehensive
Business Process Management
Platform used to manage ACSA
processes.
DB2 (IBM) DB2 is a Relational Database
Management System that runs on
its Multiple Virtual Storage
mainframe platform. IBM DB2
contains database server products
developed by IBM. These products
all support the relational model and
some products have been extended
to support object-relational features
and non-relational structures.
Microsoft (.Net,
SharePoint, SQL
SharePoint is a browser-based
collaboration and document
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Server, etc.) management platform from
Microsoft.
General Business
Intelligence
Business intelligence (BI) is an
umbrella term that refers to a
variety of software applications
used to analyze the organisation
raw data. BI as a discipline is made
up of several related activities,
including data mining, online
analytical processing, querying and
reporting.
2. Enterprise Applications - Oracle Technical Services
E-Business Suite
eBusiness suite
(R12.1.3)
Oracle E-Business Suite is a
comprehensive suite of integrated,
business applications that enable
organizations to make better
decisions, reduce costs, and
increase performance.
Human Resources
Core
Oracle's E-Business Suite Human
Capital Management HRMS
delivers a robust set of best-in-class
human resources functionality that
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
enables you to increase
productivity, accelerate business
performance, and lower your cost of
ownership.
Cloud Solution
Human Resources
Modern HR differentiates the
business with a talent centric and
consumer based strategy that
leverages technology to provide a
collaborative, insightful, engaging
and mobile HR, employee and
executive experience. Oracle HCM
Cloud enables modern human
resources to find and retain the best
talent and increase global agility.
Supplier Lifecycle
Management
Oracle Supplier Lifecycle
Management is the supplier
development application that
transforms qualification,
administration, and assessment.
With Oracle Supplier Lifecycle
Management organizations can
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
streamline registration and review
of prospective suppliers, enable
cross functional performance
evaluation, and assure effective
governance and risk mitigation. It is
a key component of Oracle
Advanced Procurement, the
integrated suite that dramatically
cuts all supply management costs.
Finance Oracle E-Business Suite Financials
allow you to increase efficiency and
reduce back-office costs with
standardized processes for shared
services, productivity tools, and
integrated performance
management.
Cloud Solution
Finance
Oracle Planning and Budgeting
Cloud Service is a planning,
budgeting, and forecasting solution.
PBCS provides a rich Web and
Microsoft Office work environment
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
that has solved a wide variety of
financial, sales and operational
planning use cases across multiple
industries.
Commercial Oracle Property Manager
streamlines and automates lease
administration and space
management, enabling you to more
intelligently manage your real
estate portfolio.
Governance Oracle Fusion Governance, Risk,
and Compliance (GRC), a
component of the Oracle Fusion
Applications suite, provides a
complete enterprise GRC platform
that gives you:
The Power to Discover—unified
intelligence for insight into the
status of all GRC activities across
the enterprise.
The Power to Manage—end-to-end
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
support for cross-industry and
industry-specific GRC processes.
The Power to Enforce—best-in-
class automated controls that work
across multiple business
applications.
Endeca Oracle Endeca Information
Discovery offers a complete
solution for agile data discovery
across the enterprise, empowering
business user independence in
balance with IT governance. This
unique platform offers fast, intuitive
access to both traditional analytic
data, leveraging existing enterprise
investments, and non-traditional
data, including external and
unstructured information. This
allows organizations unprecedented
visibility into all relevant information,
to drive growth while saving time
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
and reducing cost.
Business Intelligence
/ Performance
Reporting OBIEE
and OSSM
Oracle Business Intelligence
Enterprise Edition (OBIEE) is an
unmatched and comprehensive
business intelligence and analytics
platform that delivers a full range of
capabilities—including interactive
dashboards,
ad hoc queries, mobile analytics,
notifications and alerts, enterprise
and financial reporting, scorecard
and strategy management,
business process invocation,
unstructured search and
collaboration, integrated systems
management and more.
OBIEE is built on a proven and
modern technological foundation
that supports the highest workloads
and most complex deployments,
while providing timely insights to
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
users across an enterprise at a low
overall total cost of ownership.
Database Services The oracle database is used for
Oracle eBS, The database is an
object-relational database
management system.
Development
Services
A service provided by developers in
various programming languages i.e.
pl/sql, sql and java.
Supply Chain
Management
The Oracle E-Business Suite
Supply Chain Management family
of applications integrates and
automates all key supply chain
processes, from design, planning
and procurement to manufacturing
and fulfillment, providing a complete
solution set to enable companies to
power information-driven value
chains.
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
3. Airport Systems – Security
Perimeter Intrusion
Detection System
( PIDS)
The system that is used to detect
and prevent unauthorised access to
the airports perimeter.
Airport Permit Issuing
System (APIS)
Access Card Permit Issuing
Systems.
Access Control and
Permit Issuing
System
(Vehicle and Visitor
Management
Systems)
Systems giving access to office and
secure areas of the airport.
Integrated Security
Management
Systems (e.g. ISMS
or PSIM)
Systems for integrating and
managing all security systems.
2 Dimension Bar
Code Systems
The system is used to check
passenger boarding pass prior to
accessing the secure site of the
airport.
Digital Trunking
Radio
Two way digital radio
communication systems used by
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Communication
Systems and
Ground to Air Radio
Communication
System
various departments.
Panic Alarm System Alarm systems used in an
emergency situation.
Smart Security Integrated security system used at
the security check point for
passenger processing.
Electronic Gates -
Boarding and
Security Check
Points
Electronic Gate Systems used to
provided access to the secure area
of the airport and for processing
passenger through the boarding
gate.
Security X-ray
Training Software
( Safe Passage)
Training software used to training
ACSA personnel on how to use the
X-Ray machines.
Close Circuit
Television (CCTV),
Video Analytics and
Surveillance system used for
security and other operational
airport activities that require video
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Facial Recognitions footage.
4. Airport Systems – Electronic Services
Time and attendance
( time keeper)
Time and attended systems used
for employee clocking purpose.
InfoGate Interactive KIOSK used for way
finding and communication to
Passengers.
Display Technologies
( Screens in different
sizes, formats and
configuration)
Display systems includes TV and
Large LED boards used for flight
information, advertising and
television.
Common Use
Terminal Equipment
and Common Use
Self Service
Self-service and common use
equipment for passenger
processing (Boarding).
Foot Counting and
Queue Management
System
Systems used to count number of
people entering and exiting the
Airport or Specific area. This
includes dwell time and areas of
high concentration.
Parking Solutions
(Pay on foot, License
All systems used at the parking
areas to ensure passenger are able
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Plate Recognition
System, VMS and
Bay Detection)
including merchant
bank interface for
credit card payment
to gain access, locate available
parking. On departure they are able
to pay for parking using credit cards
and the vehicle are safe while
parked at ACSA airports through
the LPR system.
Public Address (PA)
and Evacuation
Systems
Public Address and evacuation
system. Used for making normal
announcement and emergency
announcement.
Community Access
Television (CATV)
Content Distribution Systems -
Currently used to distribute DSTV
and Flight Information.
Building
Management
Systems
Systems used to manage and
monitor critical building components
- Travelator, Escalators and Lift etc.
Emergency and fire
detection
Systems used to detect fire and
activate necessary sirens and
extiquishing equipment.
5. Airport Systems –
Apex/Zeus Information platform for Airport
Resources
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Airport Application
Palladium (Health
Safety Report)
Safety Incident Reporting System.
Quality Management
System
Quality Management System.
Airport Management
System
Suite of systems for management
of the airport used in the main by
AMC.
Security
QMS/Incident
Logging
Security Incident Login System.
Viewing Deck SharePoint custom developed
system to manage passenger’s
queries and feedback via short
code SMS services and emails
Slot Management
(Score)
System used for the management
of the aircraft slot within the airport.
Qlikview Business Intelligence tool.
SITATEX Custom developed system for
airports used to update the AODB
with messages from airlines
6. Data Centres Physical IT Datacentres, and the
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Infrastructure - Physical
(Design, construct
and commission)
construction.
Structured Cabling
(Copper and Fibre
Systems)
All IT Cabling, Copper and Fibre,
including Cable management
systems and trays
IT Environmental
systems,
IT Environmental monitoring
systems, e.g., humidity,
temperature, leak detection
IT Fire suppression All types of IT Fire suppression and
detection systems, FM200, Argon
etc.
IT Room construction Physical IT Rooms, and the
construction
IT Power Systems
(UPS, PDU)
Uninterruptable Power Supplies,
Power distributions systems.
IT Cooling systems IT cooling systems, e.g. in-row
cooling, down blow units, free air-
cooling.
7. Infrastructure – CORE
Networks (CISCO) Switches and Routers. Access,
distribution and Core.
Network All Network security related
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
security/Firewalls
(CISCO and
CHECKPOINT)
systems e.g. firewalls, intrusion
detection systems, intrusion
prevention systems, etc.
Servers (IBM and
HP)
Server hardware and related
software, e.g. Blade systems,
rackmounts, etc.
Telephony (CISCO) IP Telephony systems including
routers, handsets, video
conferencing
Storage (EMC VNX) Storage systems and related
software. E.g.. Storage area
networks, Network attached
storage, Flash systems
Storage Network (for
Brocade SAN Fabric
Switches)
Fibre Channel switches.
Disaster Recovery
Infrastructure (EMC)
Systems to support Disaster
recovery requirements, e.g.
RecoverPoint, Replication, etc.
Backups (for Avamar
& Data Domain)
Backup to disk systems.
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
End user devices
(Laptops, desktops,
printer, screens,
projects etc.)
Laptops, desktops, printers,
screens, projectors, tablets,
ipad, accessories.
Virtualisation
(VMWare)
VMware suite of products
Hyper Convergence
(VMWare)
Hyper converged infrastructure.
8. Business Intelligence and Analytics (Big Data)
Presentation /
Consumption /
Visualisation
Capability (e.g.
Contextual Analytics,
Business Intelligence
Tools etc.)
Business Intelligence and Analytics
Layer that enables delivery of
business user / customer facing
capabilities thereby facilitating
consumption of data, information,
intelligence and advanced analytics
generated through business data
sourced from a variety of systems
and sources (internal and external,
structured and unstructured and
streaming). The primary driver of
this layer is accessibility and ease
with which data can be
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
discriminated. The capability takes
many forms and varies from
business uses cases i.e. reports,
dashboards with drill down
capability, advanced analytics and
cognitive pattern recognition
capabilities.
Data Modelling Data Modeling is a concerned
about development & maintenance
of conceptual data models, logical
data models and development &
maintenance of physical data
models including physical
databases design related data
structures. This is achieved through
design of information products for
the development data modelling &
database design standards, review
of data model & database design
quality and management of data
model versioning and integration.
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Next Generation
Enterprise Data
Warehouse / Big
Data Platform (e.g.
Discovery Capability,
etc.)
Data Modeling is a concerned
about development & maintenance
of conceptual data models, logical
data models and development &
maintenance of physical data
models including physical
databases design related data
structures. This is achieved through
design of information products for
the development data modelling &
database design standards, review
of data model & database design
quality and management of data
model versioning and integration.
Integration
Management
Integration Management involves
combining data residing in different
structured and unstructured
sources and providing users with a
unified view of the data through an
extract load and transform (ETL)
population processes.
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Enterprise Service
Bus (ESB)
Enterprise Service Bus provides the
messaging backbone capability
which does protocol conversion,
message format transformation,
routing, accept and deliver
messages from various services
and application which are linked to
its middleware. This is achieved
through ESBs ability and flexibility
in allowing the services and
applications to interact with each
other, independently of their
location and connectivity
requirements.
Master Data
Management
Master and Meta Data
Management is the single source of
basic business data used across all
systems, applications, and
processes for an entire enterprise.
This function entails understanding
of reference & master data
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
integration needs which informs
definition and design of data
integration architecture. This
includes implementation and
management of meta data
environment, a process which
entails understanding meta data
requirements, defining, developing
and maintaining the meta data
architecture and standards.
Enterprise Data
Management
Enterprise Data Management
defines the data management
principles and standards against
which data efficacy can be
achieved in order to facilitate
delivery of data that meets business
requirements and to increase the
value derived from data assets.
These include data acquisition
processes; data structures
(taxonomy, dictionary and
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
classification) as well as data
quality which concerns itself with
define data quality metrics &
service levels throughout its life
cycle.
9. Enterprise Architecture
Enterprise
Architecture
The Enterprise Architecture
translate business vision and
strategy into effective enterprise
change by creating,
communicating, and improving the
key principles and models that
describe the enterprise’s future
state and enable its evolution. The
focus is on enabling business and
IT leaders to make investment
decisions that balance and prioritise
current operational demands,
disruptions, and opportunities with
the longer-term strategic vision of
the organization
Business Process The Business Process Architecture
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Architecture conceptualises the business
process architecture at business
operating and capability / services
model; designs the business
process landscape to support the
key business functional areas and
develops an organisation wide
business process architecture
framework that facilitates
development of business outcome
based processes that are
standardised, repeatable,
predictable and reliable
Application
Architecture
Application Architecture is designed
to ensure that application
investments is informed by the
business requirements for
supporting business outcomes in
line with the enterprise architecture
operationalisation plans. This is
achieved through application
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
portability, technology
independence, Interoperability,
design for operations,
rationalisation of applications
providing the same business
functionality as well as support,
maintenance and upgrades.
Technology
Architecture
Technology (Infrastructure)
Architecture ensures designs that
enables cost effective delivery of
the following technology and
infrastructure services; uuniversal
connectivity, single logical network,
mobility services, cloud services
and operations and maintenance of
technologies and infrastructure
crucial to servicing business
operational needs. This is achieved
through total cost of ownership
(TCO), minimise technology,
product and configuration diversity
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
(Standardisation), technology
outsourcing, automated systems
management, scalability and
proactive technology infrastructure
renewal.
Security Architecture Security architecture is responsible
for the development of secure
gateway services, security
standards, assessment protocols as
well as monitoring of business
security exposure and risk,
including ensuring that security
investments match the value of the
assets being protected.. This is
achieved by designing &
Implementing data security
controls, manage data access
permissions, monitor user
authentication & access behaviour,
classify information confidentiality,
audit data security
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Data/Information
Architecture
The Data / Information / Business
Intelligence Architecture’s primary
function is to define, develop and
maintain an optimal enterprise data
management and business
intelligence and analytics
environment for the organisation.
Assess information needs vs
leading practice tools, platform in
order to recommend appropriate
steps to ensure BI excellence. This
function entails designing a Morden
Enterprise Information Architecture
(EIA) in coordination with Corporate
IT practice and infrastructure
standards as well as ensuring that
associated architectures required to
support business reporting and
analytical requirements are defined
and in place.
Integration Integration Architecture is
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Architecture responsible for the enterprise
integration, reduction of integration
complexity, development of data
exchange standards, shared
components and service orientated
architecture.
10. Information Security
Security Incident and
Event Solutions
(SIEM)
SIEM software or hardware
products and services that combine
security information management
(SIM) and security event
management (SEM). They provide
real-time analysis of security alerts
generated by network hardware
and applications.
Security Vulnerability
Solutions
Vulnerability management solutions
are software or hardware products
that perform the cyclical practice of
identifying, classifying, remediating,
and mitigating vulnerabilities,
especially in software and firmware.
End Point Security Endpoint security management
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Solutions refers to the security processes or
protocols for restricting network
access from individual mobile or
computing devices as well as
performing malware protection.
Data Protection
Solutions
Data protection management
(DPM) is the administration of
backup processes to ensure that
tasks run on schedule, and that
data is securely backed up and
recoverable. Good data protection
management means having
effective processes and
methodologies in place to maintain
data integrity.
Web Content
Scanning (Proxy)
Solutions
A secure Web gateway is a
software or hardware product or
service that prevents unsecured
traffic from entering an internal
network of an organization. It is
used by enterprises to protect their
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
employees/users from accessing
and being infected by malicious
Web traffic, websites and
viruses/malware.
Mail Content
Scanning Solutions
A secure Web gateway is a
software or hardware product or
service that prevents unsecured
traffic from entering an internal
network of an organization. It is
used by enterprises to protect their
employees/users from accessing
and being infected by malicious
email traffic or viruses/malware.
Digital Certificate
Solutions
A software product or service that
allows a person, computer or
organization to exchange
information securely over the
Internet using the public key
infrastructure (PKI). A digital
certificate may also be referred to
as a public key certificate.
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
Mobile Device
Management
Solutions
Mobile device management (MDM)
is an industry term for the
administration of mobile devices,
such as smartphones, tablet
computers, laptops and desktop
computers. MDM is usually
implemented with the use of a third
party product that has management
features for particular vendors of
mobile devices.
Authentication and
Access Management
Solutions
Identity and Access management
(IAM) solutions are software and
hardware products that enable the
right individuals to access the right
resources at the right times and for
the right reasons, and using the
correct and verified credentials.
Database Security
Solutions
Software or hardware products that
perform measures used to protect
and secure a database or database
management software from
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Discipline Selection of preferred Discipline (with an X)
Technologies/Services Technologies/Services Descriptions Indicate which Technology/Services does the bidder have experience on (with an X)QSE – Must select a minimum of 4EME – Must select a minimum of 2
illegitimate use and malicious
threats and attacks. It is a broad
term that includes a multitude of
processes, tools and methodologies
that ensure security within a
database environment.
Data Loss Prevention
Solutions
Software or hardware products that
ensure that end users do not send
sensitive or critical information
outside the corporate network. The
term is also used to describe
software products that help a
network administrator control what
data end users can transfer.
IT Forensic Solutions Computer Forensics Solutions (also
called cyberforensics) refers to
hardware and software products
that perform computer investigation
and analysis techniques to gather
evidence of wrongdoing suitable for
presentation in a court of law.
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
ANNEXURE D0: BIDDERS MUST MARK THE DISCIPLINE THEY ARE APPLYING UNDER COLOUN “DISCILINE”.
Recommended