21
ACSA CONFIDENTIAL INFORMATION ANNEXURE B ACSA IT TECHNOLOGIES/SYSTEMS GUIDELINES

RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

  • Upload
    trannhi

  • View
    220

  • Download
    1

Embed Size (px)

Citation preview

Page 1: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION

ANNEXURE B

ACSA IT TECHNOLOGIES/SYSTEMS GUIDELINES

Page 2: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 2

Discipline Technologies/Services Technologies/Services Descriptions

1. Enterprise Applications

IBM AIX AIX is an open operating system from

IBM that is based on a version of

UNIX and ACSA is currently on

version 6

IBM Websphere Message

Broker (including Java

technologies)

Integration broker from the

WebSphere product family that

allows business information to flow

between disparate applications

across multiple hardware and

software platforms. It is used in

conjunction with ESB.

IBM MQ Series IBM MQ is a standard for program-to-

program messaging across multiple

platforms.

Systems Integration

(ESB)

IBM ESB is a service-oriented

architecture (SOA). It translates

requests into the appropriate

message types and routes them to

the appropriate provider.

BPM Development (IBM) IBM BPM is a comprehensive

Business Process Management

Platform used to manage ACSA

processes.

DB2 (IBM) DB2 is a Relational Database

Management System that runs on its

Multiple Virtual Storage mainframe

platform. IBM DB2 contains

database server products

developed by IBM. These products

all support the relational model

and some products have been

extended to support object-

relational features and non-

relational structures.

Page 3: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 3

Discipline Technologies/Services Technologies/Services Descriptions

Microsoft (.Net,

SharePoint, SQL Server,

etc.)

SharePoint is a browser-based

collaboration and document

management platform from Microsoft.

General Business

Intelligence and Analytics

Business Intelligence and Analytics

(BIA) is an umbrella term that refers

to a variety of software applications

used to analyze the organisation raw

data. BIA as a discipline is made up

of several related activities, including

data mining, online analytical

processing, querying and reporting.

2. Enterprise Applications - Oracle Technical Services

E-Business Suite

eBusiness suite (R12.1.3)

Oracle E-Business Suite is a

comprehensive suite of integrated,

business applications that enable

organizations to make better

decisions, reduce costs, and increase

performance.

Human Resources Core Oracle's E-Business Suite Human

Capital Management HRMS delivers

a robust set of best-in-class human

resources functionality that enables

you to increase productivity,

accelerate business performance,

and lower your cost of ownership.

Cloud Solution Human

Resources

Modern HR differentiates the

business with a talent centric and

consumer based strategy that

leverages technology to provide a

collaborative, insightful, engaging and

mobile HR, employee and executive

experience. Oracle HCM Cloud

enables modern human resources to

find and retain the best talent and

increase global agility.

Page 4: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 4

Discipline Technologies/Services Technologies/Services Descriptions

Supplier Lifecycle

Management

Oracle Supplier Lifecycle

Management is the supplier

development application that

transforms qualification,

administration, and assessment. With

Oracle Supplier Lifecycle

Management organizations can

streamline registration and review of

prospective suppliers, enable cross

functional performance evaluation,

and assure effective governance and

risk mitigation. It is a key component

of Oracle Advanced Procurement, the

integrated suite that dramatically cuts

all supply management costs.

Finance Oracle E-Business Suite Financials

allow you to increase efficiency and

reduce back-office costs with

standardized processes for shared

services, productivity tools, and

integrated performance management.

Cloud Solution Finance Oracle Planning and Budgeting Cloud

Service is a planning, budgeting, and

forecasting solution. PBCS provides

a rich Web and Microsoft Office work

environment that has solved a wide

variety of financial, sales and

operational planning use cases

across multiple industries.

Commercial Oracle Property Manager streamlines

and automates lease administration

and space management, enabling

you to more intelligently manage your

real estate portfolio.

Page 5: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 5

Discipline Technologies/Services Technologies/Services Descriptions

Governance Oracle Fusion Governance, Risk, and

Compliance (GRC), a component of

the Oracle Fusion Applications suite,

provides a complete enterprise GRC

platform that gives you:

The Power to Discover unified

intelligence for insight into the status

of all GRC activities across the

enterprise.

The Power to manage end-to-end

support for cross-industry and

industry-specific GRC processes.

The Power to Enforce best-in-class

automated controls that work across

multiple business applications.

Endeca Oracle Endeca Information Discovery

offers a complete solution for agile

data discovery across the enterprise,

empowering business user

independence in balance with IT

governance. This unique platform

offers fast, intuitive access to both

traditional analytic data, leveraging

existing enterprise investments, and

non-traditional data, including

external and unstructured

information. This allows organizations

unprecedented visibility into all

relevant information, to drive growth

while saving time and reducing cost.

Business Intelligence /

Performance Reporting

OBIEE and OSSM

Oracle Business Intelligence

Enterprise Edition (OBIEE) is an

unmatched and comprehensive

business intelligence and analytics

platform that delivers a full range of

Page 6: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 6

Discipline Technologies/Services Technologies/Services Descriptions capabilities—including interactive

dashboards,

Ad hoc queries, mobile analytics,

notifications and alerts, enterprise

and financial reporting, scorecard and

strategy management, business

process invocation, unstructured

search and collaboration, integrated

systems management and more.

OBIEE is built on a proven and

modern technological foundation that

supports the highest workloads and

most complex deployments, while

providing timely insights to users

across an enterprise at a low overall

total cost of ownership.

Database Services The oracle database is used for

Oracle eBS, The database is an

object-relational database

management system.

Development Services A service provided by developers in

various programming languages i.e.

pl/sql, sql and java.

Supply Chain

Management

The Oracle E-Business Suite Supply

Chain Management family of

applications integrates and

automates all key supply chain

processes, from design, planning and

procurement to manufacturing and

fulfilment, providing a complete

solution set to enable companies to

power information-driven value

chains.

IT Asset Management manages

distributed IT assets, including software

Page 7: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 7

Discipline Technologies/Services Technologies/Services Descriptions

Asset and Software

Management

and hardware to automatically reconcile

physical and financial IT inventory,

redeploy underutilized software, provide

service agents with visibility into actual

hardware/software configurations and

help meet growing compliance

requirements.

Asset Inventory and Tracking - use a

flexible system to add, transfer,

depreciate, and retire IT assets.

Asset Monitoring and Reporting -

account for, manage and protect the

integrity of service assets and

configuration items through the

service lifecycle by ensuring that only

authorised components are used and

only authorised changes are made

and reported.

Asset Risk Management - minimise

the number of quality and compliance

issues caused by incorrect or

inaccurate configuration of services

and assets.

Asset Maintenance and Support –

enable fully integrated solution for the

maintenance and support of assets

throughout their lifecycle to ensure

the right level of investment to meet

utilisation and financial goals.

3. Airport Systems – Security

Perimeter Intrusion

Detection System ( PIDS)

The system that is used to detect and

prevent unauthorised access to the

airports perimeter.

Airport Permit Issuing

System (APIS)

Access Card Permit Issuing Systems.

Page 8: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 8

Discipline Technologies/Services Technologies/Services Descriptions

Access Control and

Permit Issuing System

(Vehicle and Visitor

Management Systems)

Systems giving access to office and

secure areas of the airport.

Integrated Security

Management

Systems (e.g. ISMS or

PSIM)

Systems for integrating and

managing all security systems.

2 Dimension Bar Code

Systems

The system is used to check

passenger boarding pass prior to

accessing the secure site of the

airport.

Digital Trunking Radio

Communication

Systems and Ground to

Air Radio Communication

System

Two way digital radio communication

systems used by various

departments.

Panic Alarm System Alarm systems used in an emergency

situation.

Smart Security Integrated security system used at

the security check point for

passenger processing.

Electronic Gates -

Boarding and Security

Check Points

Electronic Gate Systems used to

provide access to the secure area of

the airport and for processing

passengers through the boarding

gates.

Security X-ray

Training Software ( Safe

Passage)

Training software used to training

ACSA personnel on how to use the

X-Ray machines.

Close Circuit Television

(CCTV), Video Analytics

and Facial Recognitions

Surveillance system used for security

and other operational airport activities

that require video footage.

Page 9: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 9

Discipline Technologies/Services Technologies/Services Descriptions

4. Airport Systems – Electronic Services

Time and attendance (

time keeper)

Time and attended systems used for

employee clocking purpose.

Interactive Kiosk

(InfoGate)

Interactive KIOSK used for way

finding and communication to

Passengers.

Display Technologies

(Screens in different

sizes, formats and

configuration)

Display systems includes TV and

Large LED boards used for flight

information, advertising and

television.

Common Use Terminal

Equipment and Common

Use Self Service

Self-service and common use

equipment for passenger processing

(Boarding).

Foot Counting and Queue

Management System

Systems used to count number of

people entering and exiting the

Airport or Specific area. This includes

dwell time and areas of high

concentration.

Parking Solutions (Pay on

foot, License Plate

Recognition System,

VMS and Bay Detection)

including merchant bank

interface for credit

card payment

All systems used at the parking areas

to ensure passenger are able to gain

access, locate available parking. On

departure they are able to pay for

parking using credit cards and the

vehicle are safe while parked at

ACSA airports through the LPR

system.

Public Address (PA) and

Evacuation Systems

Public Address and evacuation

system. Used for making normal

announcement and emergency

announcement.

Community Access

Television (CATV)

Content Distribution Systems -

Currently used to distribute DSTV

and Flight Information.

Page 10: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 10

Discipline Technologies/Services Technologies/Services Descriptions

Building Management

Systems

Systems used to manage and

monitor critical building components -

Travelator, Escalators and Lift etc.

Emergency and fire

detection

Systems used to detect fire and

activate necessary sirens and

extinguishing equipment.

5. Airport Systems – Airport Application

Apex/Zeus Information platform for Airport

Resources

Palladium (Health Safety

Report)

Safety Incident Reporting System.

Quality Management

System

Quality Management System.

Airport Management

System

Suite of systems for management of

the airport used in the main by AMC.

Security QMS/Incident

Logging

Security Incident Login System.

Viewing Deck SharePoint custom developed

system to manage passenger’s

queries and feedback via short code

SMS services and emails

Slot Management (Score) System used for the management of

the aircraft slot within the airport.

Qlikview Business Intelligence tool.

SITATEX Custom developed system for

airports used to update the AODB

with messages from airlines

Interactive Kiosk

(InfoGate)

Interactive KIOSK used for way

finding and communication to

Passengers.

6. Infrastructure - Physical

Data Centres (Design,

construct and

commission)

Physical IT Datacentres, and the

construction.

Page 11: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 11

Discipline Technologies/Services Technologies/Services Descriptions

Structured Cabling

(Copper and Fibre

Systems)

All IT Cabling, Copper and Fibre,

including Cable management

systems and trays

IT Environmental

systems,

IT Environmental monitoring systems,

e.g., humidity, temperature, leak

detection

IT Fire suppression All types of IT Fire suppression and

detection systems, FM200, Argon

etc.

IT Room construction Physical IT Rooms, and the

construction

IT Power Systems (UPS,

PDU)

Uninterruptable Power Supplies,

Power distributions systems.

IT Cooling systems IT cooling systems, e.g. in-row

cooling, down blow units, free air-

cooling.

7. Infrastructure – CORE

Networks (CISCO) Switches and Routers. (Access,

distribution and Core). Wireless

Network (Access Points and

Controllers), Element Management

platform (e.g. Cisco Prime).

Network security/Firewalls

(CISCO and

CHECKPOINT)

All Network security related systems

e.g. firewalls, intrusion detection

systems, intrusion prevention

systems, and management platform,

etc.

Servers (IBM and HP) Server hardware and related

software, e.g. Blade systems,

rackmounts, etc.

Telephony (CISCO) IP Telephony systems including

routers, handsets, video conferencing

Storage (EMC VNX) Storage systems and related

software e.g. Storage area networks,

Page 12: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 12

Discipline Technologies/Services Technologies/Services Descriptions Network attached storage, Flash

systems

Storage Network (for

Brocade SAN Fabric

Switches)

Fibre Channel switches.

Disaster Recovery

Infrastructure (EMC)

Systems to support Disaster recovery

requirements, e.g. RecoverPoint,

Replication, etc.

Backups (for Avamar &

Data Domain)

Backup to disk systems.

End user devices

(Laptops, desktops,

printer, screens, projects

etc.)

Laptops, desktops, printers, screens,

projectors, tablets, iPad, accessories.

Virtualisation (VMWare) VMware suite of products

Hyper Convergence

(VMWare)

Hyper converged infrastructure.

8. Business Intelligence and Analytics (Big Data)

Presentation /

Consumption /

Visualisation Capability

(e.g. Contextual Analytics,

Business Intelligence

Tools etc.)

Business Intelligence and Analytics

Layer that enables delivery of

business user / customer facing

capabilities thereby facilitating

consumption of data, information,

intelligence and advanced analytics

generated through business data

sourced from a variety of systems

and sources (internal and external,

structured and unstructured and

streaming). The primary driver of this

layer is accessibility and ease with

which data can be discriminated. The

capability takes many forms and

varies from business uses cases i.e.

reports, dashboards with drill down

capability, advanced analytics and

Page 13: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 13

Discipline Technologies/Services Technologies/Services Descriptions cognitive pattern recognition

capabilities.

Data Modelling Data Modelling is a concerned about

development & maintenance of

conceptual data models, logical data

models and development &

maintenance of physical data models

including physical databases design

related data structures. This is

achieved through design of

information products for the

development data modelling &

database design standards, review of

data model & database design quality

and management of data model

versioning and integration.

Next Generation

Enterprise Data

Warehouse / Big Data

Platform (e.g. Discovery

Capability, etc.)

Data Modelling is a concerned about

development & maintenance of

conceptual data models, logical data

models and development &

maintenance of physical data models

including physical databases design

related data structures. This is

achieved through design of

information products for the

development data modelling &

database design standards, review of

data model & database design quality

and management of data model

versioning and integration.

Integration Management Integration Management involves

combining data residing in different

structured and unstructured sources

and providing users with a unified

view of the data through an extract

Page 14: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 14

Discipline Technologies/Services Technologies/Services Descriptions load and transform (ETL) population

processes.

Enterprise Service Bus

(ESB)

Enterprise Service Bus provides the

messaging backbone capability which

does protocol conversion, message

format transformation, routing, accept

and deliver messages from various

services and application which are

linked to its middleware. This is

achieved through ESBs ability and

flexibility in allowing the services and

applications to interact with each

other, independently of their location

and connectivity requirements.

Master Data Management Master and Meta Data Management

is the single source of basic business

data used across all systems,

applications, and processes for an

entire enterprise. This function entails

understanding of reference & master

data integration needs which informs

definition and design of data

integration architecture. This includes

implementation and management of

metadata environment, a process

which entails understanding meta

data requirements, defining,

developing and maintaining the meta

data architecture and standards.

Enterprise Data

Management

Enterprise Data Management defines

the data management principles and

standards against which data efficacy

can be achieved in order to facilitate

delivery of data that meets business

requirements and to increase the

Page 15: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 15

Discipline Technologies/Services Technologies/Services Descriptions value derived from data assets.

These include data acquisition

processes; data structures

(taxonomy, dictionary and

classification) as well as data quality

which concerns itself with define data

quality metrics & service levels

throughout its life cycle.

9. Enterprise Architecture

Enterprise Architecture The Enterprise Architecture translate

business vision and strategy into

effective enterprise change by

creating, communicating, and

improving the key principles and

models that describe the enterprise’s

future state and enable its evolution.

The focus is on enabling business

and IT leaders to make investment

decisions that balance and prioritise

current operational demands,

disruptions, and opportunities with

the longer-term strategic vision of the

organization

Business Process

Architecture

The Business Process Architecture

conceptualises the business process

architecture at business operating

and capability / services model;

designs the business process

landscape to support the key

business functional areas and

develops an organisation wide

business process architecture

framework that facilitates

development of business outcome

based processes that are

Page 16: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 16

Discipline Technologies/Services Technologies/Services Descriptions standardised, repeatable, predictable

and reliable

Application Architecture Application Architecture is designed

to ensure that application

investments is informed by the

business requirements for supporting

business outcomes in line with the

enterprise architecture

operationalisation plans. This is

achieved through application

portability, technology independence,

Interoperability, design for operations,

rationalisation of applications

providing the same business

functionality as well as support,

maintenance and upgrades.

Technology Architecture Technology (Infrastructure)

Architecture ensures designs that

enables cost effective delivery of the

following technology and

infrastructure services; universal

connectivity, single logical network,

mobility services, cloud services and

operations and maintenance of

technologies and infrastructure

crucial to servicing business

operational needs. This is achieved

through total cost of ownership

(TCO), minimise technology, product

and configuration diversity

(Standardisation), technology

outsourcing, automated systems

management, scalability and

proactive technology infrastructure

renewal.

Page 17: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 17

Discipline Technologies/Services Technologies/Services Descriptions

Security Architecture Security architecture is responsible

for the development of secure

gateway services, security standards,

and assessment protocols as well as

monitoring of business security

exposure and risk, including ensuring

that security investments match the

value of the assets being protected.

This is achieved by designing &

Implementing data security controls,

manage data access permissions,

monitor user authentication & access

behaviour, classify information

confidentiality, audit data security

Data/Information

Architecture

The Data / Information / Business

Intelligence Architecture’s primary

function is to define, develop and

maintain an optimal enterprise data

management and business

intelligence and analytics

environment for the organisation.

Assess information needs vs leading

practice tools, platform in order to

recommend appropriate steps to

ensure BI excellence. This function

entails designing a Morden

Enterprise Information Architecture

(EIA) in coordination with Corporate

IT practice and infrastructure

standards as well as ensuring that

associated architectures required to

support business reporting and

analytical requirements are defined

and in place.

Page 18: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 18

Discipline Technologies/Services Technologies/Services Descriptions

Integration Architecture Integration Architecture is responsible

for the enterprise integration,

reduction of integration complexity,

development of data exchange

standards, shared components and

service orientated architecture.

10. Information Security

Security Incident and

Event Solutions (SIEM)

SIEM software or hardware products

and services that combine security

information management (SIM) and

security event management (SEM).

They provide real-time analysis of

security alerts generated by network

hardware and applications.

Security Vulnerability

Solutions

Vulnerability management solutions

are software or hardware products

that perform the cyclical practice of

identifying, classifying, remediating,

and mitigating vulnerabilities,

especially in software and firmware.

End Point Security

Solutions

Endpoint security management refers

to the security processes or protocols

for restricting network access from

individual mobile or computing

devices as well as performing

malware protection.

Data Protection Solutions Data protection management (DPM)

is the administration of backup

processes to ensure that tasks run on

schedule, and that data is securely

backed up and recoverable. Good

data protection management means

having effective processes and

methodologies in place to maintain

data integrity.

Page 19: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 19

Discipline Technologies/Services Technologies/Services Descriptions

Web Content Scanning

(Proxy) Solutions

A secure Web gateway is a software

or hardware product or service that

prevents unsecured traffic from

entering an internal network of an

organization. It is used by enterprises

to protect their employees/users from

accessing and being infected by

malicious Web traffic, websites and

viruses/malware.

Mail Content Scanning

Solutions

A secure Web gateway is a software

or hardware product or service that

prevents unsecured traffic from

entering an internal network of an

organization. It is used by enterprises

to protect their employees/users from

accessing and being infected by

malicious email traffic or

viruses/malware.

Digital Certificate

Solutions

A software product or service that

allows a person, computer or

organization to exchange information

securely over the Internet using the

public key infrastructure (PKI). A

digital certificate may also be referred

to as a public key certificate.

Mobile Device

Management Solutions

Mobile device management (MDM) is

an industry term for the

administration of mobile devices,

such as smartphones, tablet

computers, laptops and desktop

computers. MDM is usually

implemented with the use of a third

party product that has management

features for particular vendors of

mobile devices.

Page 20: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 20

Discipline Technologies/Services Technologies/Services Descriptions

Authentication and

Access Management

Solutions

Identity and Access management

(IAM) solutions are software and

hardware products that enable the

right individuals to access the right

resources at the right times and for

the right reasons, and using the

correct and verified credentials.

Database Security

Solutions

Software or hardware products that

perform measures used to protect

and secure a database or database

management software from

illegitimate use and malicious threats

and attacks. It is a broad term that

includes a multitude of processes,

tools and methodologies that ensure

security within a database

environment.

Data Loss Prevention

Solutions

Software or hardware products that

ensure that end users do not send

sensitive or critical information

outside the corporate network. The

term is also used to describe

software products that help a network

administrator control what data end

users can transfer.

IT Forensic Solutions Computer Forensics Solutions (also

called cyberforensics) refers to

hardware and software products that

perform computer investigation and

analysis techniques to gather

evidence of wrongdoing suitable for

presentation in a court of law.

11. IT Planning and Control

IT Commercialisation IT Commercialisation introduces existing and

new products/ services from ACSA IT to

internal and external customers for sale.

Page 21: RFP Response Document - etenders.gov.za B - IT... · IBM Websphere Message ... IBM MQ Series IBM MQ is a standard for program-to- ... administration, and assessment. With

ACSA CONFIDENTIAL INFORMATION PAGE 21

Discipline Technologies/Services Technologies/Services Descriptions

Customer Identification,

Validation and

Commercial Assessment

Understand IT’s customer’s (internal

and external) unmet needs within the

frame work of ACSA’s strategic

focus. Analyse those needs &

prioritise opportunities with the most

promising return on IT investments.

Intellectual Property and

Contract Management

Devise, customise and operate

appropriate financial models to

support the valuation and

assessment of intellectual property

assigned to ACSA IT clients and

developing associated contracts.

Product/ Service Pricing

Models

Assess the value and demand of

technologies/ services proposed and

establish pricing models.

Product/ Service

Licensing Models

Assess the value of technologies

targeted for licensing and establish

licensing models.

Product/ Service Support

Models

Measure technology adoption,

performance, develop SLAs and

support models.

Product/ Service Launch

Strategies

Setup the product/ service internally

from a costing, BOM’s and routings

perspective and provide the

merchandising and IT teams with the

relevant content to publish – images,

positioning, pricing.