Upload
trannhi
View
220
Download
1
Embed Size (px)
Citation preview
ACSA CONFIDENTIAL INFORMATION
ANNEXURE B
ACSA IT TECHNOLOGIES/SYSTEMS GUIDELINES
ACSA CONFIDENTIAL INFORMATION PAGE 2
Discipline Technologies/Services Technologies/Services Descriptions
1. Enterprise Applications
IBM AIX AIX is an open operating system from
IBM that is based on a version of
UNIX and ACSA is currently on
version 6
IBM Websphere Message
Broker (including Java
technologies)
Integration broker from the
WebSphere product family that
allows business information to flow
between disparate applications
across multiple hardware and
software platforms. It is used in
conjunction with ESB.
IBM MQ Series IBM MQ is a standard for program-to-
program messaging across multiple
platforms.
Systems Integration
(ESB)
IBM ESB is a service-oriented
architecture (SOA). It translates
requests into the appropriate
message types and routes them to
the appropriate provider.
BPM Development (IBM) IBM BPM is a comprehensive
Business Process Management
Platform used to manage ACSA
processes.
DB2 (IBM) DB2 is a Relational Database
Management System that runs on its
Multiple Virtual Storage mainframe
platform. IBM DB2 contains
database server products
developed by IBM. These products
all support the relational model
and some products have been
extended to support object-
relational features and non-
relational structures.
ACSA CONFIDENTIAL INFORMATION PAGE 3
Discipline Technologies/Services Technologies/Services Descriptions
Microsoft (.Net,
SharePoint, SQL Server,
etc.)
SharePoint is a browser-based
collaboration and document
management platform from Microsoft.
General Business
Intelligence and Analytics
Business Intelligence and Analytics
(BIA) is an umbrella term that refers
to a variety of software applications
used to analyze the organisation raw
data. BIA as a discipline is made up
of several related activities, including
data mining, online analytical
processing, querying and reporting.
2. Enterprise Applications - Oracle Technical Services
E-Business Suite
eBusiness suite (R12.1.3)
Oracle E-Business Suite is a
comprehensive suite of integrated,
business applications that enable
organizations to make better
decisions, reduce costs, and increase
performance.
Human Resources Core Oracle's E-Business Suite Human
Capital Management HRMS delivers
a robust set of best-in-class human
resources functionality that enables
you to increase productivity,
accelerate business performance,
and lower your cost of ownership.
Cloud Solution Human
Resources
Modern HR differentiates the
business with a talent centric and
consumer based strategy that
leverages technology to provide a
collaborative, insightful, engaging and
mobile HR, employee and executive
experience. Oracle HCM Cloud
enables modern human resources to
find and retain the best talent and
increase global agility.
ACSA CONFIDENTIAL INFORMATION PAGE 4
Discipline Technologies/Services Technologies/Services Descriptions
Supplier Lifecycle
Management
Oracle Supplier Lifecycle
Management is the supplier
development application that
transforms qualification,
administration, and assessment. With
Oracle Supplier Lifecycle
Management organizations can
streamline registration and review of
prospective suppliers, enable cross
functional performance evaluation,
and assure effective governance and
risk mitigation. It is a key component
of Oracle Advanced Procurement, the
integrated suite that dramatically cuts
all supply management costs.
Finance Oracle E-Business Suite Financials
allow you to increase efficiency and
reduce back-office costs with
standardized processes for shared
services, productivity tools, and
integrated performance management.
Cloud Solution Finance Oracle Planning and Budgeting Cloud
Service is a planning, budgeting, and
forecasting solution. PBCS provides
a rich Web and Microsoft Office work
environment that has solved a wide
variety of financial, sales and
operational planning use cases
across multiple industries.
Commercial Oracle Property Manager streamlines
and automates lease administration
and space management, enabling
you to more intelligently manage your
real estate portfolio.
ACSA CONFIDENTIAL INFORMATION PAGE 5
Discipline Technologies/Services Technologies/Services Descriptions
Governance Oracle Fusion Governance, Risk, and
Compliance (GRC), a component of
the Oracle Fusion Applications suite,
provides a complete enterprise GRC
platform that gives you:
The Power to Discover unified
intelligence for insight into the status
of all GRC activities across the
enterprise.
The Power to manage end-to-end
support for cross-industry and
industry-specific GRC processes.
The Power to Enforce best-in-class
automated controls that work across
multiple business applications.
Endeca Oracle Endeca Information Discovery
offers a complete solution for agile
data discovery across the enterprise,
empowering business user
independence in balance with IT
governance. This unique platform
offers fast, intuitive access to both
traditional analytic data, leveraging
existing enterprise investments, and
non-traditional data, including
external and unstructured
information. This allows organizations
unprecedented visibility into all
relevant information, to drive growth
while saving time and reducing cost.
Business Intelligence /
Performance Reporting
OBIEE and OSSM
Oracle Business Intelligence
Enterprise Edition (OBIEE) is an
unmatched and comprehensive
business intelligence and analytics
platform that delivers a full range of
ACSA CONFIDENTIAL INFORMATION PAGE 6
Discipline Technologies/Services Technologies/Services Descriptions capabilities—including interactive
dashboards,
Ad hoc queries, mobile analytics,
notifications and alerts, enterprise
and financial reporting, scorecard and
strategy management, business
process invocation, unstructured
search and collaboration, integrated
systems management and more.
OBIEE is built on a proven and
modern technological foundation that
supports the highest workloads and
most complex deployments, while
providing timely insights to users
across an enterprise at a low overall
total cost of ownership.
Database Services The oracle database is used for
Oracle eBS, The database is an
object-relational database
management system.
Development Services A service provided by developers in
various programming languages i.e.
pl/sql, sql and java.
Supply Chain
Management
The Oracle E-Business Suite Supply
Chain Management family of
applications integrates and
automates all key supply chain
processes, from design, planning and
procurement to manufacturing and
fulfilment, providing a complete
solution set to enable companies to
power information-driven value
chains.
IT Asset Management manages
distributed IT assets, including software
ACSA CONFIDENTIAL INFORMATION PAGE 7
Discipline Technologies/Services Technologies/Services Descriptions
Asset and Software
Management
and hardware to automatically reconcile
physical and financial IT inventory,
redeploy underutilized software, provide
service agents with visibility into actual
hardware/software configurations and
help meet growing compliance
requirements.
Asset Inventory and Tracking - use a
flexible system to add, transfer,
depreciate, and retire IT assets.
Asset Monitoring and Reporting -
account for, manage and protect the
integrity of service assets and
configuration items through the
service lifecycle by ensuring that only
authorised components are used and
only authorised changes are made
and reported.
Asset Risk Management - minimise
the number of quality and compliance
issues caused by incorrect or
inaccurate configuration of services
and assets.
Asset Maintenance and Support –
enable fully integrated solution for the
maintenance and support of assets
throughout their lifecycle to ensure
the right level of investment to meet
utilisation and financial goals.
3. Airport Systems – Security
Perimeter Intrusion
Detection System ( PIDS)
The system that is used to detect and
prevent unauthorised access to the
airports perimeter.
Airport Permit Issuing
System (APIS)
Access Card Permit Issuing Systems.
ACSA CONFIDENTIAL INFORMATION PAGE 8
Discipline Technologies/Services Technologies/Services Descriptions
Access Control and
Permit Issuing System
(Vehicle and Visitor
Management Systems)
Systems giving access to office and
secure areas of the airport.
Integrated Security
Management
Systems (e.g. ISMS or
PSIM)
Systems for integrating and
managing all security systems.
2 Dimension Bar Code
Systems
The system is used to check
passenger boarding pass prior to
accessing the secure site of the
airport.
Digital Trunking Radio
Communication
Systems and Ground to
Air Radio Communication
System
Two way digital radio communication
systems used by various
departments.
Panic Alarm System Alarm systems used in an emergency
situation.
Smart Security Integrated security system used at
the security check point for
passenger processing.
Electronic Gates -
Boarding and Security
Check Points
Electronic Gate Systems used to
provide access to the secure area of
the airport and for processing
passengers through the boarding
gates.
Security X-ray
Training Software ( Safe
Passage)
Training software used to training
ACSA personnel on how to use the
X-Ray machines.
Close Circuit Television
(CCTV), Video Analytics
and Facial Recognitions
Surveillance system used for security
and other operational airport activities
that require video footage.
ACSA CONFIDENTIAL INFORMATION PAGE 9
Discipline Technologies/Services Technologies/Services Descriptions
4. Airport Systems – Electronic Services
Time and attendance (
time keeper)
Time and attended systems used for
employee clocking purpose.
Interactive Kiosk
(InfoGate)
Interactive KIOSK used for way
finding and communication to
Passengers.
Display Technologies
(Screens in different
sizes, formats and
configuration)
Display systems includes TV and
Large LED boards used for flight
information, advertising and
television.
Common Use Terminal
Equipment and Common
Use Self Service
Self-service and common use
equipment for passenger processing
(Boarding).
Foot Counting and Queue
Management System
Systems used to count number of
people entering and exiting the
Airport or Specific area. This includes
dwell time and areas of high
concentration.
Parking Solutions (Pay on
foot, License Plate
Recognition System,
VMS and Bay Detection)
including merchant bank
interface for credit
card payment
All systems used at the parking areas
to ensure passenger are able to gain
access, locate available parking. On
departure they are able to pay for
parking using credit cards and the
vehicle are safe while parked at
ACSA airports through the LPR
system.
Public Address (PA) and
Evacuation Systems
Public Address and evacuation
system. Used for making normal
announcement and emergency
announcement.
Community Access
Television (CATV)
Content Distribution Systems -
Currently used to distribute DSTV
and Flight Information.
ACSA CONFIDENTIAL INFORMATION PAGE 10
Discipline Technologies/Services Technologies/Services Descriptions
Building Management
Systems
Systems used to manage and
monitor critical building components -
Travelator, Escalators and Lift etc.
Emergency and fire
detection
Systems used to detect fire and
activate necessary sirens and
extinguishing equipment.
5. Airport Systems – Airport Application
Apex/Zeus Information platform for Airport
Resources
Palladium (Health Safety
Report)
Safety Incident Reporting System.
Quality Management
System
Quality Management System.
Airport Management
System
Suite of systems for management of
the airport used in the main by AMC.
Security QMS/Incident
Logging
Security Incident Login System.
Viewing Deck SharePoint custom developed
system to manage passenger’s
queries and feedback via short code
SMS services and emails
Slot Management (Score) System used for the management of
the aircraft slot within the airport.
Qlikview Business Intelligence tool.
SITATEX Custom developed system for
airports used to update the AODB
with messages from airlines
Interactive Kiosk
(InfoGate)
Interactive KIOSK used for way
finding and communication to
Passengers.
6. Infrastructure - Physical
Data Centres (Design,
construct and
commission)
Physical IT Datacentres, and the
construction.
ACSA CONFIDENTIAL INFORMATION PAGE 11
Discipline Technologies/Services Technologies/Services Descriptions
Structured Cabling
(Copper and Fibre
Systems)
All IT Cabling, Copper and Fibre,
including Cable management
systems and trays
IT Environmental
systems,
IT Environmental monitoring systems,
e.g., humidity, temperature, leak
detection
IT Fire suppression All types of IT Fire suppression and
detection systems, FM200, Argon
etc.
IT Room construction Physical IT Rooms, and the
construction
IT Power Systems (UPS,
PDU)
Uninterruptable Power Supplies,
Power distributions systems.
IT Cooling systems IT cooling systems, e.g. in-row
cooling, down blow units, free air-
cooling.
7. Infrastructure – CORE
Networks (CISCO) Switches and Routers. (Access,
distribution and Core). Wireless
Network (Access Points and
Controllers), Element Management
platform (e.g. Cisco Prime).
Network security/Firewalls
(CISCO and
CHECKPOINT)
All Network security related systems
e.g. firewalls, intrusion detection
systems, intrusion prevention
systems, and management platform,
etc.
Servers (IBM and HP) Server hardware and related
software, e.g. Blade systems,
rackmounts, etc.
Telephony (CISCO) IP Telephony systems including
routers, handsets, video conferencing
Storage (EMC VNX) Storage systems and related
software e.g. Storage area networks,
ACSA CONFIDENTIAL INFORMATION PAGE 12
Discipline Technologies/Services Technologies/Services Descriptions Network attached storage, Flash
systems
Storage Network (for
Brocade SAN Fabric
Switches)
Fibre Channel switches.
Disaster Recovery
Infrastructure (EMC)
Systems to support Disaster recovery
requirements, e.g. RecoverPoint,
Replication, etc.
Backups (for Avamar &
Data Domain)
Backup to disk systems.
End user devices
(Laptops, desktops,
printer, screens, projects
etc.)
Laptops, desktops, printers, screens,
projectors, tablets, iPad, accessories.
Virtualisation (VMWare) VMware suite of products
Hyper Convergence
(VMWare)
Hyper converged infrastructure.
8. Business Intelligence and Analytics (Big Data)
Presentation /
Consumption /
Visualisation Capability
(e.g. Contextual Analytics,
Business Intelligence
Tools etc.)
Business Intelligence and Analytics
Layer that enables delivery of
business user / customer facing
capabilities thereby facilitating
consumption of data, information,
intelligence and advanced analytics
generated through business data
sourced from a variety of systems
and sources (internal and external,
structured and unstructured and
streaming). The primary driver of this
layer is accessibility and ease with
which data can be discriminated. The
capability takes many forms and
varies from business uses cases i.e.
reports, dashboards with drill down
capability, advanced analytics and
ACSA CONFIDENTIAL INFORMATION PAGE 13
Discipline Technologies/Services Technologies/Services Descriptions cognitive pattern recognition
capabilities.
Data Modelling Data Modelling is a concerned about
development & maintenance of
conceptual data models, logical data
models and development &
maintenance of physical data models
including physical databases design
related data structures. This is
achieved through design of
information products for the
development data modelling &
database design standards, review of
data model & database design quality
and management of data model
versioning and integration.
Next Generation
Enterprise Data
Warehouse / Big Data
Platform (e.g. Discovery
Capability, etc.)
Data Modelling is a concerned about
development & maintenance of
conceptual data models, logical data
models and development &
maintenance of physical data models
including physical databases design
related data structures. This is
achieved through design of
information products for the
development data modelling &
database design standards, review of
data model & database design quality
and management of data model
versioning and integration.
Integration Management Integration Management involves
combining data residing in different
structured and unstructured sources
and providing users with a unified
view of the data through an extract
ACSA CONFIDENTIAL INFORMATION PAGE 14
Discipline Technologies/Services Technologies/Services Descriptions load and transform (ETL) population
processes.
Enterprise Service Bus
(ESB)
Enterprise Service Bus provides the
messaging backbone capability which
does protocol conversion, message
format transformation, routing, accept
and deliver messages from various
services and application which are
linked to its middleware. This is
achieved through ESBs ability and
flexibility in allowing the services and
applications to interact with each
other, independently of their location
and connectivity requirements.
Master Data Management Master and Meta Data Management
is the single source of basic business
data used across all systems,
applications, and processes for an
entire enterprise. This function entails
understanding of reference & master
data integration needs which informs
definition and design of data
integration architecture. This includes
implementation and management of
metadata environment, a process
which entails understanding meta
data requirements, defining,
developing and maintaining the meta
data architecture and standards.
Enterprise Data
Management
Enterprise Data Management defines
the data management principles and
standards against which data efficacy
can be achieved in order to facilitate
delivery of data that meets business
requirements and to increase the
ACSA CONFIDENTIAL INFORMATION PAGE 15
Discipline Technologies/Services Technologies/Services Descriptions value derived from data assets.
These include data acquisition
processes; data structures
(taxonomy, dictionary and
classification) as well as data quality
which concerns itself with define data
quality metrics & service levels
throughout its life cycle.
9. Enterprise Architecture
Enterprise Architecture The Enterprise Architecture translate
business vision and strategy into
effective enterprise change by
creating, communicating, and
improving the key principles and
models that describe the enterprise’s
future state and enable its evolution.
The focus is on enabling business
and IT leaders to make investment
decisions that balance and prioritise
current operational demands,
disruptions, and opportunities with
the longer-term strategic vision of the
organization
Business Process
Architecture
The Business Process Architecture
conceptualises the business process
architecture at business operating
and capability / services model;
designs the business process
landscape to support the key
business functional areas and
develops an organisation wide
business process architecture
framework that facilitates
development of business outcome
based processes that are
ACSA CONFIDENTIAL INFORMATION PAGE 16
Discipline Technologies/Services Technologies/Services Descriptions standardised, repeatable, predictable
and reliable
Application Architecture Application Architecture is designed
to ensure that application
investments is informed by the
business requirements for supporting
business outcomes in line with the
enterprise architecture
operationalisation plans. This is
achieved through application
portability, technology independence,
Interoperability, design for operations,
rationalisation of applications
providing the same business
functionality as well as support,
maintenance and upgrades.
Technology Architecture Technology (Infrastructure)
Architecture ensures designs that
enables cost effective delivery of the
following technology and
infrastructure services; universal
connectivity, single logical network,
mobility services, cloud services and
operations and maintenance of
technologies and infrastructure
crucial to servicing business
operational needs. This is achieved
through total cost of ownership
(TCO), minimise technology, product
and configuration diversity
(Standardisation), technology
outsourcing, automated systems
management, scalability and
proactive technology infrastructure
renewal.
ACSA CONFIDENTIAL INFORMATION PAGE 17
Discipline Technologies/Services Technologies/Services Descriptions
Security Architecture Security architecture is responsible
for the development of secure
gateway services, security standards,
and assessment protocols as well as
monitoring of business security
exposure and risk, including ensuring
that security investments match the
value of the assets being protected.
This is achieved by designing &
Implementing data security controls,
manage data access permissions,
monitor user authentication & access
behaviour, classify information
confidentiality, audit data security
Data/Information
Architecture
The Data / Information / Business
Intelligence Architecture’s primary
function is to define, develop and
maintain an optimal enterprise data
management and business
intelligence and analytics
environment for the organisation.
Assess information needs vs leading
practice tools, platform in order to
recommend appropriate steps to
ensure BI excellence. This function
entails designing a Morden
Enterprise Information Architecture
(EIA) in coordination with Corporate
IT practice and infrastructure
standards as well as ensuring that
associated architectures required to
support business reporting and
analytical requirements are defined
and in place.
ACSA CONFIDENTIAL INFORMATION PAGE 18
Discipline Technologies/Services Technologies/Services Descriptions
Integration Architecture Integration Architecture is responsible
for the enterprise integration,
reduction of integration complexity,
development of data exchange
standards, shared components and
service orientated architecture.
10. Information Security
Security Incident and
Event Solutions (SIEM)
SIEM software or hardware products
and services that combine security
information management (SIM) and
security event management (SEM).
They provide real-time analysis of
security alerts generated by network
hardware and applications.
Security Vulnerability
Solutions
Vulnerability management solutions
are software or hardware products
that perform the cyclical practice of
identifying, classifying, remediating,
and mitigating vulnerabilities,
especially in software and firmware.
End Point Security
Solutions
Endpoint security management refers
to the security processes or protocols
for restricting network access from
individual mobile or computing
devices as well as performing
malware protection.
Data Protection Solutions Data protection management (DPM)
is the administration of backup
processes to ensure that tasks run on
schedule, and that data is securely
backed up and recoverable. Good
data protection management means
having effective processes and
methodologies in place to maintain
data integrity.
ACSA CONFIDENTIAL INFORMATION PAGE 19
Discipline Technologies/Services Technologies/Services Descriptions
Web Content Scanning
(Proxy) Solutions
A secure Web gateway is a software
or hardware product or service that
prevents unsecured traffic from
entering an internal network of an
organization. It is used by enterprises
to protect their employees/users from
accessing and being infected by
malicious Web traffic, websites and
viruses/malware.
Mail Content Scanning
Solutions
A secure Web gateway is a software
or hardware product or service that
prevents unsecured traffic from
entering an internal network of an
organization. It is used by enterprises
to protect their employees/users from
accessing and being infected by
malicious email traffic or
viruses/malware.
Digital Certificate
Solutions
A software product or service that
allows a person, computer or
organization to exchange information
securely over the Internet using the
public key infrastructure (PKI). A
digital certificate may also be referred
to as a public key certificate.
Mobile Device
Management Solutions
Mobile device management (MDM) is
an industry term for the
administration of mobile devices,
such as smartphones, tablet
computers, laptops and desktop
computers. MDM is usually
implemented with the use of a third
party product that has management
features for particular vendors of
mobile devices.
ACSA CONFIDENTIAL INFORMATION PAGE 20
Discipline Technologies/Services Technologies/Services Descriptions
Authentication and
Access Management
Solutions
Identity and Access management
(IAM) solutions are software and
hardware products that enable the
right individuals to access the right
resources at the right times and for
the right reasons, and using the
correct and verified credentials.
Database Security
Solutions
Software or hardware products that
perform measures used to protect
and secure a database or database
management software from
illegitimate use and malicious threats
and attacks. It is a broad term that
includes a multitude of processes,
tools and methodologies that ensure
security within a database
environment.
Data Loss Prevention
Solutions
Software or hardware products that
ensure that end users do not send
sensitive or critical information
outside the corporate network. The
term is also used to describe
software products that help a network
administrator control what data end
users can transfer.
IT Forensic Solutions Computer Forensics Solutions (also
called cyberforensics) refers to
hardware and software products that
perform computer investigation and
analysis techniques to gather
evidence of wrongdoing suitable for
presentation in a court of law.
11. IT Planning and Control
IT Commercialisation IT Commercialisation introduces existing and
new products/ services from ACSA IT to
internal and external customers for sale.
ACSA CONFIDENTIAL INFORMATION PAGE 21
Discipline Technologies/Services Technologies/Services Descriptions
Customer Identification,
Validation and
Commercial Assessment
Understand IT’s customer’s (internal
and external) unmet needs within the
frame work of ACSA’s strategic
focus. Analyse those needs &
prioritise opportunities with the most
promising return on IT investments.
Intellectual Property and
Contract Management
Devise, customise and operate
appropriate financial models to
support the valuation and
assessment of intellectual property
assigned to ACSA IT clients and
developing associated contracts.
Product/ Service Pricing
Models
Assess the value and demand of
technologies/ services proposed and
establish pricing models.
Product/ Service
Licensing Models
Assess the value of technologies
targeted for licensing and establish
licensing models.
Product/ Service Support
Models
Measure technology adoption,
performance, develop SLAs and
support models.
Product/ Service Launch
Strategies
Setup the product/ service internally
from a costing, BOM’s and routings
perspective and provide the
merchandising and IT teams with the
relevant content to publish – images,
positioning, pricing.