控制和訪問控制系統: 招標、公共採購 2025


只: 68
17 feb
Bids are hereby invited for the appointment of a service provider to provide a compatible organizational performance management software system, support & maintenance of 36 months. The duration for the provision of the system must not exceed 12 months, followed by a maintenance period not exceeding 36 months. Scope of work: The technical outcome of the Performance Management system are as follows: • 120 licenses; • System must be compatible with all internet applications (Chrome, Firefox, Mozilla, internet explorer, Microsoft Edge); • The system must be accessible both internally and externally; • The system must use Microsoft Active Directory (AD) for authentication to enable users to use their network credentials on the system; • The system must enable the assignment of targets to the relevant managers and reassignment if/when the manager changes; • The system must enable the uploading of the Strategic Plan, APP and Business plan as and when needed; • The system must allow monthly and quarterly reporting on the Annual Performance Plan and Business plan; • The system must enable Managers to check the performance of their respective areas through performance management dashboards; • The system must be role-based enabling relevant managers to have access to their targets only while allowing Executives and administrators to have access to all areas; • The system must allow the administrators to download required data as well as performance reports; • The system will be hosted at the Client using existing Client servers; • The system must have spell check; • The system must allow multiple document attachments during reporting; • The system must allow for a word-count of a minimum 50 words per reporting window (e.g. a minimum of 50 words for each of achievements, deviations, reason for deviation and corrective actions); • The system must enable Administrators to control reporting dates by opening and closing the system for user accessibility; • The system must enable relevant Executives to conduct their own assessments and edit the reported performance as well as sign-off their respective reports for accountability; • The system must enable a Catch-up Plan component that is linked to the not achieved targets and to also allow users to complete activities to improve the poor performance and report progress and upload evidence on the system in the subsequent quarter; • The system must enable users to draw Organization reports and trend analysis data and provide a statistical view of Divisional and organization performance on quarterly and annual basis; • The system must enable reminders and notifications to be sent to all users of their respective deadlines, targets and activities; • The system must enable an audit trail of all activities undertaken by users; • The system must be compliant to Protection of Personal Information (POPI) Act. Training: • Provide training to all relevant users including Client staff and stakeholders; • Provide training materials and relevant system documentation. Reporting: • The system must provide statistical and info graphs reports (dashboards) on a quarterly and annual basis against all plans; • The system must enable Client to draw consolidated quarterly and annual reports on all plans; • The system must enable the compiling of reports based on the provided timelines. Maintenance and Support: • Ongoing support for the duration of the contract with any other system updates, enhancement and reporting aligned to organizational requirements as and when required by providing the following support and assistance: Technical support for staff who experience systems challenges; • Technical support will be required during office hours, from Monday to Friday (08:00 – 17:00); • The system provider is required to provide dedicated contact details (email address, telephone number) where users can log ideally written requests for technical support; • System provider to inform users of the system down-time. Meetings: • Service provider to meet with relevant officials from the Client as and when required. (EN) 添加到收藏夾
通過申請結束: 13 天
顧客: ONLINE TENDERS

數: 119075164

國家: South Africa

源: ONLINE TENDERS

23 jan

數: 117832316

國家: United Kingdom

源: gov.uk Contracts Finder

25 oct
Quotations are hereby requested to appoint a Service Provider (SP) for the installation of alarms and render armed response at the Hout Bay Proclaimed Fishing Harbour for a period of (12) months. Scope of works: The scope work includes installation of intruder detection alarm systems, maintenance thereof and provision of an armed response in the Hout Bay Proclaimed Fishing Harbour to secure the tangible and intangible assets of the client: 1. Provision of a 24-hour (24) hour armed response service at the Hout Bay Proclaimed Fishing Harbour, seven (7) days per week including weekends and public holidays, 2. Rendering a security service with duties as authorised officers in terms of the Control of Access to Public Premises and Vehicle Act, 53 of 1985, 3. Respond to intruder alarm system in order to Protect Assets, Resources and Prevent crime from occurring on premises, 4. Recording of incidents or events in an Occurrence Register, Electronically and Report such incident or events to the client personnel responsible for Security Management, 5. Enforcing of the the client"s Security Policy, 6. Ensure compliance with the Department of Labour Bargaining Council Rates, 7. The appointed service provider will adhere to the provisions related to salaries wages and remuneration as envisaged in the provided in the bargaining counsel and the requirements as stipulated in the Labour Relations Act for a 1 x 12-hour shift as per the requirements per district or location. Please confirm the contract number as two were published. (EN) 添加到收藏夾
顧客: ONLINE TENDERS

數: 112906435

國家: South Africa

源: ONLINE TENDERS

02 aug

數: 108495019

國家: Canada

源: www.merx.com

30 jul
Proposals are hereby requested for the following: Provision of database security management solution for a period of five (5) years. Scope: Eskom requires a cloud-based or SaaS Database Security tool for a period of five (5) years. The cloud-based or SaaS Database Security tool must cater for the Eskom hybrid (on-premises, hybrid, and multiple cloud) environments, databases hosted on-prem and the cloud. The cloud-based or SaaS Database Security Management tool must include subscriptions fee, software licenses, onboarding assistance, maintenance, training, and support on an 24X7X365 (24/7/365) throughout the year for the duration of the contract: The Database Security Management tool must have the following capabilities, functionalities and features but not limited to: a) Security Assessment: The Database Security Management tool must provide security posture, risk profile of the entire database, database discovery, data discovery, data classification and security policy, b) Artificial Intelligence (AI) and Machine Learning (ML): The Database Security Management tool must be AI and ML-powered for event collection and analysis, c) Encryption and Key Management: The Database Security Management tool must encrypt data at rest with key management capability, d) Data Masking, Tokenisation and Sub-setting: The Database Security Management tool must be able to scan the entire database for sensitive data, mask, tokenise and subset sensitive data in nonproduction environments, e) Data Access Control: The Database Security Management tool must provide the following: i. Enforce separation of duties to control access based on security privileges, identify sensitive data, ii. Ensure that administrators can manage the database, but not access the sensitive data, f) Auditing and Monitoring: The Database Security Management tool must provide the following: i. Detect, analyse, and block threats in database activity, ii. Comply with the Center for Internet Security (CIS) benchmarks, the Defence Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) auditing requirements, iii. Provision audit policies that balance the need to monitor activity with the impact of collecting and storing audit data, iv. Monitor user activity with data, v. Simplify compliance reporting and help identify risky user behaviour, g) Audit Vault and Database Firewall: The Database Security Management tool must provide both audit vault and database firewall to provide the following: i. Assess database security posture, ii. Monitor privileged user activity, iii. Deny and block unauthorised access, iv. Provide useful, simplified logs to assist with the incident investigation, v. Provide continuous alerts on suspicious activity, vi. Provide simplified regulatory compliance reporting such as PCI DSS, GDPR and POPIA, h) Interoperability: The Database Security Management tool must support numerous and prevailing database management system (DBMS) technologies such as Microsoft (MS) structured query language (SQL), MySQL, SQLite, Redis DB, Oracle databases, IBM DB2, IBM NETEZZA, SAP HANA, MongoDB, Postgres, Cassandra, Neo4j DBMS, PostGIS, Elasticsearch DBMS, and MariaDB but not limited to these DBMS technologies, i) Integration to SIEM: The Database Security Management tool must be able to integrate with numerous and prevailing SIEM tools such as Splunk, and Sentinel but not limited to these SIEM tools, j) Integration to advanced AI and machine learning (ML) network monitoring solutions: The Database Security Management tool must be able to integrate numerous and prevailing AI and machine learning network monitoring solutions such as Darktrace but not limited to these tools listed, k) Integration to on-prem Identity Provider (IdP): The Database Security Management tool must be able to integrate with Eskom existing on-prem identity provider (IdP)for central user account management, to enable MFA and SSO, l) Self-hosted or on-prem and Cloud-based Databases: The Database Security Management tool must be able to scan both databases hosted on- prem and in the cloud, m) Process Control Network’s (PCN’s) or Operational Technology (OT) Databases: The Database Security Management tool must be able to scan databases that are placed on the PCN or OT networks, n) Agentless: The Database Security Management tool must be agentless, o) Reporting: The Database Security Management tool must simplify compliance reporting, users, administrators, and privileged user activity logs and help identify risky user behaviour. Training/Transfer of skills: a) Provide web-based or online training for Security Services Security Operation Centre (SOC) team to enable them to perform the scan, analyse, interpret the results, forward to the relevant stakeholders to remediate identified security vulnerabilities, b) Provide Database Security tool onboarding assistance, c) Mentor, transfer skills and knowledge to Eskom resources assigned to the project through the installation, configuration, testing, and deployment stages using a defined skills transfer program, d) Expert level training with relevant certification for the SOC team. Service Level Agreement requirements: The Service Provider must provide 24X7X365 (24/7/365) support and monitoring of the Database Security Management tool: a) The SOC team require 24X7X365 (24/7/365) support throughout the year, b) Security Services department requires 24X7X365 (24/7/365) monitoring of the Database Security tool, c) Security Services department requires MTTR (Mean time to resolve) of 4 hours, d) The availability of the SaaS solution must be 99.9%. (EN) 添加到收藏夾
顧客: ONLINE TENDERS

數: 108286183

國家: South Africa

源: ONLINE TENDERS

28 jun
Quotations are hereby invited for the following: Implementation of a comprehensive "Board Pack System". This system is expected to streamline the board meeting preparations, enhance document management: Virtual access (cloud based): 15 Users + two administrators (DigiTech): The Board pack system should be able to: • Uploading of board meeting packs (Document Management - collect, upload, store, track, and share all electronic documents in a centralized location for quick access), • Store and archive old board meeting packs (Secure data storage – the ability to securely store data to prevent data loss or breaches), • Resource centre for the Board, • Meeting set up on a group calendar (Meeting Management – ability to coordinate schedules and organize board meetings), • View, mark up, and annotate material (Meeting and document notes), • Share comments and inputs (Collaboration tools - Provide a channel for team members to share media files, communicate and work together), • Safety of information imperative, • Provide for digital signatures (Voting and resolutions), • Secure messaging, • Board presentations, • Offline and online accessibility to prevent the download of documents, • Minutes management - the ability to record and distribute meeting dates, times, attendees, and agendas, • Approval process control - the ability to manage the process of evaluating documents or requests submitted for approval, • Access controls/permissions - the ability to define levels of authorization for access to specific files or systems, • Calendar management - the ability to create schedules, organize meetings, prioritize tasks, track deadlines, and share these details with others, • An audit trail – the ability to provide sequential records detailing the history and events related to a specific transaction, • Encryption (data at rest and on transit) - the solution must utilize strong encryption protocols to ensure the security and confidentiality of the documents. Compatibility: • IOS, Android, Windows and Mac. Support: 24 hour support to be provided. (EN) 添加到收藏夾
顧客: ONLINE TENDERS

數: 106703996

國家: South Africa

源: ONLINE TENDERS