控制和訪問控制系統: 招標、公共採購 2024




請註冊

分享這個:
只: 63
25 oct
Quotations are hereby requested to appoint a Service Provider (SP) for the installation of alarms and render armed response at the Hout Bay Proclaimed Fishing Harbour for a period of (12) months. Scope of works: The scope work includes installation of intruder detection alarm systems, maintenance thereof and provision of an armed response in the Hout Bay Proclaimed Fishing Harbour to secure the tangible and intangible assets of the client: 1. Provision of a 24-hour (24) hour armed response service at the Hout Bay Proclaimed Fishing Harbour, seven (7) days per week including weekends and public holidays, 2. Rendering a security service with duties as authorised officers in terms of the Control of Access to Public Premises and Vehicle Act, 53 of 1985, 3. Respond to intruder alarm system in order to Protect Assets, Resources and Prevent crime from occurring on premises, 4. Recording of incidents or events in an Occurrence Register, Electronically and Report such incident or events to the client personnel responsible for Security Management, 5. Enforcing of the the client"s Security Policy, 6. Ensure compliance with the Department of Labour Bargaining Council Rates, 7. The appointed service provider will adhere to the provisions related to salaries wages and remuneration as envisaged in the provided in the bargaining counsel and the requirements as stipulated in the Labour Relations Act for a 1 x 12-hour shift as per the requirements per district or location. Please confirm the contract number as two were published. (EN) 添加到收藏夾
顧客: ONLINE TENDERS

數: 112906435

國家: South Africa

源: ONLINE TENDERS

02 aug

數: 108495019

國家: Canada

源: www.merx.com

30 jul
Proposals are hereby requested for the following: Provision of database security management solution for a period of five (5) years. Scope: Eskom requires a cloud-based or SaaS Database Security tool for a period of five (5) years. The cloud-based or SaaS Database Security tool must cater for the Eskom hybrid (on-premises, hybrid, and multiple cloud) environments, databases hosted on-prem and the cloud. The cloud-based or SaaS Database Security Management tool must include subscriptions fee, software licenses, onboarding assistance, maintenance, training, and support on an 24X7X365 (24/7/365) throughout the year for the duration of the contract: The Database Security Management tool must have the following capabilities, functionalities and features but not limited to: a) Security Assessment: The Database Security Management tool must provide security posture, risk profile of the entire database, database discovery, data discovery, data classification and security policy, b) Artificial Intelligence (AI) and Machine Learning (ML): The Database Security Management tool must be AI and ML-powered for event collection and analysis, c) Encryption and Key Management: The Database Security Management tool must encrypt data at rest with key management capability, d) Data Masking, Tokenisation and Sub-setting: The Database Security Management tool must be able to scan the entire database for sensitive data, mask, tokenise and subset sensitive data in nonproduction environments, e) Data Access Control: The Database Security Management tool must provide the following: i. Enforce separation of duties to control access based on security privileges, identify sensitive data, ii. Ensure that administrators can manage the database, but not access the sensitive data, f) Auditing and Monitoring: The Database Security Management tool must provide the following: i. Detect, analyse, and block threats in database activity, ii. Comply with the Center for Internet Security (CIS) benchmarks, the Defence Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) auditing requirements, iii. Provision audit policies that balance the need to monitor activity with the impact of collecting and storing audit data, iv. Monitor user activity with data, v. Simplify compliance reporting and help identify risky user behaviour, g) Audit Vault and Database Firewall: The Database Security Management tool must provide both audit vault and database firewall to provide the following: i. Assess database security posture, ii. Monitor privileged user activity, iii. Deny and block unauthorised access, iv. Provide useful, simplified logs to assist with the incident investigation, v. Provide continuous alerts on suspicious activity, vi. Provide simplified regulatory compliance reporting such as PCI DSS, GDPR and POPIA, h) Interoperability: The Database Security Management tool must support numerous and prevailing database management system (DBMS) technologies such as Microsoft (MS) structured query language (SQL), MySQL, SQLite, Redis DB, Oracle databases, IBM DB2, IBM NETEZZA, SAP HANA, MongoDB, Postgres, Cassandra, Neo4j DBMS, PostGIS, Elasticsearch DBMS, and MariaDB but not limited to these DBMS technologies, i) Integration to SIEM: The Database Security Management tool must be able to integrate with numerous and prevailing SIEM tools such as Splunk, and Sentinel but not limited to these SIEM tools, j) Integration to advanced AI and machine learning (ML) network monitoring solutions: The Database Security Management tool must be able to integrate numerous and prevailing AI and machine learning network monitoring solutions such as Darktrace but not limited to these tools listed, k) Integration to on-prem Identity Provider (IdP): The Database Security Management tool must be able to integrate with Eskom existing on-prem identity provider (IdP)for central user account management, to enable MFA and SSO, l) Self-hosted or on-prem and Cloud-based Databases: The Database Security Management tool must be able to scan both databases hosted on- prem and in the cloud, m) Process Control Network’s (PCN’s) or Operational Technology (OT) Databases: The Database Security Management tool must be able to scan databases that are placed on the PCN or OT networks, n) Agentless: The Database Security Management tool must be agentless, o) Reporting: The Database Security Management tool must simplify compliance reporting, users, administrators, and privileged user activity logs and help identify risky user behaviour. Training/Transfer of skills: a) Provide web-based or online training for Security Services Security Operation Centre (SOC) team to enable them to perform the scan, analyse, interpret the results, forward to the relevant stakeholders to remediate identified security vulnerabilities, b) Provide Database Security tool onboarding assistance, c) Mentor, transfer skills and knowledge to Eskom resources assigned to the project through the installation, configuration, testing, and deployment stages using a defined skills transfer program, d) Expert level training with relevant certification for the SOC team. Service Level Agreement requirements: The Service Provider must provide 24X7X365 (24/7/365) support and monitoring of the Database Security Management tool: a) The SOC team require 24X7X365 (24/7/365) support throughout the year, b) Security Services department requires 24X7X365 (24/7/365) monitoring of the Database Security tool, c) Security Services department requires MTTR (Mean time to resolve) of 4 hours, d) The availability of the SaaS solution must be 99.9%. (EN) 添加到收藏夾
顧客: ONLINE TENDERS

數: 108286183

國家: South Africa

源: ONLINE TENDERS

28 jun
Quotations are hereby invited for the following: Implementation of a comprehensive "Board Pack System". This system is expected to streamline the board meeting preparations, enhance document management: Virtual access (cloud based): 15 Users + two administrators (DigiTech): The Board pack system should be able to: • Uploading of board meeting packs (Document Management - collect, upload, store, track, and share all electronic documents in a centralized location for quick access), • Store and archive old board meeting packs (Secure data storage – the ability to securely store data to prevent data loss or breaches), • Resource centre for the Board, • Meeting set up on a group calendar (Meeting Management – ability to coordinate schedules and organize board meetings), • View, mark up, and annotate material (Meeting and document notes), • Share comments and inputs (Collaboration tools - Provide a channel for team members to share media files, communicate and work together), • Safety of information imperative, • Provide for digital signatures (Voting and resolutions), • Secure messaging, • Board presentations, • Offline and online accessibility to prevent the download of documents, • Minutes management - the ability to record and distribute meeting dates, times, attendees, and agendas, • Approval process control - the ability to manage the process of evaluating documents or requests submitted for approval, • Access controls/permissions - the ability to define levels of authorization for access to specific files or systems, • Calendar management - the ability to create schedules, organize meetings, prioritize tasks, track deadlines, and share these details with others, • An audit trail – the ability to provide sequential records detailing the history and events related to a specific transaction, • Encryption (data at rest and on transit) - the solution must utilize strong encryption protocols to ensure the security and confidentiality of the documents. Compatibility: • IOS, Android, Windows and Mac. Support: 24 hour support to be provided. (EN) 添加到收藏夾
顧客: ONLINE TENDERS

數: 106703996

國家: South Africa

源: ONLINE TENDERS

22 may
Bidders are hereby invited to submit proposals/quotations for repairs and servicing of tools and equipment per specification: Scope of work: - Mechanical trouble shooting and diagnosis, - Repair and servicing of the tools and equipment/machinery, - These detailed specifications are for tree cutting around electricity cables and buildings, - The service provider shall provide all labour, supervision, consumables and customs for tools, equipment, machinery and other means necessary for performing and completing the work, The following non-functional tools and equipment have been identified for repairs and servicing: - Brush cutters: Stihl 460, Qty: 20, - Brush cutters: Stihl 450, Qty: 10, - Brush cutters: Stihl 410, Qty: 5, - Chainsaw Ms 661C, Qty: 1, - Chainsaw Ms382, Qty: 1, Emaxesibeni Weighbridge, Qty: 1: Systems features to include, but are not limited to: 1) Secure User login in and control, 2) Customer/Account Records: Customer Records, Price Groups, Charge Methods, ton, kg, cubic metre, 3) Account Groups, 4) Sites: System must be configured to accommodate a multi-weighbridge, multi-site methodology, 5) Transporter/Haulier Records, 6) Vehicle File: Code, Reg No, Stored Tare, Description, Owner linking, Vehicle Access Control – block vehicle from entering, 7) Trailer File: - Reg No, Stored Tare, Description, 8) Container File: Code, Description, Size, Stored tare Mass, 9) Products/Category File: Code, Description, Site, Safe Disposal Certificates, Price Groups, Unit Allocations, 10) Waste Stream: Category Code, Waste Stream Code, Waste Stream Description, UN Number, Class, packaging Group, 11) Disposal Methods, 12) Reporting: Transactions by all, Transactions by Date by Category, Transactions by Origin-Route, Transactions by Site, Transactions by Category by Site, Master file Report, Vehicles, Waste Category, Customers, Monthly totals by customer, by category, Recycled Material Reporting, 13) Scale reader screen. Please confirm the specifications. (EN) 添加到收藏夾
顧客: ONLINE TENDERS

數: 104851864

國家: South Africa

源: ONLINE TENDERS