Laserfiche WebLink
<br /> <br />Response to RFP# 40-22 <br />* Fortinet uses a follow-the-sun model for technical assistance. Support will therefore be provided to NCPA customers from <br />these North American centers during regular business hours and will roll over to TACs in other regions after hours (except in <br />the case of contracts/purchase orders that require support from US TACs only). <br /> <br />o List the names of key contacts at each with title, address, phone and e-mail <br />address. <br /> <br />Responsibility Name and Contact Information <br />RFP Response <br />Jerilyn Bailey <br />Public Sector Contracts Manager <br />baileyj@fortinet.com <br />Contract Management and Reporting <br />Amy Lee <br />Public Sector Contracts Manager <br />leea@fortinet.com <br />Contract Administration Fortinet SLED Contracts Team <br />SLED_Contracts@fortinet.com <br /> <br /> <br />• Define your standard terms of payment. <br /> <br />If awarded a contract in response to this RFP, customers will make payments directly to the <br />Fortinet-approved distributor or reseller with whom the order was placed. Payment terms are net <br />thirty (30) days from the date of the invoice. Late fees may be charged on all amounts not paid <br />when due at the rate of one and one half percent (1.5%) per month or the highest rate permitted <br />by law, whichever is lower. <br /> <br />• Who is your competition in the marketplace? <br /> <br />The table below provides information on our competitors per segment within the market: <br /> <br />Market Segment Competitors <br />Enterprise Firewalls <br />Definition: Purpose -built appliances for securing enterprise networks. Able to support single- <br />enterprise firewall deployments and large and/or complex deployments. The ability to provide <br />virtual versions for the data center is now an expectation as is the ability to deploy in cloud <br />environments. <br />• Palo Alto <br />• Check Point <br />Unified Threat Management Devices <br />Definition: Multifunctional network security products designed for small to medium-size <br />organizations (100 to 1,000 employees). Typical capabilities provided include enterprise <br />firewall, intrusion prevention, remote access, secure web/email gateway, routing and wan <br />connectivity. <br />• Check Point <br />• Sophos <br />Next-Generation Firewall <br />Definition. Deep-packet inspection firewalls that move beyond port/protocol inspection and <br />blocking to add application-level inspection, intrusion prevention, and to bring in intelligence <br />from outside the firewall. <br />• Barracuda <br />• Checkpoint <br />• Cisco <br />• Forcepoint <br />• Palo Alto <br />• Sophos <br />• SonicWall <br />• WatchGuard <br />Data Center Security Gateway (DCSG) <br />Definition. DCSGs protects data center servers and the applications that run on them (i.e., web <br />servers, mail servers, DNS servers, application servers, etc.) from potential threats. They <br />converge data center firewall and data center intrusion prevention system technologies and <br />perform access control and deep packet inspection to protect server applications from remote <br />attacks. <br />• Juniper <br />• Palo Alto <br />• Cisco