My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 14 - Purchase Order for Network Access Conrtol Systems
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
04/15/2025
>
Item 14 - Purchase Order for Network Access Conrtol Systems
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
4/9/2025 3:02:27 PM
Creation date
4/9/2025 2:52:38 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
14
Date
4/15/2025
Destruction Year
P
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
82
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br /> <br />Response to RFP# 40-22 <br />Data Center Intrusion Protection Systems (DCIPS) <br />Definition. Data center network security devices are deployed to protect servers and <br />applications hosted in the data center. Data center intrusion prevention systems (DCIPS) are <br />deployed at critical points in the network. Their role is to identify and block sophisticated <br />threats against web servers, application servers, and database servers without false positives <br />or degradation of network performance. <br />• Juniper <br />• McAfee <br />• Trend Micro <br />Breach Detection (or Advanced Threat Protection) <br />Definition. These products provide enhanced detection of advanced malware, zero-day attacks, <br />and targeted attacks that could bypass defenses such as next generation firewalls, intrusion <br />prevention systems, intrusion detection systems, antivirus/endpoint protection (including host <br />IPS), and secure web gateways. <br />• Trend Micro <br />• Lastline <br />• Check Point <br />Web Application Firewalls <br />Definition: Physical or virtual appliance to protect public and internal web applications, <br />whether deployed on premise or remotely hosted. Should protect against a variety of attacks <br />including injection attacks and application-layer denial of service (DoS). <br />• F5 <br />• Imperva <br />• Akamai <br />Wired and Wireless LAN Access Infrastructure <br />Definition: This market segment consists of vendors supplying wired and wireless networking <br />hardware and software that enables devices to connect to the enterprise wired LAN or Wi-Fi <br />network. <br />• Riverbed <br />• Dell EMC <br />• Juniper <br />• New H3C <br />Advanced Endpoint Protection (AEP) <br />Definition: AEP products protect endpoints from a multitude of attack threat vectors targeting <br />a very dynamic enterprise class endpoint attack surface. They should also be resistant to <br />evasion techniques and provide low false positive results. <br />• Sentinel One <br />• McAfee <br />• Symantec <br />• Cylance <br />• Trend Micro <br />• ESET <br /> <br />• Provide Annual Sales for last 3 years broken out into the following categories: <br />o Cities / Counties <br />o K-12 <br />o Higher Education <br />o Other government agencies or nonprofit organizations <br /> <br /> <br />• Provide the revenue that your organization anticipates each year for the first three (3) <br />years of this agreement. <br /> <br /> <br /> <br /> <br />
The URL can be used to link to this page
Your browser does not support the video tag.