Recite me link

1. Standard Firewall (Network) – Firewall service protects your corporate Network from unauthorised access and other Internet security threats
1. Who is the existing supplier for this contract?
2. What does the organisation spend for each of contract?
3. What is the description of the services provided for each contract?
4. What is the expiry date of each contract?
5. What is the start date of each contract?
6. What is the contract duration of contract?
7. What is the hardware brand? If available.
8. What is the software brand? If available?
9. The responsible contract officer? Full name, job title, contact number and direct email address.
2. Intrusion Detection – network intrusion detections systems (IDS) and network intrusion prevention systems (IPS) services that detect Web application attacks and include anomaly-awareness in addition to handling older threats that haven’t disappeared.
1. Who is the existing supplier for this contract?
2. What does the organisation spend for each of contract?
3. What is the description of the services provided for each contract?
4. What is the expiry date of each contract?
5. What is the start date of each contract?
6. What is the contract duration of contract?
7. What is the hardware brand? If available.
8. What is the software brand? If available?
9. The responsible contract officer? Full name, job title, contact number and direct email address.
3. Web Applications Firewall – A Web application firewall (WAF) is a firewall that monitors, filters or blocks the HTTP traffic to and from a Web application.
1. Who is the existing supplier for this contract?
2. What does the organisation spend for each of contract?
3. What is the description of the services provided for each contract?
4. What is the expiry date of each contract?
5. What is the start date of each contract?
6. What is the contract duration of contract?
7. What is the hardware brand? If available.
8. What is the software brand? If available?
9. The responsible contract officer? Full name, job title, contact number and direct email address.
4. Threat Monitoring – organizations and security analysts to identify and protect against security threats.
1. Who is the existing supplier for this contract?
2. What does the organisation spend for each of contract?
3. What is the description of the services provided for each contract?
4. What is the expiry date of each contract?
5. What is the start date of each contract?
6. What is the contract duration of contract?
7. What is the hardware brand? If available.
8. What is the software brand? If available?
9. The responsible contract officer? Full name, job title, contact number and direct email address.
5. Anti-virus Software Application – Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
1. Who is the existing supplier for this contract?
2. What does the organisation spend for each of contract?
3. What is the description of the services provided for each contract?
4. What is the expiry date of each contract?
5. What is the start date of each contract?
6. What is the contract duration of contract?
7. What is the hardware brand? If available.
8. What is the software brand? If available?
9. The responsible contract officer? Full name, job title, contact number and direct email address.
6. Encryption Facilities – s a host based software solution designed to encrypt sensitive data before transferring it to tape for archival purposes or business partner exchange.
1. Who is the existing supplier for this contract?
2. What does the organisation spend for each of contract?
3. What is the description of the services provided for each contract?
4. What is the expiry date of each contract?
5. What is the start date of each contract?
6. What is the contract duration of contract?
7. What is the hardware brand? If available.
8. What is the software brand? If available?
9. The responsible contract officer? Full name, job title, contact number and direct email address.

Download response Cyber Security Services 181116