TERMS OF REFERENCE

ITEM

SPECIFICATION

SUPPORTED DEVICES

Workstations, Servers Platform supported :

  • Windows XP/Vista/7/8 
  • Windows Server 2003/2008
  • Virtualization - VMWare/Hyper-V
  • Mac OS
  • Linux OS
Network Devices – Routers, Switches, Printers and other IP-based devices.
 

AUTOMATION

Procedure Creation

  • Create IT Procedures/Scripts.
  • Automatically distribute procedures via user, groups of users within a Local Area Network and Remote systems.
 

Automated Remediation

  • Automatically run procedures triggered by an alert (via Real-time monitoring of critical applications, services, event logs) offering automated remediation of issues.
 

Scheduling

  • Schedule procedures to run automatically
 

Application Deployment

  • Deploy third party applications 
  • Capability to assign software repository for local sourcing of installers.
 

Policy Enforcement/Configuration Management

  • Deploy and enforce system policies, configuration, e.g. hide control panel, block USBs via user, groups of users within a Local Area Network and Remote systems.
 

File Distribution

  • Automatically get and distribute files to and from systems connected locally and remotely.
 

MONITORING

Provides user defined real-time monitoring

  • Alerts
  • Monitor sets
  • SNMP sets
  • System check
  • Log monitoring
  • Monitoring of IP Devices
  • Monitors changes in the configuration of IT system and provides alerts if a change has occurred.
  • Provides alerts via tickets, email and dashboard.
  • Alert on specific file changes and protection violations
  • Know if disk space is running low on computers
  • Monitor devices online/offline status
  • Know when traveling users with notebooks connect
  • Alert message and recipient configuration
 

Automated Network Discovery

  • Automatically discover all devices on the network  LAN monitoring alerts when new devices are detected
  • View all known and unknown devices
 

Dashboard

  • Offers view of alerts summary per system (device)
  • Ability to group systems together 
  • Customize alerts
  • Offers Multi Router Traffic Grapher (MRTG), Bandwidth consumption.
 

INVENTORY AND AUDIT

Offers comprehensive audit of each system – Hardware, Software and Systems inventory.

 

Hardware inventory

  • Manufacturer
  • Bus speed
  • Max memory size and slots
  • Processor family, maker, max speed, current speed
  • System model
  • Memory installed, slots
  • Chassis type
  • Onboard device listings
  • System version
  • Serial numbers or service tags
  • Motherboard maker, version, serial
  • Ports (number, type)
 

Software inventory

  • Application executable name
  • Version
  • Product name
  • File size
  • Description
  • Manufacturer
  • Directory path
  •  Last modified date
 

System inventory

  • IP information
  • DNS/DHCP server information
  • Disk volume information including drive letters, space available, volume labels
  • PCI and drive hardware information include models, and user editable notes for each device
  • CPU and RAM information with specifics on CPU speeds, models, number, and ram installed
  • Printer information from the currently logged on user at the time of audit with Name, Port and Model
  • Monitor and alerts for any changes in the configuration of the system via alert summary dashboard, ticket, email.
  • Logs hardware, software or system changes
  • Logs hardware, software or system changes
  • Report on current hardware and software statistics
  • Ability to append own fields for customized tracking purposes
  • Centralized Network Audit And Inventory Repository
  • Supports / conducts audit procedures to ensure systems are in compliance with standards, e.g. Firewall on/off, AV on/off, Updated AV, etc.
 
PATCH MANAGEMENT

Manage Machines

  • Offers Scan machine, Patch status, Schedule scan, Initial and automatic updates, Pre/Post procedure, Machine History
 

Manage Updates

  • Ability to Machine/Patch updates, 
  • Provides Rollback
  • Cancel Updates
 

Patch Policy

  • Create/Delete Policies
  • Approval by Policy
  • Knowledge Based Override
 

Automatic and recurring patch scans

  • Secured or ad-hoc, Scans networks for installed and missing security patches, Detects vulnerability, Determines which patches are needed. 
  • By computer, group or user defined collections of computers
  • Automates the tedious process of researching, identifies which patches are installed and date installed, Monitors and maintains patch compliance for entire enterprise
 

Centralized Management of Patches

  • Does not require multiple patch servers
  • Ensures that all systems are protected, even remote users on laptops and workstations
  • Allows implementation across entire network
  • Always know what patches and security holes reside on each user’s system
 

Patch approval

  • Approve or deny selected patches
  • Select by user defined computer collections
 

Automated patch deployment

  • Schedule by time, computer, group or user defined collections of computers
  • Simultaneously deploy all required patches across operating systems
  • Single rollout strategy and policy enforcement
  • Maximize uptime
 

Interactive patch management

  • Select to deploy by patch or by computer
  • Select individual computers, groups or user defined collections of computers
  • Ad-hoc simultaneous deployment of selected patches
  • Across operating systems
  • Across locations
 

Flexible configuration

  • Patch file location, Patch file parameters
  • Reboot actions and notifications, By computer, group or user defined collections of computers
  • Saves bandwidth, Security and policy control
 

Comprehensive reports

  • Graphical with drill-down, User defined
  • Scheduled, E-mail notification
  • Export to HTML, Excel or Word
 

REMOTE ACCESS

Capability to access remote systems without disturbing the user

  • Access to Command prompt
  • Access to event viewer
  • Access to Audit information
  • Access to registry editor like regedt32.exe
  • Access file manager for transferring files to and from the remote system
  • Access to Task manager to see running processes and agent resource consumption
  • Automatically and transparently installs needed remote control software components
  • Easy administration of users and policies
  • Access computers from anywhere with a standard web browser
  • Access host computers from any web browser
  • Password protected
 

TICKETING

  • Accessible from a web browser
  • Automatically creates tickets based on alarm
  • Use email to update end users and receive feedback
  • Ticketing policies
  • Field customization
  • Clients can file tickets on their own
  • Auto assign tickets to technical personnel
  • Email notification of ticket status to client and technical personnel
  • Aging of tickets
 

REPORTING

  • Detailed list, table and graphic style reports
  • Hardware and Software Inventory
  • Complete Computer Changes
  • Disk Utilization
  • License Usage and Compliance
  • Network Usage and Statistics
  • Server and Workstation Uptime History
  • Help Desk Trouble Tickets
  • Computer Logs and Status
  • Schedule Reports for Automatic Distribution
  • Distribute automatically to selected e-mail recipients
 

Flexible Report Customization

  • Report for all, groups or specific computers
  • Detailed filtering and content selection
  • Add own logo
  • Immediate viewing with hyperlinks for quick data access
  • Save reports with selected parameters for reuse
  • Saved reports can be designated as private or shared
  • Export report data to HTML, Microsoft Word or Excel
 

ADMINISTRATION

  • Multi-tenant Capable
  • Ability to group systems
  • Assign Admin users
  • Ability to assign roles, scope and groups to Admin Users
  • Logs activities of Admin users
  • Ability to access Admin system remotely
 

Centralized Management

  • Ability to manage, monitor local and remote systems in a single console (without the need for a private connectivity).
  • Ability to deploy policies, monitoring definitions to both local and remote systems using a single console.
  • Ability to throttle bandwidth consumption used by agents and server to manage bandwidth and network traffic.
 

SECURITY

System Security
  • Protected against man-in-the-middle attacks
  • All communications between the host and local connection encrypted 256-bit
  • RC4 using a key that rolls at least once per day
  • No opening of ports on the client side
  • No plain-text data packets passing over the network Systems and data are secure when using as remote-access solution
 

SYSTEM CERTIFICATION

  1. Common Criteria Certified EAL2+
  2. Federal Information Processing Standards 140-2 9001 and 27001 ISO standards
 
SUPPORT

Competency
Provider should have at least 2 Certified Administrator of the Solution proposed.

Local Support

  1. 1 year of updates and support 
  2. 9 x 5 Phone, Onsite, E-mail and Chat support, One (1) hour response time upon receipt of call; 

 

 

 

CORAZON G. CORPUZ
Vice-Chairperson
Bids and Awards Committee