Laserfiche WebLink
SOLICITATION # CH16012 <br />Once the ETP infrastructure is provisioned, customers can self-service the acceptance of up- <br />stream mail and delivery to user mailboxes by configuring their own domain settings. No user <br />mailbox provisioning is required as ETP will automatically check the validity of the email recipient <br />with the downstream service. <br />2.Mobile Threat Prevention (MTP) <br />User Provisioning <br />Once the MTP infrastructure is provisioned, customers can self-service the creation of service <br />users by integrating with an LDAP service or manually adding the users via the user interface. <br />Device Provisioning <br />Once the MTP infrastructure is provisioned, customers can self-service the creation of managed <br />devices by instructing users to install the FireEye MTP Application on their mobile device and <br />having a valid user account provisioned. <br />3.Threat Analytics Platform (TAP) <br />User Provisioning <br />Once the TAP infrastructure is provisioned, customers can create and assign role -based access <br />control to user accounts. The enrollment process includes the ability to create two -factor <br />authentication for newly provisioned users. <br />Data Sources <br />Once the TAP infrastructure is provisioned, customers can configure new data sources to feed the <br />TAP instance without the assistance of FireEye. The TAP communications broker accepts data <br />feeds in the following formats: syslog, flat files, TCP/UDP streams, and JDBC connections. <br />4.FireEye as a Service with Continuous Vigilance (FaaS CV) <br />User Provisioning <br />Once the FaaS infrastructure is provisioned, customers can create and assign role -based access <br />control to user accounts via the on premise FireEye sensors. <br />VirtueStream <br />Virtustream IaaS provides a self-service portal called xStream, where users can access, view, <br />edit, provision, and modify compute, storage, network and application services based on granular <br />Role Based Access Control, which can be integrated with Active Directory or LDAP. Virtustream <br />portal that enables the user to provision VMs, order services through a catalog, add storage, <br />u load service templates, and run various reports all through the same portal. <br />8.1.2.2 NIST Characteristic — Broad Network Access: Provide a brief written description of how the cloud <br />solutions proposed satisfies this individual essential NIST Characteristic. Attest capability and briefly <br />describe how network access is provided. <br />CA <br />APM <br />The APIM service is accessed via HTTPS on a supported browser with no <br />requirements for a workstation client install ; mobile friendly and optimized for use with <br />iOS and Android tablets <br />MAA <br />Upon native authentication, MAA dashboard is accessible by any host over public <br />internet. Also, mobile devices connect to the service using REST API. <br />CAAgile <br />All access to the application is through a browser. <br />ASM <br />The ASM dashboard and API are accessible from any host connected to the public <br />Internet. The API and dashboard require authentication, and each account is only <br />accessible by the account owner (customer). <br />Google <br />SaaS, Google Apps is device, platform and network agnostic. As a pure play cloud -based solution <br />the services can be accessed via any modern browser from any network access point. Customers <br />that have requirements to limit access to trusted devices or trusted access points have access to <br />Device Management tools via the Admin Panel at no additional cost. <br />PaaS/laaS, Google Cloud Platform management services can be accessed via any modern <br />browser from any network access point. End -users can accesses services through one or more <br />carahsoft 27 carahsoft <br />