My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
SOLICITATION # CH16012 <br />center. A site -to -site IPsec-VPN can also be established to securely tunnel the entire virtual data <br />center back to the private data center. For data at rest"", subscribers are provided a role -based <br />access control, whereby specified users are not exposed to the entire infrastructure and can be <br />limited to a single or multiple virtual data centers. <br />Further details of the controls in place to limit exposure of these groups to customer data is <br />documented within the ATA 101 and SOC reports, available under NDA. <br />vCloud Air has logically separated networks that restrict Tenant access to only their own private <br />networks. The vCloud Hybrid Service has two offerings: The Dedicated Cloud option provides <br />physically isolated and reserved compute resources from all other vCloud Hybrid Service tenants, <br />as well as a private cloud instance. The Virtual Private Cloud option has a multitenant compute <br />resource mode. Both services have logically isolated networking and storage that ensures secure <br />resource separation. Customers have complete control over the file systems and databases they <br />deploy within the service. <br />Access is technologically enforced and employees are only authorized the level of access to <br />information assets that is required to meet an approved business need or perform prescribed job <br />responsibilities. <br />• Administrative access is limited to only those users that explicitly require privileged access. <br />Customers do not have direct access to the SaaS environment; rather, customers administer the <br />solution via the Web console. <br />FireEye <br />Each of the FireEye offerings include strong access controls including role -based access. Only <br />properly authorized individuals on a need to know basis are granted access to data. <br />VirtueStream <br />Virtustream does not have access to customer hosted data. Customers control access to their <br />application or system which sits upon the IaaS. Customer would need to create the user in their <br />own Active Directory to allow access by named users of Virtustream for specifics stem. <br />8.6.8 Offeror must describe its notification process in the event of a security incident, including relating to <br />timing, incident levels. Offeror should take into consideration that Purchasing Entities may have different <br />notification requirements based on applicable laws and the categorization type of the data being processed <br />or stored. <br />CA <br />APM <br />CA Technologies documents a plan and associated procedures in case of an <br />information security incident. The incident response plan clearly articulates the <br />responsibilities of personnel and identifies relevant parties for notification. All security <br />incidents will be investigated and triaged to understand where the vulnerability exists. <br />Software vulnerabilities will be investigated by CA engineering teams; other <br />vulnerabilities will be addressed by the SaaS Ops team in conjunction with AWS. <br />Affected customers will be notified and given a remediation plan <br />MAA <br />Clients are notified via email of any security incident that resulted in a data breach for <br />that client promptly and no later than 5 days. A root cause analysis is then sent within <br />30 days. Meeting can be setup upon request. <br />CA Agile <br />We have a defined Incident Handling Guide which outlines the process and <br />responsibilities during breach investigation. Clients are notified via email of any <br />security incident that resulted in a data breach for that client promoptly and no later <br />than 5 days. A root cause analysis is then sent within 30 days. Meeting can be seutp <br />upon request. <br />ASM <br />Clients are notified via email of any security incident that resulted in a data breach for <br />that client promptly and no later than 5 days. A root cause analysis is then sent within <br />30 days. Meeting can be setup upon request. <br />Google <br />Google's focus on security and protection of data is among our primary design criteria. Google <br />data center physical security features a layered security model, including safeguards like custom- <br />carahsoft 79 carahsoft <br />
The URL can be used to link to this page
Your browser does not support the video tag.