My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
SOLICITATION # CH16012 <br />These ASA5555 Firewall servers allow Ariba Operations to rigorously protect <br />Ariba from unauthorized access, providing full firewall security protection. <br />The Equinix Data Center utilizes an array of security equipment, techniques, <br />and procedures to control, monitor, and record access to the facility, including <br />customer cage areas. All areas of the center are monitored and recorded <br />using CCTV, and all access points are controlled. The Data Center is staffed <br />with 24-hour security officers. Visitors are screened upon entry to verify <br />identity, and escorted to appropriate locations. Access history is recorded for <br />audit purposes. <br />Fieldglass <br />Please see the Fieldglass Security and Hosting Overview provided in the <br />Supplemental Information section of this response. <br />Hanna <br />The fundamental security architecture of the SAP Cloud infrastructure is the <br />principal of a private cloud. <br />Customers receive an isolated, logical grouping of several virtual machines <br />and physical systems in dedicated customer private networks. Customer <br />private networks are segregated from each other using virtual local area <br />networks (VLAN) technology. Customer systems are deployed in the <br />respective customer private network. Though customers are only able to view <br />or access systems within their assigned customer private network. <br />Design of customer private networks has to be defined in a workshop between <br />SAP and the customer. Multiple customer private networks might be required <br />to separate different tier levels or to implement customer data flow restrictions. <br />SAP HANA Enterprise Cloud administrative tasks will be done using <br />management networks. Administrative access to the management networks <br />from the SAP internal networks is only possible using dedicated jump hosts <br />with strong authentication. <br />Security of the SAP internal network including SAP end user equipment is <br />ensured using solutions like network admission control, Intrusion Prevention <br />Systems, network filtering, strong authentication for remote access, internet <br />content filtering, anti -virus scanner. <br />SuccessFactors <br />We serve our customers and end users from secure data centers around the <br />world. Physical security features at these facilities include a 24x7x365 <br />manned security station and biometric and man -trap access controls. The <br />systems at these facilities are protected by firewalls and encryption <br />technology. Operational redundancy features include redundant power, on - <br />site backup generators, and environmental controls and monitoring. <br />We employ a wide range of security features, including two factor <br />authentication, data encryption, encoded session identifications and <br />passwords. Our hosting providers conduct regular security audits of our <br />infrastructure. We also employ outside vendors for 24x7x365 managed <br />network security and monitoring. Every page we serve is delivered encrypted <br />to the end user via a Transport Layer Security or TLS. We also use encryption <br />technology in our storage systems. <br />We continuously monitor the performance of our cloud offerings using a <br />variety of automated tools. The architecture is designed with built-in <br />redundancy for key components. We load balance at each tier in the network <br />infrastructure. We also designed our application server clusters so that <br />carahsoft <br />carahsoft <br />
The URL can be used to link to this page
Your browser does not support the video tag.