My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025 Regular & Special SA
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
SOLICITATION # CH16012 <br />CA <br />APM <br />all SaaS based instances are monitored by CA SaaS Ops. With Hybrid deployments, <br />customers can manage the on premise components of the deployment using their <br />own tooling or CA products <br />MAA <br />MAA is monitored internally as well as externally using multiple tools recognized within <br />industry. <br />CA Agile <br />Access to monitoring tools is provisions according to the principle of least priviledge <br />and is only granted based upon business need. <br />ASM <br />ASM uses Nimsoft Monitor, third -party open source monitoring tools, and ASM itself to <br />monitor the health of ASM internal services and servers. <br />AODocs <br />AODocs includes numerous administrative tools to monitor end user and administrator activites. <br />Virtru <br />Dtrace, CloudWatch, CloudTrail, Lo stache, ElasticSearch, Kibana, DataDo <br />Salesforce <br />Trust.salesforce.com is the Salesforce community's home for real-time information on system <br />performance and security. On this site you'll find: <br />• Live and historical data on system performance <br />• Up -to -the minute information on planned maintenance <br />• Phishing, malicious software, and social engineering threats <br />• Best security practices for your organization <br />• Information on how we safeguard your data <br />System Overview <br />In addition to our Trust site (http://trust.salesforce.com/trusVstatus), you will also have access to a <br />System Overview, which will help Salesforce customers monitor performance and usage of their <br />own Salesforce org. This overview includes: <br />Schema - # and % of custom objects and data storage <br />Business Logic - # and % of Rules, Apex triggers and classes, as well as % of code used <br />Licenses <br />API Usage - # and % of requests in the last 24 hours <br />User Interface - # and % of custom apps, sites, flows, custom tabs and pages <br />Portal <br />The above list is of all the possible metrics that Salesforce customers may have in their system <br />overview. <br />ServiceNow <br />ServiceNow has read and understands this requirement. ServiceNow supports only a SaaS <br />environment so there is no on -premise offering. <br />QTS <br />Alert Logic's Threat Manager Intrusion Detection System (IDS) and Vulnerability Scanning <br />functionality are designed to monitor, detect, report and alert on adverse security issues on behalf <br />of our customers. Within this process there are a number of both automated and manual <br />processes which are supported by our SIEM software ('The Expert System') as well as our <br />Network Security Analysts in our Security Operations Center (SOC). Threat Manager is the Alert <br />Logic IDS and VA scan product. It includes the physical or virtual appliances and software tools <br />used to analyze the customer's infrastructure and monitor that infrastructure for attacks. <br />ActiveWatch is the managed aspect of Threat Manager, providing 24 x 7 monitoring and incident <br />response operations from the Alert Logic SOC. <br />Threat Manager's Expert System identifies valid security events and suppresses false positives <br />through a patented multifactor correlation process. Every security event monitored by its global <br />network of threat sensors is analyzed in real time. When the Expert System determines that a set <br />of events comprise a valid security threat, an incident is created and escalated according to <br />severity via email or through an Alert Logic Network Security Analyst. This approach dramatically <br />carahsoft <br />carahsoft <br />
The URL can be used to link to this page
Your browser does not support the video tag.