Documente Academic
Documente Profesional
Documente Cultură
Publication reference:
Contract title: Supply of equipment for institutions in the area of justice and home affairs with the following LOT:
AC Alternating current
CAT5 cables Category 5 cabling
CD Compact disc
CE Conformité Européenne
CEE Euro plug
CPU Central Processor Unit
CV Curriculum Vitae
DC Direct current
DMZ Demilitarized Zone
FAC Final Acceptance Certificate
HDD Hard Disk Drive
HW Hardware
ICT Information-communication Technologies
IEC International Electrotechnical Commission
IP Internet Protocol
iSCSI Internet Small Computer System Interface
ISO International Organization for Standardization
KVM Keyboard Video Mouse
LAN Local Area Network
LDAP Lightweight Directory Access Protocol
LV power cables Low Voltage
MIM2 Message Information Model 2
NAT/PAT Network Address Translation/Port Address Translation
OCR Optical character recognition
RAID Redundant Array of Inexpensive Disks
RDBMS Relational database management system
RoHS Restriction of Hazardous Substances
SAS Serial Attached SCSI
SATA Serial Advanced Technology Attachment
The project outcome will certainly assist Beneficiary country to assure justice, freedom and security as well as public order within the country, improving in the meantime both
domestic and international police and judicial relations.
The requirements for the National Interoperability Platform were defined through previous projects - The Ministry of Information Society and Administration through twinning
project coordinated the definition of the Interoperability Framework (IF), in collaboration with the Austrian interoperability experts. Through EU funded project interoperability
platform were implemented and first institutions were connected.
More details for the National Interoperability Platform can we found in the following Macedonian Interoperability Framework (MIF) Documents for Macedonian public services on
a. Allows the interconnections of relevant pre-identified national databases or systems (at this stage disconnected) containing useful information and intelligence with the aim to
effectively support competent bodies to both prevent and fight organised crime and other forms of crime;
b. Consents competent national authorities to queries and simultaneously obtain pre-defined set of data contained in a wide range of disconnected systems owned, stored and
administrated by different national Institutions;
c. Contributes to the automated data exchange - without human interface - of pre-defined set of data among concerned national Institutions in accordance to each Institution’s legal
mandate (competence);
d. Permits automated compilation and retrieval of unified national and sectorial statistical data;
e. Consents to flag certain data via an early warning system.
Thus, the project result is going to be an interagency intelligence system based on a common Interoperability platform serving:
a. competent national law enforcement agencies to directly retrieve pre-defined set of data from other non-owned systems so as to proactively undertake effective investigations to
tackle corruption, organized and serious crime and other forms of crime.
b. no-law enforcement agencies to directly retrieve certain set of data from other non-owned systems with the aim to professionally and promptly fulfil their legal mandates
respectively.
As Ministry of Information Society and Administration (MISA) is responsible for operation of National Interoperability Platform, so this platform based on MIM2 model will be
used. For installation of Communication Clients (CC) for new institutions MISA will perform the configuration and registration of appropriate CC upon delivery of requested HW
and SW licences, after which MISA will take full control of CC (HW, network equipment and SW).
Therefore, the overall common objective is:
a. to have a broaden access and use across the country;
b. to use the Interoperability platform as a secure interagency tool throughout certified information are made available among the competent national Institutions in accordance to
the level of access, reflecting specific competencies.
The hardware and software must be delivered, installed and implemented at the location of the following institutions:
1. Ministry of Interior of RM (MoI); Forensic Department (FD), Department for the Fight against Serious and Organised Crime (DFSOC) and IT Department – CC already
installed;
The delivery includes psychical installation of the hardware and installation of the appropriate system and application software in order to be provided all prerequisites for the
further project deliveries:
Installation and configuration (rack, server, storage, networking)
Operation system installation and server virtualization and storage systems initialization
SSL/VPN links configuration between the entities of the Interoperability system
Installation and implementation of the software for data protection
Training
Software is to be installed in appropriate office at location receiving such equipment. The exact locality of software installation will be agreed with the Beneficiary at the time of the
commencement of the delivery.
Delivery of all equipment’s, installations, implementation, integration with existing systems, training and documentation must be in 365 days according to the annexes to the LOT1
(Annex 1: Delivery locations and Annex 2: Distribution of items per location)
Regarding safety requirements, equipment must have necessary operational warnings as well as mechanical interlocks on the equipment operating/generating more than 30 Volts AC
5.
3. Specifications 4. Notes, remarks, ref to Evaluation
1. Item Number 2. Specifications Required
Offered documentation Committee’s
notes
1.1. Format of housing: Tower server Format of housing: Tower server Dell PowerEdge T630 Data Sheet
Chipset: minimum Intel C610 series Dell PowerEdge T630 Data Sheet
1.2. Chipset: Intel C610 series chipset
chipset or equivalent
Hard disks: minimum 2 x 300GB 15K Dell PowerEdge T630 Data Sheet
Hard disks: 2 x 300GB 15K RPM and 3 x 2TB 7.2K
1.5. RPM and 3 x 2TB 7.2K RPM 2.5” Hot-
RPM 2.5” Hot-plug Hard Drives
plug Hard Drives
Raid controller: support for RAID levels Dell PowerEdge T630 Data Sheet
Raid controller: DELL PERC H730P, support for
1.6. 0, 1, 10, 5, 50, 6, 60 and at least 2GB of Dell PowerEdge Raid controller
RAID levels 0, 1, 10, 5, 50, 6, 60 and 2GB of cache
cache H730P
Disk space: The model must support the Dell PowerEdge T630 Data Sheet
Disk space: The model supports the ability to upgrade
1.7. ability to upgrade space for up to
space for up to 32 x 2.5"HDD
minimum 32 x 2.5"HDD
1.8. Optical disk: DVD RW Optical disk: DVD RW Dell PowerEdge T630 Data Sheet
Network on board: Ethernet adapter 2 x Network on board: Ethernet adapter 2 x 1Gbit LAN Dell PowerEdge T630 Data Sheet
1.9.
1Gbit LAN ports ports
Additional network card: Ethernet Additional network card: Ethernet adapter 4 x 1 Gbit Dell PowerEdge T630 Data Sheet
1.10.
adapter 4 x 1 Gbit LAN ports LAN ports
1.12 Expansion slots: minimum 8 PCIe slots Expansion slots: 8 PCIe slots Dell PowerEdge T630 Data Sheet
1.13 Power supply: minimum two redundant Dell PowerEdge T630 Data Sheet
Power supply: two redundant hot plug power supplies
hot plug power supplies
Processor: Server Class CPU, minimum Processor: Server Class CPU Intel Xeon E5-2690 v4, Supporting documents for Dell
2.3. 2.5 GHz, 35MB Cache, 14 Cores, 2.6 GHz, 35MB Cache, 14 Cores, upgradable to 2 PowerEdge R730
upgradable to 2 processors processors
2.4. Operational memory: minimum 64GB Operational memory: 64GB DDR4 installed, support Supporting documents for Dell
DDR4 installed, support for 24 DIMM for 24 DIMM slots, upgradeable to 3TB PowerEdge R730
Raid controller: support for RAID levels Supporting documents for Dell
Raid controller: DELL PERC H730P, support for
2.6. 0, 1, 10, 5, 50, 6, 60 and at least 2GB of PowerEdge R730
RAID levels 0, 1, 10, 5, 50, 6, 60 and 2GB of cache
cache
Disk space: The model must support the Supporting documents for Dell
Disk space: The model supports the ability to upgrade
2.7. ability to upgrade space for up to PowerEdge R730
space for up to 16 x 2.5 "HDD
minimum 16 x 2.5 "HDD
Network on board: Ethernet adapter 4 x Network on board: Ethernet adapter 4 x 1Gbit LAN Supporting documents for Dell
2.9.
1Gbit LAN ports ports PowerEdge R730
Additional network card: Ethernet Additional network card: Ethernet adapter 4 x 1Gbit Supporting documents for Dell
2.10.
adapter 4 x 1Gbit LAN ports LAN ports PowerEdge R730
2.13. Power supply: minimum two redundant Power supply: two redundant hot plug power supplies Supporting documents for Dell
Quantity:
3. Rack Server Type II a 10
Rack Server Type II a - Quantity: 10
Rack Server
4. Quantity: 4 Rack Server Type II b - Quantity: 4
Type II b
Processor: 2 x Server Class CPU, Processor: 2 x Server Class CPU Intel Xeon E5-2690 Supporting documents for Dell
4.3. minimum 2.5 GHz, 35MB Cache, 14 v4, 2.6 GHz, 35MB Cache, 14 Cores, upgradable to 2 PowerEdge R730
Cores processors
Raid controller: support for RAID levels Supporting documents for Dell
Raid controller: DELL PERC H730P, support for
4.6. 0, 1, 10, 5, 50, 60 and at least 2GB of PowerEdge R730
RAID levels 0, 1, 10, 5, 50, 6, 60 and 2GB of cache
cache
Disk space: The model must support the Supporting documents for Dell
Disk space: The model supports the ability to upgrade
4.7. ability to upgrade space for up to PowerEdge R730
space for up to 16 x 2.5 "HDD
minimum 16 x 2.5 "HDD
Network on board: Ethernet adapter Network on board: Ethernet adapter 2x10Gbit and Supporting documents for Dell
4.9.
2x10Gbit and 2x1Gbit LAN ports 2x1Gbit LAN ports PowerEdge R730
Additional network card: Ethernet Additional network card: Ethernet adapter 2 x 10Gbit Supporting documents for Dell
4.10.
adapter 2 x 10Gbit LAN ports LAN ports PowerEdge R730
4.14. VMware vSphere Enterprise Plus – total VMware vSphere Enterprise Plus – total qty 8 (4 Supporting documents for Dell
qty 8 (4 servers with 2 CPU – 8 CPU
Rack Server
5. Quantity: 2 Rack Server Type II c - Quantity: 2
Type II c
Processor: 2 x Server Class CPU, Processor: 2 x Server Class CPU Intel Xeon E5-2690 Supporting documents for Dell
5.3. minimum 2.5 GHz, 35MB Cache, 14 v4, 2.6 GHz, 35MB Cache, 14 Cores, upgradable to 2 PowerEdge R730
Cores processors
5.4. Operational memory: minimum 128GB Operational memory: 128GB DDR4 installed, support Supporting documents for Dell
Raid controller: support for RAID levels Supporting documents for Dell
Raid controller: DELL PERC H730P, support for
5.6. 0, 1, 10, 5, 50, 60 and at least 2GB of PowerEdge R730
RAID levels 0, 1, 10, 5, 50, 6, 60 and 2GB of cache
cache
Disk space: The model must support the Supporting documents for Dell
Disk space: The model supports the ability to upgrade
5.7. ability to upgrade space for up to PowerEdge R730
space for up to 16 x 2.5 "HDD
minimum 16 x 2.5 "HDD
Network on board: Ethernet adapter Network on board: Ethernet adapter 2x10Gbit and Supporting documents for Dell
5.9.
2x10Gbit and 2x1Gbit LAN ports 2x1Gbit LAN ports PowerEdge R730
Additional network card: Ethernet Additional network card: Ethernet adapter 2 x 10Gbit Supporting documents for Dell
5.10.
adapter 2 x 10Gbit LAN ports LAN ports PowerEdge R730
6. Rack Server Type III Quantity: 2 Rack Server Type III - Quantity: 2
Converged
9. Quantity: 2 Converged architecture solution - Quantity: 2
architecture solution
10.1. Rack cabinet with accessories Rack cabinet with accessories Free Standing Cabinets
10.2. Format of housing: 24U Rack cabinet Format of housing: 27U Rack cabinet Free Standing Cabinets
Features: Adjustable depth, integrated Features: Adjustable depth, integrated cable Free Standing Cabinets
10.4.
cable management management
10.6. KVM Switch: 4 port, rackable KVM Switch: 4 port, rackable Free Standing Cabinets
10.7. KVM console: minimum LCD 18.5", KVM console: Dell LED KMM, 18.5", LCD 18.5", Free Standing Cabinets
resolution 1366 x 768 WXGA, USB 2.0 resolution 1366 x 768 WXGA, USB 3.0 Hub with 2
Hub with 2 ports, 1U, International
11.1. Rack mountable Rack mountable RIELLO UPS Sentinel Dual 5-10kVA
11.2. On-line double conversion On-line double conversion RIELLO UPS Sentinel Dual 5-10kVA
11.4. Pure sinewave Pure sinewave RIELLO UPS Sentinel Dual 5-10kVA
11.5. 8 output connections 8 output connections RIELLO UPS Sentinel Dual 5-10kVA
11.6. Hot swappable batteries Hot swappable batteries RIELLO UPS Sentinel Dual 5-10kVA
11.8. panel, with status indication panel, with status indication RIELLO UPS Sentinel Dual 5-10kVA
12.1. Format of housing: 2U Rack server Format of housing: 2U Rack server Dell PowerEdge R730 Data Sheet
Chipset: minimum Intel C610 series Chipset: minimum Intel C610 series chipset or Dell PowerEdge R730 Data Sheet
12.2.
chipset or equivalent equivalent
Processor: 2 x Server Class CPU, Processor: 2 x Server Class CPU Intel Xeon E5-2690 Dell PowerEdge R730 Data Sheet
12.3. minimum 2.5 GHz, 35MB Cache, 14 v4, 2.6 GHz, 35MB Cache, 14 Cores, upgradable to 2
Cores processors
Hard disks: minimum 2 x 400GB Solid Hard disks: 2 x 400GB Solid State 2.5” Hot-plug Dell PowerEdge R730 Data Sheet
12.5.
State 2.5” Hot-plug Hard Drives Hard Drives
Raid controller: support for RAID levels Dell PowerEdge R730 Data Sheet
Raid controller: DELL PERC H730P, support for
12.6. 0, 1, 10, 5, 50, 6, 60 and at least 2GB of
RAID levels 0, 1, 10, 5, 50, 6, 60 and 2GB of cache
cache
Disk space: The model must support the Dell PowerEdge R730 Data Sheet
Disk space: The model supports the ability to upgrade
12.7. ability to upgrade space for up to
space for up to 16 x 2.5 "HDD
minimum 16 x 2.5 "HDD
12.8. Optical disk: DVD RW Optical disk: DVD RW Dell PowerEdge R730 Data Sheet
Network on board: 2 x 1Gbit and 2 x Network on board: 2 x 1Gbit and 2 x 10Gbit LAN Dell PowerEdge R730 Data Sheet
12.9.
10Gbit LAN ports ports
Additional network card: Ethernet Additional network card: Ethernet adapter 2 x 10Gbit Dell PowerEdge R730 Data Sheet
12.10.
adapter 2 x 10Gbit LAN ports LAN ports
Power supply: minimum two redundant Dell PowerEdge R730 Data Sheet
12.11. Power supply: two redundant hot plug power supplies
hot plug power supplies
Port type: 24x 10GbE RJ45 auto-sensing Port type: 24x 10GbE RJ45 auto-sensing
13.2. Dell Networking N400 series
(10Gb/1Gb/100Mb) fixed ports (10Gb/1Gb/100Mb) fixed ports
Switch attributes: Line-rate Layer 2 Switch attributes: Line-rate Layer 2 switching, Line- Dell Networking N400 series
13.4.
switching, Line-rate Layer 3 routing rate Layer 3 routing
13.5. CPU memory: minimum 2GB CPU memory: 2GB Dell Networking N400 series
13.6. Flash memory: minimum 256MB Flash memory: 256MB Dell Networking N400 series
13.8. Forwarding rate: minimum 476 Mpps Forwarding rate: 476 Mpps Dell Networking N400 series
Priority queues per port: minimum 8 per Dell Networking N400 series
13.9. Priority queues per port: 8 per port
port
13.10. MAC addresses: minimum 16k MAC addresses: minimum 131,072k Dell Networking N400 series
13.12. VLAN routing interfaces: minimum 128 VLAN routing interfaces: 128 Dell Networking N400 series
13.13. VLANs supported: minimum 4094 VLANs supported: 4094 Dell Networking N400 series
14. Storage unit Quantity: 1 Storage unit Dell SCv2020 – Quantity 1 Dell Storage SCv2000 Series
14.1. Internal storage: 24 x 2.5” drive bays Internal storage: 24 x 2.5” drive bays Dell Storage SCv2000 Series
14.2. Minimum drives supported: 150 Drives supported: 168 Dell Storage SCv2000 Series
Supported drive types HDD: 15K, 10K, Supported drive types HDD: 15K, 10K, 7.2K RPM, Dell Storage SCv2000 Series
14.3.
7.2K RPM, SSD SSD
Controllers: dual controllers with min 4 Controllers: dual controllers with 4 core and 8GB Dell Storage SCv2000 Series
14.5.
core and 8GB memory per controller memory per controller
14.6. Network/server connectivity (front-end): Network/server connectivity (front-end): 2 x 10Gb Dell Storage SCv2000 Series
14.9. RAID: Supports RAID 5, 6 and RAID 10 RAID: Supports RAID 5, 6 and RAID 10 Dell Storage SCv2000 Series
17. Data Storage Type III Quantity: 1 Data Storage Type III - Quantity: 1
20.1. 42U Rack cabinet 42U Rack cabinet Free Standing Cabinets
Features: Adjustable depth, integrated Features: Adjustable depth, integrated cable Free Standing Cabinets
20.3.
cable management, roof fans installed management, roof fans installed
26.3. Capacity: minimum 16 Gbps Capacity: 20 Gbps CISCO 300 Series Switches
26.4. Forwarding rate: minimum 11.5 Mpps Forwarding rate: 14.88 Mpps CISCO 300 Series Switches
26.5. Priority queues: minimum 4 per port Priority queues: 4 per port CISCO 300 Series Switches
26.6. No of MAC address: minimum 16K No of MAC address: 16K CISCO 300 Series Switches
26.7. Packet buffer memory: minimum 8Mb Packet buffer memory: 8Mb CISCO 300 Series Switches
27.3. Capacity: minimum 52 Gbps Capacity: 56 Gbps CISCO 300 Series Switches
27.4. Forwarding rate: minimum 38 Mpps Forwarding rate: 41.67 Mpps CISCO 300 Series Switches
27.5. Priority queues: minimum 4 per port Priority queues: 4 per port CISCO 300 Series Switches
27.6. No of MAC address: minimum 16K No of MAC address: 16K CISCO 300 Series Switches
27.7. Packet buffer memory: minimum 8Mb Packet buffer memory: 8Mb CISCO 300 Series Switches
Gigabit L3 Switch 24
28. Quantity: 1 Gigabit L3 Switch 24 port – Quantity 1
port
Gigabit L3 Switch 48
29. Quantity: 9 Gigabit L3 Switch 48 port - Quantity: 9
port
29.9. MAC addresses: minimum 16k MAC addresses: minimum 32k Dell EMC Networking N2000 Series
Switches
Fibre Channel ports: Switch mode 12port Fibre Channel ports: Switch mode 12port
30.1. configuration (+12 port increment configuration (+12 port increment through Ports on Brocade 6505 Switch
through Ports on Demand [PoD] license) Demand [PoD] license)
Performance: Auto-sensing of 2, 4, 8, and Performance: Auto-sensing of 2, 4, 8, and 16 Gbps Brocade 6505 Switch
30.2.
16 Gbps port speeds port speeds
ISL trunking: Frame-based trunking with ISL trunking: Frame-based trunking with up to eight Brocade 6505 Switch
30.3. up to eight 16 Gbps ports per ISL trunk; 16 Gbps ports per ISL trunk; up to 128 Gbps per ISL
up to 128 Gbps per ISL trunk. trunk.
Aggregate bandwidth: 384 Gbps end-to- Aggregate bandwidth: 384 Gbps end-to-end full Brocade 6505 Switch
30.4.
end full duplex duplex
Point-to-point
31. Quantity: 5 Point-to-point wireless link 2.4GHz - Quantity: 5
wireless link 2.4GHz
31.1. Operation distance: Minimum 4,000m Operation distance: 10,000m StarTech Outdoor 300 Mbps 2T2R
Wireless Access Point 5 HHz
Point-to-point
32. Quantity: 5 Point-to-point wireless link 5.8GHz - Quantity: 5
wireless link 5.8GHz
Encryption: 128bit WEP, WPA and WPA2 StarTech Outdoor 300 Mbps 2T2R
Encryption: 128bit WEP, WPA and
32.3. Wireless Access Point 5 HHz
WPA2
802.11a/n PoE Powered WiFi AP
Delivered with: 2 antennas, POE power inserters and StarTech Outdoor 300 Mbps 2T2R
Delivered with: 2 antennas, POE power
32.6. wall mounting kit Wireless Access Point 5 HHz
inserters and wall mounting kit
802.11a/n PoE Powered WiFi AP
IPS (Intrusion Prevention System) – IPS (Intrusion Prevention System) – included one Juniper SRX Series Services
34.10.
included one year subscription year subscription Gateways for the Branch
Anti-Spam protection – included one Anti-Spam protection – included one year Juniper SRX Series Services
34.12.
year subscription subscription Gateways for the Branch
SSL VPN remote access with GRE, IP-IP SSL VPN remote access with GRE, IP-IP and IPsec Juniper SRX Series Services
34.13.
and IPsec tunnels capability tunnels capability Gateways for the Branch
Quantity:
35. Personal Computers 131
Personal Computers - Quantity: 131
CPU: minimum 2 cores, 64-bit CPU: Intel i3-7100, 2 cores, 64-bit technology Versatile business desktops designed
technology compatible, minimum base compatible, base frequency 3.9GHz, 3MB of CPU for ultimate performance
35.2. frequency 3.9GHz, minimum 3MB of cache (total value of all level cache combined)
CPU cache (total value of all level cache
combined)
RAM memory: minimum 8 GB DDR4 RAM memory: 8 GB DDR4 2133MHz Versatile business desktops designed
35.3.
2133MHz for ultimate performance
Hard disk drive: minimum 500GB Hard Hard disk drive: 500GB Hard Disk Drive Versatile business desktops designed
35.4.
Disk Drive for ultimate performance
Graphic adapter: integrated on-board, Graphic adapter: integrated on-board, dual display Versatile business desktops designed
35.6.
dual display support support for ultimate performance
Network adapter: 10/100/1000Mbps on- Network adapter: 10/100/1000Mbps on-board Versatile business desktops designed
35.8.
board for ultimate performance
35.9. Mainboard interfaces, minimum: 4 x Mainboard interfaces4 x USB 2.0 and 6 x USB 3.1 (of Versatile business desktops designed
USB 2.0 and 4 x USB 3.0 (of those those 4 USB located on front side of the workstation for ultimate performance
minimum 4 USB located on front side of case), 1xDisplay Port and 1x HDMI, 1xRJ-45
the workstation case), 1xDisplay Port
Free expansion slots: minimum 1xPCIe Free expansion slots: 1xPCIe x16, 1x PCIe x4 (x1 Versatile business desktops designed
35.10.
x16, 1x PCIe x1 compatible) for ultimate performance
Input devices: Keyboard, Optical mouse Input devices: Keyboard, Optical mouse with scroll Versatile business desktops designed
35.11. with scroll function (both USB or PS/2 function (both USB type) for ultimate performance
type)
Operating System: Windows 10 Pro x64 Operating System: Windows 10 Pro x64 preinstalled Versatile business desktops designed
35.12.
preinstalled or equivalent for ultimate performance
Compliant standards: CE and/or TUVGS, Compliant standards: CE and/or TUVGS, RoHS, Versatile business desktops designed
35.13.
RoHS, EPEAT, WEEE, EnergyStar EPEAT, WEEE, EnergyStar for ultimate performance
Monitor: Size: minimum 21.5"; Monitor: DELL E2216H, Size: 21.5"; Resolution: Versatile business desktops designed
Resolution: minimum 1920x1080, 1920x1080, Response time: 5ms; Contrast: 1000:1; for ultimate performance
Response time: maximum 5ms; Contrast: Brightness: 250cd/m2; Connectivity: VGA and
35.14. minimum 1000:1; Brightness: minimum Digital port compatible with PC digital output –
250cd/m2; Connectivity: VGA and Display port
Digital port compatible with PC digital
output
Personal Quantity:
36. Personal Computers+Endpoint - Quantity: 35
Computers+Endpoint 35
All-In-One Personal
37. Quantity: 5 All-In-One Personal Computers - Quantity: 5
Computers
37.1. Chassis: Integrated inside monitor Chassis: Integrated inside monitor Dell XPS 27 documentation
37.4. RAM memory: minimum 8 GB DDR4 RAM memory: 8 GB DDR4 Dell XPS 27 documentation
37.5. Hard disk drive: minimum 1TB SATA Hard disk drive: 1TB SATA Dell XPS 27 documentation
37.7. Graphic adapter: minimum 2GB, 128 bit Graphic adapter: AMD Radeon RX570 8GB, 128 bit Dell XPS 27 documentation
37.8. Sound card: integrated, on-board Sound card: integrated, on-board Dell XPS 27 documentation
37.9. Speakers: integrated or external speakers Speakers: integrated speakers Dell XPS 27 documentation
Input devices: Keyboard, Optical mouse Input devices: Keyboard, Optical mouse with scroll Dell XPS 27 documentation
37.12.
with scroll function function
CPU: minimum base frequency 3.4GHz, Dell Precision Tower 3000 Series
minimum 4 cores, 64-bit technology CPU: Intel i7-6700, base frequency 3.4GHz, 4 cores, (3620)
38.2. compatible, minimum 8MB of CPU 64-bit technology compatible, 8MB of CPU cache
cache (total value of all level cache (total value of all level cache combined)
combined)
Hard disk drive: minimum 2x 512GB Dell Precision Tower 3000 Series
38.4. Hard disk drive: 2x 512GB SSD
SSD (3620)
Graphic adapter: Discrete 4GB 128bit, Graphic adapter: AMD FirePro(TM) W5100, Discrete Dell Precision Tower 3000 Series
38.6.
4x Display port 4GB 128bit, 4x Display port (3620)
Free expansion slots: 3 x PCIe (1 x Full Height PCIe Dell Precision Tower 3000 Series
38.10. Free expansion slots: minimum 3 x PCIe x16 Gen 3 (wired x4); 1 x Full Height PCIe x4 Gen3; (3620)
1 x M.2 PCI Express 3.0 (22x80 mm))
Input devices: Keyboard, Optical mouse Dell Precision Tower 3000 Series
Input devices: Keyboard, Optical mouse with scroll
38.11. with scroll function (both USB or PS/2 (3620)
function (both USB type)
type)
Operating System: Windows 10 Pro x64 Dell Precision Tower 3000 Series
38.12. Operating System: Windows 10 Pro x64 preinstalled
preinstalled or equivalent (3620)
Compliant standards: CE and/or TUVGS, Compliant standards: CE and/or TUVGS, RoHS, Dell Precision Tower 3000 Series
38.13.
RoHS, EPEAT, WEEE, EnergyStar EPEAT, WEEE, EnergyStar (3620)
Delivered with connection cables for Delivered with connection cables for both (analogue PHILIPS 6000 series 4K Ultra Slim
39.8.
both (analogue and digital) interfaces and digital) interfaces LED TV powered by Android
Compliant standards: CE, RoHS, Compliant standards: CE, RoHS, EnergyStar PHILIPS 6000 series 4K Ultra Slim
39.9.
EnergyStar LED TV powered by Android
Quantity:
41. Laptop Type I Laptop Type I - Quantity: 35
35
41.2. 3D graphic card: Integrated 3D graphic card: Integrated Latitude 5000 Series 5280/5480/5580
41.4. Memory: min. 4GB DDR3 Memory: 4GB DDR4 Latitude 5000 Series 5280/5480/5580
41.5. HDD: min. 500GB SATA HDD: 500GB SATA Latitude 5000 Series 5280/5480/5580
41.6. Camera: min. HD webcam Camera: HD webcam Latitude 5000 Series 5280/5480/5580
Ports & Expansions: min. 1xUSB 3.0, Ports & Expansions: 1xUSB 3.0, 2xUSB 3.0 (USB Latitude 5000 Series 5280/5480/5580
41.8. 2xUSB 2.0, VGA, HDMI, RJ-45, 2.0 compatible), VGA, HDMI, RJ-45, memory card
memory card slot slot
Quantity:
42. Laptop Type II 25
Laptop Type II - Quantity: 25
42.2. 3D graphic card: minimum 2GB 128 Bit 3D graphic card: Nvidia Quadro M620 2GB 128 Bit Dell Precision 3520 Documents
42.4. Memory: minimum 16GB DDR4 Memory: 16GB DDR4 Dell Precision 3520 Documents
42.5. HDD: minimum 500GB SSD HDD: 500GB SSD Dell Precision 3520 Documents
42.6. Camera: minimum HD webcam Camera: HD webcam Dell Precision 3520 Documents
42.7. Battery: minimum Li-Ion 4-cell Battery: Li-Ion 4-cell Dell Precision 3520 Documents
Connectivity: Gigabit LAN, Wireless Connectivity: Gigabit LAN, Wireless LAN, Bluetooth Dell Precision 3520 Documents
42.8.
LAN, Bluetooth 4.0 4.0
Quantity:
43. Laptop Type III Laptop Type III - Quantity: 50
50
Functions: Printing, copying, faxing, Functions: Printing, copying, faxing, scanning and
48.1. HP LaserJet Pro MFP M426 Series
scanning and scan to email scan to email
48.2. Print technology: Monochrome Laser Print technology: Monochrome Laser HP LaserJet Pro MFP M426 Series
48.3. Print Resolution hardware: 600 x 600 dpi Print Resolution hardware: 600 x 600 dpi HP LaserJet Pro MFP M426 Series
48.4. Print Speed A4: Minimum 25 pages/min Print Speed A4: 38 pages/min HP LaserJet Pro MFP M426 Series
48.5. Time to first page: Maximum 9 seconds Time to first page: 5.6 seconds HP LaserJet Pro MFP M426 Series
48.6. Memory: Minimum 256 MB Memory: Minimum 256 MB HP LaserJet Pro MFP M426 Series
Maximum Monthly Duty Cycle: Maximum Monthly Duty Cycle: 80,000 pages per HP LaserJet Pro MFP M426 Series
48.7.
Minimum 30,000 pages per month month
Paper input capacity: Minimum input HP LaserJet Pro MFP M426 Series
Paper input capacity: 350-sheet, manual feed slot 10-
48.8. 250-sheet, manual feed slot 1-sheet, ADF
sheet, ADF for 50 sheets
for minimum 40 sheets
Paper output capacity: Minimum 100 HP LaserJet Pro MFP M426 Series
48.9. Paper output capacity: 150 pages
pages
Connectivity: USB 2.0, Ethernet Connectivity: USB 2.0, Ethernet (10/100/1000), Wi-Fi HP LaserJet Pro MFP M426 Series
48.11.
(10/100), Wi-Fi b/g/n b/g/n
48.12. Copy speed A4: 25 pages / min Copy speed A4: 38 pages / min HP LaserJet Pro MFP M426 Series
Scan Speed A4: Minimum 40 pages per HP LaserJet Pro MFP M426 Series
Scan Speed A4: 47 pages per minute (black), 30 pages
48.13. minute (black), a minimum of 15 pages
per minute (colour)
per minute (colour)
48.14. Scan resolution: 1200 X 1200 dpi Scan resolution: 1200 X 1200 dpi HP LaserJet Pro MFP M426 Series
48.15. Scanner Type: Flatbed scanner with ADF Scanner Type: Flatbed scanner with ADF HP LaserJet Pro MFP M426 Series
Toner: Initial toner capacity of at least HP LaserJet Pro MFP M426 Series
48.16. Toner: Initial toner capacity of 3100 pages
1500 pages
49.1. Functions: Scan, print, copy, fax and scan Functions: Scan, print, copy, fax and scan to email Xerox Phaser 6510 Color Printer and
to email Xerox WorkCentre 6515 Color
Multifunctional Printer
Paper input capacity: Minimum input of Xerox Phaser 6510 Color Printer and
Paper input capacity: 250 sheets, bypass tray 50-sheet,
49.8. 250 sheets, bypass tray 50-sheet, single- Xerox WorkCentre 6515 Color
single-pass DADF 50 sheets
pass DADF 50 sheets Multifunctional Printer
49.9. Duplex (two-sided) printing: Integrated Duplex (two-sided) printing: Integrated Duplex Xerox Phaser 6510 Color Printer and
Connectivity: USB 2.0; Wi-Fi direct; Xerox Phaser 6510 Color Printer and
Connectivity: USB 3.0; Wi-Fi direct; Gigabit Ethernet
49.10. Gigabit Ethernet 10/100/1000; Wi-Fi Xerox WorkCentre 6515 Color
10/100/1000; Wi-Fi 802.11n
802.11n Multifunctional Printer
Toner: Set of cartridges for minimum Xerox Phaser 6510 Color Printer and
Toner: Set of cartridges for 8,000 B&W pages and
49.14. 8,000 B&W pages and minimum 5,000 Xerox WorkCentre 6515 Color
5,300 Colour pages
Colour pages Multifunctional Printer
Multifunction Laser
Printer B&W A4 with Quantity: Multifunction Laser Printer B&W A4 with
50.
authentication 10 authentication Software - Quantity: 10
Software
52.1. Print Technology: InkJet Colour Print Technology: InkJet Colour EPSON SureLab SL-D700
52.2. Printing resolution: 720 x 720 dpi Printing resolution: 720 x 720 dpi EPSON SureLab SL-D700
Print Speed: minimum 350 (dimension Print Speed: 360 (dimension 10cm x 15cm) prints in EPSON SureLab SL-D700
52.3.
10cm x 15cm) prints in hour hour
52.5. Media Handling: Roll Paper Media Handling: Roll Paper EPSON SureLab SL-D700
Minimum of 600ml for each ink colour 600ml for each ink colour delivered EPSON SureLab SL-D700
52.6.
delivered
Relational database
management system Relational database management system Microsoft
55. Microsoft SQL Server Quantity: 3 SQL Server 2016 for 35 users (CAL)
2016 for 35 users - Quantity: 3
(CAL) or equivalent
Quantity:
59. Mobile Phone 10
Mobile Phone - Quantity: 10
Internal Storage: 32GB, Support for up to Internal Storage: 32GB, Support for up to 32gb SD ASUS ZenFone 3 documentation
59.2.
32gb SD Card Card
59.3. Processor: Quad Core 64 bit Processor: Quad Core 64 bit ASUS ZenFone 3 documentation
59.4. Internal Memory: 3GB Internal Memory: 3GB ASUS ZenFone 3 documentation
59.5. Rear Camera: 13 Megapixel Rear Camera: 13 Megapixel ASUS ZenFone 3 documentation
59.6. Front Camera: 5 Megapixel Front Camera: 5 Megapixel ASUS ZenFone 3 documentation
59.10. Sensors: Accelerator, E-Compass, Sensors: Accelerator, E-Compass, Fingerprint ASUS ZenFone 3 documentation
Fingerprint
Quantity:
60. Barcode Reader 30
Barcode Reader -Quantity: 30
60.1. Type: Handheld bar code reader Type: Handheld bar code reader ZEBRA LS1203 Spec Sheet
60.2. Scanner Type: Bi-directional Scanner Type: Bi-directional ZEBRA LS1203 Spec Sheet
60.3. Light Source (Laser): 650nm laser diode Light Source (Laser): 650nm laser diode ZEBRA LS1203 Spec Sheet
60.4. Scan Rate: 100 scans per second Scan Rate: 100 scans per second ZEBRA LS1203 Spec Sheet
60.7. Connection: USB, Plug and Play Connection: USB, Plug and Play ZEBRA LS1203 Spec Sheet
Forensic SATA/IDE
62. Quantity: 1 Forensic SATA/IDE Bridge - Quantity: 1
Bridge
63. 3.5” Hard drives Set Quantity: 1 3.5” Hard drives Set - Quantity: 1
64. 2.5” Hard drives Set Quantity: 1 2.5” Hard drives Set - Quantity: 1
Type: SDHC or SDXC memory card (or Type: microSDHC with adapter KINGSTON MicroSDHC / Micro
69.1.
microSDHC/SDXC with adapter) SDXC Class 10 UHS-I card
Type: SDHC or SDXC memory card (or Type: SDHC or SDXC memory card (or KINGSTON MicroSDHC / Micro
70.1.
microSDHC/SDXC with adapter) microSDHC/SDXC with adapter) SDXC Class 10 UHS-I card
Server Expansion
71. Quantity: 4 Server Expansion Memory - Quantity: 4
Memory
Product type, model: Product type, model: UC300 Cat.5e DRAKA UC300 Cat.5e u/UTP - CPR
73.1. Type: Ethernet cable Cat5e Type: Ethernet cable Cat5e DRAKA UC300 Cat.5e u/UTP - CPR
73.2. Cable length: 300m Cable length: 300m DRAKA UC300 Cat.5e u/UTP - CPR
75.2. Number of ports: min.1 Number of ports: min.1 StarTech 1-Port Gigabit PoE + Power
over Ethernet Injector (30W) w / Non-
Standard PoE Boost (60W) and
Redundant Power
76.1. Type: Coaxial cable Type: Coaxial cable DRAKA RG 59 type B/U 75 Ohm Eca
76.2. Cable length: 300 m Cable length: 300 m DRAKA RG 59 type B/U 75 Ohm Eca
Product type, model: Product type, model: BNC to RCA Inter-series Adaptors
77.1. Type: BNC (Male) to RCA (female) Type: BNC (Male) to RCA (female) connector Inter-series Adaptors
connector
Quantity:
78. BNC connector 300
BNC connector - Quantity: 300
Leased line
79. Quantity: 7 Leased line connection - Quantity: 7
connection
Object-relational
database
Object-relational database management system
80. management system Quantity: 1
Oracle Database - Quantity: 1
Oracle Database or
equivalent
interconnection
within the existing
Interoperability
system
Web Service
Development (for the Quantity: Web Service Development (for the Interoperability
83.
Interoperability max. 40 system purposes) - Quantity: 40
system purposes)
83.1. In line with the needs for exchange of We will implement forty new Web Services which Document: Web Service
data among the institutions, it is foreseen will be registered in the MIM2 Service Catalogue. Development, subchapter Business
that all institutions will be connected to analyses
The process of implementation is process of:
the MIM2 service bus (so-called EU
platform) from the national platform for 1. Business analysis
interoperability for the exchange of 2. Development
unclassified data. The exact web service 3. Registration
publishing reorganization will be done in
In the phase of business analysis, we will detect which
business analysis phase.
of the current services are interesting for institutions
The project includes implementation of which are part of this project, which data from current
maximum forty (40) new Web services, institution registered on the MIM2 platform is
which involve: interested for institutions which are part of this project
and for this data we will developed new service. Also,
Business analysis
we will be analyses back end systems of institution
Conducting detail business analysis in from this project and detect interesting data and
the involved institution in order to be document which is candidate for develop new web
defined the following information: service.
Web Service Consumer and web All measures and parameter which are part of item
Service Provider participants 83.1 will be part of business analysis.
Consumer participant’s requirements
Defining unclassified data which can
be exchanged between the
participants in accordance with the
obligation law and regulations
Identifying which of the defined
unclassified data are stored in the
Provider participant’s DB
Providing detail information about
the Web services, defined for further
development and implementation:
83.2. Development For development of web services detect in the phase Document: Web Service
of business analysis we will user: Development, subchapter
The web services must be developed in
Development and registration
accordance with the MIM protocol. The 1. SOAP ASMX Service
web services must be developed on the 2. WCF Service
Development environment.
With the custom configuration of this technology we
Every new web services must support the will be implemented services with next criteriums:
IOP-T and MIM2 specific standards and
protocols: SOAP 1.2
o WS Addressing
o WS Policy
83.4. Asynchronous communication We propose two types of asynchronous method of Document: Web Service
communication: Development, subchapter
To implement Asynchronous
Asynchronous communication
communication through the MIM2 1. Consumer requests service, the provider
platform, two services have to be gives response with unique identifier of the
developed: (1) one from the provider side message. Than consumer again requests for
for the requestor to submit the request for final response and the provider responses
data and (2) one from the requestor side with finial response state.
for the provider to deliver the data. 2. Consumer requests service, the provider
Document Management
System implementation
1. eArchive Module
(users: 50 per institution) * Ministry of Interior.can use Module 2 and
Module 3 which will be implemented as part of the
2. Module for integration Interoperability platform
with external systems for Quantity:
84.
8 institutions 3 *Module 1 will be implemented only in three
institutions: AMCP, FPO, SCSP
3. Module for electronic
document exchange
between the connected
institutions on the
interoperability platform
for 8 institutions
84.1. Subject to the requirement for public DMS system together with eArchive functionalities Each functionality is covered in
procurement is development, will be implemented for 3 institutions: AMCP, FPO, details in below items and explained
implementation, software maintenance, SCPC. in technical documentation
and user support for a Document
Document: Document Management
Management System for the following 3
Separate repository will be deployed for each System
public institutions:
institution. The solutions will be web based and could
1. AMCP be managed from central location.
2. FPO
a. The DMS will support working and exchanging
3. SCPC
documents as well as attaching workflow a.
The solution has to provide processes on events on documents
Implementation of specific repositories b. System will be integrated with multiple
for each of these 3 institutions and has to gateways that offer communication with various
enable the work and administration of the external systems.
system for managing documents, content c. The system will be based on the latest platforms
and business processes to be carried out offering modern technology and user interface.
from any location with web based access Latest technologies for authentication and role
to the central system. based authorization will be implemented on top
of SAML 1.1 standard as well as support for
The DMS system will be implemented
LDAP (ex. Active Directory)
separately in each of the 3 above listed
d. Powerful ECM and DMS system will cover all
institutions. Following are the key
the requirements about document storage on
characteristics of the required EDMS
different local and remote repositories. eArchive
system:
module for storing document records will be
a. The system must provide interface to implemented in the DMS. DMS Search will be
exchange documents and trigger responsible for indexing content and metadata
workflow processes without loss of information.
metadata or structure
e. The system will contain a software that cover
b. System must be capable of
powerful and easy to use application for
exchanging documents and
scanning documents. Processing them with OCR
information with external systems
and manual indexing if required, they will end
c. System must provide modern user
up in the document management system.
interface and support comprehensive
f. DMS system will support storing documents in
authorization and user certification
document libraries with versioning functionality.
procedures, allowing for the security
Each document will have major and minor
and reliability of the corporate
version, with possibility to present only
information. Functionality of the
“approved” documents with major version to
system must be determined through
certain user roles.
user roles
g. As modern system, comprehensive XML
d. System must provide for integrated
support and open integration standard will be
document repository capable of
used trough-out the system.
managing electronic records and
h. The DMS have own built-in search service
store document indexes and
application which is responsible for crawling ,
metadata information
indexing and processing content. Later offers
e. System must support input via
this index to be searched by the users taking care
scanners and use of Optical
of the permissions that each user have on
Character Recognition
particular content.
f. System must support document
System as well as Search offer no-coding
versioning including the major,
capabilities to add new metadata fields to
minor and branch version control.
documents, and index them back into index so
g. System must provide comprehensive
they and be searched and filtered by.
XML support
DMS with Views capabilities can be customized
h. System must have comprehensive
to present different fields and data to different
indexing facilities, built in indexing
roles and can be customized per user base.
server for indexing documents,
i. DMS will support a variety of authentication
metadata and content. It must
methods and authentication providers for the
support comprehensive and flexible
following authentication types: Windows
profiling system that allows for a
authentication, Forms-based authentication and
maximum level of fields and format
SAML token-based authentication. SharePoint
presentation customization.
support so called “modern authentication
i. System must provide for user
mechanisms” like Claim-based authentication
authentication using standard
based on SAML 1.1 and oAuth. All mentioned
described institutions.
84.2. Within each module the following a. The e-Archive system supports import, classification and Document: Document Management System
recording of both Hard copy and soft copy documents.
requirements and functionalities needs to Chapter: e-Archive (Corporate Document
be fulfilled: b. Institutions can capture and index information from both paper Repository)
and e-source documents and convert it into electronic information
I. e-Archive module delivered to the back-end system/content repository. а. Article: Document entry / distribution to
relevant person/s
a. Module for import, classification c. The e-Archive system comes with a Record Book which is
and recording of incoming compliant with the latest regulating law and office operations. b. Article: Document entry / distribution to
documents (both Hard and soft relevant person/s
d. The e-Archive system comes with a
copy). Registry/Confirmation/Internal book compliant with the latest c. Article: Record Book
b. This module must enable regulating law and office operations.
institutions to capture and index e. The electronic postal book gives preview of the documents that d. Article: Registry Book
information from virtually any are send through post office to the clients. By using a search option,
paper or electronic source, one can search through the sent documents by the following e. Article: Postal Book
parameters. Article: Report- List of documents by
transform it into electronic document type
Additional books by document type are supported like book of
information, and deliver it into the contracts. Article: Book of Invoices
back-end system. The aim of this f. Article: Preview of deeds inventory
module is to connect and delivers The system support entering data and reporting of the Invoices. The
separate Book of Invoices will be available to the users. g. Article: e-Archive
electronic data and documents to a
content repository. f. With the option: “Preview of deeds inventory” one is enabled to h. Article: Document entry / distribution to
have an overall display of all documents that are maintained under relevant person/s
c. Electronic record book and same deed inventory, respectively referring to the same subject Article: Distribution of the scanned documents
archiving module in accordance matter as they are one entirety. from the registry
with the regulating law and office Article: Notifications
g. Each institution will be completly independent with own views
operations. of documents, own reports and seach.
d. Electronic registry book and i. Article: Adding new users
h. System offer document distribution, starting at the moment what
archiving module in accordance is is entered into system, but also later when users in responsible j. Article: Document lists by status and role
with the regulating law and office organization unit receive the document. They can deistibute the Article: Search
operations document furher in the organization.
e. Electronic postal/invoices/contracts When distributing documents, the affected users in the process of
document archiving receives notification by mail, which informs k. Article: Document entry / distribution to
book the user that has been added in one of the groups. relevant person/s
f. Preview of deeds inventory book
(registry of acts) i. Depending on the user role within one document and its response l. Article: Document entry / distribution to
g. Implementation of views, reports („Receive “or „Not for me “), users may add other persons in relevant person/s
different roles to the document thus providing manual workflow of Article: Open
and metadata search of this module the same document to different employees and departments in the
for all 3 institutions enrolled in the organisation. The process of adding users in one of the sections m. Article: Open
u. Review of documents for my v. In order to preserve and emphasize the confidentiality/secrecy of nn. Article: Administration modules
subordinates any given document within the organization, an electronic stamp of
confidentially is added on each document page.
v. Electronic Stamp for w. Once a document is sent to a particular user, the user can either
confidentiality degree of the deny or accept the document. The user confirms the document’s
document and to be placed on each reception by selecting the option “It’s for me”.
document page x. The system supports sending documents by mail. It also comes
with a built-in Mailing Book which keeps record of all documents
w. Confirmation of document receipt sent by mail.
in archive
authorized technical system made on the particular document, which gives exact info on which
date, in what hour and by which user the particular changes/actions
administrators and need to prevent are made. Users or administrator cannot change this data
access to information by
unauthorized persons. jj. The system authorization mechanism is tightly integrated with
Active Directory. This offers Single Sign-On experience for all
hh. Submission of e-mail (notification) users that are logged on to their computers with corporate Active
Directory credentials.
as a result of each document phase
(distribution, reminder of subject kk. The e-archive can be integrated with other systems, so the
file’s status and alarm document from the electronic archive is send to the other system
with its metadata and they can be reused into the other system. This
notifications) actions are defined for a specific document type and are defined
user roles that can make this actions. Also there is an option for
ii. Control of history of all data integration of documents from other systems to be added into the
modifications/changes. Relevant electronic archive. Powerful and full-features Web Services are
logs should be maintained in a exposed for integration
secure way thus the control of
saved records, data modifications ll. As a web based solution with direct online access, the electronic
as well as records entered in the archive enables process standardization and digitalization of
database by the end users should archiving for the incoming/outgoing documents which enter into
the Archive. All major browsers are supported to work wilh, like IE,
be with timestamp. Chrome, Mozzila
jj. Integration with Microsoft Active mm. The e-Archive has multilingual User Interface, supporting
Directory as well as possibility for both English and Macedonian language.
use of one unique user name and nn. The e-archive system’s administration module consists of the
password. following sub-modules:
84.3. Module for integration with external Institutions that do not have their own business Document: Document Management
systems information system application solution will still be System, Chapter: Module for
able to access and interact with the MIM2, integration with external systems
This requirement is for integration
requesting access to use the available services,
among different institution for using their
external service with permission on user through the customized software solution. The
level. solution will provide presentation layer for the
Interoperability Information Portal (IIP), through
This module should enable:
which all authorized users will be able to interact
a. The user that is already with the MIM2. Depending on the level of access
authenticated can consume only for the authorized user can access configurable
web services for which has an group of service interfaces and end points that are
authorization already available. The IIP will increase the
flexibility of the overall solution, promoting the data
b. Adding of new web services
exchange through the presentation layer solution.
should be handled automatically
and dynamically without the need In context of the IIP users will be classified as:
of solution reprogramming
Institution Manager. This type of user can
c. In order to enable automatic act on behalf of the institution with in the
addition of new web services the IIP.
solution should be able to Institution Employee. User given access to
automatically parse WSDL of new the set of service interfaces/endpoints
web services and generate forms available on the IIP.
for service invocation, for web
services that have registered The basic functionalities that the Institution Manager
WSDL’s in the service catalogue will have regarding the user management of the
on the Interoperability platform: entitled institution can be defined as follows:
84.4. Module for electronic document The module for electronic document exchange Document: Document Management
exchange between the connected between the connected institutions through the System, Chapter: Module for
institutions through the interoperability platform makes sure that listed electronic document exchange
interoperability platform institution have the possibility for document and data
exchange in accordance with the law, satisfying legal
Electronic document exchange main
criteria for digital signatures, digital seal and proof for
objective is to ensure that listed state
request delivery that ensure interoperable secure and
institutions have possibility for document
reliable communication following the EU standards
and data exchange in accordance with
for digitalization.
law, satisfying legal criteria for digital
signatures, digital seal and proof for The module for electronic document exchange is built
request delivery that ensure upon the latest technologies providing excellent
interoperable, secure and reliable performance and very intuitive user interface for easy
communication following the EU document exchange between the institutions. It’s
standards for digitalization. designed and will be implemented on the MIM2
Interop platform infrastructure that complies with the
84.5. The Document management system will The document management system will be installed in Document: Document Management
perform independently in each of the each of the mentioned institutions independently, and System, Chapter: Module for
mentioned institutions. will perform as independent unit. electronic document exchange
The need of communication between two When institutions need to exchange documents (and
systems appears in the moment of related metadata) between them, they will connect to
exchanging a document from one the module for electronic document exchange to
institution to another institution and perform the exchange.
related metadata.
The exchange of documents will be provided for all 3
Exchange of documents and metadata institutions enrolled in the project: AMCP Agency for
must be provided form all the 3 Management of Confiscated Proprietary, FPO
institutions enrolled in the project: financial police office and SCPC State Commission
AMCP Agency for Management of for the Prevention of Corruption.
Confiscated Properties, FPO – Financial
Additional web services will be developed for
Police Office and SCPC State
exchange of document and relevant metadata between
Commission for the Prevention of
the above mentioned institutions and the following
Corruption.
institutions:
Implementation of appropriate web
1. CA
services for exchange of documents and
2. MoI
related metadata must be also provided
3. MoJ
between the above-mentioned institutions
4. FIU
and the following institutions, where
5. PPO
business analysis shows that exchange of
documents is needed: The module will be developed in a way that the
documents can be protected and controller regardless
1. CA
where they reside.
2. MoI
3. MoJ
The module for electronic document exchange will
4. FIU
provide a web service for each of the above
5. PPO
mentioned institutions that is compliant with the
The integration must be developed in a information systems certification requirement in the
way that enables documents to be compliance with the Law on Electronic Management
protected and controlled regardless of and related by laws, because the module for electronic
where they reside – within or beyond the document exchange is certified solution that passed
firewall. the process of certification by the Law on Electronic
Management, and related laws
In order to obtain the required
functionalities, a web-service for
exchanging data with all the listed
institutions must be provided.
The module for electronic document
exchange shall be compliant with the
Information Systems certification
requirements in compliance with the Law
on Electronic Management and related
by laws.
84.7. The DMS delivery includes: We’ll provide all the necessary prerequisites Document: Document Management
including: System, Chapter: System
i. System platform prerequisite
Architecture
providing: - hardware (servers, storage and network)
85.1. Subject: The Central security management system software Symantec File Share Encryption
will be implemented in the following institutions: Datasheet
The Central security management system
software should be implemented in the Ministry of Interior of RM (MoI);
following institutions:
1. Ministry of Interior of RM (MoI); Ministry of Justice of RM (MoJ);
(PPO);
85.4. Management Console and Experience: The offered solution has management console with - SEMS Administrator’s Guide,
the requested management experience: chapter 5: Understanding the
Allow for management of the Administrative Interface, topic:
encryption product suite within a Allow for management of the encryption product System Requirements
single console that includes all suite within a single console that includes all
management tasks for the project management tasks for the project lifecycle in one - SEMS Administrator’s Guide,
lifecycle in one easy to navigate easy to navigate interface. This console is web chapter 40: Managing Administrator
interface. This console is web based based and accessible via a secure SSL connection Accounts, topic: Overview
and accessible via a secure SSL and compatible with any standard internet - SEMS Administrator’s Guide,
connection and compatible with any browser. chapter 2: The Big Picture, topic:
standard internet browser. Allow for granular role-based administration Symantec Encryption Management
Allow for granular role-based Management Console should be easy to use, Server Features
administration familiar to the encryption administrators, and - SEMS Administrator’s Guide,
Management Console should be easy allow tasks to be carried out with minimal chapter 25: Managing Devices
to use, familiar to the encryption administration via automated tasks
- SEMS Administrator’s Guide,
administrators, and allow tasks to be Management Console should provide necessary
chapter 11: Administering Managed
carried out with minimal controls for Help Desk staff to assist users of Keys
administration via automated tasks encrypted endpoints
Management Console should Centralized single console policy administration - SEMS Administrator’s Guide,
provide necessary controls for Help Centralized administration leveraging Active chapter 10: Managing Organization
Desk staff to assist users of Keys, topic: About Organization keys;
Directory and other Open-LDAP directories
encrypted endpoints Centralized administration of users and - SEMS Administrator’s Guide,
Centralized single console policy computers that are not members of any network chapter 12: Managed Trusted Keys
administration domain and Certificates, topic: Overview;
Centralized administration Support for automated key management such as - SEMS Administrator’s Guide,
leveraging Active Directory and key renewal, expiration, and revocation with chapter 13: Managing Group Keys,
other Open-LDAP directories built-in CRL support topic: Overview;
Centralized administration of users Centralized management of user and group keys, - SEMS Administrator’s Guide,
and computers that are not members trusted keys and certificates, organization keys, chapter 41: Protecting Symantec
of any network domain and ignition keys Encryption Management Server with
Support for automated key Simplified and intuitive interface for configuring Ignition Keys, topic: Overview
management such as key renewal, and managing clusters and replication status
expiration, and revocation with - SEMS Administrator’s Guide,
85.7. Consumer policy: The offered solution provides consumer policy: - SEMS Administrator’s Guide,
chapter 26: Administering Consumer
Provides simplified method for Provides simplified method for creating, Policy, topic: Managing Consumer
creating, assigning, and managing assigning, and managing new and existing Policies
new and existing encryption policies encryption policies
Ability to notify users and Ability to notify users and automatically - SEMS Administrator’s console
automatically download new client download new client versions screenshots
versions Option to enable or disable access to desktop - SEMS Administrator’s Guide,
Option to enable or disable access to client features, including messaging, file chapter 28: Using Directory
desktop client features, including encryption, protected folders and Drive Synchronization to Manage
messaging, file encryption, protected Encryption configured per policy Consumers, topic: How Symantec
folders and Drive Encryption Ability to control visibility and user control Encryption Management Server Uses
configured per policy desktop client in system tray Directory Synchronization
Ability to control visibility and user
control desktop client in system tray
Supports policy changes to end users
dynamically
85.8. Reporting: The offered solution provides reporting with the - SEMS Administrator’s Guide,
requested features: chapter 37: System Graphs, topic:
Real-time graphical reports and Overview
statistics for server activity (CPU, Real-time graphical reports and statistics for
messaging, encryption) server activity (CPU, messaging, encryption) - SEMS Administrator’s Guide,
Searchable, granular logs for many Searchable, granular logs for many activities and chapter 38: System Logs
activities and processes the processes the management server (i.e. Backups, - SEMS Administrator’s Guide,
management server (i.e. Backups, endpoint activity, administrative actions, and chapter 39: Configuring SNMP
endpoint activity, administrative messaging activity) Monitoring, topic: Overview
actions, and messaging activity) Offers query tool and dynamic log fetching on
- SEMS Administrator’s Guide,
Offers query tool and dynamic log management server chapter 40: Managing Administrator
fetching on management server SNMP Monitoring available to track, monitor and Accounts, topic: Daily Status Email
SNMP Monitoring available to track, alert on management server metrics (CPU, Disk
Space, Memory, etc) - SEMS Administrator’s console
monitor and alert on management
screenshots
server metrics (CPU, Disk Space, Available daily status email sent from
Memory, etc) management server to administrators
Available daily status email sent Ability to export to CSV highly detailed logs
from management server to showing detailed information on each desktop
administrators endpoint, Logs are exportable to external tools
Ability to export to CSV highly via syslog's
detailed logs showing detailed Searchable view to find specific devices and
information on each desktop associated product attributes
endpoint, Logs are exportable to Simple and easy navigation to determine which
external tools via syslog's users and devices are receiving which specific
Searchable view to find specific policy
devices and associated product
attributes
Simple and easy navigation to
85.9. Desktop Client: The offered solution provides desktop client: - Symantec Encryption Desktop
10.4.1 for Windows – System
Supported Client OS: Windows 7, 8, Supported Client OS: Windows 7, 8, 8.1, 10, 10 Requirements, topic: supported
8.1, 10, 10 Anniversary Update Anniversary Update platforms
Supported Server OS: Windows Supported Server OS: Windows Server 2008 R2,
Server 2008 R2, 2012, 2012 R2 2012, 2012 R2 - Symantec Encryption Desktop
10.4.1 for Windows User Guide,
Simple and intuitive configuration of Simple and intuitive configuration of client install
chapter 3: Installing Symantec
client install settings/policies settings/policies
Encryption Desktop, topic: Installing
Client software and default install Client software and default install and Configuring Symantec Encryption
policies/settings included in single policies/settings included in single install Desktop
install package. package.
Client Software uses standard Client Software uses standard installation format - Symantec Encryption Desktop
10.4.1 for Windows User Guide,
installation format (.MSI) can be (.MSI) can be delivered and installed using
chapter C: Using Symantec
delivered and installed using existing existing software delivery infrastructure and
Encryption Desktop with Symantec
software delivery infrastructure and processes (e.g. SMS, Altiris, GPO, etc) Encryption Server, topic: Overview
processes (e.g. SMS, Altiris, GPO, Single MSI package installs multiple encryption
etc) applications managed via a central key and policy
Single MSI package installs multiple server
encryption applications managed via Able to customize install-time policies for
a central key and policy server different groups of client machines
Able to customize install-time Client deployment methodology scalable to meet
policies for different groups of client the projected deployment plans
machines Silent installation of client software supported
Client deployment methodology Client software installation and setup does not
scalable to meet the projected require Domain Administrator privileges
deployment plans Software installation and setup does not require
Silent installation of client software the creation of network shares or other changes to
supported the LAN infrastructure
Client software installation and setup Policies can be updated post client installation
does not require Domain
Administrator privileges
Software installation and setup does
not require the creation of network
shares or other changes to the LAN
infrastructure
Policies can be updated post client
installation
File Encryption:
85.10. The offered solution provides file Encryption with the - Symantec Encryption Desktop
Provides encryption of files and requested features: 10.4.1 for Windows User Guide,
folders on local endpoints and chapter 11: Using Symantec File
network shares Provides encryption of files and folders on local Share Encryption, topic: About
Offers some support for Microsoft endpoints and network shares Symantec File Share Encryption
SharePoint explorer based folders Offers some support for Microsoft SharePoint
explorer based folders - Symantec File Share Encryption
Supports encryption of protected with WebDAV Support
files and folders (local and network Supports encryption of protected files and folders
share) to users' keys and/or group (local and network share) to users' keys and/or - Symantec Encryption Desktop
keys group keys 10.4.1 for Windows User Guide,
Supports deferred encryption to ensure files chapter 11: Using Symantec File
Supports deferred encryption to
locked by an application are immediately Share Encryption, topic: Authorized
ensure files locked by an application
encrypted when application closes User Keys
are immediately encrypted when
application closes Supports Microsoft temp file process to ensure - Symantec Encryption Desktop for
Supports Microsoft temp file process currently encrypted Microsoft files (Word, Excel, Windows 10.4.1 User Guide, chapter
to ensure currently encrypted etc), remain encrypted at all times 11: Using Symantec File Share
Microsoft files (Word, Excel, etc), Supports role based access permissions of Encryption, topic: Working with
protected folders Protected Folders
remain encrypted at all times
Supports role based access Prevents access to files and folders for users that - SEMS Administrator’s Guide,
permissions of protected folders have access to endpoints with protected folders chapter 30: Recovering Encrypted
Prevents access to files and folders and files, but do not have specific permissions to Data in an Enterprise Environment,
for users that have access to the protected data. topic: Using a Special Data Recovery
endpoints with protected folders and Supports encryption of protected folders to an Key
files, but do not have specific Additional Decryption Key for administrative - SEMS Administrator’s Guide,
permissions to the protected data. access and forensics chapter 13: Managing Group Keys,
DLP central
management DLP central management platform and DLP for
86. Quantity: 8
platform and DLP for endpoint software - Quantity: 8
endpoint software
86.1. Subject: The Data Loss Prevention (DLP) management Symantec Data Loss Prevention
platform and DLP Endpoint software will be Datasheet.pdf
The Data Loss Prevention (DLP)
implemented in the following institutions:
management platform and DLP Endpoint
software should be implemented in the Ministry of Interior of RM (MoI;
following institutions:
1. Ministry of Interior of RM (MoI; Ministry of Justice of RM (MoJ);
Licenses required:
30 x SDLP – Endpoint Prevent
Perpetual licenses for 30 nodes (30 30 x SDLP – Endpoint Discover
users/computers) per institution (8
institutions)
Official manufacturers maintenance Installed software will include appropriate
required: number of licenses.
1 year from the order date
Miscellaneous:
Installed software must include
appropriate number of licenses.
Agent integration
The offered solution provides agent integration and
A single agent performs all the functions Symantec Data Loss Prevention
uses a single agent which performs all the functions
86.4. including endpoint scanning and Datasheet.pdf – topic: Keep Data Safe
including endpoint scanning and monitoring/blocking
monitoring/blocking data leaving the on Traditional Endpoints
data leaving the endpoint.
endpoint
Management integration The offered solution provides management integration Symantec Data Loss Prevention
Single management console for policy and uses single management console for policy Datasheet.pdf – topic: Define and
86.5.
configuration and editing, policy configuration and editing, policy deployment, and Enforce Policies Consistently across
deployment, and policy enforcement policy enforcement. Your Entire Environment
86.6. Data integration The offered solution provides data integration and Symantec DLP 14.6 Admin Guide.pdf
shares data and report on policy compliance and event – chapter 1: Introducing Symantec
Share data and report on policy
activity. Data Loss Prevention, topic: About
86.9. Customizable dashboard The offered solution has customizable dashboard with Symantec Data Loss Prevention
the requested features: Datasheet.pdf – topic: Define and
Custom dashboard view presented at Enforce Policies Consistently across
user login via a web browser - Custom dashboard view presented at user login via a
Your Entire Environment
web browser
Reports compiled to become Symantec DLP 14.6 Admin Guide.pdf
- Reports compiled to become dashboards
dashboards – chapter 49: Managing and reporting
- Every report on the dashboard can be clicked on to
view the details
Every report on the dashboard can
be clicked on to view the details - Dashboards can be created by each user and shared
with other users
Dashboards can be created by each user “It uses a single web-based console to define data loss
and shared with other users policies, review and remediate incidents, and perform
system administration across all of your endpoints,
mobile devices, cloud-based services, and on-premise
LDAP synchronization
The offered solution provides LDAP synchronization Symantec DLP 14.6 System
Flexibility to collect user and group and has the flexibility to collect user and group Requirements Guide.pdf – chapter2,
86.10. information from heterogeneous information from heterogeneous directory services: topic: Third-party software
directory services: Active Directory, Active Directory and LDAP. requirements and recommendations
LDAP, NIS, NIS+
86.11. Automate daily activities The offered solution automate daily activities: Symantec DLP 14.6 Admin Guide.pdf
– chapter 49: Managing and reporting
Reports can be automated - Reports can be automated
incidents, Topic: Scheduling custom
- Reports can be scheduled to run at any time incident reports
Reports can be scheduled to run at
any time - Capability to export reports to HTML, CSV, or XML Symantec DLP 14.6 Admin Guide.pdf
format so they can be viewed outside the UI – chapter 49: Managing and reporting
Capability to export reports to incidents, Topic: Using IT Analytics to
- Reports can be automatically exported and emailed.
manage incidents
HTML, CSV, or XML format so
they can be viewed outside the UI
“Optionally, you can schedule a saved report to be run
Reports can be automatically exported automatically on a regular basis.
and emailed
You can also schedule the report to be emailed to
specified addresses or to the data owners on a regular
schedule.”
“IT Analytics provides this powerful on-the-fly ad-
hoc reporting with pivot tables, pre-compiled
86.14. Following Platforms should be supported The offered solution supports the requested platforms Symantec DLP 14.6 System
for Endpoints for endpoints: Requirements Guide, chapter 2:
System requirements and
Windows 7 SP1 and later - Windows 7 SP1 and later
recommendations
- Windows 8, 8.1
Windows 8, 8.1 - topic: Endpoint computer
- Windows 10, 10 Anniversary Update requirements for the Symantec DLP
Windows 10, 10 Anniversary Update Agent
- Windows Server 2008 R2, 2012 R2
- topic: Virtual desktop and virtual
Windows Server 2008 R2, 2012 R2 - OS X 10.9, 10.10, 10.11, 10.12
application support with Endpoint
The offered solution supports the requested Endpoint Prevent
OS X 10.9, 10.10, 10.11, 10.12 Virtualization systems:
Vmware Fusion 7
Detection technology for identifying The offered solution provides detection technology
Symantec DLP 14.6 Admin Guide.pdf
documents according to their origin. for identifying documents according to their origin. It
– chapter 79: Using Endpoint Prevent,
86.16. Protect sensitive information being protects sensitive information being copied to web
topic: About Endpoint Prevent
copied to web applications, network applications, network applications, and network
monitoring
applications, and network shares. shares.
86.19. Comprehensive device management to The offered solution provides comprehensive device - Symantec DLP 14.6 Admin
control and block confidential data management to control and block confidential data Guide.pdf – chapter 79: Using
Windows 10
Professional 64 bit Quantity: Windows 10 Professional 64 bit Edition or
87.
Edition or equivalent 10 equivalent for existing desktops - Quantity: 10
for existing desktops
Passive network
Passive network infrastructure for SCPC –
89. infrastructure for Quantity: 1
Quantity 1
SCPC
In order to connect MoI back-end system to exposed web services from Interoperability platform, new equipment, software and trainings should be provided
to MoI. MoI currently operates with proprietary IBM systems, and have people skilled on IBM technologies.
WebSphere is used as application server, db2 as database, IBM Protect tier with TSM as backup solution, and Rational Application Developer as a
development platform.
90.1. New platform will be designed on existing storage system, planned Rack Server type 3b with VMWare Enterprise virtualization technology, SUSE Linux
operating system, IBM db2 database, IBM WebSphere application server, Rational Application Developer and Rational Application Architect Designer.
Platform also includes backup system and enterprise SIEM solution.
In order to successfully deploy and maintain the platform, MoI requires training for upgrading skills to new version of software, which is foreseen in Item
92. - Training for MoI platform for back-end system connection.
Licences for DB2 Workgroup Server Supporting Document for Item 90:
Licences for DB2 Workgroup Server Edition – total
90.2. Edition – total qty. 800PVU (Processor MoI platform for back-end system
qty. 800PVU (Processor Value Units)
Value Units) connection
Licences for Rational Software Architect Supporting Document for Item 90:
Licences for Rational Software Architect Designer for
90.5. Designer for WebSphere Software – total MoI platform for back-end system
WebSphere Software – total qty.: 10 users
qty.: 10 users connection
Bidder should organize the platform into Supporting Document for Item 90:
The platform will be organized into three parts:
three parts: development, test and MoI platform for back-end system
90.6. development, test and production, with licences ratio
production, with licences ratio 1:2:4 connection
1:2:4 accordingly.
accordingly.
Interoperability
91. Quantity: 1 Interoperability Software - Quantity: 1
Software
SIEM (Security
Information Event
96. Quantity: 1
Management)
solution
96.1. ADMINISTRATION & The IBM Security QRadar Security Intelligence Please refer to:
CONFIGURATION Platform (QRadar) integrates previously disparate
− IBM Security QRadar
functions - including SIEM , risk management ,
The Security Intelligence solution SIEM.pdf
vulnerability management, log management ,
must provide central management of
network behavior analytics, and security event − IBM QRadar Security
all components and administrative
management - into a total security intelligence Intelligence Platform.pdf
functions from a single web based
solution with a single easy to use web based
user interface.
interface, making it the most intelligent,
The administrator must be able to integrated and automated security intelligence
define role base access to the system solution available. QRadar offers a single all in
by device, device group or network one appliance, as well as a multi-tiered distributed
range. This includes being able solution to scale to large geographically dispersed
restrict a user’s access to information organizations and/or organizations with high
to only those systems from a specific volume of events. For distributed deployments
group of devices or network range. QRadar provides full centralized visibility and
Please describe how your solution management for the entire deployment.
meets this requirement.
QRadar employs role-based and user permission
The solution must support auto- models such that users can access only the
discovery of assets that are being specific functions and data they have been
protected or monitored. Please granted permissions to. Permissions can be set to
describe how your solution meets allow or deny access to complete areas of the
this requirement. product, but also detailed functionality. Examples
of these permissions are:
The solution must support the ability
to modify communications ports o Access to primary tabs within QRadar such
96.2. OPERATIONAL REQUIREMENTS Product that we offer is the following: Please refer to:
The solution must have license for Product that we offer is the following: − Overview of supported
monitoring of software offered under virtual appliances.pdf
Item 90 - MoI platform for back-end IBM QRadar Software Install License + SW
Subscription & Support for 12 Months and − IBM Security QRadar
system connection
additional capacity licence for monitoring of all SIEM.pdf
The solution must enable a phased software offered under Item 90 - MoI platform for − IBM QRadar Security
role out of log management and back-end system connection Intelligence Platform.pdf
security intelligence functions.
Introduction of more analysis In addition we are including IBM Security QRadar − Delivering success that scales
capabilities should minimize the Vulnerability Manager Software 60XX Install with the largest enterprises.pdf
need for additional system License + SW Subscription and Support 12
components and be enabled through Months that senses security vulnerabilities, adds
96.3. ARCHITECTURAL REQUIREMENTS QRadar is delivered to customer as either an Please refer to:
appliance or software based solution. Hardened
The solution must enable − IBM Security QRadar
QRadar appliances come in a range of models that
deployments as software and/or SIEM.pdf
allow deployments to easily scale to the size of
virtual appliance.
any organization. QRadar can also be delivered as − IBM QRadar Security
The solution must integrate with software if needed (delivered on the Red Hat Intelligence Platform.pdf
other security and network Enterprise operating system).
− Delivering success that scales
intelligence solutions.
QRadar QFlow collectors also can be delivered as with the largest enterprises.pdf
The solution must easily expand to a VMware virtual appliance which provides
− IBM QRadar Security
support additional demand security visibility into virtualized and cloud Intelligence Platform appliances.pdf
environments
The solution must support a − Checking the integrity of
distributed database for event and QRadar includes several mechanisms which allow event and flow logs.pdf
network activity collection such that the solution to integrate with other security and
all information can be access from a networking products. QRadar supports the − IBM Knowledge Center -
single UI. following integration capabilities such as (but not Configuring system notifications.pdf
limited to) the following
The solution must ensure the − Rule Response page
96.4. LOG MANAGEMENT QRadar provides a log and flow storage lifecycle, Please refer to:
REQUIREMENTS which supports both on-line, near line and off line
− Protocol configuration
storage requirements. The solution supports 3
The solution must have a log overview.pdf
distinct phases: uncompressed, compressed, and
collection and archive architecture
archived logs. − IBM QRadar_ Agentless
that supports both short-term
Windows Events Collection.pdf
(online) and long-term (offline) Both uncompressed and compressed storage can
event storage. be “on-line” and readily available for use within − Manage backup archive.pdf
QRadar. On-Line and Near line logs can be
The solution must provide directly on QRadar appliances which support up
capabilities for efficient storage and to 100TB of storage, or on high speed external
compression of collected data. storage solutions such as IP SANs or Fibre
The solution must support industry Channel SANs. QRadar uses GZIP compression
log collection methods (syslog, algorithms and provides very large reductions in
WMI, JDBC, SNMP, Checkpoint the storage of events on disk.
LEA, etc.) Use of compressed on-line data in QRadar is
The solution must provide agent-less transparent to the user. The user can specify how
collection of event logs whenever long data is retained on-line for both the
possible. uncompressed and compressed phase.
Archived (backup) data is the final phase and
provides the ability to store archived events off-
line for later use on external storage. Archives
can be saved on any 3rd party storage solution
The backup/archive process can include both the
log, network activity and configuration data, and
can be scheduled as necessary. All backups are
on-line and time-stamped. Backup data can be
imported into QRadar as necessary.
QRadar supports the use of third party storage
96.5. LOG NORMALIZATION & QRadar normalizes events by common event Please refer to:
CATEGORIZATION fields (including username, IP address, hostname,
− IBM Security QRadar
and log source). In addition, QRadar classifies by
The solution must normalize SIEM.pdf
specific (high and low level) categories, which
common event fields (i.e.
greatly simplifies event analysis. − Capabilities in your IBM
usernames, IP addresses, hostnames,
Security QRadar product.pdf
and log source device, etc.) from Normalized and categorized fields can be
disparate devices across a multi- compared across disparate devices in a multi- − IBM Knowledge Center -
vendor network. vendor network. For example, the following Advance Search.pdf
normalized/categorized events can easily be
The solution must provide the ability searched across all systems:
− View events in real time in
to store/retain both normalized and streaming mode.pdf
the original raw format of the event o Authentication/Admin Login Success
log for forensic purposes.
o Authentication/User Account Added
The solution must provide near-real-
o Authentication/User Password Changed
time analysis of events.
o Authentication/Privilege escalation
The solution must provide long term
trend analysis of events. o Etc.
The solution must provide the ability Because of these High and Low level categories,
to aggregate an analyse events based users of QRadar can easily search for similar
on a user specified filter. events across any event source.
The solution must provide more In addition, users can create their own custom
advanced event drill down when event properties for the purpose of searching and
required. reporting on customized normalized fields.
The solution must provide a real- QRadar stores both the original logs and events
time streaming view that supports along with the normalized event data.
full filtering capabilities.
QRadar supports real-time analysis of events.
Events captured in real-time, across an entire
QRadar deployment, are available for analysis in
multiple ways including:
o Real-time viewing in the user interface
o Real-time filtering
o Real-time correlation
QRadar supports a sophisticated time-series
interactive trend charting capability, which allows
users to specify datasets of interest and have the
system accumulate trend data over time. This
data can then be viewed and queried interactively
on demand though dashboards, views and reports
QRadar employs a reusable and shareable search
library. Out of the box, QRadar ships with
hundreds of predefined search definitions, and
also allows users to modify or create new ones to
meet their own custom requirements. These
search criteria can be shared across multiple
QRadar users, and can be used in search views,
and reports.
QRadar offers comprehensive drill down
capabilities. For all data sets presented in the
user interface, a user can easily click on a data to
drill into more detail. This drill down process
can be repeated all the way down to the most
specific event and flow details and the original
log message.
QRadar allows any set of search criteria to be
96.6. REPORTING QRadar supports custom reporting on all collected Please refer to:
and analyzed security data, including event, flow,
The solution must provide reporting − Reports.pdf
vulnerability, offense and asset. Queries and
on all items available for
search criteria constructed in the real-time − IBM QRadar_ Content
management via the GUI.
analytical views can be referenced in reports, Extension for ISO27001.pdf
The solution must provide which simplify workflow and reduces redundant
− IBM Security QRadar
configurable reporting engine for configuration.
Vulnerability Manager.pdf
customized report creation.
QRadar allows users to create custom reports
− Vulnerability reports.pdf
The solution must provide templates from the ground up, or to modify existing report
for the easy creation and delivery of templates to suit their needs.
reports at multiple levels ranging
QRadar delivers out-of-the-box report templates
from operations to business issues.
for a wide variety of compliance and operational
The solution must provide ‘canned’ needs. Reports are defined through an easy to
out-of-the-box reports for specific use report wizard, and can leverage existing saved
compliance regulations (PCI, SOX, searches created in other analytical views.
FISMA) and control frameworks QRadar includes over 1600 out-of-the-box report
including (NIST, COBIT, templates.
ISO27001).
Business and operational reports in QRadar cover
The solution must support the ability the following categories:
to centrally deliver vulnerability o Authentication
reports. Please describe how your
solution meets this requirement. o Identity
o User Activity
o Compliance
96.7. CORRELATION AND ALERTING QRadar provides extensive threat monitoring that Please refer to:
can alert on detected threats from monitored
The solution must provide alerting − IBM Security QRadar
devices and network activity monitoring.
based on observed security threats SIEM.pdf
from monitored devices. Please QRadar vastly expands the capabilities of
− QRadar architecture
describe how your solution meets traditional SIEM’s by incorporating new analytics
overview.pdf
this requirement. techniques and broader intelligence. Unlike any
other SIEM in the market today, QRadar captures − IBM Knowledge Center -
The solution must provide alerting all activity on the network for assets, users and Configuring system notifications.pdf
based on observed anomalies and attackers before during and after an exploit and
behavioural changes in network analyzes all suspected incidents in this context. − Anomaly detection rules.pdf
activity (flow) data. Describe any New analytical techniques like behavioral analysis
− Capabilities in your IBM
pre-packaged alerts and method for are applied. QRadar notifies analysts about
Security QRadar product.pdf
adding user-defined anomaly and ‘offenses’ which are a correlated set of incidents.
behaviour alerts. All associated data such as network, asset, − IBM Security QRadar
vulnerability, forensic data and identity context Vulnerability Manager Datasheet.pdf
The solution must provide alerting are associated to the offense. By adding business
based upon established policy. (e.g., − IBM Knowledge Center –
and historical context to suspected incidents and
IM traffic is not allowed.) Describe Policy.pdf
applying new analytic techniques, massive data
the solutions ability to alert on reduction is realized and threats that are otherwise − Assets tab
policy violations. missed will be detected and prioritized
accordingly. − IBM X-Force integration.pdf
The solution must provide the ability
to transmit alerts using multiple − Adding custom actions.pdf
QRadar implements anomaly detection for events
protocols and mechanisms to other and flow data. For example, QRadar will − Custom rules.pdf
management solutions automatically learn what normal event rates
The solution must provide UI based (events per second) are on a per IP or device basis.
wizard and capabilities to minimize For example, it is acceptable to see high firewall
false positives and deliver accurate deny rates, but if QRadar starts detecting a
results significant increase in FW denies from a specific
IP, QRadar will bring this to the user's attention.
The solution must limit the QRadar also detects anomalies in network traffic
presentation of multiple similar (i.e. new network traffic, significant increases or
alerts. Describe the solutions ability decreases in network traffic.) This can be detected
to minimize duplicate alarms. on a per application, protocol or network basis.
The solution must support the ability QRadar is also a market leading Network
to take action upon receiving an Behavior Analysis (NBA) vendor according to
alert. For example, the solution Gartner's NBA market scope. Full details of our
should support the ability to initiate anomaly detection methods (especially behavioral
a script or send an email message modeling) can be found in our market scope
submission).
The solution must support the ability
to correlate against 3rd party The QRadar correlation engine allows for alerting
security data feeds These 3rd party on any data it collects. Users can establish
data feeds should be updated detailed traffic and activity policies that enable
QRadar to detect that activity and alert on any
Smurf:
http://www.emergingthreats.net/rules/emerging-
botcc.rules
These services are updated and pushed out to our
customers through an auto-update service. This
update service also includes updates for event
mappings, vulnerability mappings (e.g. CVE,
OSBDB ID), applications mappings, new Device
Support Modules and updates.
QRadar Vulnerability Manager allows you to
schedule vulnerability scans and gather that data
for correlation and analysis. Vulnerability data is
mapped and stored in Asset Profiles to be used by
QRadar's correlation and analytics to raise the
severity of a threat, or remove false positives.
The following VA Vendors are currently
supported:
o Nessus
o McAfee Vulnerability Scanner
o nCircle
o Rapid7
o Nmap
o Saint
o Securescout
o Beyond Security
o Digital defense
o eYe Rem
o Foundscan
o IBM AppScan Enterprise
o IBM Guardium
o IBM Endpoint Manager
o IBM SiteProtector
96.8. NETWORK ACTIVITY MONITORING QRadar automatically classifies all log and Please refer to:
network activity by application, protocol,
The solution must display visual − Viewing normalized flow
geography, area of the network, ports, as well as
traffic profiles in terms of bytes, data from the Network Activity
many other categories and tracks all related
packet rates and number of hosts tab.pdf
traffic statistics. Views within the Log and
communicating. These displays must
Network Activity view allow users an intuitive − Network activity
be available for applications, ports,
mechanism to pivot through and monitor network monitoring.pdf
protocols, threats and each
activity date and log activity. Users can view
monitoring point in the network. All − High-level event
long time-time series trends as well as quickly
of these views must support network categories.pdf
identity top n sources of traffic. Users can
location specific view such that they
customize views to monitor specific applications − IBM Security QRadar
can present information from a
or services running in their organization. SIEM.pdf
single location, the entire network or
any other defined grouping of hosts QRadar provides application aware network − User Behavior Analytics
monitoring, via a technology, called QRadar app.pdf
The solution must support
QFlow. QRadar QFlow is a network activity
application definition beyond − Network activity SIEM.pdf
collector that passively collects, analyzes and
protocol and port. The system must
classifies all packets on a network segment.
support the identification of
QRadar QFlow creates detailed flow records that
applications using ports other than
include detailed layer seven application
the well-known, and applications
information and captured content for forensics.
tunnelling themselves on other ports
QRadar QFlow’s advanced application detection
The solution must detect “zero-day” performs stateful analysis of complex
events. Describe how the solution applications such as VoIP, P2P traffic, database
detects and displays this applications and social media traffic. With deep
information. packet inspection capabilities QRadar QFlow also
provides visibility into threats such as threatening
The solution must dynamically learn traffic disguised as other applications. QRadar’s
behavioural norms and expose network activity and application visibility are
changes as they occur. Detail the completely integrated into the core QRadar SIEM
methods used by the solution and the solution. The data is searched, correlated and
method by which anomalies are reported on consistently with all other data, such
displayed. as logs, identity, vulnerabilities, among other
threats.
96.9. ADVANCED THREAT Through the monitoring of application layer Please refer to:
MANAGEMENT network flows, QRadar provides the ability of
− IBM Security Threat Content
linking applications to the ports and protocols
The solution must provide the ability application.pdf
over which they are being communicated.
to contextually link application
QRadar’s ability to correlate this information − RESTful API overview.pdf
activity on the network with security
with data collected from security events can
events from monitored devices. − IBM QRadar_ Integrating
provide significantly better accuracy in
QRadar with Third Party Ticketing
The solution must provide the ability validating security events and detecting
Systems.pdf
to contextually link reported security advanced threats than solutions that can only
events with real-time knowledge of leverage security event data alone. − Offenses.pdf
the assets that are being targeted.
This is accomplished in a variety of ways in the − QRadar rules and
The solution must provide the ability QRadar Offense Manager in QRadar SIEM: offenses.pdf
to automatically weight the severity o Vulnerability data is factored into the threat − QRadar events and flows.pdf
of reported security events according
scoring of security incidents. If a given asset
to the vulnerability of the targeted
is known to be vulnerable to the attack in
assets
question, the threat scoring will be elevated
The solution must provide a real- accordingly.
time event view of monitored o User identity information is incorporated into
information in raw/original as well
all asset related views, allowing analysts to
as processed/parsed format.
associate actual usernames with specific
The solution must provide embedded activity
workflow capability that security
Geographic data is also incorporated into analyst
operations staff can use to guide views, allowing for quick association of assets
their work
with their respective geographies.
The solution must provide bi- Through the use of CVE and OSVDB, QRadar
directional integration with 3rd party
automatically associates threat information seen
trouble ticketing/help desk systems in the event stream with vulnerabilities known to
that security operations staff may use
exist on the target assets. This vulnerability-to-
to guide their work threat mapping information is used to prioritize
the incident.
99.1. It is necessary to provide data The offered solution provides data management Document: DS-NetBackup.pdf
management software (backup, archive, software (backup, archive, etc.) which supports both
etc.) that supports both physical and physical and virtual environments, heterogeneous
virtual environments, heterogeneous operating systems (Windows, Linux, Unix) as well as Document:
operating systems (Windows, Linux, a variety of business applications (Oracle, MS SQL, NetBackup_AdminGuideI.pdf
Unix) as well as a variety of business MS Exchange). (Chapter: Introducing the
applications (Oracle, MS SQL, MS NetBackup Interfaces;
Exchange). SubChapter: About NetBackup)
(Chapter: Introducing the
NetBackup interfaces;
SubChapter: Using the NetBackup
Administration Console;
99.2. The software must have a single The offered backup software has single graphical Document: DS-NetBackup.pdf
graphical administration interface that administration interface that can operate all features
can operate all features (backup the (backup the whole environment, data archiving, etc.),
whole environment, data archiving, etc.), and which is capable for reporting and notification. Document:
and which is capable for reporting and NetBackup_AdminGuideI.pdf
notification. (Chapter: Configuring Host
Properties ;
SubChapter: Global Attributes
properties ;
Topic: Setting up email notifications
about backups,
Topic: Sending messages to the
administrator about successful and
unsuccessful backups)
(Chapter:Reporting in NetBackup;
SubChapter: About the Reports
utility )
(Chapter: Introducing the
NetBackup Interfaces;
SubChapter: About NetBackup)
(Chapter: Introducing the
NetBackup interfaces ;
SubChapter: Using the NetBackup
Administration Console ;
Topic: Backup, Archive, and
Restore)
Document: NetBackup_SCL.pdf
(Chapter: NetBackup
Administration Consoles)
Document: NetBackup_SCL.pdf
(Chapter: CentOS) ,
The software must support integration The offered software supports integration with
99.4. Document: DS-NetBackup.pdf
with different storage systems. different storage systems.
The software must have support for The offered software provides support for backup of
99.5. Document: DS-NetBackup.pdf
backup of physical and virtual servers physical and virtual servers
99.6. The software must include agents for The offered solution includes agents for application Document: NetBackup_ACL.pdf
application consistent backup the consistent backup including the following business (Chapter: Microsoft Exchange) ,
- Oracle database 12c, 11g, 10g, - Oracle database 12c, 11g, 10g,
Document:
- MS SQL Server 2016, 2014, 2012, - MS SQL Server 2016, 2014, 2012, 2008R2, 2008
NetBackup_76_db_scl.pdf
2008R2, 2008 (Chapter: Oracle Database)
- MS Exchange Server 2016, 2013, 2010, 2007
- MS Exchange Server 2016, 2013,
- MS SharePoint Server 2013, 2010
2010, 2007
Document: NetBackup_SCL.pdf
- MS SharePoint Server 2013, 2010 (Chapter: Active Directory
Support)
99.8. The software must support de- The offered backup solution support de-duplication at Document:
duplication at source or at destination, as source or at destination, as well as other modern NetBackup_DedupeGuide.pdf
well as other modern technologies for technologies for backup and archiving: compression, (Chapter: Introducing the
backup and archiving: compression, data data encryption (it is required that offered solution has NetBackup media server
encryption (it is required that offered FIPS certified data encryption).The solution has the deduplication option; SubChapter:
solution have FIPS certified data ability to work with a large number of devices for About the NetBackup deduplication
options)
Document:
NetBackup_AdminGuideI.pdf
(Chapter: Creating backup policies;
SubChapter: Policy Attributes tab ;
Topic: Compression (policy
attribute),
Topic: Encryption (policy
attribute))
Document:
NetBackup_AdvDisk_Guide.pdf
(Chapter: Introducing
AdvancedDisk; SubChapter: About
the AdvancedDisk storage option)
Document : NetBackup_HCL.pdf
(Chapter: Tape Libraries) ,
Document: DS_NetBackup.pdf
Document:
99.9. The software should be licensed by the The offered software is licensed by the amount of data
NetBackup_AdminGuideII.pdf
amount of data to be backed up (TB - to be backed up (TB - terabytes), regardless of the
(Chapter:NetBackup licensing
Document:
NetBackup_AdminGuideI.pdf
The offered backup software is able to do (Chapter: Creating backup
The backup solution should be able to do simultaneous backup to disk and tape, to write the policies ;
99.10.
simultaneous backup to disk and tape, to same backup image to both mediums at the same time SubChapter: Schedule Attributes
write the same backup image to both and assign unique retention attributes to each tab ;
mediums at the same time and assign Topic: Multiple copies (schedule
unique retention attributes to each. attribute))
99.11. The backup solution should be able to do The offered solution is able to do automated Document:
automated sequential backup to disk and sequential backup to disk and tape, to write the NetBackup_AdminGuideI.pdf
tape, to write the backup image on one backup image on one medium and then copy it to the (Chapter: Creating backup policies;
medium and then copy it to the other other (disk to tape; tape to disk) with the option to Subchapter: Schedule Attributes
(disk to tape; tape to disk) with the assign unique retention attributes to each copy of the tab ;
option to assign unique retention backup image. Topic: Multiple copies (schedule
attributes to each copy of the backup attribute) ,
image. Topic: Retention (schedule
attribute))
(Chapter: Configuring storage
lifecycle policies;
SubChapter: About storage lifecycle
policies)
(Chapter: Storage lifecycle policy
options;
SubChapter: Storage Lifecycle
Policy dialog box settings)
Document:
NetBackup_AdminGuideI.pdf
(Chapter: Reporting in NetBackup;
SubChapter: About the Reports
The backup should be completely utility)
automated and should have a system for
The offered solution is completely automated and has
generating daily reports on the backup Document:
a system for generating daily reports on the backup
tasks, should have a system for NetBackup_AdminGuide_OpsCent
tasks. It can generate and analyse information on
99.13. generating and analysing information on er.pdf
trends regarding backup tasks (analysis of trends in
trends regarding backup tasks (analysis (Chapter: Overview of NetBackup
relation to the duration of backup tasks, the amount of
of trends in relation to the duration of OpsCenter;
backed up data, successful backup tasks, etc.).
backup tasks, the amount of backed up SubChapter: About OpsCenter)
data, successful backup tasks, etc.).
(Chapter:Reporting in OpsCenter;
SubChapter: About OpsCenter
reports )
Document:
99.14. The backup software should have option The offered backup software has option for automatic
NetBackup_AdminGuideI.pdf
for automatic delivery of generated delivery of generated reports and notifications to e-
(Chapter: Configuring Host
reports and notifications to e-mail mail recipients.
Properties ;
recipients.
SubChapter: Global Attributes
properties ;
Topic: Setting up email notifications
about backups ,
Topic: Sending messages to the
global administrator about
unsuccessful backups only ,
Topic: Sending messages to the
administrator about successful and
unsuccessful backups)
Document:
NetBackup_AdminGuide_OpsCent
er.pdf
(Chapter: Overview of NetBackup
OpsCenter ;
SubChapter: About OpsCenter ;
Topic: About alerting in OpsCenter)
99.15. The backup software should be able to do The offered backup solution is able to do backup of
backup of live (running) virtual live (running) virtual machines, without any agent
Document:
machines, without any agent installed on installed on the guest OS and without any impact on
NetBackup_AdminGuide_VMware.
the guest OS and without any impact on their work.
pdf (Chapter:Introduction;
Document:
NetBackup_AdminGuideI.pdf
(Chapter: Creating backup policies;
The backup software should offer so-
The offered backup solution offers so-called SubChapter: Policy Attributes tab ;
called application aware backup and
99.16. application aware backup and granular restoration of Topic: Enable granular recovery
granular restoration of the application
the application data. (policy attribute))
data.
Document: DS-NetBackup.pdf
99.17. From single pass backup of a virtual From single pass backup of a virtual machine, the Document:
machine the backup solution should offer offered backup software is able to recover the NetBackup_AdminGuide_Hyper-
recovery of the complete virtual machine complete virtual machine and granular recovery of V.pdf (Chapter:Introduction;
and granular recovery of files and files and folders. SubChapter: About Hyper-V)
folders.
Document:
NetBackup_AdminGuide_VMware.
pdf (Chapter: Introduction;
SubChapter: About NetBackup for
VMware)
Document: DS-NetBackup.pdf
Document:
NetBackup_AdminGuide_Hyper-
V.pdf (Chapter: Back up and
restore Hyper-V; SubChapter:
Notes on full virtual machine
restore)
Document:
99.19. The backup software should offer The offered backup solution provides encryption
NetBackup_SecEncryp_Guide.pdf
encryption methods for backed up data methods for backed up data while it transits through
(Chapter: Increasing NetBackup
while it transits through the network and the network and when it resides on backup medium.
Security;
when it resides on backup medium.
SubChapter: About NetBackup
security and encryption)
Document:
NetBackup_AdminGuideI.pdf
(Chapter: Configuring Host
Properties ;
SubChapter: Encryption
properties)
Document: DS-NetBackup.pdf
The backup solution should offer fully The offered backup solution provides fully automated Document:
99.20. automated system recovery to different system recovery to different hardware, both physical NetBackup_AdminGuide_BMR.pdf
hardware, both physical and virtual. and virtual. (Chapter: Introducing Bare Metal
Restore;
SubChapter: About Bare Metal
Restore)
Document:
99.21. The software must have a possibility for The offered backup software has a possibility for data
NetBackup_AdminGuideI.pdf
data replication to secondary location. replication to secondary location. (Chapter: About NetBackup
This replication should be optimized i.e. This replication is optimized to move only the new Replication;
it should can only move the new deduplicated data in order to save bandwidth on the SubChapter: About NetBackup
deduplicated data in order to save the link between the two locations replication ,
bandwidth on the link between the two SubChapter: About NetBackup
locations. Auto Image Replication ,
SubChapter: About NetBackup
Replication Director)
Document:
NetBackup_DedupeGuide.pdf
(Chapter: Configuring
deduplication ;
SubChapter: About MSDP
optimized duplication within the
same domain)
100.
Trainings Quantity: 1 Trainings Quantity: 1
100.9. Training for the IT Department of Training for the IT Department of Ministry of Interior
Ministry of Interior for Web Component for Web Component Development on JSF EE7. for
Minimum two users and two The training will be provided for the participants’
administrators per institution shall users and administrators - minimum two users and
participate the training. two administrators per institution.
100.15. Request for training and knowledge We will provide training and knowledge transfer for Training
transfer for Document Management Document Management System implementation –
System implementation – item 84 for item 84 for AMCP, FPO, SCPC.
AMCP, FPO, SCPC:
The offer should include:
100.16. Implementation services, consulting Implementation services, consulting services and Training
services and training services for DLP training services for DLP software – item 86 for all
software – item 86 for all Beneficiaries Beneficiaries as stated in Distribution table in Annex
as stated in Distribution table in Annex 2: 2: Distribution of items per location, will include:
Distribution of items per location:
Preparation, Pre-Engagement,
Preparation, Pre-Engagement, Assessment and
Assessment and Planning
Planning
Design
Produce a solution architecture Design
overview Produce a solution architecture overview
Develop scanning schedules and
targets Develop scanning schedules and targets
Development and implement Development and implement information
information protection policy protection policy
Development and implement policy
100.20. Train-the-trainer training for IBM i2 Train-the-trainer training for IBM i2 Analyst tool –
Analyst tool – item 96. (software features item 96. (software features explanation with practical
WARRANT
101. Quantity: 1
Y
1 Finance Police Office, FPO Kej Dimitar Vlahov No.4, floor 4 – 1000 Skopje
3 Agency for management of confiscated properties, AMCP Makedonija b.b. (broj 5) – 1000 Skopje
6 Public Prosecutor Office of RM, PPO Kej Dimitar Vlahov bb – 1000 Skopje
8 Ministry of Finance; Customs Administration CA) Lazar Licenoski St. No.13 – 1000 Skopje
MoI, DFSOC
MoI, FD
TOTAL
MoI, IT
AMCP
SCPC
Ite
FPO
PPO
MoJ
FIO
CA
SC
Item name
m
1. Tower Server 0 0 0 0 0 0 0 1 5 0 0 6
9. Hyper-convergence solution 0 2 0 0 0 0 0 0 0 0 0 2
12. Servers 0 0 0 0 0 0 0 0 2 0 0 2
MoI, FD
TOTAL
MoI, IT
AMCP
SCPC
Ite
FPO
PPO
MoJ
FIO
CA
SC
Item name
m
MoI, FD
TOTAL
MoI, IT
AMCP
SCPC
Ite
FPO
PPO
MoJ
FIO
CA
SC
Item name
m
38. Workstation 0 0 0 0 0 0 0 0 1 0 0 1
46. Tablet 0 0 0 3 0 0 0 0 0 0 0 3
MoI, FD
TOTAL
MoI, IT
AMCP
SCPC
Ite
FPO
PPO
MoJ
FIO
CA
SC
Item name
m
56. Shredder 5 0 0 0 0 0 0 0 0 0 0 5
MoI, FD
TOTAL
MoI, IT
AMCP
SCPC
Ite
FPO
PPO
MoJ
FIO
CA
SC
Item name
m
MoI, FD
TOTAL
MoI, IT
AMCP
SCPC
Ite
FPO
PPO
MoJ
FIO
CA
SC
Item name
m
MoI, FD
TOTAL
MoI, IT
AMCP
SCPC
Ite
FPO
PPO
MoJ
FIO
CA
SC
Item name
m
100. Trainings 1
101. Warranty 1
* Since Ministry of Information Society and Administration (MISA) is responsible for Interoperability platform maintaining and operations, for the items 82 and 91 end-
recipient is: Ministry of Information Society and Administration (MISA), Blvd. Sv. Kiril i Metodij 54, 1000 Skopje.
1 Tower Server 6
9 Hyper-convergence solution 2
11 UPS device 2
12 Servers 2
13 SAN switches 2
14 Storage Unit 1
20 Rack 42U 6
21 2016
15 January Rack 24U 1 of 169
Page 169
406772580.doc
22 Rack UPS 5000VA 9