REQUEST FOR PROPOSALS FOR THE APPOINTMENT OF A PANEL OF IT ENTERPRISE SUPPLIER DEVELOPMENT SERVICE PROVIDERS FOR A PERIOD OF FOUR YEARS AND SIX MONTHS AT AIRPORTS COMPANY SOUTH AFRICA.
Tender Number: / : / COR170/2018ANNEXURE E: QSE OR EME DISCIPLINE SELECTION AND BIDDERS PRIORITY
The bidder must mark the discipline it is applying for and the priority under column B (using X1, X2, etc.), and the technologies the bidder has experience on under column E (using an X symbol).
A -Discipline / B –
Selection of preferred Discipline (with X1, X2, etc.) / C - Technologies/Services / D - Technologies/Services Descriptions / E –
Indicate which Technology/Services does the bidder have experience on (with an X symbol)
QSE – Must select a minimum of 4
EME – Must select a minimum of 2
1. Enterprise Applications /
- IBM AIX
- AIX is an open operating system from IBM that is based on a version of UNIX and ACSA is currently on version 6
- IBM Websphere Message Broker (including Java technologies)
- Integration broker from the WebSphere product family that allows business information to flow between disparate applications across multiple hardware and software platforms. It is used in conjunction with ESB.
- IBM MQ Series
- IBM MQ is a standard for program-to-program messaging across multiple platforms.
- Systems Integration (ESB)
- IBM ESB is a service-oriented architecture (SOA). It translates requests into the appropriate message types and routes them to the appropriate provider.
- BPM Development (IBM)
- IBM BPM is a comprehensive Business Process Management Platform used to manage ACSA processes.
- DB2 (IBM)
- DB2 is a Relational Database Management System that runs on its Multiple Virtual Storage mainframe platform. IBM DB2 contains database server products developed by IBM. These products all support the relational model and some products have been extended to support object-relational features and non-relational structures.
- Microsoft (.Net, SharePoint, SQL Server, etc.)
- SharePoint is a browser-based collaboration and document management platform from Microsoft.
- General Business Intelligence
- Business intelligence (BI) is an umbrella term that refers to a variety of software applications used to analyzethe organisation raw data. BI as a discipline is made up of several related activities, including data mining, online analytical processing, querying and reporting.
2. Enterprise Applications - Oracle Technical Services /
- E-Business Suite eBusiness suite (R12.1.3)
- Oracle E-Business Suite is a comprehensive suite of integrated, business applications that enable organizations to make better decisions, reduce costs, and increase performance.
- Human Resources Core
- Oracle's E-Business Suite Human Capital Management HRMS delivers a robust set of best-in-class human resources functionality that enables you to increase productivity, accelerate business performance, and lower your cost of ownership.
- Cloud Solution Human Resources
- Modern HR differentiates the business with a talent centric and consumer based strategy that leverages technology to provide a collaborative, insightful, engaging and mobile HR, employee and executive experience. Oracle HCM Cloud enables modern human resources to find and retain the best talent and increase global agility.
- Supplier Lifecycle Management
- Oracle Supplier Lifecycle Management is the supplier development application that transforms qualification, administration, and assessment. With Oracle Supplier Lifecycle Management organizations can streamline registration and review of prospective suppliers, enable cross functional performance evaluation, and assure effective governance and risk mitigation. It is a key component of Oracle Advanced Procurement, the integrated suite that dramatically cuts all supply management costs.
- Finance
- Oracle E-Business Suite Financials allow you to increase efficiency and reduce back-office costs with standardized processes for shared services, productivity tools, and integrated performance management.
- Cloud Solution Finance
- Oracle Planning and Budgeting Cloud Service is a planning, budgeting, and forecasting solution. PBCS provides a rich Web and Microsoft Office work environment that has solved a wide variety of financial, sales and operational planning use cases across multiple industries.
- Commercial
- Oracle Property Manager streamlines and automates lease administration and space management, enabling you to more intelligently manage your real estate portfolio.
- Governance
- Oracle Fusion Governance, Risk, and Compliance (GRC), a component of the Oracle Fusion Applications suite, provides a complete enterprise GRC platform that gives you:
- The Power to Discover—unified intelligence for insight into the status of all GRC activities across the enterprise.
- The Power to Manage—end-to-end support for cross-industry and industry-specific GRC processes.
- The Power to Enforce—best-in-class automated controls that work across multiple business applications.
- Endeca
- Oracle Endeca Information Discovery offers a complete solution for agile data discovery across the enterprise, empowering business user independence in balance with IT governance. This unique platform offers fast, intuitive access to both traditional analytic data, leveraging existing enterprise investments, and non-traditional data, including external and unstructured information. This allows organizations unprecedented visibility into all relevant information, to drive growth while saving time and reducing cost.
- Business Intelligence / Performance Reporting OBIEE and OSSM
- Oracle Business Intelligence Enterprise Edition (OBIEE) is an unmatched and comprehensive business intelligence and analytics platform that delivers a full range of capabilities—including interactive dashboards,
- ad hoc queries, mobile analytics, notifications and alerts, enterprise and financial reporting, scorecard and strategy management, business process invocation, unstructured search and collaboration, integrated systems management and more.
- OBIEE is built on a proven and modern technological foundation that supports the highest workloads and most complex deployments, while providing timely insights to users across an enterprise at a low overall total cost of ownership.
- Database Services
- The oracle database is used for Oracle eBS, The database is an object-relational database management system.
- Development Services
- A service provided by developers in various programming languages i.e. pl/sql, sql and java.
- Supply Chain Management
- The Oracle E-Business Suite Supply Chain Management family of applications integrates and automates all key supply chain processes, from design, planning and procurement to manufacturing and fulfillment, providing a complete solution set to enable companies to power information-driven value chains.
3. Airport Systems – Security /
- Perimeter Intrusion Detection System ( PIDS)
- The system that is used to detect and prevent unauthorised access to the airports perimeter.
- Airport Permit Issuing System (APIS)
- Access Card Permit Issuing Systems.
- Access Control and Permit Issuing System
- Systems giving access to office and secure areas of the airport.
- Integrated Security Management Systems (e.g. ISMS or PSIM)
- Systems for integrating and managing all security systems.
- 2 Dimension Bar Code Systems
- The system is used to check passenger boarding pass prior to accessing the secure site of the airport.
- Digital Trunking Radio Communication Systems and Ground to Air Radio Communication System
- Two way digital radio communication systems used by various departments.
- Panic Alarm System
- Alarm systems used in an emergency situation.
- Smart Security
- Integrated security system used at the security check point for passenger processing.
- Electronic Gates - Boarding and Security Check Points
- Electronic Gate Systems used to provided access to the secure area of the airport and for processing passenger through the boarding gate.
- Security X-ray Training Software ( Safe Passage)
- Training software used to training ACSA personnel on how to use the X-Ray machines.
- Close Circuit Television (CCTV), Video Analytics and Facial Recognitions
- Surveillance system used for security and other operational airport activities that require video footage.
4. Airport Systems – Electronic Services /
- Time and attendance ( time keeper)
- Time and attended systems used for employee clocking purpose.
- InfoGate
- Interactive KIOSK used for way finding and communication to Passengers.
- Display Technologies ( Screens in different sizes, formats and configuration)
- Display systems includes TV and Large LED boards used for flight information, advertising and television.
- Common Use Terminal Equipment and Common Use Self Service
- Self-service and common use equipment for passenger processing (Boarding).
- Foot Counting and Queue Management System
- Systems used to count number of people entering and exiting the Airport or Specific area. This includes dwell time and areas of high concentration.
- Parking Solutions (Pay on foot, License Plate Recognition System, VMS and Bay Detection) including merchant bank interface for credit card payment
- All systems used at the parking areas to ensure passenger are able to gain access, locate available parking. On departure they are able to pay for parking using credit cards and the vehicle are safe while parked at ACSA airports through the LPR system.
- Public Address (PA) and Evacuation Systems
- Public Address and evacuation system. Used for making normal announcement and emergency announcement.
- Community Access Television (CATV)
- Content Distribution Systems - Currently used to distribute DSTV and Flight Information.
- Building Management Systems
- Systems used to manage and monitor critical building components - Travelator, Escalators and Lift etc.
- Emergency and fire detection
- Systems used to detect fire and activate necessary sirens and extiquishing equipment.
5. Airport Systems – Airport Application /
- Apex/Zeus
- Information platform for Airport Resources
- Palladium (Health Safety Report)
- Safety Incident Reporting System.
- Quality Management System
- Quality Management System.
- Airport Management System
- Suite of systems for management of the airport used in the main by AMC.
- Security QMS/Incident Logging
- Security Incident Login System.
- Viewing Deck
- SharePoint custom developed system to manage passenger’s queries and feedback via short code SMS services and emails
- Slot Management (Score)
- System used for the management of the aircraft slot within the airport.
- Qlikview
- Business Intelligence tool.
- SITATEX
- Custom developed system for airports used to update the AODB with messages from airlines
6. Infrastructure - Physical /
- Data Centres (Design, construct and commission)
- Physical IT Datacentres, and the construction.
- Structured Cabling (Copper and Fibre Systems)
- All IT Cabling, Copper and Fibre, including Cable management systems and trays
- IT Environmental systems,
- IT Environmental monitoring systems, e.g., humidity, temperature, leak detection
- IT Fire suppression
- All types of IT Fire suppression and detection systems, FM200, Argon etc.
- IT Room construction
- Physical IT Rooms, and the construction
- IT Power Systems (UPS, PDU)
- Uninterruptable Power Supplies, Power distributions systems.
- IT Cooling systems
- IT cooling systems, e.g.in-row cooling, down blow units, free air-cooling.
7. Infrastructure – CORE /
- Networks (CISCO)
- Switches and Routers. Access, distribution and Core.
- Network security/Firewalls (CISCO and CHECKPOINT)
- All Network security related systems e.g. firewalls, intrusion detection systems, intrusion prevention systems, etc.
- Servers (IBM and HP)
- Server hardware and related software, e.g. Blade systems, rackmounts, etc.
- Telephony (CISCO)
- IP Telephony systems including routers, handsets, video conferencing
- Storage (EMC VNX)
- Storage systems and related software. E.g.. Storage area networks, Network attached storage, Flash systems
- Storage Network (for Brocade SAN Fabric Switches)
- Fibre Channel switches.
- Disaster Recovery Infrastructure (EMC)
- Systems to support Disaster recovery requirements, e.g.RecoverPoint, Replication, etc.
- Backups (for Avamar & Data Domain)
- Backup to disk systems.
- End user devices (Laptops, desktops, printer, screens, projects etc.)
- Laptops, desktops, printers, screens, projectors, tablets, ipad,accessories.
- Virtualisation (VMWare)
- VMware suite of products
- Hyper Convergence (VMWare)
- Hyper converged infrastructure.
8. Business Intelligence and Analytics (Big Data) /
- Presentation / Consumption / Visualisation Capability (e.g. Contextual Analytics, Business Intelligence Tools etc.)
- Business Intelligence and Analytics Layer that enables delivery of business user / customer facing capabilities thereby facilitating consumption of data, information, intelligence and advanced analytics generated through business data sourced from a variety of systems and sources (internal and external, structured and unstructured and streaming). The primary driver of this layer is accessibility and ease with which data can be discriminated. The capability takes many forms and varies from business uses cases i.e. reports, dashboards with drill down capability, advanced analytics and cognitive pattern recognition capabilities.
- Data Modelling
- Data Modeling is a concerned about development & maintenance of conceptual data models, logical data models and development & maintenance of physical data models including physical databases design related data structures. This is achieved through design of information products for the development data modelling & database design standards, review of data model & database design quality and management of data model versioning and integration.
- Next Generation Enterprise Data Warehouse / Big Data Platform (e.g. Discovery Capability, etc.)
- Data Modeling is a concerned about development & maintenance of conceptual data models, logical data models and development & maintenance of physical data models including physical databases design related data structures. This is achieved through design of information products for the development data modelling & database design standards, review of data model & database design quality and management of data model versioning and integration.
- Integration Management
- Integration Management involves combining data residing in different structured and unstructured sources and providing users with a unified view of the data through an extract load and transform (ETL) population processes.
- Enterprise Service Bus (ESB)
- Enterprise Service Bus provides the messaging backbone capability which does protocol conversion, message format transformation, routing, accept and deliver messages from various services and application which are linked to its middleware. This is achieved through ESBs ability and flexibility in allowing the services and applications to interact with each other, independently of their location and connectivity requirements.
- Master Data Management
- Master and Meta Data Management is the single source of basic business data used across all systems, applications, and processes for an entire enterprise. This function entails understanding of reference & master data integration needs which informs definition and design of data integration architecture. This includes implementation and management of meta data environment, a process which entails understanding meta data requirements, defining, developing and maintaining the meta data architecture and standards.
- Enterprise Data Management
- Enterprise Data Management defines the data management principles and standards against which data efficacy can be achieved in order to facilitate delivery of data that meets business requirements and to increase the value derived from data assets. These include data acquisition processes; data structures (taxonomy, dictionary and classification) as well as data quality which concerns itself with define data quality metrics & service levels throughout its life cycle.
9. Enterprise Architecture /
- Enterprise Architecture
- The Enterprise Architecture translate business vision and strategy into effective enterprise change by creating, communicating, and improving the key principles and models that describe the enterprise’s future state and enable its evolution. The focus is on enabling business and IT leaders to make investment decisions that balance and prioritise current operational demands, disruptions, and opportunities with the longer-term strategic vision of the organization
- Business Process Architecture
- The Business Process Architecture conceptualises the business process architecture at business operating and capability / services model; designs the business process landscape to support the key business functional areas and develops an organisation wide business process architecture framework that facilitates development of business outcome based processes that are standardised, repeatable, predictable and reliable
- Application Architecture
- Application Architecture is designed to ensure that application investments is informed by the business requirements for supporting business outcomes in line with the enterprise architecture operationalisation plans. This is achieved through application portability, technology independence, Interoperability, design for operations, rationalisation of applications providing the same business functionality as well as support, maintenance and upgrades.
- Technology Architecture
- Technology (Infrastructure) Architecture ensures designs that enables cost effective delivery of the following technology and infrastructure services; uuniversal connectivity, single logical network, mobility services, cloud services and operations and maintenance of technologies and infrastructure crucial to servicing business operational needs. This is achieved through total cost of ownership (TCO), minimise technology, product and configuration diversity (Standardisation), technology outsourcing, automated systems management, scalability and proactive technology infrastructure renewal.
- Security Architecture
- Security architecture is responsible for the development of secure gateway services, security standards, assessment protocols as well as monitoring of business security exposure and risk, including ensuring that security investments match the value of the assets being protected.. This is achieved by designing & Implementing data security controls, manage data access permissions, monitor user authentication & access behaviour, classify information confidentiality, audit data security
- Data/Information Architecture
- The Data / Information / Business Intelligence Architecture’s primary function is to define, develop and maintain an optimal enterprise data management and business intelligence and analytics environment for the organisation. Assess information needs vs leading practice tools, platform in order to recommend appropriate steps to ensure BI excellence. This function entails designing a Morden Enterprise Information Architecture (EIA) in coordination with Corporate IT practice and infrastructure standards as well as ensuring that associated architectures required to support business reporting and analytical requirements are defined and in place.
- Integration Architecture
- Integration Architecture is responsible for the enterprise integration, reduction of integration complexity, development of data exchange standards, shared components and service orientated architecture.
10. Information Security /
- Security Incident and Event Solutions (SIEM)
- SIEM software or hardware products and services that combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.
- Security Vulnerability Solutions
- Vulnerability management solutions are software or hardware products that perform the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities, especially in software and firmware.
- End Point Security Solutions
- Endpoint security management refers to the security processes or protocols for restricting network access from individual mobile or computing devices as well as performing malware protection.
- Data Protection Solutions
- Data protection management (DPM) is the administration of backup processes to ensure that tasks run on schedule, and that data is securely backed up and recoverable. Good data protection management means having effective processes and methodologies in place to maintain data integrity.
- Web Content Scanning (Proxy) Solutions
- A secure Web gateway is a software or hardware product or service that prevents unsecured traffic from entering an internal network of an organization. It is used by enterprises to protect their employees/users from accessing and being infected by malicious Web traffic, websites and viruses/malware.
- Mail Content Scanning Solutions
- A secure Web gateway is a software or hardware product or service that prevents unsecured traffic from entering an internal network of an organization. It is used by enterprises to protect their employees/users from accessing and being infected by malicious email traffic or viruses/malware.
- Digital Certificate Solutions
- A software product or service that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digital certificate may also be referred to as a public key certificate.
- Mobile Device Management Solutions
- Mobile device management (MDM) is an industry term for the administration of mobile devices, such as smartphones, tablet computers, laptops and desktop computers. MDM is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.
- Authentication and Access Management Solutions
- Identity and Access management (IAM) solutions are software and hardware products that enable the right individuals to access the right resources at the right times and for the right reasons, and using the correct and verified credentials.
- Database Security Solutions
- Software or hardware products that perform measures used to protect and secure a database or database management software from illegitimate use and malicious threats and attacks. It is a broad term that includes a multitude of processes, tools and methodologies that ensure security within a database environment.
- Data Loss Prevention Solutions
- Software or hardware products that ensure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.
- IT Forensic Solutions
- Computer Forensics Solutions (also called cyberforensics) refers to hardware and software products that perform computer investigation and analysis techniques to gather evidence of wrongdoing suitable for presentation in a court of law.
ANNEXURE E: QSE OR EME DISCIPLINE SELECTION AND BIDDERS PRIORITY