The Vendor is required to provide information technology consulting services for include:
- Managed services and technical support
• 24/7 monitoring and support.
• Continuous remote monitoring, server hardening, and security oversight.
• This includes unlimited remote and telephonic technical support for the entire network.
• Response time:
o Remote and phone: availability via cellular phone with a maximum 60-minute callback window (including weekends, after-hours, and holidays).
o On-site emergency: response within 1 hour for critical outages.
o On-site non-emergency: response within 24 hours upon city request.
• Scheduled on-site presence must be a minimum of 32 man-hours per month (consistent weekly schedule) during standard business hours for routine maintenance and staff support.
• Vendor management - act as the primary technical liaison for third-party hardware and software providers.
• Provide long-term it road mapping and infrastructure consulting upon request.
- Network, cloud, and infrastructure management
• Infrastructure deployment - on-site installation and configuration of all network hardware, including switches, firewalls, and wireless access points (WAPS).
• Connectivity and security - management of firewalls, VPNs for secure remote access, and end-to-end wireless network optimization.
• Server administration - full lifecycle management (maintenance, patching, and optimization) for both physical and virtual server environments.
• Business continuity - implementation and testing of cloud-based services, redundant backup solutions, and disaster recovery and data relocation protocols.
- Procurement and asset management
• Lifecycle support - sourcing, provisioning, and maintaining IT assets for city personnel.
• Standardization - developing recommendations for hardware, operating systems, and applications to ensure environment uniformity.
• Budgetary assistance - assisting city leadership in financial planning for hardware and software procurement.
• Procurement compliance - adherence to the city’s procurement policies.
• Provide technical specifications to enable the city to leverage existing state contracts for all purchases.
- Cybersecurity, compliance, and privacy
• Regulatory compliance - ensure all systems adhere to the cybersecurity act, including mandatory breach reporting to state authorities.
• Threat detection - manage and mitigate findings via endpoint detection and response (EDR), specifically utilizing sentinel one.
• Security auditing - provide continuous monitoring and support for periodic security audits.
• Advanced network security - implement inspection and granular, user-level reporting (e.g., threat blocks, web traffic analysis, and policy violations).
• Cross-platform protection - secure all endpoints including windows, macos, and mobile devices (iOS/android) regardless of user location.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.