Component
|
About
|
Vendor Name
|
Scope of Work
|
1. Biometric Gates System
|
It is technology recognizes biometric face data thus minimizing non-detection of deception and fraud.
|
DORMAKABA
|
· Supplying Gates.
· Implementation, Installation and Commissioning for a complete Biometric Gate System.
|
2. Data Network Equipment
|
Is a system designed to transfer data from one network access point to one other or more network access points via data switching, transmission lines, and system controls. |
Cisco
|
· Supplying, installing, testing, and commissioning of the hardware and software components as listed:
1. Core switches (C9407R).
2. Industrial Switches (Cisco IE3300).
3. WAN Routers (C8300-1N1S-6T).
4. Wireless Controllers (Cisco C9800).
5. Distribution Switch (Cisco 9500).
6. Call Manger (Cisco 6000 ser)
7. Edges switch (Cisco 9200).
|
3. Network Management Servers
|
Is the process of administering, managing, and operating a data network, using a network management system.
|
DELL
|
· Supplying, installing, testing, and commissioning of the hardware and software components as listed:
1. PowerEdge R760xs Server.
2. DellEMC Rack 42U.
3. DellEMC Unity 380 SAN storage
4. Virtualization solution.
5. DellEMC Connectrix Storage Networking switch.
|
4. Special Airport Systems
|
It enables the safest aircraft movement in an airport and the surrounding airspace.
|
ARINC
|
· Supplying, installing, testing, and commissioning of the hardware and software components as listed:
1. Automatic Voice Announcement System (AVAS)
2. .Common Use Passenger Processing System (CUPPS).
3. Airport Operational Database System (AODB)
4. Local Departure Control System (LDCS)
5. Flight Information Display System (FIDS).
6. Baggage Reconciliation System (BRS).
|
5. Cyber Security Systems:
|
The security solution was built to enforce segregation of networks to ensure no unauthorized access may occur.
|
5.1 Data Center Firewall
|
Data center firewalls provide an additional layer of protection within the internal network infrastructure. These specialized firewalls are specifically designed to secure the sensitive data stored in data centers.
|
Palo Alto
|
· Supplying Key considerations regarding data center firewalls which including:
1. Compliance and Auditing
2. Application Awareness
3. Intrusion Prevention
4. Granular Control
|
5.2 Perimeter Firewall
|
Perimeter firewalls serve as the first line of defense in network security. Positioned at the network perimeter, they act as gatekeepers, monitoring and controlling incoming and outgoing traffic.
|
Fortinet
|
· Supplying Key features and benefits of perimeter firewalls which including:
1. Access Control.
2. Threat Prevention.
3. Network Segmentation.
|
5.3 Security Software
|
Kaspersky Endpoint Security for Business Advanced combines multi-layered security with extended control tools to deliver an agile security solution that rapidly adapts to protect against new threats. The security and systems management console save valuable time and resources, while extra defensive layers help eliminate vulnerabilities and further safeguard sensitive data.
|
Kaspersky
|
· Supplying Kaspersky Endpoint Security for Business Advanced software license including:
1. Supplying software license.
2. Implementation and Installation of Kaspersky administration server.
3. Installation of Kaspersky endpoint.
4. Service Level Agreement.
|