Call +44 800 9755 164

Public tenders for defense in Hungary

Find all Defense tenders in the world.
Finding business opportunities has never been easier.

Results for defense. Make a new search!
DefenseHungary

Computer equipment and supplies

Nemzeti Védelmi Szolgálat | Published January 11, 2017  -  Deadline January 30, 2017

framework contract for the sale "KÖFOP-2.2.3-16 VEKOP identification sign," Capacity Development of a high percentage of cases of corruption detection and prevention "project within the framework of the development of open and qualified IT infrastructure of the National Defense Service. II".

Naming names contained in this point in the proceedings; Because about points II.1.1) and II.2.1) character limits have been shortened.

Computer equipment and supplies

Nemzeti Védelmi Szolgálat | Published December 14, 2016  -  Deadline January 18, 2017

framework contract for the sale "KÖFOP-2.2.3-16 VEKOP identification sign," Capacity Development of a high percentage of cases of corruption detection and prevention "project within the framework of the development of open and qualified IT infrastructure of the National Defense Service. II".

Naming names contained in this point in the proceedings; Because about points II.1.1) and II.2.1) character limits have been shortened.

framework contract for the sale "KÖFOP-2.2.3-16 VEKOP identification sign," Capacity Development of a high percentage of cases of corruption detection and prevention of the development of open and classified the framework of "IT infrastructure project for the National Defense Service II." as follows:

Project delivery of two independent components of information systems (open and certified system), equipment configuration, implementation works completion, documentation, and training is provided as follows:

Certified system (private cloud design)

First data center hardware and software delivery and implementation:

the. development of blade-based server environments;

b. storage systems;

c. development of virtualization environments;

d. free environment;

e. Blade / Virtualization mgmt / backup proxy (hw-sw);

f. other services;

2. Delivery and implementation of a national IT network equipment:

the. routing on the premises - switching hardware (Layer 2-3) Configuration and architecture settlement;

b. Configuring redundancy and design of core network equipment;

c. media converters and configure the corresponding network services;

development of GPS-based NTP time stamp and facial treatments faith;

3. Delivery and implementation of information security architecture:

the. Configuring a firewall architectures;

Configure IPS / IDS / Malware protection architectures;

To configure 802.1X endpoint system in the entire national grid;

d. Configure logging system for the entire data center;

e. Configuring authentication system;

f. To configure password storage center;

g. Configuring a system for treating bug tickeing;

h. development of anti-virus client and server architecture in respect of all the devices in the system;

4. Delivery and implementation of end-point devices devices:

the. Configure client education tools;

b. Configuring Printing Software

open system (private cloud design):

1. Delivery and implementation of data center software:

the. storage systems;

b. development of virtualization environments;

c. free environment;

d. Blade / virtualization mgmt / backup proxy (hw-sw);

e. other services;

2. Delivery and implementation of a national IT network equipment:

the. routing on the premises - switching hardware (Layer 2-3) Configuration and architecture settlement;

b. Configuring redundancy and design of core network equipment;

c. the central controller and configuring Wi-Fi Access Points;

d. media converters and configure the corresponding network services;

development of GPS-based NTP time stamp and architecture;

3. Delivery and implementation of information security architecture:

the. Configuring a firewall architectures;

Configure IPS / IDS / Malware protection architectures;

c. Configuring e-mail protection system;

d. Configure web proxy architecture;

To configure 802.1X endpoint system in the entire national grid;

f. Configure logging system for the entire data center;

g. Mobile Device Management system configuration;

h. Configuration of collaborative tools;

i. Configuring authentication system;

j. To configure password storage center;

k. Configuring the treatment of bug ticketing system;

l. development of anti-virus client and server architecture in respect of all the devices in the system;

Delivery of equipment for Endpoint devices, implementation, configuration and training:

the. client devices;

b. printing software;

c. statistical software.

  • 1