Our Partners close more business.

Use these powerful resources to win more business, faster, with less effort.  
Call 877-411-2220 x121 for personal support with any opportunity.

RESET SEARCH

Hosting Quote Estimator

GET a FREE Sandbox or Trial Environment NOW

How To Use This Tool:  

To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc.  You will find common questions and answers grouped together in one record.  Follow the tag links to refine your search.  Supporting downloads and documentation are available, below.

Please login to obtain download access to additional supporting documentation.  Registered users can also contribute to the database.  You can request access by Contacting Us.

© Omegabit LLC, 2023

Enter a Search Phrase or Select a Tag

Content with tag security awareness .

Hosting Provider Overview

Q:

Proposal outlining secure off-site hosting in a highly reliable system and facility. The hosting should support development, staging, and production environments and a process to deploy code between the environments.


A:

Omegabit's Liferay-optimized private cloud infrastructure features the fastest and most secure host infrastructure available for mission-critical Internet-facing Web applications, complemented by a full suite of managed professional services for ongoing operational, technical, and engineering support. Omegabit is more well-equipped technologically, and in terms of staff professional skills, as compared to any commercial supplier to satisfy the requirements of this proposal. And, serves as the preferred hosting provider for government agencies as well as household brands servicing finance, healthcare, education, technology and consumer markets. Its infrastructure and professional services are a key component of this proposal and address technical and security requirements as well as operational support.  These are a complement to the services supplied by our partner.

 

Omegabit's standard infrastructure features meet or exceed all of the stated requirements, and exceed those available from public cloud providers - or, only where available at exceptional added or hidden expense by others.  And, Omegabit is able to build-to-suit, in order to meet most any specific requirement of the Client as its operational needs evolve.

 

Please be sure to do an apples to apples comparison of the proposed services included in the hosting component of this proposal, as it indicates important and necessary features and professional services relating to security, performance, and operational support.  Which, are frequently overlooked and not addressed by other hosting proposals in order to obfuscate hidden, real-world costs. These features will prove mission-critical to City of Berkeley operations and must be realized, one way or another. Omegabit's job is to help account for and manage these costs in the best interest of the Client.  Omegabit is also able to provide a continuity of support and maintenance that can span many iterations of change across varying contributing teams over extended periods of time. This continuity is critical to cost management and security enforcement as the site implementation evolves and grows.

 

Unlike generic cloud and off the shelf rackspace providers, Omegabit customer environments operate from highly secure private VLAN protected Private Cloud space behind advanced security protection including Active Intrusion Detecting firewalls with hourly updates to known threats, DDOS protection, optional PCI export filtering, security AI heuristics (zero day quarantine).  And also include proactive security aware environment configuration, management, maintenance/upkeep, and 24x7x365 application aware emergency response and technical support.

 

Omegabit also manages its customer environments with a deep level of awareness concerning specific site implementation and use case, customer-specific operational and security requirements, performance profile and patterns of change - comprehensively - through every layer of the software and hardware application stack.  Standard as well as emergency technical response is provided by specially qualified and informed staff that have specific awareness about the client's host and application infrastructure. This is an industry-exclusive feature of Omegabit managed services.

 

This proposal includes a comprehensive hosting and operational support plan, serviced by Omegabit Liferay Enterprise Portal Hosting, based in San Luis Obispo, CA.



No comments yet. Be the first.

Personnel & Contractors - Security, Privacy Policy and Training

Q:

Do you have a formal policy regarding security awareness and training?

Do you require employees and contractors to go through Privacy and Security Awareness training upon hiring and annual renewal?

Do you retain individual's training records?

Have you established rules that govern users (employees and contractors) on the expected behavior with regards to information and information system usage?

Are they required to sign/acknowledge Acceptable Use Policy?

Are they required to sign/acknowledge Code of Conduct / Ethics and conflict-of-interest?

Do you have a formal policy regarding security awareness and training?

Do you provide security-related training based on the employees job function as required to perform assigned duties?

Do you require employees and contractors to go through Privacy and Security Awareness training upon hiring and annual renewal?

Is there a formal privacy awareness training program for employees, contractors, volunteers (and other parties, as appropriate)?


A:

ref: IT Security Handbook is provided to each employee upon hire

Yes; please see related answers concerning policies and methods on tab 1.

Trainings are ongoing, role and privilege specific, and typically performed on a one-on-one basis by a qualified supervisor logged as part of private personnel records. Training is segmented by the same basic constructs outlined in the Omegabit IT Security Handbook, plus specific proprietary training that relates to the advanced operation of Omegabit and Client infrastructure. Administrators are only approved to access and operate environments on which they have received specific operational training with supervisory sign-off, or, are the originator and original architect of the environment responsible for documenting and establishing any custom training facets for said environment.

Generally speaking, any externalized service is specifically contracted to match or exceed the terms and conditions of any relevant Client project or activity and parties are required to agree to complementary terms of engagement that are commensurate with Client and SLA requirements.

Yes.

Yes.

Yes.

ref: IT Security Handbook is provided to each employee upon hire

Yes.

Yes.

Omegabit provides awareness training as it relates to the handling of customer information and custom Liferay software design, according to modern PII standards, systematically: relating to all facets of its internal and Client hosted operations. This practice is continuously refreshed to keep pace with evolving threats and industry best practices as part of Omegabit day to day operations, and is disseminated in regular updates to employees. Key procedures are updated and noted by affected personnel. Administrators are specially trained, and updated on any special Client-specific requirements relating to operational security and privacy before being allowed access and control of sensitive Client environments, and are tasked with keeping current with relevant information updates as part of their normal responsibilities. Omegabit hosted and managed environments are ONLY managed by highly-trained personnel with specific awareness and experience with the uniquness of specific customer environment they are assigned to maintain. We do not assign generic administrators or support personnel as is typical of other commodity providers - everyone in contact with the Client and related infrastructure has specific working knowledge, sensitivity, and awareness to the circumstnces of that specific installation, and any related constraints relating to compliance of the Client stack.



No comments yet. Be the first.