Professional Documents
Culture Documents
Enclosed
1.
2.
SCHEDULE OF COMPLIANCE
2.1
2.2
2.3
2.4
2.5
2.6
Internet Services
Link Load Balancer
Enterprise Firewall
Deep Network Analytics
Penetration Testing Software
Vulnerability Management Software
DOCUMENT B1
YES/NO
DOCUMENT B2.1
DOCUMENT B2.2
DOCUMENT B2.3
DOCUMENT B2.4
DOCUMENT B2.5
DOCUMENT B2.6
YES/NO
YES/NO
YES/NO
YES/NO
YES/NO
YES/NO
3.
DOCUMENTATION, SPECIFICATIONS
AND BROCHURE
DOCUMENT B3
YES/NO
4.
DOCUMENT B4
YES/NO
5.
DOCUMENT B5
YES/NO
6.
SCHEDULE OF MAINTENANCE
DOCUMENT B6
YES/NO
7.
TRAINING
DOCUMENT B7
YES/NO
DOCUMENT C1
YES/NO
SECTION C
1.
2.
FORM OF TENDER
CHECKLIST OF CONTENTS
3.
DOCUMENT C2
YES/NO
4.
DOCUMENT C3
YES/NO
5.
DOCUMENT C4
YES/NO
6.
STATEMENT OF AUTHORISED/PAID-UP
CAPITAL
DOCUMENT C5
YES/NO
7.
DATA-DATA KEWANGAN
DOCUMENT C6
YES/NO
8.
YES/NO
9.
YES/NO
YES/NO
ii