The subject of the public procurement is the implementation of technical measures that will lead to an increase in cybersecurity in the contracting authority's environment. Specifically, the following security tools will be supplied and implemented as part of this public procurement:
- tool for protecting the integrity of communication networks and tool for protection against malicious code (core switches, wireless access points, central management with network access control);
- tool for user identity verification, PKI infrastructure, and access cards;
- tool for managing access permissions, identity management;
- tool for recording the activities of information or communication systems, their users, and administrators;
- tool for detecting cybersecurity incidents;
- tool for recording the activities of information or communication systems, their users, and administrators (100 users for service/project management, 500 users for documentation),
within the scope specified in Annex No. 1 of the procurement documentation (technical specification). The fulfillment also includes providing post-implementation services and ensuring a warranty for the supplied technologies meeting specified parameters for a period of 5 years.
Detailed definition of the subject of the public procurement, including technical conditions in details necessary for processing the offer, is provided in the attachments to the procurement documentation.
LOT-0001
Cybersecurity at the City Hospital of Ostrava.
The subject of the public procurement is the implementation of technical measures that will lead to an increase in cybersecurity in the contracting authority's environment. Specifically, the following security tools will be supplied and implemented as part of this public procurement:
- tool for protecting the integrity of communication networks and tool for protection against malicious code (core switches, wireless access points, central management with network access control);
- tool for user identity verification, PKI infrastructure, and access cards;
- tool for managing access permissions, identity management;
- tool for recording the activities of information or communication systems, their users, and administrators;
- tool for detecting cybersecurity incidents;
- tool for recording the activities of information or communication systems, their users, and administrators (100 users for service/project management, 500 users for documentation),
within the scope specified in Annex No. 1 of the procurement documentation (technical specification). The fulfillment also includes providing post-implementation services and ensuring a warranty for the supplied technologies meeting specified parameters for a period of 5 years.
Detailed definition of the subject of the public procurement, including technical conditions in details necessary for processing the offer, is provided in the attachments to the procurement documentation.