Municipalities have commissioned the Association of Dutch Municipalities to realize the Municipal Common Infrastructure (GGI). The GGI creates a secure, coherent digital infrastructure that makes cooperation between municipalities and with other governments better, safer and easier. Within this GGI Veilig forms the portfolio of products and services aimed at information security.
Product / service group SIEM / SOC services, including security services for the central SIEM / SOC facility to be able to offer the common SIEM / SOC service from a safe, controlled environment.
Of the total of 334 registered Participants, 331 have registered for Lot 1 (see Appendix 1C Declaration Participants and Appendix 1D Declaration non-registered Participants).
Of the 334 participants registered in total, 289 registered for Lot 2 (see Appendix 1C Declaration Participants and Appendix 1D Declaration non-registered Participants).
The portfolio of services below can be delivered to Participants in three different forms: as a physical product, as a virtual product / serves or as a managed service. This concerns the following services:
CASB (Cloud Access Security Broker)
b. DDI management (DNS, DHCP and IP address management)
c. Firewall
d. Mail filtering
e. Endpoint protection (incl. Servers) / anti-virus, anti-malware
f. Advanced Persistent Threat Protection (APT)
g. GGI Anti-DDOS
h. Intrusion Detection & Prevention (IDS / IPS)
i. EMM (Enterprise Mobility Management) / MDM / MAM (Mobile Device & Application Management)
j. VPN management
k. DLP (Data Loss Prevention / Data Leakage Prevention; incl. Endpoint and network)
l. Vulnerability Management solution
Of the 334 participants registered in total, 301 signed up for Lot 3 (see Appendix 1C Declaration Participants and Appendix 1D Declaration non-registered Participants).
• SIEM process,
• Compliancy *,
• Vulnerability,
• Pen testing,
• Forensics in security incidents,
• Hardening IT infrastructures.
*) These services include advice, research and audit services that are primarily focused on information security issues related to Participants' IT processes, applications and IT infrastructure. This does not include formal assurance and certification services.