Networks: South Africa tenders, rfq bids, opportunities and procurement 2025


Total: 51
13 dec
Re-Advertisement of Tender Number: SAWS-392/24. Bids are hereby invited for the acquisition, installation, and commissioning of two (2) solid state, dual-polarized X-Band Weather Radars in the Western Cape. Scope of work: The acquisition, installation, and commissioning of two (2) solid state dual-polarized X-Band weather radars includes, but is not limited to the following sub-activities that will be managed by a turnkey service provider: 1. System Design: - Detailed design of radar system and peripherals, - Interface design and data transfer description, 2. Radar Site Establishment: - The service provider to conduct full site suitability analysis, - Environmental Impact Assessment, - Electricity Supply & Connection (Eskom), - Site Layout and Electrical Plan, 3. Acquisition and Installation of the Radar System: - Acquisition process definition (Defining the acquisition process), - Radar System Transportation to the Site, - Civil Works, - Radome, - Radar Tower Erection, - Eskom Power Supplies to Radar Site, with a design for off-grid solar system or hybrid solar, system indicated as an option. - Power backup Systems (Generator & Bulk Diesel Tank), - Housing and environmental control systems, - Site security (clearvu or equivalent high security fence, Electric fence, CCTV for remote viewing, alarm system). 4. Commissioning, Training and Handover: - Communication system and data transmission that allows integration into the SAWS ICT Network, for example VSAT or available GSM networks, - Integration into the SAWS TITAN/LROSE Radar network, - Training of operators and maintenance technicians, - Commissioning, Testing and hand over. (EN) add to Favorites
Deadline: 29 days
Customer: ONLINE TENDERS

Number: 115973786

Country: South Africa

Source: ONLINE TENDERS

29 oct
Tenders are hereby invited for the provision of certified cyber security and enterprise architecture related training services to the client for a period of three (3) years. Scope of Work: Provisioning of services for formalised training and certification for industry recognised and accredited courses within the domains of Cybersecurity, Information management, business analysis and enterprise architecture. The courses identified have been selected through research and discussion within the business as well as being internationally recognised and accredited. Deliverables: The training institute (referred to as the Tenderer) must provide facilitated training on the listed accredited courses that are industry and world recognised within their fields. All the courses listed have been developed by leading training organisations and offer professional certifications in the field of information technology (IT), Cybersecurity, Data and Project management. The training institute needs to be Authorised or Accredited by the professional certification body like CompTIA, EC-Council, ISACA, ISC2 IIBA, Axelos, The Open Group and DAMA to facilitate most courses listed and have an accredited examination facility to allow students to write the accreditation examination as required. The courses listed form part of a structured training plan that aims to allow client"s employees a formalised method to be trained. The tenderer/institute should facilitate the training for courses listed below as well as provide a mechanism for trainees to write the certification examination. Primary requirement (foundational) Courses: These are the primary required courses a tenderer will need to offer. These courses establish knowledge required of by the business around network, information, and Cybersecurity. These listed as the primary required courses are widely offered in South Africa and industry recognised globally: • CompTIA Security+ (SY0-701), • CompTIA Network+ (N10-008), • CompTIA Cybersecurity Analyst (CySA+) (CS0-003), • CompTIA PenTest+ (PT0-002), • CompTIA Cloud+ (CV0-003), • EC-Council Certified SOC Analyst (CSA), • EC-Council - Threat intelligence analyst (C|TIA), • EC Council - Certified ethical Hacking (C|EH v12). Secondary (further development) courses: The secondary courses focus on further business needs around cybersecurity, information and Data management and system architecture role designed to ensure proficiency in technologies, Business processes and Risk management in efforts to protect networks, systems and data: • EC-Council - Hacking Forensics Investigator (CHFI v10), • EC Council - Certified incident handler (ECIH), • IIBA Entry Certificate in Business Analysis (ECBA), • IIBA Certification of Competency in Business Analysis (CCBA), • TOGAF 10 ENTERPRISE ARCHITECTURE LEVEL 1 & 2 (10th Edition), • CAPM® Exam Preparation: FULL-DAY Course, • PRINCE2® Foundation and Practitioner 7th Edition Training Course, • The CDMP® Associate Certification, • ISACA - Certified in Risk and Information systems control (CRISC), • PMP® Exam Preparation: Full day. Tertiary (Advanced) courses: The Tertiary cyber security training and courses focus on specialized and in-depth areas within the field of cyber security. They will allow staff to tackle more advanced concepts and deploy effective strategies and guide the business to improve the cybersecurity posture: • CompTIA Advanced security practitioner (CASP+) (CAS-004), • ISC2 - Certified Information Systems Security Professional (CISSP), • ISC2 - Certified Cloud Security Professional (CCSP), • ISACA - Certified Information Security Manager (CISM), • ISACA - Certified information systems Auditor (CISA). (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 113086375

Country: South Africa

Source: ONLINE TENDERS

04 sep
Addendum: Amendment to closing date. Quotations are hereby requested for the following: Appointment of a multi-disciplinary professional team to undertake a precinct plan for Culemborg, Port of Cape Town for a period of six (6) months or until completion of works. Specifications: Deliverables: The phases of the development should include (but not be limited to) the following topics: 1. A project inception report, which set out the project execution plan and reports on how the stages of the project will be implemented, 2. A status quo report of the property, environment, infrastructure, roads, rail, etc, 3. A Scenario Evaluation Framework Report, which sets out alternative scenarios that may be developed for the precinct and quantifies the extent of development potential of the precinct and associated capital costs, 4. The Precinct Plan and associated reports should include but not limited to: 4.1. A strategic context key planning policy directives and Legislation, 4.2. Spatial vision, goals, and objective, 4.3. Architectural impressions of the proposed development to provide a futuristic view of the precinct in various formats, 4.4. Key site informants, 4.5. Key structuring elements, 4.6. Financial assessment associated with the implementation of the development, including a cost benefit analysis, 4.7. Implementation strategy and phasing of the Development process and legislative requirements, 4.8. The Plan should include the following within its final report: a) Detailed precinct plan, b) Detailed land use plan, c) Urban design guidelines, d) General spatial development guidelines for the precinct, e) Landscape plan and plant palette, f) Bulk and internal precinct services (including water reservoirs, water and sanitation distribution networks, electrical installations and distribution networks, roads, storm water, Telecoms, Fire storage and distribution, etc), g) Typical Road reserve cross-sections, h) Security and access; and i) Environmental and Heritage Study, 5. Some of the reports and documents to be used by the service provider include amongst others the following: 5.1. Culemborg Salt River Spatial Development Framework, 2010 Study, 5.2. Heritage Impact Assessment Report, 5.3. Geotechnical Report, 5.4. Port of Cape Town PDFP, 5.5. Draft Port of Cape Town Growth Strategy, 5.6. Integrated Municipal and District Spatial Development Framework Plans, 5.7. Municipal By-Laws in relation to traffic congestion and land-use, 5.8. Municipal Integrated Development Plans and Integrated Transport Plans, 5.9. Any other TNPA and regulatory requirements. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 110319440

Country: South Africa

Source: ONLINE TENDERS

30 jul
Proposals are hereby requested for the following: Provision of database security management solution for a period of five (5) years. Scope: Eskom requires a cloud-based or SaaS Database Security tool for a period of five (5) years. The cloud-based or SaaS Database Security tool must cater for the Eskom hybrid (on-premises, hybrid, and multiple cloud) environments, databases hosted on-prem and the cloud. The cloud-based or SaaS Database Security Management tool must include subscriptions fee, software licenses, onboarding assistance, maintenance, training, and support on an 24X7X365 (24/7/365) throughout the year for the duration of the contract: The Database Security Management tool must have the following capabilities, functionalities and features but not limited to: a) Security Assessment: The Database Security Management tool must provide security posture, risk profile of the entire database, database discovery, data discovery, data classification and security policy, b) Artificial Intelligence (AI) and Machine Learning (ML): The Database Security Management tool must be AI and ML-powered for event collection and analysis, c) Encryption and Key Management: The Database Security Management tool must encrypt data at rest with key management capability, d) Data Masking, Tokenisation and Sub-setting: The Database Security Management tool must be able to scan the entire database for sensitive data, mask, tokenise and subset sensitive data in nonproduction environments, e) Data Access Control: The Database Security Management tool must provide the following: i. Enforce separation of duties to control access based on security privileges, identify sensitive data, ii. Ensure that administrators can manage the database, but not access the sensitive data, f) Auditing and Monitoring: The Database Security Management tool must provide the following: i. Detect, analyse, and block threats in database activity, ii. Comply with the Center for Internet Security (CIS) benchmarks, the Defence Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) auditing requirements, iii. Provision audit policies that balance the need to monitor activity with the impact of collecting and storing audit data, iv. Monitor user activity with data, v. Simplify compliance reporting and help identify risky user behaviour, g) Audit Vault and Database Firewall: The Database Security Management tool must provide both audit vault and database firewall to provide the following: i. Assess database security posture, ii. Monitor privileged user activity, iii. Deny and block unauthorised access, iv. Provide useful, simplified logs to assist with the incident investigation, v. Provide continuous alerts on suspicious activity, vi. Provide simplified regulatory compliance reporting such as PCI DSS, GDPR and POPIA, h) Interoperability: The Database Security Management tool must support numerous and prevailing database management system (DBMS) technologies such as Microsoft (MS) structured query language (SQL), MySQL, SQLite, Redis DB, Oracle databases, IBM DB2, IBM NETEZZA, SAP HANA, MongoDB, Postgres, Cassandra, Neo4j DBMS, PostGIS, Elasticsearch DBMS, and MariaDB but not limited to these DBMS technologies, i) Integration to SIEM: The Database Security Management tool must be able to integrate with numerous and prevailing SIEM tools such as Splunk, and Sentinel but not limited to these SIEM tools, j) Integration to advanced AI and machine learning (ML) network monitoring solutions: The Database Security Management tool must be able to integrate numerous and prevailing AI and machine learning network monitoring solutions such as Darktrace but not limited to these tools listed, k) Integration to on-prem Identity Provider (IdP): The Database Security Management tool must be able to integrate with Eskom existing on-prem identity provider (IdP)for central user account management, to enable MFA and SSO, l) Self-hosted or on-prem and Cloud-based Databases: The Database Security Management tool must be able to scan both databases hosted on- prem and in the cloud, m) Process Control Network’s (PCN’s) or Operational Technology (OT) Databases: The Database Security Management tool must be able to scan databases that are placed on the PCN or OT networks, n) Agentless: The Database Security Management tool must be agentless, o) Reporting: The Database Security Management tool must simplify compliance reporting, users, administrators, and privileged user activity logs and help identify risky user behaviour. Training/Transfer of skills: a) Provide web-based or online training for Security Services Security Operation Centre (SOC) team to enable them to perform the scan, analyse, interpret the results, forward to the relevant stakeholders to remediate identified security vulnerabilities, b) Provide Database Security tool onboarding assistance, c) Mentor, transfer skills and knowledge to Eskom resources assigned to the project through the installation, configuration, testing, and deployment stages using a defined skills transfer program, d) Expert level training with relevant certification for the SOC team. Service Level Agreement requirements: The Service Provider must provide 24X7X365 (24/7/365) support and monitoring of the Database Security Management tool: a) The SOC team require 24X7X365 (24/7/365) support throughout the year, b) Security Services department requires 24X7X365 (24/7/365) monitoring of the Database Security tool, c) Security Services department requires MTTR (Mean time to resolve) of 4 hours, d) The availability of the SaaS solution must be 99.9%. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 108286183

Country: South Africa

Source: ONLINE TENDERS

06 may
Quotations are hereby invited for the following: Implementation of HPE Aruba networking ClearPass security including ad-hoc support for a period of two (2) years. Scope of works: • Part Number: Q9H62A; Aruba AP-515 (RW) Unified AP Hewlett Packard Enterprise 36; • Part Number: HC4KOE; Aruba 3Y FC NBD Exch HW AP-515 SVC [for Q9H62A] x 36; • Part Number: Q9G71A; AP-MNT-MP10-D AP mount bracket 10-pack D [split order] x 36 • Part Number: Q9Y64AAE; Aruba Central Device Management 1 Token 3 Year Subscription E-STU x 41; • Part Number: JZ399AAE; Aruba ClearPass Cx000V VM Appliance E-LTU x 1; • Part Number: H9WX3E; Aruba 3Y FC 24x7 ClearPass Cx000V VM SVC [for JZ399AAE] x 1; • Part Number: JZ401AAE; Aruba ClearPass NL AC 500 CE E-LTU x 1; • Part Number: H9XB3E; Aruba 3Y FC 24x7 ClearPass NL AC500CESVC [for JZ401AAE] x 1. Services required: SAMSA would like to implement the Aruba ClearPass security management platform that would enable for the provisioning of devices grant varying access levels to ensure ensure an end-to-end solution which shall enable not limited to the following: • Wireless Network to be secured with the most recent encryption configuration with seamless integration to SAMSA internal security controls and related configurations; • Threat and Vulnerability Detection; • Manage corporate mobile device (tablets, cell phones, etc) accessing the wireless network; • Manage guest devices accessing the wireless network and usage; • Management of domain devices (laptops) log-in using SAMSA Active directory user accounts; • Manage bandwidth utilisation on wireless Networks per user and devices; • Implement Quality of Service (QOS) for Critical applications, Teams and Exchange connecting through wireless and Wired Networks; • Detailed Reporting on users and devices – traffic (web, applications, etc) information report; • Full Control and Visibility of all access Points devices including access switches configuration and activity on the network, including web and content filtering, blocking, etc. Configuration to be aligned to SAMSA policies; • Provide detailed Technical configuration implementation documentation; • Provide network design diagrams and configuration documents for the wireless including wired network; • Perform health checks and ensure compatibility with available network devices; • Knowledge transfer to SAMSA Technical Team. Manufacture: Hewlett Packard Enterprise. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 103974192

Country: South Africa

Source: ONLINE TENDERS

20 nov
Formal written price quotations are hereby invited for the following: Provision of training services for medium voltage network operations. Scope: The service provider must: a) Render an outcomes-based training programme that supports formative and summative assessment(s); b) Conduct pre-assessments to determine the entry levels of learners (where required); c) Provide skilled and experienced facilitator(s) who shall be dedicated in providing facilitation services at any of the municipal venue(s), in accordance with the nationally acceptable norms and standards; d) Assist the municipality in the coordination and monitoring of the relevant training programme by means of monthly reports per learner; e) Submit comprehensive monthly reports on learner progress and attendance registers; f) Provide exit level Outcome: Trained and Competent learner; g) Be open for customization in line with the core functions of the municipality. Learners will be on different levels and implementation levels may differ. Provider should be able to accommodate this in the facilitation and assessment methods. Facilitation must be rendered with the learner in mind. Adult learning must be taken into consideration. Training Programme title: Medium Voltage Network Operations. Objective of this training: This skills programme must enable a learner to understand the principles and application in Medium Voltage Network Operations. Duration: + 5 days. Learning outcome: - The outcomes of the following unit standard(s) must be covered: 259204 – Operate Medium Voltage networks 242766 – Demonstrate knowledge and understanding of ORHVS; - Plan and prepare the operation of MV networks; - Switching and linking/isolation of apparatus; - Safety testing and earthing of apparatus; - Restore supply operations/returning apparatus to service; - Demonstrate knowledge and understanding of ORHVS principles and terminology. Range of training: - Operating is limited to Medium Voltage feeders to include switching, linking, safety testing, earthing, and preparation for work; - Medium Voltage is limited to voltages > 1000V and up to 44kV; - Operating conditions include normal/abnormal, planned/unplanned and day/night. Venue preference: In house Cederberg Municipality Formative and summative assessments as well as competency certificates is a requirement. Language: Preferred language English. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 94575632

Country: South Africa

Source: ONLINE TENDERS

03 nov
Quotations are hereby invited for the following: Sentech OTT Content Creation Agency. Scope of work: Sentech is currently seeking the expertise of a media collateral creation company that will develop a brand messaging strategy and create TV, radio, and digital advertisements to promote its new OTT streaming platform Freeview Play launching November 2023. The successful bidder will be responsible for: 1. Brand Messaging and Content Development: - Develop a clear and consistent brand messaging strategy that aligns with the platform"s identity and resonates with the target audience; - Create brand messaging materials, including taglines, slogans, and key messaging points, that can be used across various advertising and digital content. 2. Advertisement Development: - Create high-quality TV advertisements that effectively convey the platform"s value proposition and key features; - Develop engaging and memorable radio advertisements; - Design digital advertisements suitable for online platforms. 3. Scriptwriting and Storyboarding: - Develop scripts and storyboards for TV, radio and digital advertisements, ensuring they align with the brand"s messaging; - Create compelling brand messaging that effectively communicates the platform"s unique value proposition. 4. Content Production: - Produce TV and radio advertisements, including audio and visual elements; - Create digital ad assets, including static and animated visuals. 5. Compliance and Distribution: - Ensure that all advertisements comply with relevant advertising standards and regulations; - Facilitate the distribution of TV and radio advertisements to relevant networks and platforms. 6. Performance Tracking: - Implement tracking tools to measure the effectiveness of advertisements; - Provide insights and recommendations based on the performance data. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 93642710

Country: South Africa

Source: ONLINE TENDERS