security and surveillance systems and devices: South Africa tenders, rfq bids, opportunities and procurement 2025


Total: 122
13 dec
Re-Advertisement of Tender Number: SAWS-392/24. Bids are hereby invited for the acquisition, installation, and commissioning of two (2) solid state, dual-polarized X-Band Weather Radars in the Western Cape. Scope of work: The acquisition, installation, and commissioning of two (2) solid state dual-polarized X-Band weather radars includes, but is not limited to the following sub-activities that will be managed by a turnkey service provider: 1. System Design: - Detailed design of radar system and peripherals, - Interface design and data transfer description, 2. Radar Site Establishment: - The service provider to conduct full site suitability analysis, - Environmental Impact Assessment, - Electricity Supply & Connection (Eskom), - Site Layout and Electrical Plan, 3. Acquisition and Installation of the Radar System: - Acquisition process definition (Defining the acquisition process), - Radar System Transportation to the Site, - Civil Works, - Radome, - Radar Tower Erection, - Eskom Power Supplies to Radar Site, with a design for off-grid solar system or hybrid solar, system indicated as an option. - Power backup Systems (Generator & Bulk Diesel Tank), - Housing and environmental control systems, - Site security (clearvu or equivalent high security fence, Electric fence, CCTV for remote viewing, alarm system). 4. Commissioning, Training and Handover: - Communication system and data transmission that allows integration into the SAWS ICT Network, for example VSAT or available GSM networks, - Integration into the SAWS TITAN/LROSE Radar network, - Training of operators and maintenance technicians, - Commissioning, Testing and hand over. (EN) add to Favorites
Deadline: 29 days
Customer: ONLINE TENDERS

Number: 115973786

Country: South Africa

Source: ONLINE TENDERS

09 dec
Proposals are hereby invited for the procurement of a library registration system and a time and attendance system with unlimited users licensed for 12 months. Scope: The capabilities of the Library Registration System include: - User Registration Module: • Capture essential user information such as name, membership ID, date, and time of visit; • Support walk-in and pre-registered users. Database Management: • Centralized storage for user data; • Ensure data backup and security protocols are in place. Attendance Tracking: • Record entry and exit times of users; • Support real-time monitoring of user count in the library. Reporting Features: • Daily, weekly, and monthly attendance reports; • Trends and analytics on library usage. System Accessibility: • A user-friendly interface for both library staff and visitors; • Mobile and desktop compatibility. The objectives of the Library Registration System include: • Efficient Registration: Enable smooth, quick, and user-friendly daily registration; • Accurate Data Management: Collect and manage user data securely and accurately for administrative purposes; • User Tracking: Facilitate tracking of user visits for better understanding of usage patterns and capacity planning; • Reporting and Analysis: Generate reports on daily attendance for operational insights; • The bidder should propose all the hardware required for the solution to operate successfully and provide optimal performance. This includes, but is not limited to, computer hardware, tablets, cameras and monitors. The solution should also incorporate time and attendance management as it is critical for ensuring productivity, accountability and compliance. Core Features: • Biometric, RFID, or mobile app-based clock-in/out functionality; • Real-time tracking of employee attendance. Data Analytics and Reporting: • Generate detailed reports on attendance, absenteeism, and overtime. Integration Capabilities: • Compatible with existing HR and payroll systems; • API support for third-party applications. User Experience: • Employee self-service portal for attendance and leave tracking; • Admin dashboard for HR and management staff. A modern Time and Attendance System aims to replace traditional manual processes with an automated solution that tracks employee work hours, leaves, and attendance patterns efficiently and securely. Objectives of time and attendance include: • Streamlined Tracking: Automate the recording of employee work hours and attendance; • Compliance: Ensure adherence to labor laws and NLSA policies regarding time management. • Data Accuracy: Minimize human errors and fraud associated with manual attendance tracking; • Integration: Seamlessly integrate with payroll and HR systems for efficient processing; • Employee Self-Service: Empower employees to view their attendance. The solution must be implemented at the client"s three sites – Pretoria Campus, Cape Town Campus and Centre for the Book. (EN) add to Favorites
Deadline: 22 days
Customer: ONLINE TENDERS

Number: 115677140

Country: South Africa

Source: ONLINE TENDERS

05 dec
Re-Advertisement: Proposals are hereby invited for the appointment of a service provider for full turn-key managed information and communication services. Scope of work: Project Scope: 1. Dedicated ICT Service Desk Service: Provision of a dedicated ICT service desk for logging and tracking all support and service-related calls. 2. IT Service Management: The Service Provider is required to provide and perform the end-to-end delivery of IT Service Management services in line with the ITIL V4 framework, including the required tools to monitor and manage all services. The Service Management service set is a crucial element of this RFP as it looks holistically at all IT Services, including those provided by all vendors and CETA IT personnel, ensuring that all IT Services are managed and delivered effectively and seamlessly. 3. Server Support and Maintenance Services. 4. Local Area and Wi-Fi Network. 5. Wide Area Network: Provision of a fully managed Wide Area Network (WAN) with centralized internet breakout. Each office will have both primary and secondary last-mile network links to ensure highly available connectivity. 6. Internet Connectivity. 7. Infrastructure Monitoring. 8. IT Security Services. 9. IT and Security Management. 10. Cloud PBX and Microsoft Teams Telephony: The service provider must configure and support Microsoft Teams telephony, including user provisioning, call routing configurations, and troubleshooting. 11. Active Directory and Azure Active Directory Services. 12. Storage Systems. 13. Reporting. 14. Data Room. (EN) add to Favorites
Deadline: 22 days
Customer: ONLINE TENDERS

Number: 115444192

Country: South Africa

Source: ONLINE TENDERS

29 oct
Tenders are hereby invited for the provision of certified cyber security and enterprise architecture related training services to the client for a period of three (3) years. Scope of Work: Provisioning of services for formalised training and certification for industry recognised and accredited courses within the domains of Cybersecurity, Information management, business analysis and enterprise architecture. The courses identified have been selected through research and discussion within the business as well as being internationally recognised and accredited. Deliverables: The training institute (referred to as the Tenderer) must provide facilitated training on the listed accredited courses that are industry and world recognised within their fields. All the courses listed have been developed by leading training organisations and offer professional certifications in the field of information technology (IT), Cybersecurity, Data and Project management. The training institute needs to be Authorised or Accredited by the professional certification body like CompTIA, EC-Council, ISACA, ISC2 IIBA, Axelos, The Open Group and DAMA to facilitate most courses listed and have an accredited examination facility to allow students to write the accreditation examination as required. The courses listed form part of a structured training plan that aims to allow client"s employees a formalised method to be trained. The tenderer/institute should facilitate the training for courses listed below as well as provide a mechanism for trainees to write the certification examination. Primary requirement (foundational) Courses: These are the primary required courses a tenderer will need to offer. These courses establish knowledge required of by the business around network, information, and Cybersecurity. These listed as the primary required courses are widely offered in South Africa and industry recognised globally: • CompTIA Security+ (SY0-701), • CompTIA Network+ (N10-008), • CompTIA Cybersecurity Analyst (CySA+) (CS0-003), • CompTIA PenTest+ (PT0-002), • CompTIA Cloud+ (CV0-003), • EC-Council Certified SOC Analyst (CSA), • EC-Council - Threat intelligence analyst (C|TIA), • EC Council - Certified ethical Hacking (C|EH v12). Secondary (further development) courses: The secondary courses focus on further business needs around cybersecurity, information and Data management and system architecture role designed to ensure proficiency in technologies, Business processes and Risk management in efforts to protect networks, systems and data: • EC-Council - Hacking Forensics Investigator (CHFI v10), • EC Council - Certified incident handler (ECIH), • IIBA Entry Certificate in Business Analysis (ECBA), • IIBA Certification of Competency in Business Analysis (CCBA), • TOGAF 10 ENTERPRISE ARCHITECTURE LEVEL 1 & 2 (10th Edition), • CAPM® Exam Preparation: FULL-DAY Course, • PRINCE2® Foundation and Practitioner 7th Edition Training Course, • The CDMP® Associate Certification, • ISACA - Certified in Risk and Information systems control (CRISC), • PMP® Exam Preparation: Full day. Tertiary (Advanced) courses: The Tertiary cyber security training and courses focus on specialized and in-depth areas within the field of cyber security. They will allow staff to tackle more advanced concepts and deploy effective strategies and guide the business to improve the cybersecurity posture: • CompTIA Advanced security practitioner (CASP+) (CAS-004), • ISC2 - Certified Information Systems Security Professional (CISSP), • ISC2 - Certified Cloud Security Professional (CCSP), • ISACA - Certified Information Security Manager (CISM), • ISACA - Certified information systems Auditor (CISA). (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 113086375

Country: South Africa

Source: ONLINE TENDERS

25 oct
Quotations are hereby requested to appoint a Service Provider (SP) for the installation of alarms and render armed response at the Hout Bay Proclaimed Fishing Harbour for a period of (12) months. Scope of works: The scope work includes installation of intruder detection alarm systems, maintenance thereof and provision of an armed response in the Hout Bay Proclaimed Fishing Harbour to secure the tangible and intangible assets of the client: 1. Provision of a 24-hour (24) hour armed response service at the Hout Bay Proclaimed Fishing Harbour, seven (7) days per week including weekends and public holidays, 2. Rendering a security service with duties as authorised officers in terms of the Control of Access to Public Premises and Vehicle Act, 53 of 1985, 3. Respond to intruder alarm system in order to Protect Assets, Resources and Prevent crime from occurring on premises, 4. Recording of incidents or events in an Occurrence Register, Electronically and Report such incident or events to the client personnel responsible for Security Management, 5. Enforcing of the the client"s Security Policy, 6. Ensure compliance with the Department of Labour Bargaining Council Rates, 7. The appointed service provider will adhere to the provisions related to salaries wages and remuneration as envisaged in the provided in the bargaining counsel and the requirements as stipulated in the Labour Relations Act for a 1 x 12-hour shift as per the requirements per district or location. Please confirm the contract number as two were published. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 112906435

Country: South Africa

Source: ONLINE TENDERS

12 aug
Re-Advertisement: Information are hereby requested for the following: Provision of New Prefabricated Smart Building System that utilizes Hybrid Glass-Fiber Reinforced Thermoplastic Composite Panels or similar material. Based on new requirements to identify viable existing products, specifically composite panel prefab smart building systems, the UN Office of Supply Chain Management seeks solutions that are rapid deployable, have a long lifespan, and improve power demand management. This comprehensive questionnaire is designed to gather detailed information from manufacturers and suppliers regarding the suitability and availability of customizable structures that utilize Hybrid Glass-Fiber Reinforced Thermoplastic Composite panels for UN military operations or similar material. The focus is on sustainability, modular building systems, customization, durability, aesthetics, security, and environmental considerations. Your input will be invaluable in assessing market capabilities and aligning them with the United Nations operational needs for durable, energy-efficient structures suitable for deployment in various global environments. The qualifications of interest for this product are the following: 1. Rapid Deployment: The product is designed for quick erection and commissioning with minimal use of heavy engineering equipment and specialized trades; 2. Modular System: It drastically reduces construction time and labour costs, shipping flat in ISO Standard 20 ft. Sea Containers for efficient logistics; 3. Customization: Features customizable options for size, rigidity, texture, colour, and inserts, adaptable to specific needs, utility, and environmental conditions; 4. Energy Efficiency: Enhances power demand management and provides superior R-value thermal performance, optimized acoustics, and resistance to energy loss; 5. Environmental Considerations: Sustainable, eco-friendly, 100% recyclable, and significantly reduces greenhouse gas emissions and carbon footprint. It is non-toxic and resistant to moulds, bacteria, and chemical corrosion; 6. Durability and Maintenance: Designed for a long lifespan of up to twenty years with minimal preventative maintenance, resistant to moisture, air infiltration, and pests like termites and rodents; 7. Compliance and Certifications: Meets international standards for military use and adheres to regulatory codes and environmental certifications. Country: Global. Please confirm the closing time as it was not published. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 109017249

Country: South Africa

Source: ONLINE TENDERS

06 aug
Re-Advertisement: Information are hereby requested for the following: Provision of New Prefabricated Smart Building System that utilizes Hybrid Glass-Fiber Reinforced Thermoplastic Composite Panels or similar material. Based on new requirements to identify viable existing products, specifically composite panel prefab smart building systems, the UN Office of Supply Chain Management seeks solutions that are rapid deployable, have a long lifespan, and improve power demand management. This comprehensive questionnaire is designed to gather detailed information from manufacturers and suppliers regarding the suitability and availability of customizable structures that utilize Hybrid Glass-Fiber Reinforced Thermoplastic Composite panels for UN military operations or similar material. The focus is on sustainability, modular building systems, customization, durability, aesthetics, security, and environmental considerations. Your input will be invaluable in assessing market capabilities and aligning them with the United Nations operational needs for durable, energy-efficient structures suitable for deployment in various global environments. The qualifications of interest for this product are the following: 1. Rapid Deployment: The product is designed for quick erection and commissioning with minimal use of heavy engineering equipment and specialized trades; 2. Modular System: It drastically reduces construction time and labour costs, shipping flat in ISO Standard 20 ft. Sea Containers for efficient logistics; 3. Customization: Features customizable options for size, rigidity, texture, colour, and inserts, adaptable to specific needs, utility, and environmental conditions; 4. Energy Efficiency: Enhances power demand management and provides superior R-value thermal performance, optimized acoustics, and resistance to energy loss; 5. Environmental Considerations: Sustainable, eco-friendly, 100% recyclable, and significantly reduces greenhouse gas emissions and carbon footprint. It is non-toxic and resistant to moulds, bacteria, and chemical corrosion; 6. Durability and Maintenance: Designed for a long lifespan of up to twenty years with minimal preventative maintenance, resistant to moisture, air infiltration, and pests like termites and rodents; 7. Compliance and Certifications: Meets international standards for military use and adheres to regulatory codes and environmental certifications. Country: Global. Please confirm the closing time as it was not published. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 108661181

Country: South Africa

Source: ONLINE TENDERS

30 jul
Proposals are hereby requested for the following: Provision of database security management solution for a period of five (5) years. Scope: Eskom requires a cloud-based or SaaS Database Security tool for a period of five (5) years. The cloud-based or SaaS Database Security tool must cater for the Eskom hybrid (on-premises, hybrid, and multiple cloud) environments, databases hosted on-prem and the cloud. The cloud-based or SaaS Database Security Management tool must include subscriptions fee, software licenses, onboarding assistance, maintenance, training, and support on an 24X7X365 (24/7/365) throughout the year for the duration of the contract: The Database Security Management tool must have the following capabilities, functionalities and features but not limited to: a) Security Assessment: The Database Security Management tool must provide security posture, risk profile of the entire database, database discovery, data discovery, data classification and security policy, b) Artificial Intelligence (AI) and Machine Learning (ML): The Database Security Management tool must be AI and ML-powered for event collection and analysis, c) Encryption and Key Management: The Database Security Management tool must encrypt data at rest with key management capability, d) Data Masking, Tokenisation and Sub-setting: The Database Security Management tool must be able to scan the entire database for sensitive data, mask, tokenise and subset sensitive data in nonproduction environments, e) Data Access Control: The Database Security Management tool must provide the following: i. Enforce separation of duties to control access based on security privileges, identify sensitive data, ii. Ensure that administrators can manage the database, but not access the sensitive data, f) Auditing and Monitoring: The Database Security Management tool must provide the following: i. Detect, analyse, and block threats in database activity, ii. Comply with the Center for Internet Security (CIS) benchmarks, the Defence Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) auditing requirements, iii. Provision audit policies that balance the need to monitor activity with the impact of collecting and storing audit data, iv. Monitor user activity with data, v. Simplify compliance reporting and help identify risky user behaviour, g) Audit Vault and Database Firewall: The Database Security Management tool must provide both audit vault and database firewall to provide the following: i. Assess database security posture, ii. Monitor privileged user activity, iii. Deny and block unauthorised access, iv. Provide useful, simplified logs to assist with the incident investigation, v. Provide continuous alerts on suspicious activity, vi. Provide simplified regulatory compliance reporting such as PCI DSS, GDPR and POPIA, h) Interoperability: The Database Security Management tool must support numerous and prevailing database management system (DBMS) technologies such as Microsoft (MS) structured query language (SQL), MySQL, SQLite, Redis DB, Oracle databases, IBM DB2, IBM NETEZZA, SAP HANA, MongoDB, Postgres, Cassandra, Neo4j DBMS, PostGIS, Elasticsearch DBMS, and MariaDB but not limited to these DBMS technologies, i) Integration to SIEM: The Database Security Management tool must be able to integrate with numerous and prevailing SIEM tools such as Splunk, and Sentinel but not limited to these SIEM tools, j) Integration to advanced AI and machine learning (ML) network monitoring solutions: The Database Security Management tool must be able to integrate numerous and prevailing AI and machine learning network monitoring solutions such as Darktrace but not limited to these tools listed, k) Integration to on-prem Identity Provider (IdP): The Database Security Management tool must be able to integrate with Eskom existing on-prem identity provider (IdP)for central user account management, to enable MFA and SSO, l) Self-hosted or on-prem and Cloud-based Databases: The Database Security Management tool must be able to scan both databases hosted on- prem and in the cloud, m) Process Control Network’s (PCN’s) or Operational Technology (OT) Databases: The Database Security Management tool must be able to scan databases that are placed on the PCN or OT networks, n) Agentless: The Database Security Management tool must be agentless, o) Reporting: The Database Security Management tool must simplify compliance reporting, users, administrators, and privileged user activity logs and help identify risky user behaviour. Training/Transfer of skills: a) Provide web-based or online training for Security Services Security Operation Centre (SOC) team to enable them to perform the scan, analyse, interpret the results, forward to the relevant stakeholders to remediate identified security vulnerabilities, b) Provide Database Security tool onboarding assistance, c) Mentor, transfer skills and knowledge to Eskom resources assigned to the project through the installation, configuration, testing, and deployment stages using a defined skills transfer program, d) Expert level training with relevant certification for the SOC team. Service Level Agreement requirements: The Service Provider must provide 24X7X365 (24/7/365) support and monitoring of the Database Security Management tool: a) The SOC team require 24X7X365 (24/7/365) support throughout the year, b) Security Services department requires 24X7X365 (24/7/365) monitoring of the Database Security tool, c) Security Services department requires MTTR (Mean time to resolve) of 4 hours, d) The availability of the SaaS solution must be 99.9%. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 108286183

Country: South Africa

Source: ONLINE TENDERS

26 jul
Quotations are hereby requested for the following: Hosting, supporting and maintaining Mbhashe Local Municipality website for a period of 12 months. Specifications: - Provide administrator access to the website for the municipality staff to be able to update, edit, and delete content on the content page, - Host the website of the municipality for the contract period and ensure an uptime of 99.999% for the duration of the contract, - Ensure skills transfer to municipal relevant personnel, - Provide support and assistance in maintaining updates to the site framework as well as assistance with the uploading of documents such as Tenders and Quotations when and should the need arise, - Backups - data backups weekly, code backups as needed, - Security - manage all aspects of website security to protect confidential member information and existing content (data, project information, contact details, etc.), and prevent hacks, defacing, etc, - Network uptime - The service provider must guarantee network uptime to be 100%. This guarantee assures that all major routing devices within are reachable from the global internet 100% of the time. Minimize and avoid downtime, - Software maintenance - It is important to manage a dedicated server to keep the software up to date to address security and performance issues. Minimize and avoid downtime, - The service provider is responsible for stopping malicious attacks on the website, - The service provider is responsible for all cPanel issues and restoring website functionality, - The service provider must detail the response time of the calls logged to them either by email, telephone call, or any other agreed channels of communication, - The service provider must have a dedicated help desk contact centre with a response time guarantee, - Data Backup and Retention - Weekly complete or successful backup to ensure the integrity and safety of the website. The service provider must have a restore strategy should the disaster strikes. Backup costs should be inclusive of the total amount, - Website security - Two plugins should be installed on the website to combat spam, namely stop spammers spam control and akismet. MoD Security should be installed to take care of brute force attacks efficiently and silently. Website code and plugins should be updated weekly to make sure the site is always protected from SQL injection attacks and the like, - Monthly offsite support for the 12 months, - Telephone and remote support, - Monthly summary report of change, findings, and recommendations, - Security maintenance of website, Spam comment blocking, and intrusion prevention. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 108134200

Country: South Africa

Source: ONLINE TENDERS

22 jul
Re-Advertisement: Information are hereby requested for the following: Provision of New Prefabricated Smart Building System that utilizes Hybrid Glass-Fiber Reinforced Thermoplastic Composite Panels or similar material. Based on new requirements to identify viable existing products, specifically composite panel prefab smart building systems, the UN Office of Supply Chain Management seeks solutions that are rapid deployable, have a long lifespan, and improve power demand management. This comprehensive questionnaire is designed to gather detailed information from manufacturers and suppliers regarding the suitability and availability of customizable structures that utilize Hybrid Glass-Fiber Reinforced Thermoplastic Composite panels for UN military operations or similar material. The focus is on sustainability, modular building systems, customization, durability, aesthetics, security, and environmental considerations. Your input will be invaluable in assessing market capabilities and aligning them with the United Nations operational needs for durable, energy-efficient structures suitable for deployment in various global environments. The qualifications of interest for this product are the following: 1. Rapid Deployment: The product is designed for quick erection and commissioning with minimal use of heavy engineering equipment and specialized trades; 2. Modular System: It drastically reduces construction time and labour costs, shipping flat in ISO Standard 20 ft. Sea Containers for efficient logistics; 3. Customization: Features customizable options for size, rigidity, texture, colour, and inserts, adaptable to specific needs, utility, and environmental conditions; 4. Energy Efficiency: Enhances power demand management and provides superior R-value thermal performance, optimized acoustics, and resistance to energy loss; 5. Environmental Considerations: Sustainable, eco-friendly, 100% recyclable, and significantly reduces greenhouse gas emissions and carbon footprint. It is non-toxic and resistant to moulds, bacteria, and chemical corrosion; 6. Durability and Maintenance: Designed for a long lifespan of up to twenty years with minimal preventative maintenance, resistant to moisture, air infiltration, and pests like termites and rodents; 7. Compliance and Certifications: Meets international standards for military use and adheres to regulatory codes and environmental certifications. Country: Global. Please confirm the closing time as it was not published. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 107857019

Country: South Africa

Source: ONLINE TENDERS

16 jul
Quotations are hereby invited for the installation of a generator monitoring system at the Durban University of Technology (DUT) Durban and Midland Campus. The installation scope of works for the backup generator 4G Communication Gateway Module monitoring system shall involve, but not limited to the following: • The service provider shall conduct a pre-Installation assessment, which shall involve site visit to assess the location and requirements for installing the backup generator monitoring system. • Reviewal of the electrical schematics and specifications of the existing backup generator system. • Develop a detailed plan for the installation, including equipment placement, wiring diagrams, and network connectivity. • Prepare necessary components such as sensors, control panels, wiring, communication devices, and monitoring software. • The service provider shall ensure that all equipment meets relevant standards and specifications. • Install and mount control panels, sensors, and other hardware components in suitable locations. • Wire the components according to the wiring diagrams and manufacturer"s instructions. • Ensure proper grounding and electrical safety measures are implemented. • Configure network connections for data transmission and remote monitoring. • Set up communication protocols and security measures to protect data integrity. • Install monitoring software on designated computers or servers. • Integrate the 4G communication gateway module with the backup generator system and other monitoring equipment. • Configure network settings, including APN, IP addresses, and communication protocols, for seamless operation. • Conduct thorough testing to ensure connectivity and functionality. Test communication between hardware components and the monitoring software. • Integrate the backup generator monitoring system with any existing monitoring or management systems. • Conduct thorough testing of the entire system to ensure proper functionality. • Verify sensor accuracy and data reporting capabilities. • Provide training to facility personnel on how to operate the monitoring system. • Create user manuals and documentation outlining system operation, troubleshooting procedures, and maintenance requirements. • Conduct a final inspection of the installed system to ensure compliance with specifications and regulations. • Hand over the backup generator monitoring system to the DUT maintenance personnel. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 107548681

Country: South Africa

Source: ONLINE TENDERS

28 jun
Quotations are hereby invited for the following: Implementation of a comprehensive "Board Pack System". This system is expected to streamline the board meeting preparations, enhance document management: Virtual access (cloud based): 15 Users + two administrators (DigiTech): The Board pack system should be able to: • Uploading of board meeting packs (Document Management - collect, upload, store, track, and share all electronic documents in a centralized location for quick access), • Store and archive old board meeting packs (Secure data storage – the ability to securely store data to prevent data loss or breaches), • Resource centre for the Board, • Meeting set up on a group calendar (Meeting Management – ability to coordinate schedules and organize board meetings), • View, mark up, and annotate material (Meeting and document notes), • Share comments and inputs (Collaboration tools - Provide a channel for team members to share media files, communicate and work together), • Safety of information imperative, • Provide for digital signatures (Voting and resolutions), • Secure messaging, • Board presentations, • Offline and online accessibility to prevent the download of documents, • Minutes management - the ability to record and distribute meeting dates, times, attendees, and agendas, • Approval process control - the ability to manage the process of evaluating documents or requests submitted for approval, • Access controls/permissions - the ability to define levels of authorization for access to specific files or systems, • Calendar management - the ability to create schedules, organize meetings, prioritize tasks, track deadlines, and share these details with others, • An audit trail – the ability to provide sequential records detailing the history and events related to a specific transaction, • Encryption (data at rest and on transit) - the solution must utilize strong encryption protocols to ensure the security and confidentiality of the documents. Compatibility: • IOS, Android, Windows and Mac. Support: 24 hour support to be provided. (EN) add to Favorites
Customer: ONLINE TENDERS

Number: 106703996

Country: South Africa

Source: ONLINE TENDERS