Top-Rated Free Essay
Preview

Proposal

Powerful Essays
739 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Proposal
ESET ENDPOINT ANTIVIRUS

Discover Innovative ESET Technology
"ESET’s business software is simple, well designed and easy to use, and can be recommended for large or small networks."
AV-Comparatives

Online threats are growing rapidly all around the world. For complete peace of mind, ESET delivers industry-leading technology to keep your systems safe from Internet threats, malware, phishing, viruses, spam, and much more.

Proposal

6/6/2012 – version 1.1
Mr. Mark Anthony Olave
Systems Administrator - IT
SM MARKETING CONVERGENCE, INC.
4th Floor One-EcomCenter, Harbor Drive
Mall of Asia Complex CBP-1A, Pasay City 1300
Email Address: mio@mci.com.ph
Tel.: (02) 858-3500 ext. 573

Dear Sir Mark,

Thank you for your interest in our ESET products. We are pleased to submit for your consideration and approval, our proposal for your ESET Antivirus requirements.

Now even better, smarter detection.

IT Benefits

Endpoint Protection

Protect company networks with proven Antivirus, antispyware and advanced device control functionality. Rely on a solution that minimizes system slowdowns and comes with a broad range of customization options.
Remote Administration

Oversee security across the entire network from a single location. Enlist a range of customization and reporting features to tweak the system security as you need.
Network Speed and Stability
Load-balance execution of tasks to prevent overloading network connections and antivirus storm on VM hosts. Choose from improved update options – update mirror server via HTTPS connection or revert to older virus database and modules.

Reports, Logs & Notifications

Monitor network security status and server load statistics even from outside of your company. Perform data parsing via compatible data formats or designate critical threshold for event notification, set up notifications priority and much more.

Business Benefits

Endpoint Protection

Keep company endpoints free of malware with ESET’s cloud-powered scanning technology. Utilize the device control functionality to keep unauthorized USBs and CDs off company machines.

Employee Effectiveness

Keep company computers running smoothly and extend the lifetime of hardware thanks low system demands. Keep out distractions like pop-ups during presentations or slideshows.

Administrator Effectiveness

Manage all past, present and future ESET security solutions from a single location, putting admins in perfect control of network security.

Reporting

Keep admins abreast of network security from outside the company. Take advantage of advanced monitoring and reporting tools for complete oversight and to take immediate action.

Update Management

All ESET solutions are built to preserve the network speed and stability and smooth and reliable operation and come with a range of tools and customization options to ensure a consistent level of security.

|ESET ENDPOINT ANTIVIRUS |
|Antivirus and antispyware protection for companies of all sizes utilizing advanced technologies and functionalities such as cloud-powered scanning, device |
|control and remote manageability of clients. |
| |One (1) Year Subscription |
|No. of Nodes |Unit Price |Total Investment |
| |Php |PHP |
| |
| |
|Standard Technical Support (within Metro Manila Only) |
|One time installation for 10 nodes. |
|Unlimited Telephone Technical Support from Customer Support Group with priority response time during standard business hours. |
|Support is available 8 hours a day from 8:30 AM to 5:30 PM five (5) days a week Monday to Friday within subscription. |
|One-time training for two (2) administrators. |
|Bi-monthly ESET Health Check Call/Letter |
| |
| |
|Note: For outside Metro Manila installation, Valueline’s staff’s transportation, board and lodging per diem expenses will be to the account of the client. |

TERMS AND CONDITIONS:

Payment : CASH/Dated Check
Delivery : Allow 3-5 days upon receipt of P.O/Faxed Conforme & deposited payment.
Prices : Valid 15 days from the date of the quotation. : Prices are subject to change without prior notice thereafter. Cancellation Charges: 25% of PO Orders below Php 10,000.00 and 40% of PO Orders above PhP 10,001.00. We hope that this proposal merits your approval as we look forward to a mutual beneficial relationship. For further questions and clarification please feel free to call our office at Tel. No.: 925-2177; 925-7623; 925-2938. Fax No.: 925-2174.

Sincerely yours, CONFORME:

[pic] Juan Dela Cruz _________________________________________
Business Development Officer Date/ Signature over Printed Name

[pic] [pic][pic][pic][pic]
-----------------------
2nd Floor J&L Building
No. 23 Matalino Street, Diliman,
Quezon City, Philippines 1101

Phone: (+632) 925-7623 / 2223
Hotline: (+632) 925-2177
Fax: (+632) 925-2174
Website: www.valueline.com.ph
Email: sales@valueline.com.ph

----------------------- Valueline Systems & Solutions Corporation 2nd Floor J & L Bldg., No. 23 Matalino St., Central District Diliman, Quezon City, Philippines

[pic]

[pic]

[pic]

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    Here are some of the tools that as owner should be in place, one is Access control it consist of all the policies a company uses to prevent improper access to systems by unauthorized insiders and outsiders. To gain access a user must be authorized and authenticated. Another tool is a firewalls they prevent unauthorized user from accessing private networks. There are a number of firewall screening technologies, and applications, including static packet filtering, stateful inspections, Network Address Translations and application proxy filtering they are often used in combination to provide firewall protection. Others are antivirus and antispyware software, which are designed to check computer systems and drives for the presence of computer viruses and eliminates the virus…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. Use a table to identify the software products sited above that fall within the following categories of software:…

    • 636 Words
    • 3 Pages
    Good Essays
  • Best Essays

    In the previous section of this service request system solution proposal, we cited Riordan Manufacturing current position in the global plastics manufacturing market as an existing world leader, that has every intent to maintain that namesake by continuing to develop its technology both o the production line as well as behind the scenes where it supports those individuals that work hard every day to keep Riordan Manufacturing in the upper echelon, elite class of global business that are providing for the world’s needs in mass quantities on a daily basis. Riordan Manufacturing started out as a small, licensing Dr Riodan’s patents, but it has grown into a strong corporation that employs over 500 professionals in its offices located in Albany, Georgia, Pontiac Michigan, San Jose, California and it’s international office located in Hangzhou, China. The company’s growth over the last two decades and its resulting assets are considerable. For example, the companies assets are valued at over $1 billion.…

    • 1321 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    I would change the administrative passwords on all systems routinely, implement a firewall program with remote access control which will not allow, hackers entry to your company’s system.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Some employees are using the company networks to access the Internet. Some expect the company to provide this type of access. This presents a number of challenges to company network management. Identify three challenges and suggest strategies for a company to address these challenges.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Make sure wiring closets, data centers, and computer rooms are secure. Do no allow anyone access without proper ID.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    With the variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or business computer, it is very important to get some type of security protection. There are a lot of options out there in terms of what brand and what level of security an individual is looking for. The best option to protect a computer system from various threats is an all-in-one computer security system, such as Norton 360 and McAfee Total Protection. One problem an individual needs to worry about is identity theft. Identity theft problems can range from a stealing a person’s name, email address, physical address, credit card information, account numbers, documents, and even passwords. Other threats or annoyances to worry about are spyware, adware, pop-ups, spam, viruses, and worms. Keeping the computer system and the data contained protected within the computer is important.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4 Assignment 3

    • 316 Words
    • 2 Pages

    We must build upon the knowledge we obtained from the table above to create the Business Continuity Plan (BCP) outline.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    - Free antivirus software (for example Avast) are a big threat for traditional IT security companies.…

    • 872 Words
    • 3 Pages
    Good Essays