Discover Innovative ESET Technology
"ESET’s business software is simple, well designed and easy to use, and can be recommended for large or small networks."
AV-Comparatives
Online threats are growing rapidly all around the world. For complete peace of mind, ESET delivers industry-leading technology to keep your systems safe from Internet threats, malware, phishing, viruses, spam, and much more.
Proposal
6/6/2012 – version 1.1
Mr. Mark Anthony Olave
Systems Administrator - IT
SM MARKETING CONVERGENCE, INC.
4th Floor One-EcomCenter, Harbor Drive
Mall of Asia Complex CBP-1A, Pasay City 1300
Email Address: mio@mci.com.ph
Tel.: (02) 858-3500 ext. 573
Dear Sir Mark,
Thank you for your interest in our ESET products. We are pleased to submit for your consideration and approval, our proposal for your ESET Antivirus requirements.
Now even better, smarter detection.
IT Benefits
Endpoint Protection
Protect company networks with proven Antivirus, antispyware and advanced device control functionality. Rely on a solution that minimizes system slowdowns and comes with a broad range of customization options.
Remote Administration
Oversee security across the entire network from a single location. Enlist a range of customization and reporting features to tweak the system security as you need.
Network Speed and Stability
Load-balance execution of tasks to prevent overloading network connections and antivirus storm on VM hosts. Choose from improved update options – update mirror server via HTTPS connection or revert to older virus database and modules.
Reports, Logs & Notifications
Monitor network security status and server load statistics even from outside of your company. Perform data parsing via compatible data formats or designate critical threshold for event notification, set up notifications priority and much more.
Business Benefits
Endpoint Protection
Keep company endpoints free of malware with ESET’s cloud-powered scanning technology. Utilize the device control functionality to keep unauthorized USBs and CDs off company machines.
Employee Effectiveness
Keep company computers running smoothly and extend the lifetime of hardware thanks low system demands. Keep out distractions like pop-ups during presentations or slideshows.
Administrator Effectiveness
Manage all past, present and future ESET security solutions from a single location, putting admins in perfect control of network security.
Reporting
Keep admins abreast of network security from outside the company. Take advantage of advanced monitoring and reporting tools for complete oversight and to take immediate action.
Update Management
All ESET solutions are built to preserve the network speed and stability and smooth and reliable operation and come with a range of tools and customization options to ensure a consistent level of security.
|ESET ENDPOINT ANTIVIRUS |
|Antivirus and antispyware protection for companies of all sizes utilizing advanced technologies and functionalities such as cloud-powered scanning, device |
|control and remote manageability of clients. |
| |One (1) Year Subscription |
|No. of Nodes |Unit Price |Total Investment |
| |Php |PHP |
| |
| |
|Standard Technical Support (within Metro Manila Only) |
|One time installation for 10 nodes. |
|Unlimited Telephone Technical Support from Customer Support Group with priority response time during standard business hours. |
|Support is available 8 hours a day from 8:30 AM to 5:30 PM five (5) days a week Monday to Friday within subscription. |
|One-time training for two (2) administrators. |
|Bi-monthly ESET Health Check Call/Letter |
| |
| |
|Note: For outside Metro Manila installation, Valueline’s staff’s transportation, board and lodging per diem expenses will be to the account of the client. |
TERMS AND CONDITIONS:
Payment : CASH/Dated Check
Delivery : Allow 3-5 days upon receipt of P.O/Faxed Conforme & deposited payment.
Prices : Valid 15 days from the date of the quotation. : Prices are subject to change without prior notice thereafter. Cancellation Charges: 25% of PO Orders below Php 10,000.00 and 40% of PO Orders above PhP 10,001.00. We hope that this proposal merits your approval as we look forward to a mutual beneficial relationship. For further questions and clarification please feel free to call our office at Tel. No.: 925-2177; 925-7623; 925-2938. Fax No.: 925-2174.
Sincerely yours, CONFORME:
[pic] Juan Dela Cruz _________________________________________
Business Development Officer Date/ Signature over Printed Name
[pic] [pic][pic][pic][pic]
-----------------------
2nd Floor J&L Building
No. 23 Matalino Street, Diliman,
Quezon City, Philippines 1101
Phone: (+632) 925-7623 / 2223
Hotline: (+632) 925-2177
Fax: (+632) 925-2174
Website: www.valueline.com.ph
Email: sales@valueline.com.ph
----------------------- Valueline Systems & Solutions Corporation 2nd Floor J & L Bldg., No. 23 Matalino St., Central District Diliman, Quezon City, Philippines
[pic]
[pic]
[pic]
You May Also Find These Documents Helpful
-
| * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…
- 409 Words
- 2 Pages
Satisfactory Essays -
For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…
- 348 Words
- 2 Pages
Satisfactory Essays -
4. As the software recommender for the company I would have to recommend Nmap to the Senior Administrator. Features of Nmap is that it is useful for performing tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw…
- 216 Words
- 1 Page
Satisfactory Essays -
Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…
- 439 Words
- 2 Pages
Satisfactory Essays -
upgrade its IT infrastructure to ensure it is capable of handling the requirements of the…
- 4187 Words
- 22 Pages
Powerful Essays -
One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…
- 444 Words
- 2 Pages
Satisfactory Essays -
In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…
- 386 Words
- 2 Pages
Satisfactory Essays -
Here are some of the tools that as owner should be in place, one is Access control it consist of all the policies a company uses to prevent improper access to systems by unauthorized insiders and outsiders. To gain access a user must be authorized and authenticated. Another tool is a firewalls they prevent unauthorized user from accessing private networks. There are a number of firewall screening technologies, and applications, including static packet filtering, stateful inspections, Network Address Translations and application proxy filtering they are often used in combination to provide firewall protection. Others are antivirus and antispyware software, which are designed to check computer systems and drives for the presence of computer viruses and eliminates the virus…
- 667 Words
- 2 Pages
Good Essays -
1. Use a table to identify the software products sited above that fall within the following categories of software:…
- 636 Words
- 3 Pages
Good Essays -
In the previous section of this service request system solution proposal, we cited Riordan Manufacturing current position in the global plastics manufacturing market as an existing world leader, that has every intent to maintain that namesake by continuing to develop its technology both o the production line as well as behind the scenes where it supports those individuals that work hard every day to keep Riordan Manufacturing in the upper echelon, elite class of global business that are providing for the world’s needs in mass quantities on a daily basis. Riordan Manufacturing started out as a small, licensing Dr Riodan’s patents, but it has grown into a strong corporation that employs over 500 professionals in its offices located in Albany, Georgia, Pontiac Michigan, San Jose, California and it’s international office located in Hangzhou, China. The company’s growth over the last two decades and its resulting assets are considerable. For example, the companies assets are valued at over $1 billion.…
- 1321 Words
- 6 Pages
Best Essays -
I would change the administrative passwords on all systems routinely, implement a firewall program with remote access control which will not allow, hackers entry to your company’s system.…
- 313 Words
- 2 Pages
Satisfactory Essays -
Some employees are using the company networks to access the Internet. Some expect the company to provide this type of access. This presents a number of challenges to company network management. Identify three challenges and suggest strategies for a company to address these challenges.…
- 697 Words
- 3 Pages
Satisfactory Essays -
• Make sure wiring closets, data centers, and computer rooms are secure. Do no allow anyone access without proper ID.…
- 447 Words
- 2 Pages
Satisfactory Essays -
We must build upon the knowledge we obtained from the table above to create the Business Continuity Plan (BCP) outline.…
- 316 Words
- 2 Pages
Satisfactory Essays -
- Free antivirus software (for example Avast) are a big threat for traditional IT security companies.…
- 872 Words
- 3 Pages
Good Essays