Loading...
Alliant Cybersecurity, LLCMarlcftplaw-dty Company: Alliant Cybersecurity, LLC Email: info@alliantcybersecurity.com Contact: Rizwan Virani Address: 3009 Post Oak Blvd. Suite 1500 Houston, TX 77056 Phone: N/A Website: www.alliantcybersecuritV.com Submission Date: Mar 1, 2024 3:35 PM Marketplace.city Marketplace.city General Andrew Watkins, President and COO 500 West Madison, Chicago, IL 60661 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services RESPONSE DEADLINE: March 1, 2024 at 7:00 pm Report Generated: Monday, March 4, 2024 Alliant Cybersecurity, LLC Response CONTACT INFORMATION RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services ADDENDA CONFIRMATION Addendum #1 Confirmed Mar 1, 2024 3:18 PM by Renojo Burns QUESTIONNAIRE 1. Solution Overview of your offerings and solution PLEASE PROVIDE A 2 -PAGE SOLUTION NARRATIVE DESCRIBING YOUR PROPOSED SOLUTION AND HOW IT FITS THE CITY OF LA QUINTA'S NEEDS.* Please be sure to address the following: (a) Number of years in business (b) Taxpayer identification number (c) Number of years performing Managed IT Services (d) Resumes of the Project Manager and key personnel who will be responsible for performance if any agreement results from this RFP (e) Firm ownership and if incorporated, list the state in which the firm is incorporated and the date of incorporation (f) If the firm is a subsidiary of a parent company, identify the parent company Alliant_Cybersecurity_ _Organization_Profile_&_Proposed_Solution.pdf 2. Cybersecurity PLEASE CONFIRM YOU ARE ABLE TO PROVIDE CYBERSECURITY/NETWORK SECURITY SERVICES, INCLUDING ANTI-VIRUS, SECURITY UPDATES AND PATCH MANAGEMENT.* Yes RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 2 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services PLEASE DESCRIBE YOUR INCIDENT RESPONSE FOR A SECURITY EVENT.* Maximum response length: 300 characters An L1 analyst triages an incident with other analysts, and if they need assistance, it's passed to an L2 analyst who performs activities like analysis of logs, secondary research, and IOC. If the issue still persists, it's passed to an L3 analyst for resolution with support from the L2 team. HAVE ANY OF YOUR CLIENTS EXPERIENCED A RANSOMWARE ATTACK IN THE LAST 12 MONTHS? IF SO, HOW DID YOUR COMPANY RESPOND?* Maximum response length: 300 characters None of our clients have experienced a ransomware attack in the last 12 months. However, we continue to take proactive measures to ensure the safety and security of our clients' data. At Alliant, we prioritize cybersecurity and have implemented robust protocols and technologies to prevent attacks. ARE YOU ABLE TO ADMINISTER AND MANAGE ON-GOING TRAINING PROGRAMS AND REGULAR PHISH AND RELATED TESTS FOR ALL LA QUINTA EMPLOYEES? Yes PLEASE LIST ANY CYBERSECURITY CERTIFICATIONS THAT YOUR COMPANY HAS ACHIEVED.* Maximum response length: 300 characters • Certified Information Systems Security Professional (CISSP) • Certified Information Security Manager (CISM) • Certified Information Systems Auditor (CISA) • Certified in Risk and Information Systems Control (CRISC) • Offensive Security Certified Professional (OSCP) • HITRUST Certified CSF Practitioner RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 3 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services PLEASE DESCRIBE YOUR APPROACH TO REAL-TIME PERIMETER MONITORING.* Please specify the ability to access real-time security information and log data, as well as stored logs. Maximum response length: 300 characters Securonix SIEM uses advanced machine learning to monitor security events across an IT environment, providing real-time alerts and automated incident response. It detects insider threats, compromised accounts, and other security incidents, and offers detailed reporting and compliance capabilities. DO YOU MAINTAIN 24/7/365 HEALTH MONITORING AND AVAILABILITY OF THE DELIVERY PLATFORM?* Maximum response length: 300 characters Alliant provides 24/7/365 monitoring services to detect and address potential security breaches in real-time, preventing significant harm to the organization. Our solution also has High Availability so that we don't have any downtime for our services. DO YOU PROVIDE ANNUAL SECURITY ARCHITECTURE REVIEW AND VULNERABILITY ASSESSMENTS?* Maximum response length: 300 characters Yes, we provide annual security architecture review and recommend monthly vulnerability assessments. However, we are always flexible to do as many assessments as our clients request. 3. Network Reliability PLEASE CONFIRM YOU OFFER NETWORK MANAGEMENT AND INFRASTRUCTURE SUPPORT SERVICES.* Yes CAN YOU PROVIDE INSTALLATION, CONFIGURATION, ADMINISTRATION, AND MAINTENANCE OF ALL NETWORK EQUIPMENT INCLUDING SWITCHES, FIREWALLS, ROUTERS, CABLING, WIRELESS ACCESS POINTS, AND OTHER DEVICES?* Yes RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 4 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services PLEASE LIST THE STEPS TAKEN TO REPAIR AN INTERNET OUTAGE, INCLUDING COMMUNICATION AND ESCALATION PROTOCOLS. HOW LONG DOES IT USUALLY TAKE TO RESTORE INTERNET, AND HOW OFTEN DO CLIENTS HAVE OUTAGES?* Maximum response length: 300 characters We handle Internet outages swiftly with clear communication & escalation. Restoration time varies, but our efficient protocols minimize downtime. Client outages are rare, and we prioritize quick resolutions. ARE YOU ABLE TO OFFER 24/7/365 SYSTEM MONITORING AND EMAIL MONITORING?* Yes PLEASE CONFIRM YOU ARE ABLE TO CONDUCT A NIGHTLY BACKUP PLAN FOR CRITICAL SERVERS, INCLUDING A REGULARLY -TESTED RECOVERY PROCESS* Yes CAN YOU PROVIDE SUPPORT SERVICES FOR VOIP /ANALOG TELEPHONE MANAGEMENT? Please list any specific experience with Mitel. Maximum response length: 300 characters Yes. We have extensive broad experience both with VoIP / analog system implementation and management as well as specifically supporting Mitel for an installed base of over 1000 users. 4. Device/Hardware Management CAN YOU PROVIDE ALL MAINTENANCE, MONITORING, AND SUPPORT FOR HARDWARE (SERVER, DESKTOP, LAPTOP, MOBILE), AND INVENTORY CONTROL AND MANAGEMENT (HARDWARE AND SOFTWARE)?* Yes IF NO, PLEASE ELABORATE. Maximum response length: 300 characters RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 5 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services No response submitted PLEASE CONFIRM THAT YOUR SERVICES COVER PROCUREMENT MANAGEMENT (SELECTION OF COMMERCIALLY RATED EQUIPMENT, ORDER PLACEMENT, ORDER TRACKING, SHIPPING, EQUIPMENT RETURNS, AND SOURCING AND ORDERING OF REPLACEMENT PARTS).* Yes IF NO, PLEASE ELABORATE. Maximum response length: 300 characters No response submitted WHAT IS YOUR PROCESS FOR KEEPING TRACK OF ALL LA QUINTA IT INVENTORY? Maximum response length: 300 characters We utilize best -practice -automated asset management tools alongside ITIL principles and automation to oversee inventory. This approach ensures a streamlined, efficient management process, reflecting a commitment to best practices and operational excellence in asset oversight. 5. Customer Service/Help Desk Support PLEASE DESCRIBE THE CUSTOMER SERVICE AND HELP DESK SUPPORT YOUR SERVICES PROVIDE. (For example, 24/7/365 support) Maximum response length: 300 characters Our firm offers comprehensive help desk services, operating 24/7/365 to ensure uninterrupted support. We provide on-site and remote services, including after-hours assistance. Our team is dedicated to resolving issues efficiently, ensuring client satisfaction through our proactive approach. PLEASE DESCRIBE THE LOCATION OF YOUR OFFICE HEADQUARTERS. * RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 6 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services Maximum response length: 300 characters Our headquarters is centrally located in Houston, TX, where we house our Network and Security Operations Centers. We operate a 247 model and have offices in Irvine, CA, and New York City as well. DO YOU HAVE A LOCAL OFFICE IN SOUTHERN CALIFORNIA WITHIN A 2 -HOUR DRIVE FROM LA QUINTA? (NOTE: YOUR PROPOSAL MAY BE DISQUALIFIED IF YOU ARE UNABLE TO PROVIDE ONSITE STAFFING FOR THE CITY, OR DO NOT HAVE AN OFFICE IN SOUTHERN CALIFORNIA)* Please specify where your local office is located. Maximum response length: 300 characters Yes, we have a local office in Irvine, California, within 2 hours from the City of La Quinta. DURING BUSINESS HOURS, HOW LONG WOULD IT TAKE SOMEONE TO ARRIVE ON-SITE IN THE EVENT OF AN IT EMERGENCY? 1-2 hours DURING AFTER HOURS, HOW LONG WOULD IT TAKE SOMEONE TO ARRIVE ON-SITE IN THE EVENT OF AN ITEM ERG ENCY? 1-2 hours ON-SITE STAFFING AVAILABILITY? (NOTE: YOUR PROPOSAL MAY BE DISQUALIFIED IF YOU ARE UNABLE TO PROVIDE ONSITE STAFFING FOR THE CITY) Is your firm able to provide a minimum of 2 on-site desktop technicians, with one of the two technicians being proficient in Networking? Yes, we will provide both on-site and remote technicians proficient in desktops, systems, and networking within 2 hours' notice. WILL THE ON-SITE TECHNICIANS BE ABLE TO WORK CONCURRENTLY WITH CITY STAFF'S WORK SCHEDULE, INCLUDING AS -NEEDED ADJUSTMENTS TO WORK LATER HOURS FOR EVENTS SUCH AS CITY COUNCIL, COMMISSION HEARINGS, AND SPECIAL EVENTS AT CITY HALL AND OTHER LOCATIONS?* RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 7 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services (Monday through Friday 7:30am to 5:30pm) (Tuesdays may require working as late as 10pm occasionally with notice in advance) ONE ON-SITE TECHNICIAN MUST ALWAYS BE PRESENT Yes PLEASE DESCRIBE THE GUARANTEED AND AVERAGE RESPONSE TIME FOR REQUESTS DURING BUSINESS HOURS AND AFTER HOURS. Maximum response length: 300 characters Guaranteed Response Time: Critical Issues: 2 hours High Priority: 4 hours Medium Priority: 8 hours Low Priority: 48 hours Average Response Time: Critical Issues: 15 minutes High Priority: 30 minutes Medium Priority: 1 hour Low Priority: 4 hours PLEASE UPLOAD RESPONSE TIME AND SUPPORT SLAS. Response_Time_and_SLAs.pdf WHAT IS THE AVAILABILITY OF KEY STAFF DURING NORMAL BUSINESS HOURS? Maximum response length: 300 characters RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 8 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services Key staff are available during normal business hours, including on-site and help desk technicians, network engineers, systems administrators, cybersecurity specialists, project managers, relationship managers, and leadership personnel. ARE THERE ANY PENALTIES FOR YOUR COMPANY IF GUARANTEED RESPONSE TIMES AREN'T MET?* Maximum response length: 300 characters We are open to negotiation based on your requirements. DESCRIBE YOUR WORK ORDER/TICKET SYSTEM. Maximum response length: 300 characters Our industry -standard service management system is built on ITIL principles. It streamlines processes from incident to resolution, prioritizing efficiency and adherence to best practices for optimal service delivery. The City can access a client portal to create and manage service requests. WHAT ARE THE STEPS USED TO ESCALATE CHRONIC OR CHALLENGING PROBLEMS?* Maximum response length: 300 characters Our ITIL-aligned escalation process starts with issue identification, impact assessment, and temporary mitigation, if required. Documenting details, stakeholder communication, root cause investigation, permanent solutions, documentation updates, and ongoing monitoring ensure efficacy. 6. Organizational Governance THE SELECTED LA QUINTA MANAGED IT SERVICES PARTNER IS EXPECTED TO CONTRIBUTE TO ORGANIZATIONAL GOVERNANCE AND SUPPORT AND ADHERE TO CITY RULES AND REGULATIONS. PLEASE CONFIRM YOU CAN PROVIDE THESE SERVICES.* Yes PLEASE SELECT WHETHER YOU CAN PROVIDE THE FOLLOWING. User onboarding/offboarding RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 9 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services Active Directory Management System, network, and application documentation Regular reporting on purchases, assets, current activities and issues, and project status reports Provide customized IT policies and provide best practices and recommendations 7. Management of Existing Enterprise Applications DESCRIBE HOW MAJOR SOFTWARE UPGRADES WILL BE APPLIED. ARE THERE EXTRA FEES FOR UPGRADES? IF SO, PLEASE DESCRIBE.* Maximum response length: 300 characters Standard OS and common third -party applications, such as Office 365, Windows, and similar, are patched on a rolling schedule within our service level agreements. More specialized software will be patched and tested in coordination with key city personnel, with available rollback, if necessary. PLEASE DESCRIBE YOUR EXPERIENCE ADMINISTERING MICROSOFT 365 FOR CLIENTS. PLEASE DESCRIBE ANY MICROSOFT 365 CERTIFICATIONS YOU HOLD. * Maximum response length: 300 characters Our expert team has extensive experience managing Microsoft 365 for a diverse range of clients, including enterprise, nonprofits, and public organizations. We actively align clients with best practices such as those set by Microsoft and NIST to ensure optimal reliability and security. PLEASE DESCRIBE YOUR FAMILIARITY AND EXPERIENCE WITH OTHER EXISTING LA QUINTA TECHNOLOGY, AS LISTED IN THE OPPORTUNITY OVERVIEW ABOVE. * Please be sure to highlight technologies you are unfamiliar with. Maximum response length: 500 characters Our team has extensive experience with Adobe, Autodesk, Bluebeam, Druva, Genetec, IRIS OCR, Nessus, OpenVPN, Parallels, ScanSnap, Microsoft Suite, and Zoom. We're confident in learning and supporting other applications as they're akin to what we've RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 10 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services managed previously. We have longstanding relationships with many hardware providers, including APC, Cisco, Dell, Nimble, ANAP, Sonicwall, Ubiquiti, and many others. 8. Strategic Adoption of New Technologies PLEASE CONFIRM YOU CAN ASSIST THE CITY IN ADOPTING AND IMPLEMENTING NEW TECHNOLOGIES.* Yes WHAT IS YOUR PROCESS AND CRITERIA FOR EVALUATING NEW SOFTWARE AND HARDWARE?* Maximum response length: 300 characters Our Solution Engineering team exists to assess new software and hardware, based first and foremost on compatibility with your long- term strategic and short-term tactical needs, then on future scalability, security, user-friendliness, support, cost-effectiveness, and vendor reputation. PLEASE PROVIDE SPECIFIC EXAMPLES OF HOW YOU HAVE WORKED WITH CUSTOMERS THAT BEGAN WITH SIGNIFICANT TECHNOLOGY LIMITATIONS AND HELPED TO SUCCESSFULLY TRANSFORM THEM INTO ORGANIZATIONS WITH WELL PLANNED AND EXECUTED TECHNOLOGY STRATEGIES? WHAT WERE THE CRITICAL SUCCESS FACTORS IN THIS TRANSFORMATION?* Maximum response length: 500 characters We have worked with clients that have had nearly no infrastructure, severely outdated infrastructure with significant technology debt, and a massive, sophisticated infrastructure stack. Client A was an organization with no technology infrastructure. We designed and implemented a 24 -month tactical roadmap and 5 -year strategic plan. We implemented a robust hybrid cloud infrastructure with VMware, Nimble storage, Microsoft Azure, Windows Server, and the Microsoft 365 product suite as the backbone. 9. Prior Experience and Case Studies HOW MANY TOTAL STATE AND LOCAL GOVERNMENTS USE YOUR COMPANY FOR MANAGED IT SERVICES?* 1-10 RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 11 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services ARE THE MAJORITY OF YOUR CLIENTS IN THE PUBLIC SECTOR OR THE PRIVATE SECTOR? PLEASE PROVIDE AN ESTIMATED PERCENTAGE BREAKDOWN IF POSSIBLE. * Maximum response length: 100 characters The majority of our client base is private sector, with 5% as public entities. PLEASE PROVIDE REFERENCES FOR THE CITY OF LA QUINTA* Please download the below document, complete, and upload. • Marketplace.city Reference .. Al Iiant_Cybersecurity_Marketplace. city_Reference_Document.xlsx 10. Pricing and Model PLEASE PROVIDE A PRICING ESTIMATE TO THE CITY BASED ON THE INFORMATION PROVIDED IN THIS RFP.* Please download the below document, complete, and upload. Please be sure to include a detailed fee schedule for the services requested by this RFP and any complementary services offered along with corresponding prices. The initial contract is anticipated for a period of 5 years commencing on or before July 1, 2024, with the potential for an option to renew it for two additional years. Please include renewal costs as well. • Basic Pricing Template .xlsx Alliant_Cybersecurity_ _Pricing= _DM6856_969_90.xlsx PLEASE DESCRIBE THE KEY INFORMATION YOU WILL NEED FROM THE CITY OF LA QUINTA IN ORDER TO PROVIDE THEM WITH A MORE ACCURATE PRICING ESTIMATE.* Maximum response length: 300 characters • Detailed asset list. • Staff count by site. • Average monthly ticket counts by type and severity. RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 12 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services • Average monthly business -hours onsite time. • Average monthly after-hours onsite time. • Average monthly after-hours emergency issues. • Desired service level agreements. • Remote staff vs onsite. PLEASE UPLOAD ANY STANDARD PRICING DOCUMENTS YOU WISH TO SHARE. No response submitted 11. Implementation PLEASE DESCRIBE YOUR IMPLEMENTATION METHODOLOGY, INCLUDING AVERAGE IMPLEMENTATION TIME.* Maximum response length: 500 characters An introductory meeting will address requirements and expectations. We assess your needs, create a tailored service proposal, and finalize the contract. During the onboarding process, key team members are introduced as well as setting the communication protocols. Once an implementation plan is developed with clear timelines, we will maintain regular contact for updates and adjustments based on client feedback. Implementation times range from one to four weeks, depending on complexity. IF WE ELECT TO MOVE FORWARD WITH YOUR COMPANY, WHAT CITY OF LA QUINTA RESOURCES WOULD YOU REQUIRE (E.G., INFORMATION, DATA, STAFF RESOURCES, COMMUNICATION) DURING MIGRATION AND ON AN ONGOING BASIS?* Maximum response length: 300 characters We require information on organization processes during the migration and collect information as we assess needs, wants, and other requirements. Once we have a successful implementation plan, ongoing communication is handled by monthly status updates and quarterly advisory meetings. RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 13 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services 12. Other PLEASE SIGN THE FOUR SUPPLEMENTAL DOCUMENTS ATTACHED. 1. Acknowledgement of Insurance Requirements (Attachment 2) Proposals must include a written statement that, if selected, the proposer will provide the minimum insurance coverage and indemnification noted in Exhibits E and F, respectively, of the City's Agreement for Contract Services included as Attachment 1. 2. Non -Collusion Affidavit (Attachment 3) Proposals must include an executed Non -Collusion Affidavit, included as Attachment 3, executed by an official authorized to bind the firm. 3. Acknowledgement of Addenda (Attachment 4) If any addendum/addenda are issued, the proposer shall initial the Acknowledgement of Addenda, included as Attachment 4 ATTACHMENTS 1. Agreement for Contract Services 2. Insurance Requirements Acknowledgement Must be executed by proposer and submitted with the proposal 3. Non -Collusion Affidavit Must be executed by proposer and submitted with the proposal 4. Addenda Acknowledgement Must be executed by proposer and submitted with the proposal • SuDDlemental Attachments .docx ATTACHMENT _2_ INSURANCE _REQUIREMENTS.pdfATTACHMENT_3_NON- COLLUSION_AFFIDAVIT_FORM.pdfATTACHMENT_4_ACKNOWLEDGEMENT_OF_RECEIPT_OF_ADDENDA.pdf PLEASE INDICATE ANY BUSINESS DESIGNATIONS YOU HAVE: Select all that apply. RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 14 RESPONSE DOCUMENT REPORT FORM No. TBD Managed IT Services Local to California ANYTHING ELSE YOU WANT TO TELL US?* Is there anything else important we should know about your solution, company or proposal? Please upload any supporting documents. Key_Personnel_Resumes.pdf BY SUBMITTING, I UNDERSTAND THAT THE CITY OF LA QUINTA AND MARKETPLACE. CITY WILL RECEIVE THIS INFORMATION. I HAVE READ AND UNDERSTAND THE TERMS OF THIS OPPORTUNITY.* Confirmed RESPONSE DOCUMENT REPORT Standard - Managed IT Services Page 15 Organization Profile Alliant Cybersecurity ("Alliant") is a leading cybersecurity and risk advisory firm and a Managed Security Service Provider for private and public sectors nationwide. Alliant is a wholly owned subsidiary of alliantgroup, LP, and it originated from within alliantgroup's Risk Advisory practice and later became an independent entity. Initially, like most companies, we faced cyber threats and tried to implement effective cybersecurity measures to protect our company. However, we could not find a solution that met our needs. After an extensive search, we gathered the industry's best talent and technology to create comprehensive, tailored solutions for our specific and unique needs. Soon, our clients began asking us to help them secure their businesses, leading to Alliant Cybersecurity's founding as an independent entity, and today we employ over 2,200 people. Although we remain closely related to our parent company, our sole focus is cybersecurity and managed IT services, and we have been catering to mid -market and enterprise -level organizations for 22 years. Our headquarters are in Houston, Texas, and we have regional offices in Irvine, California, New York City, Washington D.C., Chicago, and Hyderabad, India. Our Irvine office has been operational for around the same time as our Houston office, and both locations have been providing exceptional cybersecurity and IT services to mid -market and enterprise -level organizations across the nation. Tax ID Number: 83-2822842 We aim to provide simple solutions to everyday cybersecurity and IT problems in crucial moments. Our approach is to create a customized and secure cyber environment for your organization using our comprehensive consulting, technology, and managed security services. We are proud to be independent of any vendor and strive to listen to our client's unique challenges, understand their pain points, and create tailored solutions to secure their organization and enable growth. Key Personnel Resumes Resumes of Key Personnel are attached in the supporting documents in 12.3. of the submission portal. Proposed Solution Alliant's proposed solution offers comprehensive cybersecurity and network reliability services that align with the needs of the City of La Quinta ("the City"). With the increasing need for a robust IT infrastructure, Alliant provides 24/7/365 monitoring services for the City's network, email services, and critical systems with proactive communication and escalation protocols based on the severity of any unscheduled outages. In addition, Alliant's solution includes real-time perimeter monitoring using advanced machine learning to monitor security events across an IT environment. This provides real-time alerts and automated incident response. We also provide annual security architecture reviews and recommend monthly vulnerability assessments to ensure the City's IT infrastructure is secure and compliant. Alliant's approach to network reliability includes network management and infrastructure support, consistent internet connectivity, a nightly backup plan for critical servers, and support services for VoIP/Analog telephone management. Our comprehensive help desk services operate 24/7/365 to ensure uninterrupted support, with both on-site and remote services available. In the event of any critical issues, Alliant guarantees a response time of 2 hours and an average response time of 15 minutes. This helps maintain the City's proactive security posture and ensures timely and effective support. Our team consists of on-site and help desk technicians, network engineers, systems administrators, cybersecurity specialists, project managers, and relationship managers, ensuring that key staff is always available during normal business hours. Moreover, Alliant has a standardized service management system based on ITIL principles that streamline processes from incident to resolution, prioritizing efficiency and adherence to best practices for optimal service delivery. The ITIL-aligned escalation process starts with issue identification, impact assessment, and temporary mitigation if required. We also provide 24/7/365 help desk support, work order/ticketing systems, and regular reporting on purchases, assets, current activities and issues, and project status reports. Alliant also offers customized policies related to the use of technology and has extensive experience managing Microsoft 365 for a diverse range of clients, including enterprises, nonprofits, and public organizations. We can provide all the services that the City requires, including user onboarding/offboarding, Active Directory management, and system, network, and application documentation. In summary, Alliant's proposed solution will be a comprehensive, efficient, and reliable solution for the City's IT needs, ensuring uninterrupted network performance, data security, and timely support. Response and Resolution Times Our team works with a priority matrix that determines the response time required for each incident we manage. This matrix considers the level of urgency and severity of the situation. As such, the average response time may vary depending on the priority of the incident. Rest assured, we strive to provide timely and efficient assistance for all our clients. Table 1: Average Response Time Our team prioritizes incidents based on a priority matrix. This means that the resolution time for each incident will vary depending on its priority level. Table 2: Average Time for Resolution *Resolution Time: Resolution activity would be owned by the customer (as per SOW or scope of service) Service Level Agreements (SLAB) When securing your business against the ever -evolving threat landscape, it's critical to have a team of experts who can detect and respond to potential attacks in real-time. At our Security Operations Center (SOC), we take this responsibility seriously. While our detection and initial response times are quick and fast, we understand the importance of having a clear service level agreement (SLA). To that end, we offer comprehensive SLAB that apply to all assets licensed as part of our services with an active endpoint agent and are actively communicating with our SOC. These SLAB are designed to ensure our clients receive timely and effective support whenever needed, helping them stay one step ahead of potential threats and maintain a strong, proactive security posture. Table 3: Service Level Agreements Service Level Definition Service Level Agreement Alliant will operate its service platforms and Security Operations Center associated notification systems except for 99.9% availability and Notification Systems scheduled and emergency maintenance. When malicious activity is detected or security Security Event Investigation events generate alerts, Alliant will 98% attainment within —Time to Detection acknowledge and begin triage within 60 60 minutes minutes of the first notification. Non -urgent requests for Incident Response Non -Urgent Incident Services requested by telephone or submitted 95% attainment within Response Requests through e-mail will be acknowledged within 24 hours twenty-four (24) hours. A monthly security posture report will be compiled and submitted to the City. This report will detail monthly security activity and Monthly Security Posture response actions taken by Alliant to secure and Monthly by 4t" business Reports defend the City's IT environment. This report day of the new month will also list any remediations supported or completed by Alliant or requiring action by the City. A quarterly executive report will be compiled and submitted to the City's Executive Management team. This report will detail summary information relating to the City's Quarterly by 4th Quarterly Executive security posture, maturity, and progress business day of the new Summary Reports toward risk mitigation efforts. This report will quarter also highlight any additional resources that should be devoted to securing the environment. ta ATTACHMENT 2 INSURANCE REQUIREMENTS ACKNOWLEDGEMENT Must be executed by proposer and submitted with the proposal I, Rizwan Virani confirm that Alliant Cybersecurity (name) hereby acknowledge and (name of company) has reviewed the City's indemnification and minimum insurance requirements as listed in Exhibits E and F of the City's Agreement for Contract Services (Attachment 1); and declare that insurance certificates and endorsements verifying compliance will be provided if an agreement is awarded. I am Vice Chairman (Title) of Alliant Cybersecurity (Company) Page 11 of 13 Commercial General Liability (at least as broad as ISO CG 0001) $1,000,000 (per occurrence); $2,000,000 (general aggregate) Must include the following endorsements: General Liability Additional Insured General Liability Primary and Noncontributory Commercial Auto Liability (at least as broad as ISO CA 0001) $1,000,000 (per accident) Personal Auto Declaration Page if applicable Errors and Omissions Liability $1,000,000 (per claim and aggregate) Worker's Compensation (per statutory requirements) Must include the following endorsements: Worker's Compensation Waiver of Subrogation Worker's Compensation Declaration of Sole Proprietor if applicable Cyber Liability in the amount of $1,000,000 per occurrence Umbrella or Excess Liability may be used to meet policy limits Page 11 of 13 I, Iam ta v:Ll 11 ll�L\I ATTACHMENT 3 NON -COLLUSION AFFIDAVIT FORM Must be executed by proposer and submitted with the proposal Rizwan Virani (name) hereby declare as follows: Vice Chairman of Alliant Cybersecurity (Title) (Company) the party making the foregoing proposal, that the proposal is not made in the interest of, or on behalf of, any undisclosed person, partnership, company, association, organization, or corporation; that the proposal is genuine and not collusive or sham; that the proposer has not directly or indirectly induced or solicited any other proposer to put in a false or sham proposal, and has not directly or indirectly colluded, conspired, connived, or agreed with any proposer or anyone else to put in a sham proposal, or that anyone shall refrain from proposing; that the proposer has not in any manner, directly or indirectly, sought by agreement, communication, or conference with anyone to fix the proposal price of the proposer or any other proposer, or to fix any overhead, profit, or cost element of the proposal price, or of that of any other proposer, or to secure any advantage against the public body awarding the agreement of anyone interested in the proposed agreement; that all statements contained in the proposal are true; and, further, that the proposer has not, directly or indirectly, submitted his or her proposal price or any breakdown thereof, or the contents thereof, or divulged information or data relative hereto, or paid, and will not pay, any fee to any corporation, partnership, company, association, organization, proposal depository, or to any member or agent thereof to effectuate a collusive or sham proposal. I declare under penalty of perjury under the laws of the State of California that the foregoing is true and correct. Proposer Signature: Proposer Name: Proposer Title: Company Name: Address: Rizwan Virani Vice Chairman Alliant Cybersecurity 3009 Post Oak Blvd, Suite 1500, Houston, TX 77056 Page 12 of 13 ta ATTACHMENT 4 ACKNOWLEDGEMENT OF RECEIPT OF ADDENDA Must be executed by proposer and submitted with the proposal; If no addenda has been issued, mark "N/A" under Addendum No, indicating Not Applicable and sign ADDENDUM NO. SIGNATURE INDICATING RECEIPT 01 lr� Page 13 of 13 RIZWAN VI RAN I Principal, Vice Chairman PROJECT ROLE Our team is led by Rizwan Virani, who is responsible for creating customer experiences that surpass those of our competitors. He achieves this by utilizing data -driven insights to make informed decisions, and by collaborating closely with clients to establish key performance indicators (KPIs) that measure the success of our engagements. By continuously monitoring these KPIs and gathering customer feedback, he ensures that Alliant is meeting and exceeding customers' expectations. In addition, Rizwan is also responsible for negotiating and signing contracts, allocating internal resources to complete projects, and removing any obstacles that may arise. EXPERIENCE • Oversees the firm's enterprise risk management, cybersecurity, and privacy operations. Prepared both private and public organizations for information security and data privacy Provides thought leadership in the technology and security industry. Serves as Virtual CISO for several municipalities and other government agencies. Featured in several industry publications such as SC Magazine, Security Magazine, Help Net Security, etc. Mentors talented security professionals to contribute to the cybersecurity and technology industries and ecosystem. • Disaster recovery planning and implementation. • Leads strategic plans for the practice. STEVEN HUNTER Chief Technology Officer PROJECT ROLE Steven Hunter is the Chief Technical Officer responsible for identifying cyber risks, developing cybersecurity strategies, and protecting technology assets from potential threats. He ensures that technology decisions align with business objectives and manages tech teams by providing them with the skills and resources necessary to implement digital transformation strategies. Steven also manages relationships with strategic vendors and technology partners and sets goals and KPIs based on customer input. He ensures that milestones and timelines are met to achieve successful outcomes. EXPERIENCE • Recognized in 2021 and 2022 as one of the 100 Best Digital Leaders in the Nation Provides thought leadership across informational technology domains Internationally published articles and discussions on information technology on various platforms and forums Created and delivered customized, innovative solutions for many clients and industries with Fortune 1000 companies Served on the Advisory Boards of Hewlett Packard and The Texas CIO Council Serves as a Board Member for Compudopt Atlas Scholar Mentor providing STEM Leadership to Houston Area Students ANILSAMUEL Director of IT Operations PROJECT ROLE Anil Samuel's extensive experience in security consulting spans over two decades, making him a valuable asset to any organization. His exceptional knowledge and expertise in integrating technology strategies with business objectives enable him to drive innovation and achieve operational excellence. Anil's unique skill set includes managing complex IT infrastructures and security operations, which consistently yields tangible results. He has earned a reputation as a visionary in the field of security consulting. His practical experience, allows him to execute security strategies with precision and efficiency. Overall, Anil is a highly skilled and experienced security consultant who can bring a wealth of knowledge and expertise to any organization. EXPERIENCE Specializes in IT and security operations management, team leadership, and budget optimization. Consults in disaster recovery planning and business resiliency strategies for robust IT infrastructure. Oversees cost-saving data center and office build - outs for operational efficiencies. Leads cloud and security initiatives, including implementing cloud services, CRM/ERP systems, and advanced cybersecurity measures. Provides strategic consulting services to foster IT innovation, transforming organizational IT landscapes, and contributing to company growth. JASON FEE Solutions Engineer PROJECT ROLE Jason has more than 20 years of experience in multiple levels of IT administration and governance, including 10 years in the Managed Security and Service Provider industry. As a Solutions Engineer, he draws upon his knowledge and experience with the ability to translate complex cybersecurity concepts into compelling and actionable information for business leaders. Jason holds a degree in Cloud Computing from Western Governors University, as well as many industry -standard security, network, and cloud infrastructure certifications. EXPERIENCE Specializes in systems, cloud, and network infrastructure, including the following, for clients ranging from educational institutions, nonprofits, small business, and the Fortune 500: Systems and Network Engineering Strategic Planning Project Management Large -Scale Infrastructure Design & Implementation Guides businesses through the evolving security and compliance landscape. Designs custom security solutions for new-age threat vectors and ever-changing business security needs. JOHN RIZK Solutions Engineer PROJECT ROLE John is a highly experienced IT professional with over 20 years of expertise in the industry. He has a proven track record of providing exceptional customer service and satisfaction, and his excellent communication skills allow him to effectively interact with clients and team members alike. John's skills in various areas of Information Technology and Cybersecurity make him the perfect candidate for providing IT support services. He is well -versed in software implementation and training, system integration, cloud administration, data collection and analysis, and risk management and mitigation, among others. John's strong business acumen and technical know-how enable him to deliver reliable and cost-effective technology solutions to businesses of all sizes. EXPERIENCE Construction, maintenance, and repair of all major desktops/laptops Audio and Video collaboration, design, installation, and maintenance Maintain 0365 environment to include Azure AD, Intune, Exchange Online, Teams, and OneDrive 0365 Configuration, administration, guest access setup, federation, and more Expert troubleshooting, investigation, and resolution skills HEATHER FOX Operations Manager PROJECT ROLE Heather plays a crucial role in our organization by facilitating cross-channel feedback from customers and employees to management and executive teams and ensuring that all activities adhere to local, federal, industry, and company standards. She also observes, reviews, and analyzes processes to identify inefficiencies and areas where improvements could be made. She will design and maintain clear operational guides to ensure consistency of operations and deliver reports to department heads, management teams, and boards of directors to provide insight into the organization's overall efficiency. In addition, Heather collaborates with management and executives to set departmental and organization -wide goals. In addition, she will create processes, assess incident reports, develop and implement crisis communication plans, create compliance reports, support audits, measure SOC performance metrics, and provide information on security operations to executive management. EXPERIENCE Manage incident response, escalation, and daily operations of the Security Operations Center Support security leadership and team members as needed. Manage the technical implementation and maintenance of security products and tools. Monitor and report weekly and monthly SLA and KPI metrics. Develops and maintains procedures and rulebooks to support the Security Operations Center and Security Engineering teams. KARUNASHIPPER Project Manager PROJECT ROLE Karuna Shipper is an experienced cybersecurity professional specializing in governance, risk management, and compliance. She excels in assessing IT and cybersecurity controls against industry -specific frameworks such as NIST 800-171, ISO, CMMC 2.0, and CIS. With her expertise in conducting security assessments, risk assessments, and vulnerability assessments, Karuna can determine regulatory compliance standards for clients. She has a proven track record of working with current threat actor capabilities, tactics, and techniques using frameworks such as the MITRE ATT&CK Framework. As a Project Manager at Alliant Cybersecurity, Karuna is responsible for developing project plans and providing status presentations for client communication and service. EXPERIENCE Karuna previously worked on a team sponsored by the Joint Chiefs of Staff J8 and the National Security Agency on an information campaign project She has advised numerous clients outside of projects on several major cybersecurity compliance frameworks. Karuna has managed projects for several service lines, such as Vulnerability Management, Penetration Tests, Cybersecurity Risk Reviews, and compliance readiness assessments. Bachelors of Arts and Sciences in International Affairs and Arabic