Alliant Cybersecurity, LLCMarlcftplaw-dty
Company:
Alliant Cybersecurity, LLC
Email:
info@alliantcybersecurity.com
Contact:
Rizwan Virani
Address:
3009 Post Oak Blvd. Suite 1500
Houston, TX 77056
Phone:
N/A
Website:
www.alliantcybersecuritV.com
Submission Date:
Mar 1, 2024 3:35 PM
Marketplace.city
Marketplace.city General
Andrew Watkins, President and COO
500 West Madison, Chicago, IL 60661
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
RESPONSE DEADLINE: March 1, 2024 at 7:00 pm
Report Generated: Monday, March 4, 2024
Alliant Cybersecurity, LLC Response
CONTACT INFORMATION
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
ADDENDA CONFIRMATION
Addendum #1
Confirmed Mar 1, 2024 3:18 PM by Renojo Burns
QUESTIONNAIRE
1. Solution
Overview of your offerings and solution
PLEASE PROVIDE A 2 -PAGE SOLUTION NARRATIVE DESCRIBING YOUR PROPOSED SOLUTION AND HOW IT FITS THE CITY OF LA
QUINTA'S NEEDS.*
Please be sure to address the following:
(a) Number of years in business
(b) Taxpayer identification number
(c) Number of years performing Managed IT Services
(d) Resumes of the Project Manager and key personnel who will be responsible for performance if any agreement results from this
RFP
(e) Firm ownership and if incorporated, list the state in which the firm is incorporated and the date of incorporation
(f) If the firm is a subsidiary of a parent company, identify the parent company
Alliant_Cybersecurity_ _Organization_Profile_&_Proposed_Solution.pdf
2. Cybersecurity
PLEASE CONFIRM YOU ARE ABLE TO PROVIDE CYBERSECURITY/NETWORK SECURITY SERVICES, INCLUDING ANTI-VIRUS, SECURITY
UPDATES AND PATCH MANAGEMENT.*
Yes
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 2
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
PLEASE DESCRIBE YOUR INCIDENT RESPONSE FOR A SECURITY EVENT.*
Maximum response length: 300 characters
An L1 analyst triages an incident with other analysts, and if they need assistance, it's passed to an L2 analyst who performs activities
like analysis of logs, secondary research, and IOC. If the issue still persists, it's passed to an L3 analyst for resolution with support from
the L2 team.
HAVE ANY OF YOUR CLIENTS EXPERIENCED A RANSOMWARE ATTACK IN THE LAST 12 MONTHS? IF SO, HOW DID YOUR COMPANY
RESPOND?*
Maximum response length: 300 characters
None of our clients have experienced a ransomware attack in the last 12 months. However, we continue to take proactive measures
to ensure the safety and security of our clients' data. At Alliant, we prioritize cybersecurity and have implemented robust protocols
and technologies to prevent attacks.
ARE YOU ABLE TO ADMINISTER AND MANAGE ON-GOING TRAINING PROGRAMS AND REGULAR PHISH AND RELATED TESTS FOR ALL
LA QUINTA EMPLOYEES?
Yes
PLEASE LIST ANY CYBERSECURITY CERTIFICATIONS THAT YOUR COMPANY HAS ACHIEVED.*
Maximum response length: 300 characters
• Certified Information Systems Security Professional (CISSP)
• Certified Information Security Manager (CISM)
• Certified Information Systems Auditor (CISA)
• Certified in Risk and Information Systems Control (CRISC)
• Offensive Security Certified Professional (OSCP)
• HITRUST Certified CSF Practitioner
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 3
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
PLEASE DESCRIBE YOUR APPROACH TO REAL-TIME PERIMETER MONITORING.*
Please specify the ability to access real-time security information and log data, as well as stored logs.
Maximum response length: 300 characters
Securonix SIEM uses advanced machine learning to monitor security events across an IT environment, providing real-time alerts and
automated incident response. It detects insider threats, compromised accounts, and other security incidents, and offers detailed
reporting and compliance capabilities.
DO YOU MAINTAIN 24/7/365 HEALTH MONITORING AND AVAILABILITY OF THE DELIVERY PLATFORM?*
Maximum response length: 300 characters
Alliant provides 24/7/365 monitoring services to detect and address potential security breaches in real-time, preventing significant
harm to the organization. Our solution also has High Availability so that we don't have any downtime for our services.
DO YOU PROVIDE ANNUAL SECURITY ARCHITECTURE REVIEW AND VULNERABILITY ASSESSMENTS?*
Maximum response length: 300 characters
Yes, we provide annual security architecture review and recommend monthly vulnerability assessments. However, we are always
flexible to do as many assessments as our clients request.
3. Network Reliability
PLEASE CONFIRM YOU OFFER NETWORK MANAGEMENT AND INFRASTRUCTURE SUPPORT SERVICES.*
Yes
CAN YOU PROVIDE INSTALLATION, CONFIGURATION, ADMINISTRATION, AND MAINTENANCE OF ALL NETWORK EQUIPMENT
INCLUDING SWITCHES, FIREWALLS, ROUTERS, CABLING, WIRELESS ACCESS POINTS, AND OTHER DEVICES?*
Yes
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 4
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
PLEASE LIST THE STEPS TAKEN TO REPAIR AN INTERNET OUTAGE, INCLUDING COMMUNICATION AND ESCALATION PROTOCOLS. HOW
LONG DOES IT USUALLY TAKE TO RESTORE INTERNET, AND HOW OFTEN DO CLIENTS HAVE OUTAGES?*
Maximum response length: 300 characters
We handle Internet outages swiftly with clear communication & escalation. Restoration time varies, but our efficient protocols
minimize downtime. Client outages are rare, and we prioritize quick resolutions.
ARE YOU ABLE TO OFFER 24/7/365 SYSTEM MONITORING AND EMAIL MONITORING?*
Yes
PLEASE CONFIRM YOU ARE ABLE TO CONDUCT A NIGHTLY BACKUP PLAN FOR CRITICAL SERVERS, INCLUDING A REGULARLY -TESTED
RECOVERY PROCESS*
Yes
CAN YOU PROVIDE SUPPORT SERVICES FOR VOIP /ANALOG TELEPHONE MANAGEMENT?
Please list any specific experience with Mitel.
Maximum response length: 300 characters
Yes. We have extensive broad experience both with VoIP / analog system implementation and management as well as specifically
supporting Mitel for an installed base of over 1000 users.
4. Device/Hardware Management
CAN YOU PROVIDE ALL MAINTENANCE, MONITORING, AND SUPPORT FOR HARDWARE (SERVER, DESKTOP, LAPTOP, MOBILE), AND
INVENTORY CONTROL AND MANAGEMENT (HARDWARE AND SOFTWARE)?*
Yes
IF NO, PLEASE ELABORATE.
Maximum response length: 300 characters
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 5
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
No response submitted
PLEASE CONFIRM THAT YOUR SERVICES COVER PROCUREMENT MANAGEMENT (SELECTION OF COMMERCIALLY RATED EQUIPMENT,
ORDER PLACEMENT, ORDER TRACKING, SHIPPING, EQUIPMENT RETURNS, AND SOURCING AND ORDERING OF REPLACEMENT
PARTS).*
Yes
IF NO, PLEASE ELABORATE.
Maximum response length: 300 characters
No response submitted
WHAT IS YOUR PROCESS FOR KEEPING TRACK OF ALL LA QUINTA IT INVENTORY?
Maximum response length: 300 characters
We utilize best -practice -automated asset management tools alongside ITIL principles and automation to oversee inventory. This
approach ensures a streamlined, efficient management process, reflecting a commitment to best practices and operational excellence
in asset oversight.
5. Customer Service/Help Desk Support
PLEASE DESCRIBE THE CUSTOMER SERVICE AND HELP DESK SUPPORT YOUR SERVICES PROVIDE.
(For example, 24/7/365 support)
Maximum response length: 300 characters
Our firm offers comprehensive help desk services, operating 24/7/365 to ensure uninterrupted support. We provide on-site and
remote services, including after-hours assistance. Our team is dedicated to resolving issues efficiently, ensuring client satisfaction
through our proactive approach.
PLEASE DESCRIBE THE LOCATION OF YOUR OFFICE HEADQUARTERS. *
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 6
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
Maximum response length: 300 characters
Our headquarters is centrally located in Houston, TX, where we house our Network and Security Operations Centers. We operate a
247 model and have offices in Irvine, CA, and New York City as well.
DO YOU HAVE A LOCAL OFFICE IN SOUTHERN CALIFORNIA WITHIN A 2 -HOUR DRIVE FROM LA QUINTA? (NOTE: YOUR PROPOSAL MAY
BE DISQUALIFIED IF YOU ARE UNABLE TO PROVIDE ONSITE STAFFING FOR THE CITY, OR DO NOT HAVE AN OFFICE IN SOUTHERN
CALIFORNIA)*
Please specify where your local office is located.
Maximum response length: 300 characters
Yes, we have a local office in Irvine, California, within 2 hours from the City of La Quinta.
DURING BUSINESS HOURS, HOW LONG WOULD IT TAKE SOMEONE TO ARRIVE ON-SITE IN THE EVENT OF AN IT EMERGENCY?
1-2 hours
DURING AFTER HOURS, HOW LONG WOULD IT TAKE SOMEONE TO ARRIVE ON-SITE IN THE EVENT OF AN ITEM ERG ENCY?
1-2 hours
ON-SITE STAFFING AVAILABILITY? (NOTE: YOUR PROPOSAL MAY BE DISQUALIFIED IF YOU ARE UNABLE TO PROVIDE ONSITE STAFFING
FOR THE CITY)
Is your firm able to provide a minimum of 2 on-site desktop technicians, with one of the two technicians being proficient in
Networking?
Yes, we will provide both on-site and remote technicians proficient in desktops, systems, and networking within 2 hours' notice.
WILL THE ON-SITE TECHNICIANS BE ABLE TO WORK CONCURRENTLY WITH CITY STAFF'S WORK SCHEDULE, INCLUDING AS -NEEDED
ADJUSTMENTS TO WORK LATER HOURS FOR EVENTS SUCH AS CITY COUNCIL, COMMISSION HEARINGS, AND SPECIAL EVENTS AT CITY
HALL AND OTHER LOCATIONS?*
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 7
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
(Monday through Friday 7:30am to 5:30pm) (Tuesdays may require working as late as 10pm occasionally with notice in advance) ONE
ON-SITE TECHNICIAN MUST ALWAYS BE PRESENT
Yes
PLEASE DESCRIBE THE GUARANTEED AND AVERAGE RESPONSE TIME FOR REQUESTS DURING BUSINESS HOURS AND AFTER HOURS.
Maximum response length: 300 characters
Guaranteed Response Time:
Critical Issues: 2 hours
High Priority: 4 hours
Medium Priority: 8 hours
Low Priority: 48 hours
Average Response Time:
Critical Issues: 15 minutes
High Priority: 30 minutes
Medium Priority: 1 hour
Low Priority: 4 hours
PLEASE UPLOAD RESPONSE TIME AND SUPPORT SLAS.
Response_Time_and_SLAs.pdf
WHAT IS THE AVAILABILITY OF KEY STAFF DURING NORMAL BUSINESS HOURS?
Maximum response length: 300 characters
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 8
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
Key staff are available during normal business hours, including on-site and help desk technicians, network engineers, systems
administrators, cybersecurity specialists, project managers, relationship managers, and leadership personnel.
ARE THERE ANY PENALTIES FOR YOUR COMPANY IF GUARANTEED RESPONSE TIMES AREN'T MET?*
Maximum response length: 300 characters
We are open to negotiation based on your requirements.
DESCRIBE YOUR WORK ORDER/TICKET SYSTEM.
Maximum response length: 300 characters
Our industry -standard service management system is built on ITIL principles. It streamlines processes from incident to resolution,
prioritizing efficiency and adherence to best practices for optimal service delivery. The City can access a client portal to create and
manage service requests.
WHAT ARE THE STEPS USED TO ESCALATE CHRONIC OR CHALLENGING PROBLEMS?*
Maximum response length: 300 characters
Our ITIL-aligned escalation process starts with issue identification, impact assessment, and temporary mitigation, if required.
Documenting details, stakeholder communication, root cause investigation, permanent solutions, documentation updates, and
ongoing monitoring ensure efficacy.
6. Organizational Governance
THE SELECTED LA QUINTA MANAGED IT SERVICES PARTNER IS EXPECTED TO CONTRIBUTE TO ORGANIZATIONAL GOVERNANCE AND
SUPPORT AND ADHERE TO CITY RULES AND REGULATIONS. PLEASE CONFIRM YOU CAN PROVIDE THESE SERVICES.*
Yes
PLEASE SELECT WHETHER YOU CAN PROVIDE THE FOLLOWING.
User onboarding/offboarding
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 9
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
Active Directory Management
System, network, and application documentation
Regular reporting on purchases, assets, current activities and issues, and project status reports
Provide customized IT policies and provide best practices and recommendations
7. Management of Existing Enterprise Applications
DESCRIBE HOW MAJOR SOFTWARE UPGRADES WILL BE APPLIED. ARE THERE EXTRA FEES FOR UPGRADES? IF SO, PLEASE DESCRIBE.*
Maximum response length: 300 characters
Standard OS and common third -party applications, such as Office 365, Windows, and similar, are patched on a rolling schedule within
our service level agreements. More specialized software will be patched and tested in coordination with key city personnel, with
available rollback, if necessary.
PLEASE DESCRIBE YOUR EXPERIENCE ADMINISTERING MICROSOFT 365 FOR CLIENTS. PLEASE DESCRIBE ANY MICROSOFT 365
CERTIFICATIONS YOU HOLD. *
Maximum response length: 300 characters
Our expert team has extensive experience managing Microsoft 365 for a diverse range of clients, including enterprise, nonprofits, and
public organizations. We actively align clients with best practices such as those set by Microsoft and NIST to ensure optimal reliability
and security.
PLEASE DESCRIBE YOUR FAMILIARITY AND EXPERIENCE WITH OTHER EXISTING LA QUINTA TECHNOLOGY, AS LISTED IN THE
OPPORTUNITY OVERVIEW ABOVE. *
Please be sure to highlight technologies you are unfamiliar with.
Maximum response length: 500 characters
Our team has extensive experience with Adobe, Autodesk, Bluebeam, Druva, Genetec, IRIS OCR, Nessus, OpenVPN, Parallels,
ScanSnap, Microsoft Suite, and Zoom. We're confident in learning and supporting other applications as they're akin to what we've
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 10
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
managed previously. We have longstanding relationships with many hardware providers, including APC, Cisco, Dell, Nimble, ANAP,
Sonicwall, Ubiquiti, and many others.
8. Strategic Adoption of New Technologies
PLEASE CONFIRM YOU CAN ASSIST THE CITY IN ADOPTING AND IMPLEMENTING NEW TECHNOLOGIES.*
Yes
WHAT IS YOUR PROCESS AND CRITERIA FOR EVALUATING NEW SOFTWARE AND HARDWARE?*
Maximum response length: 300 characters
Our Solution Engineering team exists to assess new software and hardware, based first and foremost on compatibility with your long-
term strategic and short-term tactical needs, then on future scalability, security, user-friendliness, support, cost-effectiveness, and
vendor reputation.
PLEASE PROVIDE SPECIFIC EXAMPLES OF HOW YOU HAVE WORKED WITH CUSTOMERS THAT BEGAN WITH SIGNIFICANT TECHNOLOGY
LIMITATIONS AND HELPED TO SUCCESSFULLY TRANSFORM THEM INTO ORGANIZATIONS WITH WELL PLANNED AND EXECUTED
TECHNOLOGY STRATEGIES? WHAT WERE THE CRITICAL SUCCESS FACTORS IN THIS TRANSFORMATION?*
Maximum response length: 500 characters
We have worked with clients that have had nearly no infrastructure, severely outdated infrastructure with significant technology debt,
and a massive, sophisticated infrastructure stack. Client A was an organization with no technology infrastructure. We designed and
implemented a 24 -month tactical roadmap and 5 -year strategic plan. We implemented a robust hybrid cloud infrastructure with
VMware, Nimble storage, Microsoft Azure, Windows Server, and the Microsoft 365 product suite as the backbone.
9. Prior Experience and Case Studies
HOW MANY TOTAL STATE AND LOCAL GOVERNMENTS USE YOUR COMPANY FOR MANAGED IT SERVICES?*
1-10
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 11
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
ARE THE MAJORITY OF YOUR CLIENTS IN THE PUBLIC SECTOR OR THE PRIVATE SECTOR? PLEASE PROVIDE AN ESTIMATED PERCENTAGE
BREAKDOWN IF POSSIBLE. *
Maximum response length: 100 characters
The majority of our client base is private sector, with 5% as public entities.
PLEASE PROVIDE REFERENCES FOR THE CITY OF LA QUINTA*
Please download the below document, complete, and upload.
• Marketplace.city Reference ..
Al Iiant_Cybersecurity_Marketplace. city_Reference_Document.xlsx
10. Pricing and Model
PLEASE PROVIDE A PRICING ESTIMATE TO THE CITY BASED ON THE INFORMATION PROVIDED IN THIS RFP.*
Please download the below document, complete, and upload. Please be sure to include a detailed fee schedule for the services
requested by this RFP and any complementary services offered along with corresponding prices. The initial contract is anticipated for
a period of 5 years commencing on or before July 1, 2024, with the potential for an option to renew it for two additional years. Please
include renewal costs as well.
• Basic Pricing Template .xlsx
Alliant_Cybersecurity_ _Pricing= _DM6856_969_90.xlsx
PLEASE DESCRIBE THE KEY INFORMATION YOU WILL NEED FROM THE CITY OF LA QUINTA IN ORDER TO PROVIDE THEM WITH A MORE
ACCURATE PRICING ESTIMATE.*
Maximum response length: 300 characters
• Detailed asset list.
• Staff count by site.
• Average monthly ticket counts by type and severity.
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 12
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
• Average monthly business -hours onsite time.
• Average monthly after-hours onsite time.
• Average monthly after-hours emergency issues.
• Desired service level agreements.
• Remote staff vs onsite.
PLEASE UPLOAD ANY STANDARD PRICING DOCUMENTS YOU WISH TO SHARE.
No response submitted
11. Implementation
PLEASE DESCRIBE YOUR IMPLEMENTATION METHODOLOGY, INCLUDING AVERAGE IMPLEMENTATION TIME.*
Maximum response length: 500 characters
An introductory meeting will address requirements and expectations. We assess your needs, create a tailored service proposal, and
finalize the contract. During the onboarding process, key team members are introduced as well as setting the communication
protocols. Once an implementation plan is developed with clear timelines, we will maintain regular contact for updates and
adjustments based on client feedback. Implementation times range from one to four weeks, depending on complexity.
IF WE ELECT TO MOVE FORWARD WITH YOUR COMPANY, WHAT CITY OF LA QUINTA RESOURCES WOULD YOU REQUIRE (E.G.,
INFORMATION, DATA, STAFF RESOURCES, COMMUNICATION) DURING MIGRATION AND ON AN ONGOING BASIS?*
Maximum response length: 300 characters
We require information on organization processes during the migration and collect information as we assess needs, wants, and other
requirements. Once we have a successful implementation plan, ongoing communication is handled by monthly status updates and
quarterly advisory meetings.
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 13
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
12. Other
PLEASE SIGN THE FOUR SUPPLEMENTAL DOCUMENTS ATTACHED.
1. Acknowledgement of Insurance Requirements (Attachment 2)
Proposals must include a written statement that, if selected, the proposer will provide the minimum insurance coverage and
indemnification noted in Exhibits E and F, respectively, of the City's Agreement for Contract Services included as Attachment 1.
2. Non -Collusion Affidavit (Attachment 3)
Proposals must include an executed Non -Collusion Affidavit, included as Attachment 3, executed by an official authorized to bind the
firm.
3. Acknowledgement of Addenda (Attachment 4)
If any addendum/addenda are issued, the proposer shall initial the Acknowledgement of Addenda, included as Attachment 4
ATTACHMENTS
1. Agreement for Contract Services
2. Insurance Requirements Acknowledgement
Must be executed by proposer and submitted with the proposal
3. Non -Collusion Affidavit
Must be executed by proposer and submitted with the proposal
4. Addenda Acknowledgement
Must be executed by proposer and submitted with the proposal
• SuDDlemental Attachments .docx
ATTACHMENT _2_ INSURANCE _REQUIREMENTS.pdfATTACHMENT_3_NON-
COLLUSION_AFFIDAVIT_FORM.pdfATTACHMENT_4_ACKNOWLEDGEMENT_OF_RECEIPT_OF_ADDENDA.pdf
PLEASE INDICATE ANY BUSINESS DESIGNATIONS YOU HAVE:
Select all that apply.
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 14
RESPONSE DOCUMENT REPORT
FORM No. TBD
Managed IT Services
Local to California
ANYTHING ELSE YOU WANT TO TELL US?*
Is there anything else important we should know about your solution, company or proposal? Please upload any supporting
documents.
Key_Personnel_Resumes.pdf
BY SUBMITTING, I UNDERSTAND THAT THE CITY OF LA QUINTA AND MARKETPLACE. CITY WILL RECEIVE THIS INFORMATION. I HAVE
READ AND UNDERSTAND THE TERMS OF THIS OPPORTUNITY.*
Confirmed
RESPONSE DOCUMENT REPORT
Standard - Managed IT Services
Page 15
Organization Profile
Alliant Cybersecurity ("Alliant") is a leading cybersecurity and risk advisory firm and a Managed
Security Service Provider for private and public sectors nationwide. Alliant is a wholly owned
subsidiary of alliantgroup, LP, and it originated from within alliantgroup's Risk Advisory practice
and later became an independent entity. Initially, like most companies, we faced cyber threats
and tried to implement effective cybersecurity measures to protect our company. However, we
could not find a solution that met our needs. After an extensive search, we gathered the industry's
best talent and technology to create comprehensive, tailored solutions for our specific and unique
needs. Soon, our clients began asking us to help them secure their businesses, leading to Alliant
Cybersecurity's founding as an independent entity, and today we employ over 2,200 people.
Although we remain closely related to our parent company, our sole focus is cybersecurity and
managed IT services, and we have been catering to mid -market and enterprise -level organizations
for 22 years. Our headquarters are in Houston, Texas, and we have regional offices in Irvine,
California, New York City, Washington D.C., Chicago, and Hyderabad, India. Our Irvine office has
been operational for around the same time as our Houston office, and both locations have been
providing exceptional cybersecurity and IT services to mid -market and enterprise -level
organizations across the nation.
Tax ID Number: 83-2822842
We aim to provide simple solutions to everyday cybersecurity and IT problems in crucial
moments. Our approach is to create a customized and secure cyber environment for your
organization using our comprehensive consulting, technology, and managed security services. We
are proud to be independent of any vendor and strive to listen to our client's unique challenges,
understand their pain points, and create tailored solutions to secure their organization and enable
growth.
Key Personnel Resumes
Resumes of Key Personnel are attached in the supporting documents in 12.3. of the submission
portal.
Proposed Solution
Alliant's proposed solution offers comprehensive cybersecurity and network reliability services
that align with the needs of the City of La Quinta ("the City"). With the increasing need for a
robust IT infrastructure, Alliant provides 24/7/365 monitoring services for the City's network,
email services, and critical systems with proactive communication and escalation protocols based
on the severity of any unscheduled outages.
In addition, Alliant's solution includes real-time perimeter monitoring using advanced machine
learning to monitor security events across an IT environment. This provides real-time alerts and
automated incident response. We also provide annual security architecture reviews and
recommend monthly vulnerability assessments to ensure the City's IT infrastructure is secure and
compliant.
Alliant's approach to network reliability includes network management and infrastructure
support, consistent internet connectivity, a nightly backup plan for critical servers, and support
services for VoIP/Analog telephone management. Our comprehensive help desk services operate
24/7/365 to ensure uninterrupted support, with both on-site and remote services available.
In the event of any critical issues, Alliant guarantees a response time of 2 hours and an average
response time of 15 minutes. This helps maintain the City's proactive security posture and
ensures timely and effective support. Our team consists of on-site and help desk technicians,
network engineers, systems administrators, cybersecurity specialists, project managers, and
relationship managers, ensuring that key staff is always available during normal business hours.
Moreover, Alliant has a standardized service management system based on ITIL principles that
streamline processes from incident to resolution, prioritizing efficiency and adherence to best
practices for optimal service delivery. The ITIL-aligned escalation process starts with issue
identification, impact assessment, and temporary mitigation if required. We also provide
24/7/365 help desk support, work order/ticketing systems, and regular reporting on purchases,
assets, current activities and issues, and project status reports.
Alliant also offers customized policies related to the use of technology and has extensive
experience managing Microsoft 365 for a diverse range of clients, including enterprises,
nonprofits, and public organizations.
We can provide all the services that the City requires, including user onboarding/offboarding,
Active Directory management, and system, network, and application documentation. In
summary, Alliant's proposed solution will be a comprehensive, efficient, and reliable solution for
the City's IT needs, ensuring uninterrupted network performance, data security, and timely
support.
Response and Resolution Times
Our team works with a priority matrix that determines the response time required for each incident we
manage. This matrix considers the level of urgency and severity of the situation. As such, the average
response time may vary depending on the priority of the incident. Rest assured, we strive to provide timely
and efficient assistance for all our clients.
Table 1: Average Response Time
Our team prioritizes incidents based on a priority matrix. This means that the resolution time for each
incident will vary depending on its priority level.
Table 2: Average Time for Resolution
*Resolution Time: Resolution activity would be owned by the customer (as per SOW or scope of service)
Service Level Agreements (SLAB)
When securing your business against the ever -evolving threat landscape, it's critical to have a team of
experts who can detect and respond to potential attacks in real-time. At our Security Operations Center
(SOC), we take this responsibility seriously. While our detection and initial response times are quick and
fast, we understand the importance of having a clear service level agreement (SLA). To that end, we offer
comprehensive SLAB that apply to all assets licensed as part of our services with an active endpoint agent
and are actively communicating with our SOC. These SLAB are designed to ensure our clients receive timely
and effective support whenever needed, helping them stay one step ahead of potential threats and
maintain a strong, proactive security posture.
Table 3: Service Level Agreements
Service Level
Definition
Service Level Agreement
Alliant will operate its service platforms and
Security Operations Center
associated notification systems except for
99.9% availability
and Notification Systems
scheduled and emergency maintenance.
When malicious activity is detected or security
Security Event Investigation
events generate alerts, Alliant will
98% attainment within
—Time to Detection
acknowledge and begin triage within 60
60 minutes
minutes of the first notification.
Non -urgent requests for Incident Response
Non -Urgent Incident
Services requested by telephone or submitted
95% attainment within
Response Requests
through e-mail will be acknowledged within
24 hours
twenty-four (24) hours.
A monthly security posture report will be
compiled and submitted to the City. This report
will detail monthly security activity and
Monthly Security Posture
response actions taken by Alliant to secure and
Monthly by 4t" business
Reports
defend the City's IT environment. This report
day of the new month
will also list any remediations supported or
completed by Alliant or requiring action by the
City.
A quarterly executive report will be compiled
and submitted to the City's Executive
Management team. This report will detail
summary information relating to the City's
Quarterly by 4th
Quarterly Executive
security posture, maturity, and progress
business day of the new
Summary Reports
toward risk mitigation efforts. This report will
quarter
also highlight any additional resources that
should be devoted to securing the
environment.
ta
ATTACHMENT 2
INSURANCE REQUIREMENTS ACKNOWLEDGEMENT
Must be executed by proposer and submitted with the proposal
I, Rizwan Virani
confirm that Alliant Cybersecurity
(name) hereby acknowledge and
(name of company) has reviewed
the City's indemnification and minimum insurance requirements as listed in Exhibits E and
F of the City's Agreement for Contract Services (Attachment 1); and declare that insurance
certificates and endorsements verifying compliance will be provided if an agreement is
awarded.
I am Vice Chairman
(Title)
of Alliant Cybersecurity
(Company)
Page 11 of 13
Commercial General Liability (at least as broad as ISO CG 0001)
$1,000,000 (per occurrence); $2,000,000 (general aggregate)
Must include the following endorsements:
General Liability Additional Insured
General Liability Primary and Noncontributory
Commercial Auto Liability (at least as broad as ISO CA 0001)
$1,000,000 (per accident)
Personal Auto Declaration Page if applicable
Errors and Omissions Liability $1,000,000 (per claim and aggregate)
Worker's Compensation (per statutory requirements)
Must include the following endorsements:
Worker's Compensation Waiver of Subrogation
Worker's Compensation Declaration of Sole Proprietor if applicable
Cyber Liability in the amount of $1,000,000 per occurrence
Umbrella or Excess Liability may be used to meet policy limits
Page 11 of 13
I,
Iam
ta
v:Ll 11 ll�L\I
ATTACHMENT 3
NON -COLLUSION AFFIDAVIT FORM
Must be executed by proposer and submitted with the proposal
Rizwan Virani (name) hereby declare as follows:
Vice Chairman of Alliant Cybersecurity
(Title) (Company)
the party making the foregoing proposal, that the proposal is not made in the interest of,
or on behalf of, any undisclosed person, partnership, company, association, organization,
or corporation; that the proposal is genuine and not collusive or sham; that the proposer
has not directly or indirectly induced or solicited any other proposer to put in a false or
sham proposal, and has not directly or indirectly colluded, conspired, connived, or agreed
with any proposer or anyone else to put in a sham proposal, or that anyone shall refrain
from proposing; that the proposer has not in any manner, directly or indirectly, sought by
agreement, communication, or conference with anyone to fix the proposal price of the
proposer or any other proposer, or to fix any overhead, profit, or cost element of the
proposal price, or of that of any other proposer, or to secure any advantage against the
public body awarding the agreement of anyone interested in the proposed agreement;
that all statements contained in the proposal are true; and, further, that the proposer has
not, directly or indirectly, submitted his or her proposal price or any breakdown thereof,
or the contents thereof, or divulged information or data relative hereto, or paid, and will
not pay, any fee to any corporation, partnership, company, association, organization,
proposal depository, or to any member or agent thereof to effectuate a collusive or sham
proposal.
I declare under penalty of perjury under the laws of the State of California that the
foregoing is true and correct.
Proposer Signature:
Proposer Name:
Proposer Title:
Company Name:
Address:
Rizwan Virani
Vice Chairman
Alliant Cybersecurity
3009 Post Oak Blvd, Suite 1500, Houston, TX 77056
Page 12 of 13
ta
ATTACHMENT 4
ACKNOWLEDGEMENT OF RECEIPT OF ADDENDA
Must be executed by proposer and submitted with the proposal;
If no addenda has been issued, mark "N/A" under Addendum No, indicating
Not Applicable and sign
ADDENDUM NO.
SIGNATURE INDICATING RECEIPT
01
lr�
Page 13 of 13
RIZWAN VI RAN I
Principal, Vice Chairman
PROJECT ROLE
Our team is led by Rizwan Virani, who is responsible for
creating customer experiences that surpass those of our
competitors. He achieves this by utilizing data -driven
insights to make informed decisions, and by
collaborating closely with clients to establish key
performance indicators (KPIs) that measure the success
of our engagements. By continuously monitoring these
KPIs and gathering customer feedback, he ensures that
Alliant is meeting and exceeding customers'
expectations. In addition, Rizwan is also responsible for
negotiating and signing contracts, allocating internal
resources to complete projects, and removing any
obstacles that may arise.
EXPERIENCE
• Oversees the firm's enterprise risk management,
cybersecurity, and privacy operations.
Prepared both private and public organizations for
information security and data privacy
Provides thought leadership in the technology and
security industry.
Serves as Virtual CISO for several municipalities and
other government agencies.
Featured in several industry publications such as SC
Magazine, Security Magazine, Help Net Security, etc.
Mentors talented security professionals to
contribute to the cybersecurity and technology
industries and ecosystem.
• Disaster recovery planning and implementation.
• Leads strategic plans for the practice.
STEVEN HUNTER
Chief Technology Officer
PROJECT ROLE
Steven Hunter is the Chief Technical Officer responsible
for identifying cyber risks, developing cybersecurity
strategies, and protecting technology assets from
potential threats. He ensures that technology decisions
align with business objectives and manages tech teams
by providing them with the skills and resources
necessary to implement digital transformation
strategies. Steven also manages relationships with
strategic vendors and technology partners and sets
goals and KPIs based on customer input. He ensures
that milestones and timelines are met to achieve
successful outcomes.
EXPERIENCE
• Recognized in 2021 and 2022 as one of the 100 Best
Digital Leaders in the Nation
Provides thought leadership across informational
technology domains
Internationally published articles and discussions
on information technology on various platforms
and forums
Created and delivered customized, innovative
solutions for many clients and industries with Fortune
1000 companies
Served on the Advisory Boards of Hewlett Packard and
The Texas CIO Council
Serves as a Board Member for Compudopt
Atlas Scholar Mentor providing STEM Leadership to
Houston Area Students
ANILSAMUEL
Director of IT Operations
PROJECT ROLE
Anil Samuel's extensive experience in security
consulting spans over two decades, making him a
valuable asset to any organization. His exceptional
knowledge and expertise in integrating technology
strategies with business objectives enable him to drive
innovation and achieve operational excellence. Anil's
unique skill set includes managing complex IT
infrastructures and security operations, which
consistently yields tangible results. He has earned a
reputation as a visionary in the field of security
consulting. His practical experience, allows him to
execute security strategies with precision and
efficiency. Overall, Anil is a highly skilled and
experienced security consultant who can bring a wealth
of knowledge and expertise to any organization.
EXPERIENCE
Specializes in IT and security operations
management, team leadership, and budget
optimization.
Consults in disaster recovery planning and business
resiliency strategies for robust IT infrastructure.
Oversees cost-saving data center and office build -
outs for operational efficiencies.
Leads cloud and security initiatives, including
implementing cloud services, CRM/ERP systems, and
advanced cybersecurity measures.
Provides strategic consulting services to foster IT
innovation, transforming organizational IT
landscapes, and contributing to company growth.
JASON FEE
Solutions Engineer
PROJECT ROLE
Jason has more than 20 years of experience in multiple
levels of IT administration and governance, including 10
years in the Managed Security and Service Provider
industry. As a Solutions Engineer, he draws upon his
knowledge and experience with the ability to translate
complex cybersecurity concepts into compelling and
actionable information for business leaders. Jason holds
a degree in Cloud Computing from Western Governors
University, as well as many industry -standard security,
network, and cloud infrastructure certifications.
EXPERIENCE
Specializes in systems, cloud, and network
infrastructure, including the following, for clients
ranging from educational institutions, nonprofits,
small business, and the Fortune 500:
Systems and Network Engineering
Strategic Planning
Project Management
Large -Scale Infrastructure Design &
Implementation
Guides businesses through the evolving security and
compliance landscape.
Designs custom security solutions for new-age threat
vectors and ever-changing business security needs.
JOHN RIZK
Solutions Engineer
PROJECT ROLE
John is a highly experienced IT professional with over 20
years of expertise in the industry. He has a proven track
record of providing exceptional customer service and
satisfaction, and his excellent communication skills
allow him to effectively interact with clients and team
members alike. John's skills in various areas of
Information Technology and Cybersecurity make him
the perfect candidate for providing IT support services.
He is well -versed in software implementation and
training, system integration, cloud administration, data
collection and analysis, and risk management and
mitigation, among others. John's strong business
acumen and technical know-how enable him to deliver
reliable and cost-effective technology solutions to
businesses of all sizes.
EXPERIENCE
Construction, maintenance, and repair of all major
desktops/laptops
Audio and Video collaboration, design, installation,
and maintenance
Maintain 0365 environment to include Azure AD,
Intune, Exchange Online, Teams, and OneDrive
0365 Configuration, administration, guest
access setup, federation, and more
Expert troubleshooting, investigation, and resolution
skills
HEATHER FOX
Operations Manager
PROJECT ROLE
Heather plays a crucial role in our organization by
facilitating cross-channel feedback from customers and
employees to management and executive teams and
ensuring that all activities adhere to local, federal,
industry, and company standards. She also observes,
reviews, and analyzes processes to identify
inefficiencies and areas where improvements could be
made. She will design and maintain clear operational
guides to ensure consistency of operations and deliver
reports to department heads, management teams, and
boards of directors to provide insight into the
organization's overall efficiency. In addition, Heather
collaborates with management and executives to set
departmental and organization -wide goals. In addition,
she will create processes, assess incident reports,
develop and implement crisis communication plans,
create compliance reports, support audits, measure
SOC performance metrics, and provide information on
security operations to executive management.
EXPERIENCE
Manage incident response, escalation, and daily
operations of the Security Operations Center
Support security leadership and team members as
needed.
Manage the technical implementation and
maintenance of security products and tools.
Monitor and report weekly and monthly SLA and KPI
metrics.
Develops and maintains procedures and rulebooks to
support the Security Operations Center and Security
Engineering teams.
KARUNASHIPPER
Project Manager
PROJECT ROLE
Karuna Shipper is an experienced cybersecurity
professional specializing in governance, risk
management, and compliance. She excels in assessing
IT and cybersecurity controls against industry -specific
frameworks such as NIST 800-171, ISO, CMMC 2.0, and
CIS. With her expertise in conducting security
assessments, risk assessments, and vulnerability
assessments, Karuna can determine regulatory
compliance standards for clients. She has a proven track
record of working with current threat actor capabilities,
tactics, and techniques using frameworks such as the
MITRE ATT&CK Framework. As a Project Manager at
Alliant Cybersecurity, Karuna is responsible for
developing project plans and providing status
presentations for client communication and service.
EXPERIENCE
Karuna previously worked on a team sponsored by the
Joint Chiefs of Staff J8 and the National Security
Agency on an information campaign project
She has advised numerous clients outside of projects
on several major cybersecurity compliance
frameworks.
Karuna has managed projects for several service lines,
such as Vulnerability Management, Penetration Tests,
Cybersecurity Risk Reviews, and compliance readiness
assessments.
Bachelors of Arts and Sciences in International Affairs
and Arabic