Display EOI27082015

For more detailed information on a particular section refer to the help specific to that section.

Times presented in this website are for Queensland (without daylight saving).

Detailed Help (Clicking detailed help will open a new browser window)
Endpoint Data Integrity and Business Continuity Solution

Issued by The University of Queensland

Expression of Interest

Status: Shortlisted
Mega Category: Information and communication technology
Number: EOI27082015
Released: Thu, 10 Sep 2015 at 12:12PM Brisbane, Queensland
Closing: Thu, 1 Oct 2015 at 2:00PM Brisbane, Queensland
UNSPSC: Information Technology Broadcasting and Telecommunications - (100%)
Region/s: Cairns & Far North Queensland
Mount Isa & North West Region
The Central West
South West & Darling Downs
Mackay Whitsunday Region
Wide Bay Burnett
South East Queensland

Section 1

Tender Overview

The Queensland Brain Institute (QBI) was established as a research institute of the University of Queensland in 2003. The Institute is now operating out of a new state-of-the-art facility and houses 33 Principal Investigators with strong international reputations. The QBI is one of the largest neuroscience institutes in the world dedicated to understanding the mechanisms underlying brain function. Details of the current QBI interdisciplinary research programs can be found at http://www.qbi.uq.edu.au.

The organisation is seeking the invitee’s response for the goods and/or services as outlined in section 3 of the invitation. The organisation is looking to gain a more detailed understanding of the supplier market and range of solutions that may be available. Hence the EOI is an important stage of the procurement process.

QBI’s primary requirement is a scalable, cost effective, sustainable solution to backup endpoint data on a daily basis such that in the event of a user-device disaster (disk failure, data loss, hardware theft, hardware damage etc) business continuity for the user and their data may be maintained. QBI seeks a high level of assurance, business robustness and corporate compliance. The secondary requirement is a means to provide end-to-end device encryption deployment and management for endpoint devices. The tertiary requirement is a ‘track and trace’ combined with ‘remote wipe’ functionality.

More about tendering here

Section 2

Still need help? Contact Us

users Ashleigh Ferguson DISABLED
phone 3365 1046
email a.ferguson1@uq.edu.au

Section 3

Here is the detail

If there are no documents listed in this section, please refer to Section 1 Tender Overview.

Documents can not be downloaded once Tender has closed.