File #: 11-540    Name:
Type: Minutes Status: Passed
File created: 5/17/2011 In control: Board of Supervisors
On agenda: 5/17/2011 Final action: 5/17/2011
Title: a. Approve and authorize on behalf of the Information Technology Department, the Monterey County a. Approve and authorize on behalf of the Information Technology Department, the Monterey County
Attachments: 1. Signed Board Report, 2. Completed Board Order, 3. Fully Executed Agreement QualysGuard A-11986






SIGNED BOARD REPORT"?|E???MONTEREY COUNTY BOARD OF SUPERVISORS
MEETING: May 17, 2011 Consent AGENDA NO: a19
SUBJECT: a. Approve and authorize on behalf of the Information Technology
Department, the Monterey County Contracts/Purchasing Officer to sign
the Qualys, Inc. Guard Tool Software Application End User Agreement,
for security vulnerability identification and remediation, in an amount not
to exceed $97,574 for the period of July 1, 2011 through June 30,2012; and
b. Accept Non-Standard County Liability and Indemnification Provisions as
recommended by the Director of Information Technology.
DEPARTMENT: Information Technology Department
RECOMMENDATIONS:
It is recommended that the Board of Supervisors:
a. Approve and authorize, on behalf of the Information Technology Department, the Monterey
County Contracts/Purchasing Officer to sign the Qualys, Inc. Guard Tool Software
Application End User Agreement, used for security vulnerability identification and
remediation, in an amount not to exceed $97,574 for the period of July 1, 2011 through June
30,2012; and
b. Accept Non-Standard County Liability and Indemnification Provisions as recommended by the
Director of Information Technology.
SUMMARY:
This agreement will compensate Qualys, Inc. for an information security vulnerability
identification and remediation system to perform regular and thorough vulnerability management
activities and audits throughout the County, spot new vulnerabilities immediately, and proactively
remediate them to protect County information assets against vulnerability exploitation. In the first
two months of 2011 alone, there were more than 106,000 instances of vulnerabilities identified
within the County, and over 130,000 attack attempts against the County to exploit known
vulnerabilities. The County used this system for the past five years, and it has been the primary
cause of a significant drop in the number of vulnerabilities present on County workstati...

Click here for full text