|
|
(4 intermediate revisions by 2 users not shown) |
Line 1: |
Line 1: |
− | PURPOSE <br />
| |
− | List of questions/discussion points for the project.<br>
| |
| | | |
− | Are these questions for use during the market survey or product evaluation steps of an acquisition? --[[User:Walter Houser|Walter Houser]] 20:00, 16 April 2010 (UTC)
| |
− |
| |
− | 1. Describe the implementation process for your product/service - is software or hardware required? Vendor training? Consulting? Any additional personnel costs on customer side? How many personnel are needed? What are their skill sets and expereince levels. --[[User:Walter Houser|Walter Houser]] 20:16, 16 April 2010 (UTC) The time to implement is meaningful only in the context of the amount and quality of resources and their costs.
| |
− |
| |
− | 2. Do you have a training and support program for your product or service? Is it required? If so, what is the typical amount of time and cost associated with training/education? --[[User:Walter Houser|Walter Houser]] 20:23, 16 April 2010 (UTC) The saleman will always answer yes to "Can you...?" questions.
| |
− |
| |
− | 4. What is the most challenging element ...? Too softball a question. --[[User:Walter Houser|Walter Houser]] 20:08, 16 April 2010 (UTC) Ask instead
| |
− |
| |
− | 4. What are the critical success factors for ...
| |
− |
| |
− | ADDITIONAL LINKS <br />
| |
− | <li />http://zeltser.com/security-assessments/security-assessment-rfp-cheat-sheet.html
| |
− |
| |
− | <br>
| |
− | <br>
| |
− | 5. Does the product/service integrate with any IPS solutions(custom filters)? [[User:Joe Aguirre|Joe Aguirre]] 20:10, 19 April 2010 (UTC)
| |
− | <br>
| |
− | <br>
| |
− | 6. Related to question #11, asking how "all existing vulnerabilities" are discovered may need to be revisited. It may make more sense to ask how the product/solution increases its vulnerability identification rate relative to the competition. [[User:Joe Aguirre|Joe Aguirre]] 20:10, 19 April 2010 (UTC)
| |