KCBK BD 3779 Supplier
KCBK BD 3779 Supplier
KCBK BD 3779 Supplier
Background
The Group's vision is to be the preferred financial solutions provider in Africa with global
reach. The Group has 10 subsidiary companies across the East African Region in KCB
Kenya, Uganda, Rwanda, Tanzania, Burundi, DRC and South Sudan.
The information in this document and its appendices and attachments is confidential
and is subject to the provisions of our non-disclosure agreement and should not be
disclosed to any external party without explicit prior written consent of the Group.
This document constitutes the formal Request for Proposals (RFP) for Supply,
implementation, and Maintenance of a Security Awareness and Attack Simulation
solution and is being availed on open tender basis and is open for bids from
companies that meet the requirements stated herein.
This document constitutes the formal Request for Proposals (RFP) for SUPPLY,
IMPLEMENTATION AND MAINTENANCE OF A SECURITY AWARENESS AND
ATTACK SIMULATION SOLUTION for KCB Group. The detailed requirements are
given in the requirements section of this RFP.
The Financial proposal shall clearly indicate the total cost of ownership, but should be
broken down to clearly indicate the cost of Equipment (if any), installation (professional
services) & commissioning charges, support charges. The total cost should be inclusive
of all applicable taxes. A two-stage procedure will be adopted by the Bank for
evaluating the proposals, with the technical evaluation of all proposals received in time
being completed prior to any financial proposal being evaluated.
All correspondence related to the contract shall be made in English. Any clarification
sought by the bidder in respect of the project shall be addressed at least 4 days (4)
calendar days before the deadline for submission of bids, in writing to the Head, Group
Supply Chain Management. The queries and replies thereto shall then be circulated to
all other prospective bidders (without divulging the name of the bidder raising the
queries) in the form of an addendum, which shall be acknowledged in writing by the
prospective bidders. Enquiries for clarifications should be sent via the procurement
sourcing system on the message menu.
Terms of Bidding
Assuming that the contract is satisfactorily concluded the bidders shall be expected to
install, test, document and commission the solution within the duration determined after
the final agreement is reached and/or purchase order is given.
The Bank reserves the right to accept or to reject any bid, and to annul the bidding
process and reject all bids at any time prior to the award of the contract, without thereby
incurring any liability to any Bidder or any obligation to inform the Bidder of the grounds
for its action.
All costs pertaining to the preparation of a proposal and negotiations of a contract shall
be borne by the firms submitting proposals. The Bank will in no case be responsible or
liable for those costs, regardless of the conduct or outcome of the bidding process.
All bids in response to this RFP should be expressed in KES. However, proposals in
USD currency may be accepted for foreign entities. Costs should be inclusive of VAT,
withholding taxes and other applicable taxes where necessary).
The bid deadline for this RFP is indicated in the sourcing portal as 18th October 2024
By 5pmEAT
The bidder shall, in their offer (Financial Proposal), detail the proposed costs. No price
escalation under this contract shall be allowed. The Bank shall not compensate for any
costs incurred in the preparation and submission of this RFP.
At any time prior to the deadline for submission of bids, the Bank, for any reason,
whether at its own initiative or in response to a clarification requested by a prospective
Bidder, may modify the bidding documents by amendment. All prospective Bidders that
have received the bidding documents will be notified of the amendment in writing, and it
will be binding on them. To allow prospective bidders reasonable time to take any
amendments into account in preparing their bids, the Bank may at its sole discretion
extend the deadline for the submission of bids based on the nature of the amendments.
The prices and rates in the financial offer will be deemed to be inclusive of all taxes and
any other incidental costs.
Correction of Errors.
Bids determined to be substantially responsive will be checked by the Bank for any
arithmetical errors. Errors will be corrected by the Bank as below:
▪ Where there is a discrepancy between the amounts in figures and in words, the
amount in words will govern, and
▪ Where there is a discrepancy between the unit rate and the line total resulting from
multiplying the unit rate by the quantity, the unit rate as quoted will govern.
The price amount stated in the Bid will be adjusted by the Bank in accordance with the
above procedure for the correction of errors.
Technical proposals will be evaluated prior to the evaluation of the financial bids.
Financial bids of firms whose technical proposals are found to be non-qualifying in
whatever respect may be returned unopened.
https://eoin.fa.em3.oraclecloud.com
This document has important legal consequences. The information contained in this document is proprietary of KCB
Bank Kenya Limited. It shall not be used, reproduced, or disclosed to others without the express and written consent
of KCB Bank Kenya Limited.
Table of Contents
1 Overview.......................................................................................................................................................................6
1.1 General Information..............................................................................................................................................6
1.2 Schedule................................................................................................................................................................6
1.3 Negotiation Controls.............................................................................................................................................6
1.4 Response Rules.....................................................................................................................................................6
1.5 Terms....................................................................................................................................................................6
1.6 Attachments..........................................................................................................................................................6
2 Requirements................................................................................................................................................................7
2.1 Section 1. Company Profile................................................................................................................................12
2.2 Section 2. Attack Simulation..............................................................................................................................14
2.3 Section 3. Cyber Security Awareness Training.................................................................................................17
2.4 Section 4. Program Measurement and Reporting...............................................................................................19
2.5 Section 5. Scalability and Performance..............................................................................................................22
2.6 Section 6. Portability: Cloud, Offline and Mobile access...................................................................................23
2.7 Section 7. Integration..........................................................................................................................................24
2.8 Section 8. Non-functional requirements.............................................................................................................24
2.9 Section 9. Project Management Deliverables.....................................................................................................26
2.10 Section 10. Post Implementation Support.........................................................................................................29
2.11 Section 11. Complete Technical Proposal........................................................................................................29
3 Lines............................................................................................................................................................................30
3.1 Line Information.................................................................................................................................................30
3.2 Line Details.........................................................................................................................................................30
3.2.1 Line 1............................................................................................................................................................30
3.2.2 Line 2............................................................................................................................................................30
3.2.3 Line 3............................................................................................................................................................31
3.2.4 Line 4............................................................................................................................................................31
3.2.5 Line 5............................................................................................................................................................31
3.2.6 Line 6............................................................................................................................................................31
3.2.7 Line 7............................................................................................................................................................32
3.2.8 Line 8............................................................................................................................................................32
4 Appendix: Alternate Lines..........................................................................................................................................33
4.1 Instructions for Alternate Lines..........................................................................................................................33
4.2 Alternate Lines Template...................................................................................................................................33
1 Overview
1.1 General Information
Title SUPPLY, IMPLEMENTATION AND MAINTENANCE OF A SECURITY
AWARENESS&ATTACK SIMULATION
Buyer Janet Kamau Outcome Purchase Order
E-Mail JMKamau3@kcbgroup. Two Stage Evaluation Yes
com
This is a two stage negotiation and all responses will be evaluated in two stages.
1.2 Schedule
Preview Date Open Date 10/4/24 5:06 PM
Close Date 10/18/24 5:00 PM Award Date
Time Zone Eastern African Time
Lines Settings
Rank Indicator 1,2,3...
Ranking Method Price only
1.4 Response Rules
This negotiation is governed by all the rules displayed below.
Rule
Suppliers are allowed to respond to selected lines
Suppliers are required to respond with full quantity on each line
Suppliers are allowed to revise their submitted response
1.5 Terms
2 Requirements
*Response is required
3.1. Introduction
Specific terms of contract shall be discussed with the bidder whose proposal will be accepted by the Bank. The
resulting contract shall include but not be limited to the general terms of contract as stated below from 3.2 to 3.23.
Following the opening and evaluation of proposals, the Bank will award the Contract to the successful bidder or
multiple bidders whose bids have been determined to be substantially responsive. The Bank will communicate to the
selected bidder its intention to finalize the draft conditions of engagement submitted earlier with his proposals. After
agreement will have been reached, the successful Bidder shall be invited for agreement and signing of the Contract
Agreement to be prepared by the Bank in consultation with the Bidder.
These General Conditions (sections 3.2 to 3.23) shall apply to the extent that they are not superseded by provisions in
other parts of the Contract that shall be signed.
Bidders are requested to hold their proposals valid for ninety (90) days from the closing date for the submission.
The prices quoted for the service and subsequently agreed and incorporated into the contract shall be held fixed for the
contract period.
Delivery and performance of the solution shall be made by the successful Bidder in accordance with the time schedule
as per Agreement.
If at any time during the performance of the Contract, the Bidder should encounter conditions impeding timely
delivery and performance of the Solution, the Bidder shall promptly notify the Bank in writing of the fact of the delay,
it's likely duration and its cause(s). As soon as practicable after receipt of the Bidder's notice, the Bank shall evaluate
the situation and may at its discretion extend the Bidder's time for performance, with or without liquidated damages, in
which case the extension shall be ratified by the parties by amendment of the Contract.
Except in the case of "force majeure" as provided in Clause 3.14, a delay by the Bidder in the performance of its
delivery obligations shall render the Bidder liable to the imposition of liquidated damages pursuant to Clause 3.8.
The contract resulting out of this RFP shall incorporate suitable provisions for the payment of liquidated damages by
the bidders in case of delays in performance of contract.
All services must be delivered and implemented within agreed timelines after the bank issues a purchase order. Any
delayed in commencement of the execution of the contract will attract a penalty which will be specified in the
agreement signed by both parties.
Notwithstanding the provisions detailed in this section above, the bank reserves the right to terminate the award at any
time and take corrective measures as necessary to protect the bank interests, which interest are solely determined by
the bank.
The Contract shall be written in the English Language. All correspondence and other documents pertaining to the
Contract which are exchanged by the parties shall also be in English.
This agreement arising out of this Request for Proposal shall be governed by and construed in accordance with the
laws of Kenya and the parties submit to the exclusive jurisdiction of the Kenyan Courts.
The Bidder is obliged to work closely with the Bank's staff, act within its own authority, and abide by directives issued
by the Bank that are consistent with the terms of the Contract.
The Bidder will abide by the job safety measures and will indemnify the Bank from all demands or responsibilities
arising from accidents or loss of life, the cause of which is the Bidder's negligence. The Bidder will pay all indemnities
arising from such incidents and will not hold the Bank responsible or obligated.
The Bidder is responsible for managing the activities of its personnel, or subcontracted personnel, and will hold itself
responsible for any misdemeanors. The Bidder will not disclose the Bank's information it has access to, during the
course of the work, to any other third parties without the prior written authorization of the Bank. This clause shall
survive the expiry or earlier termination of the contract.
In addition to providing Bidder with such information as may be required by the bidder to complete the project, the
Bank shall,
a) Provide the Bidder with specific and detailed relevant information concerning the contract.
3.12. Confidentiality
The parties undertake on behalf of themselves and their employees, agents and permitted subcontractors that they will
keep confidential and will not use for their own purposes (other than fulfilling their obligations under the contemplated
contract) nor without the prior written consent of the other disclose to any third party any information of a confidential
nature relating to the other (including, without limitation, any trade secrets, confidential or proprietary technical
information, trading and financial details and any other information of commercial value) which may become known
to them under or in connection with the contemplated contract. The terms of this Clause shall survive the expiry or
earlier termination of the contract.
a. Neither Bidder nor Bank shall be liable for failure to meet contractual obligations due to Force Majeure.
b. Force Majeure impediment is taken to mean unforeseen events, which occur after signing the contract with
the successful bidder, including but not limited to strikes, blockade, war, mobilization, revolution or riots, natural
disaster, acts of God, refusal of license by Authorities or other stipulations or restrictions by authorities, in so far
as such an event prevents or delays the contractual party from fulfilling its obligations, without its being able to
prevent or remove the impediment at reasonable cost.
c. The party involved in a case of Force Majeure shall immediately take reasonable steps to limit consequence
of such an event.
d. The party who wishes to plead Force Majeure is under obligation to inform in writing the other party without
delay of the event, of the time it began and its probable duration. The moment of cessation of the event shall also
be reported in writing.
e. The party who has pleaded a Force Majeure event is under obligation, when requested, to prove its effect on
the fulfilling of the contemplated contract.
3.14. Payments
The Bank's standard payment terms is forty five (45) days from the date of invoice. Please note that KCB shall only
make payments through a KCB Account and thus you are encouraged to open a KCB account in case you do not
have one.
Once the bids are opened, bid analysis will commence and vendors may be informed when their bid has been short-
listed. Short listed vendors will be invited to demonstrate their proposal if need be and to make arrangements for site
visits. In the event that the bank may need to visit client site, vendors will be notified in writing. The bank may also
make surprise unannounced visits to the vendors offices to verify any information contained in the bid document. All
visits are at the discretion of the bank.
It is a condition of the bank that the vendor guarantees the sufficiency, and effectiveness of the service model proposed
to meet the bank requirements as outlined in this document. The Bank will hold the vendor solely responsible for the
accuracy and completeness of information supplied in response to this tender. The bank will hold the vendor
responsible for the completeness of the service model proposed and that were the vendor to be awarded the tender,
they would implement the service model without any additional requirements from the bank.
The bank will not make any payments in advance. The Bank will issue a Purchase Order for all the services ordered.
The Purchase Order will be paid within 45 days after as agreed upon aforesaid herein. Any payments for the
maintenance services will be subject to a contract to be agreed with the vendor. The bank will not accept partial
deliveries, and neither will the bank make partial payments.
The Bank reserves the right to reject any or all the tender bids without giving any reasons and the Bank has no
obligation to accept any offer made. The Bank also reserves the right to keep its selection and selection criteria
confidential. Bids not strictly adhering to tender document conditions may not be considered by the Bank whose
decision on the matter shall be final. The vendor's terms and conditions will not form part of any contract with the
Bank in relation to this tender. Bids not strictly adhering to RFP conditions may not be considered by KCB whose
decision on the matter shall be final.
The vendor agrees to take overall responsibility for any services rendered; regardless of whether third parties engaged
by the vendor or the vendor himself carry them out
3.20. Delivery
The delivery timelines shall be as specified in the scope of work, bank will not accept any partial deliveries.
The supplier covers all risks of loss and damage to any equipment for the implementation of the solution, until the
equipment has been delivered to the premises of KCB. Once the equipment /solution has been installed and tested the
responsibility is transferred to KCB.
Does your company have a code of conduct/Ethics policy? If so, please attach a copy
*2.
Evidence of of any quality assurance accreditation that your company holds e.g. ISO 9000
certifications. If no accreditation held, please provide a description of your current quality system
*3.
Attach your company profile
*5.
*6.
Associated companies if any
*7.
Director(s)/ Principals ID Number
Attachments:
File Name or URL Type Description
DECLARATION FORM . File
pdf
Select one of the following:
a. SIGN AND SUBMIT DECLARATION FORM (Response attachments are required)
Comments:
*9.
PLEASE READ ACKNOWLEDGE AND SIGN CONFORMANCE TO THE VENDOR CONFLICT OF
INTEREST DISCLOSURE FORM
Attachments:
File Name or URL Type Description
CONFLICT OF File
INTEREST STATEMENT
Select one of the following:
a. ACKNOWLEDGE CONFORMANCE TO THE VENDOR CONFLICT OF INTEREST DISCLOSURE FORM
(Response attachments are required)
b. DOES NOT ACKNOWLEDGE CONFORMANCE TO THE VENDOR CONFLICT OF INTEREST
DISCLOSURE FORM (Response attachments are required)
Comments:
*1. Solution must provide all required functionalities to send phishing emails (Campaign) to a large number of internal
users (employees, contractors, consultants) and third parties on their corporate mailbox.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*2. Distribution: Solution must allow planning of campaigns in advance and schedule messages to be sent in batches on a
deferred basis, over a certain period (period should also be customizable).
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*4. Solution must provide phishing templates drawn from real-world threats employing updated social engineering
techniques, classified according to different degrees of complexity and applicable to the African continent. Templates
should be customizable to include some user's details, such as name and position.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*5. Solution must support capture of system user details/metadata statically/manually and dynamically from a central
directory e.g. Active Directory to allow customized distribution of campaigns based on that data. Additional custom
fields must also be possible to allow tagging or categorization of system users based on custom attributes e.g
assessment outcome, cybersecurity training completion
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*6. The solution vendor, as part of the license, must support development of customized content/templates.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*7. Solution should allow the definition KCB branded emails/payload/content independent from the standard templates
provided by the solution.
*8. Solution should provide for advanced attack simulation techniques e.g USB drive testing, QR codes
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*9. Solution should allow for auditing of simulation-recipient interaction with an attack simulation payload.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*10. Solution should provide integrations that allow staff to report phishing simulation through the platform for further
processing e.g sending positive reinforcement notifications
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*11. The solution must be able to target staff with a certain campaign according to multiple criteria including:
*12. The solution should leverage on machine learning capabilities to recommend and deliver informed and personalized
attack simulation templates based on training and assessment history
Select one of the following:
a. Yes (Response attachments are required)
*13. The solution should provide an assessment for security awareness proficiency to measure understanding of cyber
security concepts
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*14. The solution should support table-top exercise scenarios to aid in the training of cyber security incident response and
recovery teams such as ransomware attacks.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
*15. The solution should have a mechanism to integrate live threat data and adapt attack simulation campaigns accordingly,
rather than relying on static phishing templates.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*2. The solution should provide Cyber Security Awareness Interactive Training Modules, with imagery and interactive
elements that are region-specific, localized beyond language translation.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*3. The solution should provide Interactive Cyber Security Awareness Games like crosswords, trivia's, puzzles etc
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*4. The solution should support downloading of imagery, videos or documents for customization and sharing using other
platforms such an Learning management system.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*5. The solution should provide gamification of learning, with leaderboards, badges and downloadable certificates
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
*6. The tool should avail varied and engaging content that can be consumed by individuals on varying concept-specific
proficiency and job role basis.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*7. The solution should enforce attention from users by using various techniques including active content that the learners
have to interact with as they progress in the course, pause when a user clicks away from running content, knowledge
checks, captivating as well as relatable content.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*8. The solution should allow automated training assignment based on cyber security behaviors, assessment performance
and administrator manual configuration
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*9. The solution should allow the upload of custom content, how-to guides, and cyber security newsletters
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*10. The solution should allow custom upload, assignment, and attestation/acknowledgement of policy documents with
auditable interaction
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*11. The solution should leverage machine learning capabilities to recommend and deliver personalized training content
based on training and assessment history of an individual
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*12. The solution should allow to plan security training campaigns in advance and schedule content to be sent in batches on
a deferred basis, over a certain period (period should also be customizable).
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*13. The solution should frequently send reminders on incomplete post-simulation training to staff
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
on security culture
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*2. Solution must support customized reporting based on attributes captured from a central staff database as well as
additional custom fields.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*3. The platform should be able to report on but not limited to the following aspects of cyber security awareness training:
*4. The solution should provide an individual risk score for users based on the following:
*5. The solution should provide an organization-wide risk score calculated based on all data available on the platform
Select one of the following:
*6. The solution should, on a single pane of glass, provide a user report card detailing a personal risk score, attack
simulation performance, training performance and a timeline of events.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*7. The solution should be able to provide a report on but not limited to the following aspects related to attack simulation
and assessment:
*8. The solution should provide an organizational ranking against industry benchmarks and performance of other
organizations in the same industry and relative size in employee count and cyber exposure
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*9. The solution should provide a periodic(monthly) exposure check for staff against data breaches
*10. The solution should provide a periodic(monthly)report on look-alike domains (for all KCB Group domains) that can be
used against staff and customers as well as leaked passwords(Of KCB and KCB related accounts)
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*11. The solution should allow for more detailed, dynamic, and customized reports with user-defined filters and integration
with third-party BI tools to accommodate evolving KCB needs.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*2. The system should allow for modifications on the settings by the administrator without the need for a change to be
done by the Vendor.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*3. The system should support sending emails to a high number of addresses with attachments.
Select one of the following:
a. Yes (Response attachments are required)
*4. The solution should support rapid scaling during high-demand periods, such as during the group -wide campaigns or
assessments.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*2. The system should be a web application that provides for a cross-platform, cross-browsing, and mobile-responsive
solution.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*3. The system should have the capability to be hosted on cloud that will enable easy access to all the Subsidiaries thus
facilitating centralized management and reporting.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*4. The system should allow users to connect/access to system even when not connected to the corporate network.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
via Application Programming Interfaces (APIs) or other secure integration technologies for authentication,
authorization and forwarding of platform activities.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*2. The system API should support the Representational State Transfer (REST), JSON and XML data formats.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*2. Illustrate proposed training plan for system users and administrators, including various level of certifications.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*3. The system should multi-domain deployment i.e the solution should be able to onboard staff from different domains to
allow access to training content as well receiving assessments and notifications on email.
Select one of the following:
a. Yes (Response attachments are required)
*4. The system should be in line with the context of the local East Africa market-to-be. This includes support for content
served in various languages used in the countries that KCB Group operates in including but not limited to English,
French and Swahili.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*5. The date format must follow: "date-month-year" format and should be based on the East Africa and Central African
Time zone.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*9. Provide the measures taken to protect sensitive data relating to the organization, staff, contractors and third parties.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*2. Provide the number and times similar projects were undertaken by individual members of the project team and the
roles undertaken.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*3. Describe in detail the level and model of support including your resourcing and RACI matrix across delivery work-
streams
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*4. Attach at least THREE (3) testimonials citing relevant experience of successful implementations undertaken by the
proposed project resources and the roles played. (Attach evidence for the respective area of interest)
*5. Attach detailed resumes of the all the proposed resources. It is expected that the resources will not change until the
project is fully implemented
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*6. Provide evidence of relevant certifications and registration by professional bodies for the proposed team
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*7. Provide a detailed project plan clearly indicating expected deliverables, resources required, milestones, outcomes, and
time schedules for the successful completion of the project
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*8. Provide confirmation to mobilize resources to commence the project within 2 weeks of issuance of the award letter
from KCB.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*9. Provide confirmation whether you can deliver the project with all project resources working on site. The project
implementation site is in Nairobi, Kenya.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*10. Provide confirmation that the proposed project resources MUST be dedicated to the project.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*11. Provide any dependencies and pre-requisites necessary for successful project implementation and the rationale thereof.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*12. Provide the Test Strategy, the Test plan & approach, indicate the tools and instrumentation for conducting and
managing QA & testing, and resources required.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*13. Provide confirmation that you manage the UAT Tests, defect triaging and defect resolution for all UAT phases.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*14. Provide confirmation that you will support the System Integration Testing (SIT) for all integration areas. Expected
integrations are, but not limited to:
- AD
- Azure AD
- Email
- SIEM
- Power BI
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
*15. Provide confirmation that you will support the User Acceptance testing (UAT) which will be conducted by the end-
users and techno-functional analysts to validate whether to accept the project deliverables.
Select one of the following:
a. Yes (Response attachments are required)
b. No (Response attachments are optional)
Comments:
1. Complete Technical Proposal in PDF format covering all the combined technical requirements in response to this
RFP.
2. Commercial proposal in 2 formats : 1) Summarized commercial proposal as per the format laid out in section 1.4.1.2
of the RFP document. 2) Detailed proposal/BOM in your company letterhead
NB//
In the questions response, bidder must Attach supporting document for that specific requirement and indicate
reference/page number where the details can be located on their detailed technical proposal. Where
applicable attach an evidence/screenshot of that specific capability of the system. Bidder who will not
adhere to this criteria will automatically be disqualified.
In their questions responses under the technical requirements section, a bidder must make reference to their technical
proposal attachment. and indicate the page number reference to the technical proposal document
Please note it is a mandatory requirement to respond to ALL questions as laid out in the requirements section.
Questions without responses will attract no scores
Select one of the following:
a. Yes (Response attachments are required)
b. No
3 Lines
Item Revision
Allow Alternate Lines Yes Alternate Line Provided Yes No
Requested Date Location Kencom House,Moi
Avenue
P.O. Box 48400 -
00100
NAIROBI
KENYA
Start Price (KES)
3.2.6 Line 6 Logistics costs and other costs (explain other costs)
To provide an alternate line, see appendix.
Category Name Software System
Purchase
Item Revision
3.2.7 Line 7 Annual Maintenance / Support Costs (hardware and software costs) year 2
To provide an alternate line, see appendix.
Category Name Software System
Purchase
Item Revision
Allow Alternate Lines Yes Alternate Line Provided Yes No
Requested Date Location Kencom House,Moi
Avenue
P.O. Box 48400 -
00100
NAIROBI
KENYA
Start Price (KES)
3.2.8 Line 8 Annual Maintenance / Support Costs (hardware and software costs) year 3
To provide an alternate line, see appendix.
Category Name Software System
Purchase
Item Revision
Allow Alternate Lines Yes Alternate Line Provided Yes No
Requested Date Location Kencom House,Moi
Avenue
P.O. Box 48400 -
00100
NAIROBI
KENYA
Start Price (KES)
Alternate lines are allowed for some negotiation lines. For these lines, you can propose one or more alternatives by
entering information for each alternate line in the format given below. Print and insert multiple copies as per your
requirement.
Negotiation
Line
(Number and description of the negotiation line for
which you have an alternative)
Example:1-xxxxxx
where xxxxxx is the line description of first negotiation
line.
Alternate Line Number
(Enter only numbers in sequence starting with 1 for
every alternate line)
Alternate Line Description
Response Price
(For a negotiation line with cost factors, enter your line
price in the cost factors table)
Response Quantity
UOM
Promised Date
Note to Buyer