You are on page 1of 28

Instructions

Step 1 Review all tabs in this questionnaire.

Provide answers in the Compliance column - Y, N, or N/A.


For non-compliance questions, answer Y if it applies to your
Step 2 solution or N if it does not. Provide details in the Response column.
Step 3 Provide answers in the Response column for each question.

Notes
Use this template to create a robust RFP to determine the best Digital
Workspace solution for your needs.
Choose the tabs and questions you want or use as-is.
Add and modify questions to meet your IT and business needs.
Supplier Profile
Compliance
# Question (Y, N, N/A)
1 Legal Company Name
2 Company Address
3 General Description of your Company
4 Years in business
5 Specify your revenue for the past 3 years
6 Provide a minimum 3 years of Company Financial Information
7 Report any significant mergers/acquisitions over the last 5 years
8 Do you have any Fortune 500 companies as your clients?
9 What percentage of your annual revenue would this contract represent?
Response
Solution Overview

Compliance
# Question (Y, N, N/A)
1 How does the solution address employee experience?

2 Does the solution aggregate content, data, apps, desktops, and identity?
3 How does the solution provide guidance & assistance?
Does the solution provide easy-to-use pre-built microapps and allow you to
4 build microapps?
5 Does the solution provide an omnichannel experiences?
Solution Benefits
6 How does the solution organize information?
7 How does the solution guide workflows?
8 How does the solution automate work?
9 Does the solution improve business agility?
10 Does the solution modernize IT?
11 How does your solution compare to other work platforms?
How does your solution compare to workstream collaboration solutions like
12 Microsoft Teams, Facebook, Slack?
How often are product upgrades and patches made to your current
13 platform?
Architecture
14 Do you provide the solution as a service?
15 Do you host the solution?

16 Provide a high-level diagram of the hosting solution and process flows.


Does your solution require any on-premise infrastructure for the hosting
17 side of the environment?
18 Are customers provided separate QA sites?
19 What are the system requirements?
20 How is customer data encrypted in the hosted environment?
Do the hosting environment and solution allow for role-based access
21 control?
22 Can your hosting environment scale as our needs grow?
End-User Experience
23 How does a user get access to their workspace?
24 Can an end-user set up favorite apps/microapps?
25 What authentication methods does your solution support?
26 Is multi-factor authentication supported? If so, how?
27 Does your solution support biometric authentication?
28 Is single-sign-on supported?
29 Can the company logo be added?
30 Can the pre-logon and post-logon screen be customized?
31 Can the colors be changed?
32 What devices are supported with your solution?
Integrations
33 Does the solution integrate with other products of the vendor?
Can your solution integrate with on-premises Citrix Virtual Apps and
34 Desktops?
35 What out-of-the-box integrations are available?
36 Does your solution integrate with third-party solutions?
37 Can the solution integrate via REST API, JSON, and XML?
Administration
38 Is RBAC supported?
39 What kind of monitoring information is available?
Security
40 Do you back up customer data?
Describe data segregation and security provisions as they relate to
41 customer data.
42 Where is the hosting solution located?
43 Do you integrate with our Active Directory for authentication?
44 How is customer data encrypted in your hosted environment?

45 Describe your security best practices for your hosting environment.


Describe your business continuity and disaster recovery programs for the
46 hosting environment.
Do you have the capability to continuously monitor and report the
compliance of your infrastructure against your information security
47 baselines?
48 Can your hosting solution monitor your service’s license usage?
Has your hosting environment undergone any independent audits or
49 certifications?

50 Describe your anti-virus deployment for servers in your hosted solution.


Response
Application and Desktop Virtualization

Compliance
# Question (Y, N, N/A)
User experience
Is your solution a leader in the market for application and
1 desktop virtualization?
Does your solution work across various platforms and devices
2 with superior end user experience?
Does your solution provide a consistent user experience across
3 different device types and platforms?
Does your solution support dynamic moving from one end-
4 point device to another without losing user’s current state?

Describe how your solution resumes abandoned/disconnected


6 sessions (e.g., loss of network connectivity).

Describe how your solution allows for temporary suspension of


7 sessions (e.g., session closed without logging off).
How long does an open session persist, if temporarily
8 suspended or inadvertently abandoned/disconnected?
How does the solution maintain optimal performance over
9 challenging networks, especially for remote users?
Describe how your solution determines, adjusts, and allocates
resources based on users’ computing requirements as they
10 multi-task.
Does your solution optimize the unified communications
11 platforms Skype for Business and Microsoft Teams?
Does your solution optimize the unified communications
12 solution Zoom?
Does your solution optimize the unified communications
13 solution Avaya?
Does your solution optimize the unified communications
14 solution Cisco Jabber?
Does your solution work with the latest vGPU solutions,
15 including Intel, NVIDIA and AMD?
16 Does your solution support video editing?
17 Does your solution support streaming full HD videos?
Does your solution support 3D rendering (e.g., SolidWorks,
18 AutoCAD)?
Does your solution enable repurposing existing PCs into thin
19 clients or kiosk terminals?
20 Do you provide an integrated thin client solution?
21 Do you integrate with Workspace IoT solutions?
Does your solution allow the ability for users to launch local
22 apps when needed?
Does your solution support client peripherals (e.g. finger print
23 sensor, camera, scanner, etc.)?
Describe how your solution will integrate with locally-attached
(e.g., USB, IP port), mapped network, and application or Web-
24 based print solutions.
25 Does your solution offer driverless printing?
26 If so, does your driverless printing solution support:
27. a. Printers directly connected to the endpoint?
27. b. Network-connected printers?
27. c. Printing from Windows endpoints?
27. d. Printing from MacOS endpoints?
27. e. Printing from Linux endpoints and Thin Clients?
27. f. Printing from iOS- and Android-based endpoints?
File Sharing
Does your solution include enterprise file sharing and syncing?
28
Does your solution integrate with other file sharing and syncing
29 solutions?
Does your solution integrate with on-premises storage
30 repositories?
Does your solution provide content collaboration
31 functionalities?
Is your enterprise file sharing and syncing solution optimized
32 for virtual app and desktop scenarios?
Security
33 Does your solution create a secured digital perimeter?
Does your solution ensure secured, remote access for users
34 accessing virtual apps and desktops?
Do you provide your remote access solution for virtual
35 applications and desktops as a service?
Does your selution allow for secured, remote access to physical
36 desktop PCs?
Does your solution enable context-aware access to virtual apps
37 and desktops or client resources?
38 Does your solution include an SSL-VPN functionality?
Does your solution offer real-time attack detection for the
39 virtual environment?
Does your solution support Hyper-V based advanced Windows
40 security controls?
Does your solution provide auditing capabilities of user
41 actions?
Does your solution provide auditing capabilities of admin
42 actions?
Does your solution provide the ability to mitigate threats from
43 keyloggers and screen captures?
44 Can your solution prevent clipboard (copy/paste) functionality?
Does your solution provide watermarking of virtual apps and
45 desktops?
46 Does your solution provide data protection?
47 Does your solution support multi-factor authentication?
Management/Choice
Does your solution support virtual session being built new for
each launch; a clean OS with pre-approved applications
48 available?
Does your solution support deployment of multiple, pre-
configured virtual desktops (i.e., software/tools pre-installed)
49 for different user profiles?
Can virtual applications be customized for specific roles and/or
50 groups?
Does your solution allow users to have the same settings and
51 preferences across login sessions? If so, describe how.
Describe the process for backing up, restoring, and resetting
52 users’ application settings and user preferences.
Does your solution offer the ability to manage a globally
53 distributed virtual app and desktop environment?
Does your solution offer the ability to route users to specific
54 sites in globally distributed environments?
Does your solution offer the ability to provide full stack
55 monitoring?
56 How does your solution ensure optimized performance?
57 Does your solution integrate with third-party solutions?
58 Does your solution offer frequent updates?

Does your solution provide single-image management, that


59 covers the operating system, system tools and applications?
60 Does your solution have API interfaces exposed with it?
Does your solution provide the ability for admins to proactively
61 test the environment to mitigate disruptions?
62 Is there live migration and patching within your solution?
Does your solution provide the ability to optimize VM
63 workloads, especially in a hybrid cloud environment?
Does your solution support rapid dynamic scaling (up and
64 down)?
Which virtualization and/or cloud platforms does your solution
65 support?
Does your solution support physical hosts for hosting virtual
66 apps and desktops?
Does your solution provide tooling to simplify end user
67 support?
68 Does your solution provide reporting capabilities?
Monitoring
Does your solution provide visibility into per user metrics
69 including expense, resource/bandwidth usage, etc?
Are bandwidth intensive activities functionally equivalent to a
70 PC version?
Does your solution have Active Management and monitoring of
71 environment to ensure user's quality of experience?
Does the VDI environment allow end to end data and
72 troubleshooting metrics per application?
Response
Unified Endpoint Management

Compliance
# Question (Y, N, N/A)
Mobile Device Management
Is your solution a leader in the market for Unified Endpoint
1 Management?

What features does your product have that allows for distinction
2 between company-owned devices and BYOD devices?
Does your solution allow for the integration of platform level
3 MAM integration?
Does your solution support other devices such as laptops, Surface
4 Tablets, and BYOD laptops?

Describe how your solution manages Apple / iOS devices including


Device Enrollment Program (DEP), Volume Purchase Program
5 (VPP) and configuration profiles.

6 Which forms of user authentication is supported by your solution?


Do you have the ability to uniquely identify a user with a session
7 at any given time?
Describe how your solution allows end users to access resources
8 and applications with least-privilege access.

9 Can your solution manage Windows 10 devices using EMM APIs?


Can your solution manage macOS and above devices using EMM
10 APIs?
11 Can your solution manage per-app VPN features?
12 Can user authentication before device use be enforced?
13 Can we apply policies by device type, mode, and OS version?
14 Can the camera be disabled/enabled?
Can your solution determine device compliance based on the OS
15 version or other criteria?
16 Can your solution control Bluetooth features on the device?
17 Does your solution support devices in kiosk mode?
Does your solution integrate with Apple configurator for bulk
18 device deployment?
19 Does your solution support Samsung KNOX bulk enrollment?

20 Does your solution support bulk enrollment for Windows devices?


Does your solution provide the ability to deploy more than one
use case such as MDM, MDM+MAM, and/or Platform MAM
21 within one deployment?
Can your solution control the ability of the device to access mobile
22 cellular data while roaming?
Mobile Application Management
23 Does your solution integrate with Android Enterprise?
Do you provide an internal app distribution mechanism (app
24 store)?
Does your solution support the Apple Volume Purchase Program
25 (VPP)?
26 Does your solution support the Apple VPP auto-update?
Does your solution allow the administrator to deploy apps by role
27 and group?
Does your solution allow the administrator to create groups of
apps by device OS (for example, iOS or Android) or form factor
28 (for example, tablet or smartphone)?
Can your solution automatically remove managed apps as
29 necessary through the EMM suite?
30 Can your solution integrate custom-developed mobile apps?

Can your solution distribute and manage apps to devices that are
managed by other EMM suites or that have no EMM device
31 management profiles installed?
Does your solution allow admins to create policies for application
32 access that are network-aware?
Does your solution provide SDKs for MAM specific features for in-
33 house applications?
Does your solution provide integration with Office 365 and
34 Microsoft Endpoint Manager?
Security Management
Is the container NIST Federal Information Processing Standard
35 (FIPS) 140-2 validated?

36 Can the solution force encryption of all data at rest on the device?
Can the solution limit "open in" functionality for apps in the
37 container?
38 Can the solution limit pasting content outside the container?
Can the solution limit "save as" functionality for apps in the
39 container?
40 Can the solution block screen shots?
41 Can the solution block printing?

Can the solution lock or delete the container after a configurable


42 time has elapsed with no contact with EMM server?
Can the solution lock or delete the container after too many
43 invalid login attempts to the container?
Can the device be configured to lock if the maximum number of
44 failed login attempts is exceeded?
Can the solution detect a device jailbreak or rooting before
45 allowing enterprise resource access?
46 Does the solution support remote selective wipe?
47 Can the solution block iOS updates?
48 Can the solution block Android updates?
49 Can the solution block Windows 10 mobile updates?
50 Can the solution prevent content sharing through AirDrop?

51 Can the solution prevent content sharing through Android Beam?


Can the solution prevent content and connection sharing through
52 Wi-Fi Direct?
Does your solution create a secured mobile digital perimeter
53 (geofencing)?
Identity Management
Does the solution integrate with an LDAP directory for users and
54 groups?
55 Does the solution integrate with Microsoft Active Directory?

56 Does the solution integrate with Microsoft Azure Active Directory?


Does the solution integrate with our directory for the
57 administrator console?
Does the solution natively integrate with Microsoft Certificate
58 Services?
Does the solution provide basic certificate-based authentication
59 for device access?
Does the solution support certificate-based user authentication
60 for
Doesaccess to container
the solution apps?
provide certificate-based authentication for
61 Microsoft Exchange and Exchange Online?
62 Does the solution support password policies for the device?
63 Does the solution support for SAML 2.0 user authentication?
64 Is two-factor authentication for container access supported?
Audit and Management Reporting
Does your solution provide diagnostic, activity, audit, or
65 compliance reports?
66 What type of monitoring dashboards do you provide?
Response
Enterprise File Sync & Sharing

Compliance
# Question (Y, N, N/A)
1 Does the solution provide a mechanism to securely receive files?
What access restrictions can be placed on shared links (e.g.
2 authentication)?
What content restrictions can be placed on shared links (e.g. expiration or
3 view only)?
4 Can the solution add (dynamic) watermarks on shared content?
5 Do external users contribute to the license count?
Can the solution share content from external data repositories (e.g.,
6 network shares)?
7 Does the solution provide a mobile client with content viewer?
8 Does the solution provide a mobile client with built-in content editor?
Does the solution provide a mobile client that supports external content
9 editors such as Microsoft Office 365?
Is there a plug-in available for Microsoft Outlook to replace attachments
10 with secure links?
Does the solution provide a plug-in for Google Mail (e.g. to replace
11 attachments with secure links)?
Workforce productivity: Lightweight workflows
12 Does the solution provide lightweight workflows?
Are lightweight workflows accessible via the native file system (e.g. in
13 Windows Explorer or macOS Finder)?
14 Are lightweight workflows accessible via Microsoft Outlook?
Does the solution include the ability to request and execute electronic
15 signatures?
Does the solution provide no code workflows to digitize business
16 processes?
Infrastructure modernization: Connecting hybrid cloud storage
repositories
17 Does the solution provide cloud hosted storage?
18 Does the solution provide unlimited cloud hosted storage?

19 Does the solution provide a soft-quota (notification on exceeding limit)?


20 Does the solution provide a hard-quota (blocking on exceeding limit)?
21 Does the solution provide on-premises storage?
Does the solution provide access to existing (on-premises) data
22 repositories?

23 Does the solution provide check-in and check-out for network file shares?
24 Does the solution provide (free) tooling for data migration?
Does the solution provide immediate time to value or does it require a
25 data migration?
26 Does the solution
Content support
governance: the migration
Centralized to Microsoft
content SharePoint?
protection and
compliance
Does the solution provide data repositories across the globe to meet data
27 residency requirements?
28 Where does the management plane of the SaaS service run?
29 Where does the SaaS service store metadata?
30 Does the solution provide out-of-the-box reports?
Does the solution provide detailed sharing reports and document
31 activities?
Does the solution provide a programmatic way to export logs (e.g. to a
32 SIEM)?
Does the solution support CASB for cloud hosted storage? If yes, which are
33 supported?
Does the solution support Data Loss Prevention (DLP) for on-premises
34 storage? If yes, which are supported?
Does the solution enable customers to encrypt data with customer
35 managed encryption keys?
Intelligent content capabilities
36 Does the solution provide closed loop security analytics?

37 Does the solution provide security analytics with automated remediation?


38 Can end users share files within their workspaces?
39 How does your solution enable users to collaborate on content?
Response
Access Control

Compliance
# Question
Does your solution allow us to consolidate/replace existing SSL VPN, SSO to SaaS, (Y, N, N/A)
1 Isolated browser, and reverse proxy to our virtual apps and desktops?
Does the solution have built-in controls for restricting end-user actions granularly
2 based on type of app and/or users?
Does the solution provide a clientless VPN mode for accessing on-premises
3 hosted web applications?
4 Does your SaaS solution provide access to both SaaS and web applications?
Does the solution provide a way to access the Internet securely using remote
5 browser or web isolation technology?
6 Can this solution prevent employees from visiting restricted websites?

Can security administrators enable browser isolation for selective content? If so,
7 can this be automated as a policy decision?
8 Does the solution offer single sign-on capabilities?
9 Does your solution protect data in SaaS and web apps?
10 Can your solution help consolidate security vendors?
11 Is your company an Identity Provider (IdP)?
12 How does your solution offer contextual access control?
13 How do you optimize performance for end users that are distributed globally?
Does your solution offer multi-factor authentication (MFA) that is based on
14 contextual and adaptive policies?
Does your solution protect corporate resources that are being accessed from
15 malware-infected unmanaged or BYO devices?
Response
Analytics

Compliance
# Question (Y, N, N/A)
Performance analytics
1 What performance characteristics does your tool monitor?
2 What key factors are measured related to performance?
3 Is youryour
Does performance tool limited
solution deliver humantoreadable
a single site?
information without being fed
4 to another tool?
5 Does your performance monitoring tool uncover root cause issues?
6 What types of operations analytics do you provide?
Security analytics

7 Does your solution offer user behavior analytics? If so, how does it work?
8 Is your offering a one-time assessment of user risk?
Can your solution help us to realize security outcomes like continuous
9 authentication?
10 Is your solution limited to the pre-built user risk scenarios?
11 Can your solution integrate with other vendors and product?
Is your solution a closed system by using the events from your environment
12 alone?
13 Does your offering
How flexible apply isAIyour
or granular and offering
ML to help
as itsolve security
relates challenges?
to grouping users?
14 Does it just cover users by geography, department domain etc.?
15 Can high-risk users be easily displayed or sorted?
16 Can your solution take action based on certain activities?
17 What actions can be taken in Cotent Collaboration?
18 What actions can be taken in Endpoint Management?
19 What actions can be taken in Virtual Apps and Desktops?
Response
Intelligent Features

Compliance
# Question (Y, N, N/A)
1 Describe the architecture and process flow of your solution.
2 Is your architecture secure?
3 Describe how the system determines the workflows to present
4 Which apps are currently supported within the solution?
Can the solution create custom microapps based on other apps? What key
5 benefits do these provide over macroapps?
6 Describe how an end-user interacts with microapps
7 What types of actions can an end-user perform within microapps?
8 Can the microapps have specific branding?
9 Can the microapps look and feel be customized?
10 How can an administrator add microapps?
11 Explain the capabilities of your virtual assistance.
12 How do users interact with the virtual assistance?
13 What systems does the virtual assistance interact with on the backend?
14 Does the virtual assistance interact with one backend system or multiple?
15 Is the virtual assistant a native component of the platform?
16 Who trains the skills in the virtual assistant?
17 What content can end users see within their workspace?
18 Where can notifications be sent across an end user's experience?
19 Can notifications be customized?
20 How are notifications kept relevant for the end users?
21 What are the requirements for each individual out-of-the-box integration?
What development plans are in place to add additional integrations to the
22 product?
23 Are customizations available within the out-of-the-box integrations?
24 Is the behavior of the out-of-the-box integration configurable?
25 Are the integrations out-of-the-box or provided as template?
26 Are out-of-the-box integrations maintained by the provider?
27 Does the solution provide write-back to the system of record?
28 How do you authenticate with the systems of record integrations?
29 Is it possible to build custom integrations in the solutions?
30 What are the requirements for custom integrations?
31 Do custom integrations require approval by the vendor?
32 Are custom integrations build with no- or low-code?
33 Are custom integrations built in code? If so, what language?
34 Are custom integrations hosted by the vendor or by the customer?
35 What capabilities are available for the custom integrations?
36 Can the solution integrate with on-premises systems of record?
37 Does the solution provide connectivity to the on-premises site?
38 Does the solution cache data from the system of record?
39 Can the solution track changes in active data of the system of record?
40 Does the solution cache data in the cloud?
41 How is data purged from the solution?
42 What is the process of adding new integrations?
43 How can the your solution customize microapps?
44 How does your solution integrate with SoR that is not out-of-the box?
45 Which coding skills required to build microapps within your solution?
46 Where is the microapp builder hosted?
47 Is the microapp builder single tenant?
48 Can you preview the microapp while building it?
49 Can you add custom images to microapps within your solution?
50 What inputs can be set within a microapp?
51 How much lead-time will your solution provide for upcoming changes?
Response
Implementation, Maintenance, and Training

# Question
Implementation
Will company (customer) resources be required to implement
1 the solution?
2 Is your organization available to implement the full solution?
Maintenance & Support
3 What is the SLA for your cloud-hosted solution?
Do you have a regular update and patching cycle and/or
4 maintenance windows?
5 Describe your support offerings.
6 In what languages do you offer support?
7 How are support cases escalated?
What are the processes for managing testing, QA, and user
8 acceptance phases of the implementation?
Training
What delivery options are available for live training sessions?
9 (Classroom-based vs. online/hands-on vs. demonstration)

Describe any self-paced learning materials/resources you offer


to support end users and technical users/administrators (e.g.,
10 documentation, how-to articles, manuals video tutorials, etc.).
Business Continuity
11 Do you have a business continuity plan? If so, please attach it.
12 Describe your cloud services recovery strategy.
13 Describe your cloud services disaster recovery testing.
14 Describe your cloud services operations.
15 Provide a high-level description of your cloud services
architecture.
16 What is the uptime for your cloud services?
Answer

You might also like