3.1 Outline of Anticipated Services: The outline of anticipated services set forth herein is for the primary purpose of allowing the County to compare Proposals submitted in response to this RFP. The precise scope of services that will be incorporated into the final Professional Services Agreements resulting from this RFP process shall be the subject of negotiations between the County and the Successful Proposer. A. Provision of an Enterprise Security System. The Successful Proposer shall be required to design, develop, install, implement and support, in accordance with any and all applicable local, state, and federal laws, regulations, policies, procedures and standards, an Enterprise Security System that integrates access control, surveillance and alarm monitoring, in order to: 1. Provide a centralized, cloud-based platform that allows County departments to manage and monitor physical security systems at the facilities set forth Attachment A – Preliminary Site List, and eventually other County facilities, ensuring a unified and efficient approach to access control, surveillance and alarm monitoring across multiple locations. 2. Enable granular access control by allowing designated department personnel to assign and revoke individual employee access to specific buildings, doors or areas while maintaining enterprise-level oversight and security compliance. 3. Support real-time video surveillance and archiving capabilities, with secure cloud-based storage and easy retrieval of recorded footage for investigative and compliance purposes. 4. Ensure seamless integration between door access controls, security cameras and alarm systems, providing a single-pane-of-glass interface for monitoring and managing security events in real time. 5. Allow authorized County personnel to directly interface with manufacturer support for troubleshooting, reducing reliance on third-party vendors for service and maintenance. 6. Provide role-based access to the system for different user levels, including, without limitation, Information Technology administrators, department managers and security personnel, ensuring appropriate control and oversight at all levels. 7. Support mobile and remote access capabilities for authorized personnel to monitor and manage security settings from any location with secure authentication methods. 8. Enable automated logging and reporting of access events, security alerts and system changes to ensure compliance with any and all applicable local, state and federal security laws, regulations, policies, procedures and standards. 9. Offer a scalable architecture that accommodates future expansion to additional County facilities without requiring significant hardware or software modifications. 10. Include comprehensive training and onboarding for County staff to ensure effective system management and adoption.