Loading...
HomeMy WebLinkAbout050054-A16 - General - Contract - Motorola Solutions, Inc.CSC No. 50054-A16 SIXTEENTH AMENDMENT TO FORT WORTH CITY SECRETARY CONTRACT NO. 50054 This Sixteenth Amendment to Fort Worth City Secretary Contract No. 50054 ("Sixteenth Amendment") is made between the City of Fort Worth ("City,") a Texas home rule municipality, and Motorola Solutions, Inc. ("Vendor,") a Delaware corporation. City and Vendor are each individually referred to herein as a"party" and collectively referred to as the "parties." WHEREAS, City and Vendor entered into an Agreement identified as City Secretary Contract No. 50054 beginning December 18, 2017 (the "Agreement") through a Houston- Galveston Area Council (H-GAC) Cooperative Contract and its successors; WHEREAS, it is the collective desire of the parties to amend the Agreement to include Exhibit A-14 Motorola Solutions Proposal No. 25-193540-2 for the purchase of the ASTRO 25 Managed Detection and Response (MDR) solution; and WHEREAS, it is the collective desire of the parties to amend the Agreement to include Exhibit A-15 City of Fort Worth Notice to Proceed for implementation of the Motorola ASTRO 25 MDR solution. NOW THEREFORE, known by all these present, the Parties, acting herein by and through their duly authorized representatives, agree to the following terms, which amend the Agreement as follows: I. AMENDMENTS 1. The Agreement is hereby amended to include Exhibit A-14 Motorola Solutions Proposal No. 25-193540-2 for the purchase of the ASTRO 25 Managed Detection and Response (MDR) solution, attached hereto this Sixteenth Amendment, with annual pricing in accordance with the attached proposal's pricing summary. 2. The Agreement is hereby amended to include Exhibit A-15 City of Fort Worth Notice to Proceed for implementation of the Motarola ASTRO 25 MDR solution. 3. The total amount of the Agreement will remain unchanged, at an amount not to exceed $5,538,544.48 for Year 9 of the Agreement. IL MISCELLANEOUS All other terms, provisions, conditions, covenants and recitals of the Agreement not expressly amended herein shall remain in full force and effect. [Signature Page Follows] OFFICIAL RECORD CITY SECRETARY FT. WORTH, TX Sixteenth Amendment to Fort Worth City Secretary Contract No. 50054 Page 1 of 4 [Executed effective as of the date signed by the Assistant City Manager below.] /[ACCEPTED AND AGREED:] City: �Aru�t�� B�7. Dlanna Giordano (Feb 5, 2026 13:03�22 CST) Name: Dianna Giordano Title: Assistant City Manager Motorola Solutions, Inc. By; � �c� K� c,f� Name: Brad Rice Title: Area Sales Manager Date: 02/05/2026 Date: January 29, 2026 CITY OF FORT WORTH 1NTERNAL ROUTING PROCESS: Approval Recommended: /-� �_ By: Name: Kevin Gunn Title: Director, IT Solutions Approved as to Form and Legality: Contract Compliance Manager: By signing I acknowledge that I am the person responsible for the monitoring and administration of this contract, including ensuring all performance and reporting requirements. L�--._�� • B�7; Lawrence Crockett (Feb 2,202610:27:01 CST) Name: Lawrence Crockett Title: Sr. IT Solutions Manager Candq�e Pc�c�liara B�. .2 �cecz V'aKl�iare �:I E63,JOJ610:�40�L� � Name: Candace Pagliara Title: Sr. Assistant City Attorney Contract Authorization: M&C: 24-0533 Approval Date: 06/25/2024 Form 1295: 2024-1139355 City Secretary: �� � .��: By: � Name: Jannette Goodall Title: Ciry Secretary �QIl as° F�pr�aao oa o�° o?�o ov> 0=00 °oa» o e o,o .de oaa4 4E4ps4aq OFFICIAL RECORD CITY SECRETARY FT. WORTH, TX Sixteenth Amendment to Fort Worth City Secretary Contract No. 50054 Page 2 of 4 EXHIBIT A-14 Motorola Solutions Proposal No. 25-193540-2 (Attached) Sixteenth Amendment to Fort Worth City Secretary Contract No. 50054 Page 3 of 4 �4 "' ����`�1� � � ~ ��-. A � • • - • - �. �� � i, -.. . ' � . � r. J � � � `°� , � ��� �'� '��+ � � �'�.� .� � . 1 ��� �, _, � ,,,. ��'�' -�� -,��� " ' � �` ``` — \ � , "",�` �� ��� "� ► �: o. ; - n � �,�`+'' - ry�� �� j `t w � r � :.: " '�,�-' � : -� �'� ! „�, �, _� ��_ ' � ��- � �" .:_� ' �` _ �,-T ��� � � �'� `-: '.ri � .� ��- i � r--T �:. % _;;; � � � � � �,;. �/.. j �� �;�y� '� - - . �c,_•� �_' 4 '� � �,a� � .�, . �,. .. .'. . �`�? .� ' _.���\ ` ;..��\��`��'� �\ ~' y a � �� � r � ti . � � `i ��'`1'r``�� '��,� !I*' � /' �' � ../ # � �� {� � � f� ♦ �..:��!i :.�� - ��� Firm Fixed Price Proposal City of Fort Worth AS'1'1�0 25 Mana ed g Detection and Res onse p 25-193540-2 / Cybersecurity Services November 14, 2025 The design, technical, and price information furnished with this proposal is proprietary information of Motorola Solutions, Inc. (Motorola). Such information is submitted with the restriction that it is to be used only for the evaluation of the proposal, and is not to be disclosed publicly or in any manner to anyone other than those required to evaluate the proposal, without the express written permission of Motorola Solutions, Inc. MOTOROLA, MOTO, MOTOROLA SOLUTIONS, and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. O 2025 Motorola Solutions, Inc. All rights reserved. PS-000193540-2 City of Fort Worth October 27, 2025 ASTRO 25 Managed Detection and Response 25-193540-2 / Cybersecurity Services Table of Contents Section 1 ExecutiveSummary ............................................................................................................................... l-1 Section 2 SolutionDescription .............................................................................................................................. 2-1 2.1 Solution Overview .............................................................................................................................. 2-1 2.2 Service Description ............................................................................................................................. 2-2 Section 3 Statementof Work ................................................................................................................................. 3-1 3.1 3.2 3.3 3.4 3.5 3.6 Section 4 Overview............................................................................................................................................. 3-1 Descriptionof Service ........................................................................................................................ 3-1 DeploymentTimeline and Milestones .............................................................................................. 3-2 GeneralResponsibilities .................................................................................................................... 3-3 Security Operations Center Monitoring and Support .................................................................... 3-7 Limitationsand Exclusions ............................................................................................................. 3-12 ProposalPricing ..................................................................................................................................... 4-1 4.1 Pricing Summary ............................................................................................................................... 4-1 4.2 Payment Schedule & Terms .............................................................................................................. 4-2 4.3 Invoicing and Shipping Addresses .......................................................... Error! Bookmark not defined. Section 5 ContractualDocumentation .................................................................................................................. 5-1 Table of Contents Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 1-ii qMOTOROLA SOLUTIONS Motorola Solutions, Inc. 500 W Monroe Street, Ste 4400 Chicago, IL 60661-3781 USA November 14, 2025 Mr. Larry Crocket Senior Manager, Radio Services City of Fort Worth 1515 11 th Avenue Fort Worth, TX 76102 RE: ASTRO° 25 Managed Detection and Response (MDR) Dear Mr. Crocket: Motorola Solutions, Inc. (Motorola) appreciates the opportunity to provide City of Fort Worth quality cybersecurity services. Motorola's project team has taken great care to propose a solution to address your needs and provide exceptional value to Ciry of Fort Worth through the following: • Providing a market leading MDR solution for the City of Fart Worth's network with Motarola's SOAR platform, known as ActiveEye • Providing geographically redundant Security Operations Centers (SOC) operating 24 hours a day, 7 days per week, 365 days per year We are coniident that Motorola can provide a best-in-class premier offering of MDR to City of Fort Worth. Motorola Solutions' proposal is conditioned upon City of Fort Worth acceptance of the terms and conditions included with this proposal, or a mutually negotiated version thereof. This proposal shall remain valid until thirty (30) days from the date of this proposal. Any questions City of Fort Worth has regarding this proposal can be directed to Jessica Neill, Cybersecurity Account Manager at 817-773-7874 or by email at iessica.neill cr,motorolasolutions.com. Our goal is to provide you with the best products and services available in the industry to address your ongoing Cybersecurity needs. We thank you for the opportunity to provide Managed Detection and Response for City of Fort Worth, and we hope to strengthen our relationship by implementing this project. Sincerely, � �� Tom Vedder Area Sales Manager — Central & West Cybersecurity Services North America MOTOROLA SOLUTIONS, INC. City of Fort Worth ASTR025 Managed Detection and Response SeCtlOri 1 Executive Summar Y October 27, 2025 25-193540-2 / Cybersecurity Services Motorola is pleased to build upon our years of ongoing support to City of Fort Worth with a response that efiiciently meets the needs for your ASTRO� 25 Managed Detection and Response (MDR) solution. We are a national and global leader in the cybersecurity community. We have evolved into a holistic mission critical technology provider, placing Information Technology (IT), as well as cybersecurity, at the forefront of importance to protect our customers against threats to the confidentiality, integrity, and availability of their operation. ASTRO 25 Managed Detection and Response Motorola's ASTRO 25 MDR provides radio network security element monitoring by experienced, specialized security technologists with extensive experience working with ASTRO 25 mission-critical networks. For highly complex or unusual security events, Motorola's technologists have direct access to Motorola engineers for rapid resolution. Our solution provides 24/7 Security Operations Center Support. This is a component of our broader proprietary SOC 2 Type 2 certifed Managed Security Platform targeted to Public Safety, Critical Infrastructure, and State/Local municipalities. The ActiveEye Platform With the ActiveEye platform, Motorola is able to deliver to our customers a co-managed approach to 24/7 security monitoring operations across IT enterprise environments. The benefits of the ActiveEye platform are demonstrated below: • Included Public Safety Threat Data Feed Threat reports covering potential attack vectors based on dark web research. Summaries of actual attacks against public safety and state/local municipalities. • Advanced Threat Detection & Response — Consolidate SIEM data and direct threat inputs from endpoint security, network sensors, and cloud/SaaS applications. Pre-built custom playbooks to process alerts and reduce/eliminate manual analyst effort. • Single Dashboard for Threat Visibility —Complete visibility into the security of the network. Monitor alerts, perform investigations, track cases, and create reports all from one interface. Chief Information Security Offcer (CISO) Benefts A main dashboard displays and aggregates all of the important and relevant risk information from across the organization, helping decision makers to make better-informed decisions to balance cybersecurity efforts and operational efficiencies. The dashboard provides key performance metrics and indicators that can inform an admin at a glance to the activity that is occurring throughout their environment. Create ad-hoc reports and notifications based on available data and ActiveEye parameters. Transparency into the service that Motorola is providing. The dashboard will provide the key indicators to the number of events that are handled on a daily, weekly, monthly basis and how those events are handled by the Motorola Security Operations Center (SOC). Executive Summary Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 1-1 City of Fort Worth ASTR025 Managed Detection and Response Public Safety Threat Alliance October 27, 2025 25-193540-2 / Cybersecurity Services Cyber threats to public safety agencies are increasing in scope, scale, and complexity; however, most agencies lack the cybersecurity capabilities required to mitigate risk and ensure continuity of public safety operations. To address this critical need, Motorola has established a cyber threat information sharing and analysis arganization (ISAO) for public safety called The Public Safety Threat Alliance (PSTA). The PSTA is recognized by the U.S. Cybersecurity and Infrastructure Security Association (CISA), and highlights Motorola's commitment to public safety agencies and the communities they serve. The PSTA will leverage cybersecurity risk information from across Motorola's Cybersecurity Services. This, paired with information from members and trusted partners including CISA, other ISAOs, and nonprofits dedicated to sharing cyber threat intelligence, will help generate actionable intelligence to improve members' cybersecurity posture, defense, and resilience against evolving threats to their public safety missions. In addition to the intelligence alerts and reports provided, other benefits included access to an automated threat feed, with context and tags, that can be � fed into your SIEM or MDR solution and Dark Web monitoring that � checks for activity, including the sale of credentials or mention of your organization's name. There is no cost for membership to the PSTA. Public Safety Threat Alliance Public Safeiy ISAO Learn more about membership to the PSTA at https://motorolasolutions.com/bublic-safetv-threat-alliance. ABOUT MOTOROLA WE ARE INNOVATIVE WE ARE PA$SIpNATE WE ARE �RIVEN WE ARE ACCOUNTABLE WE ARE PARTNERS Company Background and History Motorola creates innovative, mission-critical communication solutions and services that help public safety and commercial customers build safer cities and thriving communities. You can find our products at work in a variety of industries including law enforcement, fire, emergency medical services, national government security, utilities, mining, energy, manufacturing, hospitality, retail, transportation and logistics, education, and public services. Our communication solutions span infrastructure, devices, services, and software to help our public safety and commercial customers be more effective and efficient. Company Overview Since 1928, Motorola Solutions, Inc. (formerly Motorola, Inc.) has been committed to innovation in communications and electronics. Our company has achieved many milestones in its history. We pioneered mobile communications in the 1930s with car radios and public safety networks. We made the equipment that carried the first words from the moon in 1969. We commercialized the first handheld portable scanner in 1980. Today, as a global industry leader, excellence in innovation continues to shape the future of the Motorola brand. We help people be theiN best in the rnoments that rnatte�. Motorola connects people through technology. Public safety and commercial customers around the world turn to Motorola innovations when they want highly connected teams that have the information they need throughout their workdays and in the moments that matter most to them. Our customers rely on us for the expertise, services, and solutions we provide, trusting our years of invention and innovation experience. By partnering with customers and observing how our products can help in their specific industries, we are able to enhance our customers' experience every day. Executive Summary Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 1-2 City of Fort Worth ASTR025 Managed Detection and Response October 27, 2025 25-193540-2 / Cybersecurity Services Motarola's Corporate Headquarters is located at 500 West Monroe Street, Chicago, IL 60661. Telephone is +1 847.576.5000, and the website is www.motorolasolutions.com. Executive Summary Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 1-3 City of Fort Worth ASTR025 Managed Detection and Response Section 2 Solution Descri tion p 2.1 Solution Overview October 27, 2025 25-193540-2 / Cybersecurity Services Motorola Solutions, Inc. (Motorola) is pleased to present the proposed cybersecurity Managed Detection and Response (MDR) services for City of Fort Worth (hereinafter referred to as "Customer"). Identifying and mitigating cyber threats requires a reliable solution that supplies the right data to cybersecurity experts. Motorola will provide access to our ActiveEye Security Platform, along with 24x7 support from specialized security technologists, who will monitor your mission critical network against threat and intrusion. The following ASTRO° 25 MDR features and services are included in our proposal: • ActiveEye Managed Detection and Response Elements - ActiveEye Security Management Platform • Service Modules - Log Collection / Analytics - Network Detection - External Vulnerability Scanning - Endpoint Detection and Response • Security Operations Center Monitoring and Support 2.1.1 Site Information The following site information is included in the scope of our proposal: Table 2-1: Site Information Core Site DSR Network Management Clients Dispatch Consoles AIS _ Solution Description i Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted 1 1 8 46 1 i � MOTOAOLA SOLUTIONS Page 2-1 City of Fort Worth October 27, 2025 ASTR025 Managed Detection and Response 25-193540-2 / Cybersecurity Services Services Included The ActiveEye service modules included in our proposal are shown in the tables below. The Network Environment column will designate the location of each module: ASTRO 25 Radio Network Infrastructure (RNI), Customer Enterprise Netwark (CEN), or the Control Room CEN. Table 2-2: Service Modules Log Collection / Analytics Netwark Detection External Vulnerability Scanning Endpoint Detection and Response (EDR) Online Storage Period: 30 Day Storage Extended Log Storage Length: 12 Months Up to 1 Gbps per sensor port Features in Section 3.2.3.2 Online Storage Period: 30 Day Storage RNI/DSR RNUDSR RNI/DSR RNI Note: CENs are out of scope and are the responsibility of the customer. EDR for Core and Fort Worth dispatch sites only: Site 1, Radio Shop; Site 2, Bolt Street; Site 3, ALT PSAP. 2.2 Service Description Managed Detection and Response is performed by Motorola Solutions' Securiry Operations Center (SOC) using the ActiveEyeTM security platform. The SOC's cybersecurity analysts monitor for alerts 24x7x365. If a threat is detected, analysts will investigate and initiate an appropriate Customer engagement. Customer engagements may include, but are not limited to; deploying cybersecurity countermeasures for incident containment, requesting additional information from the Customer, continuing to monitor the event for further development, or informing the Customer to enact the Customer's documented Incident Response plan. SOC analysts rely on monitoring elements to detect signs of a potential threat impacting the Customer's ASTRO 25 network and applicable Customer Enterprise Network (CEN) systems. These elements are described below. The MDR service includes the deployment and optimization of these elements into the Customer's network. 2.2.1 Managed Detection and Response Elements This section and its subsections describe Managed Detection and Response elements, and their applicability for specific infrastructure. 2.2.1.1 ActiveEye Security Platform Motorola's ActiveEye security platform collects and analyzes security event streams from the Customer's ASTRO 25 network and applicable CEN systems, using security orchestration and advanced analytics to identify the most important security events from applicable systems. The ActiveEye platform is provided in the English language. The platform automates manual investigation tasks, verifies activity with external threat intelligence sources, and learns what events will require rapid response action. Solution Description Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 2-2 City of Fort Worth ASTR025 Managed Detection and Response October 27, 2025 25-193540-2 / Cybersecurity Services The Customer will receive access to the ActiveEye platfarm as part of this service. ActiveEye will serve as a single interface to display system security information. Using ActiveEye, the Customer will be able to configure alerts and notifications, review security data, and perform security investigations. Applies to included ASTRO 25 RNI, CEN, and Control Room CEN infrastructure. 2.2.2 Service Modules ActiveEye delivers service capability by integrating one or more service modules. These modules provide ActiveEye analytics more information to correlate and a clearer vision of events on Customer's network. In addition, modules enable security teams and analysts to more easily access and compare data from these disparate systems. The following subsections describe each ActiveEye service module in detail. 2.2.2.1 Log Collection / Analytics The AERSS deployed in the system collects logs and other security information from applicable servers, workstations, switches, routers, Network Detection, and firewalls. This information is forwarded to the ActiveEye platform, which uses advanced analytics to identify signs of security incidents. If it identifies signs of a security incident, ActiveEye notiiies the SOC for further analysis. Collected events will be stored in the ActiveEye Security Platform to enable historical searching or threat hunting as needed. Some high volume, repetitive logs may be aggregated as noted in the documentation. The default storage time period is one year, but no longer than 90 days, following expiration or termination of the Agreement. A longer time period can be provided if subscribed, see Table 2-2: Service Modules for subscription details. 2.2.2.2 Network Detection The AERSS supports Network Detection, constantly monitoring traffic passing across, into, or out of infrastructure. Network Detection analyzes traffic for signs of malicious activity in real time, and performs packet level and flow level analysis to enable communications modeling. This information is used to identify anomalous behavior that is not captured by pre-defined traffic signatures, including traffic using encrypted connections. Network Detection forwards detected suspicious activity to the SOC for further analysis. 2.2.2.3 External Vulnerability Scanning External Vulnerability Scanning is provided for the ASTROOO internet-facing, external network interfaces. The scan is enabled from an internet cloud hosted service outside the ASTRO� network. Discovery and vulnerability scans will be run quarterly or on a less frequent schedule defned with the Customer. 2.2.2.4 Endpoint Detection and Response Endpoint Detection and Response (EDR) is an endpoint security agent that integrates with the ActiveEye security platform to provide additional threat detection, investigation, and response actions to optimize protection of critical systems. EDR integration with ActiveEye accelerates investigations by making necessary information available for analysts in a single platform where they can quickly access details of what caused an alert, its context, and its history. Solution Description Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 2-3 City of Fort Worth ASTR025 Managed Detection and Response October 27, 2025 25-193540-2 / Cybersecurity Services The platform enables analysts to initiate response actions (i.e., isolate host, ban ar block a file hash, terminate a process) on endpoints to respond to detection of verified malicious activity within the system. Available responses are determined by the Customer's security policies. 2.2.3 Security Operations Center Services Motorola delivers SOC Monitoring using one or more SOC facilities. The SOC includes any centralized hardware and software used to deliver this Service and its service modules. The SOC and its centralized hardware and software are housed within an SSAE-18 compliant data center. Motorola's SOC is staffed with security experts who will use ActiveEye Security Management Platform to monitor elements integrated by service modules. In addition, SOC staff will take advantage of their extensive experience to investigate and triage detected threats, and to recommend responses to the Customer. Solution Description Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 2-4 City of Fort Worth ASTRO 25 Managed Detection and Response Section 3 Statement of v'Vork 3.1 Overview October 27, 2025 25-193540-2 / Cybersecurity Services Motorola Solutions, Inc. (Motorola) ASTRO° 25 Managed Detection and Response (MDR) provides monitoring of radio network security information by specialized cybersecurity analysts with extensive experience warking with ASTRO 25 mission-critical networks. The following sections describe the deliverables of the service, its technologies, and service obligations. This Statement of Work (SOW), including all of its subsections and attachments, is an integral part of the applicable agreement (Agreement) between Motorola and the Customer. In order to receive the services as defined within this SOW, the Customer is required to keep the system within a standard support period as described in Motorola's Softwarc Support Polic�SwSP). 3.2 Description of Service MDR is performed by Motorola's Security Operations Center (SOC) using the ActiveEye security platform. The SOC cybersecurity analysts monitor for alerts 24/7. If a threat is detected, analysts will investigate and initiate an appropriate Customer engagement. Customer engagements may include, but are not limited to, deploying cybersecurity countermeasures for incident containment, requesting additional information from the Customer, continuing to monitor the event for further development, or informing the Customer to enact the Customer's documented Incident Response Plan. SOC analysts rely on monitoring elements to detect signs of a potential threat impacting the Customer's ASTRO 25 network and applicable Customer Enterprise Network (CEN) systems. These elements are described below. The MDR service includes the deployment and optimization of these elements into the Customer's network. 3.2.1 Managed Detection and Response Elements This section and its subsections describe MDR elements, and their applicability for specific infrastructure. 3.2.1.1 ActiveEye Security Platform Motorola's ActiveEye security platform collects and analyzes security event streams from Endpoint Detection and Response, EDR, agents and embedded ActiveEye Remote Security Sensors (AERSS) in the Customer's ASTRO 25 network and applicable CEN systems, using security orchestration and advanced analytics to identify the most important security events from applicable systems. The ActiveEye platform is provided in the English language. The platform automates manual investigation tasks, verifies activity with external threat intelligence sources, and learns what events will require rapid response action. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-1 City of Fort Worth ASTRO 25 Managed Detection and Response October 27, 2025 25-193540-2 / Cybersecurity Services The Customer will receive access to the ActiveEye platfarm as part of this service. ActiveEye will serve as a single interface to display system security information. Using ActiveEye, the Customer will be able to configure alerts and notifications, review security data, and perform security investigations. Applies to included ASTRO 25 Radio Netwark Infrastructure (RNI), CEN, and Control Room CEN infrastructure. 3.3 Deployment Timeline and Milestones The following phase descriptions lay out the necessary deployment activities and milestones required to achieve service readiness: 3.3.1.1 Phase 1: Service Onboarding After contract signature, Motorola will schedule a service kickoff ineeting with the Customer and provide information-gathering documents. This kickoff ineeting is conducted remotely at the earliest, mutually available opportunity. Customer is to identify and ensure participation of key team members in kickoff and project initiation activities. On the Kickoff Date, the Customer will be provisioned onto the ActiveEye MDR portal. The portal will enable service notiiications, access to vulnerability scans and cybersecurity advisories. The frst vulnerability scan will be conducted and reported within 30 days following the Kickoff Date. On the Kickoff Date, the Customer will receive instructions for accessing the Security Operations Center and Incident Response (IR) teams. Once access is provisioned, the Customer will receive any assistance required from the IR team and be able to configure key contacts for interaction with the Security Operations team. The Customer will receive instructions for accessing the Security Operations Center within the first 30 days. 3.3.1.2 Phase 2: Infrastructure Readiness Motorola will provide detailed requirements regarding Customer infrastructure preparation actions at the kickoff meeting. It is the Customer's responsibility to accomplish all agreed upon infrastructure preparations. It is Motorola's responsibility to separately complete any obligated and/or agreed infrastructure readiness tasks. 3.3.1.3 Phase 3: System Buildout and Deployment Motorola will build and provision tools in accordance with the requirements of this proposal and consistent with information gathered in earlier phases. Motorola will also provide detailed requirements regarding Customer deployment actions. The Customer may be required to deploy software and/or configurations in cases where Motorola does not manage the device and does not have access or authorization to perform the installation. Motorola will coordinate with the customer to identify and schedule mutually agreeable maintenance windows where Motorola will perform integration of endpoint detection and response agents at in-scope sites and Customer Enterprise Networks (CENs). Endpoint detection and response agents will not be installed at sites that do not meet the minimum connectivity requirements (either site links with sufficient bandwidth or Control Room Firewalls with customer provided internet). Motorola will leave the existing antivirus solution in place on endpoints located at these out-of-scope sites. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-2 City of Fort Worth October 27, 2025 ASTRO 25 Managed Detection and Response 25-193540-2 / Cybersecurity Services 3.3.1.4 Phase 4: Monitoring "Turn Up" Motorola will verify in-scope assets are forwarding logs or events and notify the Customer of any exceptions. Motarola will begin monitoring connected in-scope sources after the initial tuning period. 3.3.1.5 Phase 5: Tuning and Customer Training Motorola will conduct initial tuning of events and alarms in the service, and conduct an additional ActiveEye Portal training session. 3.3.1.6 Service Commencement The Service will commence with the Service Onboarding phase or within 30 days of contract signature, whichever event occurs soonest for existing customers. In the case of a new ASTRO system, the Service will commence in parallel to the commencement date of the core ASTRO Service package "Turn Up" go live date. Motorola and the Customer will collaborate to complete the additional deployment tasks. 3.4 General Responsibilities Motorola Responsibilities • Provide and when necessary, repair under manufacturer warranty hardware and software required to remotely monitor the ASTRO 25 network and applicable CEN systems inclusive of the AERSS and all software operating on it. - If the Centralized Event Logging feature is not installed on the Customer's ASTRO 25 RNI, Motorola will install it as part of this service. • Coordinate with the Customer on any system changes necessary to integrate the AERSS into the system and establish necessary connectivity. • Provide software and licenses to the Customer necessary to remotely monitor the ASTRO 25 network and applicable CEN environments. • Integrate EDR agents as per the "Deployment Timeline and Milestones" section in all network segments where endpoint detection and response is in scope. - Note that network segments with insufficient connectivity to support endpoint detection and response will be considered out of scope for endpoint detection and response - Motorola will perform the installation of endpoint detection and response agents in the RNI-DMZ CEN(s) and Control Room CEN(s) for all Motorola managed devices that support endpoint detection and response agents. • Assist the Customer with the installation of log forwarding agents on systems that are not managed by Motorola. Note, Motorola will perform installation on all endpoints that are managed by Motorola. • Verify connectivity and monitoring is active prior to start of service. • Coordinate with the Customer to maintain Motorola service authentication credentials. • Monitor the Customer's ASTRO 25 network and applicable CEN systems 24/7 for malicious or unusual activity, using trained and accredited technicians. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-3 City of Fort Worth ASTRO 25 Managed Detection and Response October 27, 2025 25-193540-2 / Cybersecurity Services • Respond to security incidents in the Customer's system in accordance with Section 3.5.6: Incident Priority Level Defnitions and Response Times. Response may include, but is not limited to, requesting additional information from the Customer, continuing to monitor the event for further development or informing the Customer to enact the Customer's documented Incident Response plan. • Assist the Customer with identifying devices that support logging within the ASTRO 25 network and applicable CEN systems have been configured to forward Syslog events to the AERSS. • Provide the Customer with access to the ActiveEye platform enabling Customer access to security event and incident details. Customer Responsibilities The ASTRO 25 MDR service requires a connection from the Customer's ASTRO 25 netwark and applicable CEN systems to the Internet. Establish connectivity with sufficient bandwidth before the service commences. Internet service bandwidth requirements are as follows: - Bandwidth throughput 10 Mbps per AERSS. - High availability Internet Connection (99.99% (4-9s) or higher). - Packet loss < 0.5%. - Jitter <10 ms. - Delay < 120 ms. - RJ45 Port Speed - Auto Negotiate. - If an ASTRO site link will be leveraged for endpoint detection and response communications, that site link must support a minimum of 2 Mbps of bandwidth. • It is the Customer's responsibility or the contracted maintainer to install the AERSS device in the Control Room CEN. • Allow Motorola continuous remote access to monitor the ASTRO 25 network and applicable CEN systems. This includes keeping the connection active, providing passwords, and working with Motorola to understand and maintain administration privileges. • Maintain an active subscription for: - Security Update Service (SUS) (or Remote Security Update Service), ensuring patches and antivirus defnitions are applied according to the release cadence of the service. - ASTRO Dispatch Service and ASTRO Infrastructure Response. • Provide continuous utility services to any equipment installed ar utilized at the Customer's premises to support service delivery and remote monitoring. • Provide Motorola with contact information necessary to complete the Customer Support Plan (CSP). Notify the Customer's Customer Support Manager (CSM) within two weeks of any contact information changes. • Notify Motorola if any components are added to or removed from the environment as it may be necessary to update or incorporate in MDR. Changes to monitored components may result in changes to the pricing of the MDR service. • Ensure that the ASTRO 25 system is operating on a Motorola supported release. • Allow Motorola dispatched field service technicians physical access to monitoring hardware when required. • Cooperate with Motorola and perform all acts that are required to enable Motorola to provide the services described in this SOW. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-4 City of Fort Worth ASTRO 25 Managed Detection and Response October 27, 2025 25-193540-2 / Cybersecurity Services • Configure and maintain networking infrastructure physical and logical configuration to mirror (typically via a port(s) on a switch) netwark traffic to the ActiveEye sensor for applicable CEN systems. • Responding to Cybersecurity Incident Cases created by the Motorola SOC. • It is the Customer's responsibility to install endpoint detection and response agents in the RNI-DMZ CEN(s) and Control Room CEN(s) for any device that supports endpoint detection and response agents and is not Motorola Solutions managed. 3.4.1 3.4.1.1 Service Modules Log Collection / Analytics The AERSS deployed in the system collects logs and other security information from applicable servers, workstations, switches, routers, network intrusion detection sensors, and firewalls. This information is forwarded to the ActiveEye platform, which uses advanced analytics to identify signs of security incidents. If it identifies signs of a security incident, ActiveEye notifies the SOC for further analysis. Motorola Responsibilities • Consult with and advise the Customer on performing necessary system configurations to direct log sources to the appropriate Remote Security Sensor. • The SOC will consult with the Customer to identify appropriate log sources. Customer Responsibilities • If applicable, configure any Customer managed devices in the CEN to forward data to ActiveEye. Applies to included ASTRO 25 RNI, CEN, and Control Room CEN infrastructure. 3.4.1.2 Network Detection The AERSS deploys a Network Intrusion Detection System (NIDS), constantly monitoring traffic passing across, into, ar out of the infrastructure. Network Detection analyzes traffic for signs of malicious activity in real time, and performs packet level and flow level analysis to enable communications modeling. This information is used to identify anomalous behavior that is not captured by pre-defined traffic signatures, including traffic using encrypted connections. Network Detection alerts the SOC for further analysis. Motorola Responsibilities • Optimize the policies and configuration to tune out noise and highlight potential threats. • The SOC consults with the Customer to identify the appropriate deployment of Network Detection Service Components. The SOC monitors and updates the security policy of each sensor to tune out unnecessary alerting and flow monitoring so that the system is optimized to detect true malicious activity. Customer Responsibilities • For Customer's owned CEN infrastructure, con�gure and maintain networking infrastructure physical and logical configuration to mirror (typically via a port(s) on a switch) network traffic to the ActiveEye sensor. • Initiate recommended response actions when active attacks are detected. Applies to included ASTRO 25 RNI, CEN, and Control Room CEN infrastructure. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-5 City of Fort Worth October 27, 2025 ASTRO 25 Managed Detection and Response 25-193540-2 / Cybersecurity Services 3.4.1.3 Endpoint Detection and Response Endpoint detection and response agents deployed on in-scope and supported Windows and Linux hosts and servers throughout the system constantly monitor for indicatars of compromise and feed this infarmation back to the ActiveEye security platform. The Security Operations Center monitors this feed and is ready 24/7 to take action when a detection is made. Motorola Solutions Responsibilities • Install and/or support the installation of endpoint detection and response agents on in scope endpoints in the system as detailed in the "Deployment Timeline and Milestones" section. • Monitor endpoint detection and response feeds for detections of indicators of compromise. • In the event of the detection of an indicatar of compromise, perfarm detailed investigations of the event. • Per the Customer's security policies and defined incident response plan, alert and engage the customer and potentially take an action to deploy a countermeasure to contain the incident. Customer Responsibilities • Work with Motorola to ensure that there is a documented incident response plan that indicates how Motorola should engage with the Customer in the event of a detection of an indicator of compromise. • Provide and maintain contact information for a Customer point of contact that can take action or authorize Motorola to take action in the event of a detection of an indicator of compromise. Applies to in scope ASTRO 25 RNI, CEN, and Control Room CEN infrastructure. 3.4.1.4 External Vulnerability Scanning External Vulnerability Scanning is provided for the ASTRO internet-facing, external network interfaces. The scan is enabled from an internet cloud hosted service outside the ASTRO network. Discovery and vulnerability scans will be run quarterly or on a less frequent schedule defined with the Customer. The initial scan results will be discussed with the Customer during service onboarding. Subsequent scans will be reviewed by a cybersecurity analyst. If any new findings of interest are surfaced, a ticket will be created to communicate these findings with the customer defined contacts. Motorola Responsibilities • Configure scans to match the Customer's preferences for external scope. • Verify vulnerability scans are operating correctly. • Make generated results available in the Customer's ActiveEye portal. • Create ticket notifications for significant, new findings of interest. Customer Responsibilities • During Service Onboarding kickoff, provide Motorola with the IP addresses and/or domain names to be included in the external vulnerability scans. • In accepting this Statement of Work, the Customer authorizes Motorola to engage in external vulnerability scans of internet-facing, external assets disclosed by the Customer. • Be responsible for updating Motorola with any changes to the IP addresses and/or domain names of the internet-facing, external assets subject to the external vulnerability scans. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-6 City of Fort Worth ASTRO 25 Managed Detection and Response October 27, 2025 25-193540-2 / Cybersecurity Services • If the information required to enable vulnerability scanning of the internet-facing, external assets is not provided initially or is not current at any time during the term, Motorola will suspend scans until it is reasonably satisfied that it has been provided with the most current information. • Review a11 quarterly vulnerability reports, and tickets of new �ndings. • Perform any remediation actions required to address identified vulnerabilities. Applies to Internet facing assets only. 3.5 3.5.1 Security Operations Center Monitoring and Support Scope Motorola delivers Security Operations Center (SOC) Monitoring using one or more SOC facilities. The SOC includes any centralized hardware and software used to deliver this Service and its service modules. The SOC and its centralized hardware and software are housed within an SSAE-18 compliant data center. Motorola's SOC is staffed with security experts who will use ActiveEye security platform to monitor elements integrated by service modules. In addition, SOC staff will take advantage of their extensive experience to investigate and triage detected threats, and to recommend responses to the Customer. Depending on Customer security policies and the extent to which endpoint detection and response is deployed within the system, the SOC may take actions to deploy countermeasures in an attempt to contain a security incident. Customer support is provided in the English language. Motorola will start monitoring the ASTRO 25 MDR service in accordance with Motorola processes and procedures after deployment, as described in Section 1.2 Deployment Timeline and Milestones. The SOC receives system-generated alerts 24/7, and provides the Customer with a toll-free telephone number and email address for support requests, available 24/7. Support requests are stored in a ticketing system for accountability and reporting. The SOC will respond to detected events in accordance with Section 3.5.6: Incident Priority Level Definitions and Response Times. 3.5.2 Ongoing Security Operations Center Service Responsibilities Motorola Responsibilities If a probable security incident is detected, provide phone and email support to: • Engage the Customer's defined Incident Response Process. • Gather relevant information and attempt to determine the extent of compromise using existing monitoring capabilities in place as part of the ASTRO 25 MDR service. • Analysis and support to help the Customer determine if the Customer's corrective actions are effective. • Continuous monitaring, in parallel with analysis, to support Incident Response. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-7 City of Fort Worth ASTRO 25 Managed Detection and Response Customer Responsibilities October 27, 2025 25-193540-2 / Cybersecurity Services • Provide Motorola with accurate and up-to-date information, including the name, email, landline telephone numbers, and mobile telephone numbers for all designated, authorized Customer escalation Points of Contact (POC). • Provide a timely response to SOC security incident tickets or investigation questions. Notify Motorola at least twenty-four (24) hours in advance of any scheduled maintenance, network administration activity, or system administration activity that would affect Motorola's ability to perform the Managed SOC Service, as described in this SOW. 3.5.3 Technical Support ActiveEye Security Management Technical Support provides the Customer with a toll-free telephone number and email address for ActiveEye Security Management support requests, available Monday through Friday from 8 a.m. to 7 p.m. CST. Motorola Responsibilities • Notify customers of any scheduled maintenance or planned outages. • Provide technical support, security control, and service improvements related to ActiveEye. Customer Responsibilities Provide sufficient information to allow Motorola technical support agents to diagnose and resolve the issue. Limitations and Exclusions Technical support is limited to the implementation and use of the ActiveEye platform and does not include use or implementation of third-party components. 3.5.4 Incident Response An Indicator of Compromise (IoC) is an observable event that Motorola Security Analysts have determined will jeopardize the confidentiality, integrity, or availability of the system. Examples of IoC include ransomware or malicious use of PowerShell. When an IoC is observed, the Motorola Security Operations team will engage with the customer to investigate the issue, determine the extent of the compromise, and contain the activity to the extent possible with the Motorola security controls deployed within the environment. This expert guidance is available upon contract signature and extends through MDR infrastructure deployment phases and the term of the contract. When an IoC is observed by the Security Analyst, Motorola and Customer will be responsible for the tasks defined in the following subsections. Motorola Responsibilities • Upon the identification of an IoC, notify the Customer's documented contact and initiate the escalation plan. • Take documented, Customer approved actions in an attempt to contain an IoC to the extent enabled via Motorola managed technology. Communicate to the Customer any additional potential containment actions and Incident Response resources that can be taken across the Customer's managed IT infrastructure. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-8 City of Fort Worth ASTRO 25 Managed Detection and Response October 27, 2025 25-193540-2 / Cybersecurity Services • Perform investigation using the ActiveEye MDR integrated and enabled data sources in an initial attempt to determine the extent of an IoC. • Document and share IoC and artifacts discovered during investigation. Motorola services exclude performing on-site data collection or official forensic capture activities on physical devices. Customer Responsibilities • Maintain one named Point of Contact (PoC) to coordinate regular team discussions and organize data collection and capture across the Customer and Motorola teams. • If determined to be required by Customer, contract an Incident Response service provider to perform procedures beyond the scope of this Agreement such as forensic data capture, additional malware removal, system recovery, ransomware payment negotiation, law enforcement engagement, insurance provider communications, identify patient zero, etc. 3.5.5 Event Response and Notification Motorola will analyze events created and/or aggregated by the Service, assess their type, and notify the Customer in accordance with the following table. Table 3-1: Event Handling False Positive or Any events determined by Motorola to not likely None Benign have a negative security impact on the organization. Event of Interest Any events determined by Motorola to likely Escalate to Customer in accordance with (EOI) have a negative security impact on the routine notification procedure. organization. Escalate in accordance with urgent notification procedure when required by agreed-upon thresholds and SOC analysis. Notification procedures are included in Table 3-2. 3.5.5.1 Notification Motorola will establish notification procedures with the Customer, generally categorized in accordance with the following table. Table 3-2: Notification Procedures Routine Notification Procedure The means, addresses, format, and desired content (within the capabilities of the installed technology) for Events of Interest (EOI). These can be formatted for automated processing, e.g., by ticketing systems. Urgent Notification Procedure Additional, optional means and addresses for notifications of Events of Interest that require urgent notification. These usually include telephone notifications. Motorola will notify the Customer according to the escalation and contact procedures defined by the Customer and Motorola during the implementation process. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-9 City of Fort Worth October 27, 2025 ASTRO 25 Managed Detection and Response 25-193540-2 / Cybersecurity Services 3.5.5.2 Tuning Motorola will assess certain events to be environmental noise, potentially addressable configuration issues in the environment, ar false positives. Motorola may recommend these be addressed by the Customer to preserve system and network resources. Motorola will provide the Customer with the ability to temporarily suppress alerts reaching ActiveEye, enabling a co-managed approach to tuning and suppressing events or alarms. The SOC may permanently suppress particular alerts and alarms if not necessary for actionable threat detection. 3.5.5.3 Tuning Period Exception The tuning period is considered to be the first thirty (30) days after each service module has been confirmed deployed and configured and starts receiving data. During the tuning period, Motorola may make recommendations to the Customer to adjust the configurations of their installed software so Services can be effectively delivered. Service Availability will not be applicable during the tuning period and responses or notifications may not be delivered. However, Motorola will provide responses and notifications during this period. Motorola may continue to recommend necessary tuning changes after this period, with no impact on Service Availability. 3.5.6 Incident Priority Level Definitions and Response Times Priority for alert-generated incident ar Events of Interest is determined by the ActiveEye Platform analytics that process multiple incoming alert feeds, automation playbooks, and cybersecurity analyst knowledge. Priority Critical Security incidents that have caused, or are suspected to have caused significant Response provided 24 damage to the functionality of the Customer's ASTRO 25 system ar hours, 7 days a week, information stored within it. Efforts to recover from the incident may be including United States significant. (U.S.) public holidays. Examples: Malware that is not quarantined by anti-virus. Evidence that a monitored component has communicated with suspected malicious actors. High Security incidents that have localized impact and may become more serious if not quickly addressed. Effort to recover from the incident may be moderate to significant. Examples: Malware that is quarantined by antivirus. Multiple behaviors observed in the system that are consistent with known attacker techniques. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted Response provided 24 hours, 7 days a week, including U.S. public holidays. � MOTOAOLA SOLUTIONS Page 3-10 City of Fort Worth ASTRO 25 Managed Detection and Response ' i 1 • i Medium Security incidents that potentially indicate an attacker is performing reconnaissance or initial attempts at accessing the system. Effort to recover from the incident may be low to moderate. Examples include: Suspected unauthorized attempts to log into user accounts. Suspected unauthorized changes to system configurations, such as firewalls or user accounts. Observed failures of security components. Informarional events. User account crearion or deletion. Privilege change for existing accounts. Low 3.5.6.1 Priority These are typically service requests from the Customer. Response Time Goals October 27, 2025 25-193540-2 / Cybersecurity Services Response provided on standard business days, Monday through Friday 8 a.m. to 5 p.m. CST/CDT, excluding U.S. public holidays. Response provided on standard business days, Monday through Friday 8 a.m. to 5 p.m. CST/CDT, excluding U.S. public holidays. Critical An SOC Cybersecurity Analyst will make contact with the customer technical representative within one (1) hour of the request for support being logged in the issue management system ar the creation of an alert suggesting a cybersecurity incident that requires action. Continual effort will be maintained to identify the extent of the incident and provide actions for containment. High An SOC Cybersecurity Analyst will make contact with the customer technical representative within four (4) hours of the request for support being logged at the issue management system or the creation of an alert suggesting a cybersecurity incident that requires action. Continual effort will be maintained to identify the extent of the incident and provide actions for containment. Medium An SOC Cybersecuriry Support Engineer will make contact with the customer technical representative within the next business day of the request for support being logged at the issue management system or the creation of an alert suggesting a cybersecurity incident that requires action. Low 3.5.6.2 An SOC Cybersecurity Support Engineer will make contact with the Customer technical representative within seven business days of the logged request for support at the issue management system. ActiveEye Platform Availability The platform utilizes a multi-zone architecture which can recover from failures in different data collection, enhancement, analysis, and visualization tiers. Motorola will make commercially reasonable efforts to provide monthly availability of 99.9°/o for the ActiveEye Platform services. Service availability is subject to limited scheduled downtime for servicing and upgrades, as well as unscheduled and unanticipated downtime resulting from circumstances or events outside of Motorola's reasonable control, such as disruptions of, or damage, to the Customer's or a third-party's information or communications systems or equipment, telecommunication circuit availability/performance between Customer sites, any on-premises core and/or between on-premises equipment and the ActiveEye Platform. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-11 City of Fort Worth October 27, 2025 ASTRO 25 Managed Detection and Response 25-193540-2 / Cybersecurity Services 3.5.6.3 ActiveEye Remote Security Sensor (AERSS) One or more AERSS may be deployed as part of the MDR solution. The AERSS is configured with multiple local redundancy features such as hot-swap hard disk drives in a redundant drive array configuration and dual redundant power supplies. The AERSS and all components of ActiveEye are monitored by a dedicated Site Reliability Engineering team. In cases of hardware failure of the AERSS, Motorola will provide, subject to active service subscriptions in the Customer contract, onsite services to repair the AERSS and restore service. AERSS operation and outage troubleshooting requires network connection to the ActiveEye Platform which may be impacted by customer configuration changes, telecommunications connectivity, and/or customer network issues/outages. 3.6 Limitations and Exclusions This section applies to all cybersecurity services contained in the Statement of Work. Managed Detection and Response does NOT include services to perform physical containment and/or remediation of confirmed security incidents, remote or onsite. The Customer may choose to purchase additional Incident Response professional services to assist in the creation of and/or execution of a Customer's Incident Response Plan. Motorola's scope of services does not include responsibilities relating to recovery of data available through the products or services, or remediation or responsibilities relating to the loss of data, ransomware, or hacking. Motorola does not represent that it will identify, fully recognize, discover, or resolve all security events or threats, system vulnerabilities, malicious codes, files or malware, indicators of compromise or internal threats or concerns NOTWITHSTANDING ANY PROVISION OF THE AGREEMENT TO THE CONTRARY, MOTOROLA WILL HAVE NO LIABILITY FOR (A) INTERRUPTION OR FAILURE OF CONNECTIVITY, VULNERABILITIES, OR SECURITY EVENTS; (B) DISRUPTION OF OR DAMAGE TO CUSTOMER'S OR TffiRD PARTIES' SYSTEMS, EQUIPMENT, OR DATA, INCLUDING DENIAL OF ACCESS TO USERS, OR SHUTDOWN OF SYSTEMS CAUSED BY INTRUSION DETECTION SOFTWARE OR HARDWARE; (C) AVAILABILITY OR ACCURACY OF ANY DATA AVAILABLE THROUGH THE SERVICES, OR INTERPRETATION, USE, OR MISUSE THEREOF; (D) TRACKING AND LOCATION-BASED SERVICES; OR (E) BETA SERVICES 3.6.1 Service Limitations Cybersecurity services are inherently limited and will not guarantee that the Customer's system will be error-free or immune to security breaches as a result of any or all of the services described in this SOW. Motorola does not warrant or guarantee that this service will identify all cybersecurity incidents that occur in the Customer's system. Services and deliverables are limited by, among other things, the evolving and often malicious nature of cyber threats, conduct/attacks, as well as the complexity/disparity and evolving nature of Customer computer system environments, including supply chains, integrated software, services, and devices. To the extent we do offer recommendations in connection with the services, unless otherwise stated in the Statement of Work, our recommendations are necessarily subjective, may or may not be correct, and may be based on our assumptions relating to the relative risks, priorities, costs, and benefits that we assume apply to you. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-12 City of Fort Worth October 27, 2025 ASTRO 25 Managed Detection and Response 25-193540-2 / Cybersecurity Services 3.6.2 Processing of Customer Data in the United States and/or Other Locations Customer understands and agrees that data obtained, accessed, or utilized in the performance of the services may be transmitted to, accessed, monitored, and/or otherwise processed by Motorola in the U.S. and/or other Motorola operations globally. Customer consents to and authorizes all such processing and agrees to provide, obtain, or post any necessary approvals, consents, or notices that may be necessary to comply with applicable law. 3.6.3 Customer and Third-Party Information Customer understands and agrees that Motorola may obtain, use and/or create and use, anonymized, aggregated andlor generalized Customer Data, such as data relating to actual and potential security threats and vulnerabilities, for its lawful business purposes, including improving its services and sharing and leveraging such information for the benefit of Customer, other customers, and other interested parties. For avoidance of doubt, so long as not specifically identifying the Customer, Customer Data shall not include, and Motorola shall be free to use, share and leverage security threat intelligence and mitigation data generally, including without limitation, third party threat vectors and IP addresses (i.e., so long as not defined as personal information under applicable law), file hash information, domain names, malware signatures and information, information obtained from third party sources, indicators of compromise, and tactics, techniques, and procedures used, learned or developed in the course of providing Services, which data shall be deemed Service Use Data (i.e., Motorola data). 3.6.4 Third-Party Software and Service Providers, Including Resale Motorola may use, engage, license, resell, interface with, or otherwise utilize the products or services of third- party processors or sub-processors and other third-party software, hardware, or services providers (such as, for example, third-party endpoint detection and response providers). Such processors and sub-processors may engage additional sub-processars to process personal data and other Customer Data. Customer understands and agrees that the use of such third-party products and services, including as it relates to any processing or sub-processing of data, is subject to each respective third-party's own terms, licenses, End User License Agreements (EULA), privacy statements, data processing agreements and/or other applicable terms. Motorola disclaims any and all responsibility for any and all loss or costs of any kind associated with security events. Motorola disclaims any responsibility for customer use or implementation of any recommendations provided in connection with the services. Implementation of recommendations does not ensure or guarantee the security of the systems and operations evaluated. Statement of Work Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 3-13 c�ty of Fon wortn ASTRO 25 Managed Detection and Response Section 4 Pro osal Pricin p g 4.1 Pricing Summary October 27, 2025 25-193540-2 / Cybersecurity Services Motorola pricing is based on the services and solution presented in Section 2. The addition or deletion of any component(s) may subject the total solution price to modifications. 1 • i i � . � . � . ASTRO� 25 Managed Detection and Response $102,460.28 -$2,460.28 $100,000.00 Hardware and Equipment Installation and Activation Services Included Included Year 1 Total $102,460.28 Initial Subscription Pricing after Year 1: Inirial Subscription Period - Year 2 Initial Subscription Period - Year 3 Initial Subscription Period - Year 4 TOTAL MDR (Outyears) The Total Contract Value of this proposal is: $412,696.63. CSC #50054 (HGAC RA05-21) $106,558.69 $110,821.04 $115,257.57 $332,637.30 Included Included Included Included -$2,460.28 $100,000.00 -$4,358.69 -$6,571.04 -$9,010.94 -$19,940.67 $102,200.00 $104,250.00 $106,246.63 $312,696.63 Due to significant market and tariff volatility, as well as fluctuations in the cost of energy and raw materials including, but not limited to, steel, copper, finished wood, and concrete, Motorola Solutions reserves the right to equitably adjust the contract price, completion schedule, and/or contract requirements. Additionally, Motorola Solutions reserves the right to apply a fuel surcharge to quoted freight rates based on the prevailing diesel cost at the time of shipment. Proposal Pricing Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 4-1 c�ty of Fon wortn ASTRO 25 Managed Detection and Response 4.2 Payment Schedule & Terms Period of Performance October 27, 2025 25-193540-2 / Cybersecurity Services The initial MDR subscription period of the contract will extend four (4) years from the Commencement Date of Service, defined as the date data is available for analysis, or not later than thirty (30) days after Motorola provides the Customer with necessary hardware or software. Term The Term of the contract begins on the Commencement Date of Service and remains in effect until the expiration of the initial period so specified. Billing Upon acceptance of this proposal by the Customer, Motorola will invoice the Customer for all service fees in advance for the full Year 1 amount according to the Pricing table in Section 4.1. Thereafter, Motorola will invoice the Customer annually, in advance for (a) the Services to be performed (as applicable); and (b) any other charges incurred as agreed upon between the parties during the term of the subscription. Customer will make payments to Motorola within thirty (30) days after receipt of each invoice. Customer will make payments when due in the form of a check, cashier's check, or wire transfer drawn on a United States financial institution. INFLATION ADJUSTMENT. For multi-year agreements, at the end of the first year of the Agreement and each year thereafter, a CPI percentage change calculation shall be performed using the U.S. Department of Labor, Consumer Price Index, all Items, Unadjusted Urban Areas (CPI-U). Should the annual inflation rate increase greater than 3% during the previous year, Motorola shall have the right to increase all future maintenance prices by the CPI increase amount exceeding 3%. All items, not seasonally adjusted shall be used as the measure of CPI for this price adjustment. Measurement will take place once the annual average for the new year has been posted by the Bureau of Labor Statistics. For purposes of illustration, if in year 5 the CPI reported an increase of 8%, Motorola may increase the Year 6 price by 5% (8%-3% base). Tax Unless otherwise noted, this proposal excludes sales tax or other applicable taxes (such as Goods and Services Tax, Value Added Tax, and other taxes of a similar nature). Any tax the customer is subject to will be added to invoices. Proposal Pricing Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 4-2 City of Fort Worth ASTRO 25 Managed Detection and Response Section 5 October 27, 2025 25-193540-2 / Cybersecurity Services Contractual Documentation This Products and Services Agreement (this "AgreemenP') is entered into between Motorola Solutions Inc., ("Seller" or "Motorola") and the entity set forth in section I(b) ("Customer") as of the date last signed below ("Effective Date"). Seller and Customer will each be referred to herein as a"Party" and collectively as the "Parties". I. Seller and Customer Information (a) Se11er (b) Cuetomer � II. (a) �) (c) Transaction Details Proposal Pricing Motorola Solutions, Inc. Name: City of Fort Worth Address: 1515 llth Avenue, Fort Warth, TX 76102 Contact: Mr. Larry Crocket - Senior Manager, Radio Services Proposal No.: 25-193540-2 Date: November 14, 2025 Motorola will provide Customer with the products and services set forth in the proposal dated above (the "Proposal"), a copy of which is attached hereto and incorporated herein. Pricing far products and services being purchased by Customer is set forth in the Proposal. Terms and The Parties acknowledge and agree that the terms of the City of Fort Worth System Purchase Conditions Agreement Contract Number 50054 (HGAC RA05-21) (the "Contract"), including all applicable addenda, are incorporated herein and shall apply to the products and services provided to Customer as set forth in the Proposal. A copy of the Contract is available upon request. III. Entire Agreement This Agreement, including the Proposal and any terms and conditions referenced herein, constitutes the entire agreement of the Parties regarding the subject matter of the Agreement and supersedes all previous agreements, proposals, and understandings, whether written or oral, relating to this subject matter. This Agreement may be executed in multiple counterparts, and shall have the same legal force and effect as if the Parties had executed it as a single document. The Parties may sign in writing, or by electronic signature, including by email. An electronic signature, or a facsimile copy or computer image, such as a PDF ar tiff image, of a signature, shall be treated as and shall have the same effect as an ariginal signature. In addition, an electronic signature, a true and correct facsimile copy, ar computer image of this Agreement shall be treated as and shall have the same effect as an original signed copy of this document. This Agreement may be amended or modified only by a written instrument signed by authorized representatives of both Parties. The preprinted terms and conditions found on any Customer purchase or purchase order, acknowledgment or other form will not be considered an amendment ar modification of this Agreement, even if a representative of each Party signs that document, and the terms of this Agreement will take precedence. Contractual Documentation Use or disclosure of this proposal is subject to the restrictions on the cover page. Motorola Solutions Confidential Restricted � MOTOAOLA SOLUTIONS Page 5-1 EXHIBIT A-15 City of Fort Worth Notice to Proceed (Attached) Sixteenth Amendment to Fort Worth City Secretary Contract No. 50054 Page 4 of 4 FORT WORTH� City of Fort Worth 100 Fort Worth Trail Fort Worth, TX 76102 November 14, 2025 Motorola Solutions, Inc. ("Motorola") 500 W. Monroe St. Chicago, IL 60661 Re: ASTR025 Managed Detection and Response Proposal Contract Name / Number: City of Fort Worth contract #50054 (HGAC RA05-21) Proposal: ASTR025 Managed Detection and Response, Cyber Security Services This Notice to Proceed (NTP) serves as authorization for Motorola Solutions to place an order and invoice for the communication equipment and services as referenced on Proposal ASTR025 Managed Detection and Response and dated November 14, 2025 for the total purchase price of $412,696.63, subject to the terms and conditions of City of Fort Worth contract #50054 (HGAC RA05-21). The yearly payment schedule is: Year 1-$100,000.00 — Net 30 payment from contract execution and subscription commencement Year 2-$102,200.00 — Net 30 from subscription year 2 commencement date Year 3-$104,250.00 — Net 30 from subscription year 3 commencement date Year 4-$106,246.63 — Net 30 from subscription year 4 commencement date The City of Fort Worth agrees to pay Motorola Solutions "Net 30 days from receiving an invoice" for the equipment and services. Title and Risk of Loss to Equipment shall pass to Customer upon shipment from Motorola. Unless otherwise agreed by the parties in writing, shipment will be made in a manner determined by Motorola. This NTP will take precedence with respect to conflicting or ambiguous terms. Customer affirms they have signatory authority to execute this contract. The contract price is fully committed and identified, including all subsequent years of contracted services, if applicable. Customer's payment obligations for all subsequent years of contracted services, if applicable, are contingent upon the appropriation of funds by the Customer's governing body for such purpose. In the event funds are not appropriated for any subsequent fiscal year, the Customer may terminate this Agreement upon thirty (30 days' advance notice to Motorola, effective at the end of the last fiscal year for which funds were appropriated, without penalty or further obligation. Subject to the appropriation of funds as set forth herein, the Customer will pay all invoices as received from Motorola and any changes in scope will be subject to the change order process as described in this Agreement. Motorola acknowledges the Customer may require the issuance(s) of a purchase order or notice to proceed as part of the Customer's procurement process. However, Customer agrees that the issuance or non-issuance of a purchase order or notice to proceed does not preclude the Customer from its contractual obligations as defined in this Agreement. Information Technology Solutions Department IT Strategic Planning and Finance Division City of Fort Worth • 100 Fort Worth Trail, Fort Worth, TX 76102 FORT WORTH� Unless otherwise agreed upon in writing, invoices will be billed based on equipment shipped, services rendered, and standard payment terms and milestones. Once billed, invoices shall be sent and emailed to the Customer at the following address: Invoices should reference City of Fort Worth — IT Solutions; PO # FW004-OOOO011 553. The Equipment will be shipped to the Customer at the following address: 100 Fort Worth Trail Fort Worth, TX 76102 The ultimate destination address (if different from the ship to above) where the Equipment will be delivered to Customer is: 1515 ll t'' Avenue Fort Worth, TX 76102 Customer may change shipment information by giving written or electronic notice to Motorola. If you have any questions regarding this order, please feel free to contact Casey Moore at 817-368-8683. Sincerely yours, G�G1VI�'��� Dlanna Glordano (Feb 5, 2026 13:0322 CST) Y� Name: Dianna Giordano Title: Assistant City Manager Information Technology Solutions Department IT Strategic Planning and Finance Division City of Fort Worth • 100 Fort Worth Trail, Fort Worth, TX 76102 ACITY COUNCIL AGEND Create New From This M&C DATE: 6/25/2024 REFERENCE NO.. **M&C 24- LOG NAME: 04MOTOROLA RADIO 0533 REFRESH CSC 50054 �0 RT �'�'U RT I I -��- CODE: C TYPE: CONSENT PUBLIC NO HEARING: SUBJECT: (ALL) Authorize Amendment to City Secretary Contract No. 50054 with Motorola Solutions, Inc., Using Houston-Galveston Area Council Cooperative Contract No. RA05- 21 and its Successors for the Acquisition of Public Safety Radios, Associated Equipment, and Services to Increase the Authorized Year-Three Amount by $5,267,481.00 for a Revised Year-Three Amount Up to $10,981,617.00 and Authorize Three Additional Renewal Terms with Fourth-Year Amount Up to $5,318,911.80, Fifth-Year Amount Up to $5,538,544.48, and Sixth-Year Amount Up to $5,802,233.03 for the Information Technology Solutions Department RECOMMENDATION: It is recommended that the City Council authorize an amendment to City Secretary Contract No. 50054 with Motorola Solutions, Inc. using Houston-Galveston Area Council Cooperative Contract No. RA05-21 and its successors for the acquisition of public safety radios, associated equipment, and services, to increase the authorized year-three amount by $5,267,481.00 for a revised year-three amount up to $10,981,617.00, and authorize three additional renewal terms with fourth-year amount up to $5,318,911.80, fifth-year amount up to $5,538,544.48, and sixth-year amount up to $5,802,233.03 for the Information Technology Solutions Department. DISCUSSION: The City of Fort Worth maintains a radio communications system, the North Texas Interoperable Radio Network (NTIRN), utilized by most City departments and almost 200 external government entities. On December 5, 2017, Mayor and Council Communication (M&C) C-28495 authorized a System Purchase Agreement with Motorola Solutions, Inc. (Motorola) in an initial annual amount of $1,602,101.00 using Houston-Galveston Area Council (H-GAC) Contract RA05-15 for the acquisition and implementation of radio related capabilities, and establishment of a four-year discount program for the purchase of radios, other system equipment and services. The discount program includes additional discounts of up to 20 percent off H-GAC pricing for radio equipment and a discount of up to 5 percent for services through December 17, 2025. Accordingly, the City executed City Secretary Contract No. 50054 (Agreement) with Motorola. M&C C-28495 also authorized the City to purchase similar equipment and services under successive contracts, stating if H-GAC Contract RA05-15 is not extended but H-GAC executes a new cooperative contract with Motorola with substantially similar terms as H-GAC Contract RA05-15, that M&C authorizes the City to purchase equipment and services under the new H-GAC contract. On December 14, 2021, City Council approved M&C 21-0937 authorizing an amendment to the agreement with Motorola for additional radios and other system equipment & services for three one- year terms with a first-year amount of $1,462,800.00, second-year amount of $1,609,080.00, and third-year amount of $1,769,988.00 for a cumulative contract total up to $4,841,868.00. On June 28, 2022, City Council approved M&C 22-0496 to acquire public safety radios and associated equipment and increase the contract amount in year two by $2,797,260.00 for a revised year two amount up to $4,406,340.00. This M&C revised the cumulative contract up to $7,639,128.00. On April 23, 2024, City Council approved M&C 24-0311 authorizing an amendment to the agreement with Motorola for an additional radio tower and communication equipment in the amount of $3,944,148.00 for a revised year-three amount up to $5,714,136.00. This M&C will authorize the City to continue purchasing radios for Radio Refresh, additional radio consoles, communication equipment, and services with an increase of spend authority in the amount of $5,267,481.00 for a revised year-three amount up to $10,981,617.00 and authorize three additional renewal terms in the amount of $5,318,911.80 in year-four. Future years' expenditures are expected to rise 10 percent each year as follows: $5,538,544.48 in year five and $5,802,233.03 in year six. This M&C revised the cumulative contract up to $33,510,446.31. Year Year-one (FY22) Year-two (FY23) Year- three(FY24)* Year-four (FY25)** Year-five (FY26)** Year-six (FY27)** Total Amount Up to $1,462,800.00 $4,406,340.00 $10,981,617.00 $5,318,911.80 $5,538,544.48 $5,802,233.03 $33,510,446.31 *FY24 includes increases for Northwest radio tower, radio refresh and dispatch console additions. *�`FY25-FY27 includes increases for radio refresh. All other terms and conditions of the existing agreement remain the same. Funding is budgeted in the Other Contractual Services account within the Info Technology Systems Fund and in the CCPD Capital Projects and ITS Capital Funds for the ITS Department for the purpose of funding various projects. PRICE ANALYSIS - H-GAC provides up to a 25 percent discount off the list price for products commonly acquired by the City with no significant pricing increase compared to the last agreement approved by City Council on December 6, 2016 (M&C P-11978). In addition, Information Technology Solutions staff negotiated additional discounts of up to 20 percent off H-GAC pricing in an agreement with Motorola approved by City Council on December 5, 2017 (M&C C-28495) through December 2025. BUSINESS EQUITY - An M/WBE goal is not assigned when purchasing from an approved purchasing cooperative or public entity. COOPERATIVE PURCHASE - State law provides that a local government purchasing an item under a Cooperative Purchasing Agreement satisfies any state law requiring that the local government seek competitive bids for the purchase of the item. The contract was competitively bid to increase and simplify the purchasing power of government entities across the State of Texas. ADMINISTRATIVE CHANGE ORDER: An administrative change order or increase may be made by the City Manager up to the amount allowed by relevant law and the Fort Worth City Code and does not require specific City Council approval as long as sufficient funds have been appropriated. AGREEMENT TERMS — Upon City Council's approval, the existing agreement will be renewed in accordance with H-GAC RA05-21 or its successor. RENEWAL OPTIONS — The agreement may be renewed for additional one-year terms at the City's option, in accordance with H-GAC RA05-21 or its successor. If H-GAC Contract RA05-21 is not extended but H-GAC executes a new cooperative contract with Motorola Solutions, Inc. with substantially similar terms as H-GAC Contract RA05-21, this M&C authorizes the City to purchase equipment and services under the new H-GAC contract. This action does not require specific City Council approval provided that the City Council has appropriated sufficient funds to satisfy the City's obligations during the renewal term. SUCCESSOR CONTRACTS - In the event the H-GAC agreement is not renewed, staff would cease purchasing at the end of the last purchase agreement coinciding with a valid cooperative agreement. If the City Council were to not appropriate funds for a future year, staff would stop making purchases when the last appropriation expires, regardless of whether the then-current purchase agreement has expired. The City will initially use H-GAC Contract No. RA05-21 to make purchases authorized by this M&C. As noted, H-GAC Contract No. RA05-21 expires on July 31, 2024. If H-GAC Contract No. RA05-21 is extended, this M&C authorizes the City to purchase similar equipment and supplies under the extended contracts. If H-GAC Contract No. RA05-21 is not extended, but H-GAC executes a new cooperative contract with Motorola Solutions, Inc. with substantially similar terms as H-GAC Contract No. RA05-21, this M&C authorizes the City to purchase the equipment and supplies under the new H- GAC contract. FISCAL INFORMATION/CERTIFICATION: The Director of Finance certifies that funds are available in the current operating and capital budgets, as previously appropriated, in the Info Technology Systems Fund and in the ITS Capital and CCPD Capital Projects Funds for various projects to support the approval of the above recommendation and execution of the amendment. Prior to an expenditure being incurred, the IT Solutions Department has the responsibility to validate the availability of funds. TO � Fund FROM Fund Department ID Department ID Account Project � Program I Activity I Budget ID Year Account Project Program � Activity � Budget ID Year Submitted for City Manager's Office by_ Originating Department Head: Additional Information Contact: ATTACHMENTS Mark McDaniel (6316) Kevin Gunn (2015) Donlen Ruffin (2017) Reference # Amount (Chartfield 2) Reference # Amount (Chartfield 2) i 04MOTOROLA RADIO REFRESH CSC 50054.docx (CFW Internal) FID Table Motorola 50054 Radio Refresh.XLSX (CFW Internal) Form 1295 Certificate 101180453.pdf (CFW Internal) FORT �ORTH� City Secretary's Office Contract Routing & Transmittal Slip Contractor's Name: Motoro�a so�utions, Inc. Sub�eCt Of the Agreement: Sixteenth Amendment to CSC 50054 with Motorola Solutions, Inc. for the purchase of Public Safety Radios, Associated Equipment, and Related Services M&C Approved by the Council? * Yes 8 No ❑ If �so, the M&C must be attached to the contract. Is this an Amendment to an Existing contract? Yes 8 No ❑ CSC 5oo54-A� 6 If �so, provide the original contract number and the amendment number. Is the Contract "PermanenY'? *Yes ❑ No 8 If �unsure, see back page for pernianent contract listing. Is this entire contract Confidential? *Yes ❑ No 8 If only specific information is Confidential, please list what information is Confidential and the page it is located. Exhibit A-14 is confidential (pages 4-29) & Exhibit A-15 is confidential (pages 31-32) Effective Date: Expiration Date: 07�3��2026 If different from the approval date. If applicable. Is a 1295 Form required? * Yes ❑ No 8 *If �so, please ensure it is attached to the approving M&C or attached to the contract. Proj ect Number: If applicable. *Did you include a Text field on the contract to add the City Secretary Contract (CSC) number? Yes 8 No ❑ Contracts need to be routed for CSO processin� in the followin� order: 1. Katherine Cenicola (Approver) 2. Jannette S. Goodall (Signer) 3. Allison Tidwell (Form Filler) *Indicates the information is required and if the information is not provided, the contract will be returned to the department.