Technology Solutions For
|
|
- Cora Owen
- 8 years ago
- Views:
Transcription
1 Technology Solutions For THE PLAYBOOK Powered by
2 The Datum Partner Advantage Introduction Over the next few months Datum will be transitioning IT services from your existing vendors. Born from the restaurant industry, Datum is a national leader in enterprise technology consulting and services. As it relates to Beef O Brady s and Brass Tap, Datum will offer a more comprehensive solution with enhanced Support and better value than ever before. With both remote and field service teams, Datum can deliver a premium service experience. Support will include the POS system, network, and RTI back office system initially. To stay relevant, Beef O Brady s and Brass Tap will continue to roll out new technology from best-of-breed vendors, and Datum is committed to supporting these vendors, as well as assisting with the project management and seamless integration. Additionally, Datum has the resources to secure your networks and implement best practices as they relate to security and PCI compliance. To read more about Datum, please visit We are excited to get started and begin working with all of you! The Datum Team
3 CONTACT INFORMATION NEW CLIENTS For NEW SALES, UPGRADES & INQUIRIES, contact: Datum Account Management Team EXISTING CLIENTS For SUPPORT, contact: Urgent/Emergencies (Call): (Toll-free) x2 POS Support x3 Technical Support Non-critical and basic support questions ( ): For UPGRADES & INQUIRIES, contact:
4 POS SUPPORT Details of POS Support Partnership: Datum will assume POS support upon execution of the Datum Managed Technology Service Agreement ( MTSA ) and completion of Datum implementation. Datum will provide POS support for your location(s) at no charge through the end of each location s current support agreement with the existing vendor. Each participating franchise owner will be required to sign an MTSA. The POS Support agreement will have an 18-month term from date of signature. Upon expiration of current support terms, each unit will pay their same current POS support agreement rate. Datum support service will be billed monthly (not annually) with no upfront costs. (To calculate your Datum monthly POS support rate, divide your unit s current annual rate by 12). POS support rate shall not increase by more than 10% upon completion of the 18- month agreement. POS Support Services Include: Datum Total Care POS Support MTSA Features for Servers and Workstations Description On Site & Remote Monitoring Support Assistance 24/7 UPS, CPU, Disk, Memory, & Event Log Monitoring 24/7 monitoring ensures your key business resources such as servers, applications, and many other devices and services are functioning optimally and efficiently Antivirus, & Anti-Spyware Management (Provision, Monitoring and Maintenance) Provides and ensures that your antivirus, and anti-spyware programs are functioning properly and updates to your system are being received and installed
5 Datum Total Care POS Support MTSA Features for Servers and Workstations Services (Processes) Description On Site & Remote Monitoring Support Assistance Critical business services such as SQL, Exchange, Symantec Backup Exec, DNS, Antivirus, IIS, with more detailed information regarding services available on request Vendor Management Work with hardware and software vendors on your behalf to remediate any support issue Network Management Remotely or locally monitor and configure network Server Management Patch Management Firewall Management Reporting System Optimization (Server) Emergency Response Time 2 Remote Support On-site Support Support Hours- 24 x 7 x 365 New user and account creation, DNS, DHCP, WINS, user account management, data backup management, rights management Patch Level Management to ensure that the server(s) and Windows workstations in your network are always updated with the latest security patches Firmware updates, firewall changes, and firewall monitoring for supported Firewalls. Comprehensive reporting to continually inform you about the current health of your network and to outline the work performed Shut-down unnecessary services, defrag drives, remove unneeded applications 30 Minutes Response Next Day Response Reactive On-Site & Remote Support During Business Hours 3 After Hours (Emergency, Unscheduled) 2. Guaranteed emergency response time; Emergency is defined as a total and complete failure of components resulting in the termination of critical business operations. 3. Normal Business hours 8am-5pm EST.
6 STORES WITH NO CURRENT POS SUPPORT SERVICE AGREEMENTS Stores with 2 terminals will be offered above POS Support Services at a monthly rate of $120 per month upon execution of the MTSA. Stores with 3 terminals will be offered above POS Support Services at a monthly rate of $145 per month upon execution of the MTSA. Stores with 4 terminals will be offered above POS Support Services at a monthly rate of $180 per month upon execution of the MTSA. Stores with 5 terminals will be offered above POS Support Services at a monthly rate of $215 per month upon execution of the MTSA. Stores with 6 terminals will be offered above POS Support Services at a monthly rate of $250 per month upon execution of the MTSA. ipads/tablets- please beefs@datumcorporation.com GETTING STARTED W/ THE POS SUPPORT PROGRAM Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: Obtain a copy of your current POS Support Service agreement Download the Datum Playbook and Datum Support MTSA above Contact Datum Sales: beefs@datumcorporation.com with the following info: Subject: BOB/BT Store # - City Body of Contact Name, Address, Store Phone, Mobile Phone, and Legal Business Name Attachments: 1. Copy of your current POS Support agreement (and/or current quotes if you are seeking hardware/system upgrades) 2. Completed and signed Datum MTSA Implementation process begins Datum POS Support commences after implementation Quotes for hardware, software and network upgrades will be provided after implementation. FOCUS POS- Implementation begins September, 2014 ALOHA POS- Implementation begins October, 2014
7 Transitioning sites seamlessly: All locations will be provided with Datum contact information should current support company refuse to provide service during transition, whereby Datum will initiate offsite support for those locations until implemented. Key priority sites: High problem or critical state locations will be given first priority attention from Datum team where deemed necessary. *Implementation Schedule is based upon execution of the POS Support MTSA, as well as the client s availability and accommodation of requested implementation/site assessment items. Delay or rescheduling may extend implementation schedule. Implementation What to Expect - Security Authentication Procedure: Initial Implementation Remote Login Protocol: An from implementation@datumcorporation.com will be sent to the restaurants that are scheduled for the following week s implementation. This will contain the date & time that a Datum Support Technician will contact the Restaurant. This will also contain the implementation process along with a code that the Datum Support Technician will verbally provide the day of implementation for security verification before the restaurant should allow remote access to the POS System. Ongoing Remote Access: Datum s Support Center will monitor and receive alerts and have remote access capability to address problems should they arise. Our remote monitoring & management application requires two-factor authentication for all support technicians to access the system. All remote sessions are audited and the remote session is encrypted. If the BOH (Back of House) PC is not functioning correctly and the support technician is unable to remotely connect via our management application, we will contact the site to request remote access via remote access website such as LogMeIn Rescue.
8 To verify authenticity the restaurant is requested to ask for a ticket # and then end the call and call back the number found on our website or other business correspondence previously provided. If you receive a call from Datum Support requesting any information or remote access, please do not give out any info, simply request a ticket number and hang up. Then call back this number x2 and give the ticket number back to the support technician answering the call. NEW HARDWARE Hardware upgrades and new system purchases (i.e. terminals or computers) for participating stores can be quoted upon request after implementation by contacting beefs@datumcorporation.com Large hardware needs can be added to the MTSA and financed over 63 month terms. NEW SOFTWARE Upon implementation and thorough software audit, Datum will provide a quote for any necessary and/or critical software updates (see Compliance below). Major software upgrades can be purchased through Sales and added to the MTSA. ADDITIONAL TECHNOLOGY SOLUTIONS SERVICES AVAILABLE New store POS System installations Office Computers and BOH servers Cabling and infrastructure Commercial grade Firewall Internet and Customer WiFi Service Telephone Systems and Telecom Service Copier / Printer Service Customer Loyalty Programs Tablets / Tableside Ordering Solutions Labor Lifecycle Management Software
9 Inventory Management Software Kitchen Screen and Automation Hardware Digital Menu Boards Online Ordering IT Service More Pricing available upon request after implementation, and may require further information to deliver a quote. Contact: beefs@datumcorporation.com Compliance Legacy operating systems and applications (those that are no longer supported by the software vendor) fall outside of the scope of this program. Equipment whose deployment has been extended beyond its intended lifespan and that causes problems as a result must be replaced in a timely fashion to be in compliance with the support plan. Compliance issues will be discussed with the client, and every effort will be made to work within the client s budgetary restrictions. Systems deemed by Datum that are not in compliance may be excluded from the program. About Datum Datum Corporation is a national company headquartered in Sarasota, FL and specializes in developing Managed Technology Services for multi-unit restaurants that are looking to streamline processes and position themselves for expansion and growth. Datum focuses on proven and reliable technologies, ensures efficient, secure integration and implementation, all while managing these technologies for our clients. We see our clients as partners and allow them to focus on their core business and growth initiatives, while we drive and manage the technologies that support those initiatives. Datum s philosophy is client-based and designed to maximize what the client wants from a program: new best-of-breed technology, optimized service levels, controlled and predictable costs, one overall program with the flexibility to upgrade the configuration and program throughout the length of the agreement.
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
More informationPREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
More informationSERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
More informationInformation Technology Solutions. Managed IT Services
Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance
More informationSymmetry Networks. Corporate Managed Services Schedule
Symmetry Networks Corporate Managed Services Schedule A Managed Services Solution version 1.0 January 2015 This Service Schedule forms part of the Agreement between Us (Symmetry Networks Pty Ltd) and You
More informationInformation Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
More informationAdministrative Systems
Administrative Systems Administrative Systems PCI Infrastructure Services Reference Compliance with the Payment Card Industry s Data Security Standard (PCI DSS) is critical for all merchants who accept
More informationMANAGED WORKPLACE. See All. Manage All. Service All.
MANAGED WORKPLACE Managed Services Platform Exclusively for IT Service Providers, with Fully Integrated NOC and Help Desk About Managed Workplace Managed Workplace remote monitoring and management (RMM)
More informationLHRIC Network Support - Additional Service Features
LHRIC Network Support - Additional Service Features It is important to note that costs associated with LHRIC Network Support service not only cover an on-site support engineer but also include a number
More informationI.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000
Letting you do what you do best... run your business www.sironasolutions.com 06 850 000 For years, IT companies and their clients have been working against each other. Something breaks, the IT company
More informationGuardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
More informationRemote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
More informationOperating System Migration
Operating System Migration 1 (7) Table of Contents 1. Executive Summary... 3 2. Challenges In Operating System Migrations... 3 3. Remote Migration With Miradore... 5 4. Conclusion... 7 2 (7) 1. EXECUTIVE
More informationAre You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview
Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block
More informationSentinel Platform/Managed IT Services Agreement Page 1 of 6. 1. Term of Agreement
Page 1 of 6 1. Term of Agreement This Agreement between, herein referred to as Client, and Word of Mouth Computers and Electronics, LLC hereinafter referred to as Service Provider, is effective on the
More informationensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
More informationAppendix D to DIR Contract No. DIR-SDD-2102. SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for <DIR CUSTOMER> END USER SERVICES
Appendix D to DIR Contract No. DIR-SDD-2102 SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for END USER SERVICES TABLE OF CONTENTS 1. Introduction... 3 2. Term of SOW...
More informationManaged Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationAncero Backup & Disaster Recovery (BDR) Service Guide
Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware
More informationPatch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
More informationMiami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
More informationFully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007
Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232
More informationCustomized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationRemote Infrastructure Support Services & Managed IT Services
Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The
More informationCSU, Chico Credit Card PCI-DSS Risk Assessment
CSU, Chico Credit Card PCI-DSS Risk Assessment Division/ Department Name: Merchant ID Financial Account Location (University, Auxiliary Organization) Business unit functional contact: : Title: Telephone:
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationDevice Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
More informationPCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
More informationManaged Security Services SLA Document. Response and Resolution Times
Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response
More informationIntroduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
More information1.1 In consultation with management, to identify against business objectives, issues of self-development and training.
London Fire Brigade is run by the London Fire and Emergency Planning Authority Fire Our vision To be a world class fire and rescue service for London, Londoners and visitors. Job Description JOB TITLE
More informationOn-Site Computer Solutions values these technologies as part of an overall security plan:
Network Security Best Practices On-Site Computer Solutions Brian McMurtry Version 1.2 Revised June 23, 2008 In a business world where data privacy, integrity, and security are paramount, the small and
More informationEzi Managed Services Pty Ltd Introduction to Our Managed Service Agreement
Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au info@ezims.com.au
More informationManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
More informationJACK LEVY 8609 Misty River Ct. Tampa, FL 33637 Home: (813) 601-1434 JLEVY1126@gmail.com
SYSTEMS ADMINISTRATOR\Engineer Infrastructure planning, development and maintenance Systems administrator with 8 years of experience in IT infrastructure, deployment, planning, installation, configuration.
More informationהמרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
More informationAVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
More informationMonthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month
SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone
More informationCompany Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
More informationClick to Continue 9/3/2013
Click to Continue 9/3/2013 Next This toolkit is intended to supplement and expedite the personal training and support that Yellow Dog Software provides you during your implementation process. Click to
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationPrepared by: OIC OF SOUTH FLORIDA. May 2013
OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationUser Set Up Booklet 1-800-653-3345. VeriFone Sapphire. Topaz POS. Terminals. For use with VeriFone. VeriFone Sapphire and. www.success-systems.
VeriFone Sapphire and Topaz POS Terminals User Set Up Booklet Ruby POS SuperSystems Sapphire Topaz POS Terminal epb TM For use with VeriFone Ruby SuperSystems VeriFone Sapphire and Topaz 1-800-653-3345
More informationIT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
More informationSystem Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
More informationRFQ 12-21 IT Services. Questions and Answers
RFQ 12-21 IT Services Questions and Answers Question # 1: Just to clarify and I am more than certain that this is just a typo, but the due date for the submission of the IT Services RFP is January 7, 2013,
More information4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
More informationNetwork Computing Architects Inc. (NCA) Network Operations Center (NOC) Services
Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following
More informationRequest for Proposal Technology Services Maintenance and Support
Request for Proposal Technology Services Maintenance and Support Maintenance and Support July 19, 2014 Celerity Educational Group is seeking an IT consulting firm to manage Maintenance of our Network Systems
More informationSPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX
SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),
More informationCalifornia Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
More informationPAR EverServ Services
PAR EverServ Services Maximize your return on investment with PAR EverServ Services For more than 30 years, ParTech, Inc. (PAR) has been designing, integrating, and managing leading-edge technology systems
More informationCatapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
More informationWHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.
WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationTransformation of POS Operations at
Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail
More informationLifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
More informationPayment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
More informationDESKTOP SUPPORT SERVICE LEVEL AGREEMENT
DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.
More informationPCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
More informationAdministration A. Superintendent. Technology Services Proposal. Board of Education Dr. Bruce Law Superintendent of Schools DATE: July 30 2015
Dr. Bruce Law Pamela Bylsma Tammy Prentiss Domenico Maniscalco Bill Eagan Superintendent Assistant Superintendent Assistant Superintendent Chief Human Chief Financial of Schools for Academics for Student
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationEnabling Deskside Manageability and Productivity. The CompuCom EUC Workbench Powered by Intel vpro Technology
Enabling Deskside Manageability and Productivity The CompuCom EUC Workbench Powered by Intel vpro Technology There is no question that today s enterprise IT faces escalated demands from supporting a mobile
More informationGeneral Service Level Agreement
General Service Level Agreement Pricing We offer an unlimited Break / Fix for each device. Cost is below. Server Management = $199 / month per server Network Management = $199 / month per company Desktop
More informationData Stored on a Windows Computer Connected to a Network
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Computer Connected to
More informationPOSitive Retail Manager Installation Guide
POSitive Retail Manager Installation Guide Table of Contents Table Of Contents...1 Introduction to PRM...3 System Requirements...3 SQL Considerations...5 What Is SQL?...5 Installing PRM...6 Installing
More informationPCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
More informationQualified Integrators and Resellers (QIR) Implementation Statement
Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application
More informationManaged Services Overview Servers, Exchange, Help Desk, and Citrix Infrastructures
Overview Servers, Exchange, Help Desk, and Citrix Infrastructures Prepared By: Envision Information Technologies Last Modified: Thursday, August 28, 2014 Table of Contents Table of Contents... 2 EIT Contacts...
More informationPCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST udit.pathak@niiconsulting.com Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
More informationHIPAA Privacy and Security Risk Assessment and Action Planning
HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationIT Onsite Service Contract Proposal. For. <<Customer>> Ltd
IT Onsite Service Contract Proposal For Ltd 1 of 14 I N T R O D U C T I O N This Service Contract for Onsite Deskside PC Support (this Service Contract ) is made effective as of February 5th,
More informationCase Study: Fast Food Security Breach (Multiple Locations)
CASE STUDY Fast Food Security Breach (Multiple Locations) Case Study: Fast Food Security Breach (Multiple Locations) By Brad Cyprus, SSCP - Senior Security Architect, Netsurion Details Profile Case Study
More informationCybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
More informationIT Solutions Savings through Sm@rt IT
IT Solutions Savings through Sm@rt IT Business Success Your most important asset and the key to business success is your people, never more so than in tough economic times. Smart Computers and Consulting
More informationCourse: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
More informationACME ASSOCIATION. Network Status Report Executive Summary
ACME ASSOCIATION Network Status Report Executive Summary Table of Contents Overview 5 Assessment Nomenclature 6 Inspection Criteria 6 Areas of Assessment 6 Reporting Criteria 6 Active Directory and Related
More informationTechnical Writing - A Guide to IT Support Contract
Terms & Conditions for ADM s IT Support Customers (Standard, Standard Plus, Premium, Premium Plus) ADM Computing (the 'Company'), Chaucer Road, Canterbury, Kent, CT1 1HH 1. (1) Applicable to IT Support
More informationCredit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
More informationPrepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc.
Agreement for IT Assessment Assessment Recommendation Statement of Work Onboarding Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc. TABLE OF CONTENTS INTRODUCTION 3 UNDERSTANDING
More informationPavelComm s Pro-Tech Lite Fact Sheet
PavelComm s Fact Sheet PavelComm s Fact Sheet - IT for Small Companies with Big Business Needs Owners, Executives and Managers should be investing in and integrating technology to increase the productivity
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationPCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationComputer Information Systems
Full Time Job Title: IT Technician Job Number: 2245 Hours/Days: Varies Salary: Approximate Location: Los Angeles, CA Skills Information Technology (IT) Technician will be the primary provider of support
More informationNetwork Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name
Network Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Environment Risk and Issue Score Issue Review Next Steps Agenda Environment - Overview Domain Domain Controllers 4 Number
More informationBusiness ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
More informationCUSTOMER NAME. Hosting Services Agreement
CUSTOMER NAME Hosting Services Agreement Service Plan Details FLYWIRE TECHNOLOGY offers three service plans: Silver, Gold and Platinum based on the services your firm needs. The Silver plan is designed
More informationHawaii Behavioral Health. Technology Plan. Technology and System Plan. Carla Gross Chief Operating Officer. Technology and System Plan 2013-2015
Hawaii Behavioral Health Technology Plan Technology and System Plan Carla Gross Chief Operating Officer Prepared by: Michael Lukson Hawaii Behavioral Health TECHNOLOGY & SYSTEM PLAN 2013-2015 The purpose
More informationData Stored on a Windows Server Connected to a Network
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to
More informationBackup Exec System Recovery Management Solution 2010 FAQ
Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation
More informationSITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationContents. Instructions for Using Online HIPAA Security Plan Generation Tool
Instructions for Using Online HIPAA Security Plan Generation Tool Contents Step 1 Set Up Account... 2 Step 2 : Fill out the main section of the practice information section of the web site.... 3 The next
More information24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase
24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk Onsite Support itg CloudBase Pro-Active managed it support services for one single cost per month covers all aspects of
More informationAccess Control & Surveillance. Business Phone Systems. Data Storage & Recovery. Managed IT Services
Designed by Business Phone Systems Managed IT Services Access Control & Surveillance Data Storage & Recovery FOR MORE INFORMATION, CONTACT TCT TODAY: Toll free 1.800.800.7806 454 Moore Lane, Suite 4 &
More information