Technology Solutions For

Size: px
Start display at page:

Download "Technology Solutions For"

Transcription

1 Technology Solutions For THE PLAYBOOK Powered by

2 The Datum Partner Advantage Introduction Over the next few months Datum will be transitioning IT services from your existing vendors. Born from the restaurant industry, Datum is a national leader in enterprise technology consulting and services. As it relates to Beef O Brady s and Brass Tap, Datum will offer a more comprehensive solution with enhanced Support and better value than ever before. With both remote and field service teams, Datum can deliver a premium service experience. Support will include the POS system, network, and RTI back office system initially. To stay relevant, Beef O Brady s and Brass Tap will continue to roll out new technology from best-of-breed vendors, and Datum is committed to supporting these vendors, as well as assisting with the project management and seamless integration. Additionally, Datum has the resources to secure your networks and implement best practices as they relate to security and PCI compliance. To read more about Datum, please visit We are excited to get started and begin working with all of you! The Datum Team

3 CONTACT INFORMATION NEW CLIENTS For NEW SALES, UPGRADES & INQUIRIES, contact: Datum Account Management Team EXISTING CLIENTS For SUPPORT, contact: Urgent/Emergencies (Call): (Toll-free) x2 POS Support x3 Technical Support Non-critical and basic support questions ( ): For UPGRADES & INQUIRIES, contact:

4 POS SUPPORT Details of POS Support Partnership: Datum will assume POS support upon execution of the Datum Managed Technology Service Agreement ( MTSA ) and completion of Datum implementation. Datum will provide POS support for your location(s) at no charge through the end of each location s current support agreement with the existing vendor. Each participating franchise owner will be required to sign an MTSA. The POS Support agreement will have an 18-month term from date of signature. Upon expiration of current support terms, each unit will pay their same current POS support agreement rate. Datum support service will be billed monthly (not annually) with no upfront costs. (To calculate your Datum monthly POS support rate, divide your unit s current annual rate by 12). POS support rate shall not increase by more than 10% upon completion of the 18- month agreement. POS Support Services Include: Datum Total Care POS Support MTSA Features for Servers and Workstations Description On Site & Remote Monitoring Support Assistance 24/7 UPS, CPU, Disk, Memory, & Event Log Monitoring 24/7 monitoring ensures your key business resources such as servers, applications, and many other devices and services are functioning optimally and efficiently Antivirus, & Anti-Spyware Management (Provision, Monitoring and Maintenance) Provides and ensures that your antivirus, and anti-spyware programs are functioning properly and updates to your system are being received and installed

5 Datum Total Care POS Support MTSA Features for Servers and Workstations Services (Processes) Description On Site & Remote Monitoring Support Assistance Critical business services such as SQL, Exchange, Symantec Backup Exec, DNS, Antivirus, IIS, with more detailed information regarding services available on request Vendor Management Work with hardware and software vendors on your behalf to remediate any support issue Network Management Remotely or locally monitor and configure network Server Management Patch Management Firewall Management Reporting System Optimization (Server) Emergency Response Time 2 Remote Support On-site Support Support Hours- 24 x 7 x 365 New user and account creation, DNS, DHCP, WINS, user account management, data backup management, rights management Patch Level Management to ensure that the server(s) and Windows workstations in your network are always updated with the latest security patches Firmware updates, firewall changes, and firewall monitoring for supported Firewalls. Comprehensive reporting to continually inform you about the current health of your network and to outline the work performed Shut-down unnecessary services, defrag drives, remove unneeded applications 30 Minutes Response Next Day Response Reactive On-Site & Remote Support During Business Hours 3 After Hours (Emergency, Unscheduled) 2. Guaranteed emergency response time; Emergency is defined as a total and complete failure of components resulting in the termination of critical business operations. 3. Normal Business hours 8am-5pm EST.

6 STORES WITH NO CURRENT POS SUPPORT SERVICE AGREEMENTS Stores with 2 terminals will be offered above POS Support Services at a monthly rate of $120 per month upon execution of the MTSA. Stores with 3 terminals will be offered above POS Support Services at a monthly rate of $145 per month upon execution of the MTSA. Stores with 4 terminals will be offered above POS Support Services at a monthly rate of $180 per month upon execution of the MTSA. Stores with 5 terminals will be offered above POS Support Services at a monthly rate of $215 per month upon execution of the MTSA. Stores with 6 terminals will be offered above POS Support Services at a monthly rate of $250 per month upon execution of the MTSA. ipads/tablets- please beefs@datumcorporation.com GETTING STARTED W/ THE POS SUPPORT PROGRAM Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: Obtain a copy of your current POS Support Service agreement Download the Datum Playbook and Datum Support MTSA above Contact Datum Sales: beefs@datumcorporation.com with the following info: Subject: BOB/BT Store # - City Body of Contact Name, Address, Store Phone, Mobile Phone, and Legal Business Name Attachments: 1. Copy of your current POS Support agreement (and/or current quotes if you are seeking hardware/system upgrades) 2. Completed and signed Datum MTSA Implementation process begins Datum POS Support commences after implementation Quotes for hardware, software and network upgrades will be provided after implementation. FOCUS POS- Implementation begins September, 2014 ALOHA POS- Implementation begins October, 2014

7 Transitioning sites seamlessly: All locations will be provided with Datum contact information should current support company refuse to provide service during transition, whereby Datum will initiate offsite support for those locations until implemented. Key priority sites: High problem or critical state locations will be given first priority attention from Datum team where deemed necessary. *Implementation Schedule is based upon execution of the POS Support MTSA, as well as the client s availability and accommodation of requested implementation/site assessment items. Delay or rescheduling may extend implementation schedule. Implementation What to Expect - Security Authentication Procedure: Initial Implementation Remote Login Protocol: An from implementation@datumcorporation.com will be sent to the restaurants that are scheduled for the following week s implementation. This will contain the date & time that a Datum Support Technician will contact the Restaurant. This will also contain the implementation process along with a code that the Datum Support Technician will verbally provide the day of implementation for security verification before the restaurant should allow remote access to the POS System. Ongoing Remote Access: Datum s Support Center will monitor and receive alerts and have remote access capability to address problems should they arise. Our remote monitoring & management application requires two-factor authentication for all support technicians to access the system. All remote sessions are audited and the remote session is encrypted. If the BOH (Back of House) PC is not functioning correctly and the support technician is unable to remotely connect via our management application, we will contact the site to request remote access via remote access website such as LogMeIn Rescue.

8 To verify authenticity the restaurant is requested to ask for a ticket # and then end the call and call back the number found on our website or other business correspondence previously provided. If you receive a call from Datum Support requesting any information or remote access, please do not give out any info, simply request a ticket number and hang up. Then call back this number x2 and give the ticket number back to the support technician answering the call. NEW HARDWARE Hardware upgrades and new system purchases (i.e. terminals or computers) for participating stores can be quoted upon request after implementation by contacting beefs@datumcorporation.com Large hardware needs can be added to the MTSA and financed over 63 month terms. NEW SOFTWARE Upon implementation and thorough software audit, Datum will provide a quote for any necessary and/or critical software updates (see Compliance below). Major software upgrades can be purchased through Sales and added to the MTSA. ADDITIONAL TECHNOLOGY SOLUTIONS SERVICES AVAILABLE New store POS System installations Office Computers and BOH servers Cabling and infrastructure Commercial grade Firewall Internet and Customer WiFi Service Telephone Systems and Telecom Service Copier / Printer Service Customer Loyalty Programs Tablets / Tableside Ordering Solutions Labor Lifecycle Management Software

9 Inventory Management Software Kitchen Screen and Automation Hardware Digital Menu Boards Online Ordering IT Service More Pricing available upon request after implementation, and may require further information to deliver a quote. Contact: beefs@datumcorporation.com Compliance Legacy operating systems and applications (those that are no longer supported by the software vendor) fall outside of the scope of this program. Equipment whose deployment has been extended beyond its intended lifespan and that causes problems as a result must be replaced in a timely fashion to be in compliance with the support plan. Compliance issues will be discussed with the client, and every effort will be made to work within the client s budgetary restrictions. Systems deemed by Datum that are not in compliance may be excluded from the program. About Datum Datum Corporation is a national company headquartered in Sarasota, FL and specializes in developing Managed Technology Services for multi-unit restaurants that are looking to streamline processes and position themselves for expansion and growth. Datum focuses on proven and reliable technologies, ensures efficient, secure integration and implementation, all while managing these technologies for our clients. We see our clients as partners and allow them to focus on their core business and growth initiatives, while we drive and manage the technologies that support those initiatives. Datum s philosophy is client-based and designed to maximize what the client wants from a program: new best-of-breed technology, optimized service levels, controlled and predictable costs, one overall program with the flexibility to upgrade the configuration and program throughout the length of the agreement.

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Symmetry Networks. Corporate Managed Services Schedule

Symmetry Networks. Corporate Managed Services Schedule Symmetry Networks Corporate Managed Services Schedule A Managed Services Solution version 1.0 January 2015 This Service Schedule forms part of the Agreement between Us (Symmetry Networks Pty Ltd) and You

More information

Information Technology Services

Information Technology Services Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,

More information

Administrative Systems

Administrative Systems Administrative Systems Administrative Systems PCI Infrastructure Services Reference Compliance with the Payment Card Industry s Data Security Standard (PCI DSS) is critical for all merchants who accept

More information

MANAGED WORKPLACE. See All. Manage All. Service All.

MANAGED WORKPLACE. See All. Manage All. Service All. MANAGED WORKPLACE Managed Services Platform Exclusively for IT Service Providers, with Fully Integrated NOC and Help Desk About Managed Workplace Managed Workplace remote monitoring and management (RMM)

More information

LHRIC Network Support - Additional Service Features

LHRIC Network Support - Additional Service Features LHRIC Network Support - Additional Service Features It is important to note that costs associated with LHRIC Network Support service not only cover an on-site support engineer but also include a number

More information

I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000

I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000 Letting you do what you do best... run your business www.sironasolutions.com 06 850 000 For years, IT companies and their clients have been working against each other. Something breaks, the IT company

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Remote Deposit Terms of Use and Procedures

Remote Deposit Terms of Use and Procedures Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update

More information

Operating System Migration

Operating System Migration Operating System Migration 1 (7) Table of Contents 1. Executive Summary... 3 2. Challenges In Operating System Migrations... 3 3. Remote Migration With Miradore... 5 4. Conclusion... 7 2 (7) 1. EXECUTIVE

More information

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block

More information

Sentinel Platform/Managed IT Services Agreement Page 1 of 6. 1. Term of Agreement

Sentinel Platform/Managed IT Services Agreement Page 1 of 6. 1. Term of Agreement Page 1 of 6 1. Term of Agreement This Agreement between, herein referred to as Client, and Word of Mouth Computers and Electronics, LLC hereinafter referred to as Service Provider, is effective on the

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Appendix D to DIR Contract No. DIR-SDD-2102. SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for <DIR CUSTOMER> END USER SERVICES

Appendix D to DIR Contract No. DIR-SDD-2102. SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for <DIR CUSTOMER> END USER SERVICES Appendix D to DIR Contract No. DIR-SDD-2102 SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for END USER SERVICES TABLE OF CONTENTS 1. Introduction... 3 2. Term of SOW...

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Ancero Backup & Disaster Recovery (BDR) Service Guide

Ancero Backup & Disaster Recovery (BDR) Service Guide Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware

More information

Patch and Vulnerability Management Program

Patch and Vulnerability Management Program Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent

More information

Miami University. Payment Card Data Security Policy

Miami University. Payment Card Data Security Policy Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

CSU, Chico Credit Card PCI-DSS Risk Assessment

CSU, Chico Credit Card PCI-DSS Risk Assessment CSU, Chico Credit Card PCI-DSS Risk Assessment Division/ Department Name: Merchant ID Financial Account Location (University, Auxiliary Organization) Business unit functional contact: : Title: Telephone:

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

Managed Security Services SLA Document. Response and Resolution Times

Managed Security Services SLA Document. Response and Resolution Times Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

1.1 In consultation with management, to identify against business objectives, issues of self-development and training.

1.1 In consultation with management, to identify against business objectives, issues of self-development and training. London Fire Brigade is run by the London Fire and Emergency Planning Authority Fire Our vision To be a world class fire and rescue service for London, Londoners and visitors. Job Description JOB TITLE

More information

On-Site Computer Solutions values these technologies as part of an overall security plan:

On-Site Computer Solutions values these technologies as part of an overall security plan: Network Security Best Practices On-Site Computer Solutions Brian McMurtry Version 1.2 Revised June 23, 2008 In a business world where data privacy, integrity, and security are paramount, the small and

More information

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au info@ezims.com.au

More information

ManageEngine Desktop Central Training

ManageEngine Desktop Central Training ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to

More information

JACK LEVY 8609 Misty River Ct. Tampa, FL 33637 Home: (813) 601-1434 JLEVY1126@gmail.com

JACK LEVY 8609 Misty River Ct. Tampa, FL 33637 Home: (813) 601-1434 JLEVY1126@gmail.com SYSTEMS ADMINISTRATOR\Engineer Infrastructure planning, development and maintenance Systems administrator with 8 years of experience in IT infrastructure, deployment, planning, installation, configuration.

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

Click to Continue 9/3/2013

Click to Continue 9/3/2013 Click to Continue 9/3/2013 Next This toolkit is intended to supplement and expedite the personal training and support that Yellow Dog Software provides you during your implementation process. Click to

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Prepared by: OIC OF SOUTH FLORIDA. May 2013

Prepared by: OIC OF SOUTH FLORIDA. May 2013 OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

User Set Up Booklet 1-800-653-3345. VeriFone Sapphire. Topaz POS. Terminals. For use with VeriFone. VeriFone Sapphire and. www.success-systems.

User Set Up Booklet 1-800-653-3345. VeriFone Sapphire. Topaz POS. Terminals. For use with VeriFone. VeriFone Sapphire and. www.success-systems. VeriFone Sapphire and Topaz POS Terminals User Set Up Booklet Ruby POS SuperSystems Sapphire Topaz POS Terminal epb TM For use with VeriFone Ruby SuperSystems VeriFone Sapphire and Topaz 1-800-653-3345

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

RFQ 12-21 IT Services. Questions and Answers

RFQ 12-21 IT Services. Questions and Answers RFQ 12-21 IT Services Questions and Answers Question # 1: Just to clarify and I am more than certain that this is just a typo, but the due date for the submission of the IT Services RFP is January 7, 2013,

More information

4cast Server Specification and Installation

4cast Server Specification and Installation 4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

Request for Proposal Technology Services Maintenance and Support

Request for Proposal Technology Services Maintenance and Support Request for Proposal Technology Services Maintenance and Support Maintenance and Support July 19, 2014 Celerity Educational Group is seeking an IT consulting firm to manage Maintenance of our Network Systems

More information

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

PAR EverServ Services

PAR EverServ Services PAR EverServ Services Maximize your return on investment with PAR EverServ Services For more than 30 years, ParTech, Inc. (PAR) has been designing, integrating, and managing leading-edge technology systems

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware. WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Transformation of POS Operations at

Transformation of POS Operations at Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.

More information

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Administration A. Superintendent. Technology Services Proposal. Board of Education Dr. Bruce Law Superintendent of Schools DATE: July 30 2015

Administration A. Superintendent. Technology Services Proposal. Board of Education Dr. Bruce Law Superintendent of Schools DATE: July 30 2015 Dr. Bruce Law Pamela Bylsma Tammy Prentiss Domenico Maniscalco Bill Eagan Superintendent Assistant Superintendent Assistant Superintendent Chief Human Chief Financial of Schools for Academics for Student

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

Enabling Deskside Manageability and Productivity. The CompuCom EUC Workbench Powered by Intel vpro Technology

Enabling Deskside Manageability and Productivity. The CompuCom EUC Workbench Powered by Intel vpro Technology Enabling Deskside Manageability and Productivity The CompuCom EUC Workbench Powered by Intel vpro Technology There is no question that today s enterprise IT faces escalated demands from supporting a mobile

More information

General Service Level Agreement

General Service Level Agreement General Service Level Agreement Pricing We offer an unlimited Break / Fix for each device. Cost is below. Server Management = $199 / month per server Network Management = $199 / month per company Desktop

More information

Data Stored on a Windows Computer Connected to a Network

Data Stored on a Windows Computer Connected to a Network Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Computer Connected to

More information

POSitive Retail Manager Installation Guide

POSitive Retail Manager Installation Guide POSitive Retail Manager Installation Guide Table of Contents Table Of Contents...1 Introduction to PRM...3 System Requirements...3 SQL Considerations...5 What Is SQL?...5 Installing PRM...6 Installing

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

Qualified Integrators and Resellers (QIR) Implementation Statement

Qualified Integrators and Resellers (QIR) Implementation Statement Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application

More information

Managed Services Overview Servers, Exchange, Help Desk, and Citrix Infrastructures

Managed Services Overview Servers, Exchange, Help Desk, and Citrix Infrastructures Overview Servers, Exchange, Help Desk, and Citrix Infrastructures Prepared By: Envision Information Technologies Last Modified: Thursday, August 28, 2014 Table of Contents Table of Contents... 2 EIT Contacts...

More information

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST udit.pathak@niiconsulting.com Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

HIPAA Privacy and Security Risk Assessment and Action Planning

HIPAA Privacy and Security Risk Assessment and Action Planning HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

IT Onsite Service Contract Proposal. For. <<Customer>> Ltd

IT Onsite Service Contract Proposal. For. <<Customer>> Ltd IT Onsite Service Contract Proposal For Ltd 1 of 14 I N T R O D U C T I O N This Service Contract for Onsite Deskside PC Support (this Service Contract ) is made effective as of February 5th,

More information

Case Study: Fast Food Security Breach (Multiple Locations)

Case Study: Fast Food Security Breach (Multiple Locations) CASE STUDY Fast Food Security Breach (Multiple Locations) Case Study: Fast Food Security Breach (Multiple Locations) By Brad Cyprus, SSCP - Senior Security Architect, Netsurion Details Profile Case Study

More information

Cybersecurity Health Check At A Glance

Cybersecurity Health Check At A Glance This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not

More information

IT Solutions Savings through Sm@rt IT

IT Solutions Savings through Sm@rt IT IT Solutions Savings through Sm@rt IT Business Success Your most important asset and the key to business success is your people, never more so than in tough economic times. Smart Computers and Consulting

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

ACME ASSOCIATION. Network Status Report Executive Summary

ACME ASSOCIATION. Network Status Report Executive Summary ACME ASSOCIATION Network Status Report Executive Summary Table of Contents Overview 5 Assessment Nomenclature 6 Inspection Criteria 6 Areas of Assessment 6 Reporting Criteria 6 Active Directory and Related

More information

Technical Writing - A Guide to IT Support Contract

Technical Writing - A Guide to IT Support Contract Terms & Conditions for ADM s IT Support Customers (Standard, Standard Plus, Premium, Premium Plus) ADM Computing (the 'Company'), Chaucer Road, Canterbury, Kent, CT1 1HH 1. (1) Applicable to IT Support

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc.

Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc. Agreement for IT Assessment Assessment Recommendation Statement of Work Onboarding Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc. TABLE OF CONTENTS INTRODUCTION 3 UNDERSTANDING

More information

PavelComm s Pro-Tech Lite Fact Sheet

PavelComm s Pro-Tech Lite Fact Sheet PavelComm s Fact Sheet PavelComm s Fact Sheet - IT for Small Companies with Big Business Needs Owners, Executives and Managers should be investing in and integrating technology to increase the productivity

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

Computer Information Systems

Computer Information Systems Full Time Job Title: IT Technician Job Number: 2245 Hours/Days: Varies Salary: Approximate Location: Los Angeles, CA Skills Information Technology (IT) Technician will be the primary provider of support

More information

Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name Network Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Environment Risk and Issue Score Issue Review Next Steps Agenda Environment - Overview Domain Domain Controllers 4 Number

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

CUSTOMER NAME. Hosting Services Agreement

CUSTOMER NAME. Hosting Services Agreement CUSTOMER NAME Hosting Services Agreement Service Plan Details FLYWIRE TECHNOLOGY offers three service plans: Silver, Gold and Platinum based on the services your firm needs. The Silver plan is designed

More information

Hawaii Behavioral Health. Technology Plan. Technology and System Plan. Carla Gross Chief Operating Officer. Technology and System Plan 2013-2015

Hawaii Behavioral Health. Technology Plan. Technology and System Plan. Carla Gross Chief Operating Officer. Technology and System Plan 2013-2015 Hawaii Behavioral Health Technology Plan Technology and System Plan Carla Gross Chief Operating Officer Prepared by: Michael Lukson Hawaii Behavioral Health TECHNOLOGY & SYSTEM PLAN 2013-2015 The purpose

More information

Data Stored on a Windows Server Connected to a Network

Data Stored on a Windows Server Connected to a Network Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to

More information

Backup Exec System Recovery Management Solution 2010 FAQ

Backup Exec System Recovery Management Solution 2010 FAQ Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation

More information

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool Instructions for Using Online HIPAA Security Plan Generation Tool Contents Step 1 Set Up Account... 2 Step 2 : Fill out the main section of the practice information section of the web site.... 3 The next

More information

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase 24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk Onsite Support itg CloudBase Pro-Active managed it support services for one single cost per month covers all aspects of

More information

Access Control & Surveillance. Business Phone Systems. Data Storage & Recovery. Managed IT Services

Access Control & Surveillance. Business Phone Systems. Data Storage & Recovery. Managed IT Services Designed by Business Phone Systems Managed IT Services Access Control & Surveillance Data Storage & Recovery FOR MORE INFORMATION, CONTACT TCT TODAY: Toll free 1.800.800.7806 454 Moore Lane, Suite 4 &

More information