Service/Description RACER Part Number MSS Part Number MSRP
|
|
|
- Barnaby Small
- 10 years ago
- Views:
Transcription
1 Managed Security Services Managed Content Monthly Recurring Charges Single Services Two Services Three Services Four Services Non-recurring Charges Managed Web Content Monthly Recurring Charges Non-recurring Charges Event Log Management Monthly Recurring Charges Log Monitoring & Management - Monitoring only Log Monitoring & Management - Monitoring & Management Cloud Based Services Premium Service - Monthly Recurring Charges Premise Based Services Premium Service - Monthly Recurring Charges Firewall Firewall with IPS Service/Description RACER Part Number MSS Part Number MSRP Anti-Virus $1.80 Anti-Spam $1.80 N/A Image Control $1.80 Content Control $1.80 Anti-Virus and Anti-Spam $2.70 Anti-Virus and Image Control $2.70 Anti-Virus and Content Control $2.70 N/A Anti-Spam and Image Control $2.70 Anti-Spam and Content Control $2.70 Image Control and Content Control $2.70 Anti-Virus, Anti-Spam and Image Control $3.40 Anti-Virus, Image Control and Content Control $3.40 N/A Anti-Virus, Anti-Spam and Content Control $3.40 Anti-Spam, Image Control and Content Control $3.40 Anti-Virus, Anti-Spam, Image Control and Content Control N/A $3.90 One-time per domain set-up fee N/A $80.00 Web Anti-Virus and Web Anti-Spyware Only $3.75 Web URL Filtering Only N/A $2.50 Combined Web Anti-Virus & Web Anti-Spyware & Web URL Filtering $5.00 Initial order (1 IP address included) Initial order (Additional IP address) IP Address Change / Addition / Deletion $ per order $80.00 per IP address $80.00 per IP address Device Tier A $ Device Tier B $ Device Tier C $ Device Tier D $1, N/A Device Tier E $1, Device Tier F $2, Device Tier G $5, Device Tier H $9, Device Tier A $1, Device Tier B $1, Device Tier C $1, Device Tier D $1, N/A Device Tier E $2, Device Tier F $3, Device Tier G $6, Device Tier H $11, Firewall MNB-RZFW-MAM-BASE-PREM $ Firewall + IPS/IDS MNB-RZFWID-MAM-BASE-PREM $1, Firewall Monitoring PRM-FWL-MOO-RT-PREM CYBT OG-NPR-FW-RT-MON $ Firewall Management PRM-FWL-MOM-RT-PREM CYBT OG-NPR-FW-RT-MAN $ Firewall Monitoring HA PRM-FWL-MOO-HRT-PREM CYBT OG-NPR-HAFW-RT-MON $ Firewall Management HA PRM-FWL-MOM-HRT-PREM CYBT OG-NPR-HAFW-RT-MAN $1, Firewall Monitoring Gigabit PRM-FWL-MOO-RTG-PREM CYBT OG-NPR-FW-RT-GIG-MON $ Firewall Management Gigabit PRM-FWL-MOM-RTG-PREM CYBT OG-NPR-FW-RT-GIG-MAN $1, Firewall Monitoring HA Gigabit PRM-FWL-MOO-HRG-PREM CYBT OG-NPR-HAFW-RT-GIG-MON $1, Firewall Management HA Gigabit PRM-FWL-MOM-HRG-PREM CYBT OG-NPR-HAFW-RT-GIG-MAN $1, Firewall Management Third Party VPN Management PRM-FWL-MOM-TVL-PREM CYBT OG-NPR-FW-TPVPN-MAN $ N/A
2 Virtual firewall Network Intrusion Detection Virtual Network Intrusion Detection Network Intrusion Prevention Virtual Network Intrusion Prevention Router Firewall with IPS Monitoring PRM-FWL-MOO-RIP-PREM CYBT OG-NPR-FWIPS-RT-MON $ Firewall with IPS Management PRM-FWL-MOM-RIP-PREM CYBT OG-NPR-FWIPS-RT-MAN $1, Firewall with IPS Monitoring HA PRM-FWL-MOO-HRI-PREM CYBT OG-NPR-HAFWIPS-RT-MON $1, Firewall with IPS Management HA PRM-FWL-MOM-HRI-PREM CYBT OG-NPR-HAFWIPS-RT-MAN $2, Firewall with IPS Monitoring Gigabit PRM-FWL-MOO-RIG-PREM CYBT OG-NPR-FWIPS-RT-GIG-MON $1, Firewall with IPS Management Gigabit PRM-FWL-MOM-RIG-PREM CYBT OG-NPR-FWIPS-RT-GIG-MAN $1, Firewall with IPS Monitoring HA Gigabit PRM-FWL-MOO-HRIG-PREM CYBT OG-NPR-HAFWIPS-RT-GIG-MON $1, Firewall with IPS Management HA Giagbit PRM-FWL-MOM-HRIG-PREM CYBT OG-NPR-HAFWIPS-RT-GIG-MAN $2, Virtual firewall Monitoring PRM-FWL-MOO-VRT-PREM CYBT OG-NPR-VIRFW-RT-MON $ Virtual firewall Management PRM-FWL-MOM-VRT-PREM CYBT OG-NPR-VIRFW-RT-MAN $ Virtual firewall Monitoring HA PRM-FWL-MOO-HVRT-PREM CYBT OG-NPR-HAVIRFW-RT-MON $ Virtual firewall Management HA PRM-FWL-MOM-HVRT-PREM CYBT OG-NPR-HAVIRFW-RT-MAN $ Virtual firewall Monitoring Gigabit PRM-FWL-MOO-VIRFWRTGIG-PREM CYBT OG-NPR-VIRFW-RT-GIG-MON $ Virtual firewall Management Gigabit PRM-FWL-MOM-VIRFWRTGIG-PREM CYBT OG-NPR-VIRFW-RT-GIG-MAN $ Virtual firewall Monitoring HA Gigabit PRM-FWL-MOO-HAVIRFWRTGIG-PREM CYBT OG-NPR-HAVIRFW-RT-GIG-MON $ Virtual firewall Management HA Gigabit PRM-FWL-MOM-HAVIRFWRTGIG-PREM CYBT OG-NPR-HAVIRFW-RT-GIG-MAN $1, Virtual firewall with IPS Monitoring PRM-FWL-MOO-VRI-PREM CYBT OG-NPR-VIRFWIPS-RT-MON $ Virtual firewall with IPS Management PRM-FWL-MOM-VRI-PREM CYBT OG-NPR-VIRFWIPS-RT-MAN $1, Virtual firewall with IPS Monitoring HA PRM-FWL-MOO-HVRI-PREM CYBT OG-NPR-HAVIRFWIPS-RT-MON $ Virtual firewall with IPS Management HA PRM-FWL-MOM-HVRI-PREM CYBT OG-NPR-HAVIRFWIPS-RT-MAN $1, Virtual firewall with IPS Monitoring Gigabit PRM-FWl-MOO-VIRFWIPSRTGIG-PREM CYBT OG-NPR-VIRFWIPS-RT-GIG-MON $ Virtual firewall with IPS Management Gigabit PRM-FWL-MOM-VIRFWIPSRTGIG-PREM CYBT OG-NPR-VIRFWIPS-RT-GIG-MAN $1, Virtual firewall with IPS Monitoring HA Gigabit PRM-FWL-MOO-HAVIRFWIPSRTGIG-PREM CYBT OG-NPR-HAVIRFWIPS-RT-GIG-MON $ Virtual firewall with IPS Management HA Gigabit PRM-FWL-MOM-HAVIRFWIPSRTGIG-PREM CYBT OG-NPR-HAVIRFWIPS-RT-GIG-MAN $1, Network Intrusion Detection Monitoring PRM-NID-MOO-ISD-PREM CYBT OG-NPR-NIDS-MON $ Network Intrusion Detection Management PRM-NID-MOM-ISD-PREM CYBT OG-NPR-NIDS-MAN $1, Network Intrusion Detection Monitoring HA PRM-NID-MOO-HISD-PREM CYBT OG-NPR-HANIDS-MON $ Network Intrusion Detection Management HA PRM-NID-MOM-HISD-PREM CYBT OG-NPR-HANIDS-MAN $1, Network Intrusion Detection External Monitoring PRM-NID-MOO-ES-PREM CYBT OG-NPR-NIDSEXT-MON $ Network Intrusion Detection External Management PRM-NID-MOM-ES-PREM CYBT OG-NPR-NIDSEXT-MAN $ Network Intrusion Detection External Monitoring HA PRM-NID-MOO-HES-PREM CYBT OG-NPR-HANIDSEXT-MON $ Network Intrusion Detection External Management HA PRM-NID-MOM-HES-PREM CYBT OG-NPR-HANIDSEXT-MAN $1, Network Intrusion Detection Monitoring Gigabyte PRM-NID-MOO-IGD-PREM CYBT OG-NPR-NIDS-GIG-MON $1, Network Intrusion Detection Management Gigabyte PRM-NID-MOM-IGD-PREM CYBT OG-NPR-NIDS-GIG-MAN $1, Network Intrusion Detection Monitoring HA Gigabyte PRM-NID-MOO-HIGD-PREM CYBT OG-NPR-HANIDS-GIG-MON $1, Network Intrusion Detection Management HA Gigabyte PRM-NID-MOM-HIGD-PREM CYBT OG-NPR-HANIDS-GIG-MAN $2, Network Intrusion Detection External Monitoring Gigabyte PRM-NID-MOO-ESG-PREM CYBT OG-NPR-NIDSEXT-GIG-MON $ Network Intrusion Detection External Management Gigabyte PRM-NID-MOM-ESG-PREM CYBT OG-NPR-NIDSEXT-GIG-MAN $1, Network Intrusion Detection External Monitoring HA Gigabyte PRM-NID-MOO-HESG-PREM CYBT OG-NPR-HANIDSEXT-GIG-MON $ Network Intrusion Detection External Management HA Gigabyte PRM-NID-MOM-HESG-PREM CYBT OG-NPR-HANIDSEXT-GIG-MAN $1, Virtual Network Intrusion Detection Monitoring PRM-VND-MOO-VND-PREM CYBT OG-NPR-VIRNIDS-MON $ Virtual Network Intrusion Detection Management PRM-VND-MOM-VND-PREM CYBT OG-NPR-VIRNIDS-MAN $ Virtual Network Intrusion Detection Monitoring HA PRM-VND-MOO-HAVND-PREM CYBT OG-NPR-HAVIRNIDS-MON $ Virtual Network Intrusion Detection Management HA PRM-VND-MOM-HAVND-PREM CYBT OG-NPR-HAVIRNIDS-MAN $1, Virtual Network Intrusion Detection Monitoring Gigabit PRM-VND-MOO-VIRNIDSGIG-PREM CYBT OG-NPR-VIRNIDS-GIG-MON $ Virtual Network Intrusion Detection Management Gigabit PRM-VND-MOM-VIRNIDSGIG-PREM CYBT OG-NPR-VIRNIDS-GIG-MAN $1, Virtual Network Intrusion Detection Monitoring HA Gigabit PRM-VND-MOO-HAVIRNIDSGIG-PREM CYBT OG-NPR-HAVIRNIDS-GIG-MON $ Virtual Network Intrusion Detection Management HA Gigabit PRM-VND-MOM-HAVIRNIDSGIG-PREM CYBT OG-NPR-HAVIRNIDS-GIG-MAN $1, Network Intrusion Prevention Monitoring PRM-NIP-MOO-ISD-PREM CYBT OG-NPR-NIPS-MON $ Network Intrusion Prevention Management PRM-NIP-MOM-ISD-PREM CYBT OG-NPR-NIPS-MAN $1, Network Intrusion Prevention Monitoring HA PRM-NIP-MOO-HISD-PREM CYBT OG-NPR-HANIPS-MON $ Network Intrusion Prevention Management HA PRM-NIP-MOM-HISD-PREM CYBT OG-NPR-HANIPS-MAN $1, Network Intrusion Prevention Monitoring Gigabyte PRM-NIP-MOO-IGD-PREM CYBT OG-NPR-NIPS-GIG-MON $1, Network Intrusion Prevention Management Gigabyte PRM-NIP-MOM-IGD-PREM CYBT OG-NPR-NIPS-GIG-MAN $1, Network Intrusion Prevention Monitoring HA Gigabyte PRM-NIP-MOO-HIGD-PREM CYBT OG-NPR-HANIPS-GIG-MON $1, Network Intrusion Prevention Management HA Gigabyte PRM-NIP-MOM-HIGD-PREM CYBT OG-NPR-HANIPS-GIG-MAN $2, Virtual Network Intrusion Prevention Monitoring PRM-VNP-MOO-VNP-PREM CYBT OG-NPR-VIRNIPS-MON $ Virtual Network Intrusion Prevention Management PRM-VNP-MOM-VNP-PREM CYBT OG-NPR-VIRNIPS-MAN $ Virtual Network Intrusion Prevention Monitoring HA PRM-VNP-MOO-HAVNP-PREM CYBT OG-NPR-HAVIRNIPS-MON $ Virtual Network Intrusion Prevention Management HA PRM-VNP-MOM-HAVNP-PREM CYBT OG-NPR-HAVIRNIPS-MAN $1, Virtual Network Intrusion Prevention Monitoring Gigabit PRM-VNP-MOO-VIRNIPSGIG-PREM CYBT OG-NPR-VIRNIPS-GIG-MON $ Virtual Network Intrusion Prevention Management Gigabit PRM-VNP-MOM-VIRNIPSGIG-PREM CYBT OG-NPR-VIRNIPS-GIG-MAN $1, Virtual Network Intrusion Prevention Monitoring HA Gigabit PRM-VNP-MOO-HAVIRNIPSGIG-PREM CYBT OG-NPR-HAVIRNIPS-GIG-MON $ Virtual Network Intrusion Prevention Management HA Gigabit PRM-VNP-MOM-HAVIRNIPSGIG-PREM CYBT OG-NPR-HAVIRNIPS-GIG-MAN $1, Router Monitoring PRM-ROU-MOO-RT-PREM CYBT OG-NPR-RTR-RT-MON $600.00
3 Advanced Threat Protection UTM - Security Appliance Virutal Security Appliance Security Gateway Proxy Servers Content Screening Servers Router Management PRM-ROU-MOM-RT-PREM CYBT OG-NPR-RTR-RT-MAN $ Router Monitoring HA PRM-ROU-MOO-HRT-PREM CYBT OG-NPR-HARTR-RT-MON $ Router Management HA PRM-ROU-MOM-HRT-PREM CYBT OG-NPR-HARTR-RT-MAN $1, Router Monitoring Gigabit PRM-ROU-MOO-RTGIG-PREM CYBT OG-NPR-RTR-RT-GIG-MON $ Router Management Gigabit PRM-ROU-MOM-RTGIG-PREM CYBT OG-NPR-RTR-RT-GIG-MAN $1, Router Monitoring HA Gigabit PRM-ROU-MOO-HRG-PREM CYBT OG-NPR-HARTR-RT-GIG-MON $ Router Management HA Gigabit PRM-ROU-MOM-HRG-PREM CYBT OG-NPR-HARTR-RT-GIG-MAN $1, Mail Monitoring PRM-ATP-MOO-ATP-MAIL-PREM $ Mail Gigabit Monitoring PRM-ATP-MOO-ATP-MAIL-GB-PREM $1, Mail High Availability Monitoring PRM-ATP-MOO-MAILHA-PREM $1, Mail High Availability Gibabit Monitoring PRM-ATP-MOO-MAILHAGB-PREM $1, Web Monitoring PRM-ATP-MOO-ATP-WEB-PREM $ Web Gigabit Monitoring PRM-ATP-MOO-ATP-WEBGB-PREM $1, Web High Availability Monitoring PRM-ATP-MOO-WEBHA-PREM $1, Web High Availability Gigabit Monitoring PRM-ATP-MOO-WEBHAGB-PREM $1, Mail Management PRM-ATP-MOM-ATP-MAIL-PREM $1, Mail Gigabit Management PRM-ATP-MOM-ATP-MAIL-GB-PREM $2, Mail High Availability Management PRM-ATP-MOM-MAILHA-PREM $1, Mail High Availability Gigabit Management PRM-ATP-MOM-MAILHAGB-PREM $2, Web Management PRM-ATP-MOM-ATP-WEB-PREM $1, Web Gigabit Management PRM-ATP-MOM-ATP-WEBGB-PREM $2, Web High Availability Management PRM-ATP-MOM-WEBHA-PREM $1, Web High Availability Gigabit Management PRM-ATP-MOM-WEBHAGB-PREM $2, Security Appliance realtime escalation-mon PRM-SAP-MOO-RT-PREM CYBT OG-NPR-SECAPP-RT-MON $ Security Appliance realtime escalation-man PRM-SAP-MOM-RT-PREM CYBT OG-NPR-SECAPP-RT-MAN $1, HA Security Appliance realtime escalation-mon PRM-SAP-MOO-HRT-PREM CYBT OG-NPR-HASECAPP-RT-MON $1, HA Security Appliance realtime escalation-man PRM-SAP-MOM-HRT-PREM CYBT OG-NPR-HASECAPP-RT-MAN $2, Security Appliance realtime escalation Gigabyte-mon PRM-SAP-MOO-RTG-PREM CYBT OG-NPR-SECAPP-RT-GIG-MON $1, Security Appliance realtime escalation Gigabyte-man PRM-SAP-MOM-RTG-PREM CYBT OG-NPR-SECAPP-RT-GIG-MAN $2, HA Security Appliance realtime escalation Gigabyte-mon PRM-SAP-MOO-HRG-PREM CYBT OG-NPR-HASECAPP-RT-GIG-MON $1, HA Security Appliance realtime escalation Gigabyte-man PRM-SAP-MOM-HRG-PREM CYBT OG-NPR-HASECAPP-RT-GIG-MAN $3, Virtual Security Appliance Realtime Escalation Monitoring PRM-SAP-MOO-VIRSECAPREAL-PREM $ Virtual Security Appliance Rrealtime Escalation Management PRM-SAP-MOM-VIRSECAPREAL $1, Virtual Security Appliance Realtime Escalation Monitoring HA PRM-SAP-MOO-VIRSECAPHA-PREM $ Virtual Security Appliance Realtime Escalation Management HA PRM-SAP-MOM-VIRSECAPHA-PREM $1, Virtual Security Appliance Realtime Escalation Gigabit Monitoring PRM-SAP-MOO-VIRSECAPGB-PREM $1, Virtual Security Appliance Realtime Escalation Gigabit Management PRM-SAP-MOM-VIRSECAPGB-PREM $1, Virtual Security Appliance Realtime Escalation Gigabit Monitoring HA PRM-SAP-MOO-VIRSECAPGBHA-PREM $1, Virtual Security Appliance Realtime Escalation Gigabit Management HA PRM-SAP-MOM-VIRSECAPGBHA-PREM $2, Security Gateway Server-mon PRM-ESG-MOO-ESGS-PREM CYBT OG-NPR- -SEC-GW-MON $ Security Gateway Server-man PRM-ESG-MOM-ESGS-PREM CYBT OG-NPR- -SEC-GW-MAN $1, HA Security Gateway Server-mon PRM-ESG-MOO-HA-ESGS-PREM CYBT OG-NPR-HA -SEC-GW-MON $ HA Security Gateway Server-man PRM-ESG-MOM-HA-ESGS-PREM CYBT OG-NPR-HA -SEC-GW-MAN $1, Anti-Spam Plug-in on Security Gateway Server-mon PRM-ESG-MOO-ASPIESGS-PREM $ HA Anti-Spam Plug-in on Security Gateway Server-mon PRM-ESG-MOO-HA-ASPIESGS-PREM $ Anti-Spam Plug-in on Security Gateway Server-man PRM-ESG-MOM-ASPIESGS-PREM CYBT OG-NPR-ASON- -SEC-GW-MAN $ HA Anti-Spam Plug-in on Security Gateway Server-man PRM-ESG-MOM-HA-ASPIESGS-PREM CYBT OG-NPR-HA-ASON- -SEC-GW-MAN $ Proxy Server-mon PRM-PRX-MOO-PXS-PREM CYBT OG-NPR-PROXY-MON $ Proxy Server-man PRM-PRX-MOM-PXS-PREM CYBT OG-NPR-PROXY-MAN $1, HA Proxy Server-mon PRM-PRX-MOO-HPS-PREM CYBT OG-NPR-HAPROXY-MON $ HA Proxy Server-man PRM-PRX-MOM-HPS-PREM CYBT OG-NPR-HAPROXY-MAN $1, Anti-Virus Plugin on Proxy Server-mon PRM-PRX-MOO-AVP-PREM CYBT OG-NPR-AVONPROXY-MON $ Anti-Virus Plugin on Proxy Server-man PRM-PRX-MOM-AVP-PREM CYBT OG-NPR-AVONPROXY-MAN $ Anti-Spam Plugin on Proxy Server-mon PRM-PRX-MOO-ASP-PREM CYBT OG-NPR-ASONPROXY-MON $ Anti-Spam Plugin on Proxy Server-man PRM-PRX-MOM-ASP-PREM CYBT OG-NPR-ASONPROXY-MAN $ Content Screening Plugin on Proxy Server-mon PRM-PRX-MOO-CSP-PREM CYBT OG-NPR-CONTENTONPROXY-MON $ Content Screening Plugin on Proxy Server-man PRM-PRx-MOM-CSP-PREM CYBT OG-NPR-CONTENTONPROXY-MAN $ HA-Anti-Virus Plugin on Proxy Server-mon PRM-PRX-MOO-HVI-PREM CYBT OG-NPR-HAAVONPROXY-MON $ HA Anti-Virus Plugin on Proxy Server-man PRM-PRX-MOM-HVI-PREM CYBT OG-NPR-HAAVONPROXY-MAN $ HA-Anti-Spam Plugin on Proxy Server-mon PRM-PRX-MOO-HSP-PREM CYBT OG-NPR-HAASONPROXY-MON $ HA Anti-Spam Plugin on Proxy Server-man PRM-PRX-MOM-HSP-PREM CYBT OG-NPR-HAASONPROXY-MAN $ HA-Content Screening Plugin on Proxy Server-mon PRM-PRX-MOO-HCS-PREM CYBT OG-NPR-HACONTENTONPROXY-MON $ HA Content Screening Plugin on Proxy Server-man PRM-PRX-MOM-HCS-PREM CYBT OG-NPR-HACONTENTONPROXY-MAN $ Content Screening-mon PRM-CSC-MOO-CS-PREM CYBT OG-NPR-CONTENT-MON $ Content Screening-man PRM-CSC-MOM-CS-PREM CYBT OG-NPR-CONTENT-MAN $1,075.00
4 Health Monitoring and Management only Log Monitoring and Management Loadbalancers Network Switch SSL VPN Terminators Application Level Firewalls Host-based Intrusion Detection HA Content Screening-mon PRM-CSC-MOO-HACSC-PREM CYBT OG-NPR-HACONTENT-MON $ HA Content Screening-man PRM-CSC-MOM-HACSC-PREM CYBT OG-NPR-HACONTENT-MAN $1, Content Screening Additional Policy PRM-CSC-MOM-ADP-PREM CYBT OG-NPR-CONTENT-ADDPOLICY $ Health Monitoring and Management Only - mon PRM-HMMOS -MOO-HM-PREM CYBT OG-NPR-HEALTH-MON $ Health Monitoring and Management Only - man PRM-HMMOS -MOM-HMM-PREM CYBT OG-NPR-HEALTH-MAN $ HA - Health Monitoring and Management Only - mon PRM-HMMOS -MOO-HAHM-PREM CYBT OG-NPR-HAHEALTH-MON $ HA - Health Monitoring and Management Only - man PRM-HMMOS -MOM-HA-HMM-PREM CYBT OG-NPR-HAHEALTH-MAN $ Log Monitoring and Management DPR Tier A - mon PRM-LMM-MOO-DPR-A-PREM CYBT OG-NPR-LOG MM-DPR-TR-A-MON $ Log Monitoring and Management DPR Tier B - mon PRM-LMM-MOO-DPR-B-PREM CYBT OG-NPR-LOG MM-DPR-TR-B-MON $ Log Monitoring and Management DPR Tier C - mon PRM-LMM-MOO-DPR-C-PREM CYBT OG-NPR-LOG MM-DPR-TR-C-MON $ Log Monitoring and Management DPR Tier D - mon PRM-LMM-MOO-DPR-D-PREM CYBT OG-NPR-LOG MM-DPR-TR-D-MON $1, Log Monitoring and Management DPR Tier E - mon PRM-LMM-MOO-DPR-E-PREM CYBT OG-NPR-LOG MM-DPR-TR-E-MON $1, Log Monitoring and Management DPR Tier F - mon PRM-LMM-MOO-DPR-F-PREM CYBT OG-NPR-LOG MM-DPR-TR-F-MON $2, Log Monitoring and Management DPR Tier G - mon PRM-LMM-MOO-DPR-G-PREM CYBT OG-NPR-LOG MM-DPR-TR-G-MON $5, Log Monitoring and Management DPR Tier H - mon PRM-LMM-MOO-DPR-H-PREM CYBT OG-NPR-LOG MM-DPR-TR-H-MON $9, Log Monitoring and Management DPR Tier A - man PRM-LMM-MOM-DPR-A-PREM CYBT OG-NPR-LOG MM-DPR-TR-A-MAN $1, Log Monitoring and Management DPR Tier B - man PRM-LMM-MOM-DPR-B-PREM CYBT OG-NPR-LOG MM-DPR-TR-B-MAN $1, Log Monitoring and Management DPR Tier C - man PRM-LMM-MOM-DPR-C-PREM CYBT OG-NPR-LOG MM-DPR-TR-C-MAN $1, Log Monitoring and Management DPR Tier D - man PRM-LMM-MOM-DPR-D-PREM CYBT OG-NPR-LOG MM-DPR-TR-D-MAN $1, Log Monitoring and Management DPR Tier E - man PRM-LMM-MOM-DPR-E-PREM CYBT OG-NPR-LOG MM-DPR-TR-E-MAN $2, Log Monitoring and Management DPR Tier F - man PRM-LMM-MOM-DPR-F-PREM CYBT OG-NPR-LOG MM-DPR-TR-F-MAN $3, Log Monitoring and Management DPR Tier G - man PRM-LMM-MOM-DPR-G-PREM CYBT OG-NPR-LOG MM-DPR-TR-G-MAN $6, Log Monitoring and Management DPR Tier H - man PRM-LMM-MOM-DPR-H-PREM CYBT OG-NPR-LOG MM-DPR-TR-H-MAN $11, HA - Log Monitoring and Management DPR Tier A - mon PRM-LMM-MOO-HA-DPR-A-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-A-MON $ HA - Log Monitoring and Management DPR Tier B - mon PRM-LMM-MOO-HA-DPR-B-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-B-MON $ HA - Log Monitoring and Management DPR Tier C - mon PRM-LMM-MOO-HA-DPR-C-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-C-MON $ HA - Log Monitoring and Management DPR Tier D - mon PRM-LMM-MOO-HA-DPR-D-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-D-MON $1, HA - Log Monitoring and Management DPR Tier E - mon PRM-LMM-MOO-HA-DPR-E-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-E-MON $1, HA - Log Monitoring and Management DPR Tier F - mon PRM-LMM-MOO-HA-DPR-F-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-F-MON $3, HA - Log Monitoring and Management DPR Tier G - mon PRM-LMM-MOO-HA-DPR-G-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-G-MON $6, HA - Log Monitoring and Management DPR Tier H - mon PRM-LMM-MOO-HA-DPR-H-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-H-MON $11, HA - Log Monitoring and Management DPR Tier A - man PRM-LMM-MOM-HA-DPR-A-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-A-MAN $1, HA - Log Monitoring and Management DPR Tier B - man PRM-LMM-MOM-HA-DPR-B-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-B-MAN $1, HA - Log Monitoring and Management DPR Tier C - man PRM-LMM-MOM-HA-DPR-C-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-C-MAN $1, HA - Log Monitoring and Management DPR Tier D - man PRM-LMM-MOM-HA-DPR-D-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-D-MAN $2, HA - Log Monitoring and Management DPR Tier E - man PRM-LMM-MOM-HA-DPR-E-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-E-MAN $3, HA - Log Monitoring and Management DPR Tier F - man PRM-LMM-MOM-HA-DPR-F-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-F-MAN $4, HA - Log Monitoring and Management DPR Tier G - man PRM-LMM-MOM-HA-DPR-G-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-G-MAN $8, HA - Log Monitoring and Management DPR Tier H - man PRM-LMM-MOM-HA-DPR-H-PREM CYBT OG-NPR-HA-LOG MM-DPR-TR-H-MAN $16, Load Balancer-mon PRM-LBL-MOO-LBL-PREM CYBT OG-NPR-LOADB-MON $ Load Balancer-man PRM-LBL-MOM-LBL-PREM CYBT OG-NPR-LOADB-MAN $1, HA-Load Balancer-mon PRM-LBL-MOO-HALBL-PREM CYBT OG-NPR-HALOADB-MON $1, HA-Load Balancer-man PRM-LBL-MOM-HALBL-PREM CYBT OG-NPR-HALOADB-MAN $1, Network-Switch-mon PRM-NWS-MOO-RT-PREM CYBT OG-NPR-SW-RT-MON $ Network-Switch-man PRM-NWS-MOM-RT-PREM CYBT OG-NPR-SW-RT-MAN $ HA-Network-Switch-mon PRM-NWS-MOO-HRT-PREM CYBT OG-NPR-HASW-RT-MON $ HA-Network-Switch-man PRM-NWS-MOM-HRT-PREM CYBT OG-NPR-HASW-RT-MAN $ Network-Switch-mon Gigabit PRM-NWS-MOO-RTGIG-PREM CYBT OG-NPR-SW-RT-GIG-MON $ Network-Switch-man Gigabit PRM-NWS-MOM-RTGIG-PREM CYBT OG-NPR-SW-RT-GIG-MAN $ HA-Network-Switch-mon Gigabit PRM-NWS-MOO-HRG-PREM CYBT OG-NPR-HASW-RT-GIG-MON $ HA-Network-Switch-man Gigabit PRm-NWS-MOM-HRG-PREM CYBT OG-NPR-HASW-RT-GIG-MAN $ SSL VPN-mon PRM-SSV-MOO-SSLV-PREM CYBT OG-NPR-SSLVPN-MON $ SSL VPN-man PRM-SSV-MOM-SSLV-PREM CYBT OG-NPR-SSLVPN-MAN $1, HA SSL VPN-mon PRM-SSV-MOO-HASSV-PREM CYBT OG-NPR-HASSLVPN-MON $ HA SSL VPN-man PRM-SSV-MOM-HASSV-PREM CYBT OG-NPR-HASSLVPN-MAN $2, Application-level firewall-mon PRM-ALF-MOO-AFW-PREM CYBT OG-NPR-APPLFW-MON $ Application-level firewall-man PRM-ALF-MOM-AFW-PREM CYBT OG-NPR-APPLFW-MAN $1, HA Application-level firewall-mon PRM-ALF-MOO-HAAFW-PREM CYBT OG-NPR-HAAPPLFW-MON $ HA Application-level firewall-man PRM-ALF-MOM-HAAFW-PREM CYBT OG-NPR-HAAPPLFW-MAN $1, HIDS Management Station PRM-HID-MOM-HIDS-PREM CYBT OG-NPR-HIDS-MGTSTATION $ HIDS Additional Policy PRM-HID-MOM-APH-PREM CYBT OG-NPR-HIDS-ADDPOLICY $ HIDS Full Escalation Server Sensor PRM-HID-MOO-FES-PREM CYBT OG-NPR-HIDS-FULLESC $ HIDS Threshold Escalation Server Sensor PRM-HID-MOO-TES-PREM CYBT OG-NPR-HIDS-THRES-SERVER $60.00 HIDS Threshold Escalation Desktop Sensor Agents PRM-HID-MOO-1-PREM CYBT OG-NPR-HIDS-THRES-CLIENT MAX 100 $870.00
5 End Point Security Log Services HIDS Threshold Escalation Desktop Sensor Agents PRm-HID-MOO-250-PREM CYBT OG-NPR-HIDS-THRES-CLIENT-MAX250 $1, HIDS Threshold Escalation Desktop Sensor Agents PRM-HID-MOO-01K-PREM CYBT OG-NPR-HIDS-THRES-CLIENT-MAX1000 $3, HIDS Threshold Escalation Desktop Sensor Agents PRM-HID-MOO-5K-PREM CYBT OG-NPR-HIDS-THRES-CLIENT-MAX5000 $5, HIDS Threshold Escalation Desktop Sensor Agents PRM-HID-MOO-10K-PREM CYBT OG-NPR-HIDS-THRES-CLIENT-MAX10000 $6, HIDS Threshold Escalation Desktop Sensor Agents PRM-HID-MOO-25K-PREM CYBT OG-NPR-HIDS-THRES-CLIENT-MAX25000 $8, HIDS Threshold Escalation Desktop Sensor Agents PRM-HID-MOO-50K-PREM CYBT OG-NPR-HIDS-THRES-CLIENT-MAX50000 $10, HIDS Threshold Escalation Desktop Sensor Agents PRM-HID-MOO-100K-PREM CYBT OG-NPR-HIDS-THRES-CLIENT-MAX $12, End Point Management Station-mon PRM-EPS-MOO-MGS-PREM CYBT OG-NPR-EPP-MGTSTATION-MON $1, End Point Management Station-man PRM-EPS-MOM-MGS-PREM CYBT OG-NPR-EPP-MGTSTATION-MAN $2, End Point Clients Clients PRM-EPS-MOO-CLIENT100-PREM CYBT OG-NPR-EPP-CLIENT100-MON $1, End Point Clients Clients PRM-EPS-MOO-CLIENT250-PREM CYBT OG-NPR-EPP-CLIENT250-MON $3, End Point Clients Clients PRM-EPS-MOO-CLIENT1000-PREM CYBT OG-NPR-EPP-CLIENT1000-MON $6, End Point Clients Clients PRM-EPS-MOO-CLIENT5000-PREM CYBT OG-NPR-EPP-CLIENT5000-MON $9, End Point Clients Clients PRM-EPS-MOO-CLIENT10000-PREM CYBT OG-NPR-EPP-CLIENT10000-MON $12, End Point Clients Clients PRM-EPS-MOO-CLIENT25000-PREM CYBT OG-NPR-EPP-CLIENT25000-MON $15, End Point Clients Clients PRM-EPS-MOO-CLIENT50000-PREM CYBT OG-NPR-EPP-CLIENT50000-MON $18, End Point Clients Clients PRM-EPS-MOO-CLIENT PREM CYBT OG-NPR-EPP-CLIENT MON $21, OS Log Monitoring PRM-OSLOG-MOO-OSLM-PREM Active Directory Log Monitoring PRM-ADLOG-MOO-ADLM-PREM File Integrity and Policy Compliance Monitoring File Integrity and Policy Compliance Monitoring - Management Station - mon PRM-FIPCM-MOO-MGS-PREM CYBT OG-NPR-FIPCM-MGTSTATION-MON $ File Integrity and Policy Compliance Monitoring - Management Station - man PRM-FIPCM-MOM-MGS-PREM CYBT OG-NPR-FIPCM-MGTSTATION-MAN $1, HA - File Integrity and Policy Compliance Monitoring - Management Station - mon PRM-FIPCM-MOO-FIOCM-HA-PREM CYBT OG-NPR-HA-FIPCM-MGTSTATION-MON $1, HA - File Integrity and Policy Compliance Monitoring - Management Station - man PRM-FIPCM-MOM-FIOCM-HA-PREM CYBT OG-NPR-HA-FIPCM-MGTSTATION-MAN $1, File Integrity and Policy Compliance Monitoring Clients - mon PRM-FIPCM-MOO-FIOCM-1-PREM CYBT OG-NPR-FIPCM-CLIENT-MAX100 $1, File Integrity and Policy Compliance Monitoring Clients - mon PRM-FIPCM-MOO-FIOCM-4-PREM CYBT OG-NPR-FIPCM-CLIENT-MAX250 $2, File Integrity and Policy Compliance Monitoring Clients - mon PRM-FIPCM-MOO-FIOCM-6-PREM CYBT OG-NPR-FIPCM-CLIENT-MAX1000 $4, File Integrity and Policy Compliance Monitoring Clients - mon PRM-FIPCM-MOO-FIOCM-3-PREM CYBT OG-NPR-FIPCM-CLIENT-MAX5000 $6, File Integrity and Policy Compliance Monitoring Clients - mon PRM-FIPCM-MOO-FIOCM-8-PREM CYBT OG-NPR-FIPCM-CLIENT-MAX10000 $8, File Integrity and Policy Compliance Monitoring Clients - mon PRM-FIPCM-MOO-FIOCM-2-PREM CYBT OG-NPR-FIPCM-CLIENT-MAX25000 $10, File Integrity and Policy Compliance Monitoring Clients - mon PRM-FIPCM-MOO-FIOCM-5-PREM CYBT OG-NPR-FIPCM-CLIENT-MAX50000 $13, File Integrity and Policy Compliance Monitoring Clients - mon PRM-FIPCM-MOO-FIOCM-7-PREM CYBT OG-NPR-FIPCM-CLIENT-MAX $15, Report Server Report Server-man PRM-PRM-MOM-PRM-PREM CYBT OG-NPR-REPSERV-MAN $ Premium Service - Non-recurring Charges Site setup fee (CK) PRM-SST-NA-BASE-NA CYBT OG-SITE-SETUP $2, HA Site setup fee (CK) PRM-SST-NA-HAV-NA CYBT OG-HASITE-SETUP $5, Site setup fee - customer owned service equipment (CK) PRM-SST-NA-COE-NA CYBT OG-CUST-OWNED-SITE-SETUP $ HA Site setup fee - customer owned service equipment (CK) PRM-SST-NA-HACOE-NA $ Site setup fee Hosted LEC PRM-SST-NALEC-NA $500 HA Site Setup fee Hosted LEC PRM-SST-NAHALEC-NA $1000 Site Setup Move CK PRM-SST-NA-MCK-NA $ Site Setup fee - Single Service Device (MAN 1- CK) PRM-SST-NA-BASEMAN1-NA $1000 HA Site Setup fee - Single Service Device (MAN 1 - CK) PRM-SST-NA-HAVMAN1-NA $2000 Device setup fee-firewall PRM-FWL-NA-DST-NA CYBT OG-FW-SETUP $ Devce setup Virtual Firewall PRM-FWL-NA-DSTVFW-PREM CYBT OG-VIRFW-SETUP $ Device setup fee - Third Party VPN Link PRM-FWL-NA-3PVPNL-DS-NA CYBT OG-TPVPN-SETUP $ Device setup fee - NIDS PRM-NID-NA-DST-NA CYBT OG-NIDS-SETUP $1, Device setup fee - NIPS PRM-NIP-NA-DST-NA CYBT OG-NIPS-SETUP $1, Device setup fee - Virtual NIDS PRM-VND-NA-DST-PREM CYBT OG-VIRNIDS-SETUP $1, Device setup fee - Virtual NIPS PRM-VNP-NA-DST-PREM CYBT OG-VIRNIPS-SETUP $1, Device setup fee - HIDS Management Station PRM-HID-NA-DSTMGS-NA CYBT OG-HIDS-MGTSTATION-SETUP $ Device setup fee - HIDS Additional Policy PRM-HID-NA-DSTADP-NA CYBT OG-HIDS-ADDPOLICY-SETUP $ Device setup fee - HIDS Full Escalation PRM-HID-NA-DSTFES-NA CYBT OG-HIDS-FULLESC-SETUP $ Device setup fee - End Point Management Station PRM-EPS-NA-DSTMGS-PREM CYBT OG-EPP-MGTSTATION-SETUP $1, Device setup fee - SSL VPN PRM-SSV-NA-DST-NA CYBT OG-SSLVPN-SETUP $ Device setup fee - Security Gateway PRM-ESG-NA-DST-NA CYBT OG- -SEC-GATEWAY-SETUP $ Device setup fee - Application-level Firewall PRM-ALF-NA-DST-NA CYBT OG-APPLFW-SETUP $ Device setup fee - Proxy Server PRM-PRX-NA-DST-NA CYBT OG-PROXY-SETUP $ Device setup fee - Content Screening PRM-CSC-NA-DST-NA CYBT OG-CONTENT-SETUP $ Device setup fee - Content Screening Additional Policy PRM-CSC-NA-DSTADP-NA CYBT OG-CONTENT-ADDPOLICY-SETUP $ Device setup fee - Router PRM-ROU-NA-DST-NA CYBT OG-ROUTER-SETUP $ Device setup fee - Security Appliance PRM-SAP-NA-DST-NA CYBT OG-SECAPP-SETUP $1, Device setup fee - Health Monitoring and Management PRM-HMMOS -NA-DST-NA CYBT OG-HEALTH-SETUP $ Device setup fee - Log Monitoring and Management PRM-LMM-NA-DST-NA CYBT OG-LOG-MM-SETUP $ Device setup fee - Network Switch PRM-NWS-NA-DST-NA CYBT OG-SW-SETUP $ Device setup fee - Load Balancer PRM-LBL-NA-DST-NA CYBT OG-LOADB-SETUP $2, Device setup fee - Report Server PRM-PRM-NA-DST-NA CYBT OG-REPSERV-SETUP $ Device Set-up fee - OS Log Monitoring PRM-OSLOG-NA-OSLMSP-PREM ICB ICB ICB
6 Device Set-up Fee - Active Directory Log Monitoring/ log source PRM-ADLOG-NA-ADLMSP-PREM ICB Device setup fee - File Integrity and Policy Compliance Monitoring PRM-FIPCM-NA-FIOCM-DS-NA CYBT OG-FIPCM-MGTSTATION-SETUP $ Device setup fee - Virtual Security Appliance PRM-SAP-NA-VIRSECAPDS-NA $1, Additional Service Tickets PRM-ST-NA-ST-NA CYBT OG-SERVICETICKET-12 $ Device Setup-fee - Advanced Threat Protection PRM-ATP-NA-DST-NA $1, Premium Plus - Monthly Recurring Fees Premium Plus - Remote Office option TM-MS-Prem Plus-REM Office-Firewall-mon PRM-FWL-MOO-RNRT-PRPL CYBT OG-PRP-REM-FW-MON $ TM-MS-Prem Plus-REM Office-Firewall-man PRM-FWL-MOM-RNRT-PRPL CYBT OG-PRP-REM-FW-MAN $ TM-MS-Prem Plus-REM Office-Firewall with IPS-mon PRM-FWL-MOO-RNRTI-PRPL CYBT OG-PRP-REM-FWIPS-MON $ TM-MS-Prem Plus-REM Office-Firewall with IPS-man PRM-FWl-MOM-RNRTI-PRPL CYBT OG-PRP-REM-FWIPS-MAN $1, TM-MS-Prem Plus-REM Office-Firewall Third Party VPN Link-man PRM-FWL-MOM-3PVPNL-RO-PRPL CYBT OG-PRP-REM-FW-TPVPN-MAN $ TM-MS-Prem Plus-REM Office-Router-mon PRM-ROU-MOO-RNRT-PRPL CYBT OG-PRP-REM-RTR-MON $ TM-MS-Prem Plus-REM Office-Router-man PRM-ROU-MOM-RNRT-PRPL CYBT OG-PRP-REM-RTR-MAN $ TM-MS-Prem Plus-REM Office-Security Appliance-mon PRM-SAP-MOO-RNRT-PRPL CYBT OG-PRP-REM-SECAPP-MON $ TM-MS-Prem Plus-REM Office-Security Appliance-man PRM-SAP-MOM-RNRT-PRPL CYBT OG-PRP-REM-SECAPP-MAN $1, Premium Plus - Device SLA option TM-MS-Prem Plus-SLA-HA Firewall realtime escalation-man PRM-FWL-MOM-DSRT-PRPL CYBT OG-PRP-SLA-HAFW-RT-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Firewall realtime escalation-man PRM-FWL-MOM-SLAHAAAFWRT-PRPL CYBT OG-PRP-SLA-HA-AA-FW-RT-MAN $2, TM-MS-Prem Plus-SLA-HA Firewall realtime escalation with IPS-man PRM-FWL-MOM-DSRI-PRPL CYBT OG-PRP-SLA-HAFWIPS-RT-MAN $2, TM-MS-Prem Plus-SLA-HA Actv-Actv Firewall realtime escalation with IPS-man PRM-FWL-MOM-SLAHAAAFWIPSRT-PRPL CYBT OG-PRP-SLA-HA-AA-FWIPS-RT-MAN $3, TM-MS-Prem Plus-SLA-HA Firewall realtime escalation Gigabyte-man PRM-FWL-MOM-DSRG-PRPL CYBT OG-PRP-SLA-HAFW-RT-GIG-MAN $2, TM-MS-Prem Plus-SLA-HA Actv-Actv Firewall realtime escalation Gigabyte-man PRM-FWL-MOM-SLAHAAAFWRTGIG-PRPL CYBT OG-PRP-SLA-HA-AA-FW-RT-GIG-MAN $3, TM-MS-Prem Plus-SLA-HA Firewall realtime escalation with IPS Gigabyte-man PRM-FWL-MOM-DSRIG-PRPL CYBT OG-PRP-SLA-HAFWIPS-RT-GIG-MAN $3, TM-MS-Prem Plus-SLA-HA Actv-Actv Firewall realtime escalation with IPS Gigabyte-man PRM-FWL-MOM-SLAHAAAFWIPSRTGIG-PRPL CYBT OG-PRP-SLA-HA-AA-FWIPS-RT-GIG-MAN $4, TM-MS-Prem Plus-SLA-HA Virtual firewall realtime escalation-man PRM-FWL-MOM-DSVFR-PRPL CYBT OG-PRP-SLA-HAVIRFW-RT-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Virtual firewall realtime escalation-man PRM-FWL-MOM-SLAHAAAVIRFWRT-PRPL CYBT OG-PRP-SLA-HA-AA-VIRFW-RT-MAN $1, TM-MS-Prem Plus-SLA-HA Virtual firewall realtime escalation-gigabit-man PRM-FWL-MOM-SLAHAVIRFWRTGIG-PRPL CYBT OG-PRP-SLA-HAVIRFW-RT-GIG-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Virtual firewall realtime escalation-gigabit-man PRM-FWL-MOM-SLAHAAAVIRFWRTGIG-PRPL CYBT OG-PRP-SLA-HA-AA-VIRFW-RT-GIG-MAN $1, TM-MS-Prem Plus-SLA-HA Virtual firewall realtime escalation with IPS-man PRM-FWL-MOM-DSVFRI-PRPL CYBT OG-PRP-SLA-HAVIRFWIPS-RT-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Virtual firewall realtime escalation with IPS-man PRM-FWL-MOM-SLAHAAAVIRFWIPSRT-PRPL CYBT OG-PRP-SLA-HA-AA-VIRFWIPS-RT-MAN $2, TM-MS-Prem Plus-SLA-HA Virtual firewall realtime escalation with IPS-gigabit-man PRM-FWL-MOM-SLAHAVIRFWIPSRTGIG-PRPL CYBT OG-PRP-SLA-HAVIRFWIPS-RT-GIG-MAN $2, TM-MS-Prem Plus-SLA-HA Actv-Actv Virtual firewall realtime escalation with IPS-gigabit-man PRM-FWL-MOM-SLAHAAAVIRFWIPSRTGIG-PRPL CYBT OG-PRP-SLA-HA-AA-VIRFWIPS-RTGIG-MAN $3, TM-MS-Prem Plus-SLA-HA NIDS-man PRM-NID-MOM-DSISD-PRPL CYBT OG-PRP-SLA-HANIDS-MAN $2, TM-MS-Prem Plus-SLA-HA NIDS external sensor-man PRM-NID-MOM-DSEXT-PRPL CYBT OG-PRP-SLA-HANIDSEXT-MAN $1, TM-MS-Prem Plus-SLA-HA NIPS-man PRM-NIP-MOM-DSISD-PRPL CYBT OG-PRP-SLA-HANIPS-MAN $2, TM-MS-Prem Plus-SLA-HA NIDS Gigabyte-man PRM-NID-MOM-DSISGD-PRPL CYBT OG-PRP-SLA-HANIDS-GIG-MAN $2, TM-MS-Prem Plus-SLA-HA NIDS external sensor Gigabyte-man PRM-NID-MOM-DSEG-PRPL CYBT OG-PRP-SLA-HANIDSEXT-GIG-MAN $2, TM-MS-Prem Plus-SLA-HA NIPS Gigabyte-man PRM-NIP-MOM-DSISGD-PRPL CYBT OG-PRP-SLA-HANIPS-GIG-MAN $2, TM-MS-Prem Plus-SLA-HA Virtual NIDS-man PRM-VND-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HAVIRNIDS-MAN $1, TM-MS-Prem Plus-SLA-HA Virtual NIDS-gigabit-man PRM-VND-MOM-DSLAG-PRPL CYBT OG-PRP-SLA-HAVIRNIDS-GIG-MAN $1, TM-MS-Prem Plus-SLA-HA Virtual NIPS-man PRM-VNP-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HAVIRNIPS-MAN $1, TM-MS-Prem Plus-SLA-HA Virtual NIPS-gigabit-man PRM-VNP-MOM-DSLAG-PRPL CYBT OG-PRP-SLA-HAVIRNIPS-GIG-MAN $1, TM-MS-Prem Plus-SLA-HA Router realtime escalation-man PRM-ROU-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HARTR-RT-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Router realtime escalation-man PRM-ROU-MOM-SLAHAAARTRRT-PRPL CYBT OG-PRP-SLA-HA-AA-RTR-RT-MAN $2, TM-MS-Prem Plus-SLA-HA Router realtime escalation-gigabit-man PRM-ROU-MOM-DSLAG-PRPL CYBT OG-PRP-SLA-HARTR-RT-GIG-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Router realtime escalation-gigabit-man PRM-ROU-MOM-SLAHAAARTRRTGIG-PRPL CYBT OG-PRP-SLA-HA-AA-RTR-RT-GIG-MAN $2, TM-MS-Prem Plus-SLA-HA Security Appliance realtime escalation-man PRM-SAP-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HASECAPP-RT-MAN $2, TM-MS-Prem Plus-SLA-HA Security Appliance realtime escalation Gigabyte-man PRM-SAP-MOM-DSLAG-PRPL CYBT OG-PRP-SLA-HASECAPP-RT-GIG-MAN $4, TM-MS Prem Plis - SLA Security Appliance realtime escalation -man PRM-SAP-MOM-SLAHAAARTRRT-PRPL CYBT OG-PRP-SLA-HA-AA-SECAPP-RT-MAN $3, TM-MS Prem Plis - SLA Security Appliance realtime gigabyte escalation -man PRM-SAP-MOM-SLAHAAARTRRTGIG-PRPL CYBT OG-PRP-SLA-HA-AA-SECAPP-RT-GIG-MAN $5, TM-MS-Prem Plus-SLA-HA Security Gateway-man PRM-ESG-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HA -SEC-GW-MAN $2, Virtual Security Appliance, active-active, Realtime Escalation Management HA SLA PRM-SAP-MOM-VIRSECAPHASLAAA-PREM $2, Virtual Security Appliance, active-active, Realtime Escalation Gigabit Management HA SLA PRM-SAP-MOM-VIRSECAPHASLAGBAA-PREM $4, Virtual Security Appliance Realtime Escalation Management HA SLA PRM-SAP-MOM-VIRSECAPHASLA-PREM $1, Virtual Security Appliance Realtime Escalation Gigabit Management HA SLA PRM-SAP-MOM-VIRSECAPHASLAGB-PREM $3, TM-MS-Prem Plus-SLA-HA Actv-Actv Security Gateway-man PRM-ESG-MOM-SLAHAAARTRRT-PRPL CYBT OG-PRP-SLA-HA-AA- -SEC-GW-MAN $3, TM-MS-Prem Plus-SLA-HA Proxy Server-man PRM-PRX-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HAPROXY-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Proxy Server-man PRM-PRX-MOM-SLAHAAARTRRT-PRPL CYBT OG-PRP-SLA-HA-AA-PROXY-MAN $2, TM-MS-Prem Plus-SLA-HA Content Screening-man PRM-CSC-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HACONTENT-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Content Screening-man PRM-CSC-MOM-SLAHAAARTRRT-PRPL CYBT OG-PRP-SLA-HA-AA-CONTENT-MAN $2, TM-MS-Prem Plus-SLA-HA-Log Montioring and Management DPR Tier A-man PRM-LMM-MOM-DA-DPR-A-PRPL CYBT OG-PRP-SLA-HALOGMM-DPR-TIER-A-MAN $1, TM-MS-Prem Plus-SLA-HA-Log Montioring and Management DPR Tier B-man PRM-LMM-MOM-DA-DPR-B-PRPL CYBT OG-PRP-SLA-HALOGMM-DPR-TIER-B-MAN $2, TM-MS-Prem Plus-SLA-HA-Log Montioring and Management DPR Tier C-man PRM-LMM-MOM-DA-DPR-C-PRPL CYBT OG-PRP-SLA-HALOGMM-DPR-TIER-C-MAN $2, TM-MS-Prem Plus-SLA-HA-Log Montioring and Management DPR Tier D-man PRM-LMM-MOM-DA-DPR-D-PRPL CYBT OG-PRP-SLA-HALOGMM-DPR-TIER-D-MAN $2, TM-MS-Prem Plus-SLA-HA-Log Montioring and Management DPR Tier E-man PRM-LMM-MOM-DA-DPR-E-PRPL CYBT OG-PRP-SLA-HALOGMM-DPR-TIER-E-MAN $3, TM-MS-Prem Plus-SLA-HA-Log Montioring and Management DPR Tier F-man PRM-LMM-MOM-DA-DPR-F-PRPL CYBT OG-PRP-SLA-HALOGMM-DPR-TIER-F-MAN $5, TM-MS-Prem Plus-SLA-HA-Log Montioring and Management DPR Tier G-man PRM-LMM-MOM-DA-DPR-G-PRPL CYBT OG-PRP-SLA-HALOGMM-DPR-TIER-G-MAN $10, TM-MS-Prem Plus-SLA-HA-Log Montioring and Management DPR Tier H-man PRM-LMM-MOM-DA-DPR-H-PRPL CYBT OG-PRP-SLA-HALOGMM-DPR-TIER-H-MAN $19, TM-MS-Prem Plus-SLA-HA-SEM/SIEM DPR Tier F-man PRM-SEM-SIEM-MOM-DA-DPR-F-PRPL CYBT OG-PRP-SLA-HASIEM-DPR-TIER-F-MAN $6, TM-MS-Prem Plus-SLA-HA-SEM/SIEM DPR Tier G-man PRM-SEM-SIEM-MOM-DA-DPR-G-PRPL CYBT OG-PRP-SLA-HASIEM-DPR-TIER-G-MAN $13,230.00
7 TM-MS-Prem Plus-SLA-HA-SEM/SIEM DPR Tier H-man PRM-SEM-SIEM-MOM-DA-DPR-H-PRPL CYBT OG-PRP-SLA-HASIEM-DPR-TIER-H-MAN $24, TM-MS-Prem Plus-SLA-HA-Load Balancer-man PRM-LBL-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HALOADB-MAN $2, TM-MS-Prem Plus-SLA-HA Actv-Actv-Load Balancer-man PRM-LBL-MOM-SLAHAAARTRRT-PRPL CYBT OG-PRP-SLA-HA-AA-LOADB-MAN $3, TM-MS-Prem Plus-SLA-HA-Network-Switch-realtime-man PRM-NWS-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HASW-RT-MAN $ TM-MS-Prem Plus-SLA-HA Actv-Actv-Network-Switch-realtime-man PRM-NWS-MOM-SLAHAAARTRRT-PRPL CYBT OG-PRP-SLA-HA-AA-SW-RT-MAN $1, TM-MS-Prem Plus-SLA-HA-Network-Switch-realtime-gigabit-man PRM-NWS-MOM-DSLAG-PRPL CYBT OG-PRP-SLA-HASW-RT-GIG-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv-Network-Switch-realtime-gigabit-man PRM-NWS-MOM-SLAHAAARTRRTGIG-PRPL CYBT OG-PRP-SLA-HA-AA-SW-RT-GIG-MAN $1, TM-MS-Prem Plus-SLA-HA SSL VPN-man PRM-SSV-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HASSLVPN-MAN $3, TM-MS-Prem Plus-SLA-HA Application-level firewall-man PRM-ALF-MOM-DSLA-PRPL CYBT OG-PRP-SLA-HAAPPLFW-MAN $1, TM-MS-Prem Plus-SLA-HA Actv-Actv Application-level firewall-man PRM-ALF-MOM-SLAHAAARTRRT-PRPL CYBT OG-PRP-SLA-HA-AA-APPLFW-MAN $2, TM-MS-Prem Plus-SLA-HA-File Integrity and Policy Compliance Monitoring Management Station-man PRM-FIPCM-MOM-FIOCM-DASLA-PRPL CYBT OG-PRP-SLA-HAFIPCM-MGT-STN-MAN $2, TM-MS-Prem Plus-SLA-HA Actv-Actv Endpoint Security Management Station-man PRM-EPS-MOM-MSCHASLAAA-PREM $6, TM-MS-Prem Plus-SLA-HA Endpoint Security Management Station-man PRM-EPS-MOM-MSCHASLA-PREM $4, ATP Mail Device Availability SLA, High Availability PRM-ATP-MOM-MAILSLAHA-PRPL $2, ATP Mail Device Availability SLA, High Availability, Gigabit PRM-ATP-MOM-MAILSLAHAGB-PRPL $3, ATP Web Device Availability SLA, High Availability PRM-ATP-MOM-WEBSLAHA-PRPL $2, ATP Web Device Availability SLA, High Availability, Gigabit PRM-ATP-MOM-WEBSLAHAGB-PRPL $3, Premium Plus - Executive Reporting option TM-MS-Prem Plus- Executive Reporting Option PRM-EXRP-NA-EXR-PRPL CYBT OG-PRP-EXEC-REPORT $ Premium Plus - Security Policy Program option TM-MS-Prem Plus-Security Policy Program recurring fee devices PRM-SPP-NA-15D-PRPL CYBT OG-PRP-SEC-PLCY-PROG-15 $1, TM-MS-Prem Plus-Security Policy Program recurring fee devices PRM-SPP-NA-40D-PRPL CYBT OG-PRP-SEC-PLCY-PROG-40 $3, TM-MS-Prem Plus-Security Policy Program recurring fee devices PRM-SPP-NA-100D-PRPL CYBT OG-PRP-SEC-PLCY-PROG-100 $5, TM-MS-Prem Plus-Security Policy Program recurring fee devices PRM-SPP-NA-101D-PRPL CYBT OG-PRP-SEC-PLCY-PROG-101+ $8, TM-MS-Prem Plus-Security Policy Program-Reporting & Review monthly fee PRM-SPP-NA-RAR-PRPL CYBT OG-PRP-SEC-PLCY-REP-REV-MONTHLY $2, Premium Plus Service - Non-Recurring Charges TM-MS-Prem Plus-Remote Office Setup fee CYBT OG-REM-OFFICE-SETUP $ TM-MS-Prem Plus-Security Policy Program fee devices PRM-SPP-NA-SET15D-PRPL CYBT OG-PRP-SEC-PLCY-PROG-15-SETUP $3, TM-MS-Prem Plus-Security Policy Program fee devices PRM-SPP-NA-SET40D-PRPL CYBT OG-PRP-SEC-PLCY-PROG-40-SETUP $8, TM-MS-Prem Plus-Security Policy Program fee devices PRM-SPP-NA-SET100D-PRPL CYBT OG-PRP-SEC-PLCY-PROG-100-SETUP $16, TM-MS-Prem Plus-Security Policy Program fee devices PRM-SPP-NA-SET101D-PRPL CYBT OG-PRP-SEC-PLCY-PROG-101+-SETUP $30, QualysGuard Scanning Services Express Edition QualysGuard Express VM Module for 32 IP addresses of which 4 can be external with PCI scanning, and one Scanner Appliance QG-X-4-32 QUALYS EXP VM 4EXT IPS-TOTAL 32IPS $2, QualysGuard Express PC Module for 32 internal IP addresses QG-X-POL-32 QUALYS EXP PC MOD 32 INTERNAL IPS $1, QualysGuard Express WAS Module for 1 web application QG-X-WAS-1 QUALYS EXP WAS MOD 1 APP $1, QualysGuard Security Scanning Service QG-SAE QG-SAE QUALYSGUARD SECURITY SCANNING SERVICE QG-SAE $1, QualysGuard PCI Stand Alone Module with WAS QualysGuard PCI Portal with VM Module and WAS Module for 3 IP addresses and 1 web application QG-PCI-WAS QUALYS PCI VM+WAS 3 IPS +1 WEB APP $ Note: Sample pricing only. Multiple configurations available based on customer specific requirements. Pricing based on final configuration. Device Tier Device/Vendor Model DPR Tier ES560 DPR Tier B ES1060 DPR Tier B ES1260 DPR Tier C ES2560 DPR Tier C ES3060 DPR Tier D ES5060 DPR Tier E ES7560 DPR Tier F LSD60 DPR Tier G LSA60 DPR Tier A LS L605 DPR Tier B LS L610 DPR Tier C LS R601 DPR Tier A LS R602 DPR Tier A MX 3020 DPR Tier C MX 4020 DPR Tier D LG400 NONE LX820 DPR Tier D LX1020 DPR Tier E LX4020 DPR Tier F ST1020 DPR Tier C ST2020-SAN DPR Tier D ST4020 DPR Tier E EVA -BASE (50 log sources, 500 GB retention) DPR Tier B EVA-MID (500 log sources, 2.5 TB retention) DPR Tier C EVA-LRG (2500 log sources, 4.5 TB retention) DPR Tier E EVA-XL ( 5000 log sources, 8.5 TB retention) DPR Tier F
8
9
10
11
12
13
14
SCHEDULE M Security Services
SCHEDULE M Security Services MANAGED SECURITY SERVICES The Managed Security Services Rate structure is generally composed of a Non- Recurring Charge (NRC) and a Monthly Recurring Charge (MRC). The NRC
DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index
DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
Open Licenses for Cloud Server and Exchange 2013
Open Licenses for Cloud Server and Exchange 2013 Cloud Server Open Licenses (prepay for one year and save 7% off monthly pricing for base packages) The pricing below is on a per month basis. The 7% discount
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
IBM Managed Security Services for Network Firewalls
Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. 1. Scope of Services IBM Managed Security Services for
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
PART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
MANAGED SERVICES. SCHEDULE M Date: 9/12/2014 CAROUSEL INDUSTRIES PRICELIST - STATE OF NJ YEAR 1 PRICING WITH 5% DISCOUNT
SCHEDULE M Date: 9/12/2014 CAROUSEL INDUSTRIES PRICELIST - STATE OF NJ MANAGED SERVICES YEAR 1 PRICING WITH 5% DISCOUNT Discount pricing applies to orders placed within the first year of the State Contract
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
CSC BizCloud VPE Service Offering Summary. CSC i
Table of Contents OVERVIEW... 1 BIZCLOUD VPE SOLUTION SUMMARY... 1 BIZCLOUD VPE INFRASTRUCTURE... 1 Hardware and Virtualization Layer... 2 Compute Components... 2 Storage 2 CSC SUPPORT FOR THE BIZCLOUD
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control
Endpoint web control overview guide Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control Document date: December 2011 Contents 1 Endpoint web control...3 2 Enterprise Console
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
IBM Managed Security Services for Unified Threat Management
Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4 IBM Managed Security Services for Unified Threat Management
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Table of Contents. CSC CloudCompute Service Description Summary CSC 1
Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...
Required Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Asset Management Suite Backup Exec Certificate Intelligence
SoftLayer Fundamentals. Security / Firewalls. August, 2014
SoftLayer Fundamentals Security / Firewalls August, 2014 Security Overview SoftLayer provides a security-rich environment for deploying and running customer workloads. Architecture and operational responsibilities
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Customized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
MANAGED SECURITY SERVICES
MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet
Response to Questions CML 15-018 Managed Information Security
Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?
Sophos SG 1 Session: Sophos UTM
Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Service Descriptions
Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6)
Infrastructure as a DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6) All customer data is located entirely in the contiguous United States. When required the data will be located
Managed Protection Services for Networks - Standard
Service Description 1. Scope of Services Managed Protection Services for Networks - Standard IBM Managed Protection Services for Networks Standard (called MPS for Networks Standard ) is designed to provide
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
Firewall Environments. Name
Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting
McAfee Next Generation Firewall (NGFW) Administration Course
McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES
FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures
Firewall Agenda Unit 1 Understanding of Firewall s definition and Categorization Unit 2 Understanding of Firewall s Deployment Architectures Unit 3 Three Representative Firewall Deployment Examples in
WatchGuard Certified Training Partner (WCTP) Program
WatchGuard Certified Training Partner (WCTP) Program Revised: April 2012 Overview The WCTP program is a mutually beneficial partnership between WatchGuard and our most highly qualified business partners.
Schedule M Managed Security
Schedule M Managed Security AT&T Security Device Management ( SDM )... 3 AT&T Security Device Management Service Components, Configurations... 3 AT&T Security Device Management, Project Management Support...
E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA
E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA RFP FOR SELECTION OF SYSTEM INTEGRATOR CORRIGENDUM RELEASED BY: Goa Police Government
Product catalogue 29/01/2013. Products donated by : Microsoft Cisco Symantec SAP Fluidsurveys easylearning
Donation Programs Product catalogue Products donated by : Cisco Symantec SAP Fluidsurveys easylearning Page 1 of 18 Access LS-40873 Access 2013 (Includes Software Assurance) (Dutch) 10,00 LS-40879 Access
Programmes de Donations ADB-SolidaTech en partenariat avec TechSoup Global
Programmes de Donations ADB-SolidaTech en partenariat avec TechSoup Global Nos partenaires : ADB-SolidaTech Hotline : +33 5 31 61 60 15 Access Référence Nom du produit Frais Administratifs (*) BizTalk
How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2
èè How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 Table of Contents 1. General overview... 3 1.1. Installing the plugin... 3 1.2. Testing the plugin with the
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments
Page 0 2015 SOLUTION BRIEF MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments NET ACCESS LLC 9 Wing Drive Cedar Knolls NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction...
IBM Security SiteProtector System Configuration Guide
IBM Security IBM Security SiteProtector System Configuration Guide Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 209. This edition
I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000
Letting you do what you do best... run your business www.sironasolutions.com 06 850 000 For years, IT companies and their clients have been working against each other. Something breaks, the IT company
Application Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Quick Start 5: Introducing and configuring Websense Cloud Web Security solution
Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
XXXXXX Trade mark of Telstra Corporation Limited ABN 33 051 775 556. Registered trade mark of Telstra Corporation Limited. JUN 09
F O R f u rt h er informat i o n refer to the TElstra Business broadband SALES handbook B u i l d t h e best B us i n e ss Broadband solu t ion for your customer XXXXXX Trade mark of Corporation Limited
Sizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances
Sizing Guideline Sophos UTM 9.2 - SG Series Appliances Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos SG Series appliance for your
Network Security Market in India CY 2014
Network Security Market in India CY 2014 Advanced, Sophisticated, and Targeted Attacks Lead to High Adoption of Network Security Solutions July 2015 Contents Section Slide Number Executive Summary 3 Market
Vintage IT Services MSRP Pricing PaaS Catalog Pricing Service Categories MSRP Pricing
Vintage IT Services MSRP Pricing PaaS Catalog Pricing Service Categories MSRP Pricing Windows Server 2008 R2 Enterprise 64 bit $110.00 / Month / VM Windows Server 2008 R2 Standard 64 bit $25.00 / Month
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions
CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions Overview The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure,
ORF ENTERPRISE EDITION 1. Installation Guide FOR ORF ENTERPRISE EDITION 4.4
ORF ENTERPRISE EDITION 1 Installation Guide FOR ORF ENTERPRISE EDITION 4.4 1 ORF ENTERPRISE EDITION 2 What Is This Guide About? This guide provides step-by-step instructions for installing ORF Enterprise
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Appliance Comparison Chart
Appliance Comparison Chart Models Edge 10 270 570 1070 2070 070 Edge X, Edge W, Edge X ADSL, Edge W ADSL 12 16 272 276 572 576 107 1076 207 2076 07 076 Software Edition Embedded NGX R65, R70 R65, R70 R65,
Sophos Certified Architect Course overview
Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting
EndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
WatchGuard Certified Training Partner (WCTP) Program
WatchGuard Certified Training Partner (WCTP) Program Revised: July 2010 Overview The WCTP program is a mutually beneficial partnership between WatchGuard and our most highly qualified business partners.
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
Anti-Virus/Malware Policy
Purpose This document establishes the corporate policy and standards for anti-virus/malware protection on any system owned by LandStar Title Agency, Inc or connected to the LandStar Title Agency, Inc network
Security Administration R77
Security Administration R77 Validate your skills on the GAiA operating system Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check
Pricing Guide. Service Overview
Service Overview tolomy s G Cloud services are designed to give you the best possible degree of control and transparency over your costs. To maximise cost efficiency on offer to our customers a wide range
DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index
Infrastructure as a Service DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index All customer data is located entirely in the contiguous United States. When required the data will be located in a
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
Who s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
IBM Security SiteProtector System Configuration Guide
IBM Security IBM Security SiteProtector System Configuration Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 205. This edition
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
Discounted Pricing MANAGED SECURITY SERVICES
MANAGED SECURITY SERVICES Managed Firewall Service - Network Based MRC NRC Service Level 1 $452.61 $10,000.00 Setup Service Level 2 $704.06 $14,000.00 Setup Service Level 3 $1,382.98 $18,000.00 Setup Service
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Network Security Solution. Arktos Lam
Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security
Workspot Configuration Guide for the Cisco Adaptive Security Appliance
Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot, Inc. 1/27/2015 Cisco ASA and Workspot Overview The Cisco Adaptive Security Appliance (ASA) provides organizations with secure,
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)
IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying
High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006
High Speed Data Transfer from the APS Kenneth Sidorowicz September 27, 2006 Deep Inspection Firewalls Secure Computing G2 Model 4150 firewalls were installed during the September 2004 accelerator shutdown
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
