1 Managed Services The purpose of the Managed Services is to protect a clients data through a cohesive and highly responsive network security service, based on recognized security standards and industry best practices. Managed Services consist in the management of the infrastructure through a base set of monitoring and operational service activities provided by onsite and remote technical resources, and delivering all relevant network security components. Capgemini also provides optional and specialized activities that are available for the client as an enhancement to the base set of service activities. For the purposes and scope of this document and deliverable, Managed Services will encompass the following: Firewall VPN Remote Access Gateway Intrusion Prevention / Detection Other infrastructure security services are described within our Services as well as the Service Line section of Capgemini Outsourcing portfolio. Particularly, in the Operational section of the catalogue. The Service Components that Capgemini provide as part of these Operational Services are as follow: Firewalls and Access Controls Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS) Content and URL Filtering (includes Anti-Spam Filtering) Malware Secure Configurations Media Handling, Classification & Disposal All these Services are part of a complete and coherent set of Services that are provided as standalone offerings, or embedded within our global Outsourcing Services.
2 As shown in the diagram below, Capgemini does cover the entire scope of Services, from Consulting & Governance to Operational Services and Desktop features, see figure 1 Domains. This is supported and delivered by the Capgemini Service Lines across all functional areas and in an integrated manner. Scope of Service Line Service Offering Personnel Business Process Functional Areas Information Application Desktop System Network Physical Governance ISMS Design, Risk Assessment, Audit & Compliance Privacy & Data Protection Information & Event, Vulnerability Domains Consulting Business Continuity Identify & Acess Awareness IT Assessment/Health check, Forensics & Investigation BC-ITSC Program, BC-ITSC Current State Assessment, Business Impact Assessment, BC-ITSC Strategy Definition & Planning, BC-ITSC Testing, Exercising & Awareness Identity, Access, User Secure Configuration Operational Content Filtering, Anti-Malware Media Handling, Classification & Disposal Operational Support Perimeter SCOPE Fig. 1 - Domains in Capgemini Managed Services include all people, processes and activities, tools and equipment resources necessary to manage all network security components under prevailing or appropriate governance. Capgemini deliver Managed Services on both: Client infrastructures Capgemini infrastructure providing shared or client dedicated systems Infrastructures that are used for interconnection between Capgemini and its clients (e.g. used to deliver BPO services, DMZ to provide remote Infrastructure Outsourcing services but to name a few.) Capgemini delivers 24x7 Operations with Offshore as well as on/near-shore (our RighShore methodology) capabilities and local partnerships for maintenance. As described in detail in the following sections, our services encompass Monitoring and Fault, major security incident & crisis management, problem/incident resolution and change implementation, consulting services, 3 rd parties management and on site support to name a few. Capgemini supports all key technologies and market available infrastructures for each Network Service.
3 Capgemini Network Infrastructure Services addresses the data, network security, voice and unified communication requirements of its client s IT infrastructure, delivered and reported in an environmentally consciou manner. Voice Services Telephony Contact Center Services (Hosted & Managed) Unified Communications Conferencing Mobile Phones & Mobility Voice Consulting Services DATA NETWORK SERVICES Managed Router Service Managed LAN Service Internet Access Applications Networking Domain Name System Data Network Consulting Services MANAGED FIREWALL SERVICE Firewall (fig. 2) VPN (fig. 3) Remote Access Gateway (fig. 4) Other Services are available via our security services. Fig. 2 - Managed Services Fig. 3 - VPN Services Fig. 4 - Remote Access Gateway Fig. 2 For Firewall Services, the type of services embedded in the Capgemini service component are: Application on Server platform Appliance (physical or virtual) Application Cloud Services Optional Intrusion Detection or Prevention Services Optional High-available resources Fig. 3 For VPN, the type of services embedded in the Capgemini service component are: Router Appliance (physical or virtual) and access control Client Software (VPN software) Fig. 4 For Remote Access Gateway, the type of services embedded in the Capgemini service component are Remote Access Gateway Server & Application Appliance (physical or virtual) Application RAS For each of the above, Capgemini deliver a number of value-added services such as: Implementation of security standards (systems hardening and similar), Application controls to name a few events reporting; auditing & analysis SSL VPN Application & Appliance management; IPSEC VPN Client administration Network Infrastructure Services compliance with regulatory requirements as imposed by international or national authorities or standards (such as FDA, PCI, NERC, ISO27001 and similar)
4 Managed Services provides: VPN Remote Access Gateway Managed Services are part of a larger suite of services that various Capgemini Outsourcing Service Lines deliver. Capgemini Services address the confidentiality, integrity and availability requirements of the client s business operations and IT infrastructure. This is achieved through a flexible combination of management, operational and technical controls, leveraging people, process and technology depending on the client s risk appetite Governance Privacy & Data Protection Information and Event Monitoring Vulnerability Identity Identity Access User Administration Operational Firewall Intrusion Detection/Prevention Systems Content Filtering Anti-Malware Secure Configurations Media Handling, Classification & Disposal ISMS Design Risk Assessment PCI Compliance Audit & Compliance IT Assessment/Health check Awareness Forensics & Investigation Consulting Business Continuity & IT Service Continuity BC-ITSC Program BC-ITSC Current State Assessment BC-ITSC Business Impact Assessment Audit & Compliance BC-ITSC Strategy Definition and Planning BC-ITSC Testing, Exercising and Awareness Fig. 5 - Operational Services Capgemini Capabilities The Capgemini Global Network Operations Centre (GNOC) is our central reporting and coordination point for all network incidents, problem and change requests. It provides all Level 1 and 2 support of the data network infrastructure. The Capgemini GNOC is staffed with a full time network operations team with comprehensive network skills to conduct 24x 7 incident problem and change management of the network. Incident managers own all incidents through to service restoration and resolution. Working with the operations team are Level 2 network analysts who provide escalation support for Incident and change management where required. They also provide the network documentation and performance and capacity reporting for the network. Skill levels for our Level 2 support team are typically CCNA, CCNP, MCP, MCSE, certified or equivalent technical certification for technologies that exist within the network.
5 GOVERNANCE Client Infrastructure Network Fault, Capacity and Performance Tools Service Desk 1st Line Level 1 Level 2 Level 3 Rightshore Automated Interface Network Operations 24*365 Network change management Projects Service Toolset Ticketing, Incident, Problem Change Asset, Configuration Mgmt Tools Proactive Monitoring Incident Manager Incident Escalation Problem Complex Incident and Change Major Incident Mgmt Major Incident Escalation Problem Configuration and Patch Capacity Network Design Documentation Network Design, Testing and Implementations 3 rd Party Reporting Soft IMAC DR Testing Performance Mgmt ITIL V3 Processes Fig. 6 - Capgemini GNOC services A network engineering team will provide incident escalation for complex network issues and 3 rd Level support functions. This team will also review and provide recommendations regarding the network state for capacity and performance requirements. They provide network design, implementations, asset refresh and project support for new initiatives as well as DR / failover testing. Skill levels for our network engineers vary from CCIE, CCDP, CCNP, CCNA certified or equivalent.. All moves, additions and changes including asset refresh will be coordinated by the Capgemini GNOC working with the offshore engineering teams managing configuration changes and documentation updates. The Capgemini GNOC, Level 2 Analysts and Network Engineering teams support the network through remote management. Network Services moves and changes that require onsite activities will be provided by our partner onsite teams through dispatch tickets or called out to our hardware maintenance providers. Again the Capgemini GNOC has central control and oversight for these teams through to completion and ticket closure. The Capgemini GNOC works closely with the Capgemini IMOC (Infrastructure Operations Centre) to ensure incidents are identified, categorised and assigned to the appropriate resolving team. Common standards, processes and toolsets ensure a swift and consistent approach to incident resolution.
6 SIAM - Service Integration and Ops Integration, Priority 1 Major Incident, Problem, Change and Asset, Service Performance & Reporting Service Desk Managed Incidents Priority 2, 3, 4 + T0 T1 T1.5 T2 T3 Service Desk > single incident view via ITSM Desktop Related Incidents (Remote Support) Facilities End User Self- Service Desk Operations Applications Auto Assign Ticket Warm Transfer Auto Events Tivoli Network Mgr Auto Events Tivoli MOM IT SM Capgemini IMOC TM Single consolidated event view via Tivoli Self-Healing Auto Assign Ticket Capgemini NOC Single view of network related events Self- Healing Auto Assign Ticket LAN WAN Telephony Alert Threshold Monitoring Operation System Support Print Support Restarts / Reboots Database Maintenance Daily Checks Warm Transfer Warm Transfer Mutualised Tier 2 Incident Resolution Teams Mutualised Tier 2 Network Resolver Team Desktop Wintel UNIX Storage Backup Messaging etc... Network Telephony Mutualised Pools of Resource Wintel, Unix, Mainframe, Network,, Backup, SAP basis, DBA, Storage, Messaging, SOE, Print, etc Fig. 7 - Capgemini IMOC and GNOC integration Current Services delivered by Capgemini Outsourcing are as follow: 1,000,000+ Identities Managed Over 1.1 Million Malware Protection Agents Deployed and Managed In excess of 1000 Fault-tolerant pairs Managed Key Activities & Processes Managed Services includes: Monitoring Incident & Problem Change Configuration Capacity & Performance Service Reporting
7 Software & Upgrades Standard implementation, including Vulnerability alerts and fix/patch application Network Architecture & Expertise Application Control of relevant third parties Telco & 3 rd Party operational management: Escalation, Fault & Problem SLA Reporting Asset This may vary for client dedicated network security infrastructure. An analysis and design are performed as early as possible, with information from RFP or during the due diligence phase. Options or customized service might have to be implemented to fit with the client s specific environment (hardware & software, tools used, features required, etc.) and constraints. We describe in the section below some of the key activities that are specific and representative of Managed Services as delivered by Capgemini Outsourcing Services. This section does not outline all the activities undertaken but highlights important ones: Monitoring Capgemini employs a set of people, tools and processes to deliver a comprehensive 24x365 proactive monitoring capability for our Managed Services. This is most important to providing the highest service levels required by our clients. Our technical staff are knowledgeable and current in network technologies implemented in our datacenters and we maintain a number of network certifications (Capgemini IMOC staff are ITIL v3 certified and are Cisco trained and certified associate, specialist, professional, expert - depending on their functions (level 1, 2 or 3)). Capgemini IMOC technicians are continually monitoring the tools and events on client networks. When a fault is detected by our IMOC and it is determined that it is a service affecting incident, our escalation process is triggered and the incident is managed end to end till resolution by our Incident team, in full coordination with the Capgemini IMOC (and at level 3 if/as necessary). Our Incident flow goes in a seamless process from first level of resources and if the incident cannot be handled by our first level technical staff within a pre-defined time, the second level engineers are engaged to review and determine the root cause, etc up to 3 rd level support (or vendor) and if necessary, engagement of our partners & suppliers centres of expertise. Proactive management of the infrastructure enables the remote identification and correction of incidents and is underpinned by the use of advanced management tools. Network devices are proactively monitored by using polling cycle to each managed device to detect the status of that device. These tools are an important part of our monitoring services. Capgemini uses a standard set of tools to provide monitoring and management. Where we are managing a client owned security infrastructure, Capgemini has can leverage tools implemented by our customers which are separate but compatible with our standard set of tools. We do this when our client has implemented a capable set of tools that provide the same capability and function that our tool set employs and where using these tools provides a better value to our client. However, whether using Capgemini or client specific tools, we continue to provide and roll up all network events and corresponding information to our higher level management tool to provide comprehensive event correlation and perform automated ticket assignment and escalation to the right resources to restore service quickly.
8 Performance and capacity Capgemini will provide a capacity planning and performance management service which verifies that the IT infrastructure is capable of delivering the right level of security, performance and capacity for your business. This caters to multiple platforms, locations and environments and is built on industry leading processes and integrated tools. Performance and utilization data are collected via monitoring agents on each critical system. The proposed solution would keep performance and capacity data in the performance tool repository. The Capgemini GNO (and/or regional Cap network security teams depending on the exact Delivery organization) carries out proactive network analysis to find any potential performance issues and reports to engineering for proposed action. When necessary, capacity recommendations will be reported to you to avoid future issues in network security. The Capgemini GNOC (and/or regional network security teams depending on the exact Delivery organization) also provides a monthly analysis summary, detailing trends, potential problems and capacity planning recommendations. Capacity Analysis is provided from standard reports built on reporting tools such as Computer Associates, Cisco Prime, NetHealth and accessible for you through the our portal or delivered reports.. In regards to capacity management Capgemini will: Provide capacity analysis reports and analysis of network security capacity Identify issues in accordance with your network security performance Advise on appropriate monitoring regimes and taking timely and effective action to ensure
9 That monitoring regimes remain fit for purpose Ensure appropriate improvement actions are identified and added to the service strategy recommendations. Producing and maintaining appropriate Operational documentation (e.g. Quarterly Traffic Report ) Ensuring timely delivery of reports, including contributions to Service Performance Reports Incidents reports and Benchmarking reports As part of the capacity management service, we will include an agenda item at the periodic service review meetings dedicated to capacity issues. During these meetings we will raise any issues identified under the performance and capacity service, along with recommendations for adding extra capacity to mitigate such items. This service can only be a success if it is fully collaborative between the client and Capgemini. We would expect the client to play an active role in forecasting capacity requirements by providing business knowledge and forecasts at these service review meetings. By analysing this forecast data, Capgemini can make recommendations about future changes to the network security infrastructure to ensure that it runs at maximum efficiency. Change The support teams will implement changes that are in the scope of service in accordance with the agreed change records. Change details will be recorded in the change management system. Reporting Capgemini will utilize our standard tool for service reporting to our client. Our monitoring and management tools feed network management and service level information for monthly network reporting requirements. These reports can be viewed on line by our client s designated Network points of contacts. In addition, we can update your web available portal that can be used today for real time management review. This real time network performance dashboard will provide you with specific data monitoring activity regarding the client s Network. Specific reporting such as vulnerability assessments and security compliance are provided as per service scope defined with the client. Several management, security and reporting tools can be used to deliver required reports. Capgemini counts on a broad partnership ecosystem to deliver this item.
10 For each of these services, Capgemini has defined the detailed scope of standard activities it usually provides, the various type of technologies or services it can apply to, the assumptions it typically takes etc. Activities are of three types as described below: Base Activities General Administration of client communication via the service manager Maintenance and update of technical documents used to deliver the services Quarterly review of client business objectives and infrastructure Bi-annual review of client hardware and software standards Monitoring Proactive monitoring security devices for health and availability using the automated toolset Monitoring of industry standard thresholds for devices Automated trouble ticket generation for incidents Incident Resolution Investigation be resolving team, diagnoses and restoration of affected services as notified by the ticket raised through the incident handling process, aligned to agreed service levels Details of incident and resolution will be recorded within the problem management system. Problem Resolution According to the problem management process, the resolving teams will prevent a recurrence of incidents by identifying and eliminating the root cause Details of the problem management activities will be recorded within the problem management system Change implementation The resolving team will implement changes to configuration items in accordance with the agreed change record Details of the change will be recorded in the change management system Configuration Maintenance of up-to-date configuration information on in-scope devices for use in resolving incidents Moves, adds and changes of configuration incidences are registered Automatic backup of asset configurations to a central configuration management tool Performance Establish and maintaining a common set of performance metrics and then measuring and checking the level of performance in terms of latency, response time and availability Reporting on such measures against agreed Service Levels Monthly review and reporting based on pre-defined reporting templates, including measures to agreed performance matrices on in scope services Capacity The analysis of data provided my monitoring, undertaking trend analysis and making sizing recommendations to the client regarding the necessary resource levels to provide the most efficient use of resources or to avoid service impact in the future Resource measures include utilisation (memory, processor and concurrent sessions) are monitored and analysed against pre-defined thresholds agreed with the client based on good industry practice The service is provided continually and reported to the client on a monthly basis using the standard report templates
11 Standard Implementation (Application) Implementation of rules, policies, zones, VLAN s, VRFs, according to clients Officer requirements Reporting Reporting on availability, sessions, denies, provided on a monthly basis Reporting on common targets and recurrent attacks Reports provided by working day X (the value of X to be determine by mutual consent) Standard reporting suite automatically produced by the Service process Bespoke reporting available as a separate charged item User Administration User administration is restricted to OS administration accounts set up on in scope assets A rights and delegation model is in place which ensures that administration rights are used in the correct way Administration rights are restricted to Capgemini staff supporting the service components Administration rights are reviewed and updates as necessary in line with human resource changes Passwords are updated and distributed every 120 days Asset Maintenance and management of all assets in a global database Administration (Hardware) Hardware configuration (system configuration, network configuration, root logging and security) Distributed account management is restricted to systems administrative accounts A rights and delegation model is in place which ensures that administration rights are used on the correct way Provision of compliance information Administration (Application) Configuration for application Rule base Network configuration Routing, Network Address Translation IP addressing DMZ plan Distributed account management is restricted to administration accounts A rights and delegation model is in place which ensures that administration rights and privileges are used in the correct way Provision of compliance information Architecture Maintenance of architecture blueprints Respond to queries related to changes and other service management activities For further technical solutions and project work a separate set of network Assessment, Design and Optimisation services are available enabling Capgemini to deliver the entire life cycle management Asset Refresh Life cycle management Replacement through change control process of existing in-scope assets at end of useful life or support by manufacture For base service asset life is typically five years Applications Control Implementation and management of applications control for systems or users traffic These provide granular policy based controls of Web-based applications such as: IM Multiplayer games Unauthorised HTTP-tunnelling Wikis P2P Public voice over IP (VoIP) Blogs Data sharing portals Gateway level (TCP/IP) malicious code Remote PC access Web conferencing Chat SQL Injection Cookie poisoning Parameter tampering Directory traversal Streaming media
12 Optional Activities SPECIALIST Activities OS Maintenance and Support major releases Included updates in OS for major releases new or improved feature sets Project based implementation covering evaluation, testing and updating the OS through the change management process Major releases are first evaluated by Capgemini to determine if the release is required or necessary to implement Major releases as determined by manufacture rating Dynamic Routing Protocol of the dynamic routing protocol (BGP, OSPF, EIGRP) within the routing layer and for in scope service components High Availability of the routing protocols between active and standby security elements within a service location of other high availability mechanisms required for proper operation of security environment Provided according to hours of support and other pre-agreed options of service. Provision of third party management if relevant and required High Availability of the routing protocols between active and standby security elements within a service location of other high availability mechanisms required for proper operation of security environment Provided according to hours of support and other pre-agreed options of service. Provision of third party management if relevant and required Contract of third party contract on behalf of the client Tracking SLA Reporting Escalation management Performance Tuning Performance tuning focuses on optimising performance and consists of setting and configuring the operating system parameters to achieve an improved system response time and availability Re-active and pro-active measures including the investigation of performance issues and initiating / advising on appropriate actions Tuning may, for example, include traffic prioritisation techniques for Quality of Service and Class of Service configuration according to clients business needs Moves, Adds and Changes Changes to client s infrastructure associated with a service request as opposed to incident and problem resolution MAC s cater for changes in the clients business requirement Reporting Non standard Special, bespoke reporting not included in standard reporting set Technology Refresh Technology refresh enables major changes of technology that globally impact to existing asset base The service provides: An audit of the existing infrastructure Evaluation of new technologies, business case and approval Design of target infrastructure Physical implementation of new assets Testing and implementation of new solution Handover to live operation Provision of documentation Update architectural blue prints
13 Advanced Log Post mortem analysis of the logs on the (events, rules, CPU, DMZ) to establish root cause of an incident Web URL Filtering URL filtering is used to block websites which do not comply with the security policy Blocking and blacklisting URL s as per vendor URL database Updating blacklists for different categories Web Content Filtering Implementation and management of content filtering Detection and analysis of malicious codes such as: Malware Virus Trojan Spyware Worm Adware embedded objects Zombies Polymorphic viruses Macros Malicious scripts and file extensions Expertise Lead proposal stage Assist in vendor selection Create and lead action plans in case of specific issues Coordination of vendors and partners Run cost saving audits Best Practice Review Review of infrastructure against industry best practice Produce recommendations document, costngs and project plan User Based Policy Where next generation and Active Directory are integrated, implement and manage policy (rule base) based on users / user groups. client sites. SOBRE A CAPGEMINI Com 145 mil profissionais em mais de 40 países, a Capgemini é um dos principais provedores globais de serviços de consultoria, tecnologia e terceirização. Em 2014, o Grupo reportou uma receita global de bilhões de euros. Em conjunto com seus clientes, a Capgemini cria e entrega soluções de negócios e tecnologia, que atendem às suas necessidades e alcançam os resultados desejados. Como uma empresa essencialmente multicultural, a Capgemini desenvolveu seu modo próprio de trabalhar, o Collaborative Business Experience TM, com base no Rightshore, seu modelo de entrega mundial. Em 2010, o Grupo Capgemini adquiriu a CPM Braxis, que vem operando com sucesso no Brasil por mais de 30 anos. No final de 2012, a CPM Braxis Capgemini teve sua marca mudada para Capgemini. No País, a Capgemini emprega 8,5 mil pessoas e atende mais de 200 clientes, oferecendo quatro principais linhas de serviços: Applications Services, Infrastructure Technologies & Services, e Business Process Outsourcing (BPO). Conecte-se à Capgemini no Brasil pelo Twitter, Facebook e LinkedIn. *Rightshore é uma marca registrada da Capgemini Copyright Capgemini Todos os direitos reservados.
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco
GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
CenterBeam Managed Services Overview Q3 2011 Accelerating IT to the Speed of Business CenterBeam s DNA Founded as a Cloud Services Provider in 1999 HQ, San Jose, CA NOC and Engineering, San Diego, CA NOC
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
Job Description Job Title Desktop and Systems Function Desktop, Server and Network Administrator Support Reporting to Service Desk Manager Direct Reports None Working Hours Standard 35 hours per week -
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Thales Service Definition for UK NOC Services Thales Service Definition for NOC Services for Cloud April 2014 Page 1 of 13 Thales Service Definition for UK NOC Services CONTENT Page No. Introduction...
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Running Mission-Critical Enterprise Applications in Private and Hybrid Cloud Environments Working in Partnership Today s Presenters Working in Partnership Paul Calvert IT Services Solution Line Director
Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority
Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed
Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Managed Services OVERVIEW overview 24/7 Support Services Tailored for large and small businesses MANAGED SERVICES 3 MONITORING AND ALERTING SERVICE 4 SUMMARY 4 DESCRIPTION 4 MONITORING 4 ALERTING 4 RESPONSIBILITY
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
RFP 1. Applications IT Architect Analyzes and designs the architecture for software applications and enhancements, including the appropriate application of frameworks and design patterns and the interrelationships
REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION SD007 V4.1 Issue Date 04 July 2014 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s managed firewall service (MFS) is based on a hardware firewall appliance
ITIL Introducing service operation This document is designed to answer many of the questions about IT service management and the ITIL framework, specifically the service operation lifecycle phase. It is
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
0984v1 Service Catalogue Table of Contents Service Desk...3 Desktop Services...4 Wintel Services...5 Enterprise Services...6 Network Services...7 IMAC s (Install, Move, Addition and Change Services)...8
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
OVERVIEW JULY 2013 AGENDA Overview Capabilities Commitment OVERVIEW Capabilities Addressing today s IT challenges Our Capabilities and Approach Network Data Center Collaboration Security Workplace Service
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something
SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
1.1 Package 1: End User Support Services A Desktop Support Services 5.2.1 Desktop support services consist of all that is required to configure, install, operate, maintain and manage the Department s desktop
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built
JOB OPENING Position: Reports To: Manager of Technology Operations Location: Aledo Position Requirements: Associate s degree in computer science or electronics and/or certification such as MCSE, CNE, A+,
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Evaluating Internal and Outsourced Models for Network Monitoring A By Introduction Managing network availability and performance can be a difficult task for companies with limited IT resources and no real-time
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)
Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security
Statement of Service Enterprise Services - MANAGE Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general
Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must
Service at a Glance The NetAid service focus goes beyond mere monitoring of network infrastructure to preventative maintenance and proactive intervention. This could be a solution for IT managers who want
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP email@example.com Security Security is recognized as essential to protect vital processes and the systems that provide those
Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
Log and Refer Service Desk IL0 September 2013 TABLE OF CONTENTS 1 Service Overview... 3 2 Why Capgemini?... 5 3 The Capgemini Proposition... 6 3.1 Approach... 7 4 Benefits... 9 4.1 Summary of Proposition...
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
SCHEDULE 7.6 SHARED RESOURCES PAGE 1 Help Desk Equipment, Software, Tools and Systems: Help Desk Assets within the Winchester Help Desk facility including servers, network, desktops, headsets, software
MANAGED FIREWALL SERVICE Service definition Page 1 of 4 Version 1.2 (03/02/2015) NSMS Managed Firewalls Service Definition Understanding of a firewall service The function of any firewall service is to
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
Managed Services 24x7 UK Based Service Operations Centre Managed Services Intrinsic runs a 24x7 UK Based Service Operations Centre (SOC) from it s head office in Haydock. The SOC is manned around the clock
Title Service Desk as a Service Date January 2015 www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1 1. Disclaimer All information contained in this document is provided in confidence to the
inlife Managed Security Service (MSS) Introduction Keeping networks and data secure is an essential operational requirement for any organisation. The increase in complexity of networks and applications,
Monitoring Your IP Telephony Network A By Introduction The advantages of IP Telephony are well-known, among them network consolidation, centralized voice administration, longdistance toll savings and unified
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
Ensuring IP Telephony Performance Through Remote Monitoring A By Introduction The advantages of IP Telephony are well-known, among them network consolidation, centralized voice administration, longdistance
REDCENTRIC MANAGED SERVER SERVICE DEFINITION SD062 V1.4 Issue Date 01 July 2014 1) OVERVIEW The Managed Server service (MSS) provides access to Redcentric s 24x7 support capability, technical skills and
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between