NSW Government. End User Computing Standard. Version 1.0. October 2014

Size: px
Start display at page:

Download "NSW Government. End User Computing Standard. Version 1.0. October 2014"

Transcription

1 NSW Government End User Computing Standard Version 1.0 October 2014 ICT Services Office of Finance & Services Level 23, McKell Building 2-24 Rawson Place SYDNEY NSW 2000

2 CONTENTS 1. CONTEXT Background Purpose Scope and application Policy context The ICT Service Catalogue 4 2. KEY PRINCIPLES 4 3. STANDARD Use case / scenarios End User Computing Standard elements Configuration management Security management Service management DOCUMENT ISSUE 12 APPENDIX A Definitions 14 APPENDIX B References 15 APPENDIX C Background on standards 16 Developing standards 16 Management and implementation 16 2

3 1. CONTEXT 1.1 Background This End User Computing Standard is a technical standard developed through the NSW Government ICT Procurement and Technical Standards Working Group (PTS Working Group). The standard defines minimum government requirements for end user computing services. 1.2 Purpose The purpose of this standard is to provide technical guidance to NSW Government agencies when implementing end user computing internally and when they are procuring these services. It details the issues that need to be considered so each agency can identify the available options that best suit their business requirements, ensuring agencies can take full advantage of the benefits of end user computing services. 1.3 Scope and application For the purposes of this standard, end user computing describes all devices traditionally associated with computing use within government and industry including desktops, notebooks (including high-end tablet devices), and thin-client terminals. It can also include mobility devices, such as smartphones and consumer type tablet devices. The standard applies to end user computing solutions across NSW Government agencies. The standard does not exhaustively cover all agency specific considerations, and agencies may need to asses any specific requirements they have in addition to those detailed here. 1.4 Policy context The NSW Government ICT Strategy sets out the Government s plan to build capability across the NSW public sector to deliver better, more customer-focused services that are available anywhere, anytime, and derive better value from the Government s annual investment in ICT. Developing whole of NSW Government ICT technical standards is a key initiative of the NSW Government ICT Strategy, driven by the ICT Procurement and Technical Standards Working Group. These standards leverage principles defined in the NSW Government ICT Strategy and the NSW Government Cloud Policy and Guidelines, and they support the NSW ICT Service Catalogue. The standards set out service definitions as minimum requirements that vendors must meet to be able to offer their services through the NSW Service Catalogue. This helps achieve consistency across service offerings, emphasising a move to as a service sourcing strategies in line with the NSW Government ICT Strategy, and it signals government procurement priorities to industry. This standard should be applied along with existing standards, policies and guidance that make up the NSW Information Management Framework, as set out in the Information Management: A Common Approach, and including the NSW Digital Information Security Policy. NSW Government agencies must carefully consider their obligations to manage government data and information. Contract arrangements and business processes should address requirements for data security, privacy, access, storage, management, retention and disposal. ICT systems and services should support data exchange, portability and interoperability. More information on the development of standards for the ICT Service Catalogue is at Appendix C Background on standards. 3

4 1.5 The ICT Service Catalogue The ICT Service Catalogue provides suppliers with a showcase for their products and services, and an opportunity to outline how their offerings meet or exceed standard government requirements. The standards, together with supplier service offerings in the ICT Service Catalogue, help to reduce red tape and duplication of effort by allowing suppliers to submit service details once. The offerings are then available to all potential buyers, simplifying procurement processes for government agencies. 2. KEY PRINCIPLES The following principles guide the development and implementation of this standard. Facilitating as a service: Specification of end user computing environments should support agencies in moving to as a service sourcing models. Interoperability: Meeting this standard should help agencies achieve application and hardware interoperability, ensuring that agency computing environments enable appropriate information sharing across devices and applications. Mobile and flexible: The end user environment should support modern office work practices including flexible arrangements, activity based working and hot desking. Vendor / operating environment agnostic: Determining end user computing environments should be vendor and operating system agnostic. Devices such as laptops, notebooks, thin-clients should be able to connect to and access the network. The network must be fully compatible with widely used operating environments. 3. STANDARD 3.1 Use case / scenarios This section provides a more detailed description of the recommended business and technical requirements for NSW Government. It provides a consistent approach for all NSW Government agencies regardless of their size. 4

5 Tier 0 applications Tier 1 applications Tier 2 applications Tier 3 applications Tier 4 applications Disaster recovery Data replication Auditing & investigation Moves, additions & changes Performance & latency Remote management / Remote wipe Application packaging BYOD capability Backup & restore Device hygiene End User Computing Standard Use Case / Scenarios SILVER Requirements for Silver level service to support messaging, collaboration and unified communication solutions are listed in the table below. Configuration management Use Case / Scenarios Task Worker?? Knowledge (Office) Worker Knowledge (Mobile) Worker Field (Mobile) Worker 5

6 Onshore / offshore management Password protection/ User authentication Information classification and labelling Role-based security Self-service administration Full service administration Compliant data centre Government Data Centre Service level management Multi-service broker provision End User Computing Standard Security management Service management Use Case / Scenarios Task Worker Knowledge (Office) Worker Knowledge (Mobile) Worker Field (Mobile) Worker 6

7 Tier 0 applications Tier 1 applications Tier 2 applications Tier 3 applications Tier 4 applications Disaster recovery Data replication Auditing & investigation Moves, additions & changes Performance & latency Remote management / remote wipe Application packaging BYOD capability Backup & restore Device hygiene End User Computing Standard Use Case / Scenarios GOLD Requirements for Gold level service to support end user computing solutions are listed in the table below. Configuration management Use Case / Scenario Task Worker?? Knowledge (Office) Worker Knowledge (Mobile) Worker Field (Mobile) Worker 7

8 Onshore/offshore management Password protection / User authentication Information classification & labelling Role-based security Self-service administration Full service administration Any compliant data centre NSW Government Data Centre Service level management Multi-service broker provision End User Computing Standard Security management Service management Use Case / Scenario Task Worker Knowledge (Office) Worker Knowledge (Mobile) Worker Field (Mobile) Worker 8

9 3.2 End User Computing Standard elements Refer to Appendix A Definitions for guidance on service levels, worker types and defined terms in this document Configuration management Tier 0 applications Applications that are embedded in the operating system (either physical or virtual), examples are browser (other browsers may be included as Tier 1 applications) and operating system management tools. Tier 1 applications Applications that are used by all worker types and universally across all areas of government and industry. Examples include browsers (including browser plug-ins for commonly used solutions), hygiene products and office productivity suites including word processing, spreadsheets, and presentation tools. These are ordinarily supplier-provided applications. Tier 2 applications Commercial-Off-The-Shelf (COTS) applications that are used by many worker types but not universally across all areas of government and industry. Examples include project management applications and high-end graphics tools. These are ordinarily supplier-provided applications. Tier 3 applications COTS applications that are used by specialist worker types but not universally across all areas of government and industry. Examples include CAD (Computer Aided Design) applications, specialised engineering, human resources and financial tools. These are ordinarily agency-supplied applications. Tier 4 applications Specialised in-house developed applications and/or legacy applications used by certain business units for specific purposes, often developed to deliver specialised services. Used by many worker types but not universally. These are ordinarily agency-supplied applications. Disaster recovery The solution is to have appropriate levels of disaster recovery built in to minimise downtime or disruption to the service. This element could include anything from a duplicated solution that is available immediately if the primary site fails, to a fully documented process for restoring services within Service Level Agreement (SLA) defined times. Data replication Solution providers must not change any data replication parameters and/or locations without prior written consent from agencies concerned. All data storage locations must be known to agencies and changes agreed before they occur. If data is replicated to a location that has not been approved, the service may be terminated for breach. Auditing and investigation All elements of end user computing solution(s) must provide the agency(s), the Auditor General and/or any other statutory body with the authority to do so the ability to audit and/or conduct investigations of the agency environment within the solution. Moves, additions and changes For Silver level solution offerings, moves, additions and changes remain the responsibility of the commissioning agency. For Gold level solution offerings this is be the sole responsibility of the 9

10 solution provider, unless otherwise agreed and included in the Service Level Agreement (SLA) for the service. Performance and latency The solution will provide appropriate built-in redundancy to achieve agency required levels of service. Typically this may be not less than 99.99% availability during operating hours, and for most agencies this would be a minimum 7:00am-7:00pm Monday to Friday. Some agencies may have a requirement for 24 hours, 7 days per week (eg. Police and Emergency Services, Health, Transport). Bandwidth and latency expectations are to be defined and agreed up front. Remote management / Wipe All solutions must support the ability for remote management (and where appropriate remote wipe) capabilities of end-point devices. Application packaging As appropriate solutions need to provide the ability for non-standard applications (generally those belonging to Tier 3 and Tier 4, or similar) to be packaged for rapid and non-human invention remote deployment. The method will be defined upfront by the solution provider. BYOD capability Any end user computing solution needs to allow for the potential of agencies allowing staff (and/or other engaged human resources) to provide and use non-agency provided (but agency approved) devices that are capable of meeting minimum specifications as prevailing from time-to-time. Solution providers are expected to be able to include a full list (that is updated as appropriate) of all device types, operating systems and/or other requirements that meet minimum standards for the purposes of accessing the solution provided. Device hygiene All devices, including bring your own device (BYOD), must have appropriate and up-to-date hygiene solutions installed. Device hygiene includes, but is not limited to, anti-virus, anti-spam, anti-spyware. For agency and/or service provider issued devices, this will be provided by the agency service provider, for BYOD this must be provided by the device owner and will meet agreed minimum agency/service provider requirements. Backup and restore Services are capable of being backed up and restored of data and configuration settings. The owner of BYO devices are responsible for any backing up and restoring of configuration settings of their device. Agencies need to establish rules and/or guidelines for locations they consider acceptable for backing up agency data and agency-related configuration files. Agency data must only be backed up to approved locations Security management Devices must comply with minimum security standards as determined by agency security policies. They must also be compliant with agency Information Security Management Systems (ISMSs) and assist agencies in the implementation and maintenance of minimum controls under the NSW Government Digital Information Security Policy. Onshore/offshore management All solution providers must be able to articulate where their services will be provided from, including any remote support services. For example, if the provider has a follow the sun support model, the locations of each of their support sites around the globe need to be identified. Any changes to these need to be communicated to the customer agency promptly and if this causes issues, the agency has the right to cancel the service with appropriate notification. 10

11 Password protection / User authentication All implementations must support password authentication (numeric / alphanumeric or similar) End User Computing Setting Minimum password length Maximum password attempts Forbidden passwords Password History Security time-out Value 7 characters 4 attempts Popular: Eg. password, department Repetitive: Eg , Sequential: Eg , Not allowed to use previous x passwords x minutes Information classification and labelling If sensitive information is being stored or transferred using the devices then agencies must have regard to compliance with the NSW Government Classification and Labelling Guidelines. Devices need to be enabled to apply security classifications and dissemination limiting markers (DLMs) to sensitive content. End User Computing environments also need to implement control and handling requirements relevant to the level of sensitivity of the device content, as set out in the NSW Government Information Classification and Labelling Guidelines. Role-based security Solutions should offer the ability to have role based security elements either for all users or defined sub-sets. The ability to allow this should be clearly identified by any potential solution provider Service management All service management elements are assumed to be delivered to an ITIL (Information Technology Infrastructure Library) based service management methodology, unless otherwise specified either by an agency or the service provider. Self-service administration The ability to automatically provision and de-provision for all agency resources within the system, together with other appropriate administration and management tasks that can be delegated from the service provider that do not impinge on the solution being provided to other customers. Full-service administration All provisioning, de-provisioning, together with all other administration and management tasks required to operate the environment, are provided as part of the service offering. The only exception will be service management of the provider which remains the sole responsibility of the initiating agency. Any compliant data centre 11

12 All relevant services for the solution to be provisioned from a compliant data centre. A compliant data centre is defined as having the following attributes and/or capabilities: The location of the data centre must be identified either by name and/or location (city and country) in any response The data centre location cannot be changed without first informing the agency(s) concerned The facility must comply with minimum Tier III The facility must be certified against the following international standards: o ISO9001 o ISO27001 o ISO2000 o ISO14001 and other relevant certification including but not limited to: o PCI-DSS o ASD o ASIO-T4 o Uptime Institute o CSA. If the data centre facilities changes to a location that is deemed unacceptable either to NSW Government or to the agency and/or loses attributes and/or capabilities identified above, the agency may need to examine termination of services. NSW Government Data Centre All relevant services for the solution to be provisioned from one or both NSW Government Data Centre (GovDC). Depending on the service offering and agency requirements, it may be possible to burst some elements of services to other location(s) subject to agreement with the commissioning agency. Burst data centres must be deemed Compliant. If the burst data centre facilities change to a location that is deemed unacceptable either to NSW Government or to the agency, the agency may need to re-examine the burst service or the full service. Service level management Agencies will retain ultimate responsibility for service level management in any solutions engagement, which would ordinarily be covered by a SLA. Agencies, service-brokers and solution providers need to agree all SLA reporting and other related activities as part of any transition-in process. Multi-service broker provision Any solution provider must work within the confines of a multi-service provider environment where either the agency or nominated provider will perform broker service provision. This will be defined as one provider being made accountable for the provision of all associated services, whether these are provided by the provider itself, or other third-party providers. 4. DOCUMENT ISSUE This document is issued by the Office of Finance and Services. For more information call (02) or standards@finance.nsw.gov.au 12

13 This standard will be reviewed in twelve months or earlier in response to post-implementation feedback from agencies. 13

14 APPENDIX A Definitions Service support levels Bronze Service Not defined at this time. Silver Service All End User Computing administration, management and/or related support services that can be delegated from the solution provider to the agency s internal ICT teams are delegated and these services are not provided by the solution provider. Gold Service All End User Computing administration, management and/or related support services are optionally provided by the solution provider in addition to appropriate services being managed by the agency (as allowed by the solution s construct). Platinum Service Not defined at this time. Use Case / Scenario descriptions Use Case / Scenario Task Worker Knowledge (Office) Worker Knowledge (Mobile) Worker Field (Mobile) Worker Description Fixed location based worker. Performs a limited set of tasks. Refer to Worker Type Details in NSW Government Worker Type description. Primarily fixed location based worker (however some mobility may be required). Performs a variety of high intensity tasks using information from various sources. Refer to Worker Type Details in NSW Government Worker Type description. Various locations, often at short notice and always connected. Performs a variety of high-intensity tasks, using information from various sources. Refer to Worker Type Details in NSW Government Worker Type description. Mostly in the field, rarely in the office and always connected. Performs a variety of tasks. Refer to Worker Type Details in NSW Government Worker Type description. Other definitions Desktop A computer that is designed to stay in one place, and typically not powered by an internal battery. End User Computing Describes all uses of computers, and in the context of this standard, covers all devices traditionally associated with computing use, that is Desktop, Notebook (including high-end Tablet devices), Thin-Client terminals and devices. It can also include Smartphones and Tablet devices. Notebook A lightweight personal computer, and in the context of this standard, this also includes variations, such as laptop computers. Smartphone A mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, internet access, and an operating system capable of running downloaded applications. Thin-Client A client machine that relies on the server to perform data processing. Either a dedicated thin client terminal or a regular PC with thin client software is used to send keyboard and mouse input to the server and receive screen output in return. Tablet A small computer which is ordinarily used through touching the screen rather than via a keyboard. 14

15 APPENDIX B References Agencies should have regard to the following statutes, NSW Government policies and standards: AS/NZS ISO Risk management Principles and guidelines Electronic Transactions Act 2000 Government Information (Information Commissioner) Act 2009 Government Information (Public Access) Act 2009 Health Records and Information Privacy Act 2002 M Digital Information Security Policy NSW Government Open Data Policy NSW Government Cloud Services Policy and Guidelines NSW Government ICT Strategy NSW Government ICT Technical Standards Mobility Standard TPP Internal Audit and Risk Management Policy for the NSW Public Sector NSW Government Digital Information Security Policy NSW Government Information Classification and Labelling Guidelines Privacy and Personal Information Protection Act 1998 Public Finance and Audit Act 1983 Public Interest Disclosures Act 1994 NSW Procurement: Small and Medium Enterprises Policy Framework State Records Act 1998 Copyright Act 1968 Copyright Amendment Act

16 APPENDIX C Background on standards Developing standards Development of a standard begins with identifying the need for a new standard, which is followed by the development of the standard in consultation with the industry and experts groups, including the Australian Information Industry Association (AIIA). The following diagram outlines the process. Need for new or amended standard identified Business requirements change Standard developed (Industry/agencies consulted) Services added to Catalogue Standard approved and released by PTS Working Group Market engagement for services which meet the standard The ICT Procurement and Technical Standards Working Group (PTS Working Group) is chaired by the Office of Finance and Services and includes senior representation from across NSW Government. Agencies engage with the PTS Working Group concerning services for inclusion in the ICT Service Catalogue. This drives the development of technical standards, where none exist. The PTS Working Group has the leading role in reviewing and endorsing the technical standards developed in response to agencies requirements. The PTS Working Group is supported by two sub-groups responsible for the areas of Telecommunications and Services and Solutions. The sub-groups are responsible for initial development and review of standards relating to their areas of responsibility Management and implementation There is scope to modify standards through the NSW Government ICT governance arrangements as necessary. Standards are designed to add value, augment and be complementary to, other guidance, and they are continually improved and updated. This standard does not affect or override the responsibilities of an agency or any employee regarding the management and disposal of information, data, and assets. Standards in ICT procurement must also address business requirements for service delivery. NSW Procurement facilitates the implementation of the standards by applying them to the goods and services made available through the ICT Service Catalogue. 16

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015 NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au

More information

NSW Government. Messaging, Collaboration and Unified Communications Standard. Version 1.0. October 2014

NSW Government. Messaging, Collaboration and Unified Communications Standard. Version 1.0. October 2014 NSW Government Messaging, Collaboration and Unified Communications Standard Version 1.0 October 2014 standards@finance.nsw.gov.au ICT Services Office of Finance & Services Level 23, McKell Building 2-24

More information

NSW Government. Document Management Solutions Standard. v1.0. June 2015

NSW Government. Document Management Solutions Standard. v1.0. June 2015 NSW Government Document Management Solutions Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au CONTENTS 1.

More information

NSW Government. Federated & Remote Authentication Identity Management Standard

NSW Government. Federated & Remote Authentication Identity Management Standard NSW Government Federated & Remote Authentication Identity Management Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au

More information

NSW Government. Wireless services (WiFi) Standard

NSW Government. Wireless services (WiFi) Standard NSW Government Wireless services (WiFi) Standard May 2014 CONTENTS 1. CONTEXT 2 1.1. Background 2 1.2. Purpose 2 1.3. Scope and application 2 2. STANDARDS GOVERNANCE 2 2.1. Standards to support the ICT

More information

NSW Government. Telecommunications: SIP (Session Initiation Protocol) Standard

NSW Government. Telecommunications: SIP (Session Initiation Protocol) Standard NSW Government Telecommunications: SIP (Session Initiation Protocol) Standard October 2014 CONTENTS 1. Context 3 2. Required NSW Government business outcomes 3 3. Additional business outcomes for agency

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT

More information

NSW Government. Mobile Device & Application Framework. Version 1.0

NSW Government. Mobile Device & Application Framework. Version 1.0 NSW Government Mobile Device & Application Framework Version 1.0 standards@finance.nsw.gov.au ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 CONTENTS 1. CONTEXT

More information

NSW Government. Mobility Solutions Framework. Version 1.0

NSW Government. Mobility Solutions Framework. Version 1.0 NSW Government Mobility Solutions Framework Version 1.0 NSW Government ICT Technical Standards Mobility Solutions Framework CONTENTS 1. CONTEXT 3 1.1. Background 3 1.2. Purpose 3 1.3. Scope and Application

More information

Hosted Virtual Desktops (VDI)

Hosted Virtual Desktops (VDI) Hosted Virtual Desktops (VDI) Secure and cost-effective delivery of Windows desktops and applications as a cloud service, to any device, anywhere, with predictable costs Hosted by Powered by Features Hosted

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

All your apps & data in the cloud, all in one place.

All your apps & data in the cloud, all in one place. The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access

More information

SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres.

SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. SafeMail April 2015 Secure cloud solutions with guaranteed UK data sovereignty. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. Detailing the

More information

Cloud Panel Draft Statement of Requirement

Cloud Panel Draft Statement of Requirement Cloud Panel Draft Statement of Requirement August 2014 Statement of Requirement This draft Statement of Requirement (SOR) has been created to provide Commonwealth Agencies, industry members and interested

More information

Big Data Analytics Service Definition G-Cloud 7

Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated

More information

Get what s right for your business. Contact @lliance Technologies.

Get what s right for your business. Contact @lliance Technologies. Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

Hosted Desktop for Business

Hosted Desktop for Business Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

NSW Government. Cloud Services Policy and Guidelines

NSW Government. Cloud Services Policy and Guidelines NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

Oxford City Council ICT Strategy 2015 2018

Oxford City Council ICT Strategy 2015 2018 Oxford City Council ICT Strategy 2015 2018 1 Contents 2 Overview... 2 3 OCC Business Drivers... 2 4 ICT Principles... 3 4.1 Business Requirements... 3 4.2 Information Management... 3 4.3 Applications...

More information

Move your business into the Cloud with one single, easy step.

Move your business into the Cloud with one single, easy step. The Cloud Desktop For Business Unify Your Business IT Experience Move your business into the Cloud with one single, easy step. Secure all your apps & data in one place. What is OS33 Cloud Desktop for Business?

More information

APRIL 2013. 8 Must-Have Features for Endpoint Backup

APRIL 2013. 8 Must-Have Features for Endpoint Backup APRIL 2013 8 Must-Have Features for Endpoint Backup Ensure corporate data is secure and protected by choosing an endpoint backup solution with the eight features below. 1. Advanced deduplication Because

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption Putting cloud storage

More information

An Agile and Scalable Mobile Workplace

An Agile and Scalable Mobile Workplace Innovapptive Technology Thought Leadership - Executive Report An Agile and Scalable Mobile Workplace Innovapptive SAP Mobile Hosting Solutions Brief Innovapptive s SAP Mobile Hosting Solutions for SAP

More information

USING GENIE REMOTELY

USING GENIE REMOTELY USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.

More information

Dedicated Hosted Exchange 2013

Dedicated Hosted Exchange 2013 About inty Dedicated Exchange Server 2013 The inty Dedicated Exchange 2013 Solution is a fully managed implementation with the following features: High-availability and built to Microsoft s reference architecture

More information

Service Specification. ICT Support 2014/2015

Service Specification. ICT Support 2014/2015 Service Specification ICT Support 2014/2015 1 Contents: ICT Service Specification... 3 Contract Options... 3 Additional Consultancy Days... 5 ICT Projects... 5 Service Desk Service... 7 Service Desk Priority

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

OpenStack Private Cloud Hosting in an Tier 3 Data Centre. G-Cloud Lot 1 IaaS

OpenStack Private Cloud Hosting in an Tier 3 Data Centre. G-Cloud Lot 1 IaaS OpenStack Private Cloud Hosting in an Tier 3 Data Centre This is service provides a dedicated private cloud environment built on the open source technology, OpenStack. This is service provides a dedicated

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

White Paper. Make the Upgrade: From Backup Vendor to Data Protection Platform. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.

White Paper. Make the Upgrade: From Backup Vendor to Data Protection Platform. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale. White Paper Make the Upgrade: From Backup Vendor to Data Protection Platform nfrascaletm nfrascaletm Business owners and IT managers are ready to explore data protection in the cloud. For an MSP today,

More information

Bruce Allison. Steve Moran

Bruce Allison. Steve Moran Bruce Allison Steve Moran ASK A QUESTION POST A COMMENT SUBMIT TECHNICAL QUERIES SHARE YOUR TIPS PROVIDE FEEDBACK DIAL IN AND LISTEN VIA YOUR TELEPHONE! 1800 896 323 81178679# Virtual Desktops A simple,

More information

NSW Government. Cloud Services Policy and Guidelines

NSW Government. Cloud Services Policy and Guidelines NSW Government Cloud Services Policy and Guidelines August 2013 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4 2.1

More information

Itron Cloud Services Offering

Itron Cloud Services Offering Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...

More information

Course 20341A MCSA: 70-341 Core Solutions of Microsoft Exchange Server 2013 5 Days

Course 20341A MCSA: 70-341 Core Solutions of Microsoft Exchange Server 2013 5 Days MCSE: Messaging Description Exchange 2013 is part of the new version of Office, making it easy for people to stay connected, access files anytime, and maintain messaging security. Get certified as an MCSE

More information

1.877.896.3611 www.infrascale.com

1.877.896.3611 www.infrascale.com White Paper Making the Upgrade: From Backup Vendor to Data Protection Platform nfrascaletm Simplify Your Business and Offer Customers Complete Data Protection Your customers are ready to explore data protection

More information

Risk profile table for deployment of releases to the main web site. High Acceptable Unacceptable Unacceptable

Risk profile table for deployment of releases to the main web site. High Acceptable Unacceptable Unacceptable ITIL V3 Intermediate Capability Stream: RELEASE, CONTROL AND VALIDATION (RC&V) CERTIFICATE SCENARIO BOOKLET Scenario One A global company develops their own applications to support the business. The Service

More information

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops January 2015 Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops Executive Summary Physical desktop and notebook computer infrastructures no longer make sense for the corporate

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase 24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk Onsite Support itg CloudBase Pro-Active managed it support services for one single cost per month covers all aspects of

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

<cloud> Secure Hosting Services

<cloud> Secure Hosting Services Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations

More information

Amazon Relational Database Service (RDS)

Amazon Relational Database Service (RDS) Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Cloud computing an insight

Cloud computing an insight Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Enterprise Architecture Review Checklist

Enterprise Architecture Review Checklist Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Protecting Content and Securing the Organization Through Smarter Endpoint Choices Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops

More information

A Guide to Choosing the Right Data Backup Solution for your School. March 2015.

A Guide to Choosing the Right Data Backup Solution for your School. March 2015. A Guide to Choosing the Right Data Backup Solution for your School. March 2015. Contents Introduction.... 3 Why introduce a remote data backup solution?... 4 What is the difference between onsite & offsite

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

Dedicated IT Support. BEFORE You Need It. Save Time, Money and Headache.

Dedicated IT Support. BEFORE You Need It. Save Time, Money and Headache. Dedicated IT Support BEFORE You Need It Save Time, Money and Headache. Worry-Free Computing with edgecare Managed Services What is edgecare? edgecare is our comprehensive service that provides pro-active

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

FTP-Stream Data Sheet

FTP-Stream Data Sheet FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Cloud Computing Policy 1.0 INTRODUCTION 2.0 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Policy 1.0 INTRODUCTION 2.0 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Policy Effective Date: July 28, 2015 1.0 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

SFW CRM for Stakeholders - MS Dynamics CRM

SFW CRM for Stakeholders - MS Dynamics CRM SFW CRM for Stakeholders MS Dynamics CRM Service Definition SFW Reference: Version: 5.0 Date 03/04/14 SFW Limited Southern House Station Approach Woking GU22 7UY www.sfwltd.co.uk Page 1 of 13 1 Service

More information

Getting Familiar with Cloud Terminology. Cloud Dictionary

Getting Familiar with Cloud Terminology. Cloud Dictionary Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

More information

( and how to fix them )

( and how to fix them ) THE 5 BIGGEST MISTAKES LAWYERS MAKE WHEN CHOOSING A CLOUD SERVICE PROVIDER ( and how to fix them ) In recent years, an increasingly large number of law firms have moved their software and data to the cloud.

More information

Marval Software Limited. G Cloud iii Framework Service Definition

Marval Software Limited. G Cloud iii Framework Service Definition 1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)

More information

Managed IT Services. Maintain, manage and report

Managed IT Services. Maintain, manage and report Managed IT Services Maintain, manage and report 1 2 Comunet was established in 1995 to provide professional Information Technology services to Australian businesses and organisations. Its vision now, as

More information

Data Storage That Looks at Business the Way You Do. Up. cloud

Data Storage That Looks at Business the Way You Do. Up. cloud Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2. Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants...

Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2. Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants... Contents Workstation Refresh & Virtual Desktop Infrastructure Program Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2 Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student

More information

s Software as a Service (SaaS) offering: T-Suite Making your hard costs soft

s Software as a Service (SaaS) offering: T-Suite Making your hard costs soft s Software as a Service (SaaS) offering: T-Suite Making your hard costs soft T-Suite and Telstra T-Suite means you can: Rapidly deploy business applications when and where you need them Reduce capital

More information

1.1 SERVICE DESCRIPTION

1.1 SERVICE DESCRIPTION ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides

More information

CTERA Cloud Storage Platform Architecture

CTERA Cloud Storage Platform Architecture CTERA Cloud Storage Platform Architecture Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption The killer apps of cloud storage reviewed Putting cloud storage

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

Policy Outsourcing and Cloud Based File Sharing

Policy Outsourcing and Cloud Based File Sharing Policy Outsourcing and Cloud Based File Sharing Version 3.1 TABLE OF CONTENTS Outsourcing Policy... 2 Outsourcing Management Standard... 2 Overview... 2 Standard... 2 Outsourcing Policy... 3 Policy Statement...

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Capita Virtual Workplace Agility & reliability for your future workplace Balancing freedom & control Virtual working is essential and you know the virtual workplace is possible.

More information

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA Efficiently Protect, Manage and Access Big Data Nigel Tozer Business Development Director EMEA WHAT WE DO We are relentlessly focused on giving companies better, more cost-effective ways to protect, manage,

More information

A 123Together.com White Paper. Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company.

A 123Together.com White Paper. Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company. Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company. Table of Contents Introduc on... 3 Microso Exchange Server Delivers Value Your Company

More information

Cloud-Based Project Information Management from Aconex: A Guide for IT Professionals

Cloud-Based Project Information Management from Aconex: A Guide for IT Professionals Cloud-Based Project Information Management from Aconex: A Guide for IT Professionals Adopting an Aconex SaaS Solution It s the job of CIOs and IT managers to ensure that their organizations adopt secure

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist

More information

The EVault Portfolio

The EVault Portfolio The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise

More information

IT Services. We re the IT in OrganIsaTion. Large Organisations

IT Services. We re the IT in OrganIsaTion. Large Organisations IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored

More information

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Achieving HIPAA Compliance with Red Hat

Achieving HIPAA Compliance with Red Hat Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have

More information

Enterprise Governance and Planning

Enterprise Governance and Planning GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,

More information