Modern Pharmacy IT. R x IT as a service. Kodiak service summary. Service features. Hosted Framework. Hosted DocuTrack

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Modern Pharmacy IT. R x IT as a service. Kodiak service summary. Service features. Hosted Framework. Hosted DocuTrack"

Transcription

1 Modern Pharmacy IT R x IT as a service Modern specialty pharmacies face a wide and deepening range of IT challenges. Unlike skilled nursing facilities (SNF), with protected health information (PHI) access and transfer that are generally quite contained, specialty pharmacies deal in a very active PHI environment. Further, with medication management adding such a delicate layer of complexity, the IT needs of specialty pharmacies go far beyond just making Framework software work. Pharmacy IT needs a degree of expertise and 24/7/365 attention that can t be found from typical cloud providers. Singularly, the various parts of pharmacy IT are not overly complex, but when they work collectively in their precise ecosystem, the overall integrated IT needs become highly strained. This is especially true with growing IT systems. Through 16 years of customized healthcare hosting, we at Kodiak clearly see that pharmacy IT has unique and delicate challenges that can only be met by a very high level of specialized service. Kodiak service summary Kodiak Systems has been providing fully hosted, managed application, and IT services since Although Kodiak technical capabilities are not industry specific, 90 percent of the user base is in healthcare. A certified Microsoft Partner, Kodiak also works very closely with a wide variety of non-microsoft healthcare and business software vendors. Service features Each user accesses his or her applications and data through a uniquely profiled virtual desktop. The user can access this Hosted Framework Dedicated Microsoft SQL Enterprise Database Instance, replicated to standby server in secondary datacenter TEST Microsoft SQL Database instance Dedicated virtual Interface Server, replicated to standby environment in secondary datacenter. TEST virtual Interface Server Access to/from the Internet as needed, and up to 10 site to site VPNs Access via Hosted Desktop 2TB Disk storage Microsoft SQL Enterprise Licensing Application patching/upgrading Hosted DocuTrack Dedicated Microsoft SQL Database Instance, replicated to standby server in secondary data enter Dedicated virtual Application Server, replicated to standby environment in secondary datacenter. Dedicated virtual Application Server - FaxCore, replicated to standby environment in secondary datacenter. Access via Hosted Desktop 1.5TB Disk storage Microsoft SQL Enterprise Licensing Application patching/upgrading

2 secure profile through almost any device with an Internet connection. Local hardware needs are minimized, and most customers choose to deploy thin clients instead of desktop PCs. With all software and data residing within Kodiak-owned hardware in carrier-class datacenters, Kodiak is in an ideal position to provide hardware and system redundancies, thorough backup processes, security, and live help-desk services to its customers. As a one-throat-to-choke IT production foundation with a deep commitment to risk management, Kodiak can empower IT departments that are focused on the system optimization they need for overall business growth. Enabling customer expansion is a key element of the Kodiak hosting service. Customers are able to grow both internally and through acquisition in a way that is both cost-effective and operationally painless. Hosting service philosophy Throughout our 16 years of hosting, technology has gone through and will continue to go through considerable changes. Our success, both past and future, is tied to the fundamental principle that risk management lies at the core of every action we take. We divide IT into three separate, yet crucially interwoven businesses within IT: Production Risk management Optimization Risk management Like other cloud providers, we initially began as a technically focused IT services company. Although the typical hosting company still defines itself as such, our experience has taught us not to define ourselves in this way. Through 16 years of hosting, we ve seen a great paradigm shift. The technical capacities of hosting have steadily developed and grown, but the tech advances have now become eclipsed by their related risks. We feel that without a diligent risk-management focus, the production side of IT becomes moot. Every technical move we make is made with regard for risk management, and as a result, we are now better defined as a risk management company that provides IT hosting services.

3 Risk management partnership It s very important to note that as comprehensive as we are with risk management, your company must always be involved with its proper adherence. IT production, IT optimization, and business efficiency have a deeply interwoven relationship. Great efficiency does not occur without optimization, and optimization cannot happen without quality production. Simply put, we take responsibility for production, we share the responsibility for risk management, and as the user, you take responsibility for the optimization of your line-of-business software. However, it must be understood that given the current evolution of cyber liability, risk management is a partnership, and as your cloud provider we thoroughly share your commitment to its governance and execution. Dedicated security and compliance personnel In 2014, Kodiak created a new managerial position, that of Director of Security and Compliance. The DoSC is responsible for creating and ensuring the adherence to policies and procedures that promote HIPAA eligibility and overall secure practices. Security and compliance is the sole focus of this role. Working closely with our teams of IT technicians, our DoSC has implemented a comprehensive defense strategy. This strategy includes measures such as creating layers of security controls that must be penetrated in order to access data and systems. These controls are assessed at least yearly by either our security professional or external resources. Infrastructure Kodiak facilities include its corporate offices located in Piscataway, New Jersey, and a smaller satellite office in Brick, New Jersey. These offices are for business operations only. All server housing or processing of client data, applications, or any services that Kodiak offers are located in carrierclass, SOC Certified third-party datacenters located in Norristown, Pennsylvania, Somerset, and Carteret, New Jersey. Kodiak operations are managed by its senior management team with direct oversight from the president. Kodiak follows a strict separation-of-duties structure and is organized into the following functional groups: Systems administration Network administration Service desk Performs day-to-day operations, monitoring, and support of Kodiak systems; responds to client inquiries and issues; performs security administration; and develops and designs client solutions. Performs day-to-day operations, monitoring, and support of Kodiak network devices; maintains and monitors network communications; responds to client inquiries and issues. Provides services support to clients through support calls or ticket requests and resolves inquiries, issues, and requests by

4 Client care Process design and development Risk management and compliance interfacing with other service-desk team members, systems and network team members, and vendors. Responsibilities include managing projects by coordinating client and Kodiak activities, responding to client inquiries, and facilitating the delivery of service. Supports internal and client needs and requirements through full-cycle project management, workflow development, and evaluation and implementation of software packages. Assesses the system to identify areas requiring controls and implements and monitors controls to maintain security and compliance. Automated IT operations and governance An important focus of Kodiak is to put the customer s operational control securely into the hands of its own internal leadership. The primary tool for this is a proprietary application we ve developed called KAdmin. At its core, KAdmin is a website that provides controlled, audited access to Active Directory. Through KAdmin, you can make group changes, overall and specific permissions changes, account creations and deletions, account modifications, password management, and manage a myriad of details related to administrative control. The system is simple and intuitive, and your approval and auditing processes are built in. Policies and procedures Kodiak has developed and maintained policies and procedures that support the operations and control over the system. These policies and procedures comply with HIPAA eligibility guidelines and are intended to protect the confidentiality, integrity, and availability of data stored or processed on its systems. These include: Kodiak Systems Risk Analysis - Risk Management Policy Kodiak Systems Information Systems Activity Review and Audit Policy Kodiak Systems Sanctions Policy Kodiak Systems Assigned Security Policy Kodiak Systems Workforce Security - Information Access Policy Kodiak Systems Security Awareness and Training Policy Kodiak Systems Password Management Policy Kodiak Systems Incident Response Plan Kodiak Systems Business Continuity Plan Kodiak Systems Disaster Recovery Plan Kodiak Systems Data Backup Plan Kodiak Systems Evaluation Policy Kodiak Systems Facility Access Control Policy Kodiak Systems Facility Access Control Procedures Kodiak Systems Workstation Use and Security Policy Kodiak Systems Device and Media Controls Policy Kodiak Systems Access Control Policy Kodiak Systems Data Integrity Policy Kodiak Systems Data Transmission Security Policy Kodiak Systems Information Security Policy Kodiak Systems Change Management Policy Kodiak Systems Facility Security Policy

5 General information system controls Kodiak chooses its third-party datacenters specifically to meet critical business requirements and has developed controls that provide reasonable assurance that physical access to computer equipment and storage media are restricted to Kodiak authorized personnel only. Kodiak has also received reasonable assurance from its third-party datacenters that they have developed controls to protect our client critical systems and are protected from environmental threats and power interruptions. These controls include: Physical security/access control procedures High availability Incident management and problem resolution Business continuity Environmental controls Documented policies and procedures All datacenters have 24/7 security staff. Entranceways are protected with live guards, smartcard readers, and at least two-factor authentication, including biometrics, visual confirmation, and mantraps to protect against piggybacking attempts. Datacenters maintain access lists, and only authorized Kodiak employees are allowed access. Physical security Kodiak servers are located in its own cages within the datacenters and stored in racks. Racks are kept locked and servers auto-logout after a predetermined period of time. Only Kodiak authorized personnel have access to the cages and racks. Video cameras cover the server room floors, other internal built-up areas, and external areas. Cameras are monitored by security staff and videos are archived for at least 90 days. We respond 24/7 to loss of connectivity after we are alerted by our monitoring systems. We manage the trouble ticket and troubleshooting process with the ISP and work with the onsite staff for hands and eyes work. Network and connectivity We manage the onsite network equipment. We can configure and maintain the onsite routers with multiple ISPs for redundancy, manage the wireless networks in the building including authentication with our RADIUS environment, and work with any devices connected to the network. We fully support the LAN down to the devices. Site-to-site VPN for all print traffic communications are encrypted in support of HIPAA guidelines for ephi traversing the Internet All help-desk personnel are qualified and trained Kodiak employees with the ability to shadow your users to provide a level of support promoting far greater productivity. No aspect of our help desk is outsourced. Support is available 24/7, 365 days a year. Help desk and support Proprietary ticketing system available via phone, web, or . Conventional IT support is based on the reactive response of the support group to fix problems. We base the Kodiak service model on our proactive ability to eliminate problems before they occur. As a Kodiak client, your software resides on high-end infrastructure with a team of experienced, well-trained personnel providing you with superior levels of uptime and performance.

6 R x ITaaS service highlights Hosted Framework Dedicated Microsoft SQL Enterprise Database Instance, replicated to standby server in secondary datacenter TEST Microsoft SQL Database instance Dedicated virtual Interface Server, replicated to standby environment in secondary datacenter. TEST virtual Interface Server Access to/from the Internet as needed, and up to 10 site-to-site VPNs Access via Hosted Desktop 2TB Disk storage Microsoft SQL Enterprise Licensing Application patching/upgrading Hosted DocuTrack Dedicated Microsoft SQL Database Instance, replicated to standby server in secondary datacenter Dedicated virtual Application Server, replicated to standby environment in secondary datacenter. Dedicated virtual Application Server, FaxCore, replicated to standby environment in secondary datacenter. Access via Hosted Desktop 1.5TB Disk storage Microsoft SQL Enterprise Licensing Application patching/upgrading Datacenter resources and services Your applications are hosted in a carrier class, tier-3 datacenter that includes advanced offerings of: 24/7/365 physical security Continuous video surveillance Physical infrastructure Power redundancy Connectivity redundancy Seamless scalability System Hardware at Kodiak For both production and related redundancy: Application hardware Database hardware Network hardware Storage hardware Hardware vendor management Hardware service contracts Hardware upgrade, rotation, and disposal Hosted Windows Desktop Deployment User creation Management Provisioning Inventory management Licensing management Secure remote access Microsoft application hosting Fully hosted Microsoft Office Microsoft Office updates and patching Premier-level Microsoft support Microsoft Software Assurance program Microsoft Cloud Service Provider program Line-of-business and operational software hosting Web enabling of client-server applications All server side hardware Technical administration Maintenance Updating and patching

7 Application troubleshooting hosting Hosted Microsoft Outlook and Exchange Healthcare dictated encryption services DLP services Tape backups Restore capabilities Creation and customization of active synch policies Network services Management of customer site router Management of customer site wireless network if installed 24/7 monitoring of customer site connectivity and response to connectivity issues Full-cycle ISP trouble-ticket management Site connectivity performance/reliability troubleshooting/recommendations Phone troubleshooting for LAN issues VPN creation and management Data services Data protection and security processes Electronic data backup Off-site tape backup (including integrity management) Restoration services HIPAA/HITECH business associate compliance Full-time, in-house compliance officer Ensure appropriate safeguarding of your protected health information Will only disclose protected healthcare information as required Help desk 24/7/365 help desk (staffed with internal US-based Kodiak technicians) o User-shadowing capabilities o Proprietary ticketing system available via: Phone Web Automated administration KAdmin administration system Provides managerial control to: o Create users o Disable users o Reset passwords o Assign efax numbers o Manage groups, applications, and group membership (including rules-based and approval-based) Microsoft compliance No dormant licensing charges only pay for what you use Server licensing O/S licensing Microsoft Office licensing Outlook and Exchange licensing Energy savings Elimination of server power costs Elimination of server room cooling costs Thin client stations generally cost $16 a month less to operate than PC stations Seamless scaling capabilities Facility zero processor environment enables a far more rapid site deployment than conventional hybrid hosting Automated secure user creation and deletion Automated permission assigning

8 Kodiak Systems and Microsoft Kodiak Systems is a certified Silver Microsoft Partner. Our modern healthcare IT solutions are built on the Microsoft Cloud. We offer remote hosting, hosted desktop, business continuity, hosted Microsoft Office and Microsoft Exchange, and Microsoft Office 365.

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Powering the Cloud Desktop: OS33 Data Centers

Powering the Cloud Desktop: OS33 Data Centers OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

IT Services Qualifying & COP Form Training. April 2011

IT Services Qualifying & COP Form Training. April 2011 IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

WHO ARE WE AND WHAT WE DO?

WHO ARE WE AND WHAT WE DO? 1 WHO ARE WE AND WHAT WE DO? itgroup was founded in 2010 through integration of company Net Service s 2003, modern IT management platforms and new business concept. We passed a long way and become leading

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Perceptive Software Platform Services

Perceptive Software Platform Services Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

SaaS or On-Premise Monitoring: 9 Reasons SaaS Makes More Sense

SaaS or On-Premise Monitoring: 9 Reasons SaaS Makes More Sense SaaS or On-Premise Monitoring: 9 Reasons SaaS Makes More Sense You know that cloud-based services provide advantages, including: Low upfront costs Fast deployment Simplified administration We know that

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

UCS Level 2 Report Issued to

UCS Level 2 Report Issued to UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification

More information

Proactive. Professional. IT Support and Remote Network Monitoring.

Proactive. Professional. IT Support and Remote Network Monitoring. Proactive. Professional. IT Support and Remote Network Monitoring. Watching Your Greatest Asset with the Latest Technology. Focus on your Business. We ll focus on your IT. Recent business trends coupled

More information

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 Report on FORTRUST s Enterprise Data Center and Colocation Services System Relevant to Security and Availability For the Period October

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Private Cloud. One solution managed by Applied

Private Cloud. One solution managed by Applied Private Cloud : : C L O U D S E R V I C E S : : One solution managed by Applied THE CLOUD IS NO LONGER AN IT CONSIDERATION ALONE IT IS FUNDAMENTALLY CHANGING THE WAY EXECUTIVES ACROSS DEPARTMENTS VIEW

More information

White Paper. Software as a Service by Yardi. Secure, seamless hosting and support

White Paper. Software as a Service by Yardi. Secure, seamless hosting and support White Paper Software as a Service by Yardi Secure, seamless hosting and support Yardi, the Yardi logo, and the names of Yardi products and services are either registered trademarks or trademarks of Yardi

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

SMALL BUSINESS OUTSOURCING

SMALL BUSINESS OUTSOURCING SMALL BUSINESS OUTSOURCING PCs on Lease 24X7 Remote Supports Professional Fees Service Level Agreement SMALL BUSINESS OUTSOURCING (SMO) CONNECTING YOUR BUSINESS TO THE TECHNOLOGY RESOURCES YOU NEED Implement

More information

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS

More information

System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012

System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 Moss Adams LLP 9665 Granite Ridge Drive, Suite 600 San Diego, CA 92123

More information

Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org

Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org IMPORTANT NOTICE All proposal question and inquiries must be sent by email to

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

North Street Global, LLC. Business Continuity Plan

North Street Global, LLC. Business Continuity Plan Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

A Guide to Choosing the Right Data Backup Solution for your School. March 2015.

A Guide to Choosing the Right Data Backup Solution for your School. March 2015. A Guide to Choosing the Right Data Backup Solution for your School. March 2015. Contents Introduction.... 3 Why introduce a remote data backup solution?... 4 What is the difference between onsite & offsite

More information

Troubleshooting and Supporting Windows 7 in the Enterprise

Troubleshooting and Supporting Windows 7 in the Enterprise Troubleshooting and Supporting Windows 7 in the Enterprise Course 6293; 3 Days, Instructor-led Course Description This three-day instructor-led course will teach IT Professionals, experienced with Microsoft

More information

Security from a customer s perspective. Halogen s approach to security

Security from a customer s perspective. Halogen s approach to security September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005

HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

UNITAS GLOBAL- HOSTED EXCHANGE PROPOSAL

UNITAS GLOBAL- HOSTED EXCHANGE PROPOSAL UNITAS GLOBAL- HOSTED EXCHANGE PROPOSAL PREPARED ON JANUARY 16, 2015 PROPOSAL CONTACT INFORMATION SALES CONTACT Aaron Webb Director of Business Development aaron.webb@unitasglobal.com SOLUTIONS ARCHITECT

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

White paper. SAS Solutions OnDemand Hosting Overview

White paper. SAS Solutions OnDemand Hosting Overview White paper SAS Solutions OnDemand Hosting Overview Contents Overview...1 Cary 1 Facility Specifications...2 Cary 2 Facility Specifications (SAS New Cloud Computing Center)...3 Charlotte 1 Facility Specifications...4

More information

Complete Managed Services. Proposal for managed services for the City of Tontitown

Complete Managed Services. Proposal for managed services for the City of Tontitown Complete Managed Services Proposal for managed services for the City of Tontitown Complete Managed Services Components Windows Server 2008, Windows Server 2012 1. Proactive Maintenance of Server(s) Proactive

More information

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator

MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator Job Number: 07229P Date Finalized: 7/14/11 Service Department: Information Accountable To: Director, Information

More information

Information Technology Services

Information Technology Services Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,

More information

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Your Place or Ours Why Trust Your Network to SymQuest? SymQuest is an industry leader with a national reputation for service excellence

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Flagship Managed Solutions (FMS)

Flagship Managed Solutions (FMS) Flagship Managed Solutions (FMS) a Cloud service iseries application hosting provides an alternative to the traditional iseries ownership costs, management and administration. Elimination of high up-front

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Managing a 24x7x365 Support Center and Network Engineering for a Government Agency QUICK FACTS

Managing a 24x7x365 Support Center and Network Engineering for a Government Agency QUICK FACTS [ Government, Managed Services Offering, Network Infrastructure Services Support Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Government Employees: More than

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

HIPAA: Compliance Essentials

HIPAA: Compliance Essentials HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Get what s right for your business. Contact @lliance Technologies.

Get what s right for your business. Contact @lliance Technologies. Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place

More information

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered. Real Security Outcomes. Delivered. Deploying healthcare and healthcare related services to the cloud can be frightening. The requirements of HIPAA can be difficult to navigate, and while many vendors claim

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Security and Managed Services

Security and Managed Services iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images

More information

www.datatechhosting.com

www.datatechhosting.com Hosting and Cloud Services Customer Service Level Agreement (SLA) Welcome to the Clustered Cloud Hosted Services Community. We are happy to have you aboard and look forward to assisting you with all your

More information

Achieving HIPAA Compliance with Red Hat

Achieving HIPAA Compliance with Red Hat Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have

More information

Achieving HIPAA Compliance with Red Hat

Achieving HIPAA Compliance with Red Hat Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have

More information

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS 7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS ExecutiveBrief P a g e 1 Executive Brief 7 Questions You Need to Ask Before Choosing a Colocation Facility for Your Business Choosing

More information

North Florida Community College

North Florida Community College North Florida Community College Technology Plan Table of Contents Executive Summary... 3 Technology Vision... 5 Annual Initiatives... 6 2010 Data Center Expansions... 6 The Next 3 Years... 6 Technology

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cloud Assurance: Ensuring Security and Compliance for your IT Environment Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware

More information

PC Proactive Solutions Technical View

PC Proactive Solutions Technical View PC Proactive Solutions Technical View PC Proactive Solutions Technicians View The following pages briefly describe our technicians view of our proactive management utility. Our software application is

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES

REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Isothermal Planning & Development Commission (IPDC) REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the IPDC for Information Technology Support Services. Interested

More information

Birst Security and Reliability

Birst Security and Reliability Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

How to Choose a Managed Network Services Provider

How to Choose a Managed Network Services Provider How to Choose a Managed Network Services Provider 6 Best Practices to Ensure a Thorough Evaluation Get Started Now: 877.611.6342 to learn more. www.megapath.com Could Managed Network Services Be Right

More information

Enterprise Governance and Planning

Enterprise Governance and Planning GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,

More information

Prepared by: OIC OF SOUTH FLORIDA. May 2013

Prepared by: OIC OF SOUTH FLORIDA. May 2013 OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000

I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000 Letting you do what you do best... run your business www.sironasolutions.com 06 850 000 For years, IT companies and their clients have been working against each other. Something breaks, the IT company

More information

Reliable & Affordable

Reliable & Affordable THE WAY WE SUPPORT OUR CLIENT S Reliable & Affordable To Support your Practice HISTORY We have been in business for more than 13 Years OVERALL CLIENT STRATIFICATION OUR CLIENTS 98% RATING ON OUR 28 EMPLOYEES

More information

Secure Hosting Environment Secure Hosting Environment Partnerships Virtualization Security OS and Application Patching Remote Connectivity

Secure Hosting Environment Secure Hosting Environment Partnerships Virtualization Security OS and Application Patching Remote Connectivity Secure Hosting Environment Partnerships In order to provide advanced levels of infrastructure security, Armstrong has partnered with two entities. Logicalis Inc. is recognized as a Channel Company s 2015

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just

More information

HIPAA and Cloud IT: What You Need to Know

HIPAA and Cloud IT: What You Need to Know HIPAA and Cloud IT: What You Need to Know A Guide for Healthcare Providers and Their Business Associates GDS WHITE PAPER HIPAA and Cloud IT: What You Need to Know As a health care provider or business

More information

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier

More information

Business white paper Top 10 reasons to choose Cloud-based Archiving

Business white paper Top 10 reasons to choose Cloud-based Archiving Business white paper Top 10 reasons to choose Cloud-based Archiving Table of contents 3 Reason 1: Equal or better security 4 Reason 2: Lower risk 4 Reason 3: Cost savings 5 Reason 4: Greater data access

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

Ashley Clarke Hosted Desktop. Business Name

Ashley Clarke Hosted Desktop. Business Name Ashley Clarke Hosted Desktop Business Name Our Partner s Technology Partner Ashley Clarke s Hosted Desktop is a full featured Windows 8 style experience delivered from the cloud. One of the key advantages

More information

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

With Eversync s cloud data tiering, the customer can tier data protection as follows:

With Eversync s cloud data tiering, the customer can tier data protection as follows: APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

See all, manage all is the new mantra at the corporate workplace today.

See all, manage all is the new mantra at the corporate workplace today. See all, manage all is the new mantra at the corporate workplace today. 1) Do you want to schedule backups, software updates using just one consistent automation platform? 2) Do you want a product that

More information

Croner Hosting Services

Croner Hosting Services 2015 Croner Hosting Services Overview This document describes the Hosting Options, Process Controls and Security models used in Croner s software platforms. Hosting Options Croner have partnered with one

More information