Ixonos Cloud Solutions - A Review

Size: px
Start display at page:

Download "Ixonos Cloud Solutions - A Review"

Transcription

1 Capacity Services Ixonos Plc 2015

2 TABLE OF CONTENTS TABLE OF CONTENTS Service description Environment Security services Data Center facilities Service levels Standard Extended Premium Support services Service times Service desk Service breaks Service level metrics Alarms Reporting Service production Backup and restoration processes Service billing Starting and ending a service Ixonos Plc Page 2 of 11

3 1 SERVICE DESCRIPTION Ixonos Capacity Services have been designed to answer business-critical capacity requirements with emphasis on continuously changing resource needs. The service is unique, in that it provides the option to divide required resources between the cloud, and physical environments according to specific needs, while at the same time, maintaining the same level of security as more traditional in-house hosting solutions. The Service can be composed of both physical infrastructure, and virtualized solutions, but can also be partially or completely built on Ixonos Cloud solution. The Customer is also able to opt for a more versatile composition of network and security components. Ixonos Cloud solution has been designed to operate as a Customer s own private cloud. It's design focuses strongly on security aspects, while also providing for easy access to resources via the cloud UI, and to operability with a high degree of automation. 1.1 Environment To guarantee security, customer environments are always run in isolation using VLANtechnology (Virtual Local Area Network). In this way, the entire network area is contained for a customer s dedicated usage. A single customer has the possibility to have one or more VLANs in available for use at any time. Ixonos Plc Page 3 of 11

4 Access to Linux servers is controlled using SSH. With Ixonos Cloud solution, this procedure has been implemented with automation and full configurability. The Customer is able to decide if a dedicated user is granted root-level access or limited access. In Windows environments, the servers native user management system is utilized. Firewalls can be controlled by Ixonos Data Center staff or the Customer themselves, as with Ixonos Cloud solutions. Additionally, with higher service levels, the Customer has the opportunity to add a VPN or MPLS connection to their existing infrastructure. In addition to building a secure network between the Customer s own premises and Ixonos data center, VPN and MPLS connections may also be implemented to integrate existing data center with resources provided by Ixonos. With this provided technology, the customer is able to for example, conveniently extend and compliment their existing current data center capability with additional flexible virtual resources from Ixonos Cloud. This is possible even if an encrypted but publicly routed connection is not an acceptable solution. Ixonos Cloud also offers the possibility to create hybrid-environments, where physical machines are included within the same environment as virtual machines. If the physical infrastructure is already situated within the premises of the customer, the hybrid solution can be fully implemented using VPN or MPLS connections, leaving the physical machines completely under Customer control. Ixonos Cloud is built on Red Hat technology. Red Hat, is a leading provider of open source enterprise Linux based solutions. Ixonos close co-operation with Red Hat allows us to offer our Customers with high quality, secure and continuously improving cloud-based solutions. 1.2 Security services Ixonos offers highly effective protection against Denial of Service attacks (DDoS, DoS). This additional service identifies the attacks and deflects them, allowing the Customer s services to run safely during an attack. An IPS (Intrusion Prevention System) is used to identify and prevent malicious traffic. All traffic directed to the Customer s infrastructure is monitored, and in the case of a potential dangerous event; an application vulnerability exploit for example, a warning is given and the traffic is automatically denied. In any well managed systems environment, ongoing system and application security assessment is a critical element of assurance practice. Security vulnerability management must be monitored and assessed to ensure it incorporates up-to-date information about vulnerability threats. Routine scanning of program libraries for such vulnerabilities, in addition to penetration testing must remain a vital practice for all infrastructures. Ixonos Capacity Services offer constant vulnerability scanning and optional operating system (OS) hardening. Ixonos facilitates the customer in undertaking out vital and necessary Customer environment audits. Ixonos will identify the physical location of the Customer s data to the Customer if so requested. Ixonos Plc Page 4 of 11

5 1.3 Data Center facilities Hardware is located at a separate fire-proofed safe data center facility, with access monitoring and a comprehensive security system. All routes leading to and from the facility are equipped with CCTV video surveillance equipment. The fire protection system is connected to an automated fire warning system, as are the cooling and security systems. A continuous supply of electricity to the data center is secured by means of a UPS (Uninterrubtible Power Supply) complimented by a backup generator. The facility is compliant with Class 3 Facility requirements standard set by the Finnish government 1 applicable to security within technical data facilities. All Ixonos Data Center facilities are located in Finland. Audits can be arranged by a separate agreement. 2 SERVICE LEVELS Ixonos offers services in three different predefined service level categories. The categories define unified service levels and values according to how the service is delivered. These categories also define what operability and functionality is included in the service, and what type of devices and systems are available. The service levels are categorized as; Premium, Extended and Standard. The service level includes recommendations on the service times within which, the service can be consistently delivered. Availability must to be taken into account when making decisions on equipment and service time. Each service level contains its own definition for included actions, available service level metrics and service values. Available resources, maintenance and monitoring are also covered. The services included in each service level are listed below. A service level is always VLAN specific. The Customer can have many different virtual networks with varying SLAs. Services Standard Extended Premium Service availability 99% 99.95% 99.95% Self-provisioning UI for cloud infrastructure 24/7 24/7 24/7 Incident support, access x x x Phone support (Hot Line) 8/5 24/7 Ticketing system UI Dedicated Service Manager 8/5 Monthly reports DNS changes max 1 / month max 2 / month max 2 / month x x 1 facilities Steering Group of State Administration Security 1/2002, recommendations for ICT Ixonos Plc Page 5 of 11

6 Notifications on version updates x x x Version updates to servers on request x x Network security scan on request x x Monitoring services 24/7 24/7 Alarm response 8/5 24/7 Public IP address for each VLAN VLAN-to-VLAN link x x x VPN connection per VLAN 1 1 Physical machines x x DDos mitigation x x IPS protection x x Add-on Services Additional public IP addresses x x x Dev2Dev support x x x Additional VPN connections unlimited unlimited unlimited MPLS connection x 2.1 Standard The Customer can govern and scale cloud resources by themselves. This includes network connections and firewall configurations via the cloud UI. This level is suitable for development and production needs, where there is no need for additional monitoring and integration services. 2.2 Extended Servers are monitored continuously 24/7. Alarms are responded to on an 8/5 basis. Phone support is available to the Customer 8/5. Physical servers, VPN connections or security related hosting services can be added to any VLAN on this level. 2.3 Premium This level is suitable for running business critical services. It includes inter alia, a dedicated Service Manager, 24/7 support and additional advanced monitoring and integration services. Ixonos Plc Page 6 of 11

7 3 SUPPORT SERVICES 3.1 Service times Service is available within two service time categories: 8/5 or 24/7. Service time Description Service time Timezone category 8/5 5 days a week during regular office hours mon fri, 9am 5pm GMT +02:00 Helsinki 24/7 7 days a week, 24h a day mon sun, 24 hrs/day GMT +02:00 Helsinki 3.2 Service desk Ixonos offers a concentrated single point of contact; the Ixonos Service Desk, which is responsible for receiving, booking and responding to service requests, and if needed, forwarding requests to third party component representatives. A service request can be made via . Extended and Premium customers may also use phone support depending on their service level (8/5 or 24/7). Service Managers are available 8/5. Premium level customers benefit from a dedicated ticketing queue, which is provided via a browser based user interface with extensive on-demand reporting functionality. The Service Desk processes service requests and change requests in a priority-order. The Customer provides a service request with an initial priority level, which is then checked in conjunction with an Ixonos provided priority assessment. Issues are fixed according to rules that have been agreed upon with the customer (classification of critical issues and respective response times etc.). If there are multiple issues being resolved at the same time, a lesser priority issue will be fixed once a higher one has been resolved, and issues with the same priority are handled on a first come first serve basis (ITIL, event and problem management). Ixonos notifies the service request sender that it has received the request ( , phone) and when it has resolved the request. Incident Classification The classification of incidents is described below. Category Critical Description Service is not available or usage is severely limited. Requires immediate actions. Ixonos Plc Page 7 of 11

8 Major Minor The disruption has a significant effect on the usability or the administration of the service. Requires rapid actions. The disruption does not prevent using the service or it affects only rarely used parts, features or administration elements of the service. Requires actions. 4 SERVICE BREAKS A service break relates to a break in the device s or service s usability that is reserved for maintenance purposes in advance. The device or service may be available even during the service break, but this can not be guaranteed. Planned maintenance activities are concentrated into planned service breaks, and the number of planned service breaks is kept in minimum. The length of a service break, the time window, frequency, notification and total maximum downtimes are outlined below. Time 4 6am GMT +02:00 Helsinki Notification Written notification 2 weeks ahead Maximum total length of service breaks during maintenance < 2 hours Frequency No more than once a week on a Thursday morning 5 SERVICE LEVEL METRICS Service level metrics are provided through three metric classes; basic, support service and technical. Basic metrics are available on every service level, their threshold values can be edited. Usage of basic metrics is included in the service fee, but monitoring and reporting practices are specific to the service level. Support service metrics are used to measure support services, their threshold values can be edited. Support service metrics can not be selected in all service levels, by default they are available only to Premium level. Technical metrics are additional essential performance metrics, that are not service level related, but are used for more detailed evaluations of service quality, and requests for change. Technical metrics can not be selected in all service levels, by default they are available only to Extended and Premium levels. Metric type Standard Extended Premium Basic metrics Availability Availability Availability Ixonos Plc Page 8 of 11

9 Support service metrics Technical metrics N/A N/A Response time Start time Resolution time Resolution time for incidents Resolution time for service requests Resolution time for problems Number of reopened tickets Number of service requests Division of service requests Division of problems Number of open tickets and their status N/A Server, database or Server, database or application server application server alive alive Server available to Server available to external monitoring external monitoring Server disk usage Server CPU usage (> 90%) Server disk usage (> 90%) Server memory usage Number of unique visitors to service Number of visitors to service Service front page loads Service front page loading duration Service front page availability Number of registered users The definitions and default values of each service level metric are defined per service level in the document Capacity Services - Service Levels. 5.1 Alarms When a server or application reaches a certain threshold value, for example, disk space is filling up, the Ixonos monitoring system triggers an alarm. Extended and Premium level customers can opt to receive an or SMS about this event, so they can decide on the appropriate course of action. Ixonos is able respond to the alarm with the necessary actions during the service hours agreed on within the service level. The persons notified of the alarm must be defined in the service ramp up phase. Ixonos Plc Page 9 of 11

10 Premium Customers can may additionally agree on Ixonos own experts response to the service specific alarms. The actions to be performed in the response, are also agreed on beforehand between Ixonos and the Customer. 6 REPORTING Premium Customers receive a monthly report. The pricing can always be seen in the Ixonos Cloud UI what comes to cloud environments, no matter what is the service level. The monthly report contains as a minimum, the following items: SLA on a monthly level Summary of incidents and service requests Service breaks and their durations Premium level Customer's reports can also contain other agreed upon content and desired metrics, as depicted in Chapter 5. 7 SERVICE PRODUCTION A team of professionals comprising of an Account Manager, a (Customer specific) service manager, Hot Line support team, general system support team and a separate ramp up team are responsible for your service. The allocation of this team varies according to the service level. A service is delivered according to documented processes, and contain the handling of support events, problems, change requests, environment related continuity, configuration, availability management and security management. These processes are based on the best practices as defined by ITIL (Information Technology Infrastructure Library). If needed, the service can contain a separate ramp up project in which all the necessary maintenance and development processes, methods, work instructions and tools are defined. During the ramp up phase a service description is produced that describes the agreed services, processes, methods, work and reporting instruction and tools. 7.1 Backup and restoration processes Ixonos backs up all its data center servers to a backup-tape automatically. Backups and restores are undertaken regularly by the data center staff. Server data, content and configuration files are backed up at least with the following times: Ixonos Plc Page 10 of 11

11 Daily (stored for 4 weeks) incremental backup Weekly (stored outside data center facilities for 4 weeks) full backup One full backup per month (stored for 1 year) Server restoration can be requested from Ixonos support services. Cloud machines can be backed up and restored via the cloud UI. Regardless of the UI, the tape backups are also performed on cloud servers as described above. 7.2 Service billing Service usage is invoiced monthly. The monthly price contains all work listed in Chapter 2 as belonging to the service. Other work is invoiced per hour. The minimum billing amount is: Cloud servers 1 day Physical and VMware servers according to agreement, minimum contract duration 1 year 7.3 Starting and ending a service A service can be established or discontinued by contacting cloud@support.ixonos.com or via your own Service Manager. Cloud servers can be created and deleted anytime via the cloud UI, or on request to the service team. Minimum billing for such an infrastructure is 1 day. The installation and removal of devices is not charged. Physical servers may be ordered via Ixonos support services or from your own Service Manager. These will be included in a service agreement with a minimum duration of 1 year. For the ramp up of devices, a fee of 70% of their monthly price is charged. Ixonos Plc Page 11 of 11

1.1 SERVICE DESCRIPTION

1.1 SERVICE DESCRIPTION ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Schedule 2Z Virtual Servers, Firewalls and Load Balancers

Schedule 2Z Virtual Servers, Firewalls and Load Balancers Schedule 2Z Virtual Servers, Firewalls and Load Balancers Definitions Additional Charges means the charges payable in accordance with this schedule. Customer Contact Centre means Interoute s Incident management

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Altus UC Security Overview

Altus UC Security Overview Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

The look and feel of a traditional Dedicated Server, with the on-demand scalability, flexibility and reliability you expect from the Cloud.

The look and feel of a traditional Dedicated Server, with the on-demand scalability, flexibility and reliability you expect from the Cloud. Most companies have their heads in the clouds and rarely have their feet on the ground. Their aspirations and dreams propel them to invest valuable time and money setting up infrastructure. However, more

More information

BT Assure DoS Mitigation UK

BT Assure DoS Mitigation UK BT Assure DoS Mitigation UK Annex to the Internet Connect UK Schedule Contents A note on we and you... 2 1. Service Summary... 2 2. Service Standard Components... 2 3. Service Options... 2 4. Service Management

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration. HOSTEDMIDEX.CO.UK THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO CLIENT BY THE SUPPLIER. I. Service Definition Lanmark Technical Services Ltd trading as mailhosted.co.uk

More information

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com Contents Scope of this Document... 2 Product Overview... 2 Virtual Data Centre and VDC Dedicated Infrastructure... 2 Service Levels... 3 Severity and Support Response Times... 4 On-boarding... 5 Incident

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

Cisco Unified Computing Remote Management Services

Cisco Unified Computing Remote Management Services Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...

More information

SAP hybris Commerce, cloud edition, Managed Services Description

SAP hybris Commerce, cloud edition, Managed Services Description SAP hybris Commerce, cloud edition, Managed Services Description Effective June 2015 OBJECTIVES AND SCOPE This document provides supplemental information regarding the Managed Services for the SAP hybris

More information

ensurcloud Service Level Agreement (SLA)

ensurcloud Service Level Agreement (SLA) ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and

More information

Integrated processes aligned to your business The examples of the new NetEye and EriZone releases

Integrated processes aligned to your business The examples of the new NetEye and EriZone releases Integrated processes aligned to your business The examples of the new NetEye and EriZone releases Georg Kostner, Product Manager NetEye / EriZone 4/15/2015 1 Measurement & management in most organizations

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

JT OnDemand Cloud Backup Service

JT OnDemand Cloud Backup Service JT OnDemand Cloud Service The following service description covers the different service levels offered for JT OnDemand Cloud Service. The agentless, tape-free backup service provides support for a local

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS.

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. MarWatch Fault & Performance Management SaaS REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. Detecting and resolving problems on today s increasingly complex business communications networks is a

More information

Securty and Quality in Hosting Services

Securty and Quality in Hosting Services Securty and Quality in Hosting Services Global ARCHIBUS Authorized Hosting Partners Network Authorized Hosting Partners: efm (Italy EU), Elion (Telia Sonera), RACSA (Costa Rica), Terremark, Telefónica,..

More information

G DATA TechPaper #0275. G DATA Network Monitoring

G DATA TechPaper #0275. G DATA Network Monitoring G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration

More information

Virtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10

Virtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10 Virtual Server Hosting Service Definition SD021 v1.8 Issue Date 20 December 10 10 Service Overview Virtual Server Hosting is InTechnology s hosted managed service for virtual servers. Our virtualisation

More information

CSC BizCloud VPE Service Offering Summary. CSC i

CSC BizCloud VPE Service Offering Summary. CSC i Table of Contents OVERVIEW... 1 BIZCLOUD VPE SOLUTION SUMMARY... 1 BIZCLOUD VPE INFRASTRUCTURE... 1 Hardware and Virtualization Layer... 2 Compute Components... 2 Storage 2 CSC SUPPORT FOR THE BIZCLOUD

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

UNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS. Security for Virtual and Cloud Environments

UNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS. Security for Virtual and Cloud Environments UNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS Security for Virtual and Cloud Environments PROTECTION OR PERFORMANCE? The number of virtual machines exceeded that of the physical ones back in 2009.

More information

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: (wahlgren@dsv.su.se), 2: (stewart@dsv.su.se) ABSTRACT

More information

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud) SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

MANAGED MICROSOFT AZURE SERVICES

MANAGED MICROSOFT AZURE SERVICES MANAGED MICROSOFT AZURE SERVICES Moving Your Applications to the Microsoft Azure Cloud? Let Connectria Help. No other provider hosts as many technologies in the Cloud as Connectria. If you re interested

More information

Our Server Support. Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015

Our Server Support. Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015 Our Server Support Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015 Telephone Sales and Accounts 0161 232 0001 Technical Support 0161 232 0125 Email

More information

ADDITIONAL TERMS FOR VIRTUAL DATA CENTRE SERVICE SCHEDULE 2N

ADDITIONAL TERMS FOR VIRTUAL DATA CENTRE SERVICE SCHEDULE 2N ADDITIONAL TERMS FOR VIRTUAL DATA CENTRE SERVICE SCHEDULE 2N CONTENTS 1 Service Description... 3 1.1 Contract structure... 3 2 Service Resource Usage... 4 2.1 Location... 4 2.2 Utility Capability... 4

More information

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS.

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. MarWatch Fault & Performance Management SaaS REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. Detecting and resolving problems on today s increasingly complex business communications networks is a

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the

More information

Platform as a Service

Platform as a Service Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

ITIL A guide to Event Management

ITIL A guide to Event Management ITIL A guide to Event Management An event can be defined as any detectable or discernable occurrence that has significance for the management of the IT Infrastructure of the delivery of IT service and

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Maruleng Local Municipality

Maruleng Local Municipality Maruleng Local Municipality. 22 November 2011 1 Version Control Version Date Author(s) Details 1.1 23/03/2012 Masilo Modiba New Policy 2 Contents ICT Firewall Policy 1 Version Control.2 1. Introduction.....4

More information

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

Table of Contents. CSC CloudCompute Service Description Summary CSC 1 Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...

More information

Cisco Unified Communications Remote Management Services

Cisco Unified Communications Remote Management Services Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco

More information

Mitel Performance Analytics

Mitel Performance Analytics Mitel Performance Analytics For Enterprises May 2016 Summary Mitel Performance Analytics: Service Quality Matters MPA Plus: Advanced Enterprise Features Fault & Performance Management Features MPA Service

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

Adlib Hosting - Service Level Agreement

Adlib Hosting - Service Level Agreement Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities

More information

SEP AG and its affiliates offers different support levels for customers, partners and potential customers.

SEP AG and its affiliates offers different support levels for customers, partners and potential customers. SEP Support - Services and Definitions SEP Support Services and Definitions (Effective for purchase or renewal from 01-03-2015) Introduction SEP AG and its affiliates offers different support levels for

More information

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana 2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Der Weg, wie die Verantwortung getragen werden kann!

Der Weg, wie die Verantwortung getragen werden kann! Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise

More information

Cloud Services Catalog with Epsilon

Cloud Services Catalog with Epsilon Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these

More information

Smartronix Inc. Cloud Assured Services Commercial Price List

Smartronix Inc. Cloud Assured Services Commercial Price List Smartronix Inc. Assured Services Commercial Price List Smartronix, Inc. 12120 Sunset Hills Road Suite #600, Reston, VA 20190 703-435-3322 cloudassured@smartronix.com www.smartronix.com Table of Contents

More information

Vodacom Managed Hosted Backups

Vodacom Managed Hosted Backups Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers

More information

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Rulebook on Information Security Incident Management General Provisions Article 1

Rulebook on Information Security Incident Management General Provisions Article 1 Pursuant to Article 38 of the Law on State Administration (Official Gazette of the Republic of Montenegro 38/03 from 27 June 2003, 22/08 from 02 April 2008, 42/11 from 15 August 2011), The Ministry for

More information

SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS

SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

Datasheet FUJITSU Cloud Monitoring Service

Datasheet FUJITSU Cloud Monitoring Service Datasheet FUJITSU Cloud Monitoring Service FUJITSU Cloud Monitoring Service powered by CA Technologies offers a single, unified interface for tracking all the vital, dynamic resources your business relies

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

ucloud server User Guide v3.0 (2013.01)

ucloud server User Guide v3.0 (2013.01) ucloud server User Guide v3.0 (2013.01) KT Revision history Date of revision Version Cause of revision Contents of revision 2011.03.01 2012.02.01 2012.03.01 2012.05.01 2013.01.07 2013.01.08 1.0 2.0 2.1

More information

DISTRIBUTED DATA COLLECTION FOR REINSURANCE (RI) AND RISK ADJUSTMENT (RA): PROVISIONING. August 27, 2015 HTTPS://WWW.REGTAP.INFO/

DISTRIBUTED DATA COLLECTION FOR REINSURANCE (RI) AND RISK ADJUSTMENT (RA): PROVISIONING. August 27, 2015 HTTPS://WWW.REGTAP.INFO/ DISTRIBUTED DATA COLLECTION FOR REINSURANCE (RI) AND RISK ADJUSTMENT (RA): PROVISIONING August 27, 2015 Session Guidelines This is a 90-minute webinar session. For questions regarding the Distributed Data

More information

Veeam ONE What s New in v9?

Veeam ONE What s New in v9? Veeam ONE What s New in v9? Veeam ONE is a powerful monitoring, reporting and capacity planning tool for the Veeam backup infrastructure, VMware vsphere and Microsoft Hyper-V. It helps enable Availability

More information

Additional services are also available according to your specific plan configuration.

Additional services are also available according to your specific plan configuration. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

1 Introduction 2. 2 Document Disclaimer 2

1 Introduction 2. 2 Document Disclaimer 2 Important: We take great care to ensure that all parties understand and appreciate the respective responsibilities relating to an infrastructure-as-a-service or self-managed environment. This document

More information

MiServer and MiDatabase. Service Level Expectations. Service Definition

MiServer and MiDatabase. Service Level Expectations. Service Definition MiServer and MiDatabase Service Description Service Definition As part of the NextGen Michigan initiative, Information and Technology Services has engaged in building a private cloud offering to support

More information

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network... Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless

More information

SUPPORTING HIPAA COMPLIANCE THROUGH MANAGED HOSTING.

SUPPORTING HIPAA COMPLIANCE THROUGH MANAGED HOSTING. SUPPORTING HIPAA COMPLIANCE THROUGH MANAGED HOSTING. At Connectria, integrity is everything. From our people to your data, we embrace integrity as our hallmark. That s why healthcare organizations, healthcare

More information

Managed IT Services. Maintain, manage and report

Managed IT Services. Maintain, manage and report Managed IT Services Maintain, manage and report 1 2 Comunet was established in 1995 to provide professional Information Technology services to Australian businesses and organisations. Its vision now, as

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

SEP Support Definitions and Services

SEP Support Definitions and Services SEP Support Definitions and Services (For customers with valid Support Contracts signed before 01.03.2015 the conditions from this document are applicable.) Introduction SEP AG provides a variety of support

More information

Secure Hosting Solutions For SAGE Energy Management

Secure Hosting Solutions For SAGE Energy Management Secure Hosting Environment Partnerships In order to provide advanced levels of infrastructure security, Armstrong has partnered with two entities. Logicalis Inc. is recognized as a Channel Company s 2015

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Securing Industrial Control Systems on a Virtual Platform

Securing Industrial Control Systems on a Virtual Platform Securing Industrial Control Systems on a Virtual Platform How to Best Protect the Vital Virtual Business Assets WHITE PAPER Sajid Nazir and Mark Lazarides sajid.nazir@firstco.uk.com 9 Feb, 2016 mark.lazarides@firstco.uk.com

More information

BMC Remedy OnDemand. Product Overview

BMC Remedy OnDemand. Product Overview Alf Abuhajleh January 2012 Table of Contents BMC Remedy OnDemand 2 What you get with your subscription 2 Applications... 2 Purchase Requirements... 2 Internationalization... 2 Infrastructure and Service-level

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

IBM Vulnerability Management Service

IBM Vulnerability Management Service 1. Service Overview IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House Service Description 24-32 Pembroke Road Ballsbridge, Dublin 4. IBM Vulnerability Management Service

More information

Security Features: Lettings & Property Management Software

Security Features: Lettings & Property Management Software Security Features: Lettings & Property Management Software V 2.0 (23/02/2015) Table of Contents Introduction to Web Application Security... 2 Potential Security Vulnerabilities for Web Applications...

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Fermilab Central Web Service Site Owner User Manual. DocDB: CS-doc-5372

Fermilab Central Web Service Site Owner User Manual. DocDB: CS-doc-5372 Fermilab Central Web Service Site Owner User Manual DocDB: CS-doc-5372 1 Table of Contents DocDB: CS-doc-5372... 1 1. Role Definitions... 3 2. Site Owner Responsibilities... 3 3. Tier1 websites and Tier2

More information

Service Level Agreement. Server Hosting

Service Level Agreement. Server Hosting Service Level Agreement Server Hosting Institute for Quantitative Social Science (IQSS) and Harvard MIT Data Center (HMDC) 15 October 2009 1. Overview This service level agreement defines the baseline

More information

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify

More information