28 Jul Disaster Preparedness and Business Recovery Document (Sapulpa Location)

Size: px
Start display at page:

Download "28 Jul 2009. Disaster Preparedness and Business Recovery Document (Sapulpa Location)"

Transcription

1 28 Jul 2009 Disaster Preparedness and Business Recovery Document (Sapulpa Location) 1

2 Preface This Benefits Technology (BenTec) Disaster Preparedness and Business Recovery Plan describes the disaster recovery procedures planned for the safety, protection, and quick restoration of company computer resources and data assets in the event of an emergency or disaster and the process envisioned for implementation of these procedures. In addition, this document with attachments outlines the resources available to implement the plan. For additional technical information pertaining to this document, contact Allen Beaird ( ), Brad Armstrong ( ), or Maria Gee ( ) i

3 Table of Contents Preface... i Table of Contents... ii List of Illustrations... iii List of Attachments... iv Introduction Business Description and System Overview Emergency Response and Recovery Team Disaster Categories and Recovery Guidelines ii

4 List of Illustrations BenTec Business Process Telecommunications Configuration LAN/WAN Configuration Distributed Call Center iii

5 List of Attachments Emergency Contact List...Attachment 1 Telephone Equipment...Attachment 2 Network Server Equipment...Attachment 3 iv

6 Introduction Business Description and System Overview This document describes the BenTec Information Technology related Business Operations and Disaster Recovery procedures used to provide for the safety, protection, and restoration of company computer resources and data following disasters. This plan requires critical personnel to receive specialized training concerning emergency maintenance procedures, data backup and recovery procedures, damage control, and risk mitigation techniques. Emergency maintenance procedures, data backup and recovery procedures, damage control and risk mitigation techniques are required training for all system/network administrators and other individuals identified in this plan. Business Process Description BenTec provides employee benefit sales, service, and support to employees of its clients. The service and support provided by BenTec requires the extensive use of information technology including: Databases Web sites Electronic mail systems File servers Billing systems Scheduling systems FTP servers Telephony systems. BenTec sells insurance products to the employees of BenTec clients during employee benefit enrollment campaigns. Typically these enrollment campaigns last from one week to two months during which BenTec enrollment specialists assist employees with the selection and purchase of the employees' desired benefits. That assistance may come in the form of: 1. Field enrollers working one-on-one with employees and recording enrollment information via notebook computers, 2. Employee's calling the BenTec service center for voice only enrollment support, 3. Employee's calling the BenTec service center for cobrowsing support using BenTec developed systems and software. BenTec service center support may be provided by an agent located at the BenTec Sapulpa service center or via remote agents using VoIP phone technology. 1

7 Customer Location Customer s Public Telephone And Internet Service Providers Public Internet & Switched Phone System BenTec Public Telephone And Internet Service Providers Sapulpa Internet Firewall Agent s Internet Service Provider (Agent Phone is VoIP) Data Switch Sapulpa PBX Remote Agents Web Servers, Application Servers, Database, File Servers, etc. Phone Switch Sapulpa Agents Sapulpa Agents Sapulpa Agents Typical Enrollment Configuration Figure 2-1 Figure 2-1 illustrates the BenTec cobrowsing technology. To use the BenTec system, an employee accesses a web page via a computer connected to the internet. A message on the web page will instruct the client to contact an enrolment specialist (agent) by telephone. The enrollment specialist will greet the employee and ask the employee for the "key code" number displayed to the employee on the web page the employee is viewing. The agent will then use that key code to join the employee's computer session and view and control the information displayed to the employee using a process known as "cobrowsing." As the employee watches, the enrollment specialist takes over control of the display and explains each insurance product offering available to the employee. As each benefit is explained, the employee tells the enrollment specialist whether or not he wishes to order the product and the options and amounts desired. The enrollment specialist then completes the application forms as the employee watches. Digital enrollment data are stored in secure database servers located at BenTec's facilities in Sapulpa and the TulsaConnect collocation site in downtown Tulsa. The enrollment specialist may be located at either the Sapulpa service center or at a remote location serviced by VoIP voice links to the Sapulpa PBX system as shown above. System Description BenTec service center operations are currently supported by a 12 agent, expandable to 22 agent, service center operation located at 1200 Taft Street. Sapulpa, OK. The 2

8 TeleSynergy PBX system can be expanded via remote VoIP phone equipped agents by another 30 seats for a total expanded capability of 52 seats. The Sapulpa location data network is Win2003 based and telecom switching is provided by an advanced TeleSynergy PBX with ACD, auto-attendant, voice mail, a recording capability for 20 simultaneous extensions, FAX, and IVR capabilities. The primary PBX is backed up with a completely redundant failover PBX which, from a hardware and software perspective, is identical to the primary PBX. The service center desktop environment is primarily WinXP Pro. Power for the Sapulpa facility is provided via Oklahoma Natural Gas and Electric. Emergency power is provided by on-site UPS systems. Internet connectivity is provided from two sources, AT&T (DSL) and COX (DSL). Voice connectivity is provided via one standard business line (used for the BenTec central FAX and as the AT&T DSL number and by 1 AT&T PRI and a block of DIDs to (Additional lines, DIDs, and PRIs can be turned up as needed on approximately 14 to 30 days notice.) Additionally Sapulpa has two toll free outbound lines from CommPartners Connect ( and ) which are delivered VoIP to the BenTec PBX via PAP2 VoIP to analog adapters and a PBX analog trunk card. As currently configured, the Sapulpa PBX can support 30 local extensions and 30 remote VoIP extensions, 2 PRIs, and 12 analog trunks. BenTec services are provided by MS Exchange. Web servers are Windows 2003 IIS. Our enrollment system consists of a primary web server with a separate application server, and database server located at the secure TulsaConnect collocation facility. Our primary exchange server is also located at TulsaConnect. Our standby servers are virtualized Windows 2008 servers using VMware and are located at the Sapulpa office. Standby and production MS SQL servers are synchronized using transactional replication. Active and standby Exchange servers are synchronized using standard Microsoft Exchange Standby Continuous Replication. Development and file servers are located at the Sapulpa facility along with the production and standby PBX system. The TulsaConnect collocation facility provides primary power from OG&E, 40 hours of emergency battery time, and redundant diesel sources with 14 days of fuel on site. Additionally TulsaConnect provides redundant internet assess for BenTec servers via multiple carriers (Currently Time Warner Communications, Verizon Communications, Global Crossing, AT&T, and Level 3 Communications). Both Sapulpa and TulsaConnect location networks are continuously monitored by DELL Silver Streak software. Silver Streak provides the following functions: Firewall monitoring consolidates server logs into one view; reports on intrusion or attack activity; summarizes monthly activity, identifies whether or not the BenTec firewall is operating correctly. Intrusion monitoring identifies failed log-ins, account modifications, etc. Tracks "who did what to whom"-- this feature is commonly referred to as an audit trail. Also, documents whether or not someone is trying to access a resource he/she shouldn't to keep honest people honest after layoffs. 3

9 Real-time vulnerability scanning scans networks, systems, and applications for more than 2,000 known vulnerabilities, such as "backdoors", viruses, old software, configuration errors, etc. Also includes compliance reports, including "open ports"; and discovered windows users, services, and shares. Patch management identifies where patches are needed by device, server or desktop, by bulletin or by Microsoft product, such as Internet Explorer -- then remotely distributes and installs those patches. Multiple data backups are maintained by BenTec. Specifically, the BenTec central mail server maintains three backup copies of all mail folders. One located on a drive in the BenTec collocation facility server, one maintain off site by TulsaConnect, and one replicated copy maintained at the Sapulpa facility. Likewise the BenTec production database uses transactional replication to backup transactions from the TulsaConnect facility to the BenTec Sapulpa facility in real time. We also generate full database backup files (classic MS SQL ".Bak files") from the production server twice daily, once at noon and once a midnight. (Development database.bak files are generated weekly each weekend.) The Exchange server, file server and personal directories at Sapulpa are backed up each day using Backup Exec software to a series of tapes. These tapes are rotated each week with a complete weekly set of backups rotated each 10 weeks. Backup tapes are kept in a secure, fireproof safe located on site with one set maintained off site. Additionally, once a week a complete system backup is generated to a large external hard drive located in Sapulpa. PBX systems are configured with one primary and one secondary PBX server. The fully redundant servers are configured identically. The primary server is backed up weekly and then that configuration (along with all voice mails, message prompts, and configuration changes is restored to the failover PBX each weekend). Internally the Sapulpa network is protected via the use of Trend antivirus software. Procedurally, each morning we review system status event logs, PRI and VoIP line connectivity and identify and resolve any anomalies. Each month the Silver Streak system produces a detailed report and any anomalies or issues identified by Sliver Streak are resolved. 4

10 Emergency Response and Recovery Team Specific personnel are assigned to an IT Emergency Preparedness Team. This team is responsible for the implementation of the Disaster Recovery Plan should an incident occur. The members of the team and their roles are as follows. President The president (Dwight Pierce) is responsible for the overall resumption of business activities. His primary duties include making sure that adequate resources are provided and that all team members are kept abreast of the overall recovery process. The president will chair periodic meetings of the IT Emergency Response and Recovery team, where recovery plans will be reviewed. He may elect to test some or all of the Disaster Recovery Plan. He reviews and approves individual team members plans. He maintains an off-site emergency contact list including telephone and address information for key response team members as well as police, security system, phone system, ISP, and other emergency services. (Attachment 1) Vice President for Information Technology The VP for IT (Allen Beaird) is responsible for the overall coordination and implementation of the disaster recovery plan as well as setup of the Emergency Response and Recovery control center and resumption of Network, Telecom, and Desktop operations. His primary duties also include assessing the extent of the emergency, developing a list of resources needed to resume operations, overseeing recovery operations, and providing a recovery timeline to the president. The VP for IT may call on the IT resources of other BenTec divisions and Computer Point for additional support as required. The VP for IT will also be responsible for the resumption of service center enrollment/interviews and post processing operations. His duties in this area will include scheduling of customer service representatives, monitoring service center operations, and facilitating post processing operations. The VP, IT will attend periodic meetings of the IT Emergency Response and Recovery team. He will advise the president of alternate site suitability. He will perform a technical analysis of all plans, develop overall timelines, and recommend individual plans for approval. He will maintain a complete copy of this recovery plan both on and off site. Network Engineering The Network Engineer (Brad Armstrong) will assist the VP for IT with the setup of the Emergency Response and Recovery control center and resumption of Network, Telecom, and Desktop operations. His primary duties include technical support to other team 1

11 members and restoration of IT operations. He will work closely with the VP for IT and report and update recovery planning projects. The Network Engineer will also attend periodic meetings of the IT Emergency Response and Recovery team. The Network Engineer, in conjunction with the VP for IT, will develop a plan to quickly set up the Emergency Response and Recovery control center appropriate to the specifics of any disaster. This center will typically include emergency internet, , and telecom capabilities to support the Emergency Response and Recovery team. The Network Engineer will maintain off site sufficient equipment to implement this plan. The Network Engineer will also develop communication and network/server plans adequate to; restore minimal communication; LAN/WAN, router and firewall functionality -- and servers and desktops sufficient for service center operations. In addition to these duties, the Network Engineer must ensure that the latest upgrades, service packs, and hot patches be applied to all IT equipment. The Network Engineer must maintain system documentation and keep abreast of all applicable security advisories. Communications Manager The Communications Manager (Maria Gee) will assist the VP for IT with the resumption of service center PBX related and helpdesk related enrollment/interviews and post processing operations. Her primary focus will be on reestablishing Sapulpa provided services including Helpdesk services, , QuickBooks access, VoIP phone services, and enrollment platform support. 2

12 Disaster Categories Disaster Categories and Recovery Guidelines The following table categorizes disasters into four levels based on severity and duration of the problem. Level Description Examples Level-1 Catastrophic event requiring Earthquake, Fire, Storm, Ice, Flood, relocation of service center Extended Electrical, Internet or Level-2 Level-3 Level-4 Catastrophic incident adversely affecting service center operations Major incident adversely affecting service center operations Minor incident adversely affecting service center support Telecommunications interruption Earthquake, Fire, Storm, Ice, Flood, Extended Electrical, Internet or Telecommunications interruption Electrical Interruption, Multiple Hardware Malfunctions, Wide Spread Virus Infection, Security Breach of Firewall or Network, Denial of Service Attack, Loss of All Internet Connections or all Telecommunications Hardware Malfunction, Virus Infection, Denial of Service Attack, Loss of Internet Connection or Telecommunications Recalling the purpose of the plan is to provide for the safety, protection, and quick restoration of company computer resources and data assets, the first step in any response must be the determination of what systems have failed, the impact of those system failures to operations, the resources required to restore normal operations and the projected recovery time. The following chart describes critical BenTec systems and the equipment currently used to support those systems. System Equipment and System Dependencies Telecomm TeleSynergy PBX equipment, (PBX1, PBX2, TeleVNAT, TeleContact Servers) AT&T PRI, VoIP links from CommPartners or PAP2T Adapters, Internet connectivity for remote agents via COX and AT&T LAN Switches, MikroTik firewalls ( and ) Win Domain LAN, SRV-FS01, SRV-DC01, SRV-SQL01 Internet/VPN LAN, MicroTik firewalls ( ) ( ), Cox Coax to Ethernet modem, AT&T Modem, Cox & AT&T ISPs Production Web LAN, Internet, SRV-SQL01, SRV-WEB01, SRV-WS01, MicroTik LAN, Win Domain, Internet, SRV-EXCH01, MicroTik Figure 4-1 illustrates the current telecom configuration. Figure 4-2 illustrates the current LAN/WAN configuration. 1

13 AT&T Smart Jacks COX ISP Gateway INTERNET MicroTik Firewall PRIs AT&T ISP Gateway Catalyst 2950 Switch Remote VoIP Phone Equipped Agent PBX Server PBX Failover TeleContact TeleVNAT Servers Voice Recordings PBX TeleLEX Switch Remote VoIP Phone Equipped Agent Remote VoIP Phone Equipped Agent Remote VoIP Phone Equipped Agent Service Center Extensions and Agents Telecommunications Configuration Figure 4-1 The BenTec PBX system consists of a primary TeleSynergy PBX (TelePCX) server, a failover PBX serve, a TeleContact server (used to manage agent logins assignments and call statistics) and a TeleVNAT server used to support remote VoIP Extensions for remote agents. The BenTec PBX system currently has the ability to use up to 2 inbound PRI lines with failover -- or up to 3 PRI lines without failover. In addition to the primary PRI lines, BenTec currently uses 2 dedicated toll free outbound VoIP lines provided by CommPartners Connect and can increase the number of toll free outbound lines to a total of 12 with failover or 24 without failover. Additionally, in times of emergency we have a standard business line (currently used with our central FAX) that can be used for voice communications. 2

14 COX ISP Gateway MicroTik Firewall Sapulpa AT&T ISP Gateway Public Internet Sapulpa to Tulsa Connect Static VPN MicroTik Firewall Tulsa Connect Catalyst 2950 Switch Catalyst 2900 Switch SRV-SQL01 SRV-Web01 SRV-EXCH01 SRV-WEBVM01 SRV-WSVM01 SRV-FS01 SRV-NOC01 SRV-TS01 DEV-SQL01 SRV-SQLVM01 SRV-EXCHVM01 SRV-NOC02 SRV-DC01 SRV-WS01 TelePBX(prime) TelePBX(2) TeleVNAT TeleContact SRV-NOC03 Catalyst 2950 Switch Catalyst 2900 Switch Service Center PCs and Printers LAN/WAN Configuration Figure 4-2 BenTec maintains two server system sets. One set consists of a series of servers located at the remote TulsaConnect collocation facility and a virtualized set of servers located at the Sapulpa corporate office site. The primary production SQL server and the primary Exchange server are replicated to VMware virtualized servers located at the Sapulpa corporate office as shown in figure 4.2 above. Level-1 Recovery Guidelines - Relocation Finding a site for re-location during a disaster that has the necessary telecommunication connections can be the major limiting factor to quick resumption of business. In the event of a widespread emergency, a suitable site might be unavailable for weeks. BenTec will address this vulnerability by implementing an emergency distributed service center approach. This approach will allow enrollment specialist to work from any internet equipped location as long as the employee has a telephone and computer. BenTec web servers and PBX servers will need to be configured in an emergency location (such as the remote Tulsa Connection location or one of the remote BenTec Divisions). 3

15 CUSTOMER LOCATION EMERGENCY LOCATION RACK Telephone POTS Public Phone Providers MicroTik Firewall PBX Systems Computer Public ISP Providers Catalyst 2900 Switch Telephone VoIP SERVICE CENTER AGENT WORKS FROM HOME OR ANY LOCATION WITH INTERNET ACCESS SRV-SQL01 SRV-Web01 SRV-EXCH01 SRV-DC01 SRV-WS01 Computer Distributed Service Center Figure 4-3 Figure 4-3 illustrates the distributed service center approach envisioned for BenTec. Depending on the specifics of any emergency requiring the emergency operations we may use a combination of approaches for operation. If we are able to locate and distribute VoIP phones for our agents, then those agents could operate from their homes or any other suitable work site provided that that work site had Internet access. Each employee would simple take their IP Phones and login to the emergency rack PBX via VoIP in a fashion similar to normal day-to-day operations. However, if sufficient VoIP phones could not be located, we will update our enrollment web site to request a callers name and phone number. The web site would then notify an available CSR by to call the employee's number. Once communication between employee and CSR was established, the enrollment would continue as normal. The advantages to this distributed system are that: 1. Costly and perhaps unavailable telecommunications lines and PBX switches are not needed and 2. Enrollment Specialists can be located anyplace with adequate internet access -- even at home. The Enrollment Specialist only needs a computer, a phone line, and broadband Internet connection. Perhaps the biggest advantage is the speed at which this solution can be implemented. Switching to a distributed service center could be accomplished within hours with proper preplanning and pre-positioned equipment. Currently we have two sets of hardware. Physical servers located remotely at Tulsa Connect and virtualized servers located locally at Sapulpa. Local SQL servers and Exchange servers are continuously updated from the remote server via replication. 4

16 Level-2 Incident recovery guideline In Place Recovery A level-2 incident response is mainly one of minimizing damage done to BenTec systems and restoring operations as soon as possible. In order for recovery to occur, as a minimum for over-the-phone enrollments, telecommunications and the local area network must be made operational. If these tasks cannot be accomplished in a reasonable time, Management would implement the distributed service center approach as outlined in Level-1 Incident response guideline. During a level-2 incident we will take appropriate action to minimize damage to our facilities and systems. If appropriate, power will be shut off to equipment. Onsite backup tapes and disks will be removed and sent offsite immediately. Any equipment that might suffer water damage will be covered with plastic sheets as soon as power has been removed. Steps will be taken to ensure personnel safety. After a level-2 incident, vendors will be contacted and replacement systems located, priced, and delivery times determined as quickly as possible. Replacement equipment times and costs will be communicated to the IT Emergency Recovery Team as soon as cost and lead times are available and will be maintained and updated by the DNO during recovery operations. Plans for a level-2 incident will include complete documentation of all systems, copies of all installed software and regular backups. Copies of all documentation and backups will be maintained offsite in an easily accessible location (the homes of Dwight Pierce and Allen Beaird). Level-3 Incident recovery guideline In Place Recovery Level-3 incidents differ from level-2 and level-4 incidents in terms of damage done and expected recovery times. Level-3 incident recovery will always be done in place and completed in 72 hours. The following steps will be taken for level-3 incidents as appropriate: a. In the event of commercial power failure (system is on internal batteries only), systems will be shut down in an orderly fashion d as soon as possible to avoid data loss. (Recent Examples: NONE) b. In the event of equipment failure, the VP for IT in conjunction with the Network Engineer and outside consultants as required will ascertain the amount of replacement equipment required, costs, and lead times. The VP for IT will notify the president as soon as cost and lead times are available. (Recent Examples: PBX RAID failure) c. In the case of viral attacks, the network will be sub-divided and cleared section by section. Anti Virus vendors will be contacted and appropriate actions taken. (Recent Examples: NONE) 5

17 d. In the case of denial of service attacks, the Network Engineer will notify ISPs and failover to an alternative IP range. The Network Engineer will continue to monitor and review the situation. In extreme cases we may terminate internet access until the source of the attacks can be located and defeated. (Recent Examples: NONE) e. In the case of loss of internet or telecommunications lines, notify 3 rd party suppliers as quickly as possible. (Currently we have redundant ISP providers both at Sapulpa and at Tulsa Connect - We have Voice lines available to us from AT&T and via VoIP from CommPartners Connect. We also have the option of redirecting our phone numbers to one of the remote BenTec divisions in case of an extreme emergency.). Recovery plans for a level-3 incident will include reliable backup procedures antivirus programs and updates, maintaining OS and software updates, and staying abreast of security advisories pertaining to installed hardware and software. Level-4 Incident recovery guideline In Place Recovery Level-4 incidents are important for two reasons. First, careful analysis of the incident may provide means to avoid level-2 or level-3 incidents from occurring. Second, level-4 incidents may provide important vendor timelines that should be incorporated into the recovery procedures. Although level-4 incidents by definition do not stop production, they do pose a threat to the safety of company computer resources and data assets. A virus that is not automatically dealt with by the anti virus program, an attack on a web server, unauthorized disclosure of client data, disk driver errors, or hardware overheating are all examples of a potential level-4 incidents. Level-4 recovery procedures must include procedures to maintain good backups and up to date antivirus programs, keep all systems upgraded, and staying abreast of all security advisories pertaining to installed hardware and software. 6

18 ATTACHMENT 1 EMERGENCY CONTACT LIST Sr. Officer Contacts Work Cell Dwight Pierce Div. 1 - CCH - Bob Heffernan Div. 2 - BSG - Phyllis Stoll Div. 3 - WBS - Hunter Whittington Div. 4 - GAR - Marvin McKinney Div. 5 - BSC - Randy Wood Div. 6 - AWI - Jim Barrett Div. 7 - RCI - John Richter Div. 8 - VRG - Ryan Rich Div. 9 - PA - Josh Spivak IT Personnel Work Cell Allen Beaird Brad Armstrong Maria Gee Shawn Norton Briggs Hinton Sapulpa Police Dept Sapulpa Fire Dept Creek County Ambulance Creek County Sheriff St. John-Sapulpa Hospital

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

VitalPBX. Hosted Voice That Works. For You

VitalPBX. Hosted Voice That Works. For You VitalPBX Hosted Voice That Works For You Vital Voice & Data s VitalPBX VVD Hosted PBX solutions provide you with the stability of a traditional telephone PBX system and the flexibility that only a next

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Everything You Need to Know About Network Failover

Everything You Need to Know About Network Failover Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know

More information

Complete Managed Services. Proposal for managed services for the City of Tontitown

Complete Managed Services. Proposal for managed services for the City of Tontitown Complete Managed Services Proposal for managed services for the City of Tontitown Complete Managed Services Components Windows Server 2008, Windows Server 2012 1. Proactive Maintenance of Server(s) Proactive

More information

Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com

Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com 1 1.1 Introduction 1.2 Purpose 1.3 Priorities 2.1 About your business 2.1.1 Business

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits

More information

Phone System Replacement RFP Addendum 2 - Questions and Answers

Phone System Replacement RFP Addendum 2 - Questions and Answers Phone System Replacement RFP Addendum 2 - Questions and Answers Vermont Electric Cooperative 11/5/2014 Q1: Does VEC plan to purchase the system outright or are you looking to lease it? A1: VEC is planning

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.

More information

VoIP Survivor s s Guide

VoIP Survivor s s Guide VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the

More information

ManageEngine Desktop Central Training

ManageEngine Desktop Central Training ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview

More information

Disaster Recovery Hosting Provider Selection Criteria

Disaster Recovery Hosting Provider Selection Criteria Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008 Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the

More information

Office of Information Technology Hosted Services Service Level Agreement FY2009

Office of Information Technology Hosted Services Service Level Agreement FY2009 Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Web Site and Email Hosting Business Resumption Contingency Plan

Web Site and Email Hosting Business Resumption Contingency Plan Web Site and Email Hosting Business Resumption Contingency Plan Table of Contents SECTION I OVERVIEW... 1 Definition... 1 Goals of the Plan... 1 Scope of the Plan... 2 Overall Policies/Procedures... 2

More information

Program: Management Information Systems. David Pfafman 01/11/2006

Program: Management Information Systems. David Pfafman 01/11/2006 Effective 04/20/2005 Page - 1 - POLICY: PURPOSE: It is the policy of to provide a plan to insure the accessibility of protected health information (PHI) in the event of data loss due to an emergency or

More information

VIII. Deployment Schedule

VIII. Deployment Schedule VIII. Deployment Schedule Project Management Process & Project Team Project Management Process BetterWorld will prepare a detailed project plan with specific tasks, milestones, and estimated completion

More information

Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan

Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Revision History REVISION DATE NAME DESCRIPTION Draft 1.0 Eric Wimbish IT Backup Disaster Table of Contents Information

More information

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref: SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,

More information

Toronto Public Library Disaster Recovery recommended safeguards and controls

Toronto Public Library Disaster Recovery recommended safeguards and controls BCE Security Solutions Restricted Attachment 1 Toronto Public Library Disaster Recovery recommended safeguards and controls Final Prepared by: Bell Security Solutions Inc. Professional Services 333 Preston

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Real Time Monitoring: Features, Functions & Benefits. Technology for the way you do Business!

Real Time Monitoring: Features, Functions & Benefits. Technology for the way you do Business! Real Time Monitoring: Features, Functions & Benefits Technology for the way you do Business! Features, Functions & Benefits - 24x7 s Windows Services s s every 5 or 15 minutes to ensure Windows services

More information

Security Policy for External Customers

Security Policy for External Customers 1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration

More information

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab

More information

Offsite Disaster Recovery Plan

Offsite Disaster Recovery Plan 1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Backup and Redundancy

Backup and Redundancy Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down

More information

OKHAHLAMBA LOCAL MUNICIPALITY

OKHAHLAMBA LOCAL MUNICIPALITY OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION

More information

Managed Information Technology Services For the Town of Moraga

Managed Information Technology Services For the Town of Moraga Request for Qualifications Managed Information Technology Services For the Town of Moraga Deadline for Submittal: Wednesday, December 5, 2012 No later than 2:00 p.m. Prepared by: Stephanie Hom Administrative

More information

IT Disaster Recovery Plan Template

IT Disaster Recovery Plan Template HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned

More information

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

APPENDIX 7. ICT Disaster Recovery Plan

APPENDIX 7. ICT Disaster Recovery Plan APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 15 th October 2013 Signed: Chair of Governors Date: Ratified: Oct 2013 Review: Sep

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...

More information

Citizen Machinery UK Ltd

Citizen Machinery UK Ltd JOB TITLE IT Support Engineer REPORTING TO European Business Systems Manager JOB PURPOSE Citizen Machinery UK Ltd is the Western Europe sales and support hub for the market leading ranges of Cincom sliding

More information

Are there limits on the number of years the district would agree to under contract? Please See RFP

Are there limits on the number of years the district would agree to under contract? Please See RFP Can you break out and identify how many are to be installed per location and what flavors of each? The following counts are approximate and the District will reserve the right to add/remove counts during

More information

Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc.

Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc. Agreement for IT Assessment Assessment Recommendation Statement of Work Onboarding Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc. TABLE OF CONTENTS INTRODUCTION 3 UNDERSTANDING

More information

H.I.P.A.A. Compliance Made Easy Products and Services

H.I.P.A.A. Compliance Made Easy Products and Services H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 Info-HIPAA@prevare.com 877-232-9191 Dear Health Care Professional,

More information

How To Secure A Remote Worker Network

How To Secure A Remote Worker Network Key Steps to a Secure Remote Workforce Telecommuting benefits the employee and the company, the community and the environment. With the right security measures in place, there s no need to delay in creating

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This Service Level Agreement (SLA) is provided by ECS and is intended to define services and responsibilities between ECS and customer. ECS along with contracted 3 rd party partners

More information

Telecommunications Disaster Recovery and business continuity Services. copyright 2006 Corpotel, inc www.corpotel.com / 1 877 4205111

Telecommunications Disaster Recovery and business continuity Services. copyright 2006 Corpotel, inc www.corpotel.com / 1 877 4205111 Telecommunications Disaster Recovery and business continuity Services CorpoTel Services Our portfolio of services in MIS and Telecom can greatly assist your company We have provided disaster planning and

More information

Comparing Three Solutions

Comparing Three Solutions Melissa Swartz, Swartz Consulting Elizabeth English, EE and Associates Comparing Three Solutions Case studies of live sample projects May or may not have been implemented with most redundant configurations

More information

ICT Disaster Recovery Plan

ICT Disaster Recovery Plan 7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

North Street Global, LLC. Business Continuity Plan

North Street Global, LLC. Business Continuity Plan Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve

More information

Sentinel Platform/Managed IT Services Agreement Page 1 of 6. 1. Term of Agreement

Sentinel Platform/Managed IT Services Agreement Page 1 of 6. 1. Term of Agreement Page 1 of 6 1. Term of Agreement This Agreement between, herein referred to as Client, and Word of Mouth Computers and Electronics, LLC hereinafter referred to as Service Provider, is effective on the

More information

GSN Cloud Contact Centre Availability & DR Datasheet

GSN Cloud Contact Centre Availability & DR Datasheet GSN Cloud Contact Centre Availability & DR Datasheet Commercial in Confidence Reference: GSN CCC - Availability Version: 1.1 Global Speech Networks Pty Ltd Level 8, 636 St Kilda Road Melbourne, Victoria

More information

Network Documentation Checklist

Network Documentation Checklist Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

INFORMATION SECURITY PROGRAM

INFORMATION SECURITY PROGRAM Approved 1/30/15 by Dr. MaryLou Apple, President MSCC Policy No. 1:08:00:02 MSCC Gramm-Leach-Bliley INFORMATION SECURITY PROGRAM January, 2015 Version 1 Table of Contents A. Introduction Page 1 B. Security

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

LOCATION SCHEDULE E. Location Service Address. City of Romulus Fire Station #4 28777 Eureka Road Romulus, Michigan 48174

LOCATION SCHEDULE E. Location Service Address. City of Romulus Fire Station #4 28777 Eureka Road Romulus, Michigan 48174 LOCATION SCHEDULE E Location Service Address City of Romulus Fire Station #4 City of Romulus Wayne County, Michigan Finance Department Lynn A. Conway, Purchasing Agent 734-955-4568 lconway@ci.romulus.mi.us

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

Enterprise K12 Network Security Policy

Enterprise K12 Network Security Policy Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS

SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under

More information

JOB OPENING. Please see attached Job Description: Last day to apply: February 27, 2013

JOB OPENING. Please see attached Job Description: Last day to apply: February 27, 2013 JOB OPENING Position: Reports To: Manager of Technology Operations Location: Aledo Position Requirements: Associate s degree in computer science or electronics and/or certification such as MCSE, CNE, A+,

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au info@ezims.com.au

More information

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit) IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying

More information

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Vermont College of Fine Arts Information Technology Disaster Recovery Plan for Fiscal Year 2012

Vermont College of Fine Arts Information Technology Disaster Recovery Plan for Fiscal Year 2012 Vermont College of Fine Arts Information Technology Disaster Recovery Plan for Fiscal Year 2012 Introduction: Vermont College of Fine Arts (VCFA) is a national center for education in the arts, fostering

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Amendment No. 2. # J03B3400011 MPA Help Desk Support Management. 2) The following language in section 2.11 of the TORFP shall be deleted:

Amendment No. 2. # J03B3400011 MPA Help Desk Support Management. 2) The following language in section 2.11 of the TORFP shall be deleted: Amendment No. 2 # J03B3400011 MPA Help Desk Support Management I. Deadline 1) The deadline for submission of proposals has been extended to October 21, 2013 at 2:00 P.M. Eastern Time. II. Amendment to

More information

Configuring High Availability for Embedded NGX Gateways in SmartCenter

Configuring High Availability for Embedded NGX Gateways in SmartCenter Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008 Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and

More information

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")

More information

Business Continuity Management and The Extended Enterprise

Business Continuity Management and The Extended Enterprise WHITE PAPER Business Continuity Business Continuity Management and The Extended Enterprise Continuous Availability in a Real-Time Economy Business Continuity is receiving a great deal of attention in the

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION Manvi Sharma CFS-SA-Bladelogic HIGH AVAILABILITY High availability is a system design approach and associated service implementation that ensures a prearranged level of operational performance will be

More information

CITY OF OAK CREEK VoIP Telephone System Addendum

CITY OF OAK CREEK VoIP Telephone System Addendum CITY OF OAK CREEK VoIP Telephone System Addendum Important Dates: RFP Documents available April 24 th, 2015 Pre Bid Walkthrough None Last Day for Questions May 6th, 2015 4:00 p.m. CST Last Addendum Issued

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to

More information

About Backing Up a Cisco Unity System

About Backing Up a Cisco Unity System CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues

More information

FIREWALL POLICY November 2006 TNS POL - 008

FIREWALL POLICY November 2006 TNS POL - 008 FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and

More information

GTS Software Pty Ltd. Remote Desktop Services

GTS Software Pty Ltd. Remote Desktop Services GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009!

Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009! Disaster Recovery Review FREE Promotional Offer Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009! This review is designed to help the small business better

More information

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with

More information

Quick-Start Guide. solo gateway

Quick-Start Guide. solo gateway Quick-Start Guide solo gateway Congratulations on your purchase of solo gateway! Your solo is a product of cutting-edge technology, ready to satisfy your needs and help your business be more efficient

More information