RSS Cloud Solution COMMON QUESTIONS

Size: px
Start display at page:

Download "RSS Cloud Solution COMMON QUESTIONS"

Transcription

1 RSS Cloud Solution COMMON QUESTIONS 1

2 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups Contact

3 Services What is included in the Service? The complete RightSize Solutions Cloud solution provides your with a customized Cloud based infrastructure. The Cloud Infrastructure can and usually is interconnected to your local office(s). Combined with our sophisticated infrastructure we provide expert technology support professionals who know and understand your business. With RightSize Solutions, you get your own Technology Department and custom Technology Infrastructure. What is not included in the Service? RightSize Solutions provides nearly all of our services as part of the Cloud Service. There are a couple of additional services available, entirely at your option: Anti-Virus protection for your local devices. RightSize Solutions utilizes Trend Micro s award winning anti-virus to protect your local devices. RightSize Solutions sells this software per device for a flat monthly fee, which provides tremendous flexibility for you as you can add and/or remove devices from the program on a monthly basis. Encrypted As an additional service, RightSize Solutions can provide an enhanced infrastructure which includes encrypted . This service is provided on a per user basis and can be turned on and off at any time. Users of this service can encrypt a single and/or can be encrypted based on customized policy rules. For more details, please click RightSize Solutions Encrypted . and Social Media Archiving 3

4 Can I just use your backup service? No. RightSize Solutions only offers their backup service as part of their complete service. What is pricing based on? Pricing is based on: 1. Total Number of Users 2. Amount of Storage Required 3. Complexity of your environment What does a SAS70 Datacenter mean? Statement on Auditing Standards (SAS)70, is an internationally recognized audit standard developed by the American Institute of Certified Public Accountants (AICPA). A SAS 70 audit is widely recognized because it represents that a service or outsourcing organization has been through an in-depth audit of their control activities, which generally include controls over information technology and related processes. The RightSize Solutions datacenters are SAS 70 Type II certified and are currently undergoing certification for the new SSAE16 standard. Statement on Standards for Attestation Engagements number 16 (SSAE 16) is the new "attest" standard put forth by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA). For reporting periods ending on or after June 15, 2011, SSAE 16 will become the new standard for reporting on controls at service organizations, essentially replacing Statement on Auditing Standards number 70, simply known as SAS 70. What does a SSAE16 Datacenter mean? SSAE 16 Definition: Statement on Standards for Attestation Engagements (SSAE) No. 16 is an attestation standard put forth by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA) that addresses engagements undertaken by a service auditor for reporting on controls at organizations (i.e., service organizations) that provide services to user entities, for which a service organization's controls are likely to be relevant to a user entities internal control over financial reporting (ICFR). SSAE 16 effectively replaces Statement on Auditing Standards No. 70 (SAS 70) for service auditor's reporting periods ending on or after June 15, Two (2) types of SSAE 16 reports are to be issued, a Type 1 and a Type 2. Additionally, SSAE 16 requires that the service organization provide a description of its "system" along with a written assertion by management. I have several non-microsoft Applications (PortfolioCenter, Junxure, Quickbooks...) who owns the applications? RightSize Solutions provides Microsoft applications such as Office as part of the Cloud solution. All non- Microsoft applications remain the property of the client. RightSize Solutions may purchase and own third party software licenses that are required to support the infrastructure or specific functionality. Can I resell the RIGHTSIZE Solutions Cloud to my customers? Yes. RightSize Solutions has a program that can provide a secure Cloud solution for your clients. 4

5 Will RightSize Solutions host my Web Site? RightSize Solutions only hosts Intranet Web Sites used by users of your Cloud environment. RightSize Solutions strongly recommends that your public facing Web Site be hosted by a national provider such as Network Solutions or GoDaddy. This approach limits public traffic to the RightSize Solutions datacenters. Can I rent servers and/or rack space from RightSize Solutions? No. RightSize Solutions has architected a secure environment specifically for the purpose of providing custom Cloud solutions to you. Is Anti-Virus Protection provided? Yes, Anti-Virus protection is provided for all Servers within the Cloud environment. We strongly recommend that local machines also be protected. RightSize Solutions provides (as an option) Anti- Virus software for your local devices for a nominal monthly fee. How many users can I have in my RightSize Solutions Cloud? Unlimited. RightSize Solutions supports clients of all sizes, large, and small. Connectivity What kind of speed can I expect using the RightSize Solutions Cloud? Speed in any cloud solution depends on your local connection to the internet (Bandwidth) and the number of users that will be connected to the Cloud Solution. It has been said that the more bandwidth you have the better a Cloud Solution will perform. That can be true but it is also greatly simplified. The RightSize Solutions Cloud Solution mainly utilizes Microsoft s Remote Desktop Protocol (RDP). In most scenarios, RDP s bandwidth usage is very low (on the order of Kbps per user depending on the application being utilized). RDP will require more bandwidth for Graphic intensive applications like High Graphic Animated PowerPoint Presentations, AutoCad, and Browsers showing Streaming Graphics, Video or Sound. Other factors impacting bandwidth utilization can be Scanning, Printing and local internet activity such as streaming music and videos. In most cases, scanning and printing have a minimal impact on bandwidth. However, large scan or print jobs can consume larger amounts of bandwidth. RightSize Solutions has numerous ways of resolving these issues without necessarily having to increase bandwidth. In many cases, RightSize Solutions has been able to assist clients in upgrading their Internet ++Connection. Often, we have been able to lower the cost of these connections and/or provide redundant solutions for a modest monthly increase. What happens if I lose my local internet connections? If you do not have connectivity to the Internet, you will not be able to access your Cloud Environment. RightSize Solutions works closely with each client to define their policies and procedures to assist in such events. Solutions range from redundant internet connectivity solutions (including multiple carriers and 3/4G wireless solutions) to alternate site availability such as public domains and home based access. 5

6 What devices can I use to connect to my Cloud? Any device that can support a RDP or RDC (Apple, Linux, ios and Android) client software. All current releases of Windows come with a robust RDP client. The Windows RDP client typically provides the most functionality for the user. List of Current Devices accessing the RightSize Solutions Cloud include: 1. Any Windows machine running Windows 7 Pro or higher 2. Thin Clients Wyse and HPLinux Devices 3. Any Linux based device with an RDC client loaded 4. Any Apple device that supports an RDC client (Most can be downloaded for Free) 5. ios and Android using the Microsoft RDP App. Support How do I get support? You may contact RightSize Solutions by: Creating a Help Desk Ticket Calling our support line and selecting Option 2 Sending an to Helpdesk@RightSizesolutions.com What does Support cost? Nothing. Support is included with the RightSize Solutions Cloud Solution. A team of professionals, who knows your business, is working to help you realize the full potential of your technology. Do I need local IT Support? Most of our clients do not require local support. In cases where local support is required, we work with vendors of your choice and/or with mutually approved providers. When third parties are utilized to provide support, RightSize Solutions does not markup services of local providers. What do I do if I need to turn off access for a user? Simply contact RightSize Solutions Support via: , Phone, or Help Desk Ticket. Regardless of how you desire to contact RightSize Solutions, a Help Desk Ticket will be generated to track your request. 6

7 Implementation Can I share files between multiple offices? This is inherent in the RightSize Solutions Cloud Solution. Regardless of your location, your private custom Cloud solution provides access to your approved applications and data. Simply save your files in the appropriate folder and those with access to the folder can share the contents of that folder from anywhere. How do I migrate from my current system to the RightSize Solutions Cloud? RightSize Solutions will manage the entire migration and on-boarding process. In general, while your custom Cloud environment is being built, RightSize Solutions securely collects your data and moves it to your new custom environment. Data is then synchronized between your current production environment and your Cloud environment until you are ready to utilize your environment. You have as long as necessary to review your new environment. RightSize Solutions works with you to train your resources on the new environment. Once you are satisfied with the new Cloud environment, we schedule the actual implementation. We typically recommend that you do the migration over a weekend to minimize disruption to your day to day operations. This allows the synchronization of your files and the migration of your during nonbusiness hours. How long does it take to implement the RightSize Solutions Cloud? There is no typical time frame to implement a custom Cloud solution. Some of our clients have been implemented in a matter of days while others have taken several weeks. There are many factors involving the implementation of a custom Cloud solutions but that being said, 6 to 8 weeks depending on the number of users, complexity of the client s environment and the availability of client resources to test their new environment. Do I have to upgrade my current PC to access my RightSize Solutions Cloud? Not typically. All Windows 7 based machines work out of the box. Windows XP and Vista machines are no longer supported. All of our services are backed with a 100% guarantee. 7

8 Security Can I use one logon for more than one user? Yes. However, RightSize Solutions specializes in regulated industries such as Financial Services and Private Healthcare. Upon written request from a client, RightSize Solutions will support a generic logon to be utilized by multiple individuals but does not recommend this approach as it is not compliant with normal security requirements for most financial service or private health care organizations. Additionally, only one user can use the generic login at a time. Is my Cloud solution private? Yes. A complete private Virtual Infrastructure is built for each RightSize Solutions Cloud client. Each client is assigned a unique private access service, private server, data infrastructure, and firewalled sub-network. How can I control access to certain file folders? RightSize Solutions utilizes Microsoft s technology called Access Based Enumeration (ABE). This technology minimizes the use of Mapped Drives. This simplifies the environment for the user by minimizing the number of mapped drives the user has to search to find their documents. ABE filters shared folders visible to a user based on that individual user s access rights, preventing the display of folders or other shared resources that the user does not have rights to access. End users see only what files and folders they need for their responsibilities rather than spending time looking through lists of inaccessible folders and files. How does security work? To ensure security, RightSize Solutions creates a private Infrastructure for each client. Clients are assigned a unique private access service, private set of virtual servers, storage volumes and a private network. RightSize Solutions has implemented several security layers. The connection to your private environment is accomplished through either a Virtual Private Network (VPN) or MPLS private circuit and/or a secure connection (Transport Layer Security (TLS) /Secure Socket Layer (SSL)). RightSize Solutions establishes a secure connection by encrypting the communications between the client s end device and their private environment. Encryption protects against the risk of unauthorized transmission interception on the link between the Cloud and the client. By default, the connections are encrypted at (128-bit) encryption algorithm. Our clients connect to the RightSize Solutions infrastructure through an encrypted SSL connection. Our front end infrastructure then controls connection to your private environment through another layer of encryption. Depending on the client s requirements we can customize specific access policies that can include access time restrictions. As an option we can also provide two factor authentications. This is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. Two factor authentications imply the use of two independent means of evidence to assert an entity, rather than two iterations of the same means. Something one knows, something one has and something one is are useful summaries of three independent factors. This option has been available for several years but few of our clients have found it necessary to use. Additionally, RightSize Solutions utilizes Microsoft s Active Directory Services for user Authentication. This provides the primary authentication method and also provides the means by which to restrict access to applications and data. 8

9 Applications How can I print to my local printers? The RightSize Solutions Cloud solution provides two methods of printing to local devices. For personal printers configured on local PCs, such as USB based printers, RightSize Solutions utilizes Microsoft s Easy Print technology to automatically detect and redirect print request generated by Cloud based applications to your printer. For LAN based or IP based Printers, RightSize Solutions establishes a Virtual Private Network (VPN) with your local network and defines the network printers in your Cloud environment. This enables you to directly connect your large network printers, scanners and fax machines with your custom RightSize Solutions Cloud Solution. Can I scan a document into my file system in the Cloud? Yes. RightSize Solutions supports both Network based scanners as well as scanners locally attached to your PCs. Scanners must support TWAIN or WIA drivers. Will my core business applications work in the Cloud Solutions? RightSize Solutions can support most Windows based applications and all WEB based applications. There are only a few Windows applications that RightSize Solutions suggests not running in a Cloud environment, such as; applications that are video intensive like AutoCAD, animation, and video streaming. What CRM Systems are supported? RightSize Solutions will support the CRM of your choice. Can I move non-windows based applications to the RightSize Solutions Cloud? No, currently we only support Windows and Web based applications. How do I share files between multiple offices? This is inherent in the RightSize Solutions Cloud Solution. Regardless of your location, your private custom Cloud solution provides access to your approved applications and data. Simply save your files in the appropriate folder and those with access to the folder can share the contents of that folder from anywhere. Backups How do backups work? The status of individual client backups are recorded in a Backup Report and available for review by the clients via a client specific web site. RightSize Solutions also has procedures in place to monitor backups on a daily and monthly basis for valid execution. RightSize Solutions support resources are notified of the status of all backups via . RightSize Solutions manages 3 levels of backups. The daily backup is run every day at an appropriate time. Continuous backups are run throughout the day. These backups ensure that even if a file is deleted it will remain in the archive indefinitely. Additionally, RightSize Solutions provides 2 snapshots throughout the day that provides up to 10gigabytes of archived file versions. This enables you to restore versions of files on an intra-day basis. Additionally, RightSize Solutions ensures that clients have access to their archived backups without RightSize Solutions assistance. 9

10 Can I just use your service for ? Yes. Can I access my calendar, contacts and on my phone and tablet? Yes. RightSize Solutions has implemented Microsoft s Exchange technology. Any device that can connect to the RightSize Solutions Exchange environment will be able to see their , contacts, and calendar. RightSize Solutions Support team will assist you with configuring your device. Also, with proper authentication, a user can access their , calendar and contacts from a browser. Can I send encrypted ? Yes. As an option any user may send an encrypted directly to the recipient(s) inbox. A key advantage of using the RightSize Solutions Secure Registered solution is that the sender will receive legal proof that the was delivered. Will the RightSize Solutions Cloud system archive all of my ? Yes. As an optional service, RightSize Solutions automatically archives ALL for your organization. This enables users to easily maintain their inboxes with confidence. Simple and complex searches are available. For many of our clients, archiving is not just an easy way to manage their but it is a regulatory requirement. Our archive system is designed to help your company comply with archiving legislation such as the Sarbanes Oxley act (SOX), Gramm-Leach Bliley act (GLBA) and the Freedom of Information act (FOIA). Can be sent to a third party system for archiving and audit purposes? Yes. For several of our clients, regulatory compliance mandates that a third party provide archiving and monitoring. Our system can simply journal all s to such a third party. What happens to my current when I implement the RightSize Solutions Cloud? Each implementation is customized to your requirements. In general, recent , all received in the last 30 days, are stored in a Personal Archive file known as a PST file. Your recent along with your calendar events and contacts are imported into your new Exchange database. Your archived is available to you through the Outlook application. 10

11 About RightSize Solutions RightSize Solutions, LLC was established in 2003 to help small to mid-sized organizations leverage technology in order to assert a competitive advantage and achieve their desired business goals. Having worked extensively in the Financial Services and Healthcare sectors, we understand your industry environment, rigorous regulatory requirements and the role technology plays in the success of your business. We provide a hybrid solution of world-class cloud technology and client-centered IT services that result in reduced costs, increased efficiency and the reliable security of all your systems and data. How to Contact Us The professionals at RightSize Solutions can be contacted at: Phone: (Option 7) info@rightsize-solutions.com Online: THE BOTTOM LINE? RightSize Solutions Is Your Complete IT Department. 11

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

GTS Software Pty Ltd. Remote Desktop Services

GTS Software Pty Ltd. Remote Desktop Services GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...

More information

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc. with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications

More information

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink

More information

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc. Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Compulink Advantage Online TM

Compulink Advantage Online TM Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide

Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide Table of Contents 1. DEFINITIONS... 3 2. SCOPE OF SERVICES... 3 3.1 HVD... 4 3.2 WEBHVD... 4 3.3 HVS... 4 3.4 STORAGE D3...

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Software Update Bulletin

Software Update Bulletin Introducing SendSuite Tracking February 2010 Purpose This bulletin is released to advise SendSuite Tracking users of the new features, enhancements, and improvements in the evolution of the Internal Tracking

More information

How To Use Outlook On A Virtual Desktop On A Pc Or Macbook

How To Use Outlook On A Virtual Desktop On A Pc Or Macbook Virtual Desktop Frequently Asked Questions 1. How do I download the VMWare agent? 2. I downloaded the client from another computer. Why don t I see the shortcut on the desktop of this computer? 3. How

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

VIRTUAL Desktop FAQ about Paperless Knowledge Service Offerings

VIRTUAL Desktop FAQ about Paperless Knowledge Service Offerings VIRTUAL Desktop FAQ about Paperless Knowledge Service Offerings How does Hosted Desktop work? The hosted desktop means that it is run; delivered and supported from a central location; usually a secure

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

FAQ Answers to frequently asked questions relating to the security, protection and redundancy of images stored in the Eclipse Data Center

FAQ Answers to frequently asked questions relating to the security, protection and redundancy of images stored in the Eclipse Data Center FAQ Answers to frequently asked questions relating to the security, protection and redundancy of images stored in the Eclipse Data Center Mosaic Corporation ECLIPSE DATA CENTER Eclipse 3 Data Center FAQs

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Memeo C1 Secure File Transfer and Compliance

Memeo C1 Secure File Transfer and Compliance Overview and analysis of Memeo C1 and SSAE16 & SOX Compliance Requirements Memeo C1 Secure File Transfer and Compliance Comply360, Inc Contents Executive Summary... 2 Overview... 2 Scope of Evaluation...

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080

Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080 Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

Hosted Exchange Services Email

Hosted Exchange Services Email Email Hosted Exchange Email 1 2 Hosted Exchange Services 2 Hosted Exchange Email Where security, availability and professional image all meet together. There are few business decisions that can be as quick

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

AlwaysMail. Sector 5. Cloud E-Mail

AlwaysMail. Sector 5. Cloud E-Mail AlwaysMail Sector 5 Cloud E-Mail INDEX INDEX 2 SECTOR 5 COMPANY PROFILE 3 Background Company Name & Address 3 1. SECTOR 5 HOSTED E-MAIL OFFERING 4 2. MICROSOFT HOSTED EXCHANGE 5 3. HOW WE MIGRATE COMPANIES?

More information

Security Considerations

Security Considerations Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PERSONAL CLOUD BACKUP

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PERSONAL CLOUD BACKUP Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PERSONAL CLOUD BACKUP 5NINES 5NINES Data Centres Services Service Offered 5DRIVE - CLOUD BACKUP SERVICE with remote access

More information

The All-in-One Support Solution. Easy & Secure. Secure Advisor

The All-in-One Support Solution. Easy & Secure. Secure Advisor The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on

More information

HERO-DefendeRx & Secure-Cloud Overview

HERO-DefendeRx & Secure-Cloud Overview Failback/Restore-Should a failure occur, HEROware manages the Failback and Restore process for you. Please contact HEROware technical support to schedule your restoration process. HEROware s goal is simple,

More information

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware. VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda

More information

User guide Business Internet e-mail features

User guide Business Internet e-mail features User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

QHR Accuro EMR IT Hardware Requirements

QHR Accuro EMR IT Hardware Requirements QHR Accuro EMR IT Hardware Requirements Hardware Requirements for Accuro EMR Table of Contents Local Install Platform:... 3 Server Requirements:... 3 Workstation Requirements:... 4 Peripheral Requirements:...

More information

How To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn

How To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn Our Mission Statement To ensure that we are providing quality and efficient services and solutions that are consistent with the strategic goals of the Area, and that are closely aligned with the State's

More information

The Essential Security Checklist. for Enterprise Endpoint Backup

The Essential Security Checklist. for Enterprise Endpoint Backup The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing

More information

activecho Frequently Asked Questions

activecho Frequently Asked Questions activecho Frequently Asked Questions What are the benefits of activecho? activecho allows your organization to provide an on-premise, managed and secure alternative to Dropbox and other file synching and

More information

Compliance series Guide to meeting requirements of USGCB

Compliance series Guide to meeting requirements of USGCB Compliance series Guide to meeting requirements of USGCB avecto.com Contents Introduction to USGCB 2 > From FDCC to USGCB 3 > USGCB settings and standard user accounts 3 > Application compatibility 4 >

More information

LSGMI REMOTE DESKTOP SERVICES.

LSGMI REMOTE DESKTOP SERVICES. LSGMI REMOTE DESKTOP SERVICES. This Document is to describe the steps that you should follow in order to have a secured Remote Access to this Service. Requirements: Access to Remote Services is only supported

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Introducing Graves IT Solutions Online Backup System

Introducing Graves IT Solutions Online Backup System Introducing Graves IT Solutions Online Backup System Graves IT Solutions is proud to announce an exciting new Online Backup System designed to protect your data by placing it online into the cloud. Graves

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Access All Your Files on All Your Devices

Access All Your Files on All Your Devices d Access All Your Files on All Your Devices The Best Performance, Features and Price for Private cloud storage for all platforms Windows, Mac, Linux, ios, Android, Blackberry & more Enterprise Private

More information

WS_FTP: The smarter way to transfer files

WS_FTP: The smarter way to transfer files WS_FTP: The smarter way to transfer files DATA WEB PAGES IMAGES VIDEO GRAPHICS WS_FTP: A Complete and Secure Data Management Solution The files that you transfer every day over the Internet are vulnerable

More information

High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP

High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP March 2015 Splashtop Inc. 1/14 Table of Contents Table of Contents... 2 1. Situation Analysis... 3 1.

More information

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS 7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS ExecutiveBrief P a g e 1 Executive Brief 7 Questions You Need to Ask Before Choosing a Colocation Facility for Your Business Choosing

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol

More information

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client. Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...

More information

Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB

Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 sales@intermedia.net intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES:

BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES: BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES: Data Replication Exchange 2010 real-time data replicates to protect critical information in the event of a hardware failure or database corruption. Multi-tenant

More information

Persona Backup and OS Migration for insync Private Cloud 5.5. June 16, 15

Persona Backup and OS Migration for insync Private Cloud 5.5. June 16, 15 Persona Backup and OS Migration for insync Private Cloud 5.5 June 16, 15 Copyright Notice Copyright 2007-2015 Druva Inc. All Rights Reserved. Any technical documentation that is made available by Druva

More information

Cloud Store & Share Frequently Ask Questions

Cloud Store & Share Frequently Ask Questions Cloud Store & Share Frequently Ask Questions Where can I find information about the offer, e.g. the price list? How can I order the service? What is the Cloud Store & Share Client? Where can I download

More information

Maximize your Remote Desktop Services

Maximize your Remote Desktop Services Maximize your Remote Desktop Services White paper Parallels An Overview of Remote Desktop Services Virtualization has added new issues to information technology. Today, businesses look not only at optimizing

More information

SecureSend File Transfer Portal Usage Guide

SecureSend File Transfer Portal Usage Guide System Documentation 03/01/2012 SecureSend File Transfer Portal Usage Guide Recommended Usage Instructions and Frequently Asked Questions Jose Ruano, Stephen Weatherly TABLE OF CONTENTS EXECUTIVE SUMMARY...3

More information

Security, Reliability & Control with Hosted Exchange

Security, Reliability & Control with Hosted Exchange Hosted Applications Commonly referred to a Cloud Computing and/or Software-as-a-Service (SaaS), web-hosted software applications service provides you with a new way to get business software and applications

More information

Secure Email Services Training. Jeff Thon

Secure Email Services Training. Jeff Thon Secure Email Services Training Jeff Thon Agenda Sales Landscape Target Prospects Applications Competitive Landscape Product Definition Network Drawings/Architecture Demo Features/Benefits Sales Tools Collateral,

More information

Persona Backup & OS Migration

Persona Backup & OS Migration Persona Backup & OS Migration insync 5.4 Druva Software Table of Contents About this document... 3 Persona backup... 4 About persona backup... 4 Use of persona backup... 4 Availability... 5 Supported system

More information

36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate

36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate 1 RFP 14-001 Addendum 1. What version of AD - Forest Functional, Domain Functional, DC OS Version(s) - is currently deployed? Domain functional level Windows Server2008 Forest functional level Windows

More information

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops January 2015 Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops Executive Summary Physical desktop and notebook computer infrastructures no longer make sense for the corporate

More information

Hosted Desktop for Business

Hosted Desktop for Business Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation

More information

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected

More information

BUILT FOR YOU. Contents. Cloudmore Exchange

BUILT FOR YOU. Contents. Cloudmore Exchange BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering

More information

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere OneDrive for Business with Hosted SharePoint Secure UK Cloud Document Management from Your Office Anywhere Cloud Storage is commonplace but for businesses that want secure UK Cloud based document and records

More information

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser Kaseya Product Brief The Kaseya Platform Making your systems more secure, your staff more productive, your services more reliable and your results easier to validate. No matter what part of Kaseya s integrated

More information

HiDrive Intelligent online storage for private and business users.

HiDrive Intelligent online storage for private and business users. HiDrive Intelligent online storage for private and business users. Learn about our many product features! Contents 4 Everything, always and everywhere My file is your file Easy backup 5 Public folder Share

More information

Using TS-ACCESS for Remote Desktop Access

Using TS-ACCESS for Remote Desktop Access Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Secure File Delivery White Paper. Matthew Covington & Garth Robbins 07/15/2010. 2010, Smith Micro Software, Inc.

Secure File Delivery White Paper. Matthew Covington & Garth Robbins 07/15/2010. 2010, Smith Micro Software, Inc. Secure File Delivery White Paper Matthew Covington & Garth Robbins 07/15/2010 2010, Smith Micro Software, Inc. The Challenge Simply put, email was not designed for file delivery, and its limitations make

More information

Call Centers and the Cloud

Call Centers and the Cloud Call Centers and the Cloud 2 Call Centers and the Cloud Call centers may be one of the highest benefited industries from the cloud. Cloud computing has become an instrumental part within many different

More information

SMALL BUSINESS OUTSOURCING

SMALL BUSINESS OUTSOURCING SMALL BUSINESS OUTSOURCING PCs on Lease 24X7 Remote Supports Professional Fees Service Level Agreement SMALL BUSINESS OUTSOURCING (SMO) CONNECTING YOUR BUSINESS TO THE TECHNOLOGY RESOURCES YOU NEED Implement

More information

Introduction to Windows 7 (Brought to you by RMRoberts.com)

Introduction to Windows 7 (Brought to you by RMRoberts.com) Introduction to Windows 7 (Brought to you by RMRoberts.com) Note: Because of the number of screen captures needed to adequately explain this topic there have been some page breaks inserted to keep content

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

Volume. DATASOL BACKUP VAULT V4 User Guide

Volume. DATASOL BACKUP VAULT V4 User Guide Volume 1 DATASOL BACKUP VAULT V4 User Guide Utilizing the latest in cloud computing technologies, DataSol, Inc. has teamed with Amazon.com and SOS Online backup s award winning solutions to lead the marketplace

More information

Why Migrate from Citrix to Parallels?

Why Migrate from Citrix to Parallels? Why Migrate from Citrix to Parallels? On 3 March 2015, Citrix reviewed the lifecycle of XenApp and Presentation Server, confirming that the end of extended support for Windows Server 2003 will be on 24

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Get Started Guide for Admins

Get Started Guide for Admins Get Started Guide for Admins This Admin Guide will provide instructions for getting started with SecuriSync, provide tips for setting up your SecuriSync environment, and overview the superior management

More information

Audit4 Installation Requirements

Audit4 Installation Requirements Audit4 version 8.1+ 2015 Copyright 2012 S4S Pty Ltd Audit4 Support Matrix 2015 The following table provides details on the operating system and database engine support for Audit4 as at March 2015. Operating

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

MICROS Customer Support

MICROS Customer Support MICROS Customer Support Remote Access Policy MICROSCustomerSupport RemoteSupportAccessPolicy Adescriptionofthepoliciesandproceduresrelatingtoremoteaccesstocustomersystemsby MICROSCustomerSupportpersonnel.ThisdocumentalsoincludesMICROS

More information

How Should Your Organization Deploy Microsoft Exchange?

How Should Your Organization Deploy Microsoft Exchange? WHITEPAPER How Should Your Organization Deploy Microsoft Exchange? Choosing between Exchange Server on premises, Exchange Online in the cloud, and hybrid deployment options Introduction The purpose of

More information