Request for Proposals for Data Center/Mainframe Hosting Solution

Size: px
Start display at page:

Download "Request for Proposals for Data Center/Mainframe Hosting Solution"

Transcription

1 Request for Proposals for Data Center/Mainframe Hosting Solution PROPOSALS DUE: June 4, 5:00PM (PST) Provided to (Company): Accepted by (Representative):

2 Table of Contents Instructions... 2 Overview... 3 Purpose... 3 Requirements... 3 Respondents Business overview... 4 Questionaire... 5 Hardware... 6 Software... 6 Support... 7 Client Management... 8 Migration... 8 Disaster Recovery... 9 Facility Security Software applications currently in use: Pricing Request for Proposals for Data Center/Mainframe Hosting Solution Page 1

3 XyberNET Inc. Data Center RFP Instructions Deadline for submission of questions by candidates 05/24/2013 EOD (PST) Responses to questions to be returned no later than 05/28/ :00am (PST) An original proposal must be signed and delivered to the address below by 5:00pm (PST) on 06/04/2013. An electronic copy must also be ed to: Respondents may mail or deliver three (3) printed copies of their proposals to: XyberNET Scripps Ranch Blvd San Diego, CA XyberNET will review completed RFP responses during the week of June 4 th and contact selected candidate companies on June 10 th or June 11 th to schedule interviews. Interviews will be completed by June 21 st and final candidates will be selected by June 28 th. Contract negotiations will be conducted during the month of July. XyberNET will not be responsible for any Proposal(s) that is (are) lost in the mail or not delivered by the stated deadline for any reason. XyberNET is not held liable for any costs incurred by any respondents to this RFP, during the preparation or delivery of their responses. Costs incurred are the sole responsibility of the vendor. XyberNET reserves the right, at its sole discretion, to reject any/all Proposals or to cancel this RFP in entirety as determined to be in XyberNET s best interests. Any Proposal received which does not meet the requirements of this RFP, may be considered to be non responsive, and the Proposal may be rejected. Proposers must comply with all of the terms of this RFP and all applicable Federal, State and Local laws and regulations. XyberNET reserves the right, at its sole discretion, to waive any technicality in Proposals provided such action is in XyberNETs best interest. Where XyberNET waives minor technicalities in Proposals, such waiver does not modify the RFP requirements or excuse the proposing Firm from full compliance with the RFP. Notwithstanding any minor technicalities, XyberNET may hold any Firm to strict compliance with the RFP. Request for Proposals for Data Center/Mainframe Hosting Solution Page 2

4 Overview XyberNET is looking for the ideal outsourcing data center to meet both our current and future needs. XyberNET has been in business for over 30 years and is the leading provider of software and services to the insurance vertical. We specialize in, but are not limited to, products and support for credit insurance, debt protection and P&C business. Our client base is split between companies that license and install our software products in their own environments and those that utilize our software products through our Application Service Provider (ASP) services. XyberNET s business model includes licensing software, ASP services, annual maintenance agreements and a variety of professional services such as custom programming, training and consultation. We maintain a full staff of professionals that are available to do the various support work. For our ASP clients, we provide Production Control services as well. Overall, XyberNET has approximately 20 clients located throughout North America, with potential for additional international clients. We are looking for a business partner that can support us in both a production environment, servicing several clients, as well as a full development environment. Security and connectivity reliability are both crucial to our business as ours is a 24/7 environment. Our core software products run on an IBM mainframe, using Cobol, VSAM and DB2. We also have products that are run on SQL Server as well as ASP.NET web products. We are at a crossroads and are looking for a data center that wants to move forward with us. With less than 20 employees we are a small shop, but our client base includes some of the biggest names in the industries we support. We are currently on older releases of many of the software products we use, which is holding us back from some of the projects we have on our docket. We are looking for a well staffed, forward thinking, reliable and proven data center to support our needs. Purpose The purpose of this RFP is to determine whether or not the ideal business partner is out there and available to us. It is our desire to move to completion on this process within a 3 4 week timeframe, so, if you are interested in participating, we ask for quick turnaround from you. If you choose not to participate, please that information to us and return the RFP to our attention. Requirements XyberNet has long relied upon mainframe processors to conduct business for itself as well as its client base. Current mainframe processing is performed on an IBM z9 processor running OS release 1.7 in a single 100 MIP LPAR with a total memory of 4096M. System security is thru RACF. It should be noted that the current environment Request for Proposals for Data Center/Mainframe Hosting Solution Page 3

5 is no longer adequate for our needs, we are looking for a larger, faster environment closer to the 150 MIP range. XyberNet supports multiple ASP clients with client access to multiple CICS v2.3 regions, as well as TSO. In total there are 25 active CICS regions with another 16 regions which may be activated for special release level activities at any time. Clients access the system through secured VPN connections and/or TN3270 over the internet using SSL. XyberNet provides FTPS services to its client base and it is imperative that any new data center relationship provide this and other secured protocols to the mainframe. Client connectivity and online availability is critical to the success of this company. One critical aspect of this relates to the processing of client batch cycles during off hours. As such, XyberNet requires 24 hour production control and technical support from its vendor of choice. This includes the monitoring and notification of batch processing activities during second and third shifts to insure that all cycle activities and online systems are available to our clients by their specified time. XyberNET s DASD farm is approximately 2TB in size, this includes volumes specifically allocated for system services (HSM, VTS, SYSRES), development and client production environments. These environments are SMS managed. The tape farm consists of approximately 18,000 in house tapes, with the vast majority allocated to HSM and for offsite storage. XyberNET is very interested in pursuing a tapeless environment and the selected vendor must be able to accomplish the transition to this environment within 1 year. This would also involve the expansion of the current DASD farms for VTS, HSM and others to conform to the new structure. As part of this transition, XyberNET is also interested in the electronic transmission of critical production and system related files to a secured offsite storage location. Annually, XyberNET performs its Business Continuity testing. This testing includes not only validating our ability to perform functions in support of our development needs, but also functions related to the production support of our clients. We also invite our clients to participate in the testing of their environment during this period as well. This test normally occurs during the September to October timeframe (for a period of 2 days). It is preferable that the selected vendor have an established B.C. site to perform this testing. Respondents Business overview Please provide an overview of your business and the solutions you provide. Include all lines of business and a short description of each. Request for Proposals for Data Center/Mainframe Hosting Solution Page 4

6 Questionaire (We request that vendor candidates answers be as detailed as possible) 1. Define your corporate structure to include: a. Ownership structure of your company, including any parent companies. b. How many data centers to you have? c. Where are the data centers located? d. Where are your corporate headquarters located? 2. How long have you been in business as a data center? 3. How long has your data center, or data centers, been in their current locations? 4. How many data center related clients do you service? a. Please provide a breakdown of how long your clients have been utilizing your data center services. 5. What contract terms, in years, do you offer your clients? 6. What percentage of your clients renew their contracts for your services? 7. What percentage of your renewals are multiple year contract renewals? 8. How many clients do you provide combination mainframe and server based hosting services for; meaning they themselves are service providers to their clients? 9. Do you have existing clients that, in addition to developing mainframe applications, host these production applications and data for their client base on your systems? 10. What kinds of businesses do you support? 11. To what professional organizations do you belong? 12. How do you stay abreast of new ideas and current trends? 13. Are you an IBM business partner? a. If yes: i. What level? ii. Explain how your company complies with IBM standards iii. What requirements does your company fulfill in order to maintain its partner status, and how often? iv. How long has your company held Business Partner status? b. If no: i. Explain how your company complies with IBM standards? ii. Explain how your company leverages 3 rd party IBM partners in support of your clients? iii. What SLAs are in place to govern the relationship with your 3 rd party IBM partner(s)? iv. Does your company contact IBM directly for assistance or work solely through business partner(s)? 14. What technical certifications do you require your staff to obtain and maintain? 15. Please provide an overview of your current staff that would be supporting our business, broken down by primary functions. 16. What is your Full Time Employee to Contractor ratio? 17. Please provide your company s current Organizational Chart Request for Proposals for Data Center/Mainframe Hosting Solution Page 5

7 18. What data management and datacenter environment certifications does your company have? 19. Does your facility meet SAS70/SSAE16 requirements? a. Please explain b. How often do you complete SAS70/SSAE16 audits? 20. Does your facility meet ISO9000 requirements? a. Please explain 21. Is your facility PCI compliant? a. Please explain 22. Is your facility HIPPA compliant? a. Please explain. 23. Will you allow XyberNET or a XyberNET specified third party vendor to perform regularly scheduled audits for the purposes of validating adherence to mutually agreed upon SLAs for hardware, software, mainframe and network topology configurations and updates? 24. Are your facilities completely redundant? Hardware 1. Please describe your hardware maintenance philosophy related to mainframe, server and network appliances. 2. Please describe your mainframe processing capabilities a. How many and what type of mainframe computers are installed at your facility? b. How many of these systems are shared, versus client specific? 3. Describe your peripheral environment 4. For shared mainframe systems, please describe your methodology for dividing up the system and ensuring enough processing power for normal, peak and excessive processing demands. 5. Can you provide, and support, a XyberNET specific LPAR with multiple development and production regions? 6. Do you allow clients to perform regularly scheduled audits to confirm hardware maintenance, updates and configurations meet the agreed to SLA requirements? 7. Can you provide Network Time Server services on the mainframe and NTP? Software 1. Please describe your software maintenance philosophy as it relates to: a. Mainframe, network, peripheral, data center firmware b. IBM operating system updates c. Mainframe utilities d. All other programs running on the mainframe. 2. Do you have currently installed security certificates issued based on 2048 bit security key encryption on your mainframe systems? Request for Proposals for Data Center/Mainframe Hosting Solution Page 6

8 3. What is the highest level of security encryption and what algorithms are supported for SSL certificates? 4. Do you notify clients when software applications such as operating systems, system utilities and other data center managed applications are due for upgrades? 5. Will you allow XyberNET or a XyberNET specified third party vendor to perform regularly schedule audits to validate software applications meet agreed to SLA requirements? 6. How would you structure XyberNET access to enterprise software licenses? 7. How do you manage recommendations for software; i.e. if there is a software package that could perform better or better suit our needs, how would you bring this to our attention? 8. How do you manage software inventory in production and dormant and provide consultation on the usage of these applications? Support 1. Do you provide on site 24X7 support? a. If yes, please explain your existing support structure for i. Mainframe services ii. Hosted server services iii. Network services iv. Monitoring of operating system consoles v. Monitoring of jobs and critical applications vi. Supporting scheduled processing of batch jobs and backups inclusive of re run/re start procedures and problem resolution vii. Documenting cause and nature of both scheduled and unscheduled outages viii. Responding to system messages and requests for resources as required ix. Reporting equipment malfunctions and contacting client when appropriate x. Daily incremental backups and full volume backups. 2. Will you provide on site operational support for our production cycles 24/7? 3. What are your standard response commitments to system administration and ongoing engineering change requests? 4. Please provide an example of your standard SLA s for hosting services to include: a. Response times on issues resolution b. System availability c. Change requests, such as port assignments d. Updating network settings on the mainframe, including but not limited to: i. DNS server settings ii. NTP Request for Proposals for Data Center/Mainframe Hosting Solution Page 7

9 iii. IP addresses/subnet mask iv. Gateway 5. Do you support Defense in Depth, mainframe security through host based firewall, credentialing and permissions? 6. Will you respond to regular security questionnaires submitted by XyberNET? 7. Do you provide SSL Services utilizing security certificates issued by commercial Certificate Authorities to support: a. FTPS (Port 992) b. TN3270 (Port 990) c. HTTPS for web and CICS d. Other services 8. Can your company support: a. Taking custody of XyberNET s equipment in the current datacenter and spearhead its migration to your facility? b. Ongoing shipping and packaging, on request, of network appliances, peripherals and servers? c. Provide, as needed, installation of XyberNET owned servers, network appliances, power management and peripherals and comply with and maintain a documented network topology? d. Provide power cycles to XyberNET hardware 24x7 upon request? e. Supplying rack systems for Dell rapid rails, standard racks and rack support for XyberNET appliances? 9. Do you foresee the need to add staff to support our business? 10. What metrics do you provide to your customers for monitoring system performance and processing times for both mainframe and non mainframe applications and hardware? 11. Provide a list of performance monitoring tools used at your data center. 12. Describe the reporting that can be generated and provided to your clients and on what frequency. 13. Describe your process for validating fixes, prior to implementation into your clients production environments. 14. Do you have an on site test lab which would enable your engineers to troubleshoot outside of the production environments? 15. Please explain your change management process. Client Management 1. What is your overall approach to managing your clients? 2. What are your overall goals of Client Management? 3. Do you assign an Account Manager to each client? If so, please elaborate on the role of this individual. Migration 1. Describe how your company would manage the migration of XyberNET s presence from our current data center to yours. This presence includes: Request for Proposals for Data Center/Mainframe Hosting Solution Page 8

10 a. Hardware b. Software c. DASD farm d. Tape silo e. Servers f. Network equipment 2. If the migration includes any form of electronic data transmission, how would you ensure the security of the data during transmission? 3. What security measures would be invoked for the physical transfer of data contained on tape or other medium, between facilities? 4. When was your last client migration? a. What was involved? b. How how long did the exercise take to complete? c. Was the migration completed as scheduled? d. What were some of the challenges faced? e. Please describe the team your company assembled to handle the migration (Please include number of team members, roles and responsibilities). Disaster Recovery 1. Please provide an overview of your disaster recovery capabilities to include: a. Do you provide 24 hours disaster recovery response? i. Please describe. b. What disaster recovery certifications are in place? c. Where is your disaster recovery facility located? d. Type of mainframe and server hardware located at your disaster recovery facility. e. Staffing 2. Does your disaster recovery facility maintain mirror images of production systems and data, or just backup data? 3. If mirror images are maintained, how often are the images refreshed from production? 4. In the event of a disaster, can full production services be switched over to the disaster recovery systems, and how quickly? 5. Does your company have a documented disaster recovery and business continuity plan? a. Please provide a summary of how applications/system functionality and data would be restored for XyberNET Inc. and its clients according to this plan. 6. How do you determine priority order for bringing your client base up? 7. How often are your disaster recovery procedures tested and what is your test execution success criteria? Request for Proposals for Data Center/Mainframe Hosting Solution Page 9

11 Facility 1. Does your facility provide direct fiber connection from the hosted mainframe to XyberNET s firewall and from XyberNET s firewall to a supplied ISP? 2. Please provide an overview of your facilities electrical power capabilities in relationship to power consumption needs, including emergency backup power resources. 3. Will you supply dedicated power circuits to XyberNET s equipment and maintain IBM standards for clean and sufficient power to the mainframe? 4. Please explain how your facility complies with (ESD) Electro Static Dissipation standards. 5. Describe your fire suppression systems in detail. 6. What are the standard room temperature and humidity operating levels of your facility? 7. What tier level is your data center? 8. Is your facility a bunker or silo? Security 1. Describe how your facility protects stored data (data at rest) from unauthorized access? a. Is this protection enabled by default, or is it optional? b. If encryption is used, please describe the algorithm or bit strength. 2. What methods are employed to protect data being transferred between systems installed within your facility (i.e. mainframe data being transferred to a database server). 3. Do you have clients that generate data requiring physical storage, outside of their active systems, in excess of one year (i.e. tape, disk, reporting, feeds)? 4. Does your company have a formal, written information security policy and program? If so, please provide a copy of any supporting documentation. a. Please provide a brief summary of what is covered in the policy and program. b. How is this policy communicated to employees and contractors? c. How often is the policy updated? 5. Does your company use the following Information Security Technologies on all platforms that will host, process, transmit or store XyberNET s or its clients data: a. Network Firewalls b. Network Intrusion Detection/Intrusion Protection Systems c. Host Intrusion Detection/Intrusion Protection Systems d. Anti virus software 6. Does your company employ or contract with external auditors and/or external security companies to perform regular information security tests (penetration tests)? a. If yes, please list the frequency and parameters of the tests. Request for Proposals for Data Center/Mainframe Hosting Solution Page 10

12 7. Has your company undergone a third party audit of its IT control policies and procedures such as a SAS70/SSAE16? a. If yes please attach a summary of the findings and any relevant documentation. 8. Are you PCI compliant? 9. Does your company have a formal process for tracking and remediation of security vulnerabilities and security patches? a. Please describe. 10. Provide the methods that would be used to physically, or logically, segregate XyberNET or its clients data from other clients data. 11. Provide frequency and rotation schedule for backups of your customers data, including offsite storage procedures and controls used to ensure media is accounted for during transport and storage. 12. Provide the method by which you would perform a data breach notification as it relates to your customers. 13. Does your company have a tool that enables you to create a discrete data snapshot for archived storage if needed? Snapshot should only contain identified data; it should not be a full server backup that includes unneeded data. 14. Do you have a procedure in place for complying with legal or audit hold requests to suspend data destruction? Provide the procedure or describe the process for notifying you of a hold and for monitoring items placed on hold. 15. Do you have a documented procedure to destroy or securely delete confidential or sensitive data and the media types on which they reside at the end of their lifecycle? a. If yes, describe or attach or attach your information and media destruction policies 16. List all physical locations where XyberNET Inc. and its clients data will be processed or stored, and controls that secure against unauthorized access and removal from those facilities (card readers, palm readers, electronic gates, video surveillance, iris/retina scanners, etc.). Software applications currently in use: Detail ASG TMON for CICS/ESA ASG TMON for MVS (z/os) ASG OASIS ASG ZEBB ASG ZEKE ASG SmartScope Do you Currently Own (Y/N) Interprise License (Y/N) Request for Proposals for Data Center/Mainframe Hosting Solution Page 11

13 BMC MAINVIEW SRM (STOPX37) CA ADVANTAGE CA DADS PLUS for CICS CA ALLFUSION CA OPTIMIZER/II CA BRIGHTSTOR CA 1 TAPE MGMT CA BRIGHTSTOR CA ISM CA EXTEND/DASD VSAM Compression CA BRIGHTSTOR CA ISM FAVER VSAM Protection CA BRIGHTSTOR CA ISM CA MASTERCAT VSAM Catalog Management N/A CA BRIGHTSTOR CA ISM CA VSAMAID VSAM Tools CA Common Services (CA90s) CA UNICENTER CA EASYTRIEVE PLUS REPORT GENERATOR CA JCLCHECK CA View CA Vtape Chicago Soft MVS Quick Ref Compuware File AID/MVS Compuware Xpediter/TSO Compuware Xpediter/CICS CSI fka BIMoyle BIMEDIT Mackinney VtamSwitch PKWare PKZIP SAS Institute Base SAS SEA $avers Innovation Data Processing IAM VSAM performance enhancement tool. For the above listed software applications; if you currently do not have licensed copies available, what would your proposal be for obtaining them to meet our business needs? Pricing 1. Please provide your standard pricing models and terms with lists of included products and services. 2. Please provide your detailed solution proposal for our unique data center needs. Request for Proposals for Data Center/Mainframe Hosting Solution Page 12

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Infrastructure Technical Support Services. Request for Proposal

Infrastructure Technical Support Services. Request for Proposal Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable

More information

Office of Information Technology Hosted Services Service Level Agreement FY2009

Office of Information Technology Hosted Services Service Level Agreement FY2009 Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support

More information

REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925

REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925 I. PURPOSE REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925 The State of Florida, Agency for State Technology (AST), hereby issues this Request for

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

This policy is not designed to use systems backup for the following purposes:

This policy is not designed to use systems backup for the following purposes: Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Data Center Application and Equipment Hosting Services Effective April 1, 2009 Revised March 7, 2011

Data Center Application and Equipment Hosting Services Effective April 1, 2009 Revised March 7, 2011 Information Technology Data Center Application and Equipment Hosting Services Effective April 1, 2009 Revised This document outlines the services NUIT provides from the central data centers to host applications

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

Request for Proposal Managed IT Services 7 December 2009

Request for Proposal Managed IT Services 7 December 2009 Request for Proposal Managed IT Services 7 December 2009 BuzzBack, LLC 25 West 45 th Street Suite 202 New York, NY 10036 Table of Contents 1 Summary... 1 2 Proposal Guidelines and Requirements... 1 2.1

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due: REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,

More information

Central Server Hosting Service Detail

Central Server Hosting Service Detail Central Server Hosting Service Detail Overview: CIO/OFT s Data Centers hosts more than 1,800 operating system instances on over 1300 physical servers in centralized centers and more than 350 servers in

More information

IT Labor (Hourly Billable) Data Base Hosting

IT Labor (Hourly Billable) Data Base Hosting Cost Pool Definitions for Information Technology (IT) Services FY16/17 (Effective July 1, 2015) IT Labor (Hourly Billable) B/A 1365 - Programmer/Developer: EITS provides a variety of software development

More information

Managed Information Technology Services For the Town of Moraga

Managed Information Technology Services For the Town of Moraga Request for Qualifications Managed Information Technology Services For the Town of Moraga Deadline for Submittal: Wednesday, December 5, 2012 No later than 2:00 p.m. Prepared by: Stephanie Hom Administrative

More information

What is the Cloud, and why should it matter?

What is the Cloud, and why should it matter? 391 12 What is the Cloud, and why should it matter? 23 Everyone seems to be asking about it. No one seems to know exactly what it is, what they need, and where to find it. 4 A Philosophy of Design and

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

iseries Server Cloud Migration Frequently Asked Questions

iseries Server Cloud Migration Frequently Asked Questions iseries Server Cloud Migration Frequently Asked Questions 1. What are the advantages of the iseries cloud-hosted environment? Elimination of LEA s costs associated with power, cooling and floor space Elimination

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Service Descriptions

Service Descriptions Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application

More information

REQUEST FOR PROPOSAL Professional Services. Benefits Administration Full Dependent Eligibility Audit. Purchase Requisition Number 10001085

REQUEST FOR PROPOSAL Professional Services. Benefits Administration Full Dependent Eligibility Audit. Purchase Requisition Number 10001085 City of Toledo One Government Center 640 Jackson Street Toledo, Ohio 43604 REQUEST FOR PROPOSAL Professional Services Benefits Administration Full Dependent Eligibility Audit Purchase Requisition Number

More information

CLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS

CLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE... 2 4 TAILORED INFRASTRUCTURE... 3 5 COMPUTE... 3 6 SECURITY... 9 TELSTRA GLOBAL. Cloud Services (Infrastructure) Part C updated as

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation Following are the questions submitted on or before September 18, 2015, in accordance with RFP specifications. All questions are published verbatim as received, without regard to errors in spelling, punctuation,

More information

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref: SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008 Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

Enterprise Architecture Review Checklist

Enterprise Architecture Review Checklist Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish

More information

How To Use Rackspace Backup On A Computer Or A Hard Drive

How To Use Rackspace Backup On A Computer Or A Hard Drive Understanding Unmetered Managed Backup Rackspace maintains one of the industry's most highly successful backup operations and infrastructures in the world. Because we are a hosting provider, Rackspace

More information

Vendor Audit Questionnaire

Vendor Audit Questionnaire Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be

More information

Adlib Hosting - Service Level Agreement

Adlib Hosting - Service Level Agreement Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

ensurcloud Service Level Agreement (SLA)

ensurcloud Service Level Agreement (SLA) ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and

More information

White Paper: Librestream Security Overview

White Paper: Librestream Security Overview White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing

More information

2015-2016 SERVICE CATALOG

2015-2016 SERVICE CATALOG Table of Contents Introduction... 3 Service Management... 3 Business Services Offered... 3 DATA CENTER FACILITY AND OPERATIONS... 4 Additional Electrical Circuit... 4 Floor Tiles... 4 Rack Mounts... 4

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING 4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

How To Write An Ets Request For Proposal (Rfp)

How To Write An Ets Request For Proposal (Rfp) Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment

More information

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

Privacy + Security + Integrity

Privacy + Security + Integrity Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Enterprise Governance and Planning

Enterprise Governance and Planning GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

211 LA County. Technology Infrastructure Assessment. Request for Proposals. August 2012 Request for Proposals- 211 LA County 1

211 LA County. Technology Infrastructure Assessment. Request for Proposals. August 2012 Request for Proposals- 211 LA County 1 211 LA County Technology Infrastructure Assessment Request for Proposals August 2012 Request for Proposals- 211 LA County 1 1. General conditions and proposers directions 1.1. Overview 1.1.1. 211 LA County

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

RSS Cloud Solution COMMON QUESTIONS

RSS Cloud Solution COMMON QUESTIONS RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT This Service Level Agreement ( SLA ) applies to and governs such Gabian Technology and its partners SharePoint, Web Hosting, Virtual Private Server, Exchange Hosting, Advisor Earnings, Email Archive, CRM

More information

Flagship Managed Solutions (FMS)

Flagship Managed Solutions (FMS) Flagship Managed Solutions (FMS) a Cloud service iseries application hosting provides an alternative to the traditional iseries ownership costs, management and administration. Elimination of high up-front

More information

APPENDIX 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT MAINFRAME & SERVER SERVICES SOW EXHIBIT P TO AMENDMENT NO.

APPENDIX 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT MAINFRAME & SERVER SERVICES SOW EXHIBIT P TO AMENDMENT NO. EHIBIT P TO AMENDMENT NO. 60 APPENDI 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 7 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT P TO AMENDMENT NO. 60

More information

SNAP WEBHOST SECURITY POLICY

SNAP WEBHOST SECURITY POLICY SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one

More information

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies

More information

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

REQUEST FOR PROPOSAL. #9-11-13 Storage Solution RFP

REQUEST FOR PROPOSAL. #9-11-13 Storage Solution RFP REQUEST FOR PROPOSAL #9-11-13 Storage Solution RFP Issue Date: September 11, 2013 Due Date: Friday, October 11, 2013, 4:00pm Anticipated Award Date: January 1, 2014 Issued by Jackson County Information

More information

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit) IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

IT Sr. Systems Administrator

IT Sr. Systems Administrator IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers

More information

Distributed Hosting. Service Description. Administrative Information Technology Services

Distributed Hosting. Service Description. Administrative Information Technology Services Administrative Information Technology Services Distributed Hosting Release: 1.5 : 3/29/12 Owner: Production Engineering group Service Description AITS provides centrally managed hosting solutions for customers

More information

Security Document. Issued April 2014 Updated October 2014 Updated May 2015

Security Document. Issued April 2014 Updated October 2014 Updated May 2015 Security Document Issued April 2014 Updated October 2014 Updated May 2015 Table of Contents Issued April 2014... 1 Updated October 2014... 1 Updated May 2015... 1 State-of-the-art Security for Legal Data...

More information

Why Host Microsoft Exchange with RTL Technologies?

Why Host Microsoft Exchange with RTL Technologies? Why Host Microsoft Exchange with RTL Technologies? When looking to implement or outsource Microsoft Exchange, there are several key factors to consider. Is the service reliable? Are there engineers on

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

DriveHQ Security Overview

DriveHQ Security Overview DriveHQ Security Overview Based in Silicon Valley, DriveHQ was the first company to offer Cloud IT Solution. We have over one million customers from all over the world and across many industries. We have

More information

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No. 04.17.

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No. 04.17. Table of Contents 1.0 GENERAL... 3 1.1 SUMMARY... 3 1.2 REFERENCES... 3 1.3 SUBMITTALS... 3 1.3.1 General... 3 1.3.2 Service Request Criteria... 4 1.4 EXPECTATIONS... 4 1.4.1 OTech... 4 1.4.2 Customer...

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.

More information

Small Business IT Risk Assessment

Small Business IT Risk Assessment Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

Subject: Request for Proposals: Enterprise Systems Backup Solution, # FIT-2013-005 Due: May 14, 2013 at 2:00 PM EST

Subject: Request for Proposals: Enterprise Systems Backup Solution, # FIT-2013-005 Due: May 14, 2013 at 2:00 PM EST NOTICE OF ADDENDUM ADDENDUM #4 May 7, 2013 Subject: Request for Proposals: Enterprise Systems Backup Solution, # FIT-2013-005 Due: May 14, 2013 at 2:00 PM EST Dear Sir or Madam: The Columbus Regional Airport

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide

More information

IT SERVICES MANAGEMENT Service Level Agreements

IT SERVICES MANAGEMENT Service Level Agreements IT SERVICES MANAGEMENT Service Level Agreements Sample Agreements, Reports, and Checklists White Paper PREPARED BY: RICK LEOPOLDI May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document

More information

Vendor Risk Assessment Questionnaire

Vendor Risk Assessment Questionnaire Vendor Risk Assessment Questionnaire VENDOR INFORMATION: Vendor Name: Vendor Address: Vendor Contact Name: Vendor Contact Phone No: Vendor Contact Email: DATA SENSITIVITY What is the nature of data that

More information

Whitepaper - Security e-messenger

Whitepaper - Security e-messenger Whitepaper 1 Security e-messenger Contents 1. Introduction Page 3 2. Data centre security and connection Page 3 a. Security Page 3 b. Power Page 3 c. Cooling Page 3 d. Fire suppression Page 3 3. Server

More information

Services Agreement. Rev 12/10/08 TC v08 1

Services Agreement. Rev 12/10/08 TC v08 1 Services Agreement This Agreement is entered into by, herein referred to as Client, and Computer Crews, a Colorado Corporation, hereinafter referred to as Service Provider. The Parties agree as follows:

More information

Questions and Answers for Request for Proposal #03511. Q1) What applications are running on each of the physical servers?

Questions and Answers for Request for Proposal #03511. Q1) What applications are running on each of the physical servers? Questions and Answers for Request for Proposal #03511 Q1) What applications are running on each of the physical servers? A1) See answers in 5 th column: Waterloo 2200 WIN 2003/2008/2012 Physical Files

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

BOWMAN SYSTEMS SECURING CLIENT DATA

BOWMAN SYSTEMS SECURING CLIENT DATA BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered

More information