Dell Cloud On Demand with CenturyLink

Size: px
Start display at page:

Download "Dell Cloud On Demand with CenturyLink"

Transcription

1 Dell Cloud On Demand with CenturyLink Introduction to your service The Dell Cloud On Demand with CenturyLink (the Service ) is an infrastructure as a service (IaaS) product that includes virtual compute, storage and networking services as well as cloud management functions. This Service Description and the attached appendices (collectively, the Service Description ) describe the Service being provided to you ( Customer or you ) as well as what to expect for your implementation on Dell Cloud On Demand with CenturyLink.

2 Table of contents Service description...3 Single service tier...3 Guest operating systems... 4 Virtual servers... 4 Cloud management... 4 Networking... 4 Backup and recovery...5 Onboarding process...5 Support...5 Customer responsibilities... 6 The Dell Cloud On Demand with CenturyLink support responsibilities... 6 Miscellaneous... 6 Terms and conditions...7 Appendix A: Service Level Agreement (SLA) for Dell Cloud On Demand with CenturyLink... 8 Appendix B: Security Statement for Dell Cloud On Demand with CenturyLink

3 Service description Single Service Tier The Dell Cloud On Demand with CenturyLink offers a single tier of Service. The service is based on VMware vsphere 5, and includes significant customization with enhanced functionality for public cloud deployments. Customers may create and manage virtual machines, storage, and networking resources with an online portal, or via APIs. See Table 1 for a summary of the offering and billing metrics. vcpu RAM Storage Description vcpu (1 minimum 2 GHz processor) vram (GB) Virtual Machine Storage (GB) Remote SAN Storage (GB) High Performance Remote SAN Storage (GB) Object Storage (GB) Dell Cloud On Demand with CenturyLink Hourly (Running) Hourly (Running) This single service tier is a multi-tenant service that enables a customer to place workloads on Dell s cloud in a flexible manner. Most fees are charged on an hourly basis (when virtual machines ( VMs ) are powered-on ), while some are charged on a monthly or one-time basis. Networking Simple Backup Service (GB) Data Center Cross Connect (1 Gbps port connection) Data Transfer / Bandwidth for VMs and VPNs (1 Mbps, measured at 95/5) Data Transfer / Inbound & Outbound for object storage (1 GB transferred) Site to Site VPN Connection (Does not include bandwidth) Monthly (Fixed) Usage (95/5) Usage (GB) Monthly (Fixed) No hardware or software is being transferred, sold, leased or licensed to Customer under this Service Description. To the extent the Dell Cloud On Demand with CenturyLink uses hardware or software as part of its delivery of the Service, such hardware or software will be licensed, owned or otherwise held by Dell and/or CenturyLink. SPLA & licensing Private VLAN (First One Free, Each Additional VLAN) External IP address Shared Load Balancer (Virtual Appliance) Ubuntu, CentOS, Debian Linux Distributions Windows Server 2003/2008/2012 License Red Hat Enterprise Linux Additional 3rd Party Software Monthly (Fixed) Monthly (Fixed) Hourly (Used) Open Source License Monthly (Fixed) Control portal Account Management, API Access, Orchestration, Monitoring, Role-based Access Controls, Governance Included Support 24x7 Access to NOC Engineers (Phone, , Chat) Included Table 1: Product Offering with Billing Metrics 3

4 Guest operating systems You may use one of the operating system ( OS ) Templates available on Dell Cloud On Demand with CenturyLink via various SPLA packages, or import your own OS image. Customer is responsible for obtaining software license rights for any software used in connection with the Service. Guest operating system template Centos 5 Centos 6 Debian 7 Red Hat Enterprise Linux 6 Ubuntu bit x86 64-bit x64 Customers may provision servers that run Windows Server 2012/2008 R2/2003, CentOS 5/6, Debian 7, Red Hat Enterprise Linux 6, and Ubuntu 12/10. In addition, customers may load their own OS images to the Dell Cloud On Demand with CenturyLink. Ubuntu 12 Windows Server 2003 R2 Windows Server 2008 R2 Windows Server 2012 Table 2: Available Guest Operating System Templates Virtual servers The Service includes virtual private cloud servers for scale and flexibility, along with unique security, performance, and management features common to internal data centers. You have significant flexibility in creating and updating virtual servers; each VM can be built to specific requirements (up to 16 vcpus, 128 GB of RAM, and 1024 GB local block storage), instead of choosing between pre-configured options. Cloud management You receive cloud management capabilities as part the Services at no additional charges. These specific capabilities include: Account Management: Support for complex cloud deployments. Includes sub-account hierarchies, billing reports, and privatelabeling options API: Access comprehensive cloud management functions via HTTP and SOAP-based web services Cloud Blueprints: Build templates of cloud environments to assist in the rapid deployment of complex applications. Advanced cloud orchestration capabilities Groups: Organize, manage, and monitor collections of cloud servers as a single unit Maintenance Mode: Toggle monitoring functions on a server, or a Group of servers Monitoring: Build and customize thresholds for compute, storage, and network resources across servers. Configure alerts to notify users before performance is compromised Scheduling: Automatically schedule and complete key admin tasks for virtual machines Networking The networking features of this Service consist of physical and virtual components. You may be charged for data leaving Dell Cloud On Demand with CenturyLink datacenters going to the Internet. Data bandwidth in and data between VMs in the same datacenter will not be charged. Dell Cloud On Demand with CenturyLink is responsible for operating, maintaining, and troubleshooting all physical network components residing in Dell Cloud On Demand with CenturyLink datacenters. Customer is responsible for operating, maintaining, and troubleshooting all virtual networking components created in its virtual environments. The network for the Dell Cloud On Demand with CenturyLink relies on an ISP-neutral Internet connection and enterprise-grade Juniper SRX hardware to reliability deliver safe traffic to virtual machines. Customers integrate with the Services network through VPN tunnels and intra-data center direct connect. The available network services are: Bandwidth: Redundant, high-speed connectivity across the Dell Cloud On Demand with CenturyLink s global network of data centers. Billed at 95/5 usage CDN: Services to provide scalable, high-performance content delivery for static objects and streaming media Direct Connect: A dedicated network connection between a company network and the Dell Cloud On Demand with CenturyLink datacenters. MPLS also available Firewall: Administer custom firewall policies within a single data center and across multiple data centers. Create and manage VLANs Load Balancing: Self-service solutions to help cloud applications perform as traffic rapidly changes. Available as a virtual appliance, supporting traffic from 200 Mbps up to 1000 Mbps. SSL offload also supported. Dedicated options also available VPN: Secure access to the Dell Cloud On Demand with CenturyLink cloud through client VPN or IPsec point-to-point VPN tunnel. Fully self-service 4

5 Backup and delivery The Dell Cloud On Demand with CenturyLink performs daily snapshots of all storage arrays and maintains copies for a rolling 5-day period; this is included in the standard block storage offering at no additional charge. For an additional charge, you may choose a premium storage tier that includes daily backups on a rolling 14-day schedule, with daily backups stored at a secondary datacenter. Backup is done at a VM level (selection of individual files is not supported). Onboarding process The Dell Cloud On Demand with CenturyLink s Global Onboarding Team will collaborate with designated Customer contacts to provide standardized onboarding of the Service. The standard onboarding Service will include: A named technical contact to answer questions and facilitate onboarding An online demonstration that includes a detailed overview of Services Control Portal, focusing on: How to build and connect to virtual servers Managing servers and resources; a deep review of Groups functionality User management Invoicing review and analysis Reporting and monitoring capabilities Assistance configuring site to site VPNs Assistance building up to 4 virtual servers Assistance creating user IDs for internal staff Best practices for important cloud management activities such as server deployment and management, backups, and operational procedures Assistance for managed services deployment and configuration (i.e. setting up a patch management schedule, helping deploy anti-virus tools) Recommendations for maximizing ROI and minimizing spend on the platform The activation date ( Activation Date ) of this Service Description is the date on which the related Order Form is executed by the Customer and accepted by Dell. Billing will begin at the conclusion of Provisioning (the Billing Start Date ). Support Customer can identify up to 10 administrators ( Administrators ) for each account to contact the Dell Cloud On Demand with CenturyLink Support via , or online chat. Administrators can be named and modified the Customer at any time in a self-service manner. Support may be provided outside of the country or region in which Customer or Customer s end users reside. If you are a U.S. Federal Customer, you acknowledge and agree that the Service uses commercial, non- Federal license keys and that you waive any right to receive U.S.-based support services and any other features offered by Federal license keys. If you are purchasing this Service through a reseller, your reseller will provide first level (and sometimes second level) support, and not the Dell Cloud On Demand with CenturyLink. 5

6 Customer responsibilities Customer will support onboarding activities set forth herein for the Service. Customer represents and warrants that it has or it will have prior to using the Service all licenses necessary in connection with all software and applications used for or with the Service. Customer will provide timely access to Customer resources, including but not limited to, virtualization administrators, and engineering and project management. Dell and the Customer to agree on standard access protocols. The Customer is responsible for modifying and tracking changes to its environment Configuration/software/data backups. It is the Customer s responsibility to perform complete backups of all existing data, software, and programs. NOTWITHSTANDING ANYTHING CONTAINED HEREIN TO THE CONTRARY OR THE DELL CLOUD ON DEMAND WITH CENTURYLINK S PERFORMANCE OF BASIC SNAPSHOT SERVICES OR BACKUP AND RECOVERY SERVICES, DELL NOR CENTURYLINK WILL HAVE NO LIABILITY FOR LOSS OR RECOVERY OF DATA OR PROGRAMS or loss of use of system(s) arising out of the Service or support or any act or omission, including negligence, by Dell or a third-party service provider. Customer is responsible for all design and implementation of network security settings and requirements definition. If Customer purchases the optional Direct Connect / MPLS Service, a 3-way agreement between Customer, the Dell Cloud On Demand with CenturyLink, and the selected carrier must be executed prior to or concurrently with the execution of this Service Description. Customer is responsible for establishing network connectivity on its side. Customer is responsible for all application and performance monitoring. The Dell Cloud On Demand with CenturyLink Support Responsibilities Assist Customer in identifying causes of issues experienced in Customer s virtual environment Assist in troubleshooting the Dell Cloud On Demand with CenturyLink Control Portal Support backup/recovery requests, which may include additional costs and be subject to a separate agreement Work with Customer to troubleshoot any dedicated VPN links over the Internet or dedicated WAN links Answer questions related to billing and invoices Miscellaneous The Dell Cloud On Demand with CenturyLink will provide security in connection with the Service in accordance with the Security Statement attached as Appendix B. For the avoidance of doubt, the following activities are not included in the scope of this Service Description: Any services, tasks or activities other than those specifically noted in this Service Description The development of any intellectual property created solely and specifically for the Customer Virtualization design Evaluation of Customer s IT operations and organization Migration of any existing physical servers into a virtualized server environment Virtualization platform software licenses, and Application profiling, which includes identification of applications compatible with virtualization and analysis of server/application interdependencies This Service Description does not confer on Customer any warranties which are in addition to the warranties provided under the terms of your master services agreement or Agreement, as applicable. To the extent applicable, Customer agrees that the Dell Cloud On Demand with CenturyLink s privacy and security requirements satisfy any and all obligations under the Family Educational Rights and Privacy Act, 20 USC 1232g, and its implementing regulations, 34 CFR pt. 99 (collectively, FERPA ) that the Dell Cloud On Demand with CenturyLink may have as a recipient of education records and personally identifiable information contained in such records. 6

7 Terms and conditions Availability varies by country. To learn more, customers and Dell Channel Partners should contact your sales representative for more information Dell Inc. All rights reserved. Trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell and the Dell logo are trademarks of Dell Inc. in the U.S. and other countries. VMware, the VMware logo, VMware vsphere are trademarks of VMware, Inc. in the U.S. and other countries. Specifications are correct at date of publication but are subject to availability or change without notice at any time. Dell and its affiliates cannot be responsible for errors or omissions in typography or photography. This Service Description is governed by and subject to the terms and conditions in Customer s separate signed master services agreement with Dell to the extent such agreement explicitly authorizes Customer to order the Service or, in the absence of such agreement, Dell s terms and conditions of sale apply and are available on request or online as noted in Table 3. For Customer purchasing directly from Dell, by entering into this Service Description, Customer acknowledges Customer has read and understood the Cloud Solutions Agreement and Customer agrees to be bound by the Cloud Solutions Agreement. For Customer in Europe, the Middle East or Africa purchasing the Service through a reseller and not directly from Dell, this Service Description and other Dell service documents which you may receive from your seller shall not constitute an agreement between you and Dell but shall serve only to describe the content of Service you are purchasing from your seller, your obligations as a recipient of the Service and the boundaries and limitations of such Service. As a consequence hereof any reference to Customer in this Service Description and in any other Dell service document shall in this context be understood as a reference to you whereas any reference to Dell shall only be understood as a reference to Dell as a service provider providing the Service on behalf of your seller. You will not have a direct contractual relationship with Dell with regards to the Service described herein. For the avoidance of doubt any payment terms or other contractual terms which are by their nature solely relevant between a buyer and a seller directly shall not be applicable to you and will be as agreed between you and your seller. Customer location Terms and conditions applicable to your purchase of the service Worldwide (U.S. English) Table 3: Terms & Conditions applicable to your purchase of the service 7

8 Appendix A: Service Level Agreement (SLA) for Dell Cloud On Demand with CenturyLink The following Service Level Agreement (SLA) is applicable to the services listed below that CenturyLink, Inc. ( CenturyLink, we, us or our ) makes available to you ( Customer or you ) for a fee. The SLA is not applicable to unrelated third parties or third parties lacking a contractual relationship with CenturyLink. The uptime obligations and the resulting SLA credits are applied on a monthly basis unless specified otherwise. This SLA, all SLA obligations herein, and the service credits are subject to the terms and conditions of the Master Services Agreement between CenturyLink and Customer posted in Client Management section of the Website (the Control Panel ). Public Network: CenturyLink ensures 100% uptime on all Public Network services to Customers located in our data centers. All Public Network services include redundant carrier grade Internet backbone connections, advanced intrusion detection systems, denial of service (DOS) mitigation, traffic analysis and detailed bandwidth graphs. This does not include DOS attacks or other unknown variables that can affect Internet traffic. Private Network: CenturyLink ensures 100% uptime on the Private Network services to Customers located in our data centers. All Private Network services include access to the secure VPN connection, unlimited bandwidth between servers, unlimited uploads/ downloads to servers, access to contracted services, traffic analysis and detailed bandwidth graphs. Control Panel and API: CenturyLink ensures % access to the Control Panel and API. Access to the Control Panel is available via the Public and Private Networks. The Control Panel is utilized to fully manage the ondemand IT environments located within the CenturyLink data centers. Control Panel access includes ticketing system access, account management, server management, bandwidth management, backup management and other related services. Virtual Servers: Individual servers will deliver % uptime as monitored within the CenturyLink network by CenturyLink monitoring systems. Only failures due to known CenturyLink problems in the hardware and hypervisor layers delivering individual servers constitute failures and as such only they are covered by this SLA. Examples of failures include: power interruptions, hardware problems (such as failures to a hard drive or power supply) and failures to the hypervisor environment supporting Customer servers. Problems related in any way to the Customer server operating system or any other software on the Customer server, or to the actions of Customers or third parties, do not constitute failures and as such are not covered by this SLA. Cloud Storage: CenturyLink delivers a % uptime on Cloud Storage. A Cloud Storage failure occurs when a Customer cannot retrieve data because of problems with hardware and/or software in CenturyLink s control. Data retrieval issues caused by problems connecting to the service, including without limitation problems on the Internet, do not constitute failures and as such are not covered by this SLA. CenturyLink maintains multiple copies of the files and allows customers to enable revision tracking on their cloud environment for restores of data. Customer will receive a service credit for the period of time commencing when a ticket is filed requesting assistance in accessing Customer data until the service is reinstated. Data in this environment (when provisioned as Premium Storage), unless otherwise noted by CenturyLink to the individual customer, is retained for fourteen (14) days onsite in the data center and two (2) days offsite in the secondary data center (disaster recovery location) and when provisioned as Standard Storage is retained for five (5) days onsite in the data center. Maintenance: At certain times planned maintenance is required on CenturyLink Services and Products that can cause service disruption. Maintenance services can affect the Public Network, Private Network, Control Panel, Virtual 8

9 Servers, Cloud Storage, Security and other services. CenturyLink will notify Customer of planned maintenance service and will work with the Customer to resolve any issues that they may have with the maintenance service. CenturyLink retains the right to proceed with maintenance services without it affecting the SLA if proper notification has been provided to the Customer. Limitations: This SLA does not cover (without limitation): (a) network performance to Customer s physical location or Internet access point (such as a local DSL/cable modem); or (b) failures due to denial of service attacks. Support Response Time: EMERGENCY Tickets - 30 minutes Categories include: Server down Packet loss Routing issue All other Tickets - 60 minutes For EMERGENCY category issues Customer must create a ticket for which a tracking number will automatically be provided and a support engineer will review the support request within the timeframe listed above. If for some reason Customer does not receive a response within 30 minutes, Customer should escalate via phone at option 2 to the NOC. CenturyLink may reclassify any Ticket misclassified as falling into one of the EMERGENCY categories listed above, and such Ticket will not qualify for EMERGENCY treatment. Resolution and repair times vary, and this SLA does not address them. Incident Reports: CenturyLink will provide Customer with an Incident Report via within twenty-four (24) hours of an incident for incidents resulting in greater than thirty (30) minutes of downtime. The Incident Report will include: incident date, duration, issue, details of the problem and details of the resolution. Domain Name Services: CenturyLink delivers a 100% uptime for domain name servers (DNS) on the Dynect network. A period of DNS failure is any time during which 100% of Dynect s Domain Name Servers simultaneously fail to respond to requests for name resolution. This SLA does not guarantee propagation of DNS data across the Internet or the hosting of secondary DNS service for Customer s primary domain in another location, and it does not guarantee against zone inaccuracies due to operator error. Physical Security: CenturyLink will ensure 24x365 on-site security through the presence of a professional security guard in the data center at all times, charged with enforcing CenturyLink s security policies. (Those policies require, among other things that CenturyLink employees, vendors and visitors wear a badge and that authorized visitors who have not been issued a permanent badge leave a valid U.S. driver s license or passport with the guard while in the data center.) SLA Credit Claim: CenturyLink s monitoring systems will log and report service failures that are eligible for service credits. Customer will be notified by the NOC regarding a failure and for failures lasting greater than 30 minutes, Customer will receive an Incident Report per this SLA. CenturyLink will issue to the Customer appropriate service credits for the failure as defined in this SLA (Credit Limitations and Credits Issued sections) and the MSA (Service Levels section). If a Customer believes that a service failure occurred and/or they were not issued service credits appropriately then the Customer must open a support ticket (a Ticket ) through the Control Panel or by to noc@tier3.com and request any credits by accurately detailing the credit request within 45 days of the failure in question. Any Customer making false or repetitive claims will incur a onetime charge of US $500 per incident for such claims. False or repetitive claims are also a violation of the Master Services Agreement and may be subject to service suspension. Customers participating in malicious or aggressive Internet activities, thereby causing attacks or counter-attacks, do not qualify for SLA claims and shall be deemed in violation of the Acceptable Use Policy posted on the Website. Credit Limitations: The minimum period of failure eligible for a credit is 15 minutes, and shorter periods will not be aggregated. The maximum credit shall not exceed one hundred percent (100%) of Customer s fees for the Service feature in question for the then-current billing month. In the event that multiple periods of failure overlap in time, credits will not be aggregated, and Customer will receive credit only for the longest such period of failure. In the event that a single incident calls for credits pursuant to multiple Parts of this SLA, CenturyLink will award credits for all Service features impacted in a single incident. The maximum credit during a single calendar year, for all Service features combined, is four months Service fees, regardless of the length of failure or the number of occurrences. The period of failure for Server Uptime, Network Performance and Domain Name Services (and services above) begins when Customer opens a Ticket and ends when the failure is remedied. Credits available pursuant to this SLA apply only to future service delivery. CenturyLink is not required to provide refunds pursuant to this SLA. If Customer retains a credit balance on termination of the account in question, such credit is forfeited. Notwithstanding the foregoing, credits will not be applied against fees for professional services, bundled support or setup fees. 9

10 Notwithstanding any provision to the contrary in this SLA, the following do not constitute failures: (1) downtime during planned maintenance (as defined above) or Emergency Maintenance (as defined below) periods; (2) outages caused by acts or omissions of Customer, including its applications, equipment or facilities, or by any use or user of the Service authorized by Customer; (3) outages caused by hackers, sabotage, viruses, worms or other third party wrongful actions; (4) DNS issues outside of CenturyLink s control; (5) outages resulting from Internet anomalies outside of CenturyLink s control; (6) outages resulting from fires, explosions, or force majeure; (7) outages to the Control Panel, and (8) failures during a beta period. Emergency Maintenance refers to any corrective action intended to remedy conditions likely to cause severe Service degradation, as designated by CenturyLink in its sole discretion. Emergency Maintenance may include but is not limited to actions intended to address hardware or software failures or viruses/worms. CenturyLink will exercise reasonable efforts to inform Customer in advance before interrupting the Service for Emergency Maintenance, but such notice is not guaranteed and failure thereof does not constitute failure. Credit Issued: For all SLA s, CenturyLink issues service credits at a credit factor of 45 times the hourly cost for every hour of downtime. The service credit formula is as follows: Hours of Credit Eligible Downtime x Credit Factor x Product and/or Service Hourly Cost = Service Credit. Credit Eligible Downtime = Time (in hours) past the SLA greater than 15 minutes excluding allowable downtime Credit Factor = 45 Product and/or Service Hourly Cost = Customer s billing rate/hour during period of downtime Example 1: Virtual Server (99.999% SLA) that has a failure lasting 1 hour 45 minutes (1.75 hours) 1.75 hours x 45 credit factor x $.45/hour = US $

11 Appendix B: Security Statement for Dell Cloud On Demand with CenturyLink Commitment to Security The Service is an infrastructure as a service (IaaS) product that includes virtual compute, storage, and networking services as well as cloud management functions. The Service is designed and built to address key security aspects, including: Integrity: Through Internet Protocol Security (IPsec) and Secure Socket Layer (SSL) connections, the Service provides industry standard encryption and message authentication to help ensure that customer data cannot be modified during transmission. Confidentiality: The Service is designed to allow only authorized users to access information within their virtual environment. Availability: The Service uses mission-critical, highly robust, toptier datacenters, designed to enable service availability at all times. Overview The Service uses the following controls to ensure that the integrity, confidentiality and availability of your information meet strong standards: Physical controls, including environmental controls, are countermeasures that affect the physical environment; for example, access controls, fire prevention systems, cooling systems, exit routes, security personnel and datacenter surveillance monitoring. 1 Technical controls (also called logical controls) are countermeasures that rely upon use of technology to mitigate risk; for example, firewalls, intrusion detection and prevention systems, and encryption mechanisms. Administrative controls are countermeasures that involve policy and procedures; for example, security and escalation policies, log audits, vulnerability scanning and penetration testing. Physical Controls Service datacenters are designed to support and protect mission-critical operations. These datacenters provide multi-level physical security features and a rigidly-controlled operating environment to help protect customer assets and operations. Service datacenters are audited regularly to the SAS-70 Type 2 / SSAE 16 Type 2 standard. Audit results are available upon request. Access and Security Controls: Access to Service datacenters is highly controlled. All entrances are monitored and have alarms for protection. These datacenters are staffed with 24-hour security officers to augment physical security features, providing protection of your operations. CCTV Digital Recorders: CCTV security cameras monitor designated sensitive areas. Fire Suppression: Industry standard fire suppression systems for multitenant datacenters are in use. Environmental Controls: Service datacenters are constructed to meet the highest standards of redundancy. Service datacenters also include critical power and cooling systems that are provisioned with appropriate redundant failover infrastructure. The critical power and cooling infrastructure is backed up by an emergency power generation system. 1 The controls outlined in this Appendix are designed to provide strong data security safeguards that meet the needs of a typical user. They are not intended or designed to address all industry specific requirements that are driven by regulatory requirements such as HIPAA or PCI. Users with specific data security requirements that exceed the controls listed in this Appendix should discuss alternative cloud solutions with their Dell representative. To the extent Dell receives or otherwise has access to Customer s education records and personally identifiable information contained in such records, as such terms are defined in FERPA, Dell acknowledges that it is subject to the requirements of 34 CFR 99.33(a) governing the use and re-disclosure of personally identifiable information in education records. 11

12 Technical Controls Network and System Security: Multiple levels of disparate defenses are used to protect customer information and strictly control network access to the datacenter. Customers connect with the Service via IPsec and SSL connections to provide industry-standard link encryption and message authentication to help ensure that customer data cannot be modified during transmission. All access to servers is strictly monitored. In addition, Service servers are configured to prevent intrusions and protect against day-to-day threats. The servers are selected and configured to maximize their reliability, security, scalability and efficiency. Firewalls: Customer data transfers are made from the customer s environment to the Service system via standard Internet Protocol Security (IPsec) or Secure Socket Layer (SSL) connections through the customer s firewall. All non-required firewall ports are blocked on the Service firewalls. Intrusion Prevention Systems: The Dell Cloud On Demand with CenturyLink uses enterprise-grade intrusion detection / intrusion prevention systems (IDS/IPS) within the Service infrastructure to provide another mechanism for the early detection and prevention of data breaches. Access Controls: Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privileges. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations by recognized experts in this area. Vulnerability Scanning and Penetration Testing: Internal and external vulnerability scans are performed on the Dell Cloud On Demand with CenturyLink s cloud infrastructure periodically and after any significant change in the network. External and internal penetration tests, including network- and application-layer penetration tests are performed annually and after any significant infrastructure or application upgrades or modifications. Administrative Controls Data Center Access History: Physical access history to the datacenters is recorded. Personnel Security: All users with access to the Service environment are responsible for compliance with Dell information security policies and standards. As part of the employment process, employees undergo a screening process applicable per regional law. Communications and Operations Management: Changes to the Service infrastructure, systems and applications are managed through a centralized change management program, which includes testing, back out procedures, business impact analysis and management approval, where appropriate. Incident response procedures exist for security and data protection incidents. The procedures include incident analysis, containment, response, remediation, reporting and procedures for returning to normal operations. To protect against malicious use of assets and malicious software, the following additional controls are implemented: designated development and test environments; malware detection on servers, desktops and notebooks; attachment malware scanning; and information handling procedures based on data type, application and network security. Scan or click this code to learn how Dell Services can help your organization. This service description is for information purposes only, and may contain typographical errors and technical inaccuracies. The content is provided as is, without express or implied warranties of any kind. Product and service availability varies by country. To learn more, customers and Dell Channel Partners should contact their sales representative for more information. Specifications are correct at date of publication but are subject to availability or change without notice at any time. Dell and its affiliates cannot be responsible for errors or omissions in typography or photography. Dell s Terms and Conditions of Sales and Service apply and are available on request. Dell and the Dell logo are trademarks of Dell Inc. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims proprietary interest in the marks and names of others Dell Inc. All rights reserved. December 2013 D354 - Dell Cloud On Demand with CenturyLink.indd Rev. 1.3

Billing for each tier is done on a monthly basis in arrears and will include both fixed and variable costs.

Billing for each tier is done on a monthly basis in arrears and will include both fixed and variable costs. Service Description Dell Cloud with VMware vcloud Datacenter Service Introduction to Your Service Dell Cloud with VMware vcloud Datacenter Service (the Service ) is an Infrastructure as a Service (IaaS)

More information

Dell Advanced Network Monitoring Services Service Description

Dell Advanced Network Monitoring Services Service Description Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Dell Cloud Dedicated. Appendix E. to DIR Contract Number DIR-TSO-3083

Dell Cloud Dedicated. Appendix E. to DIR Contract Number DIR-TSO-3083 Appendix E to DIR Contract Number DIR-TSO-3083 Dell Cloud Dedicated Service description February 2014 Introduction Dell Cloud Dedicated (the Service ) is an infrastructure as a service (IaaS) offering

More information

Service Description. Dell Workspace-as-a-Service

Service Description. Dell Workspace-as-a-Service Service Description Dell Workspace-as-a-Service Introduction to Your Service Dell Workspace-as-a-Service or (the Service ) is a managed service offering intended to provide the customer ( Customer or you

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

Service Level Agreement (SLA)

Service Level Agreement (SLA) Service Level Agreement (SLA) Overview This 10,000% Guaranteed, 100% Uptime Service Level Agreement (this SLA ) supplements the Terms of Service, and together such documents, and others referenced in the

More information

Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1

Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1 Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1 1 DEFINITIONS AND INTERPRETATIONS 1.1. Words or phrases used with capital letters in this Service Schedule shall have the same meanings

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

Service Level Agreement (SLA)

Service Level Agreement (SLA) Big Data Solution Service Level Agreement (SLA) Overview This 10,000% Guaranteed, 100% Uptime Service Level Agreement (this SLA ) supplements the Terms of Service, and together such documents, and others

More information

Service Description Dell Cloud Storage with Nirvanix Public Service

Service Description Dell Cloud Storage with Nirvanix Public Service Service Description Dell Cloud Storage with Nirvanix Public Service Introduction to Your Public Service Dell Cloud Storage with Nirvanix Public Service (the Service ) is a public, multi-tenant STorage

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1

Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1 Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1 1 DEFINITIONS AND INTERPRETATIONS 1.1. Words or phrases used with capital letters in this Service Schedule shall have the same meanings

More information

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia 1 DEFINITIONS Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End

More information

Hosting Services - Dedicated Service Agreement Page 1 of 6

Hosting Services - Dedicated Service Agreement Page 1 of 6 Hosting Services - Dedicated Service Agreement Page 1 of 6 This Hosting Services - Dedicated Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions,

More information

Oracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5

Oracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5 Oracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5 Unless otherwise stated, these Oracle Cloud Hosting and Delivery Policies (the Delivery Policies ) describe the Oracle

More information

Managed Colocation Service Terms and Conditions for CLOUDHPT.COM

Managed Colocation Service Terms and Conditions for CLOUDHPT.COM Managed Colocation Service Terms and Conditions for CLOUDHPT.COM PRODUCT TERMS (Managed Colocation Service) In addition to the General Terms and Conditions, your use of the Managed Colocation Services

More information

SERVICE LEVEL AGREEMENT - Shared Exchange Hosting

SERVICE LEVEL AGREEMENT - Shared Exchange Hosting SERVICE LEVEL AGREEMENT - Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Constructure

More information

SERVICE LEVEL AGREEMENT: Shared Exchange Hosting

SERVICE LEVEL AGREEMENT: Shared Exchange Hosting SERVICE LEVEL AGREEMENT: Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Global Data

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Cloud Server This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Intermedia.Net, Inc. ( Intermedia

More information

Bare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description

Bare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description This Bare Metal Cloud Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Intermedia Technologies

More information

Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions

Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Your use of the Microsoft Hyper-V Powered by Rackspace or Microsoft Cloud Platform

More information

Service Specification Schedule For Fujitsu Cloud IaaS Trusted Public S5

Service Specification Schedule For Fujitsu Cloud IaaS Trusted Public S5 Service Specification Schedule For Fujitsu Cloud IaaS Trusted Public S5 This Service Specification sets out the Service to be provided by Fujitsu under the Agreement. In the event of any conflict between

More information

1 ForestSafe SaaS Service details Service Description Functional Non Functional

1 ForestSafe SaaS Service details Service Description Functional Non Functional 1 ForestSafe SaaS Service details 1.1 Service Description ForestSafe is a privileged identity management system used today to manage the Administrator passwords of 65,000 computers by the UK largest bank.

More information

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

Table of Contents. CSC CloudCompute Service Description Summary CSC 1 Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...

More information

Hosting Services - Virtual Service Agreement Page 1 of 6

Hosting Services - Virtual Service Agreement Page 1 of 6 Hosting Services - Virtual Service Agreement Page 1 of 6 This Hosting Services - Virtual Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions,

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ).

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). I. Service Definition. Exchange My Mail will provide Hosted Exchange and other Application Services

More information

Service Description CloudSure Public, Private & Hybrid Cloud

Service Description CloudSure Public, Private & Hybrid Cloud Service Description CloudSure Public, Private & Hybrid Cloud Table of Contents Overview - CloudSure... 3 CloudSure Benefits... 3 CloudSure Features... 3 Technical Features... 4 Cloud Control... 4 Storage...

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the

More information

Dell Advanced Network Management Services Service Description

Dell Advanced Network Management Services Service Description Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Management: Network outages or network performance problems can cause significant economic impacts to your day-to-day

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

CloudSure Managed IaaS

CloudSure Managed IaaS CloudSure Managed IaaS Contents Contents... 1 Overview - CloudSure... 3 CloudSure Benefits... 3 CloudSure Features... 3 Technical Features... 4 Cloud Control... 4 Storage... 4 Data Location and Integrity...

More information

CSC BizCloud VPE Service Offering Summary. CSC i

CSC BizCloud VPE Service Offering Summary. CSC i Table of Contents OVERVIEW... 1 BIZCLOUD VPE SOLUTION SUMMARY... 1 BIZCLOUD VPE INFRASTRUCTURE... 1 Hardware and Virtualization Layer... 2 Compute Components... 2 Storage 2 CSC SUPPORT FOR THE BIZCLOUD

More information

Infrastructure, application services, and managed services - all in a single, integrated platform CENTURYLINK S END-TO-END MANAGEMENT SOLUTIONS:

Infrastructure, application services, and managed services - all in a single, integrated platform CENTURYLINK S END-TO-END MANAGEMENT SOLUTIONS: CenturyLink Cloud Infrastructure, application services, and managed services - all in a single, integrated platform Businesses like yours are moving their apps to CenturyLink Cloud. All signs point to

More information

FOR SERVERS 2.2: FEATURE matrix

FOR SERVERS 2.2: FEATURE matrix RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,

More information

Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide

Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide Table of Contents 1. DEFINITIONS... 3 2. SCOPE OF SERVICES... 3 3.1 HVD... 4 3.2 WEBHVD... 4 3.3 HVS... 4 3.4 STORAGE D3...

More information

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page i Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page ii

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Secure Hosting Solutions For SAGE Energy Management

Secure Hosting Solutions For SAGE Energy Management Secure Hosting Environment Partnerships In order to provide advanced levels of infrastructure security, Armstrong has partnered with two entities. Logicalis Inc. is recognized as a Channel Company s 2015

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

Hosting Services - Virtual Data Center Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Hosting Services - Virtual Data Center Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options This Hosting Services Virtual Data Center Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

security in the cloud White Paper Series

security in the cloud White Paper Series security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),

More information

(c) Support Response Time Target 30 minute Support Response Time Target for Emergency Incidents; and

(c) Support Response Time Target 30 minute Support Response Time Target for Emergency Incidents; and Service Level Terms Service Level Agreement Public IaaS Service Level Terms This document (the Public IaaS Service Level Terms ) describes the Service Levels and Service Level Credits applicable to Cisco

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

ATM END-POINT PROTECTION MONITORING

ATM END-POINT PROTECTION MONITORING ATM END-POINT PROTECTION MONITORING GENERAL PROVISION Service Activation. To activate the ATM End-Point Protection Monitoring Service it may be necessary to install hardware and/or software components.

More information

MANAGED COLOCATION SERVICES TERMS AND CONDITIONS

MANAGED COLOCATION SERVICES TERMS AND CONDITIONS MANAGED COLOCATION SERVICES TERMS AND CONDITIONS In addition to the General Terms and Conditions, your use of the Managed Colocation Services is subject to the following additional terms and conditions:

More information

Dimension Data Hosted Private Cloud

Dimension Data Hosted Private Cloud Dimension Data CONTACT INFO Andy Lancaster E: andy.lancaster@dimensiondata.com P: +44 12 5277 9649 1 Contents 1 Service Description... 3 1.1 Service Overview... 3 1.2 Service Features... 4 2 Service Management...

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

Service Level Agreement

Service Level Agreement Service Level Agreement This Service Level Agreement ( SLA ) governs the following elements of the Services provided by Seller to Buyer: 1) Server Uptime 2) Network Availability 3) Support Response Time

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End User

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Quality Certificate for Kaspersky DDoS Prevention Software

Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General

More information

Layered Tech Cloud Data Center Service Guide

Layered Tech Cloud Data Center Service Guide Guide v1.3, 11-28-2012 Cloud Data Center Service Description The Layered Tech Cloud Data Center (CDC) service platform offers a secure self-service cloud computing, storage, and networking environment

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

TekCloud Service Agreement

TekCloud Service Agreement Severity This ( Service Agreement ) is incorporated into the Quote executed by TekLinks and Customer for TekCloud Services and sets forth the specific terms and conditions under which TekLinks shall supply

More information

SERVICE LEVEL AGREEMENT (SLA)

SERVICE LEVEL AGREEMENT (SLA) SERVICE LEVEL AGREEMENT (SLA) This agreement covers the provision and support of the Managed Networking Services and details the service targets and obligations set and maintained by One...Solutions. Further,

More information

SAAS MADE EASY: SERVICE LEVEL AGREEMENT

SAAS MADE EASY: SERVICE LEVEL AGREEMENT SAAS MADE EASY: SERVICE LEVEL AGREEMENT THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( SaaS Made Easy ). Capitalized terms used herein but not otherwise defined

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

How To Use Adobe Software For A Business

How To Use Adobe Software For A Business EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed

More information

HOSTING SERVICES AGREEMENT

HOSTING SERVICES AGREEMENT HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule

More information

UCS Level 2 Report Issued to

UCS Level 2 Report Issued to UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification

More information

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Virtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10

Virtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10 Virtual Server Hosting Service Definition SD021 v1.8 Issue Date 20 December 10 10 Service Overview Virtual Server Hosting is InTechnology s hosted managed service for virtual servers. Our virtualisation

More information

1776 Yorktown, 7th Floor, Houston, TX 77056 877.484.8383 (toll free) 713.484.8383 (main) 713.660.7988 (fax) www.alertlogic.com

1776 Yorktown, 7th Floor, Houston, TX 77056 877.484.8383 (toll free) 713.484.8383 (main) 713.660.7988 (fax) www.alertlogic.com On initial inspection, log management appears a straight forward and fairly basic feature of infrastructure management. It has long been understood as an operational best practice and security measure

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

Oracle Cloud Enterprise Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5

Oracle Cloud Enterprise Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5 Oracle Cloud Enterprise Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5 Unless otherwise stated, these Oracle Cloud Hosting and Delivery Policies (the Delivery Policies ) describe

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Cloud Services Agreement & SLA

Cloud Services Agreement & SLA Cloud Services Agreement & SLA This agreement ( Agreement ) is between APH Inc. (which may be doing business as Codero, or other fictitious names, and which is referred to in this Agreement as Codero )

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")

More information

Ancero Backup & Disaster Recovery (BDR) Service Guide

Ancero Backup & Disaster Recovery (BDR) Service Guide Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

Dynamic IP Standard Terms and Conditions

Dynamic IP Standard Terms and Conditions Dynamic IP Standard Terms and Conditions In addition to the general terms and conditions contained in the service agreement between PAETEC, now a Windstream Company and Customer (the Agreement ), of which

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our ENDNOTE ONLINE SECURITY OVERVIEW FOR MY.ENDNOTE.COM In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our servers from attacks and other attempts

More information

COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS

COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS COMLINK Cloud Technical Specification Guide VIRTUAL PRIVATE SERVERS Updated June 13, 2014 *Subject to Change* Table of Contents 1-2 Overview of Virtual Private Servers 2-3 Benefits 2 Reduce IT Cost and

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

Service Definition. Hyve Government Cloud Servers - Small (IaaS)

Service Definition. Hyve Government Cloud Servers - Small (IaaS) Service Definition Hyve Government Cloud Servers - Small (IaaS) Hyve Government Cloud Servers -Small Hyve's Government Cloud Servers are delivered to Government customers via the e-procurement portal as

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Altus UC Security Overview

Altus UC Security Overview Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...

More information

Additional services are also available according to your specific plan configuration.

Additional services are also available according to your specific plan configuration. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Statement of Service Enterprise Services - AID Microsoft IIS

Statement of Service Enterprise Services - AID Microsoft IIS Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The

More information