Report of Independent Auditors
|
|
|
- Berenice Bell
- 10 years ago
- Views:
Transcription
1 Ernst & Young LLP Suite th Street Denver, Colorado Tel: Fax: Report of Independent Auditors To the Management of NTT America, Inc.: We have examined management s assertion that NTT America, Inc. (NTTA), during the period October 1, 2009 through September 30, 2010, maintained effective controls to provide reasonable assurance that the, a tier 1 IP backbone (the Network) was available for operation and use, as committed and agreed based on the American Institute of Certified Public Accountants (AICPA) and Canadian Institute of Chartered Accountants (CICA) Trust Services Availability Criteria, which are available at This assertion is the responsibility of NTTA management. Our responsibility is to express an opinion based on our examination. Our examination was conducted in accordance with attestation standards established by the AICPA and, accordingly, included (1) obtaining an understanding of NTTA s relevant availability controls, (2) testing and evaluating the operating effectiveness of those controls, and (3) performing such other procedures as we considered necessary in the circumstances. We believe that our examination provides a reasonable basis for our opinion. Because of the inherent limitations of controls, errors or fraud may occur and not be detected. Furthermore, the projection of any conclusions, based on our findings, to future periods is subject to the risk that the validity of such conclusions may be altered because of changes made to the system or controls, the failure to make needed changes to the system or controls, or deterioration in the degree of effectiveness of the controls. In our opinion, NTTA management s assertion referred to above is fairly stated, in all material respects, based on the AICPA/CICA Trust Services Availability Criteria. The SysTrust Seal on NTTA s website constitutes a symbolic representation of the contents of this report, and is not intended, nor should it be construed, to update this report or provide any additional assurance. ey December 17, A member firm of Ernst & Young Global Limited
2
3 Description of Company Overview NTT America is the U.S. subsidiary of NTT Communications Corporation (NTT Communications), the global hosting, data, and IP services arm of the Fortune Global 500 telecom leader: Nippon Telegraph & Telephone Corporation (NTT). NTT America provides world-class Enterprise Solutions, network, and IP networking for global enterprises and service providers. Managed Web Hosting Services are offered through NTT America s Enterprise Solutions business unit, which provides secure facilities to host a variety of web-enabled solutions in an environment engineered for reliable operations and dedicated high-speed internet connections. NTT Com s global Tier 1 IP backbone, the (the Network), provides the backbone connecting each NTT Communications Group Data Center. The Network was designed and built by NTT Com engineers using the latest technologies to provide fast, efficient, and accurate data transport. It is designed with numerous direct paths, routing options, and private peering points. The Network features OC12, OC48, GE, 10GE, and primarily OC192, circuits, along with Cisco and Juniper Networks routers. The Network carries only data; there are no voice ride-alongs to inhibit data traffic. Regular upgrades are performed to help ensure top network performance. The Network features diverse fiber paths between most major network points, both domestically and internationally. From the beginning, redundancy has been the main focal point in building connections. Connections are diversified by multiple carriers at many of the major points in the Network and are not reliant on one vendor. These geographic and carrier redundancies help ensure that data will keep moving, even if a link fails. The has multiple, highly secure, carrier-class Points of Presence (POP). As a global tier 1 Internet Service Provider (ISP), NTT Communications maintains private peering relationships with other U.S. and global tier 1 ISPs. These private peering relationships provide multiple routing paths for continuous, uninterrupted transport of customer data as shown on the next page. 3
4 4
5 SYSTEM AVAILABILITY Policies Formal processes related to system availability are fundamental to NTTA s internal control structure. Each department or group critical to the availability of the Network has created policies to help govern and instruct personnel in the performance of their duties. Policies are created by the applicable business or operations team, and are approved by management, which includes the director or vice president overseeing those departments. Policies cover access to Data Centers, POP servers, Network Operations Center (NOC), diagnostic measurement servers, and network and data center routers. Policies and escalation procedures are also in place for monitoring of environmental equipment and network components related to network availability. Communications NTTA has established several means of communication with both customers and their employees. Availability information and service level agreements (SLA) are posted on the NTTA website. The SLAs establish performance objectives in the following four areas: Availability, Latency, Packet Loss, and Jitter. Measurements for the SLAs are reported on the website, along with a mechanism to apply for a credit. The Certified Engineering Center (CEC) provides 24/7/365 assistance to customers through Monitoring, Technical Support, Customer Service, System Administration, and Network Administration functions. The CEC is staffed 24/7/365 with professionally trained and certified Windows, Exchange, Solaris, Linux, and Network administrators. In addition to contacting the CEC, customers can also report problems and check on system status through their PowerPortal. An intranet site is used to post NTTA s policies and is accessible to all employees. Weekly and monthly meetings are held by management and their department members to help ensure policies are being followed and issues are addressed and escalated. These periodic meetings are held with the Data Centers, NOC, and with the IP Engineering groups. 5
6 People The is maintained by the following groups: The IP Operations group oversees the Global NOC and the Security Abuse Team (SAT). The NOC is responsible for monitoring the global backbone network, as well as the U.S. regional networks, 24 hours a day. They are also responsible for maintenance of the network, and for the tracking and escalation of outages. SAT is responsible for handling various security, abuse, and compliance issues, such as monitoring network traffic for possible attacks and taking action against identified attackers. The IP Engineering and the NTTA Network Engineers are responsible for the configuration, security, and maintenance of the Network and IP Backbone routers. The Network Engineering group is responsible for the configuration, security, and maintenance of the routers within the Data Centers. The Vice President of Engineering and Operations oversees the Data Center operations. Within the Data Center, the Director of Technical Operations and staff are responsible for the maintenance and security of the Data Center and environmental equipment, day to day operations, including the provisioning of new customer orders. The CEC provides monitoring of customer servers and the Network, resolves customer issues through their technical support team, and also provides system and network administration. Procedures Availability of NTTA s systems is critical to its customers. The Data Centers are equipped with environmental systems including cooling systems, UPS (uninterruptible power supply) devices, fire suppression and/or detection systems, backup generators, and electrical distribution systems, to help ensure customer systems remain available in the event of an emergency or power loss. NTTA contracts with external service firms to perform regular preventative and corrective maintenance of environmental infrastructure equipment to help identify equipment in need of maintenance or replacement prior to an actual failure. System availability is measured and monitored using several different tools: Netcool is a tool that monitors various systems, including network devices. Netcool is used by NTTA to monitor and alert the Certified Engineering Team and the NOC of any potential events. Netcool incorporates probes that scan network devices periodically to detect early warning signs of system problems. When a probe identifies a problem (e.g., a router is not responsive), it creates an event in the Netcool Object Server. The Netcool client software in turn displays a visual event, color-coded based on criticality. After each event is verified, the Certified Engineering Team opens a problem ticket which is 6
7 automatically populated with the details of the event from Netcool. The Certified Engineers and Network Engineers continually monitor Netcool for reported events and respond accordingly. DataTrax monitors Data Center environmental systems in order to identify any systems operating outside of a preset tolerance window. If any abnormalities are detected, DataTrax alerts NTT America personnel to the problem via automated s and text pages. DataTrax monitors environmental systems including cooling systems, UPS devices, fire suppression and/or detection systems, backup generators, and electrical distribution systems. Measurements for SLA statistics are recorded by Indicative agents at 28 of NTT s major POP locations. Indicative is a licensed software tool, developed by Agilent Technologies, which runs on the Diagnostic Measurement Server (DMS) to monitor network performance. The DMS compiles the measurement information obtained from these 28 agent locations. Each of these 28 locations has an integrated system of agents, switches, and routers that are connected directly to the layer 2 backbone switches in the POP. The architecture is fully redundant so that a failure in any given DMS, agent, switch, or router will not cause loss of data or availability. Netflow data is used by the SAT in determining traffic anomalies, signifying Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks. IP Backbone Network The core architecture of the IP backbone network includes Cisco and Juniper routers and Cisco switches. Redundancy has been built into the architecture to help eliminate a single point of failure with these devices. NTTA has programmed a series of tool servers, which act as the primary interface between the IP Engineers and the IP backbone and ensures all routers have the same configuration file. Separate configuration servers exist for the IP Engineering group and for the customer engineers to promote proper segregation of duties and to restrict access. Access to these IP backbone devices is restricted to authorized personnel in the IP Engineering group and the NTTA Network Engineers. The Director of IP Engineering approves any changes in access for new and existing users. Formal change control, configuration standards, and administration procedures are followed to ensure router and switch devices are configured in a consistent manner in order to provide optimal service and security. Approved users must authenticate to the routers and switches through an access control server (TACACS+). The TACACS+ server requires all users to have a unique user name and password. The TACACS+ server logs all user activity, including failed login attempts. The log file is reviewed periodically by management for unusual activity. Other users (e.g., Network 7
8 Engineers) must authenticate to a separate configuration server in order to access the IP backbone. If the TACACS+ server is down or fails, each device has a backup account which all of the authorized IP Engineering and NTTA Network Engineers can access. The backup account has an encrypted password that uses a high-level encryption algorithm for added protection. The router and switch configurations have activated the enable secret service to require an additional password for administrative-level (i.e., root) access. These passwords also use a sophisticated encryption algorithm. Each device uses access control lists (ACLs) to filter source and destination data traffic. One access control list allows only specific IP addresses to authenticate to the router using secure shell (SSH) or Telnet. Another ACL restricts simple network management protocol (SNMP) to specific servers (read only) and also prevents port scanning using SNMP services. The ACLs are activated through the router and switch configuration files. Changes to router and switch configurations follow standard Methods and Procedures and are tracked and logged by a third-party software package called RANCID. RANCID runs hourly via an automated cron job. When a configuration change is detected, RANCID automatically sends an notification to a predefined list of administrators including the Director of IP Engineering. The provides a detailed description of the device and the changes that were made. Global Solutions Network The Network Engineering group maintains the routers within the Data Centers. The core architecture at the Data Centers includes Cisco routers, which connect to the Network. Access to the network devices is restricted to authorized personnel in the Network Engineering group through a TACACS+ server where each authorized user must have a unique ID and password. The manager of Network Engineering approves any changes in access for new and existing users. Administration and maintenance of network devices were tracked through the ticketing system and must be approved by the Network Engineering manager. Maintenance is conducted at off-peak hours. Configuration standards are stored on a separate configuration server and changes to baseline configurations are tracked using a version control system. ACLs are utilized at several levels to restrict network traffic. All hosts are automatically denied access to the Network devices unless they are defined to an ACL. SSH and Telnet access is only allowed from known NTT Com and NTT America IP addresses. 8
9 Monitoring Tools Network events are identified through the use of Netcool and other monitoring tools or through communications with customers. These events are tracked using ticket management software that helps to ensure timely resolution of each ticket. NTTA personnel are responsible for managing the event resolution process to its conclusion. Netcool, working in conjunction with other utilities, is a tool used by NTTA to monitor various systems and alert the CEC of any potential events or issues with the IP backbone, internal networks, and customer networks. Netcool incorporates probes that scan network devices periodically to look for warning signs of possible problems. When a probe identifies a problem, it reports the event to the Netcool Object Server. The Netcool client software, in turn, displays the event, color-coded based on criticality, to the individuals monitoring the system. Indicative, running on the DMS, monitors the polling agents. It sends notifications to Internet Security Systems (ISS) and SNMP traps to the NOC. It is reviewed by NOC personnel to make sure measurements are taken by the agents. The DMS compiles the measurement information obtained from 28 different agents running on the POPs. Nightly SLA reports are sent out to the NOC and representatives from each department within the Global IP Network (GIN). The report notes anomalies detected by the SLA agents. Issues are documented in a ticketing system and escalated as needed. Various tools and scripts are used to help detect when changes have been made to IP Backbone and Data Center routers. The changes and the results of the changes are reviewed by the Network Engineering Manager or IP Engineering for appropriateness. 9
Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com. Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com To the Management of NTT America, Inc.: Report of Independent Auditors We have
Report of Independent Accountants. To the Management of Verizon Communications Inc. Verizon Business IP Application Hosting:
Report of Independent Accountants Ernst & Young, LLP Two Commerce Square Suite 4000 2001 Market Street Philadelphia, Pennsylvania 19103-7096 Tel: +1 215 448 5000 Fax: +1 215 448 4069 www.ey.com To the
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Service Organization Control 3 Report
Service Organization Control 3 Report Description of Cbeyond Cloud Services IT Outsourcing Services relevant to Security and Availability For the period January 1, 2011 through August 31, 2011 with the
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Service Organization Controls 3 Report. Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability
Service Organization Controls 3 Report Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability for the period May 1, 2015 through October 31, 2015 Ernst &
CRITICAL INFRASTRUCTURE: Strategies for Effective NOC Management for Business Success
CRITICAL INFRASTRUCTURE: Strategies for Effective NOC Management for Business Success NTT America AN NTT COMMUNICATIONS WHITE PAPER OCTOBER 2011 Introduction Today, with the rise of streaming content,
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant to Security and Availability
15301 Dallas Parkway, Suite 960, Addison, TX 75001 MAIN 214 545 3965 FAX 214 545 3966 www.bkmsh.com Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Seven Pillars of Carrier Grade Security in the AT&T Global IP/MPLS Network
Seven Pillars of Carrier Grade Security in the AT&T Global IP/MPLS Network INTRODUCTION AT&T s legacy and expertise lies in the creation and maintenance of secure, reliable networks that are always on
Managed Internet Service
DAS MASTER AGREEMENT NUMBER: B-03-012 SERVICE/PRODUCT NAME: Internet Access: Dedicated Internet Service: SERVICE/PRODUCT DESCRIPTION: Managed Internet Service Managed Internet Service (MIS) is an Internet
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address
Inter-provider Coordination for Real-Time Tracebacks Kathleen M. Moriarty 2 June 2003 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations, conclusions, and
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
Network monitoring systems & tools
Network monitoring systems & tools Network & Service Monitoring tools Nagios server and service monitor Can monitor pretty much anything HTTP, SMTP, DNS, Disk space, CPU usage,... Easy to write new plugins
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
SERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the
Service Organization Control 1 Type II Report
Service Organization Control 1 Type II Report Description of ViaWest, Inc. s Colocation System For the Period October 1, 2012 through September 30, 2013 With Independent Service Auditor s Assurance Report
mbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
Introduction to Network Monitoring and Management
Introduction to Network Monitoring and Management Jonathan Brewer Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
UCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Network Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
INDEPENDENT PRACTITIONER S TRUST SERVICES REPORT LIQUID WEB, INC.
INDEPENDENT PRACTITIONER S TRUST SERVICES REPORT LIQUID WEB, INC. Web Hosting Services Trust Services Report on Management s Assertion (SOC 3) As Of June 30, 2014 LIQUID WEB, INC. Trust Services Report
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Ensuring IP Telephony Performance Through Remote Monitoring
Ensuring IP Telephony Performance Through Remote Monitoring A By Introduction The advantages of IP Telephony are well-known, among them network consolidation, centralized voice administration, longdistance
Smart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Ayla Networks, Inc. SOC 3 SysTrust 2015
Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
NETWORK TO NETWORK INTERFACE PLAN
AT&T will provide interconnect points at both the Network Security Operations Center (NSOC) and the Sam Houston Building (SHB), the prescribed DIR locations via AT&T s VPN (AVPN) service. The standards-based
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:
PCISS-1 Job Description: Perform hardware and software installation, configuration, and upgrades Monitoring systems to ensure system availability to all users and performing necessary maintenance to support
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Secospace elog. Secospace elog
Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page
Troubleshooting Network Performance with Alpine
Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.
Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.0 Abstract These Application
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
CAREN NOC MONITORING AND SECURITY
CAREN CAREN Manager: Zarlyk Jumabek uulu 1-2 OCTOBER 2014 ALMATY, KAZAKHSTAN Copyright 2010 CAREN / Doc ID : PS01102014 / Address : Chui ave, 265a, Bishkek, The Kyrgyz Republic Tel: +996 312 900275 website:
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012
System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 Moss Adams LLP 9665 Granite Ridge Drive, Suite 600 San Diego, CA 92123
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Network Management & Monitoring Overview
Network Management & Monitoring Overview Advanced cctld Workshop September, 2008, Holland What is network management? System & Service monitoring Reachability, availability Resource measurement/monitoring
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Report of Independent Auditor
Ernst & Young LLP One Commerce Square Suite 700 2005 Market Street Philadelphia, PA 19103 Tel: +1 215 448 5000 Fax: +1 215 448 5500 ey.com Report of Independent Auditor To the Management of Verizon Communications
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
ACL Compliance Director FAQ
Abstract Cyber Operations, Inc., Cyber Operations, Inc. Copyright 2008 Cyber Operations, Inc. This document contains frequently asked questions about ACL Compliance Director with answers. Table of Contents...
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
Welcome to SoftLayer. Welcome. How to Get Started. Portal Overview. Support Guidelines. Technical Resources. First 48 Hours
First 48 Hours Welcome Welcome to SoftLayer. This document will outline your first 48 hours as a customer and hopefully answer all initial questions. Dedicated server administration is a challenging task
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Global IP Network Overview
Global IP Network Overview NTT Communications NTT Europe Julian Curtis About NTT: Industry Leadership World s IT and Telecom Service Companies by Credit Rating and Revenue high Stability AA A BBB BB AA+
Lumos Parallel Network Operations Centers: Protected Network Monitoring
Lumos Parallel Network Operations Centers: Protected Network Monitoring Lumos Network Operations Center in Waynesboro, VA Availability of Network Services Is Critical Network services are critical for
OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0
Ensuring the Security and Availability of Customer Data June 16, 2008 Version 2.0 CHAPTER 1 1 Omniture Monitoring The Omniture Network Operations (NetOps) team has built a highly customized monitoring
Network Monitoring and Management Introduction to Networking Monitoring and Management
Network Monitoring and Management Introduction to Networking Monitoring and Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Integrating with IBM Tivoli TSOM
Integration Notes Integrating with IBM Tivoli TSOM The Cascade Profiler integrates with the IBM Tivoli Security Operations Manager (TSOM) through the use of SNMP traps. It has been tested with TSOM Version
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
Network Router Monitoring & Management Services
Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER
Spyders Managed Security Services
Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Network provider filter lab
Network provider filter lab Olof Hagsand Pehr Söderman KTH CSC Group Nr Name 1 Name 2 Name 3 Name 4 Date Instructor s Signature Table of Contents 1 Goals...3 2 Introduction...3 3 Preparations...3 4 Lab
