Information Session on T2S User Connectivity

Size: px
Start display at page:

Download "Information Session on T2S User Connectivity"

Transcription

1 Information Session on T2S User Connectivity Technical and Operational criteria for the selection of T2S Network Providers Silvio Orsini T2S Infrastructure Co-ordinator Frankfurt,14 July

2 Disclaimer The following slides summarise the main aspects of the current considerations of the Eurosystem with respect to technical criteria on the basis of which the T2S Network Providers will be selected. Although some of the issues presented can be considered fairly stable and will most likely be part of the final decision, others are not, and might therefore be dropped or substantially altered. Consequently, these slides should by no means be used by any T2S Actor or potential T2S Network Provider to make any decisions or investments with respect to connectivity in T2S. Although this presentation has been delivered to a number of CSDs that have - together with the Eurosystem - signed the T2S Memorandum of Understanding, they have been published on the ECB website in order to give all economic actors equal and simultaneous information about the status of the T2S connectivity discussions. 2

3 Summary 1. Introduction 2. Volumetric assumptions 3. Selection criteria 4. Organization, operation and plan 3

4 1. Introduction The T2S platform The T2S platform widens over three Regions: Region 1 Italy Region 2 Germany Region 3 France The remote access to the platform is enabled by VANs Region 1 and region 2 are directly connected to the VANs Region 3 relies on the accesses to VANs at region 1 & 2 (using the internal 4CB network) 4

5 1. Introduction Responsibility T2S s responsibility ends at connection point P The network interface at T2S platform and user domain are technically decoupled How the user interface is defined is not specified by T2S Notary log middleware T2S platform domain P GW VAN VAN VAN U GW Users domain The gateway (GW) is the VAN termination-end under the VAN providers responsibility 5

6 1. Introduction Connectivity architecture The VANs are connected to the 4 sites avoiding any single point of failure The VANs take into account workload management and periodic swaps (i.e. rotation, recovery) Users do not perceive in which Region a module is running Rotation/recovery is transparent (no changes in user configuration is requested) T2S platform domain Site 1 Region 2 Region 1 Site 2 Site 3 Site 4 Gateway Gateway Gateway Gateway VAN domain network user domain T2S actor (user or application) 6

7 2. Volumetric assumptions Volume of transactions With reference to: T2S General Technical Specifications - General Technical Design version

8 2. Volumetric assumptions 2014 volume breakdown The following figures show the estimated volumes to be managed by T2S core system (the mainframe) and the archiving platform in the first year of production 8

9 2. Volumetric assumptions Network workload (2) Each VAN provider shall size its infrastructure based on its expected market share (theoretically it can also be equal to 100%) and shall size the infrastructure to ensure it meets performance and volume requirements Capacity planning breakdown data shall be provided to T2S administrator every year (for sizing and monitoring purpose) 9

10 3. Selection criteria The VAN services T2S connectivity services shall support file and message transfer, real-time (A2A) file and message transfer, store-and-forward (A2A) web access to T2S platform (U2A) 10

11 3. Selection criteria Message and file differentiation Message is a data structure containing a single financial instruction or information based on ISO20022 standard (maximum message length will be defined) File is a data structure containing two or more messages, (maximum message length will be defined) 11

12 3. Selection criteria Real-time file/message transfer T2S and Users are able to exchange messages and files A real-time message exchange (request-response) shall be completed within few seconds; If no response is received in this timeframe a timeout message shall be generated by the VAN and sent to the sender 12

13 3. Selection criteria Store and forward file/message transfer The sender can transmit message or file even when the receiver is not available The message/file is delivered by the VAN as soon as the receiver becomes available VAN shall provide to the sender a delivery notification failure after a maximum number of failed retries when the receiver is available after a number of days in case the receiver is not reachable 13

14 3. Selection criteria T2S Business Continuity support VANs shall support T2S Business continuity without any user intervention or impact on user configuration in case of intra-region recovery, between primary and secondary site in the same region, on request of 4CB staff, VANs are requested to switch the traffic in few minutes in case of inter-region recovery, between the two Regions, on request of 4CB staff, VANs are requested to switch the traffic in few minutes on periodic rotation occurrence (e.g. almost every six months), the VAN provider must switch the traffic between the two Region, on request of 4CB staff, during a week-end, in few minutes (planned operation) 14

15 3. Selection criteria Restart after disaster 1. Usage of VAN message retrieval service VANs resend instructions, settlement confirmations, static data changes, and maintenance instructions the same account positions can be rebuild with a reasonable likelihood (but no guarantee) 2. As an alternate option the users should resend messages and files the operational risk would significantly increase because of the needed interaction with many parties a huge co-ordination effort is needed in relation to testing message recovery 15

16 3. Selection criteria Recovery of the VAN The VAN shall automatically manage its recovery, exploiting the redundancies, to assure the service continuity T2S is not going to rotate in case of the regional disaster of a single VAN (users of that VAN will not be able access T2S platform) Recovery from one VAN to another is a user responsibility 16

17 3. Selection criteria Security features VAN shall provide the technical infrastructure to exchange messages in compliance with strict security requirements Confidentiality Integrity User identification and access control Non repudiation 4CB staff shall decide who is allowed to access the T2S domain monitor the technical operations at the T2S interface of the VAN manage all the encryption keys from T2S used in the VAN administer all the T2S credentials used by the T2S actors 17

18 4. Organization, operation and plan Service catalogue and manuals The VAN shall provide a catalogue of connectivity services for its customers as part of the T2S overall service catalogue Jointly with the 4CB staff, the VAN shall provide and maintain two reference manuals: Operations manual, that describes the network related components installed in the premises of the Service Provider and contains the complete list of monitored elements Escalation manual, that formalises the escalation process in normal and abnormal conditions 18

19 4. Organization, operation and plan Support and Incident/Problem management Support Team: the VAN providers shall offer to 4CB and the T2S actors a Service Desk service the 4CB Teams shall be able to contact the VAN providers Support Teams 24 hours seven days a week during all year Trouble ticketing system: the VAN providers shall record all actions, as well as the timestamp (time and date) at which the actions occur, in its central Trouble ticketing system this information shall be made available to the 4CB upon request and as part of the periodic incident review activity The VAN providers shall provide: initial response time for blocking problems: a maximum will be defined first status update time for blocking problems: a maximum will be defined 19

20 4. Organization, operation and plan Implementation requirements The VAN providers shall preliminary implement a proof of concept; the PoC infrastracture will remain as internal test environment for the 4CB (INTEG, IAC) The VAN providers shall support for implementing and executing integration and acceptance tests of the services 20

21 Information Session on T2S User Connectivity Thank you for your attention Frankfurt,14 July

Data Migration Tool Requirements and Related Procedures

Data Migration Tool Requirements and Related Procedures Data Migration Tool Requirements and Related Procedures Version V1.2 Date 16/04/2014 Table of Content Preface... 5 1 Scope of the Data Migration Tool... 7 2 Procedural Aspects... 8 2.1 Data Migration

More information

T2S Non Functional Tests

T2S Non Functional Tests 1) Business Continuity Test Cases Description 2) Performance Test Cases Description 3) Security Tests Author 4CB Version 1.9 Date 25/09/2013 Status Final draft Classification PUBLIC Business Continuity

More information

T2S financials: status update

T2S financials: status update 0 T2S financials: status update T2S Advisory Group Frankfurt am Main, 17-18 June 2014 T2S Programme Office European Central Bank Item 5.1 T2S financials: status update Eurosystem s reporting obligation

More information

Overview of Message Retrieval capabilities on SWIFTNet

Overview of Message Retrieval capabilities on SWIFTNet of Message Retrieval capabilities on SWIFTNet V1.0-27 September 2013 As of 2014, SWIFT is offering several ways to retrieve messages that were received through a store-and-forward service. This paper outlines

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

T2S General Technical Specifications

T2S General Technical Specifications T2S General Technical Specifications General Technical Design 2.2.0 Author 4CB Version 2.2.0 Date 23/11/2009 Reproduction for educational and non-commercial purposes is permitted provided that the source

More information

Control and management of privileged users

Control and management of privileged users Control and management of privileged users The secure solution for monitoring and recording privileged users Visulox The complete Access Management Solution ToolBox Solution GmbH, established in 2003,

More information

Cloud-based Managed Services for SAP. Service Catalogue

Cloud-based Managed Services for SAP. Service Catalogue Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012 Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

Electronic Document and Record Compliance for the Life Sciences

Electronic Document and Record Compliance for the Life Sciences Electronic Document and Record Compliance for the Life Sciences Kiran Thakrar, SoluSoft Inc. SoluSoft, Inc. 300 Willow Street South North Andover, MA 01845 Website: www.solu-soft.com Email: [email protected]

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

Course Outline: Course 6317: Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills

Course Outline: Course 6317: Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course Outline: Course 6317: Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to DBA Skills Learning Method: Instructor-led Classroom Learning Duration: 3.00 Day(s)/ 24 hrs Overview:

More information

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services Market Data + Services Advanced outsourcing solutions IT Hosting and Managed Services Table of Contents 3 Table of Contents Introduction Market Data + Services powers the financial community with a range

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery

More information

ITIL A guide to Event Management

ITIL A guide to Event Management ITIL A guide to Event Management An event can be defined as any detectable or discernable occurrence that has significance for the management of the IT Infrastructure of the delivery of IT service and

More information

ITIL: Service Operation

ITIL: Service Operation ITIL: Service Operation Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom s Taxonomy What do you Expect? Housekeeping

More information

T2S Non Repudiation of Origin (NRO)

T2S Non Repudiation of Origin (NRO) T2S Non Repudiation of Origin (NRO) Implementation of nonrepudiation for U2A (CR 0466) Technical Document Author FAM Version 1.5 Date 21/01/2016 Status final Classification Accessible Classified until

More information

San Francisco Chapter. Information Systems Operations

San Francisco Chapter. Information Systems Operations Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with

More information

T2S PROGRAMME OFFICE. Connecting to T2S. Technical Session. June 25 th, 2014. 2010 Colt Telecom Group Limited. All rights reserved.

T2S PROGRAMME OFFICE. Connecting to T2S. Technical Session. June 25 th, 2014. 2010 Colt Telecom Group Limited. All rights reserved. T2S PROGRAMME OFFICE Connecting to T2S Technical Session June 25 th, 2014 2010 Colt Telecom Group Limited. All rights reserved. Agenda Connecting to T2S Overview Onboarding Phase NSP Support User Testing

More information

Agio Remote Monitoring and Management

Agio Remote Monitoring and Management Remote Monitoring and Management s Remote Monitoring & Management is a 24x7x365 service in which we proactively manage your infrastructure and IT environment to make sure it s in a healthy state and stays

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

Dedicated Links Connectivity Specifications

Dedicated Links Connectivity Specifications V1.0 Author 4CB Version V1.0 Date 29/06/2012 All rights reserved. Reproduction for educational and non-commercial purposes is permitted provided that the source is acknowledged. 1. INTRODUCTION 6 1.1.

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Administering Microsoft SQL Server Databases

Administering Microsoft SQL Server Databases Administering Microsoft SQL Server Databases Course Details Duration: Course code: 5 Days M20462 Overview: This five-day instructor-led course provides delegates with the knowledge and skills to maintain

More information

DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES

DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES DISK IMAGE BACKUP For Physical Servers VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results

More information

20462- Administering Microsoft SQL Server Databases

20462- Administering Microsoft SQL Server Databases Course Outline 20462- Administering Microsoft SQL Server Databases Duration: 5 days (30 hours) Target Audience: The primary audience for this course is individuals who administer and maintain SQL Server

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

Intrado Inc. (as successor in interest to Connexon Telecom Inc) Support Policy

Intrado Inc. (as successor in interest to Connexon Telecom Inc) Support Policy (as successor in interest to Connexon Telecom Inc) Version L_September 2 nd 2014 Contents INTRADO SUPPORT POLICY... 1 1 OVERVIEW... 2 2 SUPPORT SERVICES... 3 2.1 What is included in the Intrado Support

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

Ongoing Help Desk Management Plan

Ongoing Help Desk Management Plan Ongoing Help Desk Management Plan HELP DESK IMPLEMENTATION /MANAGEMENT The Vendor shall provide in its Response to DIR a Help Desk Implementation Plan which shall include, but not be limited to: a. Customer

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

Security Assessment Report

Security Assessment Report Security Assessment Report Prepared for California State Lottery By: Gaming Laboratories International, LLC. 600 Airport Road, Lakewood, NJ 08701 Phone: (732) 942-3999 Fax: (732) 942-0043 www.gaminglabs.com

More information

User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0

User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0 Using SWIFTNet to communicate with the Deriv/SERV system at DTCC User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0 Version 2.0 August 2009 Deriv/SERV through SWIFTNet

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led

Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led About this Course This three-day instructor-led course provides

More information

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...

More information

How To Create A Network Access Control (Nac) Solution

How To Create A Network Access Control (Nac) Solution Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012

System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 Moss Adams LLP 9665 Granite Ridge Drive, Suite 600 San Diego, CA 92123

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

Administering Microsoft SQL Server Databases

Administering Microsoft SQL Server Databases Course Code: M20462 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Administering Microsoft SQL Server Databases Overview This five-day instructor-led course provides delegates with the knowledge

More information

SCHEDULE 1 SERVICE DESCRIPTION

SCHEDULE 1 SERVICE DESCRIPTION SCHEDULE 1 SERVICE DESCRIPTION . Introduction Service Description a) Accreditation Process The Service Provider ( SP ) wishing to be approved by Borsa Italiana as an accredited Service Provider who can

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

Course 20462C: Administering Microsoft SQL Server Databases

Course 20462C: Administering Microsoft SQL Server Databases Course 20462C: Administering Microsoft SQL Server Databases Duration: 35 hours About this Course The course focuses on teaching individuals how to use SQL Server 2014 product features and tools related

More information

UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE

UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE Introduction...2 SOX and COBIT: A Brief Review...2 The COBIT Structure...2 Structure of this Document...3 Planning & Organisation...3 Acquisition

More information

Security in Space: Intelsat Information Assurance

Security in Space: Intelsat Information Assurance Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

20462 - Administering Microsoft SQL Server Databases

20462 - Administering Microsoft SQL Server Databases 20462 - Administering Microsoft SQL Server Databases Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course Description Note: This course is designed for customers who are interested

More information

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents

More information

ITIL A guide to event management

ITIL A guide to event management ITIL A guide to event management Event management process information Why have event management? An event can be defined as any detectable or discernable occurrence that has significance for the management

More information

Simple Software for a Business Continuity Plan and a Disaster Recovery Plan (BCP DRP) pdf ppt

Simple Software for a Business Continuity Plan and a Disaster Recovery Plan (BCP DRP) pdf ppt For a recorded version of this webinar, go to http://www.evidian.com/products/high-availability-software-for-application-clustering/business-continuity-plan-disaster-recovery-plan-bcp-drp-pdf-ppt/ Transitions

More information

Clarity in the Cloud. Defining cloud services and the strategic impact on businesses.

Clarity in the Cloud. Defining cloud services and the strategic impact on businesses. Clarity in the Cloud Defining cloud services and the strategic impact on businesses. Table of Contents Executive Summary... 3 Cloud Services... 4 Clarity within the Cloud... 4 Public Cloud Solution...

More information

Administering Microsoft SQL Server Databases

Administering Microsoft SQL Server Databases 20462C - Version: 1 24 June 2016 Administering Microsoft SQL Server Databases Administering Microsoft SQL Server Databases 20462C - Version: 1 5 days Course Description: This five-day instructor-led course

More information

Introducing Cisco Voice and Unified Communications Administration Course ICOMM v8.1; 5 Days, Instructor-led

Introducing Cisco Voice and Unified Communications Administration Course ICOMM v8.1; 5 Days, Instructor-led Introducing Cisco Voice and Unified Communications Administration Course ICOMM v8.1; 5 Days, Instructor-led Course Description Introducing Cisco Voice and Unified Communications Administration (ICOMM)

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

OX Guard Product Guide v1.0 V1.0

OX Guard Product Guide v1.0 V1.0 OX Guard Product Guide v1.0 V1.0 2014 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in part, provided that each copy

More information

www.wardyit.com [email protected] Administering Microsoft SQL Server Databases

www.wardyit.com contact@wardyit.com Administering Microsoft SQL Server Databases Administering Microsoft SQL Server Databases This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The course focuses on

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification

ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification TS 102 640-4 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Part 4: REM-MD Conformance Profiles 2 TS 102 640-4 V2.1.1 (2010-01)

More information

Department of Industry and Science

Department of Industry and Science Services Catalogue Department of Industry and Science Contents 1 Introduction 2 VANguard Services 2 About the VANguard Services Catalogue 2 Contact Details 2 2 VANguard Services 3 User Authentication Service

More information

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES Introduction Les Chafin; Infrastructure Engineering Manager» HPES NASA ACES Responsible for:»

More information

Evaluation Guide. Powerful & Immediate Business Web Security via the Cloud

Evaluation Guide. Powerful & Immediate Business Web Security via the Cloud Evaluation Guide Powerful & Immediate Business Web Security via the Cloud Contents 1 Introduction & Product highlights 2 Set up & Configuration 3 Managing your WebTitan Cloud Service 4 Reporting 5 Support

More information

ENABIL Managed Services

ENABIL Managed Services ENABIL Managed Services Overview ENABIL Solutions provides the following services to our customers: Customer & Revenue Management Services Problem Management Change Management Performance and Capacity

More information

Capacity Management Plan

Capacity Management Plan Capacity Management Plan Hughes is selected for two categories to provide service: Fixed Satellite Services Small Office/Home Office (SOHO) services In the context of those two services categories, for

More information

BroadCloud PBX Customer Minimum Requirements

BroadCloud PBX Customer Minimum Requirements BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

VODAFONE G-CLOUD SMS-SERVICE

VODAFONE G-CLOUD SMS-SERVICE VODAFONE G-CLOUD SMS-SERVICE Version Content Owner Date 1.1 Robert Hotchkiss 27 August 2013 Page 1 of 13 TABLE OF CONTENTS 1. The G-Cloud SMS-Service... 3 1.1 Overview of the G-Cloud SMS-Service... 3 1.2

More information

T2S Special Series I Issue No 1 I April 2012 I T2S benefits: much more than fee reductions

T2S Special Series I Issue No 1 I April 2012 I T2S benefits: much more than fee reductions T2S Special Series I Issue No 1 I April 2012 I T2S benefits: much more than fee reductions T2S Special Series Issue No 2 October 2012 T2S Auto-collateralisation Author: Mehdi Manaa, T2S Programme Office,

More information

2014 Cash management in TARGET2-Securities with the Banque de France Blueprint Version 1 February 2014

2014 Cash management in TARGET2-Securities with the Banque de France Blueprint Version 1 February 2014 2014 Cash management in TARGET2-Securities with the Banque de France Blueprint Version 1 February 2014 Banque de France Version 1 February 2014 1 C O N T E N T S 1. INTRODUCTION... 5 2. CASH ACCOUNTS...

More information

Adopting Cloud Computing with a RISK Mitigation Strategy

Adopting Cloud Computing with a RISK Mitigation Strategy Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information