ATM END-POINT PROTECTION MONITORING
|
|
|
- Josephine Mosley
- 10 years ago
- Views:
Transcription
1 ATM END-POINT PROTECTION MONITORING GENERAL PROVISION Service Activation. To activate the ATM End-Point Protection Monitoring Service it may be necessary to install hardware and/or software components. Diebold shall have the right to install hardware and/or software on the Client s ATM units. Diebold shall retain ownership of all hardware installed on the Client s ATMs as required to implement the ATM End-Point Protection Monitoring Service. Network Certification. If the Client deems it necessary, for any reason, to have the ATM End-Point Monitoring Service certified with any authorization network or to certify compliance with any government or industry standard, it is the sole and exclusive responsibility of Client to do so. Software. Notwithstanding any other provision, any software provided in connection with this ATM End-Point Protection Monitoring Service is provided AS-IS and WITHOUT WARRANTY. Liability Limitation. ATM End-Point Protection Monitoring Service is offered under the terms and conditions set forth in the Agreement, and all software provided in connection therewith is provided pursuant to the terms set forth above, including, without limitation, the provisions thereof which limit Diebold s and its supplier s liability. WITHOUT LIMITING THE FOREGOING, IN NO EVENT SHALL DIEBOLD OR ITS SUPPLIERS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, EXEMPLARY, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES THAT MAY BE SUFFERED OR INCURRED BY CLIENT OR ANY PERSON OR ENTITY AFFILIATED OR ASSOCIATED WITH CLIENT, EVEN IF DIEBOLD HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE OR SUCH DAMAGE RESULTS FROM PERFORMANCE, ATTEMPTED PERFORMANCE, OR NON-PERFORMANCE, INCLUDING WITHOUT LIMITATION RESULTING FROM ANY USE OF ANY WORK PRODUCT, IMPLEMENTATION OF ANY RECOMMENDATIONS, INACCURACY OR INABILITY TO USE RESULTS FROM THE SERVICES, DELAY OF DELIVERY OR COMPLETION OF THE SERVICES, INACCURACY OR MISREPRESENTATION OF DATA, OR LOSS OF PROFITS, DATA, BUSINESS OR GOODWILL. IN ADDITION, THE LIABILITY OF DIEBOLD AND ITS SUPPLIERS, FOR LOSSES, DAMAGES, LIABILITIES, SUITS AND CLAIMS, REGARDLESS OF THE FORM OF ACTION AND THE PERSON OR ENTITY BRINGING SUCH ACTION, SHALL NOT UNDER ANY CIRCUMSTANCES EXCEED THE AMOUNT SPECIFIED IN PART 9.2 OF THE AGREEMENT. MINIMUM REQUIREMENTS a b c d Opteva terminal Windows XP Pro Operating System, SP2 minimum 2GB of RAM for any ATM running Deposit Automation and/or Text to Speech otherwise 1G of RAM to support an Endpoint Protection Agent. TCP/IP capable with Ethernet capability. For wireless connectivity: sufficient signal strength is required using EVDO routers with a minimum 5 GIG plan. (dial-up connections not supported) 1
2 HOW IT WORKS Diebold installs/configures the Symantec Endpoint Protection (SEP) software on the ATM to communicate with the End- Point Security system at Diebold s Operation Center. When the SEP software detects an event at an ATM, an alert is sent from the ATM to the system via this connection. Diebold monitors the SEP security log files for events related to security and react to security-related events as described below. In addition to monitoring for security alerts/event, Diebold also manages the firewall, and Antivirus components of SEP. SEP software updates are automatically performed by the system, as they are made available by Symantec. The End- Point Security system checks the Symantec web site daily for any software updates. Each ATM checks-in to the End- Point Security system periodically to see if updates are available and if so, they are sent to the ATM to remain current with the latest levels of protection. CORE SERVICE DESCRIPTION Services include on-boarding, maintaining, reviewing, and reporting for in-scope ATMs configured with the standard SEP agent software build. On-boarding Diebold licenses to the Client the Sygate/Symantec SEP software agent. Diebold configures the Symantec End Point Protection Server (SEP) console for Client s deployment at Diebold s Green facility. Diebold s ArcSight SEIM, which is located onsite at Diebold s facility, takes feeds from the SEP console. Diebold verifies the standard build prior to implementation on an initial ATM to ensure log feed information is available for monitoring. Diebold monitors and analyzes traffic detected by the SEP agent build to create a policy of expected or normal activity levels for the in-scope ATMs. SEP Console Maintenance Diebold performs Rule Changes as described for each component in the below section title ATM SEP Management Components of this SOW. Diebold installs Diebold-approved (e.g., applicable, tested, and qualified) Symantec Updates for the in-scope SEP console. Engineer Reviews Prior to implementing changes and Symantec software updates, Diebold conducts an Engineer Review to endeavor to ensure: Hardware/software meets all prerequisites Backup of previous configuration information exists Change is consistent with security best practices Change is relevant to Diebold s environment Change can be implemented within allotted timeframe Reporting Reports containing information on the number and types of events received the previous month will be included in the monthly reporting received from Diebold. ATM SEP Managed Components 2
3 Diebold will manage the firewall, HIDS/HIPS, and Antivirus SEP components via a centralized SEP management console, as described below. Diebold maintains a configuration profile of the SEP console in case of SEP console failure. Diebold will not implement changes to the Client s configuration without prior approval from Client. Firewall Component Diebold will modify Rules via Access Control Lists (ACLs) for inbound and outbound connections. Diebold will implement one set of Firewall Rule changes per calendar month at Client s request. Antivirus Component Diebold configures the Antivirus component to automatically pull updates from Symantec. Monitored Service Components Diebold monitors SEP console logs utilizing a Log Transport Agent (LTA). Diebold utilizes a multi-phased approach to implement and tune monitoring services: Phase 1 Configuration Phase 2 Normalization Phase 3 Ongoing Tuning and Support Diebold works with Client s main Point of Contact (POC) to create a schedule with dates for all deliverables, customize and tune appropriate components for Diebold s environment, and ensure completion of the Client Profile for environmental information. Phase 1 Configuration: Diebold pre-configures the SEP console for Client. Configuration is dependent upon Client providing all the required information as requested by Diebold. Phase 2 Normalization: Diebold reviews data generated, performs statistical analysis in accordance with the project plan. Diebold performs the following major functions during the Normalization process: Map software errors Establish a baseline by monitored service component Establish a set of rules for blocking, reporting, and logging Work with Client to establish minimum and maximum log quantity thresholds in appropriate time intervals, specific to each log source. Phase 3 Ongoing Tuning and Support: Phase 3 lasts for the duration of the SOW and consists of Diebold performing the following functions: Generate Events based on settings established during Normalization. Review all Events and escalate appropriately to Client based on Client s pre-defined escalation procedures laid out in the Client Profile document. Report on all Events in the monthly reports provided by Diebold. Provide Client notifications and perform appropriate remediation tasks as defined in the Response Plan below Conduct Normalization and report card reviews when material shifts occur in Event patterns, for major network environment changes, or on an annual basis. Implement Rule Changes within a 24-hour implementation period within the standard business week, or within the first available Client-defined maintenance window. Contact Client of critical security events within fifteen minutes of detection by the system. Response Plan 3
4 Report Only - Event data is reported monthly as part of the monthly reports provided by Diebold. Severity incident - to Client Severity incident - The following response will be executed. Help Desk notifies Client of the incident. This notification will consist of both an and an attempt to contact the primary or back-up contacts for security events via phone. If requested, the Help Desk will consult with the Client on responding to the security event. If the Client requests that a Diebold Service technician be dispatched to replace the hard drive or reinstall the software, charges will apply. Response Categories Client could receive notification for the events that include, but not limited to, the following categories of Events. The Client is responsible in determining what, if any, response will take place if an Event is received. Examples of the possible type of Events that could be received are as follows: Category Options Description Severity Chat/Instant Messaging Activity SEP Configuration Change / Modification Connectivity / Network Problem Desktop Application Exploit ATM Reconnaissance Informational Messages Network Exploit Network Reconnaissance OS Exploit Unauthorized Remote Access Spyware / Malware Virus / Trojan / Worm A chat tool is being utilized like "gtalk" or AIM to communicate to/from the ATM. - Typically against company policies Activity that indicates a change in the configuration of a device (i.e. Firewall config changes, etc.) These events indicate possible problems with network health or connectivity. Any buffer overflow attempts to exploit vulnerabilities associated with user applications running on an ATM. Activity that attempts to find out what's on a ATM (e.g. Vulnerability scanning: Nessus, Whisker, OS Flaws, etc ) These events are informational in nature and have little to no security or system impact (example: AV updates were updated successfully) Network traffic, which represents anomalies or RFC violations for such protocols as TCP or ICMP. (Unexpected Data in an ICMP packet or Flags not set appropriately in a TCP packet, TCP-IP Protocol Anomalies, RFC Violation) Activity that attempts to find out what's on the network - Information/Discovery Scan: Nmap, SYS Scan, Port sweep Any attempts to exploit vulnerabilities associated with an Operating System via buffer overflow. (example: Vulnerabilities with the windows kernel). This activity is caused by use of unauthorized remote administration tools (e.g. RDP / Term Server, VNC, etc..). Hostile or intrusive software which may monitor and report system activities to third parties or cause damage to the operating system without user consent. Malicious code/software that compromises system integrity and security. This may lead to network disruptions, data loss and system instability. Report Report Changes in Service 4
5 If regulatory changes (e.g., changes by a regulatory agency, legislative body, or court of competent jurisdiction) require Diebold to modify the Services described herein, Client agrees in good faith to work with Diebold to amend this SOW accordingly. Connectivity Connectivity is required between the ATMs and Diebold s Network Operations Center (NOC). The following connectivity options may be implemented: MPLS Circuits and routers are ordered and provisioned by Diebold; Client is billed by Diebold o to Client s wide-area network or directly to each ATM Wireless using EVDO routers (5 GB min. plan) of sufficient signal strength Wireless plans are ordered and provisioned by Diebold; Client is billed by Diebold o directly from each ATM (Requires one circuit and router per ATM) VPN Managed VPN HW/SW is provided by Diebold; Client is billed by Diebold o to Client s wide-area network or directly to each ATM VPN Co-managed VPN HW/SW is provided by Client (Client location) and by Diebold (Diebold location); Client is billed by Diebold o to Client s wide-area network or directly to each ATM IMPLEMENTATION PROJECT DIEBOLD RESPONSIBILITIES a. Review and reach agreement on the incident response plan. b. Configuring the Symantec Endpoint Protection server for the standard ATM End-Point Protection Monitoring Service. IMPLEMENTATION PROJECT CLIENT RESPONSIBILITIES a. Client must have a valid Master Licensing Agreement (MLA), Managed Equipment and Services Agreement (MESA), or Diebold Comprehensive Agreement (DCA) with Diebold representing the copies of Windows XP Pro, or later version, they have licensed for their ATMs. The number of copies purchased must equal the number of ATMs to be managed by this service. b. Client must provide Diebold Technician with administrative rights to access the ATM during the Security Agent Client Installation process. c. Client must have sufficient bandwidth available on their internal network to support large file transmissions; Diebold highly recommends that the internal network be a minimum of 128K. d. Client must accept the addition of pre-defined rules to the ATMs firewall application to allow it to communicate with the Symantec Endpoint Protection Server operated by Diebold. e. Schedule all service-related activities and communicate with the POC as needed for installation and ongoing tuning and support. f. Provide Diebold with contact information updates. g. Ensure access and connectivity to the in-scope SEP console. h. Provide knowledgeable staff, and/or third party resources, to assist Diebold with on-boarding. i. Configuring end-to-end connectivity. j. Providing IP addresses. k. Providing data on applications which must communicate to/from the ATM. l. Provide Diebold with access to an initial ATM for configuration and piloting the support Services. m. Provide a unique identifier (naming convention) for all in-scope ATMs to enable appropriate Event escalation. n. Provide connectivity between the managed ATMs and Client s network (except for wireless communications). o. IT Security Agreement (for VPN based connectivity) 5
6 p. Provide any other information as requested. q. Complete Diebold Change Request (AMC form) to authorize any required changes in scope. r. The Change Request must be submitted by Client s appropriately authorized individual, verifiable in Diebold s client contact database. s. Once the Service is installed and active, it is highly recommended that the Client perform a security scan of the installed system to validate the proper security configuration of the ATM. Client acknowledges and agrees to the following: a. Client will work reasonably with Diebold to establish an acceptable implementation period. b. Rule Changes involving auto-blocking (shunning) require approval from an authorized Client individual (verifiable in Diebold s database) prior to implementing an auto-blocking rule. c. Diebold is not responsible for any loss of business incurred by Client (or third parties associated with Client) due to outages caused by a Client requested Rule Change involving auto-blocking. d. Client s failure to meet any of the Service Requirements on a timely basis can result in delays in the onboarding process. e. Diebold will not manage, update, or support altered, damaged, or modified software, or software, which is not the most-current or Symantec supported version. f. Client is fully aware of Diebold s recommendation to perform full back-ups prior to the performance of Services. g. The in-scope SEP console may not have visibility into encrypted packets and therefore, may not detect viruses contained within those packets. 6
Dell Advanced Network Monitoring Services Service Description
Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.
HOSTEDMIDEX.CO.UK THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO CLIENT BY THE SUPPLIER. I. Service Definition Lanmark Technical Services Ltd trading as mailhosted.co.uk
How To Get Paece Vpn On A Paucec Network For Free
MPLS VIRTUAL PRIVATE NETWORK SERVICE 1. DESCRIPTION. This service description sets forth the entire Preferred Advantage SM Multiprotocol Label Switching Site to Site IP Virtual Private Network Service
APPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between
SKC MANAGED SERVICES TERMS OF USE
SKC MANAGED SERVICES TERMS OF USE 1. Access to Customer Network (last updated August 06, 2015) SKC s ability to access the Customer s network is essential to successful SKC Managed Services fulfillment.
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Service Description: Dell On Call HelpDesk Service
Service Description: On Call HelpDesk Service This Service Description is between you ( You or Customer ) and Canada Inc., (, Our or We ). The below services provide consumer customers with 24x7 telephone
XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services
1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking
Services Agreement. Rev 12/10/08 TC v08 1
Services Agreement This Agreement is entered into by, herein referred to as Client, and Computer Crews, a Colorado Corporation, hereinafter referred to as Service Provider. The Parties agree as follows:
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Managed Device Support Service Agreement Page 1 of 10
Managed Device Support Service Agreement Page 1 of 10 This Managed Device Support Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc.
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010 What is Trend Micro OfficeScan? Trend Micro OfficeScan Corporate Edition protects campus networks from viruses, Trojans, worms, Web-based
Bare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description
This Bare Metal Cloud Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up.
TERMS OF SERVICE: Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up. The following Terms and Conditions are applicable to all individual users / corporate clients who use, sign-up and pay-for
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
BNSync User License Agreement
BNSync User License Agreement This Agreement ("Agreement") contains the complete terms and conditions that apply to your installation and use of BNSync, a proprietary software product that is owned and
January 2015. Brennan Voice and Data Pty Ltd. Service Level Agreement
January 2015 Brennan Voice and Data Pty Ltd Service Level Agreement 1. Introduction This document describes the service level commitment to Brennan Voice and Data Clients in relation to the following services
Dell Advanced Network Management Services Service Description
Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Management: Network outages or network performance problems can cause significant economic impacts to your day-to-day
Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
Teleflora Managed Services Agreement
Teleflora Managed Services Agreement Page 1 of 6 This Teleflora Managed Services Agreement (this "Agreement") is entered into as of the Effective Date set forth below between Teleflora LLC ("Teleflora")
NextiraOne, LLC d/b/a Black Box Network Services
NextiraOne, LLC d/b/a Black Box Network Services Black Box Network Services Additional Terms and Conditions Managed Services ( Additional Terms ) applicable to furnishing of equipment and services within
SERVICE LEVEL AGREEMENT. Open Source Support Desk B.V. Hargray, Inc.
SERVICE LEVEL AGREEMENT between Open Source Support Desk B.V. and Hargray, Inc. Copyright 2011 by Open Source Support Desk B.V. All rights reserved. This document is protected by copyright. No part of
PAV Installations, LLC Services AGREEMENT (the "Agreement")
PAV Installations, LLC Services AGREEMENT (the "Agreement") THIS IS A LEGAL CONTRACT BETWEEN YOU AND PAV Installations, LLC("PAV Installations"). READ THIS AGREEMENT CAREFULLY. Install Services TERMS.
Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support [email protected]
Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support [email protected] Introduction The recent increase in virus and worm activity has created the
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Access - Point-to-Point VPN Tunnel Service Agreement. 1.0 Terminology. 3.0 Service Options. 4.0 Service Delivery. 2.0 Service Description
This Access - Point-to-Point VPN Tunnel Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
UC CLOUD VOICE SERVICE ADDITIONAL TERMS AND CONDITIONS AND SERVICE LEVEL AGREEMENT to the UC Cloud Voice Service Addendum
UC CLOUD VOICE SERVICE ADDITIONAL TERMS AND CONDITIONS AND SERVICE LEVEL AGREEMENT to the UC Cloud Voice Service Addendum This UC Cloud Voice Service Additional Terms and Conditions and Service Level Agreement
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
Terms and Conditions- OnAER Remote Monitoring Service
Terms and Conditions- OnAER Remote Monitoring Service TERMS OF SERVICE Please read these terms of user ( Agreement or Terms of Service ) carefully before using the services offered by AERCO International,
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
Revised 10/13 SUBSCRIBER AGREEMENT. Introduction
SUBSCRIBER AGREEMENT Introduction This Agreement (the "Agreement") sets forth the terms and conditions under which Consolidated Companies, Inc., together with any affiliate and/or distribution partner
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
ADDITIONAL TERMS FOR VIRTUAL VOICE NETWORK SERVICES SCHEDULE 2L
ADDITIONAL TERMS FOR VIRTUAL VOICE NETWORK SERVICES SCHEDULE 2L CONTENTS 1 Service Description... 3 2 Definitions... 3 3 Virtual Voice Network terms... 4 4 CHARGES... 4 4.1 Charges payable by the... 4
ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS
ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS The following Terms and Conditions govern the rights and obligations of Cable and Wireless and the Customer in connection with Cable and Wireless
Hosting Services - Dedicated Service Agreement Page 1 of 6
Hosting Services - Dedicated Service Agreement Page 1 of 6 This Hosting Services - Dedicated Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions,
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
How To Manage Your Information Systems At Aerosoft.Com
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End
SERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
TUFIN SOFTWARE NORTH AMERICA, INC. GENERAL TERMS AND CONDITIONS FOR SUPPORT AND MAINTENANCE SERVICES [Last revised: May 11, 2014]
TUFIN SOFTWARE NORTH AMERICA, INC. [Last revised: May 11, 2014] 1 SCOPE OF APPLICATION 1.1 These General Terms and Conditions shall apply to Services with respect to Tufin Technologies software programs
Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement)
Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) I. INTRODUCTION PARTIES AND DEFINITIONS This Mobile Banking Service Agreement (as amended from time to time,
MPA Hosting Service Level Agreement
MPA Hosting Service Level Agreement 1. Coverage and Terminology This Service Level Agreement ("SLA") covers performance guarantees for our network and server hardware, and is made between MPA Computers,
Load Balancing Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery
This Load Balancing Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
SaskTel Hosted Exchange Service
Page 230 3rd Revision Effective Date: October 19th, 2010 SaskTel Hosted Exchange Service This document contains the following information: General Termination Amendments to this Agreement Service Description
Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Hosting Services - Virtual Data Center Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options
This Hosting Services Virtual Data Center Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT MANAGED IP VPN MPLS PRODUCT TERMS
EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT MANAGED IP VPN MPLS PRODUCT TERMS Registered Office at: St James House Oldbury Bracknell RG12 8TH Company No: 03676297 BMI MSA 20150402
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
1.1.1. Interoute Application Management comprises the following managed services for application and database software:
1. SERVICE DESCRIPTION 1.1. Scope of Interoute Application Management Services 1.1.1. Interoute Application Management comprises the following managed services for application and database software: a)
Consensus Policy Resource Community. Lab Security Policy
Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Schedule Document. Leased Lines & Ethernet Based Services. Node4 Limited 29/11/2007
Schedule Document Leased Lines & Ethernet Based Services Node4 Limited 9//007 SCHEDULE Additional terms, Service Description & Service Level Agreement for Leased Lines & Ethernet Based Services. SERVICE
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.
SERVICE SCHEDULE FOR ETHERNET PASS-THROUGH SERVICES
SERVICE SCHEDULE FOR ETHERNET PASS-THROUGH SERVICES The following terms are additional to those in the applicable Master Reseller Agreement (the Agreement ) between UK Broadband (the Supplier ) and PCCW
GENERAL TARIFF. 2) Internet Service is provided at C&W's discretion, depending on the availability of suitable facilities and equipment.
Page 6.1 INTERNET ACCESS SERVICES General 1. Description 1. This item is subject to the terms and provisions of Part A of this Tariff. 2. This Part applies to the following C&W services: Dialup Internet
SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE
SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE The following terms and conditions are additional to those in the prevailing Viatel General Terms and
Shared Hosting Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery
This Shared Hosting Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
