About Acquia. Acquia Cloud Site Factory allows you to rapidly build mobile- ready brand, campaign, and franchise websites on a turnkey cloud platform.
|
|
- Duane Lambert
- 8 years ago
- Views:
Transcription
1 SERVICE DEFINITION
2 About Acquia Acquia is a private, fast- growth company supporting enterprises that use the free and open- source content- management system Drupal. Co- founded by Drupal's creator in 2007, Acquia provides customers with software, consultation, hosting, and services to help them launch sites faster and keep them running with more confidence. Drupal Commons is the better way to social business. It's everything your community needs collaboration, community, and more at a far lower total cost than proprietary software. Drupal Commons enables social networking to create productive interactions among employees, customers, and the web. Whether your community is public or private, Drupal Commons does it. Acquia Cloud is a Platform as a Service (PaaS) that delivers superb Drupal hosting for developers and enterprises. Used by some of the world's largest and best- known Drupal sites, Acquia's battle- tested hosting environment is configured, expertly tuned, and optimized for Drupal. Acquia Network provides expert Drupal answers, tools, and support. It's a package that stands behind you, ensuring successful site migration, launch, operation, and growth. Add cloud hosting for the most- complete Drupal solution available anywhere. Get smarter, be more productive, and sleep better knowing that we've got your back. Acquia Cloud Site Factory allows you to rapidly build mobile- ready brand, campaign, and franchise websites on a turnkey cloud platform.
3 High performance Acquia Cloud is Drupal- tuned and pre- configured with advanced performance technologies, including Varnish, Nginx, APC, and Memcached. Drupal sites hosted on Acquia Cloud perform better, at a much lower cost than custom- built alternatives, and benefit from Acquia s continuous platform improvements. Fully managed platform Acquia delivers your Drupal hosting platform as a service, simplifying site monitoring and eliminating operations headaches for your web team. Unparalleled developer experience Separate development, testing, and production environments are deployed automatically from Git or SVN. Drag and drop code, databases, and files between environments. Full Drush support lets you control Drupal functions from the command line. And if something goes wrong, easily roll back code or restore from automatic backups. Optimized for Drupal Acquia Cloud only hosts Drupal websites and is tuned specifically for Drupal performance. Your site gets a high PHP memory allotment, Drupal- specific LAMP stack tuning, opcode caching, Pressflow compatibility, and much more. The result is faster rendering of dynamic content and improved site reliability. Simplified Drupal infrastructure For sites that need high performance and scalability, Acquia Cloud offers everything you need. And because Acquia delivers this infrastructure as a service, you ll reduce costs and simplify site management efforts. Backed by the Acquia Network, Acquia Cloud subscribers gain additional knowledge, training materials, tools, and cloud services to enhance their web experiences.
4 Support Services Network Services Network Services refers to automated services delivered electronically to Acquia Network members and the Acquia Drupal installations that they manage. The network services are designed to provide information and functionality that help Acquia Drupal site administrators keep their sites trouble- free. The online documentation library is a set of Acquia Drupal documentation that includes original documentation specific to Acquia Drupal and the Acquia Network as well as useful documentation from other sources. Update Notifications The software update notifications service alerts Acquia Network subscribers to the availability of updates for their Acquia Drupal installation. This service is powered by the Acquia Network Module within Acquia Drupal. This module reports the current version of all components to the Acquia Network. Unlike the update notifications provided by Drupal.org, the update notifications provided by the Acquia Network are filtered and prioritized by a rigorous automated and human- assisted testing an review processs that assess each update in isolation and in conjunction with it's dependencies. Update notifications that pass this rigorous process are less likely to introduce troublesome regression issues or open new vulnerabilities. The Acquia Network also provides tools to help site administrators assess the importance of each update, convert notifications into work items, and assign and track these work items across teams of administrators in order to ensure effectively and transparent system maintenance procedures. Heartbeat monitoring The uptime monitoring service reports information about the availability of the subscribed site. The service regularly queries the site to determine if Acquia Drupal is fully operational. Modification detection The fork detection service gathers and reports local changes to the Acquia Drupal source code that could result in unexpected behavior. The Acquia Network Module within Acquia Drupal continuously monitors all code in the installation for modifications. This information helps site administrators avoid inadvertent changes that can lead to system instablility and helps Acquia tech support staff more quickly isolate root cause. When a fork is detected, Acquia support staff will work with the customer to assess the supportability of the environment on a case by case basis. Remote cron The remote cron service remotely activates the Cron service on subscribed sites running in environments that do not provide sufficient access to the local Cron service. This service ensures execution of regularly scheduled maintenance tasks and events that require the cron service including search indexing, content syndication, automated s, etc.
5 Mollom spam blocking The Mollom spam blocking service helps protect subscribed sites from unwanted user- generated content including link spam, abusive or innappropriate text- based content, robot- generated user registrations, etc. The Mollom service utilizes the Mollom Module within Acquia Drupal to intercept designated user- generated comment and registrations, evaluate them for spam content, and then either block the submission or challenge the user with a computer- aided Turing test (CAPTCHA). The Mollom service incorporates sophisticated algorithms and feedback mechanisms that enable the service to become more effective over time and to adapt quickly to emergent spam generation techniques. The Mollom service is available in a limited version and full version. Mollom limited has no encryption, no failover, and has a daily limit of 100 ham submissions, 100 correct captchas, and 5000 requests. Mollom full has SSL encryption, failover, and has a daily limit of 10,000 ham submissions, 10,000 correct captchas, and 500,000 requests. The Mollom service is operated by Mollom BVBA and is distributed by Acquia under license. Access Channels Acquia provides support through a variety of access channels. All Acquia Network members have access to special discussion forums where they can interact with Acquia support staff and with each other. The subscriber forums are pro- actively moderated by Acquia to keep discussions polite and on topic. The subscriber forums are designed for general information sharing and collaboration and cannot be used as a substitute for traditional ticket management. There is no specific service level agreement for Acquia support staff participation in the forums. Web tickets The Acquia Network console contains an web interface where members can open and manage support tickets. Acquia Network members with the access channel entitlement may may interact with Acquia support staff via . In order to ensure efficient capture of essential information, all tickets are opened via the web interface. Subsequent communications regarding the ticket may occur over . Chat Acquia Network members with the chat access channel entitlement may interact with Acquia support staff through a web- based chat interface within the Acquia Network console. In order to ensure efficient capture of essential information, all tickets are opened via the web interface. Subsequent communications regarding the ticket may occur over chat. Telephone Acquia Network members with the telephone access channel entitlement may interact with Acquia support staff by telephone.
6 Service Level Acquia Network subscriptions offer a full range of service levels to meet the needs of every project. Named Contacts Names contacts refers to the maximum number of individual Acquia Network member accounts that can be associated with this subscription. Every person who has at least one subscription on the Acquia Network has a unique member account. Members accounts may be associated with multiple subscriptions, which useful for individuals who are responsible for managing multiple Acquia Drupal installations. Similarly, subscriptions may have multiple named contacts to allow multiple administrators or developers to work together in managing the Acquia Drupal servers. The named contacts associated with each subscription may use the task management features of the Acquia Network to work together on processing update notifications and open technical support tickets. Hours The hours of operation are the days of the week and hours of the day during which Acquia support staff process tickets. Maximum initial response time The maximum initial response time is the interval between the submission of a ticket and the initial response by Acquia. Maximum tickets A ticket is an individual issue that focuses on one aspect of the an Acquia product or service e.g. use of a specific documented feature of the product or assistance with a specific problem or error message. A single support ticket may involve multiple interactions with Acquia support staff. Support Scope The support scope defines the kinds of tickets that are supported. Emergency escalation Emergency escalation is the automatic escalation to Level 3 support for Severity 1 emergency tickets. Installation troubleshooting Acquia provides assistance and advice for installing Acquia Drupal in supported environments. General how- to & troubleshooting Acquia provides assistance in the configuration of Acquia Drupal and the Acquia Network and general trouble shooting. Security best practices Acquia provides assistance in resolving and avoiding security vulnerabilities with Acquia Drupal.
7 Module selection advice Acquia suggests Drupal modules that may be useful in addressing customer requirements. Comprehensive requirements definition and module selection is offered separately as a professional services engagement through Acquia Professional Services and Acquia partners. Migration best practices Acquia offers general advice and best practices for migrating existing web sites to Acquia Drupal. Detailed, site specific migration assessment, recommendations, and implementation is available separately as a professional services engagement through Acquia Professional Services and Acquia partners. Performance best practices Acquia provides generalized guidelines and suggestions for optimizing performance of Acquia Drupal. Detailed site- specific performance assessment, recommendation and implementation is available separately as a professional services engagement through Acquia Professional Services and Acquia partners. Architecture best practices Acquia provides generalized architectural guidelines and suggestions for structuring Acquia Drupal implementations. Detailed site- specific architecture assessment, recommendation and implementation is available separately as a professional services engagement through Acquia Professional Services and Acquia partners. Module dev. best practices Acquia provides generalized guidelines and suggestions for developing custom modules for Acquia Drupal. Requirements definition, code review, debugging, and custom development is available separately as a professional services engagement through Acquia Professional Services and Acquia partners. Long Term Support Scope For each major release of Acquia Drupal designated as a Long Term Support release, Acquia provides active maintenance for three years and extended maintenance for an additional year. During the active maintenance period, Acquia will proactively attempt to resolve product defects and incompatibilities that arise in supported environments. During the extended maintenance period, Acquia will attempt to resolve Severity 1 defects only. Optional Add- ons Optional add- on services are available to enhance Acquia Network subscriptions. Technical account management A technical account manager is a senior Acquia support engineer who is dedicated to a small number of Enterprise level Acquia Network customers. Your technical account manager can take the time to learn the details of your environment, proactively provide guidance and support, and function as an extended member of your team. Access to a technical account manager is an optional service available to Production Enterprise level Acquia Network customers.
8 Additional named contacts You may purchase additional named contacts to expand the number of individuals associated with your subscription who are allowed to open tickets associated with your subscription. Additional tickets If your subscription includes a limit on the number of tickets, you may purchase additional tickets as needed. 7X24 response coverage Available as an optional add- on for Enterprise level Acquia Network subscribers, 7X24 response coverage gives you the assurance of knowing you can contact Acquia support staff at any hour of day. Call Acquia sales for additional details and pricing. Custom software engineering Custom software engineering is available as an optional add- on service for Enterprise level Acquia Network subscribers. Call Acquia sales for additional details and pricing. Support Options Developer Pro Pro Plus Enterprise on Dev Cloud Managed Cloud Infrastructure support 24x7 w/ 1 hr response for critical infra failures 24x7 w/ 1 hr response for critical infra failures 24x7 w/ 1 hr response for critical infra failures 24x7 w/ 1 hr response for critical infra failures Highly available, proactive monitoring and resizing. Infrastructure failure Proactive recovery of infrastructure only. Proactive recovery of infrastructure only. Proactive recovery of infrastructure only. Proactive recovery of infrastructure only. Highly available, fully managed will recover site for any reason. Drupal Support None 1- business day response for non- critical issues 1- business day response for non- critical issues 1- business day response for non- critical issues 24/7 Critical 1 hour response, Site/App failure Support will advise how to bring site back on line for critical tickets filed by customers. Diagnosis only. Support will advise how to bring site back on line for critical tickets filed by customers. Diagnosis only. Support will advise how to bring site back on line for critical tickets filed by customers. Diagnosis only. RA provides access to logs, code, and Drupal admin accounts to bring the site back up. Will recover site for any reason proactively. Security breach, DDOS,? Will recover site, secure site and help with diagnosis. Will manage DDOS with services. Traffic spike impacting site infrastructure Ops will proactively file a ticket suggesting DIY resizing. Site may go off- line. Resizing or reboots will cause Ops will proactively file a ticket suggesting DIY resizing. Site may go off- line. Resizing or reboots will cause downtime. Ops will proactively file a ticket suggesting DIY resizing. Site may go off- line. Resizing or reboots will cause Ops will proactively file a ticket suggesting DIY resizing. Site may go off- line. Resizing or reboots will cause downtime. Ops will diagnose resizing necessary and proactively resize in a highly available manner.
9 downtime. downtime. Resize infrastructure DIY with downtime. DIY with downtime. DIY with downtime. DIY with downtime. Proactive, highly available, 99.95% SLA Caching strategies File support ticket File support ticket Unlimited Drupal support, Advisory hours e.g. Performance, Scaling. Unlimited Drupal support, diagnose caching infrastructure, tune custom infrastructure systems and implement recommendations. e.g. Varnish, Memcache, APC Customize infrastructure DIY: SSL, PHP Memory size, Concurrent PHP process count, Memcache size, Resize, Reboot DIY: SSL, PHP Memory size, Concurrent PHP process count, Memcache size, Resize, Reboot DIY: SSL, PHP Memory size, Concurrent PHP process count, Memcache size, Resize, Reboot DIY: SSL, PHP Memory size, Concurrent PHP process count, Memcache size, Resize, Reboot Customization, and tuning of infrastructure fully managed by operations Cloud onboarding DIY. Customers must be able to debug PHP error messages, review logs, use Drush for debugging. Server resizing with downtime may be necessary. DIY. Customers must be able to debug PHP error messages, review logs, use Drush for debugging. Server resizing with downtime may be necessary. Support will advise how to diagnose site migration failures and identify common pitfalls in migrations. DIY. Customers must be able to debug PHP error messages, review logs, use Drush for debugging. Server resizing with downtime may be necessary. Support will advise how to diagnose site migration failures and identify common pitfalls in migrations. DIY. Customers must be able to debug PHP error messages, review logs, use Drush for debugging. Server resizing with downtime may be necessary. Unlimited support may be used to help with onboarding advice. A rigorous sizing, migration, load testing, onboarding audit process greatly reduces the risk profile of a cloud migration. Acquia s expertise, auditing, hands on remote administration help to not let you fail.
10 Acquia Hosting Acquia Hosting is delivered by means of Acquia operations and support personnel, Acquia- developed systems to monitor and provision cloud servers, and network services to ensure clients operate reliable trouble- free websites. Acquia Hosting is a services layer built atop Amazon Web Services, the largest and most sophisticated Cloud Computing Platform in the world. Amazon Web Services (AWS) provides a suite of network services which offer a reliable infrastructure for hosting Drupal sites. This security document outlines the policies and procedures Acquia upholds in its commitment to customer service, security, and risk mitigation. Security Accreditations HIPAA SOC 1/SSAE 16/ISAE 3402 (formerly SAS70) SOC 2 SOC 3 PCI DSS Level 1 ISO FedRAMP SM DIACAP and FISMA ITAR FIPS CSA MPAA In order to maintain the level of security we provide to our customers, not all specific details about network topology, physical locations, and security procedures are available to the public. Keeping this information private afford us a higher degree of security from would- be hackers. Acquia is committed to maintaining a high degree of transparency and trust with its customers, so we will make as much information available to our customers that we can legally and safely disclose surrounding these network specifics. Acquia will share with its customers, under NDA, a reasonable level of transparency in the processes Acquia maintains. Links to Acquia Hosting Documentation Acquia Hosting Documentation can be found here: hosting/ This resource section describes how Customers interact with Acquia Hosting, SVN code management, file and database storage locations, SSL policies, directory structure and additional helpful information.
11 Acquia Hosting Architecture Overview Acquia Hosting utilizes AWS services, including Elastic Compute Cloud (EC2), Elastic Block Storage (EBS) and Simple Storage Service (S3) to provide dedicated hosting resources to it's customers. Acquia Hosting customers are provisioned with multiple EC2 instances configured in a load balanced arrangement behind a primary and hot- spare EC2 instance acting as a software load balancer. On each EC2 server node, Linux (currently Ubuntu Server), Apache, MySQL, and PHP are installed and configured in a manner suitable for high- traffic Drupal sites. For customers with larger hosting needs, MySQL is delegated to it's own tier of EC2 instances (2 or more nodes) and configured in an Active- Active replication configuration. Each customer's cluster is provisioned with an EBS and files are replicated using Gluster File System. Load balancers are provisioned with nginx software load balancer, and varnish reverse- proxy caching server to maintain high- availability and performance by using memory- based data caching. Provisioning tools Acquia uses custom API tools to provision new hosting clusters, attach file stores, install the software and dependencies, and provide uniformity in each customer's environment. Puppet is used to manage configurations, and apply security updates and configuration changes across all clusters.
12 Redundancy, High- Availability (HA) and Failover Acquia Hosting was developed to be a high- availability hosting environment. If individual EC2 instances are degraded, a new one can be configured automatically in order to prevent downtime. Each cluster is designed to remain performant in the event of a single node removed from service. Load balancers are provisioned with hot- spares to provide HA at the topmost tier. The database tier was also designed with HA in mind using MySQL replication. Physical Network Hardware, Firewalls AWS provides its users with a complete firewall solution, configured in a deny- all mode until ports are explicitly opened by Acquia. Acquia configures additional firewall rules based on protocol, service port, and/or source IP address filtering. Systems Access Controls (Acquia and Amazon) Acquia limits access to AWS servers under its management, as well as all the information the servers contain, strictly to our operations team. Access to servers is only done through password protected SSH keys. Each Acquia employees SSH key is password protected and stored on an encrypted volume. Customers only have access to a non- privileged account. Database backups are only available through authenticated URLs. Acquia's access to customer hosted web site data is restricted to Acquia's hosting engineers, support engineers, and network operations. These staff members are all full- time employees of Acquia. Full text of Acquia s policy regarding user access (Policy #AC166) is available to Customers upon request. Acquia employees and customers have no physical access to AWS datacenters. AWS datacenters are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two- factor authentication a minimum of two times to access datacenter floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. Access attempts via SSH are logged and retained for retrieval and audit purposes. Operating Systems and Patch Management Acquia utilizes Puppet to synchronize, document, and deploy security patches to EC2 instances. Acquia currently has standardized on Ubuntu Server as the supported Linux distribution. DDOS, Network Vulnerability Assessments, IDS Systems AWS Network Security provides significant security against traditional security issues including integrated DDOS protection, Man In the Middle (MITM) Attacks, IP Spoofing, Port Scanning, Packet Sniffing, etc. Additional security is provided by AWS via authentication and security of the host and guest operating system within the virtualized environment. Isolation of each guest operating system from within the Xen hypervisor provides an additional level of security.
13 Encryption Encryption is supported of EBS volumes. Backup Policies and Disaster Recovery Procedures Acquia maintains a comprehensive backup solution which includes website code, static assets/files, and databases. The backup policy is listed below. Customers are provided the ability to download nightly database dumps of which the last three days are retained. The other backups listed are not accessible by customers but are available simply by requesting assistance from Acquia Support. Acquia s Disaster Recovery efforts are aided by the fact that there are no single points of failure of the system as a whole, and we utilize AWS infrastructure physically remote from our office facilities. In practice, a disaster affecting one or more of our offices would not impact the security of Customer data. It is Acquia s policy to employ restoration of Customer services in the event of a major disaster through the best reasonable timeframes. AWS Availability Zones are separate yet interconnected nodes on the overall worldwide AWS network. Best attempts would be made to restore services in an alternate availability zone in the event service in the current zone was severely impacted. Hosting Access (SSH, MySQL ports, FTP, SVN) All access to the hosting environment s root directory is done through version control, there is no write- access to this directory. For that reason FTP is not permissible. SSH is available upon request, but through an un- privileged user account to enhance security and stability of the configuration. If required, customer s can elect to open a port for remote MySQL database access. SSL / HTTPS It is supported, and strongly suggested, to configure SSL certificates on the primary domain name in order to provide SSL security for administrative functions on the site, as well as any secure transactions taking place. Acquia can set up customers with SSL certificates but cannot allow transfers of existing certificates into Acquia hosting. Security Policy Regarding Confidential Information Handling of Sensitive Data by Employees, Data Destruction Policies It is Acquia s policy to adhere to standard best practices regarding security of information while at rest and while in use within systems we maintain. Access to sensitive data is only available to the full- time employee who needs it in order to perform their job function. Destruction of data policies Sensitive Data is never stored for extended periods of time outside of the AWS infrastructure and on physical media such as CD or external hard drives. Access to client s databases would only ever be transferred outside of the AWS environment in the event it was needed to help solve a customer s problem, and local problem resolution steps were required. After this problem was rectified, the files would be purged. In practice, Customer sensitive information is never stored on company laptops, mobile devices or physical media outside of the protections AWS allows. Information is uploaded directly to servers or copied between servers via SSH.
14 Paper media is not used at our offices for printing sensitive information, as there is never a need to transfer database information to paper. Incident Response Process and Monitoring Acquia s Incident Response Policy is to notify customers within 24 hours of a Sev- 0 issue, which would impacts multiple customers. A security breach would be automatically classified as a Sev- 0 issue. Our goal is to make this notification to customers within one hour. This policy is shared with all new operations team members and listed on Acquia s intranet and other shared resources. Most of Acquia s infrastructure/operations as well as engineering teams are based in the same co- located office space in order to be centrally located. Acquia uses Nagios monitoring to provide instant access to vital metrics of the servers we provision in the AWS infrastructure. Over 25 metrics are monitored and linked to alerts via , SMS, and pager. Metrics include but are not limited to disk utilization, CPU utilization, memory usage and swap activity, processes running, DB size and storage space available, as well as many Drupal- specific metrics important to monitor. Acquia s Support team is available on a 24x7 notice in the event of a critical (site impacting) issue and will respond within 30 minutes to assist. Acquia Support is available via the Acquia Support Subscription for problems and assistance for issues related to hosting, as well as any Drupal- related problem. Included with the Acquia Enterprise Support Subscription is a minimum of two site monitoring solutions which can be employed to monitor the Drupal site itself. Heartbeat monitoring is available via a Drupal module which communicates with the Acquia Network on ever cron run. If the heartbeat is not received, the Customer s authorized contacts could be notified via alerts. Acquia also employs external site monitoring via Pingdom (or similar service) to measure page load time as well as overall uptime, using 60 second intervals. If a series of five or more pings show the site off- line, Acquia Support is notified and a critical ticket is typically filed on behalf of the customer. Acquia will typically make best efforts to reach out to the customer to see put steps in place to assist with meeting a resolution. AWS provides their own monitoring on all of the included systems as an additional measure of security and awareness. Certifications / Audits by Acquia and AWS Acquia seeks certifications as needed to provide the level of security required by specific customers. We are always looking for 3 rd party assessments and validation that our security policies are greater than what is required in the market today. Acquia recently provided a hosting system compliant with the Federal Information Security Management Act (FISMA) or a Federal Agency, in order to host one of their websites. We also retain consultants on staff with high levels of federal clearance required to work on specific government projects including Department of Defense, Defense Systems Cooperative Alliance, The Executive Office of the President and many others. Acquia maintains an annual security audit conducted internally to address the overall security of its practices. As ongoing awareness and attention towards security is very important, Acquia s engineering team is made up of experienced information security professionals who regularly review and test our infrastructure. A well- defined development process addresses and highlights vulnerabilities and prioritizes them for implementation. AWS maintains PCI / DSS Level 1, ISO 27001, SAS 70 Type II compliance.
15 Acquia's Commitment to Security in Partnership with Our Customers Physical Inspection of Acquia and AWS Facilities, Policy Surrounding Audits or Security Meetings Acquia will cooperate with Customers to provide tours and inspections of Acquia office facilities and meet with Acquia management personnel to discuss security policy or other procedures. Considering the nature of our hosting operations and that all physical machines hosting Customer websites are based within AWS secure environments, during such review of Acquia facilities very little infrastructure or physical systems would be accessible. AWS does not permit tours or inspection of its facilities by guests, Customers, or strategic partners such as Acquia. Therefore we could not facilitate any type of physical inspection for Customer to inspect AWS hosting facilities or infrastructure. Information requested by a Customer of Acquia, which has been released to Acquia by AWS under NDA, will be protected and not released in order to adhere to these confidentiality provisions. Acquia maintains some infrastructure on its premises, for example IP phone switches and LAN equipment, but none of such equipment is used to host customer websites or store Sensitive Customer Information. Customer Initiated Security or Penetration Testing Acquia s policy is to allow and encourage network vulnerability testing, penetration testing, initiated bythe Customer and at Customer s expense. Acquia s policy is to request 24 hours of notice, or reasonable timeframe of notice, before such tests, and to complete them during normal business hours. The possibility exists that our monitoring will generate critical alerts if certain conditions are met simulating a brute- force attack, port scanning, or similar penetration testing technique, etc. Acquia also requests these tests are designed in such a way not to impact other Acquia customers in order to prevent interruptions or degradation of other customer s services. Change Management Policies and Notification Procedures Acquia s policy regarding changes to infrastructure in use by customers is to make these changes with as little customer impact as reasonably possible. Acquia is committed to delivering industry- leading, reliable hosting services. Delivering these services requires, on occasion, system maintenance. This document describes the policies that apply to each class of system maintenance. The full text of Acquia s Hosting Patch Management Process (Policy #CC086) is available for Customer s to review if requested. This document contains flowcharts, policies outlining roles and responsibilities over patch management as well as testing. Acquia High- Availability Hosting's 99.95% SLA applies to maintenance downtime as well as unscheduled downtime. Scheduled Maintenance Acquia's high availability hosting architecture enables the vast majority of system maintenance to take place without a risk of downtime. Customers will be notified at least 48 hours in advance of scheduled system maintenance with a risk of significant site downtime. This maintenance will be scheduled during non- US business hours (11PM to 7AM Eastern Time). Upon request, maintenance may be performed at a time mutually agreeable to the customer and Acquia. Emergency Maintenance From time to time, a site or infrastructure emergency may require immediate maintenance. Acquia reserves the right to perform emergency maintenance to correct site problems, address critical security issues, and to respond to critical alerts. Commercial reasonable efforts will be made to avoid site downtime.
16 Customer- Requested Maintenance Acquia support will implement customer- requested changes that carry a risk of outage at time a mutually agreeable to the customer and Acquia. Privacy policy Acquia s Privacy Policy is located here: us/legal/privacy- policy This document outlines security policies we employ by Customers and guests of our website, use of services through our website, collection of personal information, and information disclosure policies. Additional resources: services/acquia- cloud/hosting- services
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
More informationBuilding Success on Acquia Cloud:
Building Success on Acquia Cloud: 10 Layers of PaaS TECHNICAL Guide Table of Contents Executive Summary.... 3 Introducing the 10 Layers of PaaS... 4 The Foundation: Five Layers of PaaS Infrastructure...
More informationSimone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
More informationTable of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
More informationVIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS
VIEWABILL Cloud Security and Operational Architecture featuring RUBY ON RAILS VAB_CloudSecurity V1 : May 2014 Overview The Viewabill.com cloud is a highly-secure, scalable and redundant solution that enables
More information319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
More informationAWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II
AWS Security CJ Moses Deputy Chief Information Security Officer Security is Job Zero! Overview Security Resources Certifications Physical Security Network security Geo-diversity and Fault Tolerance GovCloud
More informationLive Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
More informationBuilding Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
More informationCLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
More informationWith Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
More informationCloud S ecurity Security Processes & Practices Jinesh Varia
Cloud Security Processes & Practices Jinesh Varia Overview Certifications Physical Security Backups EC2 Security S3 Security SimpleDB Security SQS Security Best Practices AWS Security White Paper Available
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationSecurity Features: Lettings & Property Management Software
Security Features: Lettings & Property Management Software V 2.0 (23/02/2015) Table of Contents Introduction to Web Application Security... 2 Potential Security Vulnerabilities for Web Applications...
More informationBMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
More informationAcquia Cloud. Success You Can Build On. Acquia Cloud Technology. acquia.com. Drupal-Tuned Platform
acquia.com Acquia Cloud Success You Can Build On Acquia Cloud is a continuous delivery cloud platform optimized to run Drupal websites. Architected for resiliency and designed to accelerate deployment,
More informationFamly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
More informationNetop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing
Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...
More informationWhite Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
More informationManaged Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
More informationRemote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
More informationLas Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
More informationSysAid Cloud Architecture Including Security and Disaster Recovery Plan
SysAid Cloud Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and Software Components Disaster Recovery Plan
More informationAcquia Hosting Services. Version: v1 By: Dave Gully, Regional Sales Manager. Date: April 2014
Acquia Hosting Services Version: v1 By: Dave Gully, Regional Sales Manager Date: April 2014 Acquia Inc. d/b/a Acquia Ltd, Advantage House, Reading, UK www.acquia.com Table of Contents 1. Acquia Drupal
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationMagento Enterprise Cloud Edition A Platform-as-a-Service for Your Business. Peter Sheldon VP Strategy, Magento Commerce
Magento Enterprise Cloud Edition A Platform-as-a-Service for Your Business Peter Sheldon VP Strategy, Magento Commerce 88% of Organizations Have a Cloud 1 st Strategy Source: Gartner Forecast Analysis:
More informationCounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
More informationMirantis OpenStack Express: Security White Paper
Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving
More informationIntel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
More informationBuilding Success on Acquia Cloud. Buyer s Guide
Building Success on Acquia Cloud Buyer s Guide Building Success on Acquia Cloud Table of Contents Executive Summary.... 3 Benefits and Challenges of Developing Drupal Sites in the Cloud... 4 Benefits and
More informationPCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
More information19.10.11. Amazon Elastic Beanstalk
19.10.11 Amazon Elastic Beanstalk A Short History of AWS Amazon started as an ECommerce startup Original architecture was restructured to be more scalable and easier to maintain Competitive pressure for
More informationTHE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
More informationBuilding A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
More informationAnypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
More informationWALKME WHITEPAPER. WalkMe Architecture
WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises
More informationAcquia Support Services. Acquia Network Support Services. Version: v1 By: Dave Gully, Regional Sales Manager. Date: April 2014
Acquia Support Services Acquia Network Support Services Version: v1 By: Dave Gully, Regional Sales Manager Date: April 2014 Acquia Inc. d/b/a Acquia Ltd, Advantage House, Reading, UK www.acquia.com Table
More informationEnterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
More informationCA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
More informationSecurity Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
More informationAccellion Security FAQ
A N A C C E L L I O N W H I T E P A P E R Accellion Security FAQ Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA 94303 info@accellion.com
More informationSecurity Practices, Architecture and Technologies
Security Practices, Architecture and Technologies CONTACT: 36 S. Wall Street Columbus, OH 43215 1-800-VAB-0300 www.viewabill.com 1 CONTENTS End-to-End Security Processes and Technologies... 3 Secure Architecture...
More informationSecuring the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationTk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
More informationWeb Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity
P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationHosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com
Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on
More informationCompany Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
More informationMigrating a running service to AWS
Migrating a running service to AWS Nick Veenhof Ricardo Amaro DevOps Track https://events.drupal.org/barcelona2015/sessions/migrating-runningservice-mollom-aws-without-service-interruptions-and-reduce
More informationFTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
More informationSERVICE SCHEDULE PUBLIC CLOUD SERVICES
SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
More informationBeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
More informationQuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationApteligent White Paper. Security and Information Polices
Apteligent White Paper Security and Information Polices Data and Security Policies for 2016 Overview Apteligent s Mobile App Intelligence delivers real-time user experience insight based on behavioral
More informationCONTENT OUTLINE. Background... 3 Cloud Security... 3. Instance Isolation:... 4. SecureGRC Application Security... 5
Page 2 Disclaimer THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF THE LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationTECHNOLOGY WHITE PAPER Jan 2016
TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview
More informationMIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
More informationStephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
More informationThe remedies set forth within this SLA are your sole and exclusive remedies for any failure of the service.
The remedies set forth within this SLA are your sole and exclusive remedies for any failure of the service. NETWORK INTERNAL NETWORK The internal network includes cables, switches, routers, and firewalls
More informationIBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
More informationOur Cloud Offers You a Brighter Future
Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,
More informationEnterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
More informationThe Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
More informationMEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
More informationApplication Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationTECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
More informationHow To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
More informationHow To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
More informationCloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
More informationInformation Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
More informationEnsuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
More informationSecure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
More informationCHOOSING A RACKSPACE HOSTING PLATFORM
CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project
More informationNetwork Virtualization Platform (NVP) Incident Reports
Network Virtualization Platform (NVP) s ORD Service Interruption During Scheduled Maintenance June 20th, 2013 Time of Incident: 03:45 CDT While performing a scheduled upgrade on the Software Defined Networking
More informationCloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
More informationWhite Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
More informationGoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
More informationMigration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
More informationInsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
More informationEllucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant
Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed
More informationSecure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
More informationAnalyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
More informationDropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
More informationAmazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
More informationInvest in your business with Ubuntu Advantage.
Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape
More informationEXECUTIVE SUMMARY CONTENTS. 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix. 1.
CONTENTS 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix EXECUTIVE SUMMARY Tenzing Managed IT services has recently partnered with Amazon Web Services
More informationSecurity and Information Policies
Security and Information Policies 1 Data and Security Policies for 2015-2016 Overview Crittercism's Mobile App Intelligence delivers real-time user experience insight based on behavioral and operational
More informationThe data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
More informationThis Service Level Agreement (hereinafter referred to as the SLA ) is an agreement entered into between:
1. Parties This Service Level Agreement (hereinafter referred to as the SLA ) is an agreement entered into between: XL Internet Services BV, Delftsestraat 5b, NL-3013 AB Rotterdam, the Netherlands, registered
More informationManaging and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More information