SYLOGENT DEDICATED HOSTING
|
|
- Alexia Norris
- 8 years ago
- Views:
Transcription
1 HOSTING & PROCESS
2 SYLOGENT DEDICATED HOSTING VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM HYPERVISOR HYPERVISOR HYPERVISOR DB1 active DB2 passive Clustered hypervisors that host dedicated VMs integrated with clustered Active / Passive databases utilizing a scaleable SAN. SAN Sylogent utilizes Rackspace Critical Care Support which guarantees 1 hour hardware replacement. Sylogent performs periodic failover tests. Patch management and virus protection is coordinated with Sylogent IT and Rackspace. The work is typically completed during preset scheduled maintenance periods.
3 SYLOGENT DEDICATED HOSTING PROD TEST TRAIN VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM HYPERVISOR HYPERVISOR HYPERVISOR DB1 active DB2 passive Each client typically receives three dedicated instances of the system - Production. Testing. Training. SAN Rackspace performs nightly differential backups with weekly offsite full backups utilizing 4 week overwrite rotation.
4 Validation Plan ( optional ) Should be established and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations Sylogent will provide CLIENT a 21 CFR Part 11 Compliance Assessment document along with a Validation Certificate. As an option, CLIENT is welcome to validate the system if they prefer. Role Assignment Log Should be established and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations The Role Assignment is managed within the application by either Sylogent support team and or CLIENT. Additionally, CLIENT can provide Sylogent an Excel file with CLIENT users and their assigned roles that can be input into the system by either party. The system includes a User Report that can be generated at any time to verify Role Assignments. Risk Assessment for Application System Provider needs to be aware of identified risk and mitigating measures Sylogent performs a risk assessment for each application prior to development and will provide CLIENT with its AA Risk Assessment Procedure. Specific design risks are also reviewed and addressed in validation document: This document is considered proprietary and may be viewed on-site. User Requirements Should be established on the system level and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations Sylogent will provide CLIENT with document [ X ] Product Requirements. CLIENT may map their user requirements to the Functional Requirements within this document, if desired. Any additional agreed upon requirements will be processed per Sylogent s FF Change Control of Computerized Systems Procedure which Sylogent will make available to CLIENT. Data Migration Plan Must execute relevant parts of the migration plan as indicated by CLIENT Sylogent will migrate all CLIENT date from existing systems or documents as needed. Additional migration efforts need to be defined by CLIENT.
5 System Design Specifications Should be established on the system level and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations Sylogent Design Specifications for all applications are considered proprietary. An on-site visit is required to view applicable design specifications. Configuration Specification Should be established on the system level and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations, provider should maintain a current system configuration specification Sylogent will provide CLIENT with System Configuration Document. Upon completion, Sylogent will configure the application with settings defined in the configuration document. Any changes to the application configuration, post launch, will be managed through the FF Change Control of Computerized Systems Procedure. Traceability Matrix Supplier should be able to demonstrate traceability of requirements and specifications to testing. Will be verified during supplier assessment. Per Sylogent s EE Software Validation Documentation procedure, Sylogent traces from Requirement to Design Specification to Test Case. Although full documents in some cases can only be viewed on-site, Sylogent will provide CLIENT with the matrix portion of each document. Technical Installation Should exist for all CLIENT installations (GxP or otherwise) Sylogent performs qualification on all application instances. Sylogent will provide CLIENT with its EE Installation Qualification Documentation Procedure. This includes the TEC Installation Protocol document that addresses technical installation. Installation Qualification Should exist for all CLIENT installations (GxP or otherwise) Sylogent performs qualification on all application instances. Sylogent will provide CLIENT with its EE Installation Qualification Documentation Procedure. The installation qualification documentation includes the TEC Installation Report which will be provided to CLIENT post-launch.
6 Software Design Specification. Software Development Plan. Software Development Testing. The supplier must follow an acceptable software development process. Sylogent follows its EE Software Development Life Cycle Procedure in conjunction with its EE Software Validation Documentation Procedure. Sylogent will provide both procedures to CLIENT. Validation documentation consists of the following documents: OQ Plan/Report o TEC Product Requirements o TEC Project Plan o TEC Design Specifications (on-site only) o TEC Technical Specifications (on-site only) o TEC Code Review Report (on-site only) o TEC Build Notes (on-site only) o TEC SQA Testing Protocol (partial) o TEC SQA Testing Report (partial) o TEC Release Notes o TEC Validation Summary Report Should exist for all CLIENT installations (GxP or otherwise) Sylogent will execute a set of test cases to verify application is configured to CLIENT Configuration Document and application is functioning as expected. Sylogent will deliver to CLIENT a report of the test case results. PQ Plan/Report Should be established on the system level and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations Sylogent will execute a set of test cases to verify system is performing as expected. Sylogent will deliver to CLIENT a report of the system performance results. Change Control Process During the supplier assessment, CLIENT will verify a change control process that meets regulatory expectations is in place and followed. Sylogent will provide CLIENT with its FF Change Control of Computerized Systems Procedure.
7 Periodic Review Process During the supplier assessment CLIENT will verify a periodic review process on the system level that meets regulatory expectations is in place and followed. Sylogent will provide CLIENT with its II Product Review and Improvement Procedure. Incident Management Process During the supplier assessment CLIENT will verify an incident management process on the system level that meets regulatory expectations is in place and followed. Sylogent will provide CLIENT with its II Incident Handling Procedure. Service Level Agreement An SLA should be established between CLIENT and the supplier Sylogent will work with CLIENT to establish an appropriate SLA. SLA generally includes the following: Scope of Work and Services, Deliverables, Sylogent and Hosting Responsibilities, Customer Responsibilities, Key Contact Information, Service Requests and Notifications, Technical Support, Maintenance, Upgrades, Response Times, Standard Training Services, Exclusions, Supported Versions, Escrow. A sample of a standard SLA is attached. Training Process The supplier should have a formal training program in place and this will be verified as part of the supplier assessment. The training program should include relevant GxP topics Staff training is conducted annually and records are available on-site. Sylogent will provide CLIENT with its CC Training Procedure. Security Administration The provider must have a thorough provisioning/de-provisioning process in place and be amicable to CLIENT auditing the process routinely. Sylogent will provide CLIENT with its Sylogent s DD Master Security Procedure.
8 Retirement The supplier should have a process for system retirement as part of the life cycle approach and will be verified as part of the supplier assessment, including elimination of "CLIENT data" residing on their systems. Sylogent will provide CLIENT with its EE Application and Instance Retirement Procedure. Data Center Qualification The supplier must have a properly qualified data center; the status of the qualification must be periodically reviewed. This will be verified as part of the supplier assessment. Sylogent will provide CLIENT with its AA SYLOGENT Qualification Procedure. SYLOGENT Evaluation and SYLOGENT Assessment forms can viewed on-site, if desired. In addition, the ISO and SSAE16 Certifications (SOC reports) will be provided. Data Center Security The supplier must have data center security processes that ensure only authorized individuals have access to the data center. CLIENT will verify the existence of procedure governing these activities during the supplier assessment Sylogent will provide CLIENT with Sylogent s DD Master Security Procedure and the following documents in support of the Rackspace data center: ISO and SSAE16 Certifications (SOC Reports). Disaster Recovery CLIENT must verify a disaster recovery that meets CLIENT s requirements is in place and that it is periodically tested. This will be done as part of the supplier assessment. Sylogent will provide CLIENT with its GG Disaster Recovery and GG Business Continuity Procedures. Back Up - Recovery The supplier should have a documented process for BU&R and have evidence of successful testing. This will be verified during the supplier assessment. Sylogent will provide CLIENT with its FF Rackspace Data Hosting Procedure which addresses back up of client data. Sylogent will also provide CLIENT with its GG Administration Systems Backup and Recovery Procedure (Sylogent data only and does not house client data). Data Transfer Appropriate processes for data transfer from the provider site to a CLIENT site, or for transfer from system to system within the provider site, must be established and agreed (e.g. encryption etc.). Sylogent will provide CLIENT with its DD Data Interchange Procedure.
9 SYLOGENT 411 South State Street Newtown, PA Jack Yeager - CEO jack.yeager@sylogent.com x26 Dawn Albano - QC dawn.albano@sylogent.com x25
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
More informationPharma CloudAdoption. and Qualification Trends
Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for
More informationValidating Cloud. June 2012 Merry Danley
Validating Cloud June 2012 Merry Danley Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
More informationCloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
More informationStratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
More informationTesting Automated Manufacturing Processes
Testing Automated Manufacturing Processes (PLC based architecture) 1 ❶ Introduction. ❷ Regulations. ❸ CSV Automated Manufacturing Systems. ❹ PLCs Validation Methodology / Approach. ❺ Testing. ❻ Controls
More informationCONTENTS. List of Tables List of Figures
Prelims 13/3/06 9:11 pm Page iii CONTENTS List of Tables List of Figures ix xi 1 Introduction 1 1.1 The Need for Guidance on ERP System Validation 1 1.2 The Need to Validate ERP Systems 3 1.3 The ERP Implementation
More informationGAMP 4 to GAMP 5 Summary
GAMP 4 to GAMP 5 Summary Introduction This document provides summary information on the GAMP 5 Guide and provides a mapping to the previous version, GAMP 4. It specifically provides: 1. Summary of Need
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationServices Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
More informationIntroduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A
Best Practices for Validation of a Software as a Service (SaaS) Customer Relationship Management (CRM) Solution Presented By: Gregg Mauriello Validation Manager Elise Miner Associate Validation Manager
More informationClinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
More informationSmartImpact MS Dynamics CRM. Support Service Definition
SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: info@smartimpact.co.uk http://www.smartimpact.co.uk/
More informationSecure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
More informationG-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service
G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service 1 of 19 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W: www.dcggroup.com Data Continuity Group Limited, Bridge
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationSMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
More informationThe Difference Between Disaster Recovery and Business Continuance
The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business
More informationUnlimited Server 24/7/365 Support
Unlimited Server 24/7/365 Support Unlimited Server Support from System Architects covers your Windows servers, Linux servers and virtual machines. Your servers are monitored and managed 24 hours a day,
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationSaaS Service Level Agreement (SLA)
SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements
More informationEnterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
More informationPrivate Cloud Hosting
Private Cloud Hosting Quick Guide 7/30/2015 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Private Cloud Hosting Service Positioning Create Your Own Private
More informationEllucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant
Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed
More informationThis interpretation of the revised Annex
Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation
More informationSERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES
SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer
More informationDrupal Private Cloud Hosting
professional services for the web consultancy design development hosting training support G-Cloud Service Definition Drupal Private Cloud Hosting sales@codeenigma.com T: +44 (0)20 3588 1550 Code Enigma
More informationINTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to
INTRODUCTION This book offers a systematic, ten-step approach, from the decision to validate to the assessment of the validation outcome, for validating configurable off-the-shelf (COTS) computer software
More informationCLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
More informationValidating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
More informationSharon Strause 9/10/2010. 15 years with the
Manage Software Development, Testing, and Validation Presented by Sharon Strause, Senior Consultant EduQuest, Inc. IVT s Computer and Software Validation EU Conference The Hilton Dublin Dublin, Ireland
More informationCounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
More informationConsiderations When Validating Your Analyst Software Per GAMP 5
WHITE PAPER Analyst Software Validation Service Considerations When Validating Your Analyst Software Per GAMP 5 Blair C. James, Stacy D. Nelson Introduction The purpose of this white paper is to assist
More informationITSM Governance In the world of cloud computing
ITSM Governance In the world of cloud computing Housekeeping Welcome to the Webinar Use the control panel to ask questions Can you see & hear us? enter your name & city to confirm Type Your Questions Here
More informationComputerised Systems. Seeing the Wood from the Trees
Computerised Systems Seeing the Wood from the Trees Scope WHAT IS A COMPUTERISED SYSTEM? WHY DO WE NEED VALIDATED SYSTEMS? WHAT NEEDS VALIDATING? HOW DO WE PERFORM CSV? WHO DOES WHAT? IT S VALIDATED -
More informationManaged IT Secure Infrastructure Flexible Offerings Peace of Mind
Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Your Place or Ours Why Trust Your Network to SymQuest? SymQuest is an industry leader with a national reputation for service excellence
More information074-8432-552 Page 1 of 7 Effective Date: 12/18/03 Software Supplier Process Requirements
Page 1 of 7 Software Supplier Process Requirements 1.0 QUALITY SYSTEM FRAMEWORK 1.1 QUALITY POLICY The Seller shall document and implement a quality program in the form of Quality manual or detailed Quality
More informationCloud Hosting. Quick Guide 7/30/15. 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved.
Cloud Hosting Quick Guide 7/30/15 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Cloud Hosting Service Positioning INCREASE AGIILTY, REDUCE COMPLEXITY & COST
More informationLevel I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
More informationTL 9000 and TS16949 Comparison
TL 9000 and TS16949 Comparison www.questforum.org Copyright QuEST Forum 2007 1 Purpose This summary is intended to give those familiar with TS16949 requirements a general sense of the additional requirements
More informationClinical database/ecrf validation: effective processes and procedures
TITOLO SLIDE Testo Slide Testo Slide Testo Slide Clinical database/ecrf validation: effective processes and procedures IV BIAS ANNUAL CONGRESS Padova September, 26 th 2012 PQE WORKSHOP: What's new in Computerized
More informationOECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD
OECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD 1. The following draft Advisory Document will replace the 1995 OECD GLP Consensus Document number 10
More informationG-Cloud 6 brightsolid Secure Cloud Servers. Service Definition Document
G-Cloud 6 brightsolid Service Definition Document December 2014 Contents 1 Introduction... 3 2 An overview of the G-Cloud Service... 3 3 Information assurance... 3 4 Backup and Disaster Recovery... 3 5
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More information15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
More informationExhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
More informationWhite Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
More informationAttachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
More informationIntel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
More informationHow To Get Atos Paas For Free
G-Cloud Pricing Atos PaaS Accredited Secure+ Contents 1. Introduction... 3 2. Pricing... 4 2.1 Standard Feature Pricing... 4 2.2 Atos PaaS Accredited Secure+ Virtual Machines... 4 2.3 Atos PaaS Accredited
More informationWelcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014
Welcome Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Panel Tracy Lampula, Associate Director of GIS Compliance, Vertex Pharmaceuticals William Sanborn, Director of Information
More informationAPI Q2 Specification for Quality Management System Requirements for Service Supply Organizations for the Petroleum and Natural Gas Industries
API Q2 Specification for Quality Management System Requirements for Service Supply Organizations for the Petroleum and Natural Gas Industries A Service Providers Perspective How is API Q2 Different ISO
More informationCloud Computing in GxP Environment
Cloud Computing in GxP Environment Kathy Gniecko Hoffmann LaRoche 3rd April 2014, Stevenage 1 Introductions 18 years Experience in Pharma across all aspects of CSV. Prior to CSV experience in Pharma Research,
More informationensurcloud Service Level Agreement (SLA)
ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and
More informationInformation Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
More informationSWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
More informationCourse 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005
Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led
More informationManaging, Maintaining Data in a Virtual World
Moving, ed.harnish@acronis.com Ed Acronis Harnish, Inc. VP Managing, Maintaining Data in a Virtual World BR The VM, Console DR and & Archiving and Recovery Operating Recovery Strategies System Agenda High
More informationANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
More informationTailored Technologies LLC
685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations
More informationUsing SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium
Using SharePoint 2013 for Managing Regulated Content in the Life Sciences Presented by Paul Fenton President and CEO, Montrium Overview Informative Webinar that aims to provide an overview of how SharePoint
More informationAudience. At Course Completion. Prerequisites. Course Outline. Take This Training
Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Course 5054A: Two days; Instructor-Led Preliminary Course Syllabus Note: You are viewing a Preliminary Course Syllabus.
More informationA CRO's Dilemma - The CDMS Validation Package that Failed Client Audits 19.OCT.2009 1. Disclaimer
A CRO's Dilemma - The CDMS Validation Package that Failed Client Audits Teri Stokes, Ph.D., Director GXP International Concord, MA - USA Common Sense Computer Validation 19.OCT.2009 1 Disclaimer The views
More informationGAMP5 - a lifecycle management framework for customized bioprocess solutions
GE Healthcare Life Sciences GAMP5 - a lifecycle management framework for customized bioprocess solutions imagination at work GE Healthcare s engineering department, Customized Bioprocess Solutions (CBS),
More informationCloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile
Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile Jerry Wertelecky, CPA, Fellow HKIoD & Managing Director INTRODUCTION Jerry Wertelecky Country of Birth: United States Current
More informationManaged Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
More informationHosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com
Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on
More informationLabChip GX/GXII with LabChip GxP Software
Regulatory Compliance LabChip GX/GXII with LabChip GxP Software Supporting Regulatory Compliance Caliper LabChip GX/GXII suite of instruments provides automated electrophoresis to analyze quality, size,
More informationCan SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations
Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS
More informationData Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
More informationSage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions
Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,
More informationBasic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases
M20462 Administering Microsoft SQL Server Databases Description: This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The
More informationThe SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies
The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies By Rob Sims, Director, Life Science, UL EduNeering When a Life Science
More informationMCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007
MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007 Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course
More informationDesigning, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationM6422A Implementing and Managing Windows Server 2008 Hyper-V
M6422A Implementing and Managing Windows Server 2008 Hyper-V Looking at Training Differently... Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: Published: Language(s): Audience(s):
More informationConsiderations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide
WHITE PAPER SDS Software v2.x Enterprise Edition Considerations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide This white paper describes
More informationQualification Guideline
Qualification Guideline June 2013 Disclaimer: This document is meant as a reference to Life Science companies in regards to the Microsoft O365 platform. Montrium does not warrant that the use of the recommendations
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
More informationTroux Hosting Options
Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4
More informationCloud Computing and SaaS Environments
Regulatory Considerations for Use of Cloud Computing and SaaS Environments Institute of Validation Technology Conference Qualifying and Validating Cloud and Virtualized IT Infrastructure Philadelphia PA
More informationParagon Protect & Restore
Paragon Protect & Restore VMware vsphere Free The Most Powerful Free Solution for Backup, Replication and Restore of Virtual Machines in VMware vsphere Environments Backup of on-/offline VMware Guest Systems,
More informationInformation Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
More informationBirst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
More informationPlanning and Administering Windows Server 2008 Servers 70-646
Hands-On Planning and Administering Windows Server 2008 Servers 70-646 Course Description This Hands-On course provides students with the knowledge and skills to implement, monitor, and maintain Windows
More informationCloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
More informationDavid.Balka@chi.frb.org 2009 STREAM FRBC
Virtualization ti Dave Balka David.Balka@chi.frb.org Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework
More informationDESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
More informationMS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationAuditing Software as a Service (SaaS): Balancing Security with Performance
Auditing Software as a Service (SaaS): Balancing Security with Performance Goals for Today Defining SaaS (Software as a Service) and its importance Identify your company's process for managing SaaS solutions
More informationComputer Visions Course Outline
www.compvisions.com 16 Corporate Woods Blvd. Albany, NY 12211 Computer Visions Course Outline Get What You Want We offer highly customizable group training courses: desktop applications, web development,
More informationComputer System Configuration Management and Change Control
Computer System Configuration Management and Change Control What Your IT Department Is Really Doing Justin J. Fisher, Pfizer IT Quality and Compliance Manager Agenda 1. Background 2. Audience Demographics
More informationAncero Backup & Disaster Recovery (BDR) Service Guide
Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware
More informationTraining Course Computerized System Validation in the Pharmaceutical Industry Istanbul, 16-17 January 2003. Change Control
Training Course Computerized System Validation in the Pharmaceutical Industry Istanbul, 16-17 January 2003 Change Control Wolfgang Schumacher Roche Pharmaceuticals, Basel Agenda Change Control Definitions
More informationLearning Management System Evaluation Guide
Learning Management System Evaluation Guide With more than 400 companies with sites in 30 countries, and over 35 million training assignments completed, UL EduNeering is in a unique position to share best
More informationValidated SaaS LMS SuccessFactors Viability
Validated SaaS LMS SuccessFactors Viability Executive Summary SuccessFactors has a long history of working with validated organizations and has brought this expertise to their validated SaaS LMS package.
More informationWhy SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
More information