Ascend Capital, LLC INFORMATION TECHNOLOGY DOCUMENTATION. Abacus Group, LLC
|
|
- Barbara McDonald
- 8 years ago
- Views:
Transcription
1 Ascend Capital, LLC INFORMATION TECHNOLOGY DOCUMENTATION Abacus Group, LLC June 18, 2015
2 CONTENTS ABACUS TECHNICAL SUPPORT CONTACT INFORMATION... 2 CLIENT SUPPORT HOURS... 2 PROBLEM REPORTING ABACUS HELPDESK... 2 SUPPORT ESCALATION... 2 TECHNOLOGY AND NETWORK OVERVIEW... 3 HIGHLIGHTS... 3 DATA CENTERS... 3 ENVIRONMENTAL DESIGN... 4 PHYSICAL SECURITY... 5 NETWORK SECURITY... 5 WIDE AREA NETWORK... 5 NETWORK DIAGRAM... 6 INFRASTRUCTURE TECHNOLOGY DIAGRAM... 7 INFRASTRUCTURE TECHNOLOGY SERVICES ARCHITECTURE... 8 INTERNET ACCESS X7 NETWORK MONITORING... 8 DISASTER RECOVERY... 9 STORAGE SOLUTIONS... 9 VMWARE HIGH AVAILABILITY (HA)... 9 MULTI-SITE REPLICATION MULTI-SITE BACKUP AND RESTORE DATA RETENTION SCHEDULES & INSTANT MESSAGE ARCHIVING GLOBAL RELAY ARCHIVING SERVICE OVERVIEW GLOBAL RELAY FEATURES & FUNCTIONALITY BUSINESS CONTINUITY INTERNET AND/OR NETWORK IS UNAVAILABLE POWER OUTAGE IN OFFICE OFFICE BUILDING IS INACCESSIBLE Abacus Group LLC [1] Confidential
3 ABACUS TECHNICAL SUPPORT CONTACT INFORMATION CLIENT SUPPORT HOURS Ascend is provided with information technology services and support by Abacus Information Technology, LLC (Abacus) between the following business hours: Monday to Friday: 6am 6pm Pacific Time, and after hours on an as needed basis Saturday and Sunday: On an as-needed basis PROBLEM REPORTING ABACUS HELPDESK The Abacus Helpdesk will be Ascend s primary point of contact. In the event of a hardware / software issue, Ascend will contact the Abacus Helpdesk for assistance resolving the issue. helpdesk@abacusgroupllc.com Phone: SUPPORT ESCALATION Mike Herman Director - Client Technical Services Phone: mherman@abacusgroupllc.com Mike Herman Director Client Technical Server Phone: mherman@abcusgroupllc.com Abacus Group LLC [2] Confidential
4 TECHNOLOGY AND NETWORK OVERVIEW Abacus has built an adaptive infrastructure to provide the most reliable and scalable computing environment possible. Abacus has partnered with leading technology vendors such as Network Appliance, Cisco, Microsoft, Dell and VMware to deliver IT services to customers at a fraction of the cost of doing it themselves. Leveraging industry best practices for hosting services, the Abacus Group delivers secure and robust access to mission critical applications such as , File, ActivSync / BES and Database servers/services. HIGHLIGHTS Advanced anti-spam technology leveraging machine learning from Postini Multi-level anti-virus solutions from Symantec Enterprise level storage solutions powered by Network Appliance Highly Redundant network and firewall Infrastructure from Cisco Systems Tier III data centers provided by Sungard and Internap. DATA CENTERS Abacus has high-performance data centers that are designed to be secure, highly available, scalable and manageable. The network infrastructure is built using Cisco routers, switches and firewalls. The following are the details of the data centers utilized for Abacus s IT platform (AbacusFLEX). Primary Data Center Abacus hosts Ascend s primary IT infrastructure at the Digital Realty Trust Data Center located at 720 2nd Street, Oakland, CA The facility is an 111,000 square foot Tier III data center located near Jack London Square in Oakland, California. Built in 2001, the data center is located in the region s fiber-rich district next to a PG&E substation. The facility is owned and operated by Digital Realty Trust Inc. The data center is certified to the highest industry standards and compliance requirements including: 24/7/365 power, cooling, connectivity and security capabilities to ensure mission-critical operations and business continuity for tenants. Secondary Data Center (Disaster Recovery) Abacus concurrently replicates and hosts Ascend s secondary / disaster recovery IT infrastructure at the Sungard Availability Services Data Center located at 1500 Spring Garden Street, Philadelphia, PA The facility is a 1,080,544 square foot Tier III data center. The data center is certified to the highest industry standards and compliance requirements including: 24/7/365 power, cooling, connectivity and security capabilities to ensure mission-critical operations and business continuity for tenants. Abacus Group LLC [3] Confidential
5 ENVIRONMENTAL DESIGN The Primary Data Center is located at a Tier-III Co-Location facility and is designed with very stringent environmental and power requirements: Continuous power supply with backup uninterruptible power supply utilizing CPS Hitec systems: Adequate power capacity including air conditioning and lights Hitec systems tested at full load on monthly schedule Fuel for generators (72 hours worth) kept on premises and monitored for local environmental compliance Conforms to or exceeds applicable local structural building codes utilizing standards such as bullet proof glass, fire doors and reinforced walls and complying with disaster proof design: Complies with all local zoning ordinances Certified not located in a 100-year flood plain Earthquake and hurricane bracing on all racks and cable trays (where appropriate) Adequate multi-zone air conditioning, including a backup system for the multizone air conditioning: Climate control including humidity sensors and control. Designed to provide cooling for 150W per/sq.ft. Heat and smoke detectors that meet or exceed all local fire code regulations. Very Early Smoke Detection Alarm (VESDA) Double pre-action sprinkler system Pre-action dry pipe system zoned to release water only where needed Easily removable access panels in raised flooring Flood sensors and monitoring under raised floors and in other critical areas Separate grounding systems to prevent grounding loops; true ground versus green wire ground Sealed cable vault entrances to facility, remotely monitored Formalized physical facility preventive maintenance program -- Facility is SAS70 Type II Certified Sub-breakers per relay rack or lineup CPS systems clean all power before it enters the building to protect against any power fluctuation. Abacus Group LLC [4] Confidential
6 PHYSICAL SECURITY The Primary Data Center is located at a Tier-III Co-Location facility which has very stringent physical security requirements: Building access procedures: Limited number of building entrances in compliance with local fire ordinance Access limited and managed via security policies for all facility entrances 24x7 onsite security guards Visitor-logging procedure Card-key, biometric, or similar entry locks ID-badge system for all employees and visitors Staff and visitors must wear badges at all times on premises Individual cabinet locks; master in NOC; key list from customer Equipment location: Video surveillance and motion sensors for entrances into and out of the building Locked cages Secure rooms available Managed firewall services with 24x7 monitoring available Backup lighting systems for entry ways and cable vaults Individual cabinet locks; master in NOC; key list from customer NETWORK SECURITY All three locations (Client Site, Primary Data Center and Secondary Data Center) will be protected by best in class Cisco ASA firewalls deployed in a failover configuration. Remote access will be encrypted via Cisco VPN or Citrix. Client domains will be segregated on separate VLANs. Industry best practices will be utilized to ensure that security patches are deployed on a regular basis through WSUS update servers. Group policy will enforce security standards on workstations and laptops. Symantec Anti-Virus will protect against emerging virus and spyware threats. will be scanned before entering the network for malware. Spam will be filtered and quarantined based on individual user preferences. WIDE AREA NETWORK Data Centers are interconnected using multiple high-speed links in order to provide high performance, scalability and redundancy. Using a dynamic routing protocol (e.g. OSPF), the network can detect link and router failures; quickly finding an alternate best path and rerouting the traffic accordingly. Abacus Group LLC [5] Confidential
7 NETWORK DIAGRAM Abacus Group LLC [6] Confidential
8 INFRASTRUCTURE TECHNOLOGY DIAGRAM Abacus Group LLC [7] Confidential
9 INFRASTRUCTURE TECHNOLOGY SERVICES ARCHITECTURE AbacusFLEX utilizes three components to provide Ascend with a secure, redundant and scalable network. 1) Ascend s site hosts an ESX server to provide multiple VMs supplying Domain controller functionality (DNS, DHCP, AD), file/print services, and utility services such as WSUS (Windows Server Update Services) and monitoring. Through this configuration, the client experiences no latency when accessing files and critical services. 2) The Primary Data Center hosts a clustered Exchange farm utilizing CCR (clustered continuous replication) to provide highly available messaging. Additionally, BlackBerry Enterprise servers are configured for failover to DR. The ESX servers, at the production data center, host virtual instances to provide redundancy for all critical applications. 3) The Secondary Data Center provides fail-over capabilities in the event there is a regional disaster and the client site and/or primary / production data center are not available. All data from the client site is replicated to the secondary data center such that there will be minimal loss of data in the event the client site and primary data center are inoperable. INTERNET ACCESS Each client site is connected to the production data center through their primary circuit (bandwidth to be determined by local infrastructure and availability). Client Internet traffic routinely flows over this line and through the production data center's dual 100 Mbps DIA (Direct Internet Access) lines. These circuits are multi-homed through BGPv4 with Cogent Communications and Internap allowing automatic failover in the event of an Internet Service Provider failure. Additionally, each client site has a DIA line of varying size. Through dynamic routing (OSPF) traffic will automatically reroute around failed network devices or down circuits. This design provides the highest level of resiliency and minimizes downtime during hardware and/or link failures or any routing issues within the Service Provider s networks. 24X7 NETWORK MONITORING All components of our network are monitored 24x7 by our Network Management Systems. Enterpriselevel network monitoring applications not only detect faults in real-time but can inform of potential problems before they occur. Performance metrics from all routers and switches are collected and analyzed to determine abnormal device/traffic behavior that could have a negative impact on the performance of a customer s network. Abacus Group LLC [8] Confidential
10 DISASTER RECOVERY Abacus s Disaster Recovery service will be managed out of the Sungard Data Center in Philadelphia, PA. In the event of a local or regional disaster, data and applications will be available to users via Citrix. This service will allow Ascend s users to securely access their data and applications via any internet browser. The Abacus Disaster Recovery solution has been architected to allow for the failure of individual components without impacting Ascend or any of its users in regards to their use of the IT functions. All of the data and applications at the client site will be replicated to the secondary data center in Philadelphia, PA in near real-time ensuring minimal data loss in the event of a disaster. The primary data center in Oakland, CA will replicate the clustered Exchange mailbox servers to this site via near real-time SCR (Standby Continuous Replication) log shipping. Abacus provides multiple levels of DR planning to accommodate single points of failure and catastrophic outages. Clustered servers for zero downtime applications Highly available storage solutions with RAID technology Multi-level Snapshot capability to restore lost or corrupted data Multi-site replication for long term catastrophic failures Multi-site backup and restore of all files and databases using advanced tape library backup STORAGE SOLUTIONS Abacus s Storage Arrays provide extremely high reliability with redundant components and hitless upgrades ensuring that we can deliver 24x7-computing services. Based on a new virtualized model, data is written across as many as 40 disk drives, which improves performance and provides for instantaneous recovery of a drive failure using RAID or Mirroring techniques. VMWARE HIGH AVAILABILITY (HA) All Virtual Machines running in the Production and Secondary Data Centers are protected by VMWare's High Availability (HA) technology. This feature will automatically move and restart all virtual machines on a failed physical host. This technology significantly shortens downtime due to failed hardware. Abacus Group LLC [9] Confidential
11 MULTI-SITE REPLICATION Abacus Group's main hosting centers are geographically dispersed. The Primary Data Center is located in Oakland, CA. The secondary is in Philadelphia, PA. All data is replicated between each data center using advanced Microsoft and XOSoft replication technologies. MULTI-SITE BACKUP AND RESTORE Abacus Group uses Backup Exec to backup all databases, and files to secondary storage. Open files are backed up seamlessly, enabling backups to occur without interruption to critical business applications. Backups are configured to run automatically on a daily cycle. DATA RETENTION SCHEDULES All data will be backed up according to the retention schedule for each data type, as shown in the table below: DATA TYPE FREQUENCY RETENTION PERIOD File Data Daily 30 Days System Data Daily 30 Days Exchange Data Daily 30 Days SQL Data Daily 30 Days Abacus Group LLC [10] Confidential
12 & INSTANT MESSAGE ARCHIVING Ascend utilizes Smarsh s Archiving Solution for and Instant Message Archiving. Smarsh has developed an industry leading archiving solution to meet electronic communications regulatory mandates from the SEC and NASD (now FINRA). SMARSH ARCHIVING SERVICE OVERVIEW The Smarsh archiving service allows compliance officer(s) or designated reviewer(s) to monitor corporate communication with ease and intelligent functionality, as well as provide immediate access to missioncritical data stored in a secure Write-Once, Read Many format (WORM). The Web-based Smarsh management console enables reviewers to securely produce data on-demand and monitor all of the fund s electronic messages in one place. The system s rule-setting engine enables compliance personnel to search and retrieve messages within the archive based on customizable criteria, including random samples, keywords and phrases. The comprehensive Reporting Center is capable of producing customizable organizational usage reports and evidence of supervision/ policy enforcement. SMARSH FEATURES & FUNCTIONALITY The Smarsh s service provides Abacus clients with the ability to scan every single and instant message as it leaves or enters our Exchange server and/or the Instant Message clients of all of our employees. Through Smarsh Ascend is able to run keyword/phrase searches based on every field (or Boolean combination) associated with an or instant message. Ascend can also track chains of E- mails and s from multiple individuals. The service tracks message header information (where the originated or is sent), and demonstrates review policy enforcement with audit trail reports. Ascend is also able to save search criteria, and facilitate necessary review policy with regularly scheduled saved searches. Lastly, Ascend is able to define higher-risk users and assign appropriate scrutiny based on corporate policy, as well as configure company approved keyword lists for individual compliance officers/osjs Abacus Group LLC [11] Confidential
13 BUSINESS CONTINUITY In the event that one of the following scenarios occurs, please follow the appropriate steps to regain normal business functionality: INTERNET AND/OR NETWORK IS UNAVAILABLE Probability: Low Description: - Internet is unavailable - IM is unavailable - is unavailable - P drive is unavailable - Z drive is unavailable - Cannot log in to the domain Probable Source: This scenario may be caused by many potential sources possibilities include, but are not limited to - necessary configuration updates, router/switch failure, hardware failure, software corruption, patch requirements, virus infection, etc. Actions Needed: - Call the Abacus Helpdesk to alert of outage - The Abacus Helpdesk will troubleshoot with internal and/or external groups (if necessary) and advise of next steps SLA for Recovery: 2 hours or less (depending on the identified source) Abacus Group LLC [12] Confidential
14 POWER OUTAGE IN OFFICE Probability: Low/Medium Description: - Power in the building is available but no power in the office - No lights - Desktops are not functional - Network is functional - Phones are functional - Laptops are functional (running on battery) Probable Source: Various Actions Needed: - Call the Abacus Helpdesk to alert of outage - The Abacus Helpdesk will troubleshoot with internal and/or external groups (if necessary) and advise of next steps SLA for Recovery: In the event that this scenario occurs, the UPS will automatically kick in to generate power to the network equipment allowing the network and phones to remain unharmed. If you are using Cisco IP phones they most likely receive power from the UPS. It may be possible to remain in your office and continue normal business functions (via Wi-Fi and/or laptop). However it is advisable to work from a remote location until power is restored in the office Abacus Group LLC [13] Confidential
15 OFFICE BUILDING IS INACCESSIBLE Probability: Extremely Low Description: - Office building is inaccessible / unavailable Probable Source: In the event that this scenario occurs, it is likely that a catastrophic even has occurred in the region causing the building to become unavailable. Catastrophic events include: terrorism, acts of nature, fire, etc. Actions Needed: - Call the Abacus Helpdesk to alert of outage SLA for Recovery: The SLA for recovery will vary and is dependent on many factors. However, since all data is stored offsite, it is possible to resume normal business functionality by remotely logging in to the DR data center via Citrix. Abacus Group LLC [14] Confidential
DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
More informationcustom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
More informationSITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
More informationDATA CENTRE DATA CENTRE MAY 2015
DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level
More informationPerceptive Software Platform Services
Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationWoodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
More informationvcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service
vcloud SERVICES vcloud SERVICE Virtual Tech offers competitive pricing on vcloud hosted services at our world class Tier 4 data centre facility fully equipped with redundant power, cooling, internet connectivity
More informationOffice of Information Technology Hosted Services Service Level Agreement FY2009
Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support
More informationPowering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
More informationby New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
More informationDATA CENTRE DATA CENTRE
DATA CENTRE DATA CENTRE v. OCT 2014 DJ CENTRAL DJ Central Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level of service
More informationDatacenter Hosting and Cloud Computing Services
Datacenter Hosting and Cloud Computing Services Overview Background Founded in 1995, Lore Systems operates an international datacenter network which today includes full service 3+ datacenter facilities
More informationLas Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
More informationSagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services
Sagari Ltd Service Catalogue and Service Level Agreement For Outsource IT Services Managed Services Service Level Agreement 1 Introduction This Service Catalogue and Service Level Agreement (SLA) constitutes
More informationCustomized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationSecurity Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
More informationUNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
More informationNorth Street Global, LLC. Business Continuity Plan
Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve
More informationGuardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
More informationAL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
More informationSWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
More informationWhite paper. SAS Solutions OnDemand Hosting Overview
White paper SAS Solutions OnDemand Hosting Overview Contents Overview...1 Cary 1 Facility Specifications...2 Cary 2 Facility Specifications (SAS New Cloud Computing Center)...3 Charlotte 1 Facility Specifications...4
More informationCity of Coral Gables
City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:
More informationitg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
More informationHosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com
Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on
More informationDESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
More informationBackup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationCloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
More informationGiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
More informationFrankfurt Data Centre Overview
Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use
More informationTRADITIONAL ENTERPRISE SCIENTIFIC SOFTWARE
TRADITIONAL ENTERPRISE SCIENTIFIC SOFTWARE deployments have been complicated and expensive. They require a data center with office space, power, cooling, bandwidth, networks, servers, and storage. They
More informationSecure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
More informationCloud Computing Disaster Recovery (DR)
Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you
More informationTelecom Business Continuity Solutions FOR INTERNAL USE ONLY
Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Business continuity? Perception versus reality Perceived biggest threats in 2005* Events causing disruption in 2003-04** IT / Telecom protection
More informationWHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server
WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION SYMANTEC Backup Exec 10d Continuous Protection Server 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 Current Situation...3 The New Opportunity...3 The
More informationSecurity and Data Center Overview
Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More information7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS
7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS ExecutiveBrief P a g e 1 Executive Brief 7 Questions You Need to Ask Before Choosing a Colocation Facility for Your Business Choosing
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationManaged IT Secure Infrastructure Flexible Offerings Peace of Mind
Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Your Place or Ours Why Trust Your Network to SymQuest? SymQuest is an industry leader with a national reputation for service excellence
More informationSaaS architecture security
Introduction i2o solutions utilise the software as a service (or SaaS) model because it enables us to provide our customers with a robust, easy to use software platform that facilitates the rapid deployment
More informationStable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
More informationInformation Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
More informationWHY EMAIL FAILS DELL SURVEY OF EMAIL OUTAGES. WHITE PAPER Dell Modular Services. www.dell.com/modularservices
DELL SURVEY OF EMAIL OUTAGES WHITE PAPER Dell Modular Services www.dell.com/modularservices THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
More informationKeyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
More informationMEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
More informationWhy Host Microsoft Exchange with RTL Technologies?
Why Host Microsoft Exchange with RTL Technologies? When looking to implement or outsource Microsoft Exchange, there are several key factors to consider. Is the service reliable? Are there engineers on
More informationRetention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
More informationCAPABILITIES STATEMENT
CAPABILITIES STATEMENT TABLE OF CONTENTS About Entity Data 1 Customer Benefits 2 Why Choose Entity Data 3 Our Data Centre 5 Our Solutions > Solutions Overview 6 > Enterprise Virtualisation 7 > Host Security,
More informationA Glossary of Web Hosting Terms
Limited www.webdrive.co.nz PO Box 302829 North Harbour North Shore City 0751 Telephone: 0800 SPECIFIC SERVICE TERMS These specific service terms must be read in conjunction with 's General Terms and Conditions
More informationData Center Infrastructure & Managed Services Outline
Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists
More informationHosting Features, Terms & Policies
Hosting Features, Terms & Policies Portalogiks SharePoint Hosting Table of Contents Data Center Introduction... 2 Connectivity... 3 Power... 3 Security... 3 Environment... 3 Hosting Hardware & Software...
More informationOPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
More informationSymantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationSolveXia Business Continuity Planning
Business continuity planning is the term we use to describe all the steps we take at SolveXia to ensure that our service is up and running when you need it. As a 'Software as a Service' provider, our aim
More informationCHICAGO S PREMIERE DATA CENTER
CHICAGO S PREMIERE DATA CENTER White City collocation was founded in June, 2010 by a highly experienced industry executive in conjunction with several investment companies. The strategy of White City is
More informationCA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
More informationTk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
More informationBOWMAN SYSTEMS SECURING CLIENT DATA
BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered
More informationDISASTER RECOVERY WITH AWS
DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your
More informationAljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009
Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...
More informationService Description Email Filtering
Service Description Email Filtering Table of Contents Overview iomart Email Filtering... 3 iomart Email Filtering Features... 3 Technical Features... 3 Anti-Spam... 3 Cost Reduction... 4 Anti-Virus...
More informationNeverfail for Windows Applications June 2010
Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication
More informationOVERVIEW. IQmedia Networks Technical Brief
IQmedia Networks Technical Brief From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data
More informationBroadData Unified Meeting Security Whitepaper v4.2
BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the
More informationREQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:
REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,
More informationItron Cloud Services Offering
Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...
More informationNetwork & Information Services Network Service Level Commitment
Network & Information Services Network Service Level Commitment Agreement This agreement is to define CESD Network Services provided to our component school districts as a service outlined in the annual
More informationAll Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME
THE NEED FOR HIGH AVAILABILITY AND UPTIME 1 THE NEED FOR HIGH AVAILABILITY AND UPTIME All Clouds Are Not Created Equal INTRODUCTION Companies increasingly are looking to the cloud to help deliver IT services.
More informationIT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.
IT Assessment Report Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.7979 Table of Contents Executive Summary 3 IT Summary 3 Assessment Goal
More informationDisaster Recovery Hosting Provider Selection Criteria
Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What
More informationDisaster Recovery & Business Continuity Dell IT Executive Learning Series
Disaster Recovery & Business Continuity Dell IT Executive Learning Series Presented by Rich Armour, Debi Higdon & Mitchell McGovern THIS PRESENTATION SUMMARY IS FOR INFORMATIONAL PURPOSES ONLY AND MAY
More informationNeuStar Ultra Services Physical Security Overview
NeuStar Ultra Services Physical Security Overview Mission-critical network operations must have the highest standards of quality, security and reliability. NeuStar Ultra Services currently locates its
More informationWeb Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING
Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the
More informationTotal Message Care. Why E-mail Sorting Solutions?
Total Message Care Hosted Email- POP3, IMAP, MAPI, & Web Mail IM Filtering Email Filtering Web Filtering Archiving Shared Calendar, Tasks Mobile Device Synchronization Outlook Compatibility Why E-mail
More informationStorage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
More informationServers Australia Capability Statement. 1st January 2012
Servers Australia Capability Statement 1st January 2012 Servers Australia Servers Australia was established in October 2006 and has become a premium supplier of hosting, VoIP, Co-location, internet services
More informationEnterprise Security Model in SAS Environment
Enterprise Security Model in SAS Environment WHITE PAPER Enterprise Security Model in SAS Environment Emerging internet threats coupled with strict compliance requirements of banks, financial institutions,
More informationMANAGED DATABASE SOLUTIONS
Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution
More informationSolution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
More informationData Center Management
Data Center Management How Cisco IT Operates, Manages, and Protects Its Data Center A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview The Cisco IT Operations Data Center on the San Jose, California
More informationWhat is the Cloud, and why should it matter?
391 12 What is the Cloud, and why should it matter? 23 Everyone seems to be asking about it. No one seems to know exactly what it is, what they need, and where to find it. 4 A Philosophy of Design and
More informationSupplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
More informationMINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator
MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator Job Number: 07229P Date Finalized: 7/14/11 Service Department: Information Accountable To: Director, Information
More informationCherwell Software Hosted Environment. www.creekpointe.com info@creekpointe.com 864.297.4959 +1 800.613.1426
Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.
More informationWhy Email Fails MessageOne Survey of Email Outages
Why Email Fails MessageOne Survey of Email Outages White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504
More informationAt a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS
HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for
More informationTechnical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
More information611 Tradewind Dr. Suite 100, Ancaster ON, L9G 4V5 (905) 304-1775 ext 244 services@audcomp.com
Connecting To The Cloud Is Easier Than You Think Audcomp Cloud Services can bring your organization into the cloud. We provide a secure reliable medium to maximize your uptime, allowing you to focus on
More informationHealthcareBookings.com Security Set Up
HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationSaaS Service Level Agreement (SLA)
SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationBriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES:
BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES: Data Replication Exchange 2010 real-time data replicates to protect critical information in the event of a hardware failure or database corruption. Multi-tenant
More informationCounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
More informationCloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud
Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits
More informationRL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
More information