Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc.

Size: px
Start display at page:

Download "Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc."

Transcription

1 Agreement for IT Assessment Assessment Recommendation Statement of Work Onboarding Prepared For: Sample Customer Prepared by: Matt Klaus, GFI Digital Inc.

2 TABLE OF CONTENTS INTRODUCTION 3 UNDERSTANDING THIS REPORT 4 COMPANY SITUATIONAL OVERVIEW 5 OVERVIEW OF SYSTEM HEALTH 6 HARDWARE AND CORE APPLICATIONS SUMMARY 7 IT SECURITY 8, 9 DISASTER PREPAREDNESS & RECOVERY 10 RESOURCE AVAILABILITY 11, 12 NETWORK STABILITY & RELIABILITY 13, 14 INTERNET 15, 16 CONFIGURATION SIMPLICITY & USABILITY 17 COMPLIANCE & DOCUMENTATION 18 IT BUDGET & PLANNING 19 SUMMARY OF HARDWARE AND CORE APPLICATIONS 20, 21 2

3 INTRODUCTION Matt Klaus has performed a DigitalNET Assessment for Sample Customer. The DigitalNET Assessment is far more than a network assessment. It takes a comprehensive, unbiased and precise approach to gathering a complete understanding an organization s entire IT infrastructure, assets, performance and costs, in conjunction with how they all correlate with the core needs of the business. The DigitalNET Assessment has three core components: 1. The Business Assessment examines the customer s day-to-day business operations and objectives in order to closely align the IT function and infrastructure to Sample Customer s specific business needs. This ensures all recommendations are optimal to business function, as opposed to solely technologycentric. 2. The Physical Assessment reveals details of the hardware environment and configuration, including the amount of IT hardware, printers, copiers, and faxes, as well as information on hardware age, manufacturer, performance, and output volumes. It also graphically represents the physical configuration of the network and servers to offer a better understanding of the unique complexities of Sample Customer s IT configuration. 3. The Technical Assessment thoroughly evaluates nine critical components of the IT infrastructure and rates the current health of each. Specific findings are rated on a gradual scale indicating how much attention should be paid to each component, urgency level, as well as recommendations for improvement in areas where risk factors and vulnerabilities are identified. 3

4 UNDERSTANDING THIS REPORT This DigitalNET Report of Findings is comprised of extremely detailed information about Sample Customer s IT infrastructure and focuses on identified areas of concern and system vulnerabilities. Each section within this report is graded with a symbol indicating the area s overall health: = Looks Good = Needs Attention = Highly Vulnerable In addition, the specific findings in each section are rated on a gradual scale from low to high and indicate which areas require the most immediate attention and which are satisfactory as-is. The report also contains an Appendix of supporting tables, charts, and diagrams. Matt Klaus has made recommendations for improvement based on a combination of industry best practices and a thorough understanding of Sample Customer s business operations, pain points and future goals. As a result, the included recommendations are aligned with the unique business needs of Sample Customer. 4

5 COMPANY SITUATIONAL OVERVIEW Sample Customer currently receives IT support from a local company that they pay on a break fix program. Currently none of the computers is being monitored or preventative maintenance plans being done. There has also been a string of different people with different solutions in the setup and wiring of their network. When problems arise, the employees try to resolve the problems. The biggest issue they seem to be having on a constant basis is the free wireless network for customers. They are constantly having to power cycle the wireless AP when customers complain they are not getting out to the internet. When talking with them one of the biggest issues that they are getting frustrated with is there network and the users connecting to Sage. They have made the commitment to use Sage as there accounting and invoice program for events. With this they access it from different computers. It seems that not all computers can get connected at the same time. Printing from Sage is also very slow. They would also like to be able to invoices from Sage. Another is they would like to have remote access into the network to help assist the staff at night on invoicing issues instead of having to come in or trying to talk over the phone. They do currently remote connect to their workstation/server through Logmein which causes some problems when the user is using the workstation at the same time as a workstation. They would also like the ability to remote connect to all the computers on the network. They would like nothing more than to just have their network work smoothly. GFI Digital will do a thorough assessment of Sample Customer and define all of the short comings on their network both security and performance related. Based off these findings GFI Digital will discuss the recommendations moving forward and define how GFI Digital staff can maintain Sample Customer network and workstations moving forward on a proactive basis. 5

6 OVERVIEW OF SYSTEM HEALTH SPECIFIC AREAS OF INSPECTION AND ANALYSIS STATUS KEY: = LOOKS GOOD = NEEDS ATTENTION = HIGHLY VULNERABLE HARDWARE AND CORE APPLICATIONS Hardware Inventory & Age Motherboard Bios information Warranties & Service providers Operating System Versions Microsoft Office Versions Core Business Applications STATUS IT SECURITY Firewall implementation(s) Microsoft Service Pack and updates Remote Desktop (Terminal Servers) Anti-virus, Anti-spam, Anti-malware Password Criteria Mail Security DISASTER PREPAREDNESS & RECOVERY Local and Offsite Backup/Tools Workstation Data Backup Disaster Recovery Plan & Site RESOURCE AVAILABILITY Disk Space Utilization Event Logs & Server Load Uninterrupted Power Supply Server Uptime Backup Success Rate Environmental Management NETWORK STABILITY, PERFORMANCE & RELIABILITY Network Configuration Warranty Management Remote access to Network Network Growth Potential Routine Maintenance Threats to System Stability and Reliability Defined Network Bottlenecks INTERNET Internet Service Provider Hosting and Storage Internet Usage Policy Speed, Bandwidth & Connectivity Wireless Connection CONFIGURATION SIMPLICITY & USABILITY Network Configuration Ease of System Use Helpdesk Resource Data Center/ Server Room setup Labels and Identification Notification and Resolution of Tickets COMPLIANCE & DOCUMENTATION License Compliance Documentation Data Security / Auditing / Retention Current Issues and Concerns HIPA compliance (if applicable) IT BUDGET & PLANNING Current IT Budget Budget Review Frequency Plans for future IT Expansions 6

7 HARDWARE AND CORE APPLICATIONS It s important to analyze the condition, type and age of all components of a company s IT infrastructure. When hardware is approaching its life expectancy or running outdated software, the probability that the IT system will fail increases exponentially. In addition, obsolete hardware and software tend to have a negative effect on employees overall productivity because they can cause the IT system to crash more frequently, resulting in more down time. It is also important to look at whether or not there is consistency in the types of hardware and software utilized within the company because when the equipment is standardized across the company the overall IT infrastructure is usually more predictable and user-friendly. It s a best practice to rotate workstations and servers on a three year schedule and laptops on a two year schedule. Servers, switches and similar devices should be replaced every three to five years. Operating systems and critical software shouldn t be older than one version behind current. Best practice also suggests that devices under the same network should all operate on the same platform to achieve optimal system usability. WARRANTIES & SERVICE PROVIDERS Customer has been purchasing computer from local retail outlets The newest computer they purchased was about 2 years ago If there is no budgeting for replacement computers take into consideration a warranty to cover the life expectancy of the computer which is 3 to 5 years. OPERATING SYSTEMS & APPLICATIONS Currently the operating systems are a mixture 9 workstations 1 win 8, 2 win 7 pro, 3 win 7 home, 2 win XP pro Recommend that the system with Home edition be upgraded to Professional Recommend that replacement of XP with window 7 pro Change the considered server from workstation operating system to server operating system 7

8 IT SECURITY Many business owners worry about the potential for an outsider to access their company s data. They diligently shred confidential or sensitive printed documents, but feel unsure about how to protect their electronic information. Protecting critical data is more complicated than a firewall or anti-virus software. A well-functioning and highly protected network requires the strategic use and combination of multiple types of defense technologies. Additionally, since spam, virus and spyware technologies are constantly evolving, regular system monitoring and updating is essential to keeping the system minimally exposed to the onslaught of invasions. Adherence to such security best practices ensure the system is fully secured with negligible exposure vulnerabilities. Best practices also include maintaining a secure documentation system for all administrative and user logins and passwords. FIREWALL & SECURE CONNECTION No real firewall is in place Currently using wireless router as firewall Currently using Logmein for remote access Recommend installation of a firewall to allow control of remote access and monitor traffic inbound and outbound form the network A firewall also would allow VPN connections into the office that make a secure connection from remote locations. ANTI-VIRUS, ANTI-SPAM, ANTI-MALWARE PROTECTION There is a mixture of different Antivirus software and anti-malware Some systems are set for routine scans but there is no confirmation is scans are clean Out of 9 systems 2 are missing Antivirus, 1 is out of date and rest are up to date With DigitalNET service we monitor and maintain that all antivirus running and up to date with routine scans and document of results 8

9 MICROSOFT SERVICE PACKS LEVELS Most systems are up to date as to service packs if auto update is being used. Maintenance and monitor is not done Get all systems up to date with latest service pack required Maintain that all systems are up to date on all updates MICROSOFT SECURITY UPDATES There is not a set program for Microsoft updates to be maintain and verified Some systems are set to automatic update With DigitalNET service we monitor and routinely schedule weekly and daily for updates to be reviewed and applied to system DigitalNET also provides auto notifications if there are any problems are issues with updates being applied REMOTE DESKTOP (TERMINAL SERVERS) Currently not using this feature Consider using this for remote connection to computer on the network through a VPN connection MAIL SECURITY Mail security currently handled by hosting company If Sample Customer decide s to bring in-house GFI Digital with DigitalNET can offer several solutions and recommendation for mail security 9

10 DISASTER PREPAREDNESS & RECOVERY One of the riskiest mistakes a business can make is to not adequately protect its digital assets from disaster. Most companies store critical data on their network, and require use of their computers for day to day operations. The permanent (or even temporary) loss of either of these can be catastrophic. Once a company has had a risk assessment and identified current threats to their IT infrastructure, the next step is to determine which infrastructure elements are most important to the business operations and create a plan to protect them. It is absolutely essential that busineseses have a documented plan for their IT infrastructure and data protection in case of a disaster as well as a plan for data recovery. Best practice is to test the backup system regularly and train all users on protocol. In addition, some companies prefer to have their data backup system at their facility, however, best practice is to also have data backed up to a location separate from the physical location of the business. BACKUP PROCESS & TOOLS Currently using Logmein Backup on Win7 server to external device Backup logs showed that backups were failing due to destination not found Develop a backup plan that backups daily of critical files and folders With DigitalNET monitoring and notifications would make sure that backups are consistently being done and resolution is made if there are failures WORKSTATION DATA BACKUP Currently are not backing up workstations Data is saved to the local drive Crete user shares on server that employee save the files too Setup a backup process for workstations to a server on premise DISASTER RECOVERY PLAN & SITE There is no offsite data being in the event that something In the event of natural disaster or fire that affects the company's location, the backed up data is at high risk for Develop a disaster recovery plan is something were to happen. Consider making sure backups are offsite at least once a week 10

11 RESOURCE AVAILABILITY BACKUP SUCCESS RATE & MAINTENANCE Upon reviewing Backups there has been some failures to destination not found Sage backups failing to users being logged in The amount and type of available technology resources and space that a company has directly affects its business process efficiencies, response to market, performance of line of business applications and more. When equipment is operating at a nearly full disk space capacity, users experience lag time, application freezing and failure, and even data loss. Best practice to resolve and prevent intermittent network performance issues is to first analyze IP traffic over the network, monitor disk space utilization, server uptime etc. Once there is an understanding of the current system s resource availability, performance problems can be prevented through the regular monitoring, management and maintenance of the system and its components. A DigitalNET contract on the server would allow further monitoring and remediation as to when backups fail. DISK SPACE UTILIZATION Over all drive space utilization is not stressed On Windows7Server drive c is at 34% used No regular drive maintenance for defragmentation or monitoring With DigitalNET monitoring and retune maintenance is performed on Hard Drives. To alert when drive exceed capacity thresholds and routine defragmentation to increase performance. UNINTERRUPTED POWER SUPPLY & SERVER UPTIME Currently there is no use of UPS Recommend the use of a UPS for the sage server & front desk Recommend use of a UPS for the network switch and internet including the switch that powers the camera for security. 11

12 EVENT LOGS & SERVER LOAD Events logs are currently not monitored or reviewed Main server is used as workstation as well With DigitalNET monitoring of events on all workstations take place. When critical event happen this alerts our IT staff to look into and resolve problems. Recommend that the server be used as a server for Sage and not a workstations as well. 12

13 NETWORK STABILITY & RELIABILITY There is nothing more frustrating than an unstable or unreliable system. If configured properly and managed appropriately, computer networks can be extremely reliable. In addition, a stable network directly affects its efficiency and ability to handle multiple processes. By stabilizing an unreliable network, businesses will benefit from a faster, higher functioning and more effective system overall. Simple steps can be taken to greatly enhance the reliability of the network. Best practice to improve network stability and reliability is to utilize automated management and monitoring on servers to help detect glitches before they cause system instability. NETWORK CONFIGURATION Currently using Charter Business cable for internet Using wireless router for firewall and wireless connectivity for employees. Separate wireless router for public WIFI access Two switches a 16 port and 8 port used recommend install of Firewall Replacing public WIFI device and relocate it to public area and make sure no access to business network Consider possible setting up 24 port for switch or consolidating data ports needed for network NETWORK GROWTH POTENTIAL Currently there are 9 computers, 1 video system and several printers/copiers on the network There are unused data ports currently in the switches Customer indicated that potential move of the office which would require some rewiring of network. GFI Digital can assist in these moves and configurations as special project along with making recommendations REMOTE ACCESS TO NETWORK Currently use LogMeIn to the server. Occasionally have issues with users using system at same time. With a Firewall this would allow secure connections from remote sites to systems and software applications such as Sage. GFI Digital can assist in the goal of the customer to have remote access to all systems on the network remotely. 13

14 ROUTINE MAINTANENCE Customer currently contacts local company on break fix solutions. Customer also tries to resolve problems on their own With a DigitalNET package you will have access to our staff for resolutions to problems as part of a monthly plan DigitalNET will also allow you to focus on your business instead of network or computer problems 14

15 INTERNET Internet has become an integral part of business operations for businesses of all sizes and industries. Choosing an appropriate internet connection provider, speed, and medium for delivery is essential to daily business operations, processes and communications. , SharePoint sites, line of business applications, on-line research tools, and remote access functionalities all require the use of the internet and all play an essential role in a business ability to function. As a result, it is absolutely critical for businesses to regularly monitor and manage internet services, speed, bandwidth and uptime. Best practice is to have documented internet usage, password and downloading policies to help protect sensitive data from virus or spam corruption. INTERNET SERVICE PROVIDER Currently using Charter Business Cable service for internet There have been no complaints about internet speed or problems. Complaints have been with Wireless network Charter does offer increase speed of service to allow growth of internet needs. HOSTING & STORAGE is currently hosted through local service carrier Computype Currently just have plain service Customer may want to consider change of service to Exchange to allow sync of on multiple devices and shared Calendar If customer decides to bring into their business GFI Digital DigitalNET can assist in setup and configuration of this service along with making recommendations INTERNET USAGE POLICY There currently is no Internet usage policy Recommend that the at least a basic Internet usage policy is adopted so users understand policy to browsing of websites on company workstations 15

16 WIRELESS CONNECTION there are two wireless networks A Cisco WRT5402 wireless router is used as firewall and used for business wireless network A Linksys E1200 is used for public WIFI access, Currently have issues and having to power off/on It is recommended that both wireless networks are secured on separate frequency to not cause interference and connectivity issues The public WIFI should be relocated to the Public are and consider replacing with a more robust wireless AP to ensure customer satisfaction of service 16

17 CONFIGURATION SIMPLICITY & USABILITY IT system infrastructure can be configured in a variety of ways. The architecture of the system can range from simple to complex and still function regardless, but the best performing, easiest to manage and most reliable systems tend to be those configured in the simplest and most straightforward manner. Internal as well external stake holders such as employees, vendors, advisors, contractors and customers interact on a daily basis with business IT systems and networks. Ease of access, labeling, identification and help desk support play an integral part in the usability and effectiveness of a company s network, so it is important to adopt best practices around standardization of network and IT infrastructure. HELP DESK RESOURCE Currently the helpdesk support is done by Sample Customer s staff. They are the contact to resolve problems when they arise With GFI Digital DigitalNET service you get access to our helpdesk support Mon Friday 8-5 LABELS & IDENTIFICATION All computer should be labeled with their ID There are currently no labels to identify the individual workstations There is no topology map of their network With DigitalNET service we can provide a topology map of systems and the network. Recommend that all workstations have a label identifying the systems name NOTIFICATION & RESOLUTION OF TICKETS Sample Customer does not have any formal ticketing systems for issues with their computers or network With a DigitalNET as your provider you will receive ticket notification and resolution of problems with a summary of service performed based on level of service 17

18 COMPLIANCE & DOCUMENTATION Compliances to licensing agreements, OEM policies, efficient documentation, data security, data auditing and data retention are important areas of business IT infrastructure. For sustainability and institutional knowledge purposes, each computer, server, and device connected to the network should have its settings documented such that another trained IT technician could easily take over if necessary, just as all disaster recovery protocols, password guidelines and internet usage policies should also be documented. LICENSE COMPLIANCE Workstations do have COA for software installed and from customer they have been purchasing software Create an electronic document and hard copy of all software license key, account numbers and related information Recommend that home edition software not be purchased for business use DOCUMENTATION It is important to have documentation of inventory of hardware, software and policy Create and maintain documentation for the following Hardware and Software Internet firewall and website hosting login and passwords Internet Policy Data and Network infrastructure diagram and Help resources Future IT growth 18

19 IT BUDGET & PLANNING CURRENT IT BUDGET there currently is no IT budgeting When hardware breaks they then purchase at local retail IT systems are both integral and expensive for businesses. Regular planning and budgeting can minimize the cash flow impact of replacing equipment, allow for adequate preparation, routine replacement of aging equipment, and the near elimination of surprise expenses. After a detailed business and systems assessment, spending priorities become clear and can be determined with consideration to urgency, benefits and costs. Low priority IT spending needs can be placed in a longer-range budgeting plan and high priority needs that require more immediate attention can be expedited. Best practice is to maintain a living IT budget and 3-5 year IT spending plan. Recommend setting a budget for equipment replacement and term of life With GFI Digital MNS program we can assist in developing this budget BUDGET REVIEW FREQUENCY Currently do not review IT budget needs With GFI Digital MNS program we can assist in business strategic planning and review changes needed in budget PLANS FOR FUTURE IT EXPANSIONS Customer has ideas of what they would like to do with IT but have not established how to achieve these goal With GFI Digital DigitalNET we will be your strategic partner to assist your business in reviewing IT need and ways to accomplish the goals you set through special projects Customer also stated that they will be moving office which coordination an planning need to be done prior to move to minimize interruption of their business 19

20 SUMMARY OF OVERALL RECOMMENDATIONS URGENCY LEVEL RECOMMENDATION Automation of maintenance, documentation, monitoring and auditing is key to reducing operating costs and increasing productivity. Must start proactively installing updates and patches in a timely fashion. Implement an automated monitoring and alerting system to prevent outages and perform automated remediation, as well as give warning as glitches or malfunctions occur. The best way of ensuring this is done properly is by outsourcing the monitoring, maintaining and auditing functions to highly trained specialists. Low Medium High Create and maintain documentation, labeling and diagrams for the following: Hardware and software inventory Internet firewall and website hosting login and passwords Internet Usage Policy Data Backup and Recovery Protocol Network infrastructure diagram and labeling Warranties and maintenance information Maintenance schedule and tracking Help desk resources Employee logins and passwords Data auditing and retention plan Low Medium High Make plans to replace the on-premise backup system to current industry practice ASAP! Setup additional backup system that is either cloud-based (hosted) or at an off-site location, to protect data in case of physical damage to backup system. Low Medium High Create a VPN environment for employees that can access the network securely, as well as for users who access data remotely. Low Medium High Consider replace two workstations that are old Dell workstation. Low Medium High Consider upgrading your firewall with a unit that provides perimeter scanning, better reporting for bandwidth, usage and intrusion detection along with ability to support VPN connections Low Medium High 20

21 Laptop users should be in a LAN environment if using the network locally. If accessing the network remotely, it should be in a VPN environment. Low Medium High Replace routers with business-grade wireless routers that are designed to handle more traffic. Password protect any and all wireless routers with at bare minimum of WPA-2 password protection. Relocate Public AP to are widely used for public access and replace with a business class AP. Low Medium High Consider switching to a hosted service to an Exchange type of hosted or bringing in-house. Low Medium High Highly recommend standardizing the line of business applications and operating systems company-wide. Low Medium High Consider restricting certain areas of the Network to only grant access to users with the password. Low Medium High Consider either purchasing a new server or converting the systems currently for SAGE from a workstations to a standalone server by reinstalling with Windows Server software. This would also allow users accounts controlled from the server and workstations to create a more secure environment. Low Medium High Implement company-wide employee training for safe internet usage and downloading. Low Medium High 21

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

Stable and Secure Network Infrastructure Benchmarks

Stable and Secure Network Infrastructure Benchmarks Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting

More information

Proactive IT Solutions More Reliable Networks Are Our Business

Proactive IT Solutions More Reliable Networks Are Our Business Proactive IT Solutions Logo Proactive IT Solutions More Reliable Networks Are Our Business Copyright 2005 Primetime, Inc. All rights reserved. Catalin Ursu info@catcomcomputers.com 973-233-1888 B 973-233-1887

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Information Technology Services

Information Technology Services Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

The Power Of Managed Services. Features

The Power Of Managed Services. Features b u s i n e s s C a r e m a n a g e d S e r v i c e s Lower costs, increased profitability, new market expansions and happier customers. These are just a few of the most important priorities for business

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

Ancero Backup & Disaster Recovery (BDR) Service Guide

Ancero Backup & Disaster Recovery (BDR) Service Guide Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Request for Proposal Technology Services Maintenance and Support

Request for Proposal Technology Services Maintenance and Support Request for Proposal Technology Services Maintenance and Support Maintenance and Support July 19, 2014 Celerity Educational Group is seeking an IT consulting firm to manage Maintenance of our Network Systems

More information

17 Courtenay Park Newton Abbot TQ12 2HD Phone: 01626 360011 Email: info@mdgp.co.uk Web: http://www.mdgp.co.uk

17 Courtenay Park Newton Abbot TQ12 2HD Phone: 01626 360011 Email: info@mdgp.co.uk Web: http://www.mdgp.co.uk 17 Courtenay Park Newton Abbot TQ12 2HD Phone: 01626 360011 Email: info@mdgp.co.uk Web: http://www.mdgp.co.uk 1. Introduction Myriad Digital specialise in supplying professional IT support and other IT

More information

Managed Security Services SLA Document. Response and Resolution Times

Managed Security Services SLA Document. Response and Resolution Times Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION INNOVATE THROUGH MOTIVATION MSP Services Overview SVEN RADEMACHER Agenda About us IT Challenges Our Approach Our Services Next Steps About Us SEAFAIR IT SOLUTIONS Pre-eminent Managed Service Provider Provide

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Client Hardware and Infrastructure Suggested Best Practices

Client Hardware and Infrastructure Suggested Best Practices Client Hardware and Infrastructure Suggested Best Practices While it is the responsibility of our Clients to support their hardware and infrastructure, the Pretty Good Practices below are provided for

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Complete Managed Services. Proposal for managed services for the City of Tontitown

Complete Managed Services. Proposal for managed services for the City of Tontitown Complete Managed Services Proposal for managed services for the City of Tontitown Complete Managed Services Components Windows Server 2008, Windows Server 2012 1. Proactive Maintenance of Server(s) Proactive

More information

Managed IT Solutions. More Reliable Networks Are Our Business

Managed IT Solutions. More Reliable Networks Are Our Business Managed IT Solutions Logo Managed IT Solutions More Reliable Networks Are Our Business Copyright 2005 Primetime, Inc. All rights reserved. Catalin Ursu info@catcomcomputers.com 973-233-1888 B 973-233-1887

More information

Information Technology Mission Statement. Information Technology Goals

Information Technology Mission Statement. Information Technology Goals Ionia County Information Technology Strategic Plan 2008-2013 Table of Contents Information Technology Mission 3 Information Technology Goals 3 Current Network Overview 4-5 Information Technology Focus

More information

How To Manage Your Information Systems At Aerosoft.Com

How To Manage Your Information Systems At Aerosoft.Com Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented

More information

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014 MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014 COMPLIANCE SCHEDULE REQUIREMENT PERIOD DESCRIPTION REQUIREMENT PERIOD DESCRIPTION 8.5.6 As Needed 11.1 Monthly 1.3 Quarterly 1.1.6 Semi-Annually

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ).

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). I. Service Definition. Exchange My Mail will provide Hosted Exchange and other Application Services

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

Managed IT Services. Maintain, manage and report

Managed IT Services. Maintain, manage and report Managed IT Services Maintain, manage and report 1 2 Comunet was established in 1995 to provide professional Information Technology services to Australian businesses and organisations. Its vision now, as

More information

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End

More information

Network Documentation Checklist

Network Documentation Checklist Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation

More information

Call us today 1300 724 599. Managed IT Services. Proactive, flexible and affordable

Call us today 1300 724 599. Managed IT Services. Proactive, flexible and affordable Call us today 1300 724 599 Managed IT Services Proactive, flexible and affordable We believe technology is at its best when it s invisible. When you can focus on the task you are achieving, not the technology

More information

Tailored Technologies LLC

Tailored Technologies LLC 685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Top 10 Information Technology Best Practices for the Architecture, Engineering, and Construction Industry

Top 10 Information Technology Best Practices for the Architecture, Engineering, and Construction Industry Top 10 Information Technology Best Practices for the Architecture, Engineering, and Construction Industry How can a business owner in the Architectural, Engineering, or Construction community improve their

More information

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS.

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. I. Service Definition Infront Webworks, will provide you with cloud based services and other application

More information

Additional services are also available according to your specific plan configuration.

Additional services are also available according to your specific plan configuration. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services

More information

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved.

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved. KASEYA CLOUD SOLUTION CATALOG 2016 Q1 UPDATED & EFFECTIVE AS OF: February 1, 2016 Kaseya Catalog - 1 - Overview of the Kaseya Cloud Subscription Solutions The Kaseya Cloud solutions are designed to meet

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

HIPAA RISK ASSESSMENT

HIPAA RISK ASSESSMENT HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation

More information

IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME

IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME For: CLIENT NAME HERE CLIENT ADDRESS HERE 1. Current

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

Security Policy for External Customers

Security Policy for External Customers 1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Proactive. Professional. IT Support and Remote Network Monitoring.

Proactive. Professional. IT Support and Remote Network Monitoring. Proactive. Professional. IT Support and Remote Network Monitoring. Watching Your Greatest Asset with the Latest Technology. Focus on your Business. We ll focus on your IT. Recent business trends coupled

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.

IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951. IT Assessment Report Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.7979 Table of Contents Executive Summary 3 IT Summary 3 Assessment Goal

More information

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")

More information

Countering and reducing ICT security risks 1. Physical and environmental risks

Countering and reducing ICT security risks 1. Physical and environmental risks Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

www.datatechhosting.com

www.datatechhosting.com Hosting and Cloud Services Customer Service Level Agreement (SLA) Welcome to the Clustered Cloud Hosted Services Community. We are happy to have you aboard and look forward to assisting you with all your

More information

ENSURING DATABASE RELIABILITY ON YOUR NETWORK

ENSURING DATABASE RELIABILITY ON YOUR NETWORK ENSURING DATABASE RELIABILITY ON YOUR NETWORK Introduction... 1 Make sure your network resources meet your firm s requirements... 2 Make sure each workstation meets the recommended system requirements...

More information

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit) IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref: SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,

More information

AllianceIT Managed Services

AllianceIT Managed Services AllianceIT Managed Services confidence predictability productivity focus Uncertainty is a business killer. To be successful, companies have to know that their critical IT systems will be available on demand

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability Service Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability Products As your information systems grow more complex,

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due: REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,

More information

Managed Information Technology Services For the Town of Moraga

Managed Information Technology Services For the Town of Moraga Request for Qualifications Managed Information Technology Services For the Town of Moraga Deadline for Submittal: Wednesday, December 5, 2012 No later than 2:00 p.m. Prepared by: Stephanie Hom Administrative

More information

Technological foundations of an efficient, reliable law office network

Technological foundations of an efficient, reliable law office network Technological foundations of an efficient, reliable law office network Prepared by Brian Mauch for the Trial Lawyers Association of BC conference Maximize Your Personal Injury Practice: 20 Ways to Get

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Electronic Health Records Are You Ready?

Electronic Health Records Are You Ready? Electronic Health Records Are You Ready? By Kari Lidstone, Network Engineer for MMIC Health IT This paper will discuss the areas of implementation that need to be reviewed before the transition onto an

More information

Qbt Consulting File Server & Server Based Software, Options for Deployment

Qbt Consulting File Server & Server Based Software, Options for Deployment Qbt Consulting File Server & Server Based Software, Options for Deployment Every business has a need to collect and store data, to provide their staff access to the data in a controlled way, to access

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

10 easy steps to secure your retail network

10 easy steps to secure your retail network 10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End User

More information

Interactive welcome kit. 866.603.3199 Charter-Business.com CB.016.fibCD.0210

Interactive welcome kit. 866.603.3199 Charter-Business.com CB.016.fibCD.0210 CHARTER BUSINESS FIBER INTERNET Interactive welcome kit 866.603.3199 Charter-Business.com CB.016.fibCD.0210 CHARTER BUSINESS FIBER INTERNET 2 Turn your contacts on to affordable, powerful solutions from

More information

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration. HOSTEDMIDEX.CO.UK THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO CLIENT BY THE SUPPLIER. I. Service Definition Lanmark Technical Services Ltd trading as mailhosted.co.uk

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

How To Backup An Exchange Server With 25Gb And More On A Microsoft Smartfiler With A Backup From A Backup To A Backup Point Set On A Flash Drive On A Pc Or Macbook Or Ipad On A Cheap Computer (For A

How To Backup An Exchange Server With 25Gb And More On A Microsoft Smartfiler With A Backup From A Backup To A Backup Point Set On A Flash Drive On A Pc Or Macbook Or Ipad On A Cheap Computer (For A Using SmartFiler for Microsoft Exchange Server Backup Introduction The SmartFiler Backup Appliance Exchange Server backup solution is integrated with the Symantec Backup Exec System Recovery 2010. Using

More information

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can

More information

MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator

MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator Job Number: 07229P Date Finalized: 7/14/11 Service Department: Information Accountable To: Director, Information

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

How to Practice Safely in an era of Cybercrime and Privacy Fears

How to Practice Safely in an era of Cybercrime and Privacy Fears How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,

More information

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Your Place or Ours Why Trust Your Network to SymQuest? SymQuest is an industry leader with a national reputation for service excellence

More information

Office of Information Technology Addendum to Managed Workstation Service Level Agreement

Office of Information Technology Addendum to Managed Workstation Service Level Agreement Office of Information Technology Addendum to Managed Workstation Service Level Agreement This Addendum further defines and explains the Basic Support, Extended Support and Premium Support Level Services

More information

Top 10 Most Common Malware - How to Avoid Them

Top 10 Most Common Malware - How to Avoid Them Health check performed by: Jeremy Arndt My Company February 18 th, 2015 IT Health Check OVERALL SCORE 10 Users 3 Servers 1 Network 2 Backups 1 E mail 1 Antivirus 2 High Risk Risk Low Risk IT Health Check

More information

Contact us for a free consultation today! 630-936-4045 officemove@aie195.com

Contact us for a free consultation today! 630-936-4045 officemove@aie195.com IT Relocation Schedule Moving offices? Often, relocating your IT infrastructure can be one of the most daunting aspects of the move, and it s also the most critical to business continuity. Servers, PCs,

More information

Ancero Network Attached Storage (NAS) Service Guide

Ancero Network Attached Storage (NAS) Service Guide Ancero Network Attached Storage (NAS) Service Guide Contents Service Overview... 3 Ancero Network Attached Storage... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware

More information

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au info@ezims.com.au

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Audit4 Installation Requirements

Audit4 Installation Requirements Audit4 version 8.1+ 2015 Copyright 2012 S4S Pty Ltd Audit4 Support Matrix 2015 The following table provides details on the operating system and database engine support for Audit4 as at March 2015. Operating

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone

More information