Quality Certificate for Kaspersky DDoS Prevention Software

Size: px
Start display at page:

Download "Quality Certificate for Kaspersky DDoS Prevention Software"

Transcription

1 Quality Certificate for Kaspersky DDoS Prevention Software

2 Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General interaction as part of Kaspersky DDoS Prevention service 4 3. Sharing of responsibilities between Kaspersky Lab and the Licensee 4 4. Technical support limitations 5 5. Force majeure 5 6. Operating parameters General operating parameters of software and technical support Notifications about anomalies detected, and getting the system ready for filtering Establishing a dedicated filter bandwidth Traffic filtration time covered by the tariff Incident response time Incident resolution time Request response time Traffic filtering parameters Continuity of software operation Duration of attack information storage in the System Incident and anomaly resolution monitoring Quality of service monitoring Evaluated criteria of software performance quality Methods of evaluating the quality of software performance and technical support Anomaly notification time Traffic filtering parameters Continuity of software operation Agreed interruptions in software availability Technical support service Licensee's obligations to participate in incident resolution Procedure for interaction during software operation Telephone System web portal Conditions of work at the Licensee's site 13 2

3 Definitions «System», «Application» Kaspersky DDoS Prevention components, processes, and service personnel. «Attack» an action aimed at destabilizing resource operability, causing denial of service or distracting the administrator from an attempt at seizing control over a remote or local computing system (by escalating access privileges). «DoS attack» Denial of Service attack. An attack at a computing system aimed at causing its denial: a situation where legitimate system users are unable to access system resources (servers) or such access is complicated. System denial can be an end in itself (for example, an attempt at making a popular website inaccessible) or one of the steps in seizing control over a system (for example, an emergency can cause software to release certain critical data, such as its version, a portion of program code, etc.). An attack originating from a large number of computers at once is called a DDoS attack (Distributed Denial of Service attack). «Traffic» volume of data transmitted over communication channels over a certain length of time. «Legitimate traffic» inbound traffic of a computing system from users intending to use the computing system for its intended purpose (for example, users of an online banking system or website visitors). «Parasite traffic» traffic that does not match the designated and approved statistical criteria of legitimate traffic. «Traffic filtering», «Traffic purging» a process of detecting parasite traffic and removing it from the traffic of the protected resource. «Anomaly» a deviation of statistical characteristics of inbound traffic of a resource from the design characteristics. «Resource» a network service of the Licensee defined by a domain name or IP address. «Collector», «Purging center», «Filtering router», «Proxy server», «Sensor» components of the Kaspersky DDoS Prevention system. «Traffic redirection» a process of delivering traffic of the protected resource to the purging center. «Tunnel» a method of delivering traffic from the purging center to the protected resource, which involves arranging address resolution (if necessary) and traffic encapsulation on the side of the purging center, redirecting encapsulated traffic to the protected resource, removing the encapsulation and (if necessary) repeatedly resolving addresses on the side of the protected resource. «Request» an or call reporting a problem, from an authorized representative of the Licensee to Kaspersky Lab. «Incident» any event involving the Kaspersky DDoS Prevention system or personnel, which adversely affects resource performance or may do so in the future. «Problem» the primary unknown cause of an incident. «Significant incident» an incident that has a significant effect on resource performance. «Critical incident» an incident that renders the Licensee's resource completely non-operational or causes a significant deterioration in its performance. «Non-critical incident» all the remaining incidents that do not have a significant adverse effect on resource performance. «Registration time» a length of time between a request and the confirmation of incident acceptance for review by Kaspersky Lab representatives. «Response time» a length of time (from the time when an incident is registered) during which incident processing is started. The duration of the response time directly depends on the level of incident criticality. «Resolution time» a length of time (from the end of the response time) during which a permanent or temporary solution for the incident is found. «Quality of service» a manifestation of system performance in certain quantifiable criteria. «Licensee's site» sites (buildings, premises) hosting Kaspersky Lab hardware and software complexes serving the resource. «Activation code» a unique alphanumeric code generated by Kaspersky Lab, which enables the Licensee to use the system. «Application activation», «System activation» entry of the activation code in the system interface, which marks the start of system use by the Licensee. 3

4 Quality Certificate for Kaspersky DDoS Prevention Software 1. Conditions of software operability The Kaspersky DDoS Prevention system can effectively filter traffic only on condition: The Licensee makes it possible to connect sensors to resources for the purposes of monitoring anomalies and building a statistical profile of resources using one of the following methods (the most appropriate method is determined by Kaspersky Lab specialists after examining the network infrastructure of the Licensee's resource): deployment of hardware of the sensor component in the immediate vicinity of the resource traffic mirroring from the resource to the sensor channeling aggregated traffic data to the network sensor (NetFlow) The Licensee is able to administer DNS accounts of his resources in real time and/or manage the announcement of autonomous systems (blocks of provider-independent addresses) 2. General interaction as part of Kaspersky DDoS Prevention service Kaspersky Lab representatives monitor the traffic of protected resources for anomalies Kaspersky Lab representatives notify designated employees of the Licensee about the presence of persistent anomalies in traffic Designated employees of the Licensee evaluate the workload on their resources and decide to start the filtering Designated employees of the Licensee perform a sequence of steps to route the traffic of protected resources to the purging system Kaspersky Lab representatives launch the filtering and monitor the degree of traffic purging, making adjustments to system settings, if necessary Once the attack has stopped, Kaspersky Lab representatives notify the designated employees of the Licensee accordingly Designated employees of the Licensee decide to stop the filtering and take steps to return the traffic routes to the protected resources to their original status 3. Sharing of responsibilities between Kaspersky Lab and the Licensee Table 1 Scope of responsibility Kaspersky Lab Licensee Operability of the Kaspersky DDoS Prevention service, including operability of the software side of the sensor + Operability of the infrastructure of protected resources, including operability of the hardware side of the sensor + Support of service operability through a distributed filtration system + + Monitoring the traffic of the protected resource for anomalies + Notifying employees of the Licensee about anomalies detected in the traffic of the protected resource + Notifying employees of the Licensee about the possibility to stop the filtering + Deciding to start or stop the filtering process + Monitoring the quality of service of the purging system with the filtering mode enabled + + Managing accounts of protected resources (DNS accounts) or routing (BGP) + 4

5 4. Technical support limitations Technical support of Kaspersky DDoS Prevention software does not cover resolution of: Incidents involving the inoperability of any hardware and software that is not a part of System equipment Incidents during which the Licensee fails to honor the Licensee's Obligations to Participate in the Resolution of Incidents (see the relevant section) Incidents that cannot be reproduced by either the Licensee or Kaspersky Lab Incidents that are not consequences or components of DDoS attacks As part of Kaspersky DDoS Prevention software support and assistance, Kaspersky Lab does not perform: Security and performance analysis of software and hardware complexes of the Licensee Configuration and administration of software and hardware complexes of the Licensee Administration of hardware of Internet service providers used by the Licensee Interaction with the personnel of Internet service providers used by the Licensee Repairs and recovery work on software and hardware of the Licensee Other work that is not directly related to the operation of the software and its components 5. Force majeure The parties agree to classify as routine the following situations involving disruptions of software operation if such disruptions have resulted from: Сhanges made by the Licensee to the settings that directly or indirectly affect software components within the scope of responsibility of Kaspersky Lab, without the approval of Kaspersky Lab An interruption in software operation caused by scheduled hardware maintenance coordinated with the Licensee in advance or associated with software upgrades requested by the Licensee An interruption in software operation caused by the Licensee's failure to honor Licensee's Obligations to Participate in the Resolution of Incidents (see the relevant section) An interruption in software operation caused by the need to eliminate factors hindering software operation, which arose through the Licensee's fault Interference by the Licensee or a third party with the operation of hardware or software located at the Licensee's site and ensuring System operation, without the consent of Kaspersky Lab Redirection of traffic to the purging subsystem without the approval of Kaspersky Lab technical personnel Failures affecting hardware of the Licensee or the Licensee's Internet service provider, which is outside the scope of responsibility of Kaspersky Lab Instances of the telecom service provider blocking communication channels between components of the infrastructure of the Licensee and Kaspersky Lab An extraordinary situation. An extraordinary situation shall mean an interruption in software operation in routine mode for more than 8 hours caused by one of the following events: failure of infrastructure components of Internet service providers to Kaspersky Lab for more than 8 hours for reasons beyond the control of Kaspersky Lab partial destruction, fire or flooding of the premises of the data center hosting Kaspersky Lab hardware In the event of an emergency situation, Kaspersky Lab undertakes to restore minimal service operability within 4 hours. Other force majeure circumstances (as stipulated in the Agreement). 5

6 Quality Certificate for Kaspersky DDoS Prevention Software 6. Operating parameters 6.1 General operating parameters of software and technical support Table 2 lists the general operating parameters of software and technical support. Table 2 Anomaly monitoring and filtering Technical support and assistance 6.2 Notifications about anomalies detected, and getting the system ready for filtering Table 3 lists the relevant indicators. Table 3 Deviations from statistical parameters Statistical parameters exceeded considerably (by no more than 50%) Statistical parameters exceeded significantly Time, GMT+3 24х7 24х7 Time it takes to notify about anomalies and get the system ready (method of notification about anomalies) 2 business hours (via ) 30 minutes (via or by phone) 15 minutes (by phone) Language Russian Russian Percentage of timely completion 80% 80% 80% 6.3 Establishing a dedicated filter bandwidth Kaspersky Lab shall allocate to the Licensee an inbound traffic bandwidth in a volume that does not exceed that provided by the selected rate plan. The relevant indicators are listed in Table 4. Table 4 Rate plan Limitation (OR logical operator) Data volume Packets per second Basic Edition 0 0 Basic Edition (conditional on the purchase of an additional license) 2 Gbps 300,000 Standard Edition 2 Gbps 300,000 Advanced Edition 5 Gbps 600,000 Ultimate Edition 5 Gbps 600,000 Where the filtering system receives traffic in a volume exceeding the aforementioned characteristics, Kaspersky Lab may choose not to process such surplus volume of traffic. 6

7 6.4 Traffic filtration time covered by the tariff Kaspersky Lab undertakes to filter attacks targeting the Licensee's resource for the length of time provided by the selected rate plan. Table 5 lists the duration of traffic filtering covered by the rate plan. Table 5 Rate plan Where the duration of an attack (or several attacks) exceeds the specified time limit, the Licensee shall pay for the volume of surplus traffic against an invoice of Kaspersky Lab. 6.5 Incident response time Protection time (days per calendar month) Basic Edition 0 Standard Edition 3 Advanced Edition 3 Ultimate Edition Kaspersky DDoS Prevention Service, Extended Cover Option (1 day) No limitations 1 day 6.6 Incident resolution time Table 7 lists incident resolution times. Table 7 Non-critical Significant 6.7 Request response time Table 8 lists request response times. Table 8 Resolution time Within 3 business days Within 1 business day Response time Percentage of timely completion 80% 80% Critical Within 12 hours 80% Percentage of timely completion Non-critical 4 business hours 80% Significant 2 business hours 90% Critical 1 business hour 95% Table 6 lists incident response times. Table 6 Response time Percentage of timely completion Non-critical 4 business hours 80% Significant 2 business hours 90% Critical 1 business hour 95% 7

8 Quality Certificate for Kaspersky DDoS Prevention Software 6.8 Traffic filtering parameters Kaspersky Lab guarantees that in the process of traffic filtering during an attack, software will: Allow traffic from parties white-listed by the Licensee Block traffic from parties black-listed by the Licensee Purge the parasite component from the traffic at the level shown in Table 9 Table 9 Type of attack Average purging percentage * Average percentage of passage of legitimate requests ** 1. Illegitimate traffic to an unclaimed protocol and/or port (examples: UDP Flood, ICMP Flood) 98% 98% 2. Connection initiation over the TCP protocol (SYN-Flood) with random spoofing of the IP address of the data sender (IP-Spoof) 3. Establishment of a full-fledged TCP connection that is then reset without any data exchange inside the socket (TCP Connect Flood) 4. Denial of service / resource through an attack over the HTTP/1.0 or HTTP/1.1 protocol by sending data: 1) outside of the protocol specification; 2) within the protocol specification without following further redirection instructions (HTTP Redirect, JavaScript Redirect); 3) within the protocol specification while following further redirection instructions against protection at the level of the Turing test (captcha) 5. Denial of service / resource over the HTTPS protocol in the presence of an encryption certificate on the filtering resources 6. Denial of service / resource over the HTTPS protocol in the absence of an encryption certificate on the filtering resources 7. Traffic filtering in the presence of a large number of legitimate users of the resource with generation of traffic possessing different characteristics 98% 98% 98% 98% 98% 98% 98% 98% 80% 80% 80% 80% 8. DNS protocol attack with generation of legitimate requests 80% 80% 9. Other types of attacks 75% 75% * The purging percentage has been calculated using the following algorithm: if the IP address is malicious, the probability of it being blocked equals the percentage shown in the table after 10 minutes have elapsed from the start of attacks from this IP at the protected resource. ** The legitimate request passage percentage has been calculated using the following algorithm: if the IP address belongs to a legitimate user of the resource, the probability of its passage equals the percentage shown in the table after 10 minutes have elapsed from the start of requests from this IP to protected resource during an attack. 8

9 6.9 Continuity of software operation 6.11 Incident and anomaly resolution monitoring Kaspersky Lab undertakes to ensure uninterrupted software operation during the entire term of the Agreement. To prove software operation continuity, Kaspersky Lab shall furnish the Licensee with registration logs showing the characteristics of inbound and outbound traffic, resource response parameters, etc. at intervals of at least 5 minutes. Kaspersky Lab reserves the right to use its own technical methods of monitoring software operation continuity. Where the aforementioned registration logs lack information for a period exceeding 15 minutes, the Licensee may deem this to constitute a breach in software operation continuity. Where the loss of said data is due to technical causes and has not interrupted the continuity of software operation, Kaspersky Lab shall notify the Licensee accordingly within 30 minutes of detecting the fault Duration of attack information storage in the System Table 10 lists the durations of attack information storage in the system. Table 10 An incident can be managed by either the Licensee (i.e., the Licensee takes steps contributing to incident resolution by Kaspersky Lab) or Kaspersky Lab. An incident shall be considered to be managed by the Licensee where Kaspersky Lab has requested additional information from the Licensee or expects the Licensee to take steps to redirect traffic to the purging center. Once the Licensee has provided the requested information or performed the requisite technical measures and notified Kaspersky Lab representatives accordingly, management of the incident shall be deemed to have been handed over to Kaspersky Lab. Kaspersky Lab shall be responsible only for the time during which the incident or anomaly was managed by KL. While resolving incidents, Kaspersky Lab shall do whatever is necessary to provide timely information on the status of incidents managed by it to the Licensee according to the schedule provided in Table 11. Table 11 Non-critical Significant Critical Reporting schedule Daily (via ) Every 4 hours (via or by phone) Hourly (by phone) Rate plan Ordinary information Attack information Basic Edition 2 months Basic Edition (conditional on the purchase of an additional license) 2 months Standard Edition 2 months Advanced Edition 2 months 1 year Ultimate Edition 2 months 3 years Kaspersky DDoS Prevention Service, Logs Option, 1 year Kaspersky DDoS Prevention Service, Logs Option, 3 years 1 year 3 years 9

10 Quality Certificate for Kaspersky DDoS Prevention Software 6.12 Quality of service monitoring Kaspersky Lab shall store the following information on the registered incidents in progress and closed incidents: Total number of closed incidents Total number of incidents in progress Ordinal number of the incident and description Level of incident urgency Incident status Date and time of incident registration by Kaspersky Lab Response time relative to the specified level of service Time during which the incident was managed by the Licensee Time during which the incident was managed by Kaspersky Lab The party that is currently managing the incident (Kaspersky Lab / Licensee) 6.13 Evaluated criteria of software performance quality Parameters listed in Table 12 belong to the evaluated parameters of software performance quality. Table 12 Parameter Detection of the start of an attack Quality of traffic filtering Continuity of software operation Technical support Quality evaluation criteria Timeliness of notification about detected anomalies Percentage ratio between inbound and outbound traffic Duration of service operability, including completeness of Kaspersky Lab-furnished information about traffic statistics of the monitored resource, degree of traffic purging, and similar information Timely response to Licensee's requests and timely resolution of incidents that have arisen. Full name of the designated technical specialist on the side of Kaspersky Lab Date and time of actual incident resolution Kaspersky Lab shall furnish the Licensee with reports on closed incidents on a monthly basis. 10

11 7. Methods of evaluating the quality of software performance and technical support 7.1 Anomaly notification time Where software has detected anomalies in the Licensee's traffic, Kaspersky Lab shall notify designated employees of the Licensee within 15 minutes of detecting persistent signs of an attack. The Licensee can calculate the start time of an attack based on registration logs published by Kaspersky Lab. Table 13 lists the following degrees of quality violations in terms of this parameter. Table 13 Violated software parameter Timeliness of attack detection Degree of violation light medium severe Quantitative characteristic 30 minutes to 1 hour 1 hour to 3 hours Over 3 hours Where Kaspersky Lab has failed to ensure the availability of designated persons responsible for obtaining information, Kaspersky Lab shall not have the right to present claims over violations of this quality parameter. Blocking of traffic from parties black-listed by the Licensee has not been ensured The parameters of traffic purging to eliminate the parasite component differ from the declared parameters by more than 20% (deterioration in characteristics) 7.3 Continuity of software operation The base interval for calculating software operation continuity shall be 5 minutes. If, in the course of an attack, the following traffic purging characteristics as: Purging parameters Allowing / blocking of traffic from white-listed / black-listed senders Readiness of Kaspersky Lab to process traffic (passage of traffic through the purging center) Exceed the declared indicators for more than 15 minutes, the following degrees of quality violation in terms of this indicator are differentiated as shown in Table 14. Table 14 Violated software parameter Degree of violation light Quantitative characteristic 15 minutes to 30 minutes 7.2 Traffic filtering parameters Continuity of software operation medium 30 minutes to 1 hour The following degrees of quality violations in terms of this parameter are differentiated: severe Over 1 hour Passage of traffic from parties white-listed by the Licensee has not been ensured 8. Agreed interruptions in software availability With the Licensee's consent, Kaspersky Lab may interrupt software service for the purposes of hardware and communication link maintenance or emergency repairs. The parties agree to classify such interruptions, as shown in Table 15, as software operation in routine mode and exclude them from the time of unavailability when calculating software performance indicators. 11

12 Quality Certificate for Kaspersky DDoS Prevention Software Table 15 Item No. Item Indicators Notification of the Licensee Additional conditions 1. Maintenance work Total duration of interruptions: not to exceed 16 hours per year. Intervals between interruptions: at least 30 calendar days At least 2 calendar days prior to the start of an interruption The time of work to be coordinated with the Licensee 2. Emergency maintenance necessitated by the installation of vendor-released upgrades and/or patches of critical importance to software operability, performance, and safety The interruption time equals the actual time it takes to install upgrades and patches and run tests Directly before the start of work The Licensee must be notified about the anticipated duration of work 9. Technical support service The technical support service of Kaspersky Lab shall ensure communication between the Licensee and Kaspersky Lab and shall be responsible for receiving and processing the Licensee's requests. Receiving and processing of requests involves the following steps: Receiving the Licensee's requests, registering, classifying, and routing them to subsequent levels of support Notifying the Licensee about anomalies and other incidents detected Notifying the Licensee about the type of attack and issuing recommendations on how to counteract it (if possible) Notifying the Licensee about mass incidents / problems / operations, modifications and maintenance undertaken Monitoring the progress of work on a request, escalating the request if problems are encountered, notifying the Licensee about the progress of work, closing the request 10. Licensee's obligations to participate in incident resolution The Licensee shall: Furnish Kaspersky Lab with a list of persons (including their contact details) who are sufficiently qualified to ensure traffic routing and reception on the Licensee's side, replicate traffic and deliver it to the sensor, and persons responsible for performing the Licensee's obligations under this Agreement. In the absence of sufficiently qualified persons, the Licensee shall furnish Kaspersky Lab with information needed to arrange traffic routing and reception, as well as grant access to traffic receiving hardware with a level of privileges sufficient to configure settings of software used for receiving traffic Furnish Kaspersky Lab with a list of persons (including their contact details) who are authorized to initiate requests and tickets to Kaspersky Lab on behalf of the Licensee, respond to Kaspersky Lab queries, and take the necessary decisions in emergencies Furnish Kaspersky Lab with a list of persons (including their contact details) who are authorized to request technical support Keep an up-to-date list of resources belonging to Kaspersky Lab in accordance with the Agreement Ensure the deployment of the sensor on the Licensee's site or the mirroring of traffic from the Licensee's resource to the sensor, or transmission of flow data to KL Grant access to hardware hosted on the Licensee's site (sensor), which enables the provision of software services. 12

13 The procedure for granting access to hardware must be cleared with the Licensee depending on the network topology, security policies in place, etc. Create conditions necessary for the redirection of traffic to be purged, and ensure the redirection of such traffic to purging centers in the event of attacks Ensure reception of purged traffic by the Licensee's resources In addition, some incidents affecting system operability or interaction between system components and Licensee's hardware require modeling the conditions under which the incident arose to enable the localization of causes and troubleshooting. The Licensee shall furnish all information needed for work and assist Kaspersky Lab representatives involved in incident resolution with obtaining the information necessary for work as well as with obtaining access to the site being examined and software and/or hardware necessary to model the conditions under which the incident arose if Kaspersky Lab lacks the necessary software and/or hardware. Where an incident affects components located at the Licensee's site, the Licensee shall grant Kaspersky Lab representatives access to such components directly at the Licensee's site. 11. Procedure for interaction during software operation 11.1 Telephone Interaction over the phone is an urgent means of communication designed for informing Kaspersky Lab about critical incidents. Licensee's requests are accepted by phone at +7 (800) When submitting a request over the phone, the type of request must be specified as: «DDoS Prevention». Over the phone, the Licensee is able to receive urgent advice on steps to be taken in the event of critical incidents is the second primary means of communication with Kaspersky Lab designed for incident registration by authorized representatives of the Licensee. The Licensee's requests are accepted at: ddosprevention@kaspersky.com. The Licensee can use to: Register incidents, monitor registered incidents Receive advice on active counteraction steps 11.3 System web portal The web portal of the Kaspersky DDoS Prevention system is located at and is meant to supply the Licensee's personnel with service performance and event statistics. The Licensee can use the web portal to: Keep track of the performance of system components Analyze resource workload statistics Monitor anomalies Configure mechanisms for signaling anomaly levels achieved Notify Kaspersky Lab personnel about the decision to redirect traffic Edit white lists / black lists of addresses being filtered 11.4 Conditions of work at the Licensee's site Kaspersky Lab shall carry out a portion of work associated with the usage of software directly at the Licensee's site where a critical incident involving hardware hosted by the Licensee has been registered. The method of work (onsite or remotely) shall be determined by: Kaspersky Lab where a critical incident has been registered Licensee in other cases 13

14 Kaspersky DDoS Prevention 2012 Kaspersky Lab ZAO. All rights reserved. Registered trademarks and service marks are the property of their respective owners.

SURE 5 Zone DDoS PROTECTION SERVICE

SURE 5 Zone DDoS PROTECTION SERVICE SURE 5 Zone DDoS PROTECTION SERVICE Sure 5 Zone DDoS Protection ( the Service ) provides a solution to protect our customer s sites against Distributed Denial of Service (DDoS) attacks by analysing incoming

More information

Kaspersky DDoS Prevention

Kaspersky DDoS Prevention Kaspersky DDoS Prevention The rapid development of the online services industry and remote customer service systems forces entrepreneurs to consider how they can protect and ensure access to their resources.

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the

More information

Schedule 2i. All the terms indicated above in capital letters are defined below.

Schedule 2i. All the terms indicated above in capital letters are defined below. 1. SERVICE DESCRIPTION Interoute Transit service comprises of the provision and supply of connectivity to the Internet via the Interoute IP Network (from now on the Service ). The Service can be provided

More information

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)

More information

CloudFlare advanced DDoS protection

CloudFlare advanced DDoS protection CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Acquia Cloud Edge Protect Powered by CloudFlare

Acquia Cloud Edge Protect Powered by CloudFlare Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....

More information

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad

More information

Schedule 2s. Additional terms for Security Services. 1. Security Service Description

Schedule 2s. Additional terms for Security Services. 1. Security Service Description 1. Security Service Description Schedule 2s This Schedule describes the additional terms and conditions applicable to the following Interoute Services: 3. Security Services Fault Management Categories...

More information

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Why an Intelligent WAN Solution is Essential for Mission Critical Networks

Why an Intelligent WAN Solution is Essential for Mission Critical Networks Why an Intelligent WAN Solution is Essential for Mission Critical Networks White Paper Series WP100135 Charles Tucker Director of Marketing June 1, 2006 Abstract: Reliable Internet connectivity is now

More information

ARTICLE 4: SUPPLIER'S OBLIGATIONS

ARTICLE 4: SUPPLIER'S OBLIGATIONS SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 05/12/2013 ARTICLE 1: PURPOSE These Special Conditions supplement the So You Start General Conditions (the General Conditions

More information

Virtual Private Cloud. Service Level Agreement. Terms and Abbreviations

Virtual Private Cloud. Service Level Agreement. Terms and Abbreviations Virtual Private Cloud. Service Level Agreement Terms and Abbreviations Customer's Control Panel the web page intended for managing the Services rendered by the Executor, retaining the Customer's actual

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

Dedicated Servers (Fixed and Custom Configurations) Service Level Agreement

Dedicated Servers (Fixed and Custom Configurations) Service Level Agreement Dedicated Servers (Fixed and Custom Configurations) Service Level Agreement Terms and Abbreviations Customer's Control Panel the web page intended for managing the Services rendered by the Executor, retaining

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End

More information

Public Fixed Telecommunications Networks and Services Tariff Number B18-01

Public Fixed Telecommunications Networks and Services Tariff Number B18-01 General Tariff Information Service Provider Name Qatar Telecom (QTel) Q.S.C. License Public Fixed Telecommunications Networks and Services Tariff Number B18-01 Service Name Internet-VPN Tariff Type Business

More information

January 2015. Brennan Voice and Data Pty Ltd. Service Level Agreement

January 2015. Brennan Voice and Data Pty Ltd. Service Level Agreement January 2015 Brennan Voice and Data Pty Ltd Service Level Agreement 1. Introduction This document describes the service level commitment to Brennan Voice and Data Clients in relation to the following services

More information

Service Level Terms Inter8 Cloud Services. Service Level Terms Inter8 Cloud Services

Service Level Terms Inter8 Cloud Services. Service Level Terms Inter8 Cloud Services Date 7 July 2015 SERVICE LEVEL TERMS INTER8 CLOUD SERVICES Article 1. Definitions In these Service Level Terms ( SLT ), the following terms, indicated with a capital, whether single or plural, will have

More information

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network... Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless

More information

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc. TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ).

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). I. Service Definition. Exchange My Mail will provide Hosted Exchange and other Application Services

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

ITOPIA SERVICE LEVEL AGREEMENT

ITOPIA SERVICE LEVEL AGREEMENT ITOPIA SERVICE LEVEL AGREEMENT This Service Level Agreement ( SLA ) describes and summarizes the service level guidelines for Itopia s network services and hosted applications ( Services ). This SLA applies

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

1 Introduction. 2 Design and Functionality. 3 Client Support

1 Introduction. 2 Design and Functionality. 3 Client Support Changefirst Enterprise Service Level Agreement 1 Introduction This Service Level Agreement between Changefirst and the Client describes the support processes and services which Changefirst provides to

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

Schedule Document. Leased Lines & Ethernet Based Services. Node4 Limited 29/11/2007

Schedule Document. Leased Lines & Ethernet Based Services. Node4 Limited 29/11/2007 Schedule Document Leased Lines & Ethernet Based Services Node4 Limited 9//007 SCHEDULE Additional terms, Service Description & Service Level Agreement for Leased Lines & Ethernet Based Services. SERVICE

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Kaspersky Lab Product Support. Enterprise Support Program

Kaspersky Lab Product Support. Enterprise Support Program Kaspersky Lab Product Support Enterprise Support Program Contents 1 Definitions... 3 2 Overview... 4 3 Description... 6 4 Limitations... 11 2 1 Definitions Product(s) shall mean software product(s) of

More information

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

ServicePlans. RailComm Services and Standard Rates V007. sales@railcomm.com www.railcomm.com

ServicePlans. RailComm Services and Standard Rates V007. sales@railcomm.com www.railcomm.com RailComm 1387 Fairport Road Building 900 Fairport, NY14450 +1.585.377.3360 sales@railcomm.com www.railcomm.com ServicePlans RailComm Services and Standard Rates V007 2 RailComm Service Plans Whether you

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HOSTED IP TELEPHONY SERVICE PRODUCT TERMS

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HOSTED IP TELEPHONY SERVICE PRODUCT TERMS EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HOSTED IP TELEPHONY SERVICE PRODUCT TERMS Registered Office at: St James House Oldbury Bracknell RG12 8TH Company No: 03676297 BMI MSA

More information

Linux MDS Firewall Supplement

Linux MDS Firewall Supplement Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File

More information

How To Use Adobe Software For A Business

How To Use Adobe Software For A Business EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed

More information

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network Protecting a Corporate Network with ViPNet Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network Introduction Scope ViPNet technology protects information systems by means

More information

Exhibit E - Support & Service Definitions. v1.11 / 2015-07-03

Exhibit E - Support & Service Definitions. v1.11 / 2015-07-03 Exhibit E - Support & Service Definitions v1.11 / 2015-07-03 Introduction - Support Services Table of Contents 1 Introduction... 4 2 General Definitions... 5 2.1 Support Services... 5 2.2 2.3 License or

More information

schedule 2f additional terms for internet services

schedule 2f additional terms for internet services 1. SERVICE DESCRIPTION Interoute Internet Services comprises of the provision and supply of connectivity to the Internet via the Interoute IP Network. 2. DEFINITIONS ADSL refers to Asymmetric Digital Subscriber

More information

ARTICLE 3. CUSTOM INSTALATION FEES Ethernet Dedicated Internet Services PSA Ver. 1.5

ARTICLE 3. CUSTOM INSTALATION FEES Ethernet Dedicated Internet Services PSA Ver. 1.5 COMCAST ENTERPRISE SERVICES PRODUCT- SPECIFIC ATTACHMENT ETHERNET DEDICATED INTERNET SERVICES ATTACHMENT IDENTIFIER: Ethernet Dedicated Internet, Version 1.5 The following additional terms and conditions

More information

Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions

Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Your use of the Microsoft Hyper-V Powered by Rackspace or Microsoft Cloud Platform

More information

means the charges applied by Ancar B Technologies Limited which recur annually;

means the charges applied by Ancar B Technologies Limited which recur annually; This Service Schedule is supplemental to the Master Service Agreement Net-L1-3. CONTENTS Schedule 1 - DEFINITIONS... 1 Schedule 2 - MANAGED INTERNET ACCESS SERVICE PRODUCT INFORMATION... 3 1 MANAGED INTERNET

More information

Service Description DDoS Mitigation Service

Service Description DDoS Mitigation Service Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3

More information

SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A DEDICATED SERVER

SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A DEDICATED SERVER SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A DEDICATED SERVER Version Date 03-09-13 The Supplier provides different categories of Dedicated Server. The hardware and software configurations, and

More information

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS : DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s

More information

Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End User

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS Registered Office at: St James House Oldbury Bracknell RG12 8TH Company No: 03676297 BMI MSA Hybrid Cloud

More information

ADDITIONAL TERMS FOR VIRTUAL VOICE NETWORK SERVICES SCHEDULE 2L

ADDITIONAL TERMS FOR VIRTUAL VOICE NETWORK SERVICES SCHEDULE 2L ADDITIONAL TERMS FOR VIRTUAL VOICE NETWORK SERVICES SCHEDULE 2L CONTENTS 1 Service Description... 3 2 Definitions... 3 3 Virtual Voice Network terms... 4 4 CHARGES... 4 4.1 Charges payable by the... 4

More information

FAQ: BroadLink Multi-homing Load Balancers

FAQ: BroadLink Multi-homing Load Balancers FAQ: BroadLink Multi-homing Load Balancers BroadLink Overview Outbound Traffic Inbound Traffic Bandwidth Management Persistent Routing High Availability BroadLink Overview 1. What is BroadLink? BroadLink

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Grandstream Networks, Inc. UCM6100 Security Manual

Grandstream Networks, Inc. UCM6100 Security Manual Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL

More information

DDoS Protection on the Security Gateway

DDoS Protection on the Security Gateway DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

STATISTICS ON BOTNET-ASSISTED DDOS ATTACKS IN Q1 2015

STATISTICS ON BOTNET-ASSISTED DDOS ATTACKS IN Q1 2015 STATISTICS ON BOTNET-ASSISTED DDOS ATTACKS IN Q1 2015 www.kaspersky.com 2 CONTENTS Methodology 3 Main findings 4 Geography of attacks 5 Time variations in the number of DDoS attacks 7 Types and duration

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against

More information

SPECIAL CONDITIONS FOR KIMSUFI DEDICATED SERVER RENTAL. Latest version dated 07/11/2013

SPECIAL CONDITIONS FOR KIMSUFI DEDICATED SERVER RENTAL. Latest version dated 07/11/2013 SPECIAL CONDITIONS FOR KIMSUFI DEDICATED SERVER RENTAL ARTICLE 1: PURPOSE Latest version dated 07/11/2013 The purpose of these Special Conditions, which supplement the Kimsufi General Conditions, is to

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Additional services are also available according to your specific plan configuration.

Additional services are also available according to your specific plan configuration. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services

More information

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

MSA Enterprise 1. GENERAL TERMS AND CONDITIONS

MSA Enterprise 1. GENERAL TERMS AND CONDITIONS 1 1. GENERAL TERMS AND CONDITIONS Herein is given a list of technical support cases, in relation to which Kaspersky Lab will provide assistance to the owner of this Extended Technical Support Certificate

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

Intrado Call Handling CPE. Standard Maintenance and Support Services ( MSS Terms )

Intrado Call Handling CPE. Standard Maintenance and Support Services ( MSS Terms ) Intrado Call Handling CPE Standard Maintenance and Support Services ( MSS Terms ) These Maintenance and Support Services terms ( MSS Terms ) describe the current offerings for maintenance and support services

More information

Internet Services. Amcom. Support & Troubleshooting Guide

Internet Services. Amcom. Support & Troubleshooting Guide Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further

More information

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS

SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

COUNTY OF ORANGE, CA ATTACHMENT A STATEMENT OF WORK DEFINITIONS ATTACHMENT A STATEMENT OF WORK DEFINITIONS. for. Date TBD

COUNTY OF ORANGE, CA ATTACHMENT A STATEMENT OF WORK DEFINITIONS ATTACHMENT A STATEMENT OF WORK DEFINITIONS. for. Date TBD ATTACHMENT A STATEMENT OF WORK DEFINITIONS for COUNTY OF ORANGE, CA Date TBD This is Attachment A (Statement of Work Definitions) to the Agreement between the County of Orange, CA ( County ) and Vendor.

More information

MANAGED PBX SERVICE SCHEDULE

MANAGED PBX SERVICE SCHEDULE MANAGED PBX SERVICE SCHEDULE 1. APPLICABILITY This Service Schedule is applicable only to the COF for the purchase of Managed PBX Services which has been signed by the Customer and Neotel. 2. DEFINITIONS

More information

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider

More information

Home Based Business - Understanding Customer Database Administration Support Services

Home Based Business - Understanding Customer Database Administration Support Services 1 Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the BT Compute Service Schedule. Customer Application Monitoring and Management means the service

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015 Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,

More information

excommerce Online Systems as a service

excommerce Online Systems as a service excommerce Online Systems as a service Service plan This service plan is designed for users who wish to have support services for their dotnetnuke and/or catalook and/or XLink integration. excommerce is

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Custom Application Support Program Guide Version 3.2.0 March 02, 2015

Custom Application Support Program Guide Version 3.2.0 March 02, 2015 Custom Application Support Program Guide Version 3.2.0 March 02, 2015 Genesys Custom Application Support Program Guide CASPG100-0215 Genesys Custom Application Support Program Guide Page 2 The information

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

Transformyx Service Level Agreement

Transformyx Service Level Agreement Transformyx Service Level Agreement Transformyx provides business IT on demand. Launched with the aim of disrupting the way that organizations currently purchase, use and manage IT, Transformyx provides

More information

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B. ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK HANDBOOK VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK CONSIDERATIONS FOR SERVICE ADOPTION Version 1.0 July 2014 VerisignInc.com CONTENTS 1. WHAT IS A DDOS PROTECTION SERVICE? 3 2. HOW CAN VERISIGN

More information

ez PUBLISH PLATFORM SUBSCRIPTION SERVICES DESCRIPTION

ez PUBLISH PLATFORM SUBSCRIPTION SERVICES DESCRIPTION ez PUBLISH PLATFORM SUBSCRIPTION SERVICES DESCRIPTION 1. GENERAL The ez Publish Platform Subscription Services includes access to a range of services related to the ez Publish Platform Software and ez

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

SecurityDAM On-demand, Cloud-based DDoS Mitigation

SecurityDAM On-demand, Cloud-based DDoS Mitigation SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS

More information