IBM Vulnerability Management Service
|
|
|
- Gerald Hopkins
- 10 years ago
- Views:
Transcription
1 1. Service Overview IBM Ireland Limited Registered in Dublin: No Registered Office: Oldbrook House Service Description Pembroke Road Ballsbridge, Dublin 4. IBM Vulnerability Management Service IBM Vulnerability Management Service (called VMS ) is designed to provide a comprehensive, Webdriven vulnerability management program that provides visibility into potential exposure areas within a distributed network environment. The details of your order (e.g., the services you require, contract period, and charges) will be specified in the Order. Definitions of service-specific terminology can be found at VMS has been designed to help provide you with the tools and capabilities required to implement an effective vulnerability management program. The service may be delivered as either an external or an internal solution. If delivered as an external solution, scanning will be provided which originates at the SOC. If delivered as an internal solution, a scanning agent (called Agent ) will be deployed into the Customer s internal network to provide vulnerability management of internal Hosts which may not be directly accessible by Hosts outside of the Customer s network. The following features and capabilities are provided as part of the service. a. Web-driven interface for scan scheduling, review, and reporting; b. internal and external scanning; c. accurate and detailed vulnerability results; d. comprehensive lifecycle-based approach toward vulnerability management; e. customizable views and dynamic access to vulnerability data; f. ability to track individual assets, device criticality, and assignment of owners; g. comprehensive tool-set for workflow management and remediation tracking; h. productivity tracking of those responsible for vulnerability remediation; and i. access to research needed to quickly identify effective remediation steps. The IBM approach to vulnerability management includes six key components. j. vulnerability discovery - provides a Web-driven interface that allows Customers to schedule and launch either internal or external scans of assets within their individual environments; k. prioritization - catalogs each scanned device (i.e., asset) and allows Customers to assign business criticality ratings and match system owners to specific assets. Asset owners are notified when vulnerabilities are discovered, and are provided with a personalized view into overall program impacts on their security posture; l. remediation helps to identify vulnerabilities and assigns them to designated asset owners for review and remediation. Individual asset owners can use the Virtual-SOC to learn about a specific vulnerability and track its remediation within the enterprise. The service provides a detailed workflow, with visual queues and notifications to guide asset owners; m. dynamic protection integrates VMS with a Customer s existing IBM Managed Security Services (as applicable) to dynamically update server and network Intrusion Prevention policies with appropriate blocking responses. This capability enhances vulnerability management to provide vulnerability protection; n. verification permit the assignment to remain active until VMS verifies the patch has been effectively implemented and all attack vectors for a given vulnerability have been successfully eliminated; and o. customized reporting - provides a results-oriented view of service performance and security posture. The following table provides an overview of VMS service features. INTC /2007 Page 1 of 12
2 Table 1 - Service Features Service Features External Scanning Internal Scanning Ideal for: Identifying vulnerabilities within the network perimeter Identifying vulnerabilities across the enterprise Organization size Any Any Number of available scans Based on number of Internet protocols ( IPs ) and frequency purchased Unlimited scans of a specified set of IPs within the constraints of the platform Hardware platform required No Available policies Scans external IPs Scans internal IPs No Ranking of discovered assets Assignment of administrators to discovered assets Assign vulnerabilities for remediation Dynamic IBM Virtual Patch technology Full vulnerability remediation workflow Historical trending of vulnerability data Industry and vertical comparisons Verification of resolved vulnerabilities Integration with IBM Managed Security Services and IBM Managed Protection Services 2. IBM Responsibilities 2.1 Deployment and Initiation During deployment and initiation of internal VMS, IBM will either work with the Customer to deploy a new internal scanning Agent or begin management of an existing Agent. For external VMS, IBM will work with the Customer to enable scanning of their externally facing Hosts Project Kickoff IBM will send the Customer a welcome and conduct a kickoff call to: introduce the Customer contacts to the assigned IBM deployment specialist; set expectations; and begin to assess the Customer requirements and environment, if an internal scanning Agent will be deployed. To enable deployment of internal VMS, IBM will provide a document called Network Access Requirements, detailing how IBM will connect remotely to the Customer s network, and any specific technical requirements to enable such access. Typically, IBM will connect via standard access methods through the Internet; however, a site-to-site VPN may be used, if appropriate. INTC /2007 Page 2 of 12
3 External VMS requires only a short deployment session between the Customer and the IBM deployment specialist Assessment Data Gathering IBM will work with the Customer to help configure the Customer s profile within the Virtual-SOC. This configuration may include setup of accounts and valid IP addresses that may be scanned. Environment Assessment This section applies only to Customers who have purchased the internal scanning option of VMS. Using the provided information, IBM will work with the Customer to understand the existing Customer environment, and build a configuration for the Agent. During this assessment, IBM may make recommendations to adjust the layout of the network to improve scanning capability or otherwise enhance security. Existing Agent Assessment This section applies only to Customers who have purchased the internal scanning option of VMS. If IBM will be taking over management of an existing Agent, IBM must assess the Agent to be sure it meets certain specifications. IBM may require the Agent software or Security Content to be reinstalled, or upgraded to the most current versions in order to provide the service. Other required criteria may include the addition or removal of applications and user accounts Implementation This section applies only to Customers who have purchased the internal scanning option of VMS. Configuration at IBM For Agents purchased through IBM at the time of deployment, much of the configuration and policy setting will take place at IBM facilities. For existing Agents already in use, the Customer will have the option to ship the Agent to IBM for configuration at IBM facilities. Installation While physical installation and cabling are a Customer responsibility, IBM will provide live support, via phone and , and will assist the Customer with location of vendor documents detailing the installation procedure for the Agent. Such support must be scheduled in advance to ensure availability of a deployment specialist. At the Customer s request, physical installation may be provided by IBM Professional Security Services ( PSS ) for an additional fee. Remote Configuration When taking over management of an existing Agent, IBM will typically perform the configuration remotely. The Customer may be required to physically load media. All managed Agents will require some remote configuration, which may include the registration of the Agent with IBM Managed Security Services infrastructure Transition to SOC Once the Agent is configured, physically installed and implemented, and connected to the IBM Managed Security Services infrastructure, IBM will provide the Customer with the option of having a demonstration of the Virtual-SOC capabilities and performance of common tasks. The final step of services deployment is when the Security Operations Center ( SOC ) takes over management and support of the Agent and the relationship with the Customer. At this time, the ongoing management and support phase of the services officially begins. Typically, IBM will introduce the Customer via phone to the SOC personnel. 2.2 Ongoing Management and Support Vulnerability Management VMS is an electronic service that regularly and automatically scans Customer devices for known vulnerabilities. Each scan results in comprehensive reports that are designed to identify potential weaknesses, assess relative network risk, and provide recommendations to manage identified vulnerabilities. INTC /2007 Page 3 of 12
4 External VMS consists of remotely delivered scans which originate from IBM facilities. IBM will require the Customer to validate they are the owner of the IP address range to be scanned, prior to the initial scan of such IP address range being performed. Using this configuration, IBM can only scan static IP addresses belonging to the Customer that are publicly routable. Internal VMS provides all the benefits of vulnerability management, but is delivered by an Agent deployed inside the Customer s internal network. IBM will provide a licensed copy of IBM Internet Scanner software for the duration of the internal VMS contract Virtual-SOC The Virtual-SOC is a Web-based interface designed to enable delivery of key service details and ondemand protection solutions. The Virtual-SOC is structured to deliver a consolidated view of the Customer s overall security posture. The portal is capable of merging data from multiple geographies or technologies into a common interface, allowing for comprehensive analysis, alerting, remediation, and reporting. The Virtual-SOC provides real-time access for communications including ticket creation, security event handling, incident response, data presentation, report generation, and trend analysis. Reporting VMS is designed to provide reports that focus on the status of vulnerabilities within your enterprise, protection measures employed, security activities, security scorecard, subordinate activities and service summaries. Many of the available reports can be generated using customizable data sets and userdefined reporting periods with varying views. Users of the System The service is designed to help organizations manage vulnerability exposures across the enterprise by providing multiple individuals, from different levels within the organization, with varying levels of access to the system. a. Authorized Security Contacts Users classified as Customer security contacts will be the primary users of VMS and will have full access to the system including the ability to execute scans, generate reports, assign vulnerabilities for remediation, and apply virtual patches. IBM SOC analysts will only accept phone calls from authorized Customer security contacts. Customers may identify up to three authorized security contacts for VMS. b. Subordinates/System Administrators Users classified at this level will receive limited access to the VMS system. Subordinates/system administrators are identified by authorized Customer security contacts, and are then assigned specific devices for which they may have access. Vulnerabilities can then be assigned to these individuals for remediation once identified during the discovery process. Subsequently, subordinates/system administrators may login to the system, review and research assigned vulnerabilities and document any remediation efforts. Users at this level do not have the authority to review data or make changes outside of devices assigned directly to them. Customers may identify an unlimited number of subordinates/system administrators for the VMS service (within the constraints of the platform). c. Manager/Read Only This level of access provides managers, and those with executive oversight, full access to the VMS and its reporting components, but does not allow them to make changes to any configurations, scheduled scans, or vulnerability assignments. This profile is designed for non-technical program stakeholders. Dashboard In addition to vulnerabilities, VMS provides an overview at a glance (called Dashboard ) to deliver a snapshot of the Customer s state of security as it relates to vulnerabilities. The Dashboard provides administrators with a comprehensive overview of the threat level, current scan results, pending scan jobs, top vulnerable Hosts (i.e., assets) and other information relevant to the Customer s vulnerability management program. The Dashboard provides a single view of current program status and serves as a launch pad to other VMS features, including: scan scheduling; INTC /2007 Page 4 of 12
5 asset inventories; virtual patch application; customized reporting; security activity logs; and service configuration. Authorized Customer security contacts will have access to the entire Dashboard and all service features and functionality. Other Customer users (e.g., system administrators) will receive a more focused view that outlines vulnerabilities or assets to which they have been assigned Scanning VMS identifies network assets (e.g., servers and network devices), recording and cataloging each item, and building an association between assets and their respective vulnerabilities. VMS provides a Webdriven interface that controls scan initiation, identification of assets to be scanned, and types of scans to be conducted. After a scan is completed, electronic notifications will be delivered to the authorized Customer security contacts informing them that results are pending review. VMS provides the Customer with two distinct types of scanning which can be employed together or separately: External Scanning External scanning provides the Customer with a potential hacker s view of the network perimeter and is designed to highlight those risk exposures open to the general Internet community. External scans will identify and assess only devices with routable IP addresses. Non-routable IP addresses behind closed firewalls will not be scanned. Scans are scheduled through the Virtual-SOC and launched from the IBM secure data center environment. External scans do not require CPE, setup, or hardware/software investment. External scanning is delivered based on the number of IPs and the frequency of scanning. External scanning is purchased based on the number of IPs to be scanned over a given period of time. The Customer may purchase any number of IPs to be scanned on a weekly, monthly or quarterly basis. Each scan will subtract from the available pool of IPs regardless of whether the same or unique systems are being assessed during each scan. Available IPs will automatically refresh, based on the purchased frequency. IPs which are unused at the close of the allotted time period will be forfeited. Internal Scanning Internal scanning helps to allow the Customer to accurately assess the state of vulnerabilities within their enterprise. This type of assessment is important as a large percentage of network-based attacks (e.g., mass-propagating worms) often originate unknowingly from inside a protected or private network. Internal scans can be launched from a scanning Agent located at the Customer s premises and require the Customer to provide the appropriate hardware and operating system. An unlimited number of scans may be launched from the internal scanning Agent, based on the size of the environment and the number of IPs purchased. Internal scanning Agents can process up to 10,000 unique IPs per device. When both scanning types are used together, they help the Customer delineate which vulnerabilities are identifiable only from the outside, only from the inside, or from both locations. This information can help the Customer prioritize the vulnerabilities to be addressed Scan Policies To provide flexibility for each scheduled scan, a total of 16 different policies are available for both internal and external scanning. These 16 policies allow the Customer to assess vulnerabilities and exposures that exist across a variety of device types with varying degrees of intrusiveness. An example of such a policy is one tailored specifically for conducting assessment scans, to identify vulnerabilities on assets such as servers, desktops, routers, and switches Scheduling of Scans Scan scheduling can be accomplished 24 hours/day by 7 days/week through the Virtual-SOC. You may schedule a scan by providing the following parameters: scan name a brief alias for the scan; scan date and time scans can be executed each hour; scan retry interval number of hours before a failed scan starts again; INTC /2007 Page 5 of 12
6 policy any of the outlined policies can be selected; and scan target a predefined target range of IPs or a user-specific range. Pending scans will be displayed directly on the Dashboard, and scans may be canceled using the Cancel a Scan option from the Dashboard interface. Scans may be canceled at any time prior to their scheduled start date, and no penalties will apply Scan Results Scan results are available immediately following the successful completion of a scheduled scan. Results of each separate scan can be viewed independently through the Scan History option of the Dashboard. Cumulative changes in asset inventories and discovered vulnerabilities can be reviewed through their respective sections of the VMS system. This distributed manner of archiving and storing scan data allows authorized Customer security contacts to quickly review the results of a single scan, while also reviewing the overall state of assets and their respective vulnerabilities across the enterprise. Scan results typically include some or all of the following information: discovered assets (IPs); available services; available ports; banner information; operating systems identified; and vulnerabilities with associated severity Asset Identification and Grouping As indicated above, discovered assets will be automatically identified and cataloged into VMS. Authorized Customer security contacts will have the option to create logical groupings into which assets may be placed (e.g., Web server farm, enterprise resource planning ( ERP ) systems, and routers). Assets may exist within an unlimited number of groups to ensure that systems serving multiple functions can be organized accordingly. These groups can be used as scan targets and report datasets. Some systems have multiple IP addresses, or are referenced using a dedicated, private IP or a translated routable IP. For organizations with such systems and configurations, VMS will establish relational linkages between assets and multiple IP addresses to help ensure multiple assets are not created for devices that might be referenced by more than one IP. Linkages can be established by authorized Customer security contacts within the VMS configuration. 2.3 Prioritization and Vulnerability Assignment One of the challenges of vulnerability management is properly prioritizing which vulnerabilities should be remediated first, and tracking and recording the prioritization. VMS automatically sorts and displays vulnerable systems based on the severity of identified vulnerabilities and the business criticality of the impacted assets. The available information makes prioritizing vulnerabilities more manageable. Vulnerabilities can be assigned electronically to the appropriate subordinate/system administrator for remediation Asset Criticality VMS provides authorized Customer security contacts with the ability to assign a numeric business criticality ranking to each discovered asset. Rankings can be assigned to single or multiple assets at one time. Assigning a criticality ranking to each discovered asset allows prioritization for which vulnerabilities should be remediated first. Business criticality ratings will be stored in the VMS system and can be modified by authorized Customer security contacts at any time Assigning Vulnerabilities for Remediation VMS allows the Customer to track and distribute workload by assigning vulnerabilities directly to those responsible for fixing them. Authorized Customer security contacts can define subordinate/system administrators in the system. Defining these individuals will automatically create the appropriate logins and electronically notify the user they have been added to the system. This provides subordinate/system administrators the ability to log directly into the system to receive assigned workload (vulnerabilities). If user maintenance is required, an authorized Customer security contact will have the authority to modify login credentials, and add or delete accounts. INTC /2007 Page 6 of 12
7 After the appropriate users have been entered into the system, they can be assigned directly to discovered assets for which they hold remediation responsibility. As vulnerabilities are discovered, having system administrators associated with specific assets will help to speed the vulnerability assignment process Tracking Assigned Vulnerabilities Using the Dashboard, authorized Customer security contacts can review a summary of system administrators and their assigned vulnerabilities. For additional details regarding current assignments and historical trending, authorized Customer security contacts may also visit the View and Assign Vulnerabilities section of the VMS system. A variety of reporting options is available to allow authorized Customer security contacts to generate reports on subordinate/system administrator activity. These reports can help identify which individuals have been most productive and where additional effort may be required. 2.4 Dynamic Virtual Patching By combining VMS with the IBM Proventia Network Intrusion Prevention System ( IPS ), VMS can provide you with dynamic virtual patching capabilities. Authorized Customer security contacts can configure their service implementation to automatically or selectively request the deployment of virtual patches to Proventia Intrusion Prevention devices on networks and servers. Virtual patching helps protect vulnerable systems from attack while system administrators are applying vendor-supplied patches. Virtual patching capabilities are supported on Proventia IPS Appliances and RealSecure Server software. For virtual patching to occur, the Intrusion Prevention devices must be under full management by IBM Managed Security Services which are available for an additional fee. Virtual patching of unmanaged or third party Intrusion Prevention technology is not supported. 2.5 Vulnerability Remediation When subordinate/system administrators have been electronically notified of vulnerability assignments, these individuals will be prompted to log directly into the Virtual-SOC to review their assigned workload. Following review, users may begin researching and documenting efforts as they work towards a resolution. As progress is made, authorized Customer security contacts can follow along using the realtime review capabilities provided through the Virtual-SOC. Significant changes in vulnerability status will result in an electronic push of information to the authorized Customer security contacts Reviewing/Researching Vulnerabilities As subordinate/system administrators login to the Virtual-SOC, they will be provided with a detailed list of vulnerabilities pending review. The vulnerabilities can be reviewed in detail, including asset properties, vulnerability severity, description, impacts and required remediation steps. VMS provides the user with information required to understand specific vulnerabilities and appropriate remediation steps. Extensive reading and outside research is not required to formulate a plan for resolving a specific issue Remediation Workflow VMS provides you with a workflow designed to guide you through the remediation process. Each discovered vulnerability is designated a security lifecycle graphic that updates in real-time as remediation progress is completed. Using this tool, a subordinate/system administrator will be provided with the next step to resolve a specific vulnerability. The workflow is primarily driven by the status of the vulnerability. Such status indicates where a given vulnerability resides in the remediation lifecycle, at a given point in time. For example, the following status may be used during the remediation process: not assigned initial status, set automatically following discovery of a vulnerability; ignored indicates a given vulnerability should be ignored for the time being. This status is set manually and is not recommended; notified indicates a vulnerability has been assigned for remediation. This status is set automatically; reviewed indicates the system administrator has reviewed the vulnerability. This status is set automatically; INTC /2007 Page 7 of 12
8 pending indicates the vulnerability has been reviewed and the remediation is in progress. This item is set manually. resolved pending confirmation indicates the vulnerability is believed to be resolved and a follow-up scan is necessary to confirm. This status is set manually; and resolved indicates the vulnerability has been confirmed to no longer exist. This status is set automatically following a verification scan. The above status indicators are provided for example purposes only. Actual status indicators in the service may be modified based on your feedback or technical necessity. Vulnerability remediation typically requires disabling vulnerable services or applying software patches. Because it may be difficult to determine if a patch was applied successfully, or if a given vulnerability was resolved, VMS does not allow users to set a vulnerability status to resolved. Rather, VMS allows users to set status to resolved pending confirmation. Vulnerabilities will remain in this status until a follow-up scan is launched and the vulnerability is confirmed to no longer exist. At this point, the system will automatically set the vulnerability to resolved Managed Security and Protection Services Integration VMS provides additional capability when used in conjunction with other IBM Managed Security Services. This combination helps blend the gathered data to provide a comprehensive view of vulnerabilities as they relate to Security Incidents and escalations under the IBM Managed Intrusion Detection Service and IBM Managed Protection Services Management of Scanning Agents If Agent licenses are provided as part internal scanning of the VMS implementation, IBM will provide full management of the Agents. Management of the Agents will be facilitated through the use of Windows Terminal Services with encryption enabled. Under this configuration, IBM will retain sole administrator level access to the device. Any and all changes to the scanning application or underlying operating system will be the sole responsibility of IBM security operations analysts. The Customer may perform management of internal scanning Agents provided the Customer owns or purchases an applicable license for the Agent. The Customer must receive approval from IBM prior to making any changes to the Agent or the operating system. If approval is not received, IBM will not be held responsible for service failures related to improper scanning Agent functionality. Health and Availability Monitoring The health and performance of VMS is monitored by using a Host-based monitoring Agent (when possible) or SNMP. The devices are regularly polled by the SOC, keeping IBM security analysts informed of some potential problems as they develop. Key metrics analyzed by the monitoring Agent include: hard disk capacity (if applicable); CPU utilization; memory utilization; and process availability. In addition to system health metrics, IBM will monitor device availability. If contact with a managed device is lost, additional time-based checks will be initiated to verify a valid outage has been identified. In the event system health problems or an outage has been confirmed, a trouble ticket will be created and an IBM security analyst will be notified to begin research and investigation. The status of all system health tickets is available through the Virtual-SOC. Outage Notification If the Agent is not reachable through standard in-band means, the Customer will be notified via telephone using a predetermined escalation procedure. Following telephone escalation, IBM will begin investigating problems related to the configuration or functionality of the managed device. Application Updates Periodically, it will be necessary for IBM to install patches and software updates to improve device performance, enable additional functionality, and resolve potential application problems. The application of such patches and updates may require platform downtime or Customer assistance to complete. If required, IBM will declare a maintenance window in advance of any such updates, and the notification will clearly state the impacts of the scheduled maintenance and any Customer-specific requirements. INTC /2007 Page 8 of 12
9 Security Content Updates To help ensure that the most current threats are properly identified, IBM will update security platforms with the most current Security Content. Such Security Content, delivered in the form of new checks or signatures for the vulnerability scanner, enhances the Agent s detection capabilities. At the discretion of IBM, Security Content updates may be downloaded and installed onto the security platform at any time. Such an operation is transparent to users. Scanning Agent Troubleshooting If a scanning Agent does not perform as expected, or is identified as the potential source of a network or server-related problem, IBM will examine the Agent configuration and functionality for potential issues. Troubleshooting may consist of an offline analysis by IBM, or an active troubleshooting session between IBM and the Customer. IBM will attempt to resolve any technical issues as expediently as feasible. If the Agent is eliminated as the source of a given problem, no further troubleshooting will be performed by IBM. Data Retention and Restoration During the course of service delivery, the scanning Agent will generate a large amount of data related to discovered vulnerabilities within the customer environment. This data will be stored within the Virtual- SOC and will remain accessible online for a period of one year from the time the data enters the system. Following display on the Virtual-SOC, logs are migrated to a physical backup media such as tape or DVD. Backup media is archived in a secure, environmentally controlled facility. Archived data will be available for up to seven years from the date of log creation. At the Customer s request, IBM will submit a request for media location and retrieval. Hourly consulting fees will apply for all time spent restoring and preparing data in the Customer s requested format. All specified retention times assume an active VMS contract has been maintained for each unique event / log source. Cancellation of the service for a given event/log source, or cancellation of VMS will require IBM to delete all collected data from the affected event/log sources. 3. Customer Responsibilities While IBM will work with internal scanning Customers to deploy and implement the Agent, and IBM will manage the Agent, the Customer will be required to work with IBM in good faith and assist IBM in certain situations as requested by IBM. 3.1 Deployment and Initiation During deployment, the Customer will work with IBM to deploy a new Agent or begin management of an existing Agent, as applicable. The Customer will be required to provide and validate ownership of any IP address ranges to be scanned and must work with IBM in good faith to accurately assess the Customer s network and environment. The Customer must provide contacts within the organization, and specify an escalation path through the organization in the event that IBM must contact the Customer. The Customer must ensure that any existing Agent meets IBM specifications, and must work to meet recommendations concerning the Customer s network and network access requirements, if changes are required to ensure workable protection strategies. If IBM will be taking over management of an existing Agent, IBM may require the Agent software or Security Content to be reinstalled or upgraded to the most current versions in order to provide the service. Other required criteria may include the addition or removal of applications and user accounts. Such upgrades, additions, or removals will be the sole responsibility of the Customer. The Customer will work with IBM in good faith to bring internal scanning Agents live within committed timeframes. The Customer is responsible for assisting IBM in gaining remote access to the internal scanning Agent by configuring terminal services, as requested by the IBM deployment specialist. 3.2 Ongoing Management and Support Configuration / Change Management The Customer acknowledges that IBM is the sole party authorized to make direct system changes to the Agent when such Agent is managed by IBM. INTC /2007 Page 9 of 12
10 The Customer agrees to work in good faith to allow IBM to upgrade internal scanning Agents as new releases of the Internet scanner application become available. The Customer is required to provide advance notice of any scheduled system reboots, maintenance, or power tests that may result in temporary inaccessibility of the internal scanning Agent. In the case of hardware or OS failure of the internal scanning Agent, the Customer is responsible for all activities associated with resolution of the failure. The Customer may be required to assist in patching or upgrading of the internal scanning Agent application Server Environment / Requirements Servers with the internal scanning Agent installed must meet the most current application minimum system requirements as outlined in the vendor s product documentation. The Customer is responsible for taking appropriate measures to ensure the network in which the internal scanning Agent is installed is secure, using firewall configurations and following appropriate security practices. The Customer must provide a secure, physically controlled environment for servers on which the internal scanning Agent resides. The Customer will ensure that access control points within their respective networks allow scanning Agents to pass traffic through them in order to properly assess for vulnerabilities. The Customer will ensure the internal scanning Agent is Internet-accessible via a static IP address Software Maintenance The Customer is responsible for ensuring that valid support and maintenance are maintained for any client provided instances of Internet scanner and for any hardware platforms on which the application resides. 4. Service Level Agreements IBM SLAs establish response time objectives and countermeasures for Security Incidents resulting from VMS. The SLAs become effective when the deployment process has been completed, the device has been set to live, and support and management of the device have been successfully transitioned to the SOC. The SLA remedies are available provided the Customer meets its obligations as defined in this Service Description. 4.1 SLA Guarantees The SLA guarantees described below comprise the measured metrics for delivery of VMS. Unless explicitly stated below, no additional guarantees or warranties of any kind shall apply to services delivered under VMS. The remedies for failure to meet the SLA guarantees are specified in the section entitled SLA Remedies, below. a. Vulnerability scanning execution guarantee IBM will begin execution of a scheduled vulnerability assessment within one hour (plus or minus) of the time scheduled by the Customer (or by IBM on behalf of the Customer) and all scans will be completed without failure. This guarantee applies only to correctly configured scan requests, for devices and networks covered by a current subscription to VMS. b. Virtual Patch application guarantee IBM will implement Virtual Patch requests, received through the Virtual-SOC, within two hours of the request being entered into the system. This guarantee is based on actual time of implementation; not on the time the Customer was notified that the request was completed. This guarantee is only applicable when the requested implementation applies to a valid managed Intrusion Prevention technology under a current subscription for IBM Managed Security Services. c. Proactive system monitoring guarantee - the Customer will be notified within 15 minutes after IBM determines the Customer s managed internal scanning Agent is unreachable via standard in-band connectivity. d. Proactive Security Content update guarantee IBM will apply all new Security Content updates to the Customer s managed security platform within 72 hours from the time the Security Content update was published for general availability by the vendor. INTC /2007 Page 10 of 12
11 SLA External Scanning Internal Scanning Vulnerability scanning execution guarantee Available Available Virtual Patch application guarantee Available Available Proactive system monitoring guarantee Proactive Security Content update guarantee Not available Not available Available Available 4.2 SLA Remedies As the sole remedy for failure to meet any of the guarantees described in the section entitled SLA Guarantees, IBM will credit the Customer s account if IBM fails to meet the SLA guarantees described in the section entitled SLA Guarantees during any given calendar month. For all SLAs, the Customer may obtain no more than one credit for each SLA per day, not to exceed a total for all SLAs of 25,000), or the equivalent in local currency, in a given calendar month, as stated in the section entitled SLA Exclusions and Stipulations below. Specific SLA remedies are listed below: a. Vulnerability scanning execution remedy if IBM fails to meet this guarantee, the Customer account will be credited as follows: (1) External scans one additional (i.e., in addition to the original) scheduled scan of equal or lesser value, at no charge; or (2) Internal scans one day of the total invoiced VMS monthly fee. b. Virtual patch application remedy if IBM fails to meet this guarantee, the Customer account will be credited for one day of the total VMS monthly fee. c. Proactive system monitoring and proactive Security Content update remedies - if IBM fails to meet either of these guarantees, the Customer account will be credited for one day of the total VMS monthly fee. Table 3 - SLAs and Remedies Summary Remedies for VMS Service Level Agreements External Scans Internal Scans Vulnerability scanning execution guarantee Virtual Patch application guarantee Proactive system monitoring guarantee Proactive Security Content update guarantee Credit of 1 additional scan, or 1 day of the monthly fee for VMS, as applicable. Credit of 1 day of the monthly fee for VMS Not available Not available Credit of 1 day of the monthly fee for VMS 4.3 SLA Exclusions and Stipulations Customer Contact Information Multiple SLAs require IBM to provide notification to the designated Customer contact after certain events occur. In the case of such an event, the Customer is solely responsible for providing IBM with accurate and current contact information for the designated contact(s). The current contact information on record is available to authorized contacts through the Virtual-SOC. IBM will be relieved of its obligations under these SLAs if IBM contact information is out of date or inaccurate due to Customer action or omission. INTC /2007 Page 11 of 12
12 4.3.2 Customer Network/Server Change Notifications The Customer is responsible for providing IBM advance notice regarding any network or server changes to the firewall environment. If the event advance notice cannot be provided, the Customer is required to provide IBM with notification of changes within seven calendar days of said network or server changes. Notification is completed by the submission or update of a critical server ticket through the Virtual-SOC. If the Customer fails to notify IBM as stated above, all SLA remedies are considered null and void Maximum Penalties/Remedies Payable to Customer The total SLA credits (called remedies ) provided by VMS, described in the sections entitled SLA Guarantees and SLA Remedies above, will not exceed the service fees for one calendar month Network Traffic Applicable to SLAs Certain SLAs focus on the prevention, identification and escalation of Security Incidents. These SLAs assume that traffic has successfully reached the firewall and therefore the firewall has the ability to process the traffic against the installed policy and generate a logged event. Traffic that does not logically or electronically pass through a firewall, or that does not generate a logged event, is not covered under these SLAs SLA Compliance and Reporting SLA compliance and the associated remedies are based on fully functional network environments, Internet and circuit connectivity, firewalls, and properly configured servers. If SLA compliance failure is caused by CPE hardware or software (including any and all Agents), all SLA remedies are considered null and void. IBM will provide SLA compliance reporting through the Virtual-SOC Testing of Monitoring and Response Capabilities The Customer may test IBM monitoring and response capabilities by staging simulated or actual reconnaissance activity, system or network attacks, and/or system compromises. These activities may be initiated directly by the Customer or by a contracted third party with no advance notice to IBM. SLAs will not apply during the period of such staged activities, and remedies will not be payable if the associated guarantee(s) are not met. 5. Service Level Objectives IBM service level objectives (called SLOs ) establish nonbinding objectives for the provision of certain features of MPS for Networks Select. The SLOs become effective when the deployment process has been completed, the device has been set to live, and support and management of the device have been successfully transitioned to the SOC. IBM reserves the right to modify these SLOs with 30 days prior written notice. a. Virtual-SOC IBM will provide a 99.9% accessibility objective for the Virtual-SOC outside of the times detailed in the section entitled Scheduled and Emergency Portal Maintenance. b. Internet Emergency In the event IBM declares an Internet emergency, it is IBM s objective to notify the Customer s specified points of contact via within 15 minutes of emergency declaration. This notification will include an incident tracking number, telephone bridge number, and the time that IBM will conduct a situation briefing. During declared Internet emergencies, IBM will provide a live telephone-conference situation briefing and summarized designed to provide information that the Customer can use to protect their organization. Situation briefings following the onset of an Internet emergency will supersede any requirement for IBM to provide Customer-specific escalations for events directly related to the declared Internet emergency. IBM will communicate all other priority level incidents, during an Internet emergency, via automated systems such as , pager and voice mail. Standard escalation practices will resume upon conclusion of the stated Internet emergency. Termination of an emergency state is marked by a decrease in the AlertCon level to AlertCon 2, or an notification delivered to an authorized Customer security contact. 6. Other Terms and Conditions IBM reserves the right to modify the terms of this Service Description, including the SLAs, with 30 days prior written notice. INTC /2007 Page 12 of 12
IBM Managed Security Services for Network Intrusion Detection and Intrusion Prevention
Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. 1. Scope of Services IBM Managed Security Services for
IBM Managed Security Services for Network Firewalls
Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. 1. Scope of Services IBM Managed Security Services for
IBM Managed Security Services for Security Event and Log Management
Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. IBM Managed Security Services for Security Event and
Managed Protection Services for Networks - Standard
Service Description 1. Scope of Services Managed Protection Services for Networks - Standard IBM Managed Protection Services for Networks Standard (called MPS for Networks Standard ) is designed to provide
IBM Managed Security Services for Unified Threat Management
Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4 IBM Managed Security Services for Unified Threat Management
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
3.1 Security Operations Centers. 3.2 Portal. 3.3 Services Contacts
Services Description IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) IBM Managed Security Services (Cloud Computing)
Services Description IBM Infrastructure Security Services - Unified Threat Management - Select
Services Description IBM Infrastructure Security Services - Unified Threat Management - Select IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth,
How To Use Ibm Managed Security Services (Cloud Computing) On A Pc Or Macbook Or Ipa (For Pc) On An Ipa Or Ipam (For Macbook) On Your Pc Or Ipom (For Ipa) On
IBM Managed Security Services (Cloud Computing) - Hosted Security Event and Log Management - Standard Z125-8477-01 11-2010 Page 1 of 19 Table of Contents 1. Scope of Services... 3 2. Definitions... 3 3.
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Current IBAT Endorsed Services
Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network
Der Weg, wie die Verantwortung getragen werden kann!
Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
Appendix D to DIR Contract No. DIR-SDD-2102. SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for <DIR CUSTOMER> END USER SERVICES
Appendix D to DIR Contract No. DIR-SDD-2102 SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for END USER SERVICES TABLE OF CONTENTS 1. Introduction... 3 2. Term of SOW...
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection
The remedies set forth in this SLA are your sole and exclusive remedies for any failure of the service.
(SLA) The remedies set forth in this SLA are your sole and exclusive remedies for any failure of the service. Network Internal Network The internal network includes cables, switches, routers, and firewalls
Statement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Schedule 2Z Virtual Servers, Firewalls and Load Balancers
Schedule 2Z Virtual Servers, Firewalls and Load Balancers Definitions Additional Charges means the charges payable in accordance with this schedule. Customer Contact Centre means Interoute s Incident management
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.
SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010
SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com
Contents Scope of this Document... 2 Product Overview... 2 Virtual Data Centre and VDC Dedicated Infrastructure... 2 Service Levels... 3 Severity and Support Response Times... 4 On-boarding... 5 Incident
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
NetAid Services NETENRICH. Service at a Glance. IT as a Service Offering from NetEnrich. Delivering IT as a Service
Service at a Glance The NetAid service focus goes beyond mere monitoring of network infrastructure to preventative maintenance and proactive intervention. This could be a solution for IT managers who want
Spyders Managed Security Services
Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built
Customized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
Sample Vulnerability Management Policy
Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director
Service Description IBM Infrastructure Security Services firewall management - managed VPN concentrator
IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) Service Description IBM Infrastructure Security Services firewall
Hosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
Data Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013
MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
Managed Security Services Portfolio
Managed Security Services Portfolio Managed Security Services Professional Services Security Hardware and Software What is on the truck IBM ISS Agenda An introduction and statement of capability Virtual
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
Statement of Service. Enterprise Services - WATCH MySQL Database. Customer. MANAGE Services for MySQL
Statement of Service Enterprise Services - WATCH MySQL Database Customer 1 TABLE OF CONTENTS 1.0 Introduction... 5 2.0 Engagement overview & scope... 5 3.0 Detailed Scope... 6 3.1 24/7 Monitoring and Alerting...
Information Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
ITIL Roles Descriptions
ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test
Statement of Service Enterprise Services - MANAGE Microsoft IIS
Statement of Service Enterprise Services - MANAGE Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint
Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint CUSTOMER Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and
Cisco Unified Communications Remote Management Services
Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco
Network Monitoring and Management Services: Standard Operating Procedures
Network Monitoring and Management Services: Standard Operating Procedures September 17, 2013 TABLE OF CONTENTS Purpose... 2 Contacts... 2 Standard Operating Procedures... 3 Hours of Coverage... 3 Contacting
Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007
Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232
PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
Empowering the Enterprise Through Unified Communications & Managed Services Solutions
Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can
At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS
HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for
Statement of Service Enterprise Services - AID Servers: Windows/Linux/Unix Network Infrastructure: Switches/Routers/Firewall/Wireless Access
Statement of Service Enterprise Services - AID Servers: Windows/Linux/Unix Network Infrastructure: Switches/Routers/Firewall/Wireless Access Customer Proprietary Rights The information in this document
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011
Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011 "You" and "your" refers to the individual or entity that has ordered Advanced Customer Services from Oracle or an authorized distributor.
HOSTING SERVICES AGREEMENT
HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule
SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division
Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division 1/9 1. Executive Summary This Service Level Agreement ( SLA ) is between Computing
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day
70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION
GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please
MANAGED PBX SERVICE SCHEDULE
MANAGED PBX SERVICE SCHEDULE 1. APPLICABILITY This Service Schedule is applicable only to the COF for the purchase of Managed PBX Services which has been signed by the Customer and Neotel. 2. DEFINITIONS
CSC BizCloud VPE Service Offering Summary. CSC i
Table of Contents OVERVIEW... 1 BIZCLOUD VPE SOLUTION SUMMARY... 1 BIZCLOUD VPE INFRASTRUCTURE... 1 Hardware and Virtualization Layer... 2 Compute Components... 2 Storage 2 CSC SUPPORT FOR THE BIZCLOUD
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
VMware Performance and Capacity Management Accelerator Service
AT A GLANCE The VMware Performance and Capacity Management Accelerator Service rapidly deploys a performance management, capacity optimization, and log management solution focused on a limited predefined
IBM Infrastructure Security Services Managed Security Information and Event Management Service Description
IBM Infrastructure Security Services Managed Security Information and Event Management Service Description Z126-6526-SSA-1 04-2014 Page 1 of 34 Table of Contents 1.0 Scope of Services... 5 2.0 Definitions...
SERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
How To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
Proactive. Professional. IT Support and Remote Network Monitoring.
Proactive. Professional. IT Support and Remote Network Monitoring. Watching Your Greatest Asset with the Latest Technology. Focus on your Business. We ll focus on your IT. Recent business trends coupled
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
SERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT Cloud Server This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Intermedia.Net, Inc. ( Intermedia
IBM Internet Security Systems products and services
Delivering preemptive security products and services IBM Internet Security Systems products and services Highlights Helps protect critical assets and reduce costs by preempting online threats Helps secure
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement
Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au [email protected]
Attachment for IBM Internet Security Systems Products and Services
IBM Customer Agreement IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. Attachment for IBM Internet Security Systems Products
IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Improving. Summary. gathered from. research, and. Burnout of. Whitepaper
Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level
Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution
The World s Most Widely Installed Help Desk and Asset Management Solution Key Benefits Easy to use! Gain full control of your IT assets, hardware and software Simplify software license management Save
