White Paper. Software as a Service by Yardi. Secure, seamless hosting and support

Size: px
Start display at page:

Download "White Paper. Software as a Service by Yardi. Secure, seamless hosting and support"

Transcription

1 White Paper Software as a Service by Yardi Secure, seamless hosting and support Yardi, the Yardi logo, and the names of Yardi products and services are either registered trademarks or trademarks of Yardi Systems, Inc. Other product and company names mentioned herein are the trademarks of their respective owners. Copyright Yardi Systems, Inc., All rights reserved. All technical specifications are subject to change. Yardi Systems, Inc. 430 South Fairview Avenue Santa Barbara, California

2 Why Software as a Service? In the Software as a Service (SaaS) delivery model, users access software hosted by a provider over the Internet. SaaS is now the delivery model of choice in all industries, as web-based services and serviceoriented architecture become more sophisticated. In light of the growing capabilities and associated complexity new software offers, SaaS enables organizations to use leading-edge software without the complex burden of hosting it themselves. The same is true for the real estate industry. The SaaS model continues to grow in popularity because of the benefits it offers over self-hosting for real estate managers, owners, and investors who rely on technology to run their business, such as:» Easier application and data administration» Tighter security and better performance» Decreased IT costs» More expedient implementation and more effective technical support» Option for automatic updates or ability to determine when upgrades are applied» Easy, seamless addition of ancillary products and new features By selecting SaaS technology platforms, real estate organizations can focus on their core business and dedicate internal IT staff to innovation and business support. A SaaS provider s ongoing support, highavailability infrastructure, and business continuity services all facilitate more efficiency and higher user productivity, which leads to streamlined operations and ultimately enhances the bottom line. Because a SaaS provider can more easily build out the platform to encompass the real estate business, companies gain the option of consolidating on a single solution stack, which minimizes vendors and creates even more efficiency. Ultimately, these combined benefits allow a company to be more competitive in the marketplace. Yardi delivers software under the SaaS model, supported by the dedicated, in-house Yardi Cloud Services team. We began offering cloud-based solutions in 2000, when we hosted 20 corporate clients. As of 2015, we host more than 4,500 clients via a global data center network. We offer deployment options tailored to each client s organizational needs. Key benefits include: Support and Implementation» SSAE 16-audited hosting operations and data centers» 24-hour IT support working closely with Yardi application support and development» Reduced internal staffing needs and costs to implement, maintain, and support system» Ongoing server monitoring and maintenance» Protection against outdated technology» A support team with more than 15 years of experience hosting Yardi applications for clients Accessibility» Easier administration and standardization across users» 24/7 accessibility from anywhere with an Internet connection» Real-time, centralized processing and reporting on all properties in the portfolio» Scalability to add and remove users and functionality as needed 2

3 Security» Sarbanes Oxley-compliant controls» Dedicated databases and custom reports for each client» 24-hour monitoring of server operations and data centers» TLS encryption over the Internet» Multiple firewalls and an intrusion prevention system» Anti-virus, anti-malware, and data loss prevention software» Seismically braced server racks» On-premises security personnel and continuous video surveillance» Screening of all people who enter and exit data centers Redundancy and Uptime» Guaranteed 99.5% availability» Redundant hard drives, servers, network clusters, and network devices» Ongoing and nightly backups and off-site transfer of all data» Built-in disaster recovery to a remote recovery data center» Backup battery power and standby generators with automatic failover» Redundant heating, ventilation, and air conditioning» Temperature monitoring, fire detection, and fire suppression systems» Multiple Internet service providers at each data center Yardi SaaS For companies with limited internal IT resources, Yardi SaaS offers cost-effective access to a secure system with skilled application support and 24-hour monitoring, backups, and disaster recovery. Yardi manages ongoing system updates and installs them automatically after 60 days notice. Clients share an installation of the application, but they have their own database and custom reports. We preconfigure environments using internal best practices to optimize security and performance. This expedited deployment meets most business requirements, but clients can subsequently tailor the system to their needs. They have access to a single chart of accounts, as well as to all standard Yardi interfaces. Clients pay no startup fees and receive unlimited application support through a single point of contact (SPOC). Requests for custom programming (CPRs), reports, and script writing are quoted and billed at the applicable hourly rate. Yardi SaaS is ideal for privately held companies managing assets in the United States and Canada. Typical clients manage portfolios of fewer than 5,000 residential units or 1,000 commercial leases. Key Benefits» No user startup costs» Best practices-based pre-configuration» Rapid implementation and deployment (typically six to 12 weeks)» Unlimited application support through SPOC» Automatic product updates twice a year with 60 days notice 3

4 Yardi SaaS Select Yardi SaaS Select clients can control and modify key aspects of the system while benefiting from Yardi s site and server management and disaster recovery services. Clients have a dedicated application installation, determine their own software update schedules, and can use multiple charts of accounts. Yardi hosts the software in a shared network environment optimized for performance and security. Dedicated virtual servers and premium disaster recovery are available for an additional fee. Yardi SaaS Select accommodates a wide variety of client needs. It is an excellent choice for medium to large businesses, publicly traded organizations, investment managers, and government agencies. Medium-sized property managers may choose this model to gain additional flexibility. Key Benefits» Control over software upgrades and updates» Less demand on internal IT resources than self-hosting» Optional single sign-on via SAML 2.0 identity provider Yardi Private Cloud Yardi Private Cloud clients have their own database and application as well as VPN connectivity to the Yardi Cloud. This deployment model includes dedicated virtual servers throughout. Yardi manages and maintains Yardi Voyager servers, but clients can manage their own web and database servers to run non-yardi applications in their Private Cloud. Effectively replicating a self-hosted environment, this option offers superior hardware and 24/7 service. Yardi Private Cloud is appropriate for large, global, or publicly traded organizations, investment managers, and government agencies with complex control needs. Organizations looking to replace an internal data center that hosts multiple business applications can benefit from Yardi s infrastructure and seamless Yardi Voyager support. Key Benefits» Option to use third-party applications on client-managed servers» Virtual Private Network (VPN) tunneling and vlan for added security Infrastructure IT Staff Crucial to the success of our SaaS platform is the Yardi Cloud Services team. Our growing team of more than 100 Yardi professionals ensures rotating 24-hour coverage of Yardi s data centers. Clients receive 24/7 technical assistance via our hosting hotline. The team also supports, maintains, and monitors application servers, database servers, and the network. Hardware and Software Yardi hosting uses Dell hardware in combination with multiple firewalls, hardware load balancing, and the latest Yardi-qualified versions of Microsoft IIS (Internet Information Services), RDP, Windows 4

5 Server, and SQL Server. All hardware and software runs parallel, providing 24-hour data access in a high-availability environment. To access their Yardi software, users only need a device with an Internet connection and browser. Routine Maintenance Yardi hosting staff monitors updates for all software and hardware used in the cloud environment. We implement these patches as follows:» Validate the patch in a test environment» Implement the patch in a limited beta environment (with management approval)» Apply the patch to production environments on a rotating basis (with management approval) Service Level Goals Yardi hosting operates under the following service level benchmarks: Site Availability Metric Goal Network Availability» LAN» WAN (ISP access) Network uptime 99.5% System Availability System uptime 99.5%» Operating systems» Servers» Storage devices» Switches» Load balancers» Routers» Firewalls Application Availability Application uptime 99.5%» Voyager» Orion» Beacon» Point2 products» PropertyShark» RENTCafé To meet service level goals, we use specialized tools to track performance-related statistics, including memory utilization, CPU, and disk space. If acceptable performance parameters (as defined in the Service Level Agreement) are ever not met, a wireless alert notifies the appropriate team member. As an additional failsafe, we perform weekly accessibility testing. Partners To ensure redundancy and minimize risk, we partner with carefully selected providers of data center space, such as CenturyLink (formerly Savvis) and SunGard. We replicate data stored at any of our active centers automatically at a regional sister site, so any corrupted or destroyed data at an active site can be restored by transferring a copy from the standby site over the network. 5

6 Security Comprehensive security features and procedures safeguard Yardi clients data. Site security at data centers includes on-premises security personnel, continuous video surveillance, screening of all people entering or exiting the premises, seismically braced server racks, high-tech fire suppression systems, and round-the-clock monitoring of server operations. In addition, we contract with third-party security experts to perform penetration tests of the network and application. Our security model includes the following layers:» Transport Layer Security (TLS). Data sent over the Internet is always encrypted.» Intrusion Prevention Systems and Multiple Firewalls. These control the type of information that is transmitted and received by data center servers. In 2015 we are enhancing our security with next-generation and web application firewalls as well as data loss prevention software.» Virus and Malware Protection. Real-time anti-virus and anti-malware software safeguards all Yardi servers.» Active Directory Security. This ensures that all users have access only to their organization s specific applications. Folder access is based on company-defined permissions.» Database Authentication and Name Encryption. The system authenticates any attempt to log in to the database server. Database names are encrypted to ensure client anonymity. File-level encryption via Transparent Data Encryption (TDE) is available in 2015.» User-Defined Access. Your system administrator can authorize users from within the program to access program features and reports and can define idle periods for session timeouts.» User-Defined Password Expiration. Your organization s system administrator can define how often system passwords must be changed to conform to internal protocol. 6

7 Sarbanes-Oxley For clients who require tighter controls, we have implemented multiple processes to ensure data integrity. Many of these aid clients in fulfilling the stated objective of the Sarbanes-Oxley Act, to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws. Every Yardi data center has, at a minimum, the following controls in place:» Co-location of client data at a SSAE 16-audited facility» On-premises security personnel» Continuous video surveillance» Screening of all people entering/exiting the premises Additional internal Yardi controls available to Sarbanes-Oxley-obligated clients include:» Requiring written client approval to implement any change to the production environment» Stringent controls governing user access to client data» Monitoring and reporting on client custom files» Segregation of Yardi Cloud Services personnel job functions to ensure data integrity» SSAE 16 service auditor s reports An additional fee may apply for certain levels of data protection. Redundancy Site and Network Redundancy Backup generators at each data center ensure uninterrupted power supply (UPS) in the event of power failures. Similarly, data centers have redundant heating, ventilation, and air conditioning (HVAC) so that hardware failure will not compromise the controlled server environment essential for optimal system performance. In addition, multiple tier one carriers and Border Gateway Protocol (BGP) connectivity ensure uninterrupted Internet access for each data center. System Backups We store applications and linked files on redundant arrays of independent disks (RAID) and replicate every database on a separate hard drive, which, in turn, is replicated on a server. Multiple independent network clusters provide another layer of redundancy. We replicate client databases with a high level of redundancy for security, integrity, and availability. Each client s database is replicated in real time to a parallel database server with automatic failover capabilities. Incremental transactional backups allow for point-in-time database restores. Optional backup encryption is available. We make complete backups every night and place them on a secure FTP server, from which clients can authorize an internal user to download these backups. Storage media backups are kept in a secure, off-site location whose security is reviewed annually at a minimum. 7

8 Business Continuity Plan Yardi replicates transactions and default paths for every live client database to a designated standby server at a geographically remote sister center, using a secure VPN connection. Our recovery point objective (RPO) in case of a major incident is two hours. We will restore client data within eight hours; this recovery time objective (RTO) can be reduced to four hours for an additional fee. Scalability A key benefit of our SaaS platform is the ease with which clients can increase processing capacity as their business grows. Our data centers maintain excess capacity at all times, so clients can add users, properties, and functionality quickly as demands increase. No matter how rapidly our clients grow, there are always enough servers on the Yardi network to meet their needs. Conversely, if clients ever need to scale back their operations, they can do so without suffering a loss of investment in unused software and hardware. Centralized Processing Another major benefit of Yardi hosting lies in its centralized database and real-time processing. Yardi s seamless integration of client data with single-stack property, investment management, and financial reporting applications is the ideal solution for a mobile or distributed workforce. Authorized remote users can access up-to-the-minute reporting and post real-time transactions for an entire portfolio. In effect, Yardi hosting lets you run your business as if all of your offices were under one roof, increasing your organization s efficiency and profitability. Client Requirements The following are minimum specifications for users accessing Yardi Voyager 7S as of February Please see for full details.» Operating System. Microsoft Windows Vista Business or Ultimate, 7, 8, or 8.1; or Apple OS X 10.6 or later; or Apple ios 5 or later; or Android 3 or later» PC Processors. Intel Dual Core, Intel Pentium, AMD, or compatible, 1 GHz or faster» PC Memory. 2 GB RAM» Network. Internet connection, 100 Kbps/user 8

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

Perceptive Software Platform Services

Perceptive Software Platform Services Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

IT SERVICE MANAGEMENT FAQ

IT SERVICE MANAGEMENT FAQ IT SERVICE MANAGEMENT FAQ Version: 1.3 Date: February 2011 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Data Stewardship... 4 2.1 Where is the data stored?... 4 2.2 Who controls the data?... 4 2.2

More information

We look beyond IT. Cloud Offerings

We look beyond IT. Cloud Offerings Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres.

SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. SafeMail April 2015 Secure cloud solutions with guaranteed UK data sovereignty. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. Detailing the

More information

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Your Place or Ours Why Trust Your Network to SymQuest? SymQuest is an industry leader with a national reputation for service excellence

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

PROMAPP TECHNICAL INFORMATION

PROMAPP TECHNICAL INFORMATION Promapp Software Architecture Promapp is designed in accordance with Microsoft best practices, developed with the Microsoft.net framework and uses a Microsoft SQL database. The software architecture is

More information

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4

More information

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved.

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved. KASEYA CLOUD SOLUTION CATALOG 2016 Q1 UPDATED & EFFECTIVE AS OF: February 1, 2016 Kaseya Catalog - 1 - Overview of the Kaseya Cloud Subscription Solutions The Kaseya Cloud solutions are designed to meet

More information

Itron Cloud Services Offering

Itron Cloud Services Offering Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...

More information

Logicalis Enterprise Cloud Frequently Asked Questions

Logicalis Enterprise Cloud Frequently Asked Questions Logicalis Enterprise Cloud Frequently Asked Questions Getting Started What is the Logicalis Enterprise Cloud and why is it a great solution? The Logicalis Enterprise Cloud (LEC) is a shared computing environment

More information

Delphi 2015 SP1-AP1 System Requirements

Delphi 2015 SP1-AP1 System Requirements Delphi 2015 SP1-AP1 System Requirements Revision 1.2 Newmarket International Inc. July 24,2015 newmarketinc.com Copyright 2015 Newmarket International, Inc., an Amadeus company. All rights reserved. This

More information

Infrastructure as a Service (IaaS) Dancik International and Peak 10

Infrastructure as a Service (IaaS) Dancik International and Peak 10 Infrastructure as a Service (IaaS) Dancik International and Peak 10 Infrastructure as a Service Monty Blight, Peak 10 Data Center & Network Services Cloud Services Managed Services Agenda 1. Who is Peak

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

Table of Contents. CSC CloudCompute Service Description Summary CSC 1 Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...

More information

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink

More information

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops January 2015 Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops Executive Summary Physical desktop and notebook computer infrastructures no longer make sense for the corporate

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects

More information

SAS 70 Type II Audits

SAS 70 Type II Audits Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls

More information

Security, trust and assurance

Security, trust and assurance Data sheet Security, trust and assurance A closer look at Projectplace safeguards Security: Projectplace protects every bit of your data Trust: Privacy is not dead at Projectplace, your data is yours Assurance:

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

Release Notes. Cloud Attached Storage 2.5.32

Release Notes. Cloud Attached Storage 2.5.32 Release Notes Cloud Attached Storage 2.5.32 January 2011 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

The Elite Workforce Management Solution. Driven by People and Technology

The Elite Workforce Management Solution. Driven by People and Technology The Elite Workforce Management Solution Driven by People and Technology Driven by People and Technology For state-of-the-art technology, leading-edge interfaces, and world-class support, NOVAtime 4000

More information

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

Xerox Digital Alternatives Security and Evaluation Guide. May 2015 Version 1.1

Xerox Digital Alternatives Security and Evaluation Guide. May 2015 Version 1.1 Xerox Digital Alternatives Security and Evaluation Guide May 2015 Version 1.1 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and CompleteView are trademarks of Xerox Corporation

More information

CSC BizCloud VPE Service Offering Summary. CSC i

CSC BizCloud VPE Service Offering Summary. CSC i Table of Contents OVERVIEW... 1 BIZCLOUD VPE SOLUTION SUMMARY... 1 BIZCLOUD VPE INFRASTRUCTURE... 1 Hardware and Virtualization Layer... 2 Compute Components... 2 Storage 2 CSC SUPPORT FOR THE BIZCLOUD

More information

611 Tradewind Dr. Suite 100, Ancaster ON, L9G 4V5 (905) 304-1775 ext 244 [email protected]

611 Tradewind Dr. Suite 100, Ancaster ON, L9G 4V5 (905) 304-1775 ext 244 services@audcomp.com Connecting To The Cloud Is Easier Than You Think Audcomp Cloud Services can bring your organization into the cloud. We provide a secure reliable medium to maximize your uptime, allowing you to focus on

More information

Cherwell Software Hosted Environment. www.creekpointe.com [email protected] 864.297.4959 +1 800.613.1426

Cherwell Software Hosted Environment. www.creekpointe.com info@creekpointe.com 864.297.4959 +1 800.613.1426 Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.

More information

The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers

The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers New levels of integration and capabilities provide the foundation for building more successful businesses with this new infrastructure

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

SNAP WEBHOST SECURITY POLICY

SNAP WEBHOST SECURITY POLICY SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

<cloud> Secure Hosting Services

<cloud> Secure Hosting Services Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Library Recovery Center

Library Recovery Center Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery

More information

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

One Solution for Real-Time Data protection, Disaster Recovery & Migration

One Solution for Real-Time Data protection, Disaster Recovery & Migration One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder

More information

DEDICATED MANAGED SERVER PROGRAM

DEDICATED MANAGED SERVER PROGRAM DEDICATED MANAGED SERVER PROGRAM At Dynamic, we understand the broad spectrum of issues that come with purchasing and managing your own hardware and connectivity. They can become costly and labor intensive

More information

Business process efficiency is improved with task management, alerts, notifications and automated process workflows.

Business process efficiency is improved with task management, alerts, notifications and automated process workflows. UNCLASSIFIED 23/02/2015 v3.3 Cobweb Hosted SharePoint 3.0 Service Description Cobweb Hosted SharePoint is a web-based document collaboration tool that helps you maximise productivity in a truly flexible,

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

Data Storage That Looks at Business the Way You Do. Up. cloud

Data Storage That Looks at Business the Way You Do. Up. cloud Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

Delphi+ System Requirements

Delphi+ System Requirements Delphi+ System Requirements Revision 1.1 Newmarket International, Inc. October 24, 2013 Delphi+ System Requirements Users Up to 15 Up to 25 Up to 50 Up to 90 Up to 200 Over 200 Minimum 2008 Server Hardware

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

YARDI Investment Suite. Innovative Solutions to Enhance Investor Value

YARDI Investment Suite. Innovative Solutions to Enhance Investor Value YARDI Investment Suite Innovative Solutions to Enhance Investor Value Investor Value is More Than Just Returns At Yardi we understand that meeting client expectations goes far beyond providing investment

More information

MaaS360 Mobile Service

MaaS360 Mobile Service Services > Overview MaaS360 Mobile Service Go Mobile! Everything for mobile work - visibility, control, easy mobile connectivity, management tools and security - all in one economical, hosted solution.

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev

WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev WINDOWS SERVER SMALL BUSINESS SOLUTIONS Name: Marko Drev SMB Windows Server Family SOLUTION SERVERS TRADITIONAL SERVERS Complete server platform, integrated and optimized Customizable Server platform for

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

How To Host A Website On A Server At Zen Internet

How To Host A Website On A Server At Zen Internet Hosting Hosting Solutions Whether you need a reliable home for your website or a more bespoke solution, we ll provide you with technically superior hosting, backed by a personal approach to service and

More information

Cloud Hosting. Quick Guide 7/30/15. 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved.

Cloud Hosting. Quick Guide 7/30/15. 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. Cloud Hosting Quick Guide 7/30/15 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Cloud Hosting Service Positioning INCREASE AGIILTY, REDUCE COMPLEXITY & COST

More information

SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD SERVICE (SINGTEL IAAS)

SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD SERVICE (SINGTEL IAAS) SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD SERVICE (SINGTEL IAAS) SingTel Managed Cloud Service delivers greater flexibility, security, cost efficiency and convenience. Looking for a way to reap

More information

OVERVIEW. IQmedia Networks Technical Brief

OVERVIEW. IQmedia Networks Technical Brief IQmedia Networks Technical Brief From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Modern Pharmacy IT. R x IT as a service. Kodiak service summary. Service features. Hosted Framework. Hosted DocuTrack

Modern Pharmacy IT. R x IT as a service. Kodiak service summary. Service features. Hosted Framework. Hosted DocuTrack Modern Pharmacy IT R x IT as a service Modern specialty pharmacies face a wide and deepening range of IT challenges. Unlike skilled nursing facilities (SNF), with protected health information (PHI) access

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Powering the Cloud Desktop: OS33 Data Centers

Powering the Cloud Desktop: OS33 Data Centers OS33 Data Centers [email protected] (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets

More information

Compulink Advantage Online TM

Compulink Advantage Online TM Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved

More information

HP ProLiant Storage Server family. Radically simple storage

HP ProLiant Storage Server family. Radically simple storage HP ProLiant Storage Server family Radically simple storage The HP ProLiant Storage Server family delivers affordable, easy-to-use network attached storage (NAS) solutions that simplify storage management

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive. SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: [email protected] Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile Reform PDC Document Workflow Solution Streamline capture and distribution intuitive lexible mobile Reform PDC Innovation and convenience to maximize efficiency. Your organization is unique so is its document

More information

Making the leap to the cloud: IS my data private and secure?

Making the leap to the cloud: IS my data private and secure? Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Security and Managed Services

Security and Managed Services iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Antelope Enterprise. Electronic Documents Management System and Workflow Engine

Antelope Enterprise. Electronic Documents Management System and Workflow Engine Antelope Enterprise Electronic Documents Management System and Workflow Engine Antelope Enterprise v4 High Availability Edition Information in this document applies to the Antelope Enterprise v4 High Availability.

More information

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 [email protected] www.i2cinc.com Table of

More information

Introduction 1 Performance on Hosted Server 1. Benchmarks 2. System Requirements 7 Load Balancing 7

Introduction 1 Performance on Hosted Server 1. Benchmarks 2. System Requirements 7 Load Balancing 7 Introduction 1 Performance on Hosted Server 1 Figure 1: Real World Performance 1 Benchmarks 2 System configuration used for benchmarks 2 Figure 2a: New tickets per minute on E5440 processors 3 Figure 2b:

More information