Qvidian Hosted Customer Technical Portfolio

Size: px
Start display at page:

Download "Qvidian Hosted Customer Technical Portfolio"

Transcription

1

2 Introduction The presents a description of Qvidian s Software as a Service (SaaS) deployment model, providing information on the Qvidian architecture and security practices. This document includes descriptions and requirements for system, network, security, and operational and environmental components that comprise Qvidian s hosted product service offering. About Qvidian Qvidian provides cloud-computing applications that improve sales effectiveness. We enable sales organizations to confidently engage prospects and win more often using proven, dynamic tools, and integrated best practices. Qvidian Sales Playbooks and Analytics provide sales people with automated guidance, information, and sales best practices tailored to each unique selling situation all within salesforce.com. Qvidian makes it easier for sales people to close more deals by streamlining sales complexity into a repeatable process and as a result clients are seeing average deal sizes increase by upward of two and a half times. Qvidian Proposal Automation has increased win rates and improved productivity for some of the world s largest and most successful corporations. On average, our customers increase their win rate by 38% and improve productivity by 45%.To discover what Qvidian can do for your sales organization, go to Production Environment The Qvidian production environment is hosted within a datacenter facility which provides a secure, highly reliable environment for the Qvidian offering. The datacenter provider, a global leader in providing companies advanced networking and hosting solutions to help ensure business productivity and continuity, serves customers in over 60 domestic and international datacenters. Features of the facility include: Multiple layers of physical security provided by biometric and card access systems, 24x7 security guards, and video security system Newly constructed with a focus on the latest advances in Green technology to provide a more efficient and environmentally friendly hosting option Fully redundant cooling and environmental control systems Redundant external power sources Redundant generator and UPS power supplies Fire detection and suppression Multiple ISP connections The building is a single-use facility dedicated to colocation and related services. The provider is the sole operator of the facility and its 31,000 square feet of raised floor space. The data center is SASE16 type SOC2 certified. Physical Security The data center s security is monitored via a state of the art security system utilizing CCTV cameras, card access controls, and biometric identification. The systems are monitored 24/7 by on site security personnel. The systems are designed to monitor all access and activity within the facility. 1

3 Environment Controls The building utilizes its Green Build construction, as well as N+ 1 mechanical system to maintain constant temperature and humidity levels within the data center regardless of outside weather conditions. The building is environmentally segregated into three zones; raised floor space, UPS Systems, and the peopleoccupied areas of the building. Power Management The electrical system is designed to provide clean and reliable AC power. The system can be broken down into three components; the external feed, the distribution system, and the emergency generation system. The external feed is provided via a robust feed with sub-station redundancy. The distribution system consists of four 675KW Three Phase UPS for N+1 redundancy. Each circuit breaker is backed by diverse power distribution units and UPS infrastructures with individual monitoring upon each circuit. The emergency generation is provided by three 2-MW Generators in parallel with 24 hours of on-site fuel and extended fuel contracts with multiple providers. Disaster Recovery Environment The Qvidian backup datacenter is hosted at an offsite facility which provides a secure, highly reliable environment for the Qvidian offering. This data center provider is also a global leader in providing companies managed hosting solutions to help ensure business continuity and serves more than 25,000 customers in over 50 countries. Features of the facility include: Server space secured by a card access system, security guards, and video security system Raised floor for easy access to power connections and superior air flow Fully redundant air conditioning Redundant power sources Uninterrupted power supply (UPS) Diesel Generator Fire Suppression Multiple, redundant, secured router connections to the High-Speed Data Network (HSDN) Geographically remote from primary datacenter (2,600+ miles of separation). The data center facility is 102,000 square feet and comprised of a managed services area in the center of the building surrounded by traditional work area seats. Security on site is 24x7x365 with customers issued badges upon arrival with sole access to assigned work areas. The data center is SASE16 type SOC2 and ISO 9000 certified. 2

4 Physical Security The data center is monitored by a security system, which consists of two integrated systems: A state of the art security system and closed circuit television cameras (CCTV). Both systems are monitored by a 24/7 security guard service. The systems are designed to monitor all activity in the building and data center facilities. All access doors are monitored and alarmed for tamper protection. All customers are required to sign in at the security desk and to use their access card when entering the building. The access system has multiple security zones and is restricted to what the visitor needs access to. All visitors are required to sign in at the security desk where they will be given a soft ID badge that will automatically expire after 12 hours. Visitors will be escorted through the data center facilities at all times with an authorized representative. The CCTV system records and monitors activity inside and outside the = facilities 24x7x365; this system links the carder reader access and CCTV video clips for certain access doors. HVAC Facility is equipped with a total of 43 CRAC units. Nineteen 30-ton Liebert CRAC units support the main data center floor; ton Stultz CRAC uinits for the new floor space, and ten 25-ton Stultz CRAC units support the electrical room, MDF Room and Recovery Services Center. Fire Suppression Protected by VESDA early smoke detection system, FM-200 under-floor fire suppression, a preaction sprinkler system and Intella-Scan graphics annunciator. Power Management The datacenter electrical infrastructure is designed to handle failure at any load-handling device without causing systems upstream or downstream of the load being affected. This system consists of three major components, a diverse route primary feed with substation redundancy, a distribution system and an emergency power generation system. Power Distribution Units These units provide comprehensive power conditioning including deep sag protection, transient voltage protection, single-phase protection, and harmonics protection. All of the PDU s are located within the secured Hosting Center. The data center monitors all electrical conditions in one command center area located at the security desk. All circuits are traced to the security panel, which can identify a failure specific to a client s cabinet, whether in the common or secured suite areas. 3

5 System Design Performance The production environment is tested for load capacity and scalability prior to deployment into production to ensure that the system can meet the demands for capacity and for load. In the event that environmental thresholds are exceeded and would impact performance, the environment is scalable to allow for system growth to meet demand. Virtualized load balancing is employed at both the web and application tiers. Load is spread over multiple physical servers at both the web and application levels to provide for high level of performance and availability. Additionally, all data repositories are clustered using n+1 to ensure availability. Patching and Upgrades All critical and security patches are applied within 24 hours of qualification if applicable. All bug and fix patches are applied on a regularly scheduled basis when and if applicable. All software and OS update patches, including service packs, are applied on a scheduled basis if applicable. All patches, regardless of criticality, are applied deliberately once testing and validation have been performed in an equivalent test environment. Except for critical security patches, all other patches are applied during normal maintenance windows. Qvidian uses methods that automatically apply operating system and device hot fixes and updates on a regular basis. These patches are qualified in two environments prior to being deployed to the production environment to ensure reliability. Machines report daily to a master server and compare what the Administrator has approved with what is currently installed on the server. Anti-Virus Anti-virus is configured on all hosts. Updates to the antivirus product are done regularly and automatically as the vendor releases new signature files. Regular complete scans take place and issues are investigated and remediated when a virus is detected (notification is immediate to on-call personal). Measures are in place to mitigate the anti-virus outbreak. Qvidian has the ability to limit communication between hosts down to the port level in the event of a virus outbreak. Backup, Media Retention and File Restoration Customer data is backed up regularly as described below, and is stored at an off-site location managed by a third party provider. Backup data is retrievable on demand immediately or within four hours if physical media is needed. Data is backed up via industry standard commercial backup software and exists throughout the completion of the data retention lifecycle, which is 60 days from time of initial backup. Backup Schedules Differential: On any workday, all files created on the server (new or changed since the previous full backup) are backed up in the evening s backup run. Full: On specified days, the backup run will include every file on the server. Full backups occur weekly. Offsite Storage All data is stored on near-line storage in addition to being exported electronically via the network. Data remains stored for the 60 day retention period and deleted. 4

6 Discontinuation of Backup Service When a customer Instance is terminated, Qvidian deletes the Instance from the hosted environment and no longer performs backup activities on the Instance. The data will exist at Disaster Recovery secure storage location through the completion of the data retention lifecycle. System Monitoring Operations Monitoring is provided on a 24x7x365 basis from an on-site staff of system operators and network analysts. Automated monitoring tools are used to proactively detect potential and actual risks to the environment, and help ensure uninterrupted processing of critical business processes. Automated agents monitor system presence on the network, examine resource utilization, and test functionality. Tools used for remote access to the production environment require encryption and authorization. Auditing is enabled on these processes. In the event that a system becomes degraded or any installed health check identifies a problem, alarms are generated and appropriate notifications are made. Real-time and historical performancetracking statistics are provided on a CPU level, ensuring proper proactive server management. All systems are monitored for network connectivity, server availability, operational health, performance and component utilization using standard network tools. This is further augmented by including monitoring of application processes, such as Web servers and other open standard systems applications. Specific areas of support are: Automated server monitoring: For each server, CPU, memory, disk space thresholds and critical processes are monitored. A trouble ticket is opened within 15 minutes for any critical alarm and a Systems Operator will respond according to the instructions for that server and/or failure type. Backup Monitoring: Backup process and offload of data is monitored to ensure conformance to agreedupon standards. Failures for scheduled backups are monitored, triaged and re-run by the Operations Staff where appropriate. Subsequent failures are ticketed and investigated within one day. Security and Intrusion Monitoring: Various tools and systems are maintained to monitor the security of the systems and networks. These include an Intrusion Detection System (IDS) that monitors for attempts to gain unauthorized access to the systems; Access Control Lists (ACLs) to specify and control access privileges; Redundant Firewall control and packet monitoring; Web Application Firewalls to scan for potential attacks; and Content Integrity Monitoring that establishes baseline profiles of specified files and alarms when an anomaly to those baselines occur. Change Management The following Change Management process is followed by Qvidian to ensure proper modification of resources: Change entry made by opening a Change Request Ticket in response to a request/internal business requirement Change assessment is made to analyze the change for feasibility, risk, and impact to the environment. An impact level is assigned, along with an estimated delivery date, and resource to conduct the change. Changes that have zero impact are implemented as soon as possible. Change preparation of the environment is conducted to ensure the change is ready to be implemented which includes testing and restore activities as needed. 5

7 Change review occurs weekly or as needed to review the list of changes with technical groups and client management teams (Change Review Board). Changes that are approved during review are scheduled for install. Requests that are denied are documented with reasons for denial. All change schedules are dependent on impact level and Qvidian s authorization. Change install is the actual activation and verification of a change; which may require a service disruption to the component being changed, or completed during scheduled maintenance periods. Network Design Network Management All production networks are secured by firewalls with active content filtering which are monitored real-time. Intrusion Prevention Services (IPS)/Intrusion Detection Services (IDS) devices are employed both by external entities and internal IT. Firewalls are industry standard commercial grade. All security devices are configured for regular alerting if certain events occur. All components are members of an anti-virus system which is monitored real-time for viruses and outbreaks. Specifically the following measures are in place: IDS and IPS devices are in place and are regularly updated with new signatures and classifications automatically from the vendors of said devices. A security team is alerted via /sms/pager and consoles when a monitored condition is triggered. The IDS and IPS devices(s) may initiate an action dependent upon the condition of the security event. In all instances the security team is activated and specific protocols are put into place following a pre-designated IRP (Incident response plan). Maintenance and monitoring of all network devices up to but not including, the Internet facing routers are conducted by Qvidian. Qvidian conducts regular vulnerability and penetration tests and updates its security posture based upon these regular security assessments. Security Security Management Qvidian has instituted strong security structure and policies to assure that Qvidian and customer data is maintained in a secure environment. All security policies are documented and signed in agreement by all employees and contractors that have access to the production system. Internal security audits (vulnerability and penetration tests) are done on a regular basis. The Qvidian system is used to store sales tools, strategies and content used for both internal company purposes and with external parties. The only constituent information stored in the Qvidian system are information that the client uploads to the system and usage data about that information. The following highlights Qvidian s security applications and model: Host hardening processes (based on vendor best practice standards) Host and network level Antivirus Regular Operating System, device and application vulnerability scans File level security 6

8 Access/change logging and monitoring Managed firewalls with active content filtering Web Application Firewalls IDS/IPS monitoring and reactive processes Separate customer data repositories All infrastructure components are maintained in segregated DMZ s with web service components being made available via the Internet through multiple firewalls. All data repositories are securely maintained internally with no access from the Internet and limited system-to-system communications. All networks are secured by firewalls which are monitored real-time. In addition, Intrusion Detection Systems (IDS) are used to monitor, alert, and react real-time to threats, attacks, and intrusions. Regular vulnerability and penetration tests are conducted and Qvidian makes changes to its security posture based upon regular security assessments. No direct external connection is allowed to the backend production environment components. System hardening, ACLs, routing, firewall rules, and IDSs are used to ensure appropriate access restrictions are enforced. Data stored in databases is secured by access controls that are regulated by client administrators. System Access Management Only Qvidian employees that have a valid operational need to access production systems are granted access and therefore, only IT personnel with explicit (via their job description) responsibility for SaaS operations are granted access to the application/system. Qvidian practices a policy of least rights in regard to network access. Access to network systems is delineated by need only. If roles change, then appropriate access controls are put in place to mitigate improper access. During quarterly security reviews, all user and system accounts are reviewed on both need and scope and managed accordingly. All employees are bound by a Non- Disclosure Agreement (NDA). In the case of a terminated employee, Human Resources initiates the deactivation of the employee account and access bound by the date of termination. This includes all physical and network access. Reference checks are conducted on all candidates before hire, and criminal background checks on all employees who have access to data center infrastructure or customer data. Business Continuity Qvidian provides for full business resumption of its production environment in the event of a major and prolonged outage of service (i.e., in the wake of building damage causing the actual loss of a server). Recovery services are contracted through a third party disaster recovery provider,. Qvidian s business continuity plan provides recovery of the Qvidian production environment. The following provides a general overview of the types of activities that occur if a disaster or local failure occurs at the production site Regular electronic backups stored at an off-site location, retrievable on demand Hardware/service contracts that allow for replacement of failed hardware within four (4) hours, same day. Local backup copies are maintained on-site for immediate recovery. Failover in cases where a disaster occurs and facility is not useable for a period of 4+ hours. 7

9 In the case of a declared disaster (e.g. a disruption that causes the entire production facility to be offline for an extended period of time), Qvidian, will perform the following activities: Engage in emergency response procedures due to disaster declaration Notify all key personnel that a disaster has been declared and assign tasks focused on the recovery plan Notify all customers that a disaster has been declared and communicate estimated downtime if possible Qvidian will redirect all traffic to the disaster recovery location that Qvidian has made available for Business Continuance. The disaster recovery site is geographically remote (2,600+ miles) from the primary facility If necessary, electronic media is queued for delivery Update website and all production data Testing will be done by the appropriate Qvidian teams, and when confirmed, the production environment will be made available to Qvidian customers. Set up time of the environment from initial disaster notification is 4 hours, with up to an additional 24 hours required to restore customer data. All business continuity and disaster recovery scenarios are tested annually. Testing consists of application security and service patch distribution, hardware and application operability, virus definition distribution, and data verification. Catastrophic Loss Catastrophic losses are considered events that entail the destruction of the hosting facility. In the event of a Force Majeure, Qvidian will not be liable for delays in returning service. Where possible, Qvidian will invoke its disaster recovery plan to allow service to be restored in the shortest possible time. If the hosting facility is not able to be recovered in a reasonable time, the DR facility will become the permanent facility. Qvidian has an Incident Response Team (IRT) in place to engage when needed. The plan is based around the National Institute of Standard and Technology (NIST) standard. Non-Disaster Scenarios A non-disaster is defined as a localized failure of hardware that does not affect the entire facility or provided service. In the event of a local hardware failover the following process is followed: Monitoring alerts Qvidian of the localized failure Service call is open with all contracted vendors Vendor technicians in conjunction with Qvidian are dispatched to the datacenter for any/all necessary hardware replacements Failovers are forced if needed Hardware is replaced/fixed Data restoration commences as needed 8

10 Verification of service restoration and data integrity is done by Qvidian and other departments as needed. 9

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Level I - Public. Technical Portfolio. Revised: July 2015

Level I - Public. Technical Portfolio. Revised: July 2015 Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

SaaS architecture security

SaaS architecture security Introduction i2o solutions utilise the software as a service (or SaaS) model because it enables us to provide our customers with a robust, easy to use software platform that facilitates the rapid deployment

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Birst Security and Reliability

Birst Security and Reliability Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Altus UC Security Overview

Altus UC Security Overview Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...

More information

HealthcareBookings.com Security Set Up

HealthcareBookings.com Security Set Up HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of

More information

TRADITIONAL ENTERPRISE SCIENTIFIC SOFTWARE

TRADITIONAL ENTERPRISE SCIENTIFIC SOFTWARE TRADITIONAL ENTERPRISE SCIENTIFIC SOFTWARE deployments have been complicated and expensive. They require a data center with office space, power, cooling, bandwidth, networks, servers, and storage. They

More information

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control

More information

UCS Level 2 Report Issued to

UCS Level 2 Report Issued to UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

Itron Cloud Services Offering

Itron Cloud Services Offering Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...

More information

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend: CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification

More information

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

White paper. SAS Solutions OnDemand Hosting Overview

White paper. SAS Solutions OnDemand Hosting Overview White paper SAS Solutions OnDemand Hosting Overview Contents Overview...1 Cary 1 Facility Specifications...2 Cary 2 Facility Specifications (SAS New Cloud Computing Center)...3 Charlotte 1 Facility Specifications...4

More information

Security and Data Center Overview

Security and Data Center Overview Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

Datacenter Hosting and Cloud Computing Services

Datacenter Hosting and Cloud Computing Services Datacenter Hosting and Cloud Computing Services Overview Background Founded in 1995, Lore Systems operates an international datacenter network which today includes full service 3+ datacenter facilities

More information

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide

More information

SOC 2 Report Seattle, WA (SEF)

SOC 2 Report Seattle, WA (SEF) SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

Managed Hosting Evaluating Blackboard Managed Hosting Vs. Self Hosting

Managed Hosting Evaluating Blackboard Managed Hosting Vs. Self Hosting Managed Hosting Evaluating Blackboard Managed Hosting Vs. Self Hosting Blackboard Managed Hosting manages the mission critical Bb Learn Platform in a reliable, secure, highly scalable, and fully managed

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

Network Router Monitoring & Management Services

Network Router Monitoring & Management Services Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

DATA CENTRE DATA CENTRE MAY 2015

DATA CENTRE DATA CENTRE MAY 2015 DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level

More information

Powering the Cloud Desktop: OS33 Data Centers

Powering the Cloud Desktop: OS33 Data Centers OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets

More information

Music Recording Studio Security Program Security Assessment Version 1.1

Music Recording Studio Security Program Security Assessment Version 1.1 Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND

More information

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page i Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page ii

More information

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ 9318; 5 Days, Instructor-led CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,

More information

BEST PRACTICES FOR COMMERCIAL COMPLIANCE

BEST PRACTICES FOR COMMERCIAL COMPLIANCE BEST PRACTICES FOR COMMERCIAL COMPLIANCE [ BEST PRACTICES FOR COMMERCIAL COMPLIANCE ] 2 Contents OVERVIEW... 3 Health Insurance Portability and Accountability Act (HIPAA) of 1996... 4 Sarbanes-Oxley Act

More information

Frankfurt Data Centre Overview

Frankfurt Data Centre Overview Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Facilities Planning and Management Services

Facilities Planning and Management Services Page 1 of 5 Services Page 2 of 5 TABLE OF CONTENTS Revision History... 2 Abbreviations and Acronyms... 2 Terminology... 2 1.0 Service Description and Services... 3 Baseline Services... 3 1.2 Additional

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Total Message Care. Why E-mail Sorting Solutions?

Total Message Care. Why E-mail Sorting Solutions? Total Message Care Hosted Email- POP3, IMAP, MAPI, & Web Mail IM Filtering Email Filtering Web Filtering Archiving Shared Calendar, Tasks Mobile Device Synchronization Outlook Compatibility Why E-mail

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

Famly ApS: Overview of Security Processes

Famly ApS: Overview of Security Processes Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA Hardware/Software Deployment Strategies Introduction to Information System Components Chapter 1 Part 4 of 4 CA M S Mehta, FCA 1 Hardware/Software Deployment Strategies Learning Objectives Task Statements

More information

Data Center Overview Document

Data Center Overview Document Overview NetSource is a Chicago area (Naperville) hosting company that owns and operates its own world class datacenter. The initial datacenter buildout was put into operation in 2007 and expanded in 2013.

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

Private Clouds & Hosted IT Solutions

Private Clouds & Hosted IT Solutions Private Clouds & Hosted IT Solutions Your Infrastructure, our datacenters With the help of its World-class partners, PBC can safely host any of your Mission-critical application on powerful, secure, Dedicated

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Whitepaper - Security e-messenger

Whitepaper - Security e-messenger Whitepaper 1 Security e-messenger Contents 1. Introduction Page 3 2. Data centre security and connection Page 3 a. Security Page 3 b. Power Page 3 c. Cooling Page 3 d. Fire suppression Page 3 3. Server

More information

Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net

Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net Our Hosting Infrastructure An introduction to our Platform, Data Centres and Data Security www.in-tuition.net UK Infrastructure Infrastructure Overview Intuition Networks has provided managed Internet

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

Data Center Infrastructure & Managed Services Outline

Data Center Infrastructure & Managed Services Outline Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists

More information

SECTION I: REPORT OF INDEPENDENT SERVICE AUDITORS... 3 SECTION II: MANAGEMENT OF INTERNAP NETWORK SERVICES CORPORATION'S ASSERTION 5

SECTION I: REPORT OF INDEPENDENT SERVICE AUDITORS... 3 SECTION II: MANAGEMENT OF INTERNAP NETWORK SERVICES CORPORATION'S ASSERTION 5 SOC 2 - Availability Report on Internap Network Services Corporation's Description of its SEF Company-Controlled Data Center System and Suitability of Design and Operating of Controls Throughout the Period

More information

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

University of Central Florida Class Specification Administrative and Professional. Information Security Officer Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team

More information

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud) SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

Security from a customer s perspective. Halogen s approach to security

Security from a customer s perspective. Halogen s approach to security September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving

More information

Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined.

Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. We Do It Better. Contents Introduction...3 Service and Support...3 Data Center Details...4 Security...4 Location...4 Power...4 Humidification...5 AC...5 Cooling...6 Datacenter Features...6 SAS 70...6 PCI

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

BroadData Unified Meeting Security Whitepaper v4.2

BroadData Unified Meeting Security Whitepaper v4.2 BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

North Street Global, LLC. Business Continuity Plan

North Street Global, LLC. Business Continuity Plan Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information