CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi



Similar documents
CenturyLink Disaster Recovery Service. G-Cloud V Lot 4 (Specialist Cloud Services)

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services

Citrix XenApp Design & Implementation Service

DOBUS And SBL Cloud Services Brochure

Applications and Solutions Architecture Cloud Services

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

Open Source Sales Force Automation (SFA) in the Cloud SaaS

IPL Service Definition - Data Recovery, Conversion and Migration

IBM Smartcloud Managed Backup

Documentum Document Management in the Cloud Service Definition

Service Definition Document

Lot 1 Service Specification MANAGED SECURITY SERVICES

Tactical Cost Reduction

Keyfort Cloud Services (KCS)

IPL Service Definition - Master Data Management for Cloud Related Services

19/10/12 1:50 PM DELIVERING WORLD CLASS IT SOLUTIONS

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

Amazon Relational Database Service (RDS)

Agilisys G-Cloud Service V

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS

Big Data Analytics Service Definition G-Cloud 7

G Cloud 4 Service Definition Document: CDG Common Digital Platform

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

Ubertas Cloud Services: Service Definition

Cloud Brokerage. G-Cloud Service. Arcus Global

Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES

Amazon Compute - EC2 and Related Services

Digital Forensics G-Cloud Service Definition

Data Protection Act Guidance on the use of cloud computing

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Vodafone secure mail services

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA

Pricing Guide. Service Overview

MICROSOFT DYNAMICS CRM

T H E E D U C A T I O N C L O U D. Freedom... a true Cloud based solution for education!

Injazat s Managed Services Portfolio

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open

SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS.

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

HBR Consulting Data Center Service Offerings

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services

IBM G-Cloud Microsoft Windows Active Directory as a Service

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

IBM Cloud Computing Infrastructure Architect V1. Version: Demo. Page <<1/9>>

Guardian365. Managed IT Support Services Suite

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Virtual Private Server Services Specific Terms and Conditions

SHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk

service description Document Management in the Cloud Software as a Service

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open

Managed Colocation Service Terms and Conditions for CLOUDHPT.COM

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1

MTI OVERVIEW MANAGING DATA SECURELY FOR OVER 25 YEARS

Vodafone Private Cloud

Realizing the Value Proposition of Cloud Computing

The Cloud in your office

Vodafone Private Cloud

Fujitsu Private Cloud Customer Service Description

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services

IT Enterprise Services

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Master Data Management

Domain 1 The Process of Auditing Information Systems

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

G-Cloud Service Definition. Atos Data Quality Audit SCS

e2e Secure Cloud Connect Service - Service Definition Document

e2e Managed Customer Private Cloud Infrastructure Service Definition Document

Firewall Administration and Management

Payment Card Industry Data Security Standard

HOSTING SERVICES AGREEMENT

Dedicated Server Services Specific Terms and Conditions

NNIT Cybersecurity. A new threat landscape requires a new approach

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Solutions and IT services for Oil-Gas & Energy markets

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization

Transcription:

CenturyLink IT Consulting Services G-Cloud 6 - SCS REFERENCE NUMBER RM1557vi

Overview of the Service (functional and non-functional) IT Consulting Services CenturyLink's Solutions Consulting delivers customised application orientated infrastructure transformation that aligns the strategic objectives of IT with your business goals. Our certified consultants work with your team to reduce costs, enhance flexibility and minimise risk; apply proven methodologies and tools to design and leverage the next generation IT infrastructure required to fuel growth. With skills and experience across Cloud and Virtualisation, Transformation/ Migration, Security and Disaster Recovery we can support your ambitions. Below are an example of the services typically delivered to clients but we d welcome the opportunity to discuss your needs further. Cloud Readiness Assessment The Cloud Readiness Assessment (CRA) Service allows public sector organisations to develop a Cloud computing strategy and understand the business impact of transforming the current IT services into Cloud services, irrespective of whether Public, Private or a hybrid of both types of Cloud services. One of the critical requirements of this program is for CenturyLink to support Error! Use the Home tab to apply companyname to the text that you want to appear here. IT in leading a discussion with the business about the impact of a move to Cloud services, creating an IT strategy that can be signed-off by the business units. Use Cases The Cloud Readiness Assessment service allows organisations that seek to take advantage of the emerging Cloud Computing services and flexible charging model to transform the way that IT services are provided to their business. Example Scenario s: The current investment model is to acquire equipment through capital expenditure (capex) rather than buy services as operational expenditure (opex). The current IT infrastructure is made up of a mature set of technologies that may require refresh/upgrade to meet evolving requirements and to provide better value through flexibility and agility. In addition, the current design has no support for any formal business continuity objectives, nor does it demonstrate the agility to cope with rapid provision of new services. The CRA service allows public sector organisations to investigate how a move to a Cloud Computing model would enable cost of resources employed to provide a service to be better aligned to the consumption of those resources, provide services with appropriate SLAs and business continuity, and the move from a capex to a variable opex cost model. A second requirement is start the service design process developing a service catalogue of services that are provided to the business and map the interdependencies between services and the underlying infrastructure to enable services to be transformed with minimal risk. The third requirement is to generate the technical architecture to support the service catalogue. As all three requirements have interdependencies it is recommended that the work streams should be started simultaneously under the same overall governance structure. 2

Example Use Case An organisation with 2500 applications had previously engaged CenturyLink for managed hosting services. With a view for consolidation, simplification and cost optimization of the global estate a programme was initiated with an initial scope of the core estate. The estate comprised 21 datacentres including customer owned sites, and CenturyLink data centres. A Cloud Readiness Assessment was performed as a Proof of Concept, with a candidate location chosen, comprising 20 servers in a single location. The costs of the POC were 15,000. The next phase of the CRA was to target mission critical applications and provide a transformation approach to the entire European estate of 500 servers across the 21 datacentres. Disaster Recovery Services To help public sector organisations be prepared in the event of a disaster, CenturyLink provides a comprehensive portfolio of Disaster Recovery (DR) Services that span understanding and evaluating your current environment, to designing and deploying a robust DR Strategy and Technology Enablement Program, to providing ongoing operations support. We focus on understanding your business and application services landscape, and architecting an enterprise-level Disaster Recovery solution that helps meet the needs of your Business Impact Analysis (BIA) and financial constraints. Our DR strategy consulting team partners with your organization to define a DR program to protect your key critical business functions and supporting technologies. We build a program and target state architecture supported by clearly defined governance and policy- based decision making models so that all current and new business applications are reviewed and assessed for candidacy for DR protection. In addition,our Right Placement Cost Model evaluates the best DR solution and pricing based on a tailored portfolio of technology solutions that aims to meet your specific financial and recovery needs. As a global leader in cloud infrastructure and hosted IT solutions, CenturyLink has the expertise and resources to help your organization architect and enable a cost-effective drawing on commercial best practice with a deep understanding of the Public Sector Environment. Disaster Recovery plan that minimizes the impact of unplanned events and keeps your business operational. Our skilled service operations and management teams provide ongoing support to the synchronization and integrity of your investment by checking that all changes to your application and infrastructure service environments are applied and reflected to your Disaster Recovery Environment. 3

Enterprise Security Services To help public sector organisations to tackle the increasing complex Enterprise Security landscape, CenturyLink provides a comprehensive portfolio of Security Services that span understanding and evaluating your current environment, to designing and deploying a robust Security Strategy and Technology Enablement Program, to providing ongoing operations support. We focus on understanding your business and application services landscape, and architecting an enterprise-level Security solution that helps to meet the needs of your Business Impact Analysis (BIA) and financial constraints. Our Security strategy consulting team partners with your organization to define a Security program that aims to protect your key critical business functions and supporting technologies. We build a program and target state architecture supported by clearly defined governance and policy- based decision making models so that all current and new business applications are reviewed and assessed for candidacy for Security protection. In addition, our Right Placement Cost Model evaluates the best Security solution and pricing based on a tailored portfolio of technology solutions that aims to meet your specific financial and recovery needs. As a global leader in cloud infrastructure and hosted IT solutions, CenturyLink has the expertise and resources to help your organization architect and enable cost-effective security services. Today s security landscape has multiple threats and point solutions, with the table below outlining the key areas and CenturyLink solutions; Process Vendor Security Assessment Security Policy Management Control Automation Risk Management Training & Communication Compliance Adherence Mobile business People Privileged User Password Management Roles & Entitlements User Access Management / Monitoring Access Reviews & Attestations Federation & SSO Identity Theft Threat Insiders & Outsiders Data Data Loss Prevention Information Exchange Content Security (IRM) End Point Protection Data Protection Directives Data Loss - Social Networking Sensitive Data Vaulting Infrastructure Host Intrusion Detection and Prevention Network & Perimeter Security Data Loss Prevention Intrusions (viruses, worms) Production / Non production Data Masking Security Monitoring Cyber Analytics Cyber threats / warfare/apt s Applications Secure Design Review Security Source Code Pre Dev Security Consulting Assessment Threat & Vulnerability Malware Re Management engineering Application Vulnerability Testing Security Assurance Secure SDLC Training Platforms / Systems Security Patch Management Antivirus/Anti- Data Loss Prevention Encryption Malware Management Professional cybercrime Endpoint Security Malware Engineering EUC, Mobility & Cloud Communication Interception Network Security Antivirus/Anti - MDM / device Loss Malware Management and Theft Application Security Assurance Penetration & Vulnerability Testing Use Cases An organisation with a strong e-commerce presence had been the victim of hacking attacks on its websites. Before a move to the CenturyLink Cloud managed service, the organisation performed a Security Risk Assessment to ensure the end-state architecture was sufficiently robust. The first engagement was performed for a cost of 10,000 to assess the public facing e-commerce web-tier, with a follow-up month long engagement on the supporting infrastructure within the wider environment. 4

Ordering and invoicing process Procurement and ordering of the services can be conducted via execution of a Service Order generated by CenturyLink. Billing of the services will be on a per calendar month basis. All EMEA based billing enquires should be directed to: emeabilling@centurylink.com (DDi) +44 (0) 118 322 6000 (ask for Billing department) (Fax) +44 (0) 118 322 6279 Schedule Bills are processed and mailed at the end of each month; they represent service for the coming month. The Billing Department receives notification once your service is activated. Your first invoice includes any one-time installation fees as well as any pro-rated charges required for partial service installed during the month. As an example, if your service was activated on July 7, pro-rating ensures you will only be billed for the 25 active days within that month. Prorated fees are calculated on a per day rate for the month of service. Terms Invoiced amounts are due in full within 30 days after the date of the invoice ("Due Date"). In addition to the Service charges, the Authority will pay all applicable Taxes. CenturyLink reserves the right to charge interest in the event of any non-payment at the lesser of 1 1/2% per month or the highest rate permitted by applicable law and attorneys' fees and costs incurred by CenturyLink in collecting such amounts. Billing for each Service shall commence on the Billing Commencement Date ("BCD"), as defined in the applicable order ( Service Order ) for the Services. Except as may otherwise be set forth in the applicable Service Order, (a) monthly recurring charges ("MRCs") will be billed monthly in advance, (b) varying or usage-based charges will be billed monthly in arrears and (c) installation or other non-recurring charges will be billed upon the Billing Commencement Date. CenturyLink reserves the right to suspend the Affected Services upon five (5) days notice in the event of a payment default. Termination terms Where Customer procures Services on a month by month basis, CenturyLink can offer a greater degree of flexibility in its termination provisions for a Customer. Monthly Services For Services that are procured on a one (1) month basis, the Customer shall provide one (1) months written notice of its intention to terminate and at the end of the notice period the relevant Services shall expire and no termination fees shall apply. Optional Services with a committed term period (i.e. 12 months or 24 months) For Services with a committed term (i.e. 12 or 24 months), if the Customer terminates an ordered Service prior to its Billing Commencement Date, the Customer will pay a cancellation fee equal to one month's projected Monthly 5

Recurring Charges, plus all out-of-pocket costs incurred by or imposed upon CenturyLink (e.g., ordered equipment, licenses, carrier termination charges). If, after the BCD but prior to the conclusion of the applicable Service term, the Service or this Agreement is terminated either by CenturyLink for cause or by the Customer for any reason other than cause, then the Customer shall be liable for: (a) an early termination charge equal to 50% of the then current MRC for the affected Services multiplied by the number of months remaining in the Service term; (b) Service charges accrued but unpaid as of the termination date; and (c) any out-of-pocket costs incurred by or imposed upon CenturyLink (e.g., ordered equipment, licenses, carrier termination charges). The parties agree that any cancellation fees and early termination charges set forth in the service description constitute liquidated damages and are not intended as a penalty. If a particular Service is terminated upon which another service is dependent, all such dependent services shall be deemed to be terminated as well. If the Non-Recurring Services ( NRCs ) in this Service Guide or a part thereof are terminated either by CenturyLink for cause or by Customer for any reason other than cause after the BCD but prior to completion of the Services hereunder, then Customer shall be liable for: (a) an early termination charge equal to 50% of the NRC for any Tasks not yet completed by CenturyLink as specified in the Order Form; (b) any charges accrued but unpaid as of the termination date; and (c) any out-of-pocket costs incurred by or imposed upon CenturyLink (e.g., ordered equipment, licenses, carrier termination charges. Data restoration / service migration CenturyLink offers a range of data removal, transition and migration services, described in more detail in the CenturyLink response to Lot 4 Specialist Cloud Services. Where the Authority wishes to take advantage of these services at the end of the contract, CenturyLink will provide, transfer and release all relevant data to the Authority within agreed timescales and in the agreed format. Where requested as part of such a consulting engagement and where available, CenturyLink will return consumer generated data (e.g. content, metadata, structure, configuration etc.) and a list of the data that will be available for extraction. Customer responsibilities The customer will be responsible for: The control and management of access and responsibilities for end users. Customers must be aware of the variable nature of the billing based on usage (e.g. network bandwidth, utility storage, utility backup). Advanced OS security hardening specific to customer provided and managed applications and their requirements The customer is also responsible for ensuring only appropriate data (e.g. IL2 or IL3) is stored and processed by applications on this environment and that they comply with the CenturyLink Security Operating Procedures (SyOps) and other information assurance requirements. Disaster Recovery and Business Continuity Customer will specifically identify and provide CenturyLink with access to all relevant Customercontrolled information, resources and locations required to provide the Services. Customer will provide CenturyLink contact information (name, phone, pager, wireless) for all Customer team members with whom CenturyLink will interface. Customer s compliance to any third party licence terms. 6