PATCH MANAGER what does it do?

Similar documents
AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Anypoint Platform Cloud Security and Compliance. Whitepaper

Securing Amazon It s a Jungle Out There

With Eversync s cloud data tiering, the customer can tier data protection as follows:

THE BLUENOSE SECURITY FRAMEWORK

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Building Energy Security Framework

Simple Storage Service (S3)

Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples

Service Organization Controls 3 Report

Using ArcGIS for Server in the Amazon Cloud

FMCS SECURE HOSTING GUIDE

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Using ArcGIS for Server in the Amazon Cloud

Famly ApS: Overview of Security Processes

Using AWS in the context of Australian Privacy Considerations October 2015

319 MANAGED HOSTING TECHNICAL DETAILS

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

Amazon Web Services: Risk and Compliance July 2015

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

Security Essentials & Best Practices

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Amazon Web Services: Risk and Compliance July 2012

AWS Database Migration Service. User Guide Version API Version

Live Guide System Architecture and Security TECHNICAL ARTICLE

Service Organization Controls 3 Report

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Accellion Security FAQ

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.

Alliance Key Manager Cloud HSM Frequently Asked Questions

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

Amazon Web Services: Risk and Compliance January 2013

How To Use Aws.Com

An Agile and Scalable Mobile Workplace

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Amazon Web Services: Risk and Compliance January 2011

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

BMC s Security Strategy for ITSM in the SaaS Environment

Accellion Security FAQ

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

ADDING STRONGER AUTHENTICATION for VPN Access Control

Learning Management Redefined. Acadox Infrastructure & Architecture

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager

The Education Fellowship Finance Centralisation IT Security Strategy

CONTENTS. PCI DSS Compliance Guide

Deploy Remote Desktop Gateway on the AWS Cloud

Autodesk PLM 360 Security Whitepaper

Best Practices for Siebel on AWS

Our Cloud Offers You a Brighter Future

twilio cloud communications SECURITY ARCHITECTURE

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS

Security Overview Enterprise-Class Secure Mobile File Sharing

Securing the Service Desk in the Cloud

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Technical Brief: Virtualization

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Security Features: Lettings & Property Management Software

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

GoodData Corporation Security White Paper

Alfresco Enterprise on AWS: Reference Architecture

Architecture Statement

Amazon Web Services Yu Xiao

Overview and Deployment Guide. Sophos UTM on AWS

ShareFile Security Overview

CONTENTS. Security Policy

Cloud Management. Overview. Cloud Managed Networks

How To Create A Walkme.Com Walkthrus.Com Website And Help With Your Website Or App On A Pc Or Mac Or Ipad (For Pc) Or Mac (For Mac) Or Ipa (For Ipa) Or Pc

WE RUN SEVERAL ON AWS BECAUSE WE CRITICAL APPLICATIONS CAN SCALE AND USE THE INFRASTRUCTURE EFFICIENTLY.


BeBanjo Infrastructure and Security Overview

Alliance Key Manager Solution Brief

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Altus UC Security Overview

Service Definition - HR and Payroll Solutions

Security Controls for the Autodesk 360 Managed Services

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

KeyLock Solutions Security and Privacy Protection Practices

SECURITY FAQs Vunetrix Network Monitor Hosted Service. ver Revision: 1.2 Updated: April P a g e

1 Introduction 2. 2 Document Disclaimer 2

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Level Agreements, and loss of availability due to security breach: Amazon EC2 and S3, Microsoft Windows Azure Compute and Storage.

QuickBooks Online: Security & Infrastructure

CLOUD FRAMEWORK & SECURITY OVERVIEW

Transcription:

PATCH MANAGER what does it do? PATCH MANAGER SAAS maps all your physical assets and physical infrastructure such as network and power cabling, racks, servers, switches, UPS and generators. It provides a detailed fully interactive model of physical cable connections to patch panels and switch ports and the power connections to the UPS and generator systems and scales from a few racks to thousands across multiple locations. PATCH MANAGER enables you to manage connectivity across your entire estate. This means you can easily navigate your power, copper and fibre network cable infrastructure to quickly diagnose faults and plan moves and changes. PATCH MANAGER enables you to: Accurately map network infrastructure across multiple sites Quickly identify network outage issues Plan network Moves, Adds and Changes efficiently Manage Capacity Map patch panel and rack space connectivity in equipment rooms and data centres Data mine your assets and connectivity for engineering and management reporting Manage floor space Manage physical assets. Lifecycle, location and efficiency reports Open APIs make it possible to integrate with your existing real time monitoring, BMS, ITSM and server utilisation software such as BMC, VMware and CiscoWorks to provide an integrated Data Centre Infrastructure Monitoring (DCIM) solution. AIT Partnership Group Ltd can provide additional real time monitoring systems or integrate with what you already have. The majority of DCIM solutions have been developed to support intelligent PDU and monitoring systems or evolved from space and work flow management solutions. They are not optimised to map the physical layer and your entire cable infrastructure. Patch Manager is ideal for network infrastructures of any size from small offices to multi-site global networks. It provides an easy transition from spreadsheet management

Pricing Schedule 12 Month SAAS Contract Up to 30 racks 2,550 Each additional Rack 140 Optional Professional Services Importing data and building the model in PATCH MANGER is very easy but if required AIT can provide a full range of services including; Auditing of assets and data Configuration and integration using APIs Training 550 per day 550 per day 550 per day per delegate G-Cloud Accreditation Patch Manger SAAS is delivered on Amazon Web Services (AWS) that has been designed and managed in alignment with regulations, standards, and best-practices including SOC 1, 2 and 3, ISO27001 and PCI DSS level 1 AWS has been approved and signed up as a supplier to G-Cloud. AIT will work with CESG to assess how Impact Level accreditation can be delivered. AIT currently provides Code of Connection approved services and maintains a technical support team of security cleared personnel

Support Please the Terms and Conditions document for full details of the support provided under the standard SAAS contract. AIT can provide additional support options under flexible support contracts up to and including 24/7 4 hour response. Support can be requested during normal business hours by telephone or through the on-line customer support centre by clicking the support on www.ait.co.uk AIT will log all Support requests by Client through the on-line customer support centre, including: a) the date and time of reception of the request; b) the name provided as that of the Client representative; c) a short description of the request or report; d) the date and time that handling of the request or report starts; e) the date and time that the request is resolved; and f) the name(s) of the AIT employee(s) receiving and handling the requests. Hosting PATCH MANAGER SAAS is hosted on the Amazon Web Services (AWS) platform. The physical location of the Software is per customer choice from the following AWS Availability Zones: US East (Virginia) US West (Oregon) US West (N. California) EU West (Ireland) Asia Pacific (Singapore) Asia Pacific (Tokyo) Asia Pacific (Sydney) South America (Sao Paulo) By default, the URL for locating the Software will be of the form https://<customer>.patchmanager.com and may optionally be replaced with a customer specified URL where agreed as part of the contract

Security AIT shall ensure that the Hosting Environment shall comply with the following physical security specifications: a) All physical access points shall be monitored at all times; b) Access validation including identity checks shall be imposed; c) Access shall be granted only to persons on a list of person approved for this purpose by AIT and/or its contracted supplier of hosting services or facilities, if any. Amazon Web Services (AWS) platform provides highly secure data centres with state-of-the art electronic surveillance and multi-factor access control systems. Data centres are staffed 24x7 by trained security guards, and access is authorized strictly on a least privileged basis. Environmental systems are designed to minimize the impact of disruptions to operations. And multiple geographic regions and Availability Zones allow you to remain resilient in the face of most failure modes, including natural disasters or system failures. The AWS virtual infrastructure has been designed to provide optimum availability while ensuring complete customer privacy and segregation. For a complete list of all the security measures built into the core AWS cloud infrastructure, platforms, and services, please go to http://aws.amazon.com/security/ Built-in Security Features Not only are your applications and data protected by highly secure facilities and infrastructure, but they re also protected by extensive network and security monitoring systems. These systems provide basic but important security measures such as distributed denial of service (DDoS) protection and password brute-force detection on AWS Accounts. Additional security measures include: Secure access Customer access points, also called API endpoints, allow secure HTTP access (HTTPS) so that you can establish secure communication sessions with your AWS services using SSL.

Built-in firewalls You can control how accessible your instances are by configuring built-in firewall rules from totally public to completely private, or somewhere in between. And when your instances reside within a Virtual Private Cloud (VPC) subnet, you can control egress as well as ingress. Unique users The AWS Identity and Access Management (IAM) tool allows you to control the level of access your own users have to your AWS infrastructure services. With AWS IAM, each user can have unique security credentials, eliminating the need for shared passwords or keys and allowing the security best practices of role separation and least privilege. Multi-factor authentication (MFA) AWS provides built-in support for multi-factor authentication (MFA) for use with AWS Accounts as well as individual IAM user accounts. Private Subnets The AWS Virtual Private Cloud (VPC) service allows you to add another layer of network security to your instances by creating private subnets and even adding an IPsec VPN tunnel between your home network and your AWS VPC. Encrypted data storage Customers can have the data and objects they store in Amazon S3, Glacier, Redshift, and Oracle RDS encrypted automatically using Advanced Encryption Standard (AES) 256, a secure symmetric-key encryption standard using 256-bit encryption keys. Dedicated connection option The AWS Direct Connect service allows you to establish a dedicated network connection from your premise to AWS. Using industry standard 802.1q VLANs, this dedicated connection can be partitioned into multiple logical connections to enable you to access both public and private IP environments within your AWS cloud. Isolated GovCloud For customers who require additional measures in order to comply with US ITAR regulations, AWS provides an entirely separate region called AWS GovCloud (US) that provides an environment where customers can run ITAR-compliant applications, and provides special endpoints that utilize only FIPS 140-2 encryption. Dedicated, hardware-based crypto key storage option For customers who must use Hardware Security Module (HSM) appliances for cryptographic key storage, AWS CloudHSM provides a highly secure and convenient way to store and manage keys.

Trusted Advisor Provided automatically when you sign up for premium support, the Trusted Advisor service is a convenient way for you to see where you could use a little more security. It monitors AWS resources and alerts you to security configuration gaps such as overly permissive access to certain EC2 instance ports and S3 storage buckets, minimal use of role segregation using IAM, and weak password policies. The Hosting Environment shall comply with the following electronic security specifications: a) For each Client, a dedicated instance of the Software and database configuration are provided to ensure isolation and protection of customer data. b) Access to the Software is via a firewall in default deny mode. A point-to-point IP-range based firewall can also be established between the customer premises and the service. c) Access to the systems running the Software requires a two-step authentication process involving both password and key based authentication. d) Optional integration with Single-Sign-On servers via SAML. e) All communication with the Software from Client systems will be SSL encyrypted. Data Security and back up By default, the Software database is backed-up on a nightly basis with an option to increase this to 2-hourly intervals where agreed By default the Software and database contents back up is made using the Amazon S3 storage service. Optionally, the database back ups can be made available in a customer download account. In the event of contract termination or deployment of the Software to an in house customer server, the database and configuration will be returned in a format from a choice of the most popular commercial or open source databases (MS SQL Server, Oracle, IBM DB2, MySQL, PostgreSQL)

Maintenance and Uptime AIT shall undertake period maintenance upgrades of the Software and systems comprising the Hosting Environment. Such maintenance shall be undertaken during pre-notified scheduled timeslots. During the scheduled timeslot the software upgrades may result in up to 2hrs of downtime. AIT undertakes to provide the Hosting Environment with an uptime availability of not less than ninety-nine point five percent (99.5%) other than for times of unavailability during scheduled and agreed down time.