CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018
|
|
- Edith Randall
- 5 years ago
- Views:
Transcription
1 CUNY Graduate Center Information Technology IT for & Effective Date: April 6, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video and data systems and services. The mission of this unit is to promote, facilitate and support the effective use of technology in instruction and learning, in research, and in processing and accessing institutional information. Organizationally, IT is comprised of three divisions: Administrative Services, Client Services and Systems Services. Facilities The Graduate Center s primary site at 365 Fifth Avenue ( ) includes data centers located on the second floor directly connected to the CUNY ring. The secondary site, at the GC Advanced Science Research Center ( ), includes a data center below ground as well as end-user workspaces and is connected to the CUNY ring via City College using infrastructure currently overseen by CUNY central office CIS. The tertiary site, the GC Apartment Building ( GC/Apt ), which includes a designated IT room on the first floor as well as (limited) end-user workspace on the first floor, is connected to the CUNY ring via Hunter College and is also served by a separate redundant internet connection via Verizon FIOS service. Scope of This document outlines the provisioning currently in place by Information Technology to safeguard ongoing functionality for select IT systems and services specifically identified herein. The scope and suitability of such provisioning is reviewed on a regular basis as systems and services are decommissioned, added and changed. Definitions We distinguish between the phrases business continuity and disaster recovery by viewing a business continuity plan as essentially a proactive approach to safeguarding ongoing daily operations while a disaster recovery plan must attempt to react to the scope and nature of a calamity. That is, our business continuity provisioning guarantees that we have systems in place that are backed up and fail over, ensuring that key services stay up and running, that business processes remain operational, in the course of minor disruptions which are reasonably anticipated. recovery, in which an unlikely but catastrophic incident has rendered the data center lost in part or in total for an extended period of time, may call for wholesale reconstitution of facilities, resources and services depending on the nature and specifics of the disaster. Context For the purposes of this document, at IT services are considered to be centered at, with business continuity provisioning intended to safeguard that perspective and disaster scenarios envisioned deleteriously impacting that location. Related Policies & Procedures IT Backup and Restore Policies IT Incident Management Plan 1
2 Essential IT Services and BC/DR This section outlines the provisioning currently in place by Information Technology to safeguard ongoing functionality for select essential IT systems and services. Two types of provisioning are identified, business continuity and disaster recovery, for the essential IT services identified below. GC Data Center: The data center at consists of two adjacent dedicated rooms. Access to the data center is via restricted card-entry system, security cameras monitor the entrances and public safety routinely patrols the adjacent hallways. The rooms are on the second floor, above ground level, and are set apart from the general traffic patterns used by the community of individuals occupying the building on a daily basis. The rooms are supported by individual redundant cooling systems, with continuous monitoring and alerting in place for Facilities and Engineering. The rooms are supported by individual power systems provisioned with UPS backup, with continuous monitoring and alerting in place for Facilities and Engineering. The rooms are supported by individual sprinkler systems. The rooms are supporting by temperature, humidity and water alerting, monitored by IT staff and Facilities and Engineering. used as emergency relocation centers for restoration of targeted GC IT services. GC IT Network Infrastructure: The network infrastructure at consists of core switches and related componentry in the data center, connected via fiber risers to multiple IDFs on each floor housing edge switches serving end-user devices. A wireless network infrastructure rides on top of this framework. The network infrastructure at is currently under the purview of CUNY central office CIS. The network infrastructure at GC/Apt apart from resident services includes edge switches in the data center provisioned to support a collection of desktop computers that could be installed in the first-floor lounge. In the data center, core switches, distribution switches, firewalls, server-region switches and switches connecting the internal network to the CUNY ring are all deployed in pairs, with failover provisioning, providing high redundancy. From the data center, the IDF on each floor is supported by redundant fiber connections, however these are encased in the same pathway. The stack of edge switches in each IDF on each floor are configured for failover, however there are single horizontal paths from the edge switch to the individual enduser wall ports. There typically are multiple data ports in any given room. 2
3 GC IT Network Infrastructure: The network infrastructure at consists of core switches and related componentry in the data center, connected via fiber risers to multiple IDFs on each floor housing edge switches serving end-user devices. A wireless network infrastructure rides on top of this framework. The network infrastructure at is currently under the purview of CUNY central office CIS. The network infrastructure at GC/Apt apart from resident services includes edge switches in the data center provisioned to support a collection of desktop computers that could be installed in the first-floor lounge. The CUNY ring provides two paths, in opposite directions, for redundancy. There is a single path from the data center to the external connection to the actual ring. There is no secondary internet connection in place at. This equipment is currently the purview of CUNY central office CIS. used as emergency relocation centers for restoration of targeted GC IT services. GC domain (faculty & staff) for GC staff and faculty uses the gc.cuny.edu domain, and is implemented in a Microsoft Exchange environment, hosted locally at. in the legacy asrc.cuny.edu domain is hosted on the CUNY central office CIS platform. gc.cuny.edu domain (faculty & staff) The Exchange platform is maintained in a dedicated cluster environment housed in the data center, made up of multiple fault-tolerant servers, provisioned for fail-over redundancy. ProofPoint and other supplementary systems apply additional security processing to incoming/outgoing for the purpose of safeguarding operations; these systems are likewise configured as a cluster of multiple faulttolerant servers, provisioned for fail-over redundancy. Backups are executed daily, stored onsite; weekly backups are also performed and stored at off-site location(s). asrc.cuny.edu domain This is currently the purview of CUNY central office CIS accounts for ASRC-based employees are now provisioned in the GC domain; asrc.cuny.edu domain accounts are legacy. gc.cuny.edu domain 3
4 GC domain (faculty & staff) for GC staff and faculty uses the gc.cuny.edu domain, and is implemented in a Microsoft Exchange environment, hosted locally at. in the legacy asrc.cuny.edu domain is hosted on the CUNY central office CIS platform. Subject to the nature of the disaster, backup tapes are available to restore the Exchange environment at GC/Apt. In order to do so, equipment required to read from back-up tapes will need to be acquired, as well as the equipment onto which the files and system are to be restored. Other operational steps will include making revisions to current DNS tables. Users will use Outlook Web Access from any internet-connected location to access gc.cuny.edu domain . In a disaster scenario, existing supplementary systems such as ProofPoint will be Future planning: recovery provisioning currently supported by GC/Apt asrc.cuny.edu domain This is currently the purview of CUNY central office CIS Externally hosted and managed IT services: Services such as , file storage and collaboration services for GC students (using the gradcenter.cuny.edu domain), CUNYfirst HR and finance services, Blackboard and NetCommunity are externally hosted. GC student , file storage and collaboration services (using the gradcenter.cuny.edu domain) are implemented in a Microsoft Office 365 environment, hosted externally by Microsoft and controlled by CUNY central office CIS. This is a Microsoft-hosted and supported environment, accessible to users from any internet-connected location. CUNYfirst and Blackboard are hosted systems overseen and managed by central office CIS. NetCommunity is a system contracted for by the GC Development office and hosted externally by the vendor. Subject to the nature of the disaster, these externally-hosted and supported environments are expected to remain operational and accessible to users from any internet-connected location. CUNYfirst and Blackboard are the purview of CUNY central. GC database services: Electronic databases underpinning file systems and applications are hosted locally at the GC. Database services for individuals at are currently provisioned on equipment overseen by CUNY central office CIS. The MS SQL database environment is maintained in a dedicated cluster environment housed in the data center, made up of multiple faulttolerant servers, provisioned for fail-over redundancy. 4
5 GC database services: Electronic databases underpinning file systems and applications are hosted locally at the GC. Database services for individuals at are currently provisioned on equipment overseen by CUNY central office CIS. The MySQL database environment is maintained in a dedicated cluster environment housed in the data center, made up of multiple faulttolerant servers, provisioned for fail-over redundancy. Backups of the data and the servers are executed daily, stored onsite and - for Windows environments - replicated offsite to GC/Apt; weekly backups of the data and the servers are also performed and stored at off-site location(s). This equipment is currently the purview of CUNY central office CIS Subject to the nature of the disaster, backup tapes can be used to restore the database environment at GC/Apt. In order to do so, equipment required to read from back-up tapes will need to be acquired as well as the equipment onto which the files and system are to be restored to house the database environment. Future planning: recovery provisioning currently supported by GC/Apt GC file services: Electronic file services for GC faculty and staff, commonly known as U-, S- and R- drives, are hosted locally at. File services for individuals at are currently provisioned on equipment overseen by CUNY central office CIS. (File services for GC students are discussed above.) The front-end system for file access is maintained in a dedicated cluster environment housed in the data center, made up of multiple faulttolerant virtual servers, provisioned for fail-over redundancy. The back-end system for file storage is a SAN system housed in the data center. 5
6 GC file services: Electronic file services for GC faculty and staff, commonly known as U-, S- and R- drives, are hosted locally at. File services for individuals at are currently provisioned on equipment overseen by CUNY central office CIS. (File services for GC students are discussed above.) Backups of both the front-end system and the back-end data are executed daily, stored onsite and also replicated offsite to GC/Apt; weekly backups of the data and the servers are also performed and stored at off-site location(s). This equipment is currently the purview of CUNY central office CIS Subject to the nature of the disaster, the data replica retained at GC/Apt can be used to restore the file services at GC/Apt. Future planning: recovery provisioning currently supported by GC/Apt Incoming/outgoing internet connectivity: The IT infrastructure ( CUNY ring ) traversed by incoming and outgoing traffic between the internet and the IT infrastructure internal to, GC/Apt and is controlled by CUNY central office CIS. is connected to the CUNY ring. is connected to the CUNY ring via City College using infrastructure currently overseen by CUNY central office CIS. GC/Apt is connected to the CUNY ring via Hunter College and is also served by a separate redundant internet connection via Verizon FIOS service. The CUNY ring is the purview of CUNY central office CIS. The CUNY ring is the purview of CUNY central office CIS. A separate redundant path to the internet is in place via Verizon FIOS service at the GC/Apt (only). 6
7 GC-hosted Windows-based websites & web-based services: Resources such as the primary GC website (gc.cuny.edu), Password Reset, Track-IT, and the web front-ends are hosted locally at. The asrc.cuny.edu website is hosted by CUNY central office CIS. The front-end systems are maintained in a dedicated cluster environment housed in the data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. The database back-end is MS SQL, discussed elsewhere in this document. Backups of the front-end system are executed daily, stored onsite and also replicated offsite to GC/Apt; weekly backups of the data and the servers are also performed and stored at off-site location(s). asrc.cuny.edu website This is currently the purview of CUNY central office CIS. gc.cuny.edu website Subject to the nature of the disaster, the data replication retained at GC/Apt will be used to restore the GC website system at GC/Apt. (Noted: The dependency on the database restoration.) Other operational steps will include making revisions to current DNS tables. Future planning: recovery provisioning currently supported by GC/Apt asrc.cuny.edu website This is currently the purview of CUNY central office CIS. In the future, content residing on the CIS platform will be migrated to the GC s primary infrastructure. 7
8 GC-hosted Windows-based IT services: Resources such as WSUS, SCCM, EPO, software license server, print server and Active Directory are hosted locally at. These systems are maintained in a dedicated cluster environment housed in the data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. Backups of the front-end system are executed daily, stored onsite and also replicated offsite to GC/Apt; weekly backups of the data and the servers are also performed and stored at off-site location(s). Subject to the nature of the disaster, the data replication retained at GC/Apt will be used to restore select systems at GC/Apt; not every system noted in this section would be considered essential. Future planning: recovery provisioning currently supported by GC/Apt GC-hosted Linux-based websites & web-based services: Resources such as GC Web Services, the CUNY Academic Commons, and the GC Library website, as well as the NML, DSC, MLD, CUNY BA, RILM, Brook Center and RedMine websites are hosted locally at. The GC Linux environment is purely virtual and consists of three layers: the MySQL database back-end, discussed elsewhere in this document, the file system and the front-end web services layer. The MySQL database back-end is discussed elsewhere in this document. The environment is maintained in a dedicated cluster environment housed in the data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. Backups are executed daily, stored onsite; weekly backups are also performed and stored at off-site location(s). 8
9 GC-hosted Linux-based websites & web-based services: Resources such as GC Web Services, the CUNY Academic Commons, and the GC Library website, as well as the NML, DSC, MLD, CUNY BA, RILM, Brook Center and RedMine websites are hosted locally at. Subject to the nature of the disaster, backup replicas will be used to restore the Linux system environment at GC/Apt. Other operational steps will include making revisions to current DNS tables. (Noted: The dependency on the database restoration.) Future planning: recovery provisioning currently supported by GC/Apt Desktop Computers: A collection of Apple ios Mac and Windows PC desktop computers are available at to support faculty, staff and students. These resources are maintained and supported on an ongoing basis. A collection of Apple ios Macs and Windows PCs are available at to support faculty and staff; these are currently under the purview of CUNY central office CIS. For desktop computers currently deployed, systems are kept current and protected by way of central management, via SCCM for Windows PCs and Casper for Apple Macs. SCCM is noted elsewhere in this document. Casper resides on a physical server, with a redundant hardware platform. WSUS, noted elsewhere this document, is used to keep PC computers current with Windows updates and patches as well as Microsoft application software updates. Casper is used to keep Macs current with Apple ios updates and patches. Ongoing preparedness: Critical updates issued by Microsoft are automatically pushed to all Windows desktop computers via WSUS. Critical updates issued by Apple are automatically pushed to all Mac desktop computers via Casper. McAfee EPO, noted elsewhere in this document, is used to keep the end-point security updated on both Windows PCs and Apple Macs. This includes anti- 9
10 Desktop Computers: A collection of Apple ios Mac and Windows PC desktop computers are available at to support faculty, staff and students. These resources are maintained and supported on an ongoing basis. A collection of Apple ios Macs and Windows PCs are available at to support faculty and staff; these are currently under the purview of CUNY central office CIS. virus, full-drive encryption for portable storage and data loss prevention for designated sensitive data (for the latter, Windows only). The same utility is used to provision full-drive encryption on GC laptops. Ongoing preparedness: McAfee updates are automatically pushed to desktop computers on a routine basis. Ongoing preparedness: A small collection of PCs and Macs are retained in stock ( spares ), as a redundant fail-safe precaution should a desktop computer currently deployed fail beyond immediate repair. Standard images for PCs and Macs are maintained in SCCM for Windows and in Casper for Macs. Ongoing preparedness: These images are backed up routinely. Desktop computers have been configured and installed by CUNY central office CIS and are currently maintained via that connection. Future planning: Desktop computers at will be integrated into the fleet of desktop computers at. Subject to the nature of the disaster, facilities at and GC/Apt will be Existing desktop computers at are suitable for such work. The lounge at GC/Apt is provisioned to support a collection of desktop computers. Future planning: recovery provisioning currently supported by GC/Apt GC telephone service: Telephony service for is provided via a voice-over-ip system hosted locally at, using circuits to Verizon and AT&T. Telephony service for GC/Apt is provided via Verizon. Telephony service for uses infrastructure currently controlled by CUNY central office CIS. The telephony system is comprised of a collection of components; all components are provisioned for redundancy. Additional end-user hand-sets are also stored on-site. Voic services enabling a caller to leave a message are maintained in a dedicated cluster environment housed in the data center, made up of multiple fault-tolerant servers, provisioned for fail-over redundancy. Voic services enabling the recipient to retrieve stored messages are not similarly provisioned. 10
11 GC telephone service: Telephony service for is provided via a voice-over-ip system hosted locally at, using circuits to Verizon and AT&T. Telephony service for GC/Apt is provided via Verizon. Telephony service for uses infrastructure currently controlled by CUNY central office CIS. Backups are executed daily, stored onsite. backups were successful. Redundant routes exist to the PSTN, however these traverse the same pathway between and the street connection. This is currently the purview of CUNY central office CIS. A small number of telephones at are provisioned independently of the IP network using traditional analog service. Telephone services at GC/Apt and are independent of and therefore, subject to the nature of the disaster, may remain operational. In a disaster scenario, certain existing supplementary systems such as voic may be This is currently the purview of CUNY central office CIS. 11
CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: May 26, 2017
CUNY Graduate Center Information Technology IT for & Effective Date: May 26, 2017 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video
More informationCUNY Graduate Center Information Technology IT Provisioning for Business Continuity & Disaster Recovery Effective Date: November 14, 2018
CUNY Graduate Center Information Technology IT for & Effective Date: November 14, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice,
More informationTechnology Disaster Recovery Plan updated 06/16/16
Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education
More informationSECURITY PRACTICES OVERVIEW
SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim
More informationUF CEMP Support Group Annex: IT Group
UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking
More informationMemorandum APPENDIX 2. April 3, Audit Committee
APPENDI 2 Information & Technology Dave Wallace, Chief Information Officer Metro Hall 55 John Street 15th Floor Toronto, Ontario M5V 3C6 Memorandum Tel: 416 392-8421 Fax: 416 696-4244 dwwallace@toronto.ca
More informationTUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY
JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate
More informationBUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4
BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 2016 DR Committee 1 Table of Contents REVISION HISTORY... 3 PURPOSE... 3 POLICY... 3 DR COMMITTEE... 3 POLICY MANAGEMENT... 3 EMPLOYEE TRAINING AND
More informationAttachment A - SDCCD Current Hardware and Software Environment
Page 1 of 8 Attachment A - SDCCD Current Hardware and Software Environment SOFTWARE ENVIRONMENT: Administrative Systems SDCCD s current administrative systems are comprised of Ellucian s Colleague Finance
More informationBUSINESS CONTINUITY. Topics covered in this checklist include: General Planning
BUSINESS CONTINUITY Natural and manmade disasters are happening with alarming regularity. If your organization doesn t have a great business continuity plan the repercussions will range from guaranteed
More informationWindows Server Security Best Practices
University Information Technology Services Windows Server Security Best Practices Page 1 of 13 Initial Document Created by: 2009 Windows Server Security Best Practices Committee Document Creation Date:
More information3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007
3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers
More informationPROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013
PROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013 The Tier 1 Initiatives were tied to Strategic Plan 2013 and the Program Review & Planning process. They offered desirable benefits
More information2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.
Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third
More informationDude Solutions Business Continuity Overview
Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....
More informationUniversity Information Systems. Administrative Computing Services. Contingency Plan. Overview
University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationAudit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015
Audit & Advisory Services IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services Mission and Function The JCCC Audit & Advisory Services department provides an independent
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationInformation. Technology. Annual Report
Information 2016 Technology Annual Report Information Technology Table of Contents Division Personnel 2 Mission Statement & Core Values 2 Technical Support 3 System Integration 4 Infrastructure 4-6 WARCOG
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationBusiness Continuity Plan Executive Overview
Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery
More informationNETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY
NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY Table of Contents Executive Summary 3 Written Description 4 Network Policies. 6 Security Policy.
More information7.16 INFORMATION TECHNOLOGY SECURITY
7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationAtmosphere Fax Network Architecture Whitepaper
Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11
More informationAljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: 1/30/2017.
Aljex Software, Inc. Business Continuity & Disaster Recovery Plan Last Updated: 1/30/2017 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure... 3 On-Site Disruption Procedures...
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationData Storage, Recovery and Backup Checklists for Public Health Laboratories
Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and
More informationINFORMATION TECHNOLOGY Annual Report
INFORMATION TECHNOLOGY 2014 Annual Report Information Technology Table of Contents Department Personnel 2 Mission Statement & Core Values 2 Technical Support 3 System Integration 4 Infrastructure 4-6 Web
More informationCUNY Graduate Center Information Technology. IT Policies & Procedures Last Updated: May 12, 2017
CUNY Graduate Center Information Technology IT E-mail Policies & Procedures Last Updated: May 12, 2017 The email domains are: gradcenter.cuny.edu o for student email o in a Microsoft-hosted Office 365
More informationSection A - Standards that Apply to All RFPs
These standards provide general information regarding the services provided by the Information Technology branch, in the context of implementation projects. These standards are published, at minimum, bi-annually
More informationv February 2016
Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance
More informationContinuity of Business
White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be
More informationWelcome to Gumnut Cloud
Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationUniversity Network Policies
BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these
More informationDRAFT 2012 UC Davis Cyber-Safety Survey
DRAFT 2012 UC Davis Cyber-Safety Survey UNIT INFORMATION Enter the following information. Person completing report Email Phone Unit (include sub-unit information, if appropriate) College/School/Office
More informationVendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP:
Vendor must indicate at what level its proposed solution will the College s requirements as delineated in the referenced sections of the RFP: 2.3 Solution Vision Requirement 2.3 Solution Vision CCAC will
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationBME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
More informationData Center Operations Guide
Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards
More informationEXHIBIT A. - HIPAA Security Assessment Template -
Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,
More informationDouble-Take Software
Whitepaper Exchange 2010 Advanced Protection Enhancing the Availability of Microsoft Exchange Server 2010 Double-Take Software Overview Native backup can provide higher levels of data and system protection,
More informationWest AT&T TXT Power Service Guide
West AT&T TXT29-1-1 Power Service Guide Table of Contents 1. Introduction... 2 2. Service Features... 2 2.1. Service Overview... 2 3. ITS... 3 3.1. Service Use Cases... 3 3.2. Customer Provided Public
More informationUniversity of Hawaii Hosted Website Service
University of Hawaii Hosted Website Service Table of Contents Website Practices Guide About These Practices 3 Overview 3 Intended Audience 3 Website Lifecycle 3 Phase 3 Begins 3 Ends 3 Description 3 Request
More informationAddendum #1 VOIP RFP Questions & Answers 12/13/17
1. Can the potential bidders tour the existing phone system? Yes. To schedule a tour, please email Holly Barfield at barfieldh@forsythpl.org. Please note that no questions will be answered during this
More informationDATA BACKUP AND RECOVERY POLICY
DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationConcord Fax Network Architecture. White Paper
Concord Fax Network Architecture White Paper Page 2 Table of Contents Introduction 3 The 99.99% Uptime Fax Network 4 Reliability and High Availability 5 Security 9 Delivery 14 Network Monitoring 19 About
More informationIT Service Upgrades Announcement
IT Service Upgrades Announcement Beginning in late 2008, AgriLife Information Technology under the direction of the Office of the Vice Chancellor and Dean of Agriculture and Life Sciences conducted a study
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationHIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
More informationLincoln University OIT Monthly Activity Summary. June Action Items
Lincoln University OIT Monthly Activity Summary Prepared by: Joel Sovanski, OIT Technical Director June 211 Action Items Name Date Description Value Statement Telecom Services 6/2 Purchasing and OIT worked
More informationIPMA State of Washington. Disaster Recovery in. State and Local. Governments
IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to
More informationMUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions
Q: What are the pain points being experienced with the current IT setup? A: Age of the equipment, reliability of service, no redundancy for internet service. Q: How is technology managed today? A: Outsourced
More informationHYBRID CLOUD BACKUP & DISASTER RECOVERY
HYBRID CLOUD BACKUP & DISASTER RECOVERY What is NexProtect? NexProtect is a cost-effective, Hybrid Cloud Backup & Disaster Recovery solution that meets your business needs with an on-site appliance that
More informationenalyzer enalyzer security
enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com
More informationCANVAS DISASTER RECOVERY PLAN AND PROCEDURES
CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...
More informationAudit4 Installation Requirements
S4S Pty Ltd ABN: 26 104 845 909 Phone: 1300 133 308 Web: http://www.s4s.com.au Audit4 Installation Requirements Audit4 version 14+ Copyright 2012 S4S Pty Ltd The following table provides details on the
More informationOverview of Cisco Unified Communications Applications and Services
CHAPTER 20 Overview of Cisco Unified Communications Applications and Services Revised: February 29, 2012; Once the network, call routing, and call control infrastructure has been put in place for your
More informationWhat's in this guide... 4 Documents related to NetBackup in highly available environments... 5
Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...
More information68 - Point Checklist Revised May 2017
karlp@smallbizthoughts.com www.smallbizthoughts.com 68 - Point Checklist Revised May 2017 Date: Client: Contact: Technician: Phone: Address: City / Zip: Client Interview 1. Are there any known issues?
More informationNetwork Performance, Security and Reliability Assessment
Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD
More informationTuskegee Backup and Offsite Policy and Procedures
TUSKEGEE UNVERSTY OCE O NORMATON TECHNOLOGY Tuskegee Backup and Offsite Policy and Procedures Purpose This policy defines how to safeguard the information assets of the University and how copies of stored
More informationABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data
RnD Consulting LLC 957 Route 33 PMB 143 Hamilton Square, NJ 08690 Tel. (800) 949-8215 Fax. (609) 586-1712 mike@rndconsultingnj.com josh@rndconsultingnj.com ABOUT US A Legacy of Providing Solutions With
More informationApplication Lifecycle Management on Softwareas-a-Service
Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application
More informationQualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship
Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship BCS Level 3 Award in Networking and Architecture BCS Level 3 Award in Mobile
More informationXceedium Xio Framework: Securing Remote Out-of-band Access
Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many
More informationCCBC is equipped with 3 computer rooms, one at each main campus location:
Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology
More informationProtect enterprise data, achieve long-term data retention
Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce
More informationWHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER
WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER Insurance for IT Infrastructure? We can buy insurance for contract performance, pitching arms and even vacations. But when it comes
More informationINFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II
Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst
More informationITD SERVER MANAGEMENT PROCEDURE
ITD SERVER MANAGEMENT PROCEDURE PURPOSE This procedure ensures the operation and maintenance of all ITD servers in a safe and effective fashion. This is achieved by the routine monitoring and timely update
More informationCisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures
Cisco Meraki Privacy and Security Practices List of Technical and Organizational Measures Introduction Meraki takes a systematic approach to data protection, privacy, and security. We believe a robust
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationCTS performs nightly backups of the Church360 production databases and retains these backups for one month.
Church360 is a cloud-based application software suite from Concordia Technology Solutions (CTS) that is used by churches of all sizes to manage their membership data, website, and financial information.
More informationREQUEST FOR PROPOSAL Backup and Disaster Recovery Solutions Response to Vendor Questions September 23, 2016
CEDAR RAPIDS COMMUNITY SCHOOL DISTRICT Purchasing Department 2500 Edgewood Rd NW Cedar Rapids, Iowa 52405 September 2016 REQUEST FOR PROPOSAL Backup and Disaster Recovery Solutions Response to Vendor Questions
More informationCisco Unified Survivable Remote Site Telephony and Cisco Unified Enhanced Survivable Remote Site Telephony Version 11.0
Data Sheet Cisco Unified Survivable Remote Site Telephony and Cisco Unified Enhanced Survivable Remote Site Telephony Version 11.0 Helping Provide Reliable Communications to Branch Offices, Teleworkers,
More informationCore Services for ediscovery Perfection
BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist
More informationManaged Service Proposal
Managed Service Proposal We offer a unique approach to how your network will be managed. With our complete offering, we can bring optimal network infrastructure to your environment at the best competitive
More informationDELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD
DELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD Overview Organizations, regardless of size, rely upon access to IT and business data and services for their continued
More informationSERVICE SCHEDULE MANAGED DATABASE
SERVICE SCHEDULE MANAGED DATABASE This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
More informationTIBCO Nimbus Service
TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade
More informationThe CUNY Graduate Center Information Technology. Software Platform Service Standards Last Updated: June 30, 2017
The CUNY Graduate Center Information Technology Software Platform Service Standards Last Updated: June 30, 2017 This document codifies the service level epectations that the user community should have
More informationE-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019
Ormiston Academies Trust E-Security policy Date adopted: Autumn Term 2018 Next review date: Autumn Term 2019 Policy type Author Statutory James Miller OAT DPO Approved by Exec, July 2018 Release date July
More informationA Ready Business rises above infrastructure limitations. Vodacom Power to you
A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationINTRODUCING VERITAS BACKUP EXEC SUITE
INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationEnsure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards
Job description and person specification Senior ICT Officer Reports to: ICT Manager Purpose This role supports the provision of a high quality and measurable ICT infrastructure support service whilst delivering
More informationSymantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET
DATASHEET Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS Designed for disk, Symantec Backup Exec TM 10d for Windows Servers is the Gold Standard in Windows data protection. It provides comprehensive,
More informationPiton Investment Management. Business Continuity Plan
Date: May 2018 Table of Contents 1. Introduction... 3 2. Firm Policy... 3 2.1 Plan Location & Access... 3 3. Office Locations... 3 4. Evacuation Plan... 4 5. Alternate Physical Location of Employees...
More informationMessaging Infrastructure Design
Messaging Infrastructure Design Asset Documentation (ADOC) on the Messaging Infrastructure for the Chimp Corporation Asset Documentation R Chimp 12/12/2012 Template Version 1.0 Revision Date: 3/1/2013
More informationMicrosoft Certified System Engineer
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Microsoft Certified System Engineer Program Summary This instructor-led program with a combination
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationVMware Mirage Getting Started Guide
Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More information