CUNY Graduate Center Information Technology IT Provisioning for Business Continuity & Disaster Recovery Effective Date: November 14, 2018
|
|
- Penelope Cameron
- 5 years ago
- Views:
Transcription
1 CUNY Graduate Center Information Technology IT for & Effective Date: November 14, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video and data systems and services. The mission of this unit is to promote, facilitate and support the effective use of technology in instruction and learning, in research, and in processing and accessing institutional information. Organizationally, IT is comprised of three divisions: Administrative Services, Client Services and Systems Services. Facilities The Graduate Center s primary site at 365 Fifth Avenue ( GC/Fifth ) includes data centers located on the second floor directly connected to the CUNY ring. The secondary site, at the GC Advanced Science Research Center ( ), includes a main data center at ground level and as well as small data center on the 5 th floor and is directly connected to the CUNY ring using infrastructure currently overseen by CUNY central office CIS. Scope of This document outlines the provisioning currently in place by Information Technology to safeguard ongoing functionality for select IT systems and services specifically identified herein. The scope and suitability of such provisioning is reviewed on a regular basis as systems and services are decommissioned, added and changed. Definitions We distinguish between the phrases business continuity and disaster recovery by viewing a business continuity plan as essentially a proactive approach to safeguarding ongoing daily operations while a disaster recovery plan must attempt to react to the scope and nature of a calamity. That is, our business continuity provisioning guarantees that we have systems in place that are backed up and fail over, ensuring that key services stay up and running, that business processes remain operational, in the course of minor disruptions which are reasonably anticipated. recovery, in which an unlikely but catastrophic incident has rendered the GC/Fifth data center or the main data center lost in part or in total for an extended period of time, may call for wholesale reconstitution of facilities, resources and services depending on the nature and specifics of the disaster. Context For the purposes of this document, IT services are considered to be centered at GC/Fifth, with business continuity provisioning intended to safeguard that perspective and disaster scenarios envisioned deleteriously impacting that location. IT services based at are not addressed in this document. Related Policies & Procedures IT Backup and Restore Policies IT Incident Management Plan 1
2 Essential IT Services and BC/DR This section outlines the provisioning currently in place by Information Technology to safeguard ongoing functionality for select essential IT systems and services. Two types of provisioning are identified, business continuity and disaster recovery, for the essential IT services identified below. GC Data Center: The data center at GC/Fifth consists of one dedicated room. Access to the GC/Fifth data center is via restricted card-entry system, security cameras monitor the entrances and public safety routinely patrols the adjacent hallways. o The data center is on the second floor, above ground level, and set apart from the general traffic patterns used by the community of individuals occupying the building on a daily basis. o Supported by individual redundant cooling systems, with continuous monitoring and alerting in place for Facilities and Engineering. o Supported by individual power systems provisioned with UPS backup, with continuous monitoring and alerting in place for Facilities and Engineering. o Supported by individual sprinkler systems. o Supported by temperature, humidity and water alerting, monitored by IT staff and Facilities and Engineering. Access to the main data center is via restricted card-entry system and public safety routinely patrols the adjacent hallways. o The data center is on the ground level, and set apart from the general traffic patterns used by the community of individuals occupying the building on a daily basis. o Supported by individual redundant cooling systems, with continuous monitoring and alerting in place for Facilities and Engineering. o Supported by individual power systems provisioned with UPS backup, with continuous monitoring and alerting in place for Facilities and Engineering. o Supported by individual sprinkler systems. o Supported by temperature, humidity and water alerting, monitored by IT staff and Facilities and Engineering. Subject to the nature of the disaster, facilities at or GC/Fifth may be used as emergency relocation centers for restoration of targeted GC IT services. 2
3 GC IT Network Infrastructure: The network infrastructure at GC/Fifth and consists of core switches and related componentry in the data center, connected via fiber risers to multiple IDFs on each floor housing edge switches serving end-user devices. A wireless network infrastructure rides on top of this framework. GC/Fifth In the data center, core switches, distribution switches, firewalls, server-region switches and switches connecting the internal network to the CUNY ring are all deployed in pairs, with failover provisioning, providing high redundancy. From the data center, the IDF on each floor is supported by redundant fiber connections, however these are encased in the same pathway. The stack of edge switches in each IDF on each floor are configured for failover, however there are single horizontal paths from the edge switch to the individual enduser wall ports. There typically are multiple data ports in any given room. The CUNY ring provides two paths, in opposite directions, for redundancy. There is a single path from the data center to the external connection to the actual ring. There is no secondary internet connection in place at GC/Fifth. In the data center, core switches, distribution switches, firewalls, server-region switches and switches connecting the internal network to the CUNY ring are all deployed in pairs, with failover provisioning, providing high redundancy. From the data center, the IDF on each floor is supported by redundant fiber connections, however these are encased in the same pathway. The stack of edge switches in each IDF on each floor are configured for failover, however there are single horizontal paths from the edge switch to the individual enduser wall ports. There typically are multiple data ports in any given room. The CUNY ring provides two paths, in opposite directions, for redundancy. There is a single path from the data center to the external connection to the actual ring. There is no secondary internet connection in place at GC/Fifth. Subject to the nature of the disaster, facilities at and GC/Fifth may be used as emergency relocation centers for restoration of targeted GC IT services. GC domain (faculty & staff) for GC staff and faculty uses the gc.cuny.edu domain, and is implemented in a Microsoft Exchange environment, hosted locally at GC/Fifth. in the legacy asrc.cuny.edu domain is hosted on the CUNY central office CIS platform. gc.cuny.edu domain (faculty & staff) The Exchange platform is maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant servers, provisioned for fail-over redundancy. 3
4 GC domain (faculty & staff) for GC staff and faculty uses the gc.cuny.edu domain, and is implemented in a Microsoft Exchange environment, hosted locally at GC/Fifth. in the legacy asrc.cuny.edu domain is hosted on the CUNY central office CIS platform. ProofPoint and other supplementary systems apply additional security processing to incoming/outgoing for the purpose of safeguarding operations; these systems are likewise configured as a cluster of multiple faulttolerant servers, provisioned for fail-over redundancy. Backups are executed daily, stored onsite; backups are copied weekly to asrc.cuny.edu domain This is currently the purview of CUNY central office CIS accounts for ASRC-based employees are now provisioned in both the GC and the asrc.cuny.edu domain. gc.cuny.edu domain Notwithstanding weekly Exchange backup copies at, it will take time to operate gc.cuny.edu from the ASRC: o Appropriate servers will need to be setup o Mailboxes will need to be restored from backup o DNS changes will need to be made o Given the possibility of migrating to a CUNY cloud-hosted solution, dedicating resources to DR does not seem prudent asrc.cuny.edu domain This is currently the purview of CUNY central office CIS Externally hosted and managed IT services: Services such as , file storage and collaboration services for GC students (using the gradcenter.cuny.edu domain), CUNYfirst HR and finance services, Blackboard and NetCommunity are externally hosted. GC student , file storage and collaboration services (using the gradcenter.cuny.edu domain) are implemented in a Microsoft Office 365 environment, hosted externally by Microsoft and controlled by CUNY central office CIS. This is a Microsoft-hosted and supported environment, accessible to users from any internet-connected location. CUNYfirst and Blackboard are hosted systems overseen and managed by central office CIS. NetCommunity is a system contracted for by the GC Development office and hosted externally by the vendor. 4
5 Externally hosted and managed IT services: Services such as , file storage and collaboration services for GC students (using the gradcenter.cuny.edu domain), CUNYfirst HR and finance services, Blackboard and NetCommunity are externally hosted. CUNY OneDrive storage hosted externally by Microsoft and controlled by CUNY central office CIS. This is a Microsoft-hosted and supported environment, accessible to users from any internet-connected location. Subject to the nature of the disaster, these externally-hosted and supported environments are expected to remain operational and accessible to users from any internet-connected location. CUNYfirst, OneDrive, and Blackboard are the purview of CUNY central. GC database services: Electronic databases underpinning file systems and applications are hosted locally at the GC. GC/Fifth The MS SQL database environment is maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of two fault-tolerant servers, provisioned for fail-over redundancy. It is backed up daily and then copied to. In addition, transaction logs are backed up every 4 hours and until a 3 rd standby/passive cluster node is created at the ASRC (see below) transaction log backups are then copied to. Although the mariadb database environment at GC/Fifth is not clustered, it is backed up daily by 2 independent backups and these 2 different backups are copied daily to. In a disaster scenario until a 3 rd standby/passive cluster node is created at the with live updates from GC/Fifth-- a MS SQL VM will be restored from latest Veeam backup and latest transaction logs In a disaster scenario until a standby/passive VM is created at the with live updates from GC/Fifth -- the mariadb VM will be restored from latest Veeam backup. Future planning: Standby/Passive MS SQL and mariadb cluster nodes will be created at the with real-time updates. If a management priority, we can try to test failover/failback to/from the MS SQL database server on January 2018 Shutdown Day and perform a similar test with the mariadb database server on July 2019 Shutdown Day. 5
6 GC file services: Electronic file services for GC faculty and staff, commonly known as S: and R: drives, are hosted locally at GC/Fifth. (File services for GC students are discussed above.) GC/Fifth The system for file access is maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. The back-end system for file storage is a SAN system housed in the GC/Fifth data center. The file server cluster is backed up daily and copied weekly to. In addition, the S: drive and R: drive but not 4 large archive folders! are synchronized daily to a standby file server at The back-end system for file storage is a SAN system housed in the data center. The file server cluster is backed up daily and copied weekly to. Ongoing preparedness: Servers at GC /Fifth are patched and maintained on the same schedule as those at. In a disaster scenario, GPOs that map S: and R: will be changed to use the replica file server at. If a management priority, (and if GC workstations are granted access to the standby server at the ASRC), we can test failover to the ASRC on a future Shutdown Day. Incoming/outgoing internet connectivity: The IT infrastructure ( CUNY ring ) traversed by incoming and outgoing traffic between the internet and the IT infrastructure internal to GC/Fifth, GC/Apt and is controlled by CUNY central office CIS. GC/Fifth is connected to the CUNY ring. is connected to the CUNY ring. The CUNY ring is the purview of CUNY central office CIS. The CUNY ring is the purview of CUNY central office CIS. 6
7 GC-hosted Windows-based websites & web-based services: Resources such as the primary GC website (gc.cuny.edu), Password Reset, Track-IT, and the web front-ends are hosted locally at GC/Fifth. The asrc.cuny.edu website is hosted by CUNY central office CIS. The front-end systems are maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. The back-end databases are MS SQL and mariadb, discussed elsewhere in this document. If content of the front-end web server changes frequently, the server is backed up daily onsite and there is a daily offsite backup copy to GC\ASRC. If content is static, the server is backed up weekly and there is a weekly offsite backup copy to GC\ASRC. asrc.cuny.edu website This is currently the purview of CUNY central office CIS. Content residing on the CIS platform will be migrated to the GC s primary infrastructure by the end of gc.cuny.edu website Ongoing preparedness: Servers at GC/Fifth are patched and maintained monthly. In a disaster scenario, if passive/standby MS SQL and mariadb servers do not yet exist at GC\ASRC, first MS SQL and mariadb database servers will be restored from Veeam backup and second critical web servers will be restored from Veeam backup. Next, new IPs will be assigned and DNS entries updated. In the future, we will test Global Load Balancing to reduce the time to failover critical web servers to GC\ASRC asrc.cuny.edu website This is currently the purview of CUNY central office CIS. In the future, content residing on the CIS platform will be migrated to the GC s primary infrastructure by the end of GC-hosted Windows-based IT services: Resources such as WSUS, SCCM, EPO, software license server, print server, and Active Directory/DNS are hosted locally at GC/Fifth. These systems are housed in the GC/Fifth data center. There are multiple Domain Controllers and DNS servers for redundancy/high-availability. The other servers in this category do not have redundancy/high-availability. 7
8 GC-hosted Windows-based IT services: Resources such as WSUS, SCCM, EPO, software license server, print server, and Active Directory/DNS are hosted locally at GC/Fifth. If content of the server changes frequently, the server is backed up daily onsite and there is a daily offsite backup copy to GC\ASRC. If content is static, the server is backed up weekly and there is a weekly offsite backup copy to GC\ASRC. GC Domain Controller/DNS servers replicate to Domain Controller/DNS servers located at the ASRC. Except for the SCCM image server, the WSUS, SCCM (front-end), antivirus EPO and software license server are backed up daily with an offsite backup copy to GC\ASRC Although 3 GC\Fifth print servers are backed up, the backups are not copied offsite to GC\ASRC because GC\ASRC has its own printers and print server. GC-hosted Linux-based websites & web-based services: Resources such as GC Web Services, the CUNY Academic Commons, and the GC Library website, as well as the NML, DSC, MLD, CUNY BA, RILM, Brook Center and RedMine websites are hosted locally at GC/Fifth. The GC Linux environment is purely virtual and consists of three layers: the MySQL database back-end, discussed elsewhere in this document, the file system and the front-end web services layer. The MySQL database back-end is discussed elsewhere in this document. The environment is maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. For critical, production linux-based servers, there are two independent, daily backups and the backups are copied daily to GC\ASRC. In a disaster scenario, critical VMs can be restored from Veeam backup at GC\ASRC, IPs can be changed and DNS modified. Certain existing supplementary systems may be considered non-essential and will not be restored. See above discussion of mariadb. 8
9 Desktop Computers: A collection of Apple ios Mac and Windows PC desktop computers are available at GC/Fifth to support faculty, staff and students. These resources are maintained and supported on an ongoing basis. A collection of Apple ios Macs and Windows PCs are available at to support faculty and staff. GC/Fifth For desktop computers currently deployed, systems are kept current and protected by way of central management, via SCCM for Windows PCs and Casper for Apple Macs. SCCM is noted elsewhere in this document. Casper resides on a physical server, with a redundant hardware platform. WSUS, noted elsewhere this document, is used to keep PC computers current with Windows updates and patches as well as Microsoft application software updates. Casper is used to keep Macs current with Apple ios updates and patches. Ongoing preparedness: Critical updates issued by Microsoft are automatically pushed to all Windows desktop computers via WSUS. Critical updates issued by Apple are automatically pushed to all Mac desktop computers via Casper. McAfee EPO, noted elsewhere in this document, is used to keep the end-point security updated on both Windows PCs and Apple Macs. This includes antivirus, full-drive encryption for portable storage and data loss prevention for designated sensitive data (for the latter, Windows only). The same utility is used to provision full-drive encryption on GC laptops. Ongoing preparedness: McAfee updates are automatically pushed to desktop computers on a routine basis. Ongoing preparedness: A small collection of PCs and Macs are retained in stock ( spares ), as a redundant fail-safe precaution should a desktop computer currently deployed fail beyond immediate repair. Standard images for PCs and Macs are maintained in SCCM for Windows and in Casper for Macs. Ongoing preparedness: These images are backed up routinely. Desktop computers at will be integrated into the fleet of desktop computers at GC/Fifth. In a disaster scenario, certain existing supplementary systems may be considered non-essential. Subject to the nature of the disaster, facilities at will be used as emergency relocation centers for staff workstations. Existing desktop computers at are suitable for such work. Future planning: DR capability to serve GC members operating at GC\ASRC will be enhanced by migrating ASRC MACs and PCs (from stand-alone and ASRC.cuny.adlan domain) to the GC domain. 9
10 GC telephone service: Telephony service for GC/Fifth is provided via a voice-over-ip system hosted locally at GC/Fifth, using circuits to Verizon and AT&T. Telephony service for GC/Apt is provided via Verizon. Telephony service for uses infrastructure currently controlled by CUNY central office CIS. GC/Fifth The telephony system is comprised of a collection of components; all components are provisioned for redundancy. Additional end-user hand-sets are also stored on-site. Voic services enabling a caller to leave a message are maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant servers, provisioned for fail-over redundancy. Voic services enabling the recipient to retrieve stored messages are not similarly provisioned. Backups are executed daily, stored onsite. backups were successful. Redundant routes exist to the PSTN, however these traverse the same pathway between GC/Fifth and the street connection. This is currently the purview of CUNY central office CIS. GC/Fifth A small number of telephones at GC/Fifth are provisioned independently of the IP network using traditional analog service. Telephone services at GC/Apt and are independent of GC/Fifth and therefore, subject to the nature of the disaster, may remain operational. In a disaster scenario, certain existing supplementary systems such as voic may be considered non-essential. Subject to the nature of the disaster, facilities at and GC/Apt may be used as emergency relocation centers for staff workstations. This is currently the purview of CUNY central office CIS. 10
CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018
CUNY Graduate Center Information Technology IT for & Effective Date: April 6, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video
More informationCUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: May 26, 2017
CUNY Graduate Center Information Technology IT for & Effective Date: May 26, 2017 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video
More informationBUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4
BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 2016 DR Committee 1 Table of Contents REVISION HISTORY... 3 PURPOSE... 3 POLICY... 3 DR COMMITTEE... 3 POLICY MANAGEMENT... 3 EMPLOYEE TRAINING AND
More informationTechnology Disaster Recovery Plan updated 06/16/16
Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationDude Solutions Business Continuity Overview
Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....
More informationSECURITY PRACTICES OVERVIEW
SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim
More informationBUSINESS CONTINUITY. Topics covered in this checklist include: General Planning
BUSINESS CONTINUITY Natural and manmade disasters are happening with alarming regularity. If your organization doesn t have a great business continuity plan the repercussions will range from guaranteed
More informationUF CEMP Support Group Annex: IT Group
UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationTUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY
JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate
More informationNetwork Performance, Security and Reliability Assessment
Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery
More informationMemorandum APPENDIX 2. April 3, Audit Committee
APPENDI 2 Information & Technology Dave Wallace, Chief Information Officer Metro Hall 55 John Street 15th Floor Toronto, Ontario M5V 3C6 Memorandum Tel: 416 392-8421 Fax: 416 696-4244 dwwallace@toronto.ca
More informationData Storage, Recovery and Backup Checklists for Public Health Laboratories
Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and
More informationOL Connect Backup licenses
OL Connect Backup licenses Contents 2 Introduction 3 What you need to know about application downtime 5 What are my options? 5 Reinstall, reactivate, and rebuild 5 Create a Virtual Machine 5 Run two servers
More information3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007
3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers
More informationHYBRID CLOUD BACKUP & DISASTER RECOVERY
HYBRID CLOUD BACKUP & DISASTER RECOVERY What is NexProtect? NexProtect is a cost-effective, Hybrid Cloud Backup & Disaster Recovery solution that meets your business needs with an on-site appliance that
More informationWindows Server Security Best Practices
University Information Technology Services Windows Server Security Best Practices Page 1 of 13 Initial Document Created by: 2009 Windows Server Security Best Practices Committee Document Creation Date:
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationAudit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015
Audit & Advisory Services IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services Mission and Function The JCCC Audit & Advisory Services department provides an independent
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationUniversity Information Systems. Administrative Computing Services. Contingency Plan. Overview
University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationCore Services for ediscovery Perfection
BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist
More information2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.
Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third
More informationData Center Operations Guide
Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationAtmosphere Fax Network Architecture Whitepaper
Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11
More informationInformation. Technology. Annual Report
Information 2016 Technology Annual Report Information Technology Table of Contents Division Personnel 2 Mission Statement & Core Values 2 Technical Support 3 System Integration 4 Infrastructure 4-6 WARCOG
More informationAljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: 1/30/2017.
Aljex Software, Inc. Business Continuity & Disaster Recovery Plan Last Updated: 1/30/2017 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure... 3 On-Site Disruption Procedures...
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationREQUEST FOR PROPOSAL Backup and Disaster Recovery Solutions Response to Vendor Questions September 23, 2016
CEDAR RAPIDS COMMUNITY SCHOOL DISTRICT Purchasing Department 2500 Edgewood Rd NW Cedar Rapids, Iowa 52405 September 2016 REQUEST FOR PROPOSAL Backup and Disaster Recovery Solutions Response to Vendor Questions
More informationManaged Service Proposal
Managed Service Proposal We offer a unique approach to how your network will be managed. With our complete offering, we can bring optimal network infrastructure to your environment at the best competitive
More informationWhat's in this guide... 4 Documents related to NetBackup in highly available environments... 5
Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...
More informationIPMA State of Washington. Disaster Recovery in. State and Local. Governments
IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationMicrosoft Certified System Engineer
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Microsoft Certified System Engineer Program Summary This instructor-led program with a combination
More informationarcserve r16.5 Hybrid data protection
arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
More information7.16 INFORMATION TECHNOLOGY SECURITY
7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for
More informationWelcome to Gumnut Cloud
Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install
More informationContinuity of Business
White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationBusiness Continuity Plan Executive Overview
Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information
More informationWest AT&T TXT Power Service Guide
West AT&T TXT29-1-1 Power Service Guide Table of Contents 1. Introduction... 2 2. Service Features... 2 2.1. Service Overview... 2 3. ITS... 3 3.1. Service Use Cases... 3 3.2. Customer Provided Public
More informationSERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY
SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission
More informationProtecting Microsoft Hyper-V 3.0 Environments with Arcserve
Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget
More informationPROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013
PROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013 The Tier 1 Initiatives were tied to Strategic Plan 2013 and the Program Review & Planning process. They offered desirable benefits
More informationProtecting VMware vsphere/esx Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationServices Catalouge.
Services Catalouge www.interactts.com Consulting & Professional Services Consulting & Professional Services Active Directory Implementation & Migration Microsoft Exchange Server Data Center Assessments
More informationv February 2016
Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance
More informationThe Guide to... Hosted Exchange Disaster Recovery
The Guide to... Hosted Exchange Disaster Recovery Hardware Configuration CISCO FIREWALLS The Cisco firewalls we use to manage the network are ASA models, we run them in each individual Data Centre/Cabinet
More informationINTRODUCING VERITAS BACKUP EXEC SUITE
INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...
More informationMUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions
Q: What are the pain points being experienced with the current IT setup? A: Age of the equipment, reliability of service, no redundancy for internet service. Q: How is technology managed today? A: Outsourced
More informationSymantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET
DATASHEET Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS Designed for disk, Symantec Backup Exec TM 10d for Windows Servers is the Gold Standard in Windows data protection. It provides comprehensive,
More informationDouble-Take Software
Whitepaper Exchange 2010 Advanced Protection Enhancing the Availability of Microsoft Exchange Server 2010 Double-Take Software Overview Native backup can provide higher levels of data and system protection,
More informationNETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY
NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY Table of Contents Executive Summary 3 Written Description 4 Network Policies. 6 Security Policy.
More informationVirtual protection gets real
Virtual protection gets real How to protect virtual machines from downtime and data loss 5 must-have features for VM backup Businesses virtualize to consolidate resources, reduce costs and increase workforce
More informationKnowall Cloud. Performance Hosting Delivered
Knowall Cloud Performance Hosting Delivered Connect with Knowall s Secure Private Cloud Solution The objective is to deliver a simple to use, centrally hosted IT and phone system, accessible by all users
More informationUniversity Network Policies
BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these
More informationDELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD
DELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD Overview Organizations, regardless of size, rely upon access to IT and business data and services for their continued
More informationMigration and Building of Data Centers in IBM SoftLayer
Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into
More informationConcord Fax Network Architecture. White Paper
Concord Fax Network Architecture White Paper Page 2 Table of Contents Introduction 3 The 99.99% Uptime Fax Network 4 Reliability and High Availability 5 Security 9 Delivery 14 Network Monitoring 19 About
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationIT SUPPORT ANNUAL MAINTENANCE CONTRACT GET AN WITH US & RELAX ROUND THE CLOCK +971 (6) Server Setup. IT Services.
+971 (6) 544 7890 CALL US Server Setup ROUND THE CLOCK IT SUPPORT IT Services Hardware Maintenance Contract GET AN ANNUAL MAINTENANCE CONTRACT WITH US & RELAX Structured Cabling CCTV System Time Attendance
More informationVendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP:
Vendor must indicate at what level its proposed solution will the College s requirements as delineated in the referenced sections of the RFP: 2.3 Solution Vision Requirement 2.3 Solution Vision CCAC will
More informationService Level Agreement
This ( ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply all Managed Services to Customer. The Master Agreement entered into between LightEdge
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationPlanning and Designing a Microsoft Lync Server 2010 Solution
Course 10534A: Planning and Designing a Microsoft Lync Server 2010 Solution Course Details Course Outline Module 1: Overview of the Lync Server 2010 Design Process This module explains all components of
More informationEXHIBIT A. - HIPAA Security Assessment Template -
Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,
More informationLincoln University OIT Monthly Activity Summary. June Action Items
Lincoln University OIT Monthly Activity Summary Prepared by: Joel Sovanski, OIT Technical Director June 211 Action Items Name Date Description Value Statement Telecom Services 6/2 Purchasing and OIT worked
More informationAttachment A - SDCCD Current Hardware and Software Environment
Page 1 of 8 Attachment A - SDCCD Current Hardware and Software Environment SOFTWARE ENVIRONMENT: Administrative Systems SDCCD s current administrative systems are comprised of Ellucian s Colleague Finance
More informationXceedium Xio Framework: Securing Remote Out-of-band Access
Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationAudit4 Installation Requirements
S4S Pty Ltd ABN: 26 104 845 909 Phone: 1300 133 308 Web: http://www.s4s.com.au Audit4 Installation Requirements Audit4 version 14+ Copyright 2012 S4S Pty Ltd The following table provides details on the
More informationProtecting VMware vsphere/esx Environments with Arcserve
Protecting VMware vsphere/esx Environments with Arcserve Today, you face demanding service level agreements (SLAs) while having to address staffing and budget constraints. You seek ways to reduce cost
More informationESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES
ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationSERVICE SCHEDULE MANAGED DATABASE
SERVICE SCHEDULE MANAGED DATABASE This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
More informationTechnical Plan Version 7.11
Technical Plan Version 7.11 January 6, 2014 Table of Contents Table of Contents... Section 1: Environment... 1.1: Network... Section 2: Hardware/Software... 2.1: Storage... 2.2: Hypervisor... 2.3: Operating
More informationHybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage
Panzura White Paper Hybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage By: Rich Weber, Product Management at Panzura This article describes how Panzura works
More informationITD SERVER MANAGEMENT PROCEDURE
ITD SERVER MANAGEMENT PROCEDURE PURPOSE This procedure ensures the operation and maintenance of all ITD servers in a safe and effective fashion. This is achieved by the routine monitoring and timely update
More informationSubject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno
Larry Mandel Vice Chancellor and Chief Audit Officer Office of Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu February
More informationPURPOSE The purpose is to establish policy regarding university computers. The goals of the policy are to:
Information Resources Division COMPUTER PURCHASE AND REPLACEMENT POLICY Effective Date: June 1, 2016 Contact: Lisa Bazley, VP for Information Resources PURPOSE The purpose is to establish policy regarding
More informationenalyzer enalyzer security
enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com
More informationApplication Lifecycle Management on Softwareas-a-Service
Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationInformation Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017
Information Technology Services Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services TABLE OF CONTENTS UPDATE ON PROJECTS &
More informationChapter 1 B: Exploring the Network
Chapter 1 B: Exploring the Network Types of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan
More informationAddendum #1 VOIP RFP Questions & Answers 12/13/17
1. Can the potential bidders tour the existing phone system? Yes. To schedule a tour, please email Holly Barfield at barfieldh@forsythpl.org. Please note that no questions will be answered during this
More informationWHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER
WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER Insurance for IT Infrastructure? We can buy insurance for contract performance, pitching arms and even vacations. But when it comes
More informationVMware HA: Overview & Technical Best Practices
VMware HA: Overview & Technical Best Practices Updated 8/10/2007 What is Business Continuity? Business Continuity = Always-on uninterrupted availability of business systems and applications Business Continuity
More informationvsan Disaster Recovery November 19, 2017
November 19, 2017 1 Table of Contents 1. Disaster Recovery 1.1.Overview 1.2.vSAN Stretched Clusters and Site Recovery Manager 1.3.vSAN Performance 1.4.Summary 2 1. Disaster Recovery According to the United
More informationQuestion 1: How many users / workstations are in the environment? Response 1: Computers approximately 400; Employees 226, (monthly) Students 1937,
NORTHERN MAINE COMMUNITY COLLEGE REQUEST FOR PROPOSAL Consultant Services for Migration from Novell to Windows Server 2017 QUESTIONS AND RESPONSES 5/8/2017 Question 1: How many users / workstations are
More informationABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data
RnD Consulting LLC 957 Route 33 PMB 143 Hamilton Square, NJ 08690 Tel. (800) 949-8215 Fax. (609) 586-1712 mike@rndconsultingnj.com josh@rndconsultingnj.com ABOUT US A Legacy of Providing Solutions With
More informationDisaster Recovery-to-the- Cloud Best Practices
Disaster Recovery-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE
More informationNetCare LITE. NetCare LAN. NetCare SERVER. NetCare WORKSTATION. NetCare MOBILE. NetCare ON-SITE. NetCare 365
Summary of IT Support Services Unit 12 Epsom Business Park Kiln Lane Epsom Surrey KT17 1JF Tel: 0844 770 7000 sales@intralan.co.uk www.intralan.co.uk This datasheet sets out a summary of all IT services
More information