CUNY Graduate Center Information Technology IT Provisioning for Business Continuity & Disaster Recovery Effective Date: November 14, 2018

Size: px
Start display at page:

Download "CUNY Graduate Center Information Technology IT Provisioning for Business Continuity & Disaster Recovery Effective Date: November 14, 2018"

Transcription

1 CUNY Graduate Center Information Technology IT for & Effective Date: November 14, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video and data systems and services. The mission of this unit is to promote, facilitate and support the effective use of technology in instruction and learning, in research, and in processing and accessing institutional information. Organizationally, IT is comprised of three divisions: Administrative Services, Client Services and Systems Services. Facilities The Graduate Center s primary site at 365 Fifth Avenue ( GC/Fifth ) includes data centers located on the second floor directly connected to the CUNY ring. The secondary site, at the GC Advanced Science Research Center ( ), includes a main data center at ground level and as well as small data center on the 5 th floor and is directly connected to the CUNY ring using infrastructure currently overseen by CUNY central office CIS. Scope of This document outlines the provisioning currently in place by Information Technology to safeguard ongoing functionality for select IT systems and services specifically identified herein. The scope and suitability of such provisioning is reviewed on a regular basis as systems and services are decommissioned, added and changed. Definitions We distinguish between the phrases business continuity and disaster recovery by viewing a business continuity plan as essentially a proactive approach to safeguarding ongoing daily operations while a disaster recovery plan must attempt to react to the scope and nature of a calamity. That is, our business continuity provisioning guarantees that we have systems in place that are backed up and fail over, ensuring that key services stay up and running, that business processes remain operational, in the course of minor disruptions which are reasonably anticipated. recovery, in which an unlikely but catastrophic incident has rendered the GC/Fifth data center or the main data center lost in part or in total for an extended period of time, may call for wholesale reconstitution of facilities, resources and services depending on the nature and specifics of the disaster. Context For the purposes of this document, IT services are considered to be centered at GC/Fifth, with business continuity provisioning intended to safeguard that perspective and disaster scenarios envisioned deleteriously impacting that location. IT services based at are not addressed in this document. Related Policies & Procedures IT Backup and Restore Policies IT Incident Management Plan 1

2 Essential IT Services and BC/DR This section outlines the provisioning currently in place by Information Technology to safeguard ongoing functionality for select essential IT systems and services. Two types of provisioning are identified, business continuity and disaster recovery, for the essential IT services identified below. GC Data Center: The data center at GC/Fifth consists of one dedicated room. Access to the GC/Fifth data center is via restricted card-entry system, security cameras monitor the entrances and public safety routinely patrols the adjacent hallways. o The data center is on the second floor, above ground level, and set apart from the general traffic patterns used by the community of individuals occupying the building on a daily basis. o Supported by individual redundant cooling systems, with continuous monitoring and alerting in place for Facilities and Engineering. o Supported by individual power systems provisioned with UPS backup, with continuous monitoring and alerting in place for Facilities and Engineering. o Supported by individual sprinkler systems. o Supported by temperature, humidity and water alerting, monitored by IT staff and Facilities and Engineering. Access to the main data center is via restricted card-entry system and public safety routinely patrols the adjacent hallways. o The data center is on the ground level, and set apart from the general traffic patterns used by the community of individuals occupying the building on a daily basis. o Supported by individual redundant cooling systems, with continuous monitoring and alerting in place for Facilities and Engineering. o Supported by individual power systems provisioned with UPS backup, with continuous monitoring and alerting in place for Facilities and Engineering. o Supported by individual sprinkler systems. o Supported by temperature, humidity and water alerting, monitored by IT staff and Facilities and Engineering. Subject to the nature of the disaster, facilities at or GC/Fifth may be used as emergency relocation centers for restoration of targeted GC IT services. 2

3 GC IT Network Infrastructure: The network infrastructure at GC/Fifth and consists of core switches and related componentry in the data center, connected via fiber risers to multiple IDFs on each floor housing edge switches serving end-user devices. A wireless network infrastructure rides on top of this framework. GC/Fifth In the data center, core switches, distribution switches, firewalls, server-region switches and switches connecting the internal network to the CUNY ring are all deployed in pairs, with failover provisioning, providing high redundancy. From the data center, the IDF on each floor is supported by redundant fiber connections, however these are encased in the same pathway. The stack of edge switches in each IDF on each floor are configured for failover, however there are single horizontal paths from the edge switch to the individual enduser wall ports. There typically are multiple data ports in any given room. The CUNY ring provides two paths, in opposite directions, for redundancy. There is a single path from the data center to the external connection to the actual ring. There is no secondary internet connection in place at GC/Fifth. In the data center, core switches, distribution switches, firewalls, server-region switches and switches connecting the internal network to the CUNY ring are all deployed in pairs, with failover provisioning, providing high redundancy. From the data center, the IDF on each floor is supported by redundant fiber connections, however these are encased in the same pathway. The stack of edge switches in each IDF on each floor are configured for failover, however there are single horizontal paths from the edge switch to the individual enduser wall ports. There typically are multiple data ports in any given room. The CUNY ring provides two paths, in opposite directions, for redundancy. There is a single path from the data center to the external connection to the actual ring. There is no secondary internet connection in place at GC/Fifth. Subject to the nature of the disaster, facilities at and GC/Fifth may be used as emergency relocation centers for restoration of targeted GC IT services. GC domain (faculty & staff) for GC staff and faculty uses the gc.cuny.edu domain, and is implemented in a Microsoft Exchange environment, hosted locally at GC/Fifth. in the legacy asrc.cuny.edu domain is hosted on the CUNY central office CIS platform. gc.cuny.edu domain (faculty & staff) The Exchange platform is maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant servers, provisioned for fail-over redundancy. 3

4 GC domain (faculty & staff) for GC staff and faculty uses the gc.cuny.edu domain, and is implemented in a Microsoft Exchange environment, hosted locally at GC/Fifth. in the legacy asrc.cuny.edu domain is hosted on the CUNY central office CIS platform. ProofPoint and other supplementary systems apply additional security processing to incoming/outgoing for the purpose of safeguarding operations; these systems are likewise configured as a cluster of multiple faulttolerant servers, provisioned for fail-over redundancy. Backups are executed daily, stored onsite; backups are copied weekly to asrc.cuny.edu domain This is currently the purview of CUNY central office CIS accounts for ASRC-based employees are now provisioned in both the GC and the asrc.cuny.edu domain. gc.cuny.edu domain Notwithstanding weekly Exchange backup copies at, it will take time to operate gc.cuny.edu from the ASRC: o Appropriate servers will need to be setup o Mailboxes will need to be restored from backup o DNS changes will need to be made o Given the possibility of migrating to a CUNY cloud-hosted solution, dedicating resources to DR does not seem prudent asrc.cuny.edu domain This is currently the purview of CUNY central office CIS Externally hosted and managed IT services: Services such as , file storage and collaboration services for GC students (using the gradcenter.cuny.edu domain), CUNYfirst HR and finance services, Blackboard and NetCommunity are externally hosted. GC student , file storage and collaboration services (using the gradcenter.cuny.edu domain) are implemented in a Microsoft Office 365 environment, hosted externally by Microsoft and controlled by CUNY central office CIS. This is a Microsoft-hosted and supported environment, accessible to users from any internet-connected location. CUNYfirst and Blackboard are hosted systems overseen and managed by central office CIS. NetCommunity is a system contracted for by the GC Development office and hosted externally by the vendor. 4

5 Externally hosted and managed IT services: Services such as , file storage and collaboration services for GC students (using the gradcenter.cuny.edu domain), CUNYfirst HR and finance services, Blackboard and NetCommunity are externally hosted. CUNY OneDrive storage hosted externally by Microsoft and controlled by CUNY central office CIS. This is a Microsoft-hosted and supported environment, accessible to users from any internet-connected location. Subject to the nature of the disaster, these externally-hosted and supported environments are expected to remain operational and accessible to users from any internet-connected location. CUNYfirst, OneDrive, and Blackboard are the purview of CUNY central. GC database services: Electronic databases underpinning file systems and applications are hosted locally at the GC. GC/Fifth The MS SQL database environment is maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of two fault-tolerant servers, provisioned for fail-over redundancy. It is backed up daily and then copied to. In addition, transaction logs are backed up every 4 hours and until a 3 rd standby/passive cluster node is created at the ASRC (see below) transaction log backups are then copied to. Although the mariadb database environment at GC/Fifth is not clustered, it is backed up daily by 2 independent backups and these 2 different backups are copied daily to. In a disaster scenario until a 3 rd standby/passive cluster node is created at the with live updates from GC/Fifth-- a MS SQL VM will be restored from latest Veeam backup and latest transaction logs In a disaster scenario until a standby/passive VM is created at the with live updates from GC/Fifth -- the mariadb VM will be restored from latest Veeam backup. Future planning: Standby/Passive MS SQL and mariadb cluster nodes will be created at the with real-time updates. If a management priority, we can try to test failover/failback to/from the MS SQL database server on January 2018 Shutdown Day and perform a similar test with the mariadb database server on July 2019 Shutdown Day. 5

6 GC file services: Electronic file services for GC faculty and staff, commonly known as S: and R: drives, are hosted locally at GC/Fifth. (File services for GC students are discussed above.) GC/Fifth The system for file access is maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. The back-end system for file storage is a SAN system housed in the GC/Fifth data center. The file server cluster is backed up daily and copied weekly to. In addition, the S: drive and R: drive but not 4 large archive folders! are synchronized daily to a standby file server at The back-end system for file storage is a SAN system housed in the data center. The file server cluster is backed up daily and copied weekly to. Ongoing preparedness: Servers at GC /Fifth are patched and maintained on the same schedule as those at. In a disaster scenario, GPOs that map S: and R: will be changed to use the replica file server at. If a management priority, (and if GC workstations are granted access to the standby server at the ASRC), we can test failover to the ASRC on a future Shutdown Day. Incoming/outgoing internet connectivity: The IT infrastructure ( CUNY ring ) traversed by incoming and outgoing traffic between the internet and the IT infrastructure internal to GC/Fifth, GC/Apt and is controlled by CUNY central office CIS. GC/Fifth is connected to the CUNY ring. is connected to the CUNY ring. The CUNY ring is the purview of CUNY central office CIS. The CUNY ring is the purview of CUNY central office CIS. 6

7 GC-hosted Windows-based websites & web-based services: Resources such as the primary GC website (gc.cuny.edu), Password Reset, Track-IT, and the web front-ends are hosted locally at GC/Fifth. The asrc.cuny.edu website is hosted by CUNY central office CIS. The front-end systems are maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. The back-end databases are MS SQL and mariadb, discussed elsewhere in this document. If content of the front-end web server changes frequently, the server is backed up daily onsite and there is a daily offsite backup copy to GC\ASRC. If content is static, the server is backed up weekly and there is a weekly offsite backup copy to GC\ASRC. asrc.cuny.edu website This is currently the purview of CUNY central office CIS. Content residing on the CIS platform will be migrated to the GC s primary infrastructure by the end of gc.cuny.edu website Ongoing preparedness: Servers at GC/Fifth are patched and maintained monthly. In a disaster scenario, if passive/standby MS SQL and mariadb servers do not yet exist at GC\ASRC, first MS SQL and mariadb database servers will be restored from Veeam backup and second critical web servers will be restored from Veeam backup. Next, new IPs will be assigned and DNS entries updated. In the future, we will test Global Load Balancing to reduce the time to failover critical web servers to GC\ASRC asrc.cuny.edu website This is currently the purview of CUNY central office CIS. In the future, content residing on the CIS platform will be migrated to the GC s primary infrastructure by the end of GC-hosted Windows-based IT services: Resources such as WSUS, SCCM, EPO, software license server, print server, and Active Directory/DNS are hosted locally at GC/Fifth. These systems are housed in the GC/Fifth data center. There are multiple Domain Controllers and DNS servers for redundancy/high-availability. The other servers in this category do not have redundancy/high-availability. 7

8 GC-hosted Windows-based IT services: Resources such as WSUS, SCCM, EPO, software license server, print server, and Active Directory/DNS are hosted locally at GC/Fifth. If content of the server changes frequently, the server is backed up daily onsite and there is a daily offsite backup copy to GC\ASRC. If content is static, the server is backed up weekly and there is a weekly offsite backup copy to GC\ASRC. GC Domain Controller/DNS servers replicate to Domain Controller/DNS servers located at the ASRC. Except for the SCCM image server, the WSUS, SCCM (front-end), antivirus EPO and software license server are backed up daily with an offsite backup copy to GC\ASRC Although 3 GC\Fifth print servers are backed up, the backups are not copied offsite to GC\ASRC because GC\ASRC has its own printers and print server. GC-hosted Linux-based websites & web-based services: Resources such as GC Web Services, the CUNY Academic Commons, and the GC Library website, as well as the NML, DSC, MLD, CUNY BA, RILM, Brook Center and RedMine websites are hosted locally at GC/Fifth. The GC Linux environment is purely virtual and consists of three layers: the MySQL database back-end, discussed elsewhere in this document, the file system and the front-end web services layer. The MySQL database back-end is discussed elsewhere in this document. The environment is maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant virtual servers, provisioned for fail-over redundancy. For critical, production linux-based servers, there are two independent, daily backups and the backups are copied daily to GC\ASRC. In a disaster scenario, critical VMs can be restored from Veeam backup at GC\ASRC, IPs can be changed and DNS modified. Certain existing supplementary systems may be considered non-essential and will not be restored. See above discussion of mariadb. 8

9 Desktop Computers: A collection of Apple ios Mac and Windows PC desktop computers are available at GC/Fifth to support faculty, staff and students. These resources are maintained and supported on an ongoing basis. A collection of Apple ios Macs and Windows PCs are available at to support faculty and staff. GC/Fifth For desktop computers currently deployed, systems are kept current and protected by way of central management, via SCCM for Windows PCs and Casper for Apple Macs. SCCM is noted elsewhere in this document. Casper resides on a physical server, with a redundant hardware platform. WSUS, noted elsewhere this document, is used to keep PC computers current with Windows updates and patches as well as Microsoft application software updates. Casper is used to keep Macs current with Apple ios updates and patches. Ongoing preparedness: Critical updates issued by Microsoft are automatically pushed to all Windows desktop computers via WSUS. Critical updates issued by Apple are automatically pushed to all Mac desktop computers via Casper. McAfee EPO, noted elsewhere in this document, is used to keep the end-point security updated on both Windows PCs and Apple Macs. This includes antivirus, full-drive encryption for portable storage and data loss prevention for designated sensitive data (for the latter, Windows only). The same utility is used to provision full-drive encryption on GC laptops. Ongoing preparedness: McAfee updates are automatically pushed to desktop computers on a routine basis. Ongoing preparedness: A small collection of PCs and Macs are retained in stock ( spares ), as a redundant fail-safe precaution should a desktop computer currently deployed fail beyond immediate repair. Standard images for PCs and Macs are maintained in SCCM for Windows and in Casper for Macs. Ongoing preparedness: These images are backed up routinely. Desktop computers at will be integrated into the fleet of desktop computers at GC/Fifth. In a disaster scenario, certain existing supplementary systems may be considered non-essential. Subject to the nature of the disaster, facilities at will be used as emergency relocation centers for staff workstations. Existing desktop computers at are suitable for such work. Future planning: DR capability to serve GC members operating at GC\ASRC will be enhanced by migrating ASRC MACs and PCs (from stand-alone and ASRC.cuny.adlan domain) to the GC domain. 9

10 GC telephone service: Telephony service for GC/Fifth is provided via a voice-over-ip system hosted locally at GC/Fifth, using circuits to Verizon and AT&T. Telephony service for GC/Apt is provided via Verizon. Telephony service for uses infrastructure currently controlled by CUNY central office CIS. GC/Fifth The telephony system is comprised of a collection of components; all components are provisioned for redundancy. Additional end-user hand-sets are also stored on-site. Voic services enabling a caller to leave a message are maintained in a dedicated cluster environment housed in the GC/Fifth data center, made up of multiple fault-tolerant servers, provisioned for fail-over redundancy. Voic services enabling the recipient to retrieve stored messages are not similarly provisioned. Backups are executed daily, stored onsite. backups were successful. Redundant routes exist to the PSTN, however these traverse the same pathway between GC/Fifth and the street connection. This is currently the purview of CUNY central office CIS. GC/Fifth A small number of telephones at GC/Fifth are provisioned independently of the IP network using traditional analog service. Telephone services at GC/Apt and are independent of GC/Fifth and therefore, subject to the nature of the disaster, may remain operational. In a disaster scenario, certain existing supplementary systems such as voic may be considered non-essential. Subject to the nature of the disaster, facilities at and GC/Apt may be used as emergency relocation centers for staff workstations. This is currently the purview of CUNY central office CIS. 10

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018 CUNY Graduate Center Information Technology IT for & Effective Date: April 6, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video

More information

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: May 26, 2017

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: May 26, 2017 CUNY Graduate Center Information Technology IT for & Effective Date: May 26, 2017 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video

More information

BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4

BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 2016 DR Committee 1 Table of Contents REVISION HISTORY... 3 PURPOSE... 3 POLICY... 3 DR COMMITTEE... 3 POLICY MANAGEMENT... 3 EMPLOYEE TRAINING AND

More information

Technology Disaster Recovery Plan updated 06/16/16

Technology Disaster Recovery Plan updated 06/16/16 Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education

More information

High Availability and Disaster Recovery Solutions for Perforce

High Availability and Disaster Recovery Solutions for Perforce High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce

More information

Dude Solutions Business Continuity Overview

Dude Solutions Business Continuity Overview Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

BUSINESS CONTINUITY. Topics covered in this checklist include: General Planning

BUSINESS CONTINUITY. Topics covered in this checklist include: General Planning BUSINESS CONTINUITY Natural and manmade disasters are happening with alarming regularity. If your organization doesn t have a great business continuity plan the repercussions will range from guaranteed

More information

UF CEMP Support Group Annex: IT Group

UF CEMP Support Group Annex: IT Group UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate

More information

Network Performance, Security and Reliability Assessment

Network Performance, Security and Reliability Assessment Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery

More information

Memorandum APPENDIX 2. April 3, Audit Committee

Memorandum APPENDIX 2. April 3, Audit Committee APPENDI 2 Information & Technology Dave Wallace, Chief Information Officer Metro Hall 55 John Street 15th Floor Toronto, Ontario M5V 3C6 Memorandum Tel: 416 392-8421 Fax: 416 696-4244 dwwallace@toronto.ca

More information

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Data Storage, Recovery and Backup Checklists for Public Health Laboratories Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and

More information

OL Connect Backup licenses

OL Connect Backup licenses OL Connect Backup licenses Contents 2 Introduction 3 What you need to know about application downtime 5 What are my options? 5 Reinstall, reactivate, and rebuild 5 Create a Virtual Machine 5 Run two servers

More information

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers

More information

HYBRID CLOUD BACKUP & DISASTER RECOVERY

HYBRID CLOUD BACKUP & DISASTER RECOVERY HYBRID CLOUD BACKUP & DISASTER RECOVERY What is NexProtect? NexProtect is a cost-effective, Hybrid Cloud Backup & Disaster Recovery solution that meets your business needs with an on-site appliance that

More information

Windows Server Security Best Practices

Windows Server Security Best Practices University Information Technology Services Windows Server Security Best Practices Page 1 of 13 Initial Document Created by: 2009 Windows Server Security Best Practices Committee Document Creation Date:

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

Audit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015

Audit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services Mission and Function The JCCC Audit & Advisory Services department provides an independent

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

Core Services for ediscovery Perfection

Core Services for ediscovery Perfection BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Data Center Operations Guide

Data Center Operations Guide Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

Atmosphere Fax Network Architecture Whitepaper

Atmosphere Fax Network Architecture Whitepaper Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11

More information

Information. Technology. Annual Report

Information. Technology. Annual Report Information 2016 Technology Annual Report Information Technology Table of Contents Division Personnel 2 Mission Statement & Core Values 2 Technical Support 3 System Integration 4 Infrastructure 4-6 WARCOG

More information

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: 1/30/2017.

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: 1/30/2017. Aljex Software, Inc. Business Continuity & Disaster Recovery Plan Last Updated: 1/30/2017 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure... 3 On-Site Disruption Procedures...

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

P a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection

P a g e 1. Teknologisk Institut.   Online kursus k SysAdmin & DevOps Collection P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

REQUEST FOR PROPOSAL Backup and Disaster Recovery Solutions Response to Vendor Questions September 23, 2016

REQUEST FOR PROPOSAL Backup and Disaster Recovery Solutions Response to Vendor Questions September 23, 2016 CEDAR RAPIDS COMMUNITY SCHOOL DISTRICT Purchasing Department 2500 Edgewood Rd NW Cedar Rapids, Iowa 52405 September 2016 REQUEST FOR PROPOSAL Backup and Disaster Recovery Solutions Response to Vendor Questions

More information

Managed Service Proposal

Managed Service Proposal Managed Service Proposal We offer a unique approach to how your network will be managed. With our complete offering, we can bring optimal network infrastructure to your environment at the best competitive

More information

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...

More information

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

IPMA State of Washington. Disaster Recovery in. State and Local. Governments IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to

More information

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer

More information

Microsoft Certified System Engineer

Microsoft Certified System Engineer 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Microsoft Certified System Engineer Program Summary This instructor-led program with a combination

More information

arcserve r16.5 Hybrid data protection

arcserve r16.5 Hybrid data protection arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

Welcome to Gumnut Cloud

Welcome to Gumnut Cloud Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Business Continuity Plan Executive Overview

Business Continuity Plan Executive Overview Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information

More information

West AT&T TXT Power Service Guide

West AT&T TXT Power Service Guide West AT&T TXT29-1-1 Power Service Guide Table of Contents 1. Introduction... 2 2. Service Features... 2 2.1. Service Overview... 2 3. ITS... 3 3.1. Service Use Cases... 3 3.2. Customer Provided Public

More information

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission

More information

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget

More information

PROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013

PROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013 PROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013 The Tier 1 Initiatives were tied to Strategic Plan 2013 and the Program Review & Planning process. They offered desirable benefits

More information

Protecting VMware vsphere/esx Environments with CA ARCserve

Protecting VMware vsphere/esx Environments with CA ARCserve Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while

More information

Services Catalouge.

Services Catalouge. Services Catalouge www.interactts.com Consulting & Professional Services Consulting & Professional Services Active Directory Implementation & Migration Microsoft Exchange Server Data Center Assessments

More information

v February 2016

v February 2016 Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance

More information

The Guide to... Hosted Exchange Disaster Recovery

The Guide to... Hosted Exchange Disaster Recovery The Guide to... Hosted Exchange Disaster Recovery Hardware Configuration CISCO FIREWALLS The Cisco firewalls we use to manage the network are ASA models, we run them in each individual Data Centre/Cabinet

More information

INTRODUCING VERITAS BACKUP EXEC SUITE

INTRODUCING VERITAS BACKUP EXEC SUITE INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...

More information

MUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions

MUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions Q: What are the pain points being experienced with the current IT setup? A: Age of the equipment, reliability of service, no redundancy for internet service. Q: How is technology managed today? A: Outsourced

More information

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET DATASHEET Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS Designed for disk, Symantec Backup Exec TM 10d for Windows Servers is the Gold Standard in Windows data protection. It provides comprehensive,

More information

Double-Take Software

Double-Take Software Whitepaper Exchange 2010 Advanced Protection Enhancing the Availability of Microsoft Exchange Server 2010 Double-Take Software Overview Native backup can provide higher levels of data and system protection,

More information

NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY

NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY Table of Contents Executive Summary 3 Written Description 4 Network Policies. 6 Security Policy.

More information

Virtual protection gets real

Virtual protection gets real Virtual protection gets real How to protect virtual machines from downtime and data loss 5 must-have features for VM backup Businesses virtualize to consolidate resources, reduce costs and increase workforce

More information

Knowall Cloud. Performance Hosting Delivered

Knowall Cloud. Performance Hosting Delivered Knowall Cloud Performance Hosting Delivered Connect with Knowall s Secure Private Cloud Solution The objective is to deliver a simple to use, centrally hosted IT and phone system, accessible by all users

More information

University Network Policies

University Network Policies BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these

More information

DELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD

DELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD DELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD Overview Organizations, regardless of size, rely upon access to IT and business data and services for their continued

More information

Migration and Building of Data Centers in IBM SoftLayer

Migration and Building of Data Centers in IBM SoftLayer Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into

More information

Concord Fax Network Architecture. White Paper

Concord Fax Network Architecture. White Paper Concord Fax Network Architecture White Paper Page 2 Table of Contents Introduction 3 The 99.99% Uptime Fax Network 4 Reliability and High Availability 5 Security 9 Delivery 14 Network Monitoring 19 About

More information

IT Managed Services. Schedule 1 Specification 11/07/18

IT Managed Services. Schedule 1 Specification 11/07/18 ` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...

More information

IT SUPPORT ANNUAL MAINTENANCE CONTRACT GET AN WITH US & RELAX ROUND THE CLOCK +971 (6) Server Setup. IT Services.

IT SUPPORT ANNUAL MAINTENANCE CONTRACT GET AN WITH US & RELAX ROUND THE CLOCK +971 (6) Server Setup. IT Services. +971 (6) 544 7890 CALL US Server Setup ROUND THE CLOCK IT SUPPORT IT Services Hardware Maintenance Contract GET AN ANNUAL MAINTENANCE CONTRACT WITH US & RELAX Structured Cabling CCTV System Time Attendance

More information

Vendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP:

Vendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP: Vendor must indicate at what level its proposed solution will the College s requirements as delineated in the referenced sections of the RFP: 2.3 Solution Vision Requirement 2.3 Solution Vision CCAC will

More information

Service Level Agreement

Service Level Agreement This ( ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply all Managed Services to Customer. The Master Agreement entered into between LightEdge

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

Planning and Designing a Microsoft Lync Server 2010 Solution

Planning and Designing a Microsoft Lync Server 2010 Solution Course 10534A: Planning and Designing a Microsoft Lync Server 2010 Solution Course Details Course Outline Module 1: Overview of the Lync Server 2010 Design Process This module explains all components of

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Lincoln University OIT Monthly Activity Summary. June Action Items

Lincoln University OIT Monthly Activity Summary. June Action Items Lincoln University OIT Monthly Activity Summary Prepared by: Joel Sovanski, OIT Technical Director June 211 Action Items Name Date Description Value Statement Telecom Services 6/2 Purchasing and OIT worked

More information

Attachment A - SDCCD Current Hardware and Software Environment

Attachment A - SDCCD Current Hardware and Software Environment Page 1 of 8 Attachment A - SDCCD Current Hardware and Software Environment SOFTWARE ENVIRONMENT: Administrative Systems SDCCD s current administrative systems are comprised of Ellucian s Colleague Finance

More information

Xceedium Xio Framework: Securing Remote Out-of-band Access

Xceedium Xio Framework: Securing Remote Out-of-band Access Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

Audit4 Installation Requirements

Audit4 Installation Requirements S4S Pty Ltd ABN: 26 104 845 909 Phone: 1300 133 308 Web: http://www.s4s.com.au Audit4 Installation Requirements Audit4 version 14+ Copyright 2012 S4S Pty Ltd The following table provides details on the

More information

Protecting VMware vsphere/esx Environments with Arcserve

Protecting VMware vsphere/esx Environments with Arcserve Protecting VMware vsphere/esx Environments with Arcserve Today, you face demanding service level agreements (SLAs) while having to address staffing and budget constraints. You seek ways to reduce cost

More information

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

SERVICE SCHEDULE MANAGED DATABASE

SERVICE SCHEDULE MANAGED DATABASE SERVICE SCHEDULE MANAGED DATABASE This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

Technical Plan Version 7.11

Technical Plan Version 7.11 Technical Plan Version 7.11 January 6, 2014 Table of Contents Table of Contents... Section 1: Environment... 1.1: Network... Section 2: Hardware/Software... 2.1: Storage... 2.2: Hypervisor... 2.3: Operating

More information

Hybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage

Hybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage Panzura White Paper Hybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage By: Rich Weber, Product Management at Panzura This article describes how Panzura works

More information

ITD SERVER MANAGEMENT PROCEDURE

ITD SERVER MANAGEMENT PROCEDURE ITD SERVER MANAGEMENT PROCEDURE PURPOSE This procedure ensures the operation and maintenance of all ITD servers in a safe and effective fashion. This is achieved by the routine monitoring and timely update

More information

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno Larry Mandel Vice Chancellor and Chief Audit Officer Office of Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu February

More information

PURPOSE The purpose is to establish policy regarding university computers. The goals of the policy are to:

PURPOSE The purpose is to establish policy regarding university computers. The goals of the policy are to: Information Resources Division COMPUTER PURCHASE AND REPLACEMENT POLICY Effective Date: June 1, 2016 Contact: Lisa Bazley, VP for Information Resources PURPOSE The purpose is to establish policy regarding

More information

enalyzer enalyzer security

enalyzer enalyzer security enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,

More information

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services TABLE OF CONTENTS UPDATE ON PROJECTS &

More information

Chapter 1 B: Exploring the Network

Chapter 1 B: Exploring the Network Chapter 1 B: Exploring the Network Types of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan

More information

Addendum #1 VOIP RFP Questions & Answers 12/13/17

Addendum #1 VOIP RFP Questions & Answers 12/13/17 1. Can the potential bidders tour the existing phone system? Yes. To schedule a tour, please email Holly Barfield at barfieldh@forsythpl.org. Please note that no questions will be answered during this

More information

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER Insurance for IT Infrastructure? We can buy insurance for contract performance, pitching arms and even vacations. But when it comes

More information

VMware HA: Overview & Technical Best Practices

VMware HA: Overview & Technical Best Practices VMware HA: Overview & Technical Best Practices Updated 8/10/2007 What is Business Continuity? Business Continuity = Always-on uninterrupted availability of business systems and applications Business Continuity

More information

vsan Disaster Recovery November 19, 2017

vsan Disaster Recovery November 19, 2017 November 19, 2017 1 Table of Contents 1. Disaster Recovery 1.1.Overview 1.2.vSAN Stretched Clusters and Site Recovery Manager 1.3.vSAN Performance 1.4.Summary 2 1. Disaster Recovery According to the United

More information

Question 1: How many users / workstations are in the environment? Response 1: Computers approximately 400; Employees 226, (monthly) Students 1937,

Question 1: How many users / workstations are in the environment? Response 1: Computers approximately 400; Employees 226, (monthly) Students 1937, NORTHERN MAINE COMMUNITY COLLEGE REQUEST FOR PROPOSAL Consultant Services for Migration from Novell to Windows Server 2017 QUESTIONS AND RESPONSES 5/8/2017 Question 1: How many users / workstations are

More information

ABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data

ABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data RnD Consulting LLC 957 Route 33 PMB 143 Hamilton Square, NJ 08690 Tel. (800) 949-8215 Fax. (609) 586-1712 mike@rndconsultingnj.com josh@rndconsultingnj.com ABOUT US A Legacy of Providing Solutions With

More information

Disaster Recovery-to-the- Cloud Best Practices

Disaster Recovery-to-the- Cloud Best Practices Disaster Recovery-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE

More information

NetCare LITE. NetCare LAN. NetCare SERVER. NetCare WORKSTATION. NetCare MOBILE. NetCare ON-SITE. NetCare 365

NetCare LITE. NetCare LAN. NetCare SERVER. NetCare WORKSTATION. NetCare MOBILE. NetCare ON-SITE. NetCare 365 Summary of IT Support Services Unit 12 Epsom Business Park Kiln Lane Epsom Surrey KT17 1JF Tel: 0844 770 7000 sales@intralan.co.uk www.intralan.co.uk This datasheet sets out a summary of all IT services

More information