Service Description Safecom Simple Mail Relay Version 3.5

Size: px
Start display at page:

Download "Service Description Safecom Simple Mail Relay Version 3.5"

Transcription

1 Service Description Safecom Simple Mail Relay Version Telecom NZ Ltd Commercial in Confidence

2 CONTENTS 1 INTRODUCTION SERVICE DEFINITION SERVICE OVERVIEW SERVICE FEATURES CUSTOMER RESPONSIBILITIES SERVICE IMPLEMENTATION STANDARD FEES AND INVOICING STANDARD SAFECOM SIMPLE MAIL RELAY OPTIONAL COMPONENTS EXCLUSIONS Telecom NZ Ltd Page 2 Commercial in Confidence

3 1 INTRODUCTION The purpose of this document is to provide a detailed service description for the Safecom Simple Mail Relay service, whereby the overarching Safecom Service Specification document applies and this document describes information specific to this service. If you require further technical information, please contact your account manager. 2 SERVICE DEFINITION 2.1 SERVICE OVERVIEW is a core application of most organisations whose risks have risen substantially over recent years including spam, viruses and employee abuse (chain mail or high volume personal use with large attachments). A mail relay is a system that transfers messages from servers (Post Offices) to other remote servers. The Safecom Simple Mail Relay service is designed for customers who have their own mail relay system, and need to connect to an upstream mail relay to send and receive from their internal mail systems to the Internet. This is typically used where customers are using other Safecom services, but require their own mail relay systems. The following diagram outlines the key components of the service and its boundaries: Customer s Mail System the customer provides their own mail server, mail scanning systems (such as virus control) and client software on the customer site which connect into the Safecom Simple Mail Relay service. Safecom Connectivity this is comprised of the Safecom Customer Connection service which links the Customer Network into the Gen-i Service Delivery Platform. Connectivity is required to enable communications between the customer s mail systems and the Safecom Simple Mail Relays through to the Internet. o Safecom Simple Mail Relay Systems - these systems act as a frontline proxy to transfer mail to and from the Internet. The Simple Mail Relay Service does not provide virus or content scanning and policy enforcement; if this is required the customer should ask their account manager for the Safecom Secure Mail Relay Service Description which describes the Safecom service that includes these additional security features. Third Party Mail Systems these are the mail servers external to the customer and Safecom that the customer s users send and receive Internet mail to/from. SECURITY SERVICE Network Interface Layer Firewall Systems IDS Firewall Systems SECURITY IDS SERVICE FIGURE 1: SAFECOM SIMPLE MAIL RELAY SERVICE 2006 Telecom NZ Ltd Page 3 Commercial in Confidence

4 The main security threats addressed by the Safecom Simple Mail Relay Service are: Attacks on customer s network devices and mail systems with this service, the only component visible to the Internet is the Safecom Simple Mail Relay system, which has been security hardened and is monitored 24 hours per day x 7 days per week. Customer pre-requisites for use of this service are: Safecom Connectivity the Safecom Customer Connection as detailed in the Safecom Customer Connection service description is required to be configured prior to implementation of the Safecom Simple Mail Relay service. Customer Mail System - as the Simple Mail Relay system does not provide any control or virus screening of messages or attachments, these functions should be implemented on the customers Mail Relay system. If this is not possible, then an alternative would be to upgrade to the Safecom Secure Mail Relay service which includes these features. 2.2 SERVICE FEATURES The Safecom Simple Mail Relay service includes the following features: Simple Mail Relays SMTP Relay Process customers using this service are provided with an SMTP mail relay process. This process allows the customers Mail relay servers to send and receive to/from the Internet. Internet Connectivity and Bandwidth. Firewall Filtering the Safecom firewalls restrict the traffic from the Internet to the Safecom simple mail systems, to specific protocols and addresses. Also, all traffic from the Simple Mail Relay to the customers mail relay systems is limited to specific addresses and protocols of the Safecom Simple Mail relay systems. This service does not provide: Exclusions Policy Enforcement the simple mail relay system does not provide any scanning of or attachment content including spam. It does not restrict based on objectionable content, size, time, or type of attachment. If this is function is required, it must either be implemented on the customers mail relay system or the customer must evaluate/upgrade to the Safecom Secure Mail Relay service.. Virus Scanning the simple mail relay system does not provide any scanning of or attachments for virus infection. If this function is required, it must either be implemented on the customers mail relay system or the customer must evaluate/upgrade to the Safecom Secure Mail Relay service. Reports or Breakdown of Usage Statistics this service does not provide any detailed reports. 2.3 CUSTOMER RESPONSIBILITIES As per the Safecom Service Specification and including the customer s mail system information detailed below. Customer s Mail System This service has been designed to work with customers mail relay systems. Therefore, it is important that customers have their own mail relay system, and ensure that it is kept up to date with security patches, virus and spam updates Telecom NZ Ltd Page 4 Commercial in Confidence

5 2.4 SERVICE IMPLEMENTATION This section of the service description provides information on the provisioning process for the Safecom Simple Mail Relay service, and the steps involved. The overarching Safecom Service Specification should be reviewed as this table is specific to the Safecom Simple Mail Relay service. The following is an outline of a typical implementation of this service: Implementation Team Responsibilities Customer Responsibilities Pre-requisite Configure the Safecom Customer Connection if not already configured for other services. As per the Safecom Customer Connection service description. Pre-Sales Scope pre-implementation work and estimate costs. Complete Design Proposal (if applicable). Provide accurate information for business and technical requirements, including identifying domains and customer mail relay addresses. Contract, Technical Specification & Statement of Work Design and Integration Engineer completes the Safecom Simple Mail Relay service section of the Technical Specification. Prepare Safecom Contract Variation (if applicable). Complete Statement of Work. Sign Safecom Contract Variation (if applicable) Develop a test plan to set the criteria for successful implementation of all functionality. Agree and signoff Statement of Work. Configure Firewalls and Relays The Safecom Implementation Engineer will configure the customer instance of the Simple Mail Relay service based on the customer s requirements i.e. configure firewalls, routing, domains etc and provide the customer with the Mail Relay address. Migration of Domain Hosting if required In cases where the customer chooses to migrate their domain hosting to Xtra, the customer is to arrange with the organisation providing existing domain hosting services to migrate them to Xtra. Cut over Outbound Mail and Test The Safecom Implementation Engineer will work with the customer to cut over outbound mail. Typically this is coordinated so that when the change is made to the customer s mail server, the Implementation Engineer is monitoring the messages out and can immediately identify problems if they occur. The customer s technical person will work with the Safecom Implementation Engineer to test the service outbound from the customer s site. Cut over Inbound Mail and Test This requires changes to the domain records held by the Internet Service Provider (ISP) where the domain is hosted. If this ISP is Xtra, the Safecom Implementation Engineer will coordinate this change. The Safecom Implementation Engineer will assist with testing DNS changes are successful and that mail communications from an external mail client to a customer recipient is successful. If the ISP is not Xtra, the customer s technical person will co-ordinate the domain record changes when given the go ahead from the Safecom Implementation Engineer. The customer s technical person will work with the Safecom Implementation Engineer to test the service inbound from the customer s site Telecom NZ Ltd Page 5 Commercial in Confidence

6 Integration Completion Work with customer to ensure all requirements in the Statement of Work are met. Sign off Safecom solution to acknowledge delivery of functionality as agreed. Handover to SOC (Security Operations Centre) Ensure customer is aware that the services are in production and are aware of SOC s problem management and change control processes. Ensure support processes are communicated to all relevant internal parties. Each of the above stages includes discussions between the Safecom Implementation Engineer and the customer technical contact, as well as testing and sign-off processes. SAFECOM DNS Safecom mail relay servers provide customers with name resolution for all Internet domains. Configuration Information 2006 Telecom NZ Ltd Page 6 Commercial in Confidence

7 3 STANDARD FEES AND INVOICING The actual costs for this service are detailed in the Safecom Price schedule. In addition to the Safecom Service Specification fee information, the following information pertains to the Safecom Simple Mail Relay service specifically. 3.1 STANDARD SAFECOM SIMPLE MAIL RELAY ONE-OFF INSTALLATION FEES Installation fees are invoiced in arrears and cover items such as: Creation of access controls from Safecom into the customer s network. Configuration of the mail relay systems for the customer instance. Initial test of the mail send and receive process in co-ordination with the customer s technical resource. Liaison with customer for service establishment, training and roll-out. FIXED MONTHLY FEES Monthly fees are invoiced one (1) month in advance and cover items such as: Maintenance and monitoring of the Simple Mail Relay process. VARIABLE MONTHLY FEES Usage fees are invoiced in arrears and cover items such as: Simple Mail Relay Internet Traffic Costs this is a cumulative amount of Internet traffic that is used by the customer through the Simple Mail Relay service. This is charged on a per-megabyte of data and includes traffic in both directions. Installations, moves, adds and changes are invoiced in arrears. For more information on these see the overarching Safecom Services Specification. 3.2 OPTIONAL COMPONENTS There are no optional components for this service 3.3 EXCLUSIONS Other Safecom services such as the Secure Customer Connection are detailed in separate service descriptions and pricing of each service can be obtained from the Safecom Price Schedule. Costs of separate services are not included in the pricing of the Safecom Simple Mail Relay service Telecom NZ Ltd Page 7 Commercial in Confidence

Service Description Safecom Customer Connection Version 3.5

Service Description Safecom Customer Connection Version 3.5 Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

ONE OFFICE LITE - PRODUCT SPECIFICATION

ONE OFFICE LITE - PRODUCT SPECIFICATION 1. INTRODUCTION ONE OFFICE LITE - PRODUCT SPECIFICATION This document contains product information for the One Office Lite service. If you require more detailed technical information, please contact your

More information

METRO LAN EXTENSION - PRODUCT SPECIFICATION

METRO LAN EXTENSION - PRODUCT SPECIFICATION METRO LAN EXTENSION - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Metro LAN Extension service. If you require more detailed technical information, please contact your

More information

HOSTING SERVICES AGREEMENT

HOSTING SERVICES AGREEMENT HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD GEN2 SERVICES Our cloud infrastructure solutions are made up of a combination

More information

IBM Managed Security Services for Security

IBM Managed Security Services for  Security Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus

More information

1.1. Agreement means this document together with the Ignite General Terms and Conditions.

1.1. Agreement means this document together with the Ignite General Terms and Conditions. IGNITE SECUREMAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of this product

More information

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed security

IBM Managed Security Services (Cloud Computing) hosted  and Web security - express managed  security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed e-mail security Z125-8581-01 12-2010 Page 1 of 15 Table of Contents 1. Scope of Services... 3 2. Definitions...

More information

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2

More information

Connecting to Mimecast

Connecting to Mimecast Page 1 of 5 0 KBID10577 Connecting to Mimecast Congratulations and welcome to Mimecast! Thank you for making the choice to move your email management to the cloud with the Mimecast Unified Email Management

More information

Comendo mail- & spamfence

Comendo mail- & spamfence Upgrade Guide Resellers Comendo mail- & spamfence VERSION 10-05-2016 TABLE OF CONTENTS INTRODUCTION... 3 OVERVIEW... 4 1. Preparation... 4 2. Provisioning... 4 3. Upgrade... 4 4. Finalisation... 4 COMPARISON...

More information

An atmail cloud licence is a single licence type that includes the following features: webmail; contacts; calendars; tasks and files.

An atmail cloud licence is a single licence type that includes the following features: webmail; contacts; calendars; tasks and files. FAQ: atmail cloud Last updated 27 November 2018 SALES How do I contact atmail Sales? Please complete the Contact Us form on our site. What does an atmail cloud licence include? An atmail cloud licence

More information

An atmail cloud licence is a single licence type that includes the following features: webmail; contacts; and calendars.

An atmail cloud licence is a single licence type that includes the following features: webmail; contacts; and calendars. FAQ: atmail cloud Last updated 31 October 2017 SALES How do I contact atmail Sales? Please complete the Contact Us form on our site. What does an atmail cloud licence include? An atmail cloud licence is

More information

IGNITE HOSTED PREMIUM MAIL TERMS AND CONDITIONS OF SERVICE. 1. Definitions. 2. Services

IGNITE HOSTED PREMIUM MAIL TERMS AND CONDITIONS OF SERVICE. 1. Definitions. 2. Services IGNITE HOSTED PREMIUM MAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of

More information

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC 1 regulations, Frankfort Plant Board (FPB) provides this information about our broadband Internet access

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

TELIA YHTEYS KOTIIN SERVICE DESCRIPTION

TELIA YHTEYS KOTIIN SERVICE DESCRIPTION This service description tells you what your service contains. The service description is part of your Telia Yhteys kotiin agreement. The Telia Yhteys kotiin subscription (hereafter subscription ) is a

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement governs the use of the Services under the terms of the Master Service Agreement (the Agreement ) between CODEBLUE TECHNOLOGY

More information

Managed Operating System (OS)

Managed Operating System (OS) Managed Operating System (OS) This CenturyLink Service Guide ( SG ) sets forth a description of Managed Operating System ( Service ) offering by CenturyLink, including technical details and additional

More information

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED  SERVICE VOLUME 1, SECTION 5.7: SECURE MANAGED EMAIL SERVICE 5.7 SECURE MANAGED EMAIL SERVICE (SMES) [C.2.10.8] The Level 3 Team s (SMES) will meet or exceed the Government s requirements for SMES, as defined in

More information

Security with FailSafe

Security with FailSafe Email Security with FailSafe Anti spam and anti virus protection and email continuity for your mail server Email Security provides comprehensive and highly effective virus, spam and content filtering of

More information

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management

More information

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service

More information

You can purchase directly through our online store.

You can purchase directly through our online store. atmail cloud FAQ Last updated 31 October 2017 QUESTION SALES How do I contact atmail Sales? What does an atmail cloud licence include? Please complete the Contact Us form on our site to contact our sales

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

Protection Service with Continuity

Protection Service with  Continuity EveryCloud Email Protection Service Cloud Based Anti-Spam, Anti-Virus and Business Email Management. Block spam and email viruses in the cloud before they reach your network, whilst taking control of your

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

COLOCATION - PRODUCT SPECIFICATION

COLOCATION - PRODUCT SPECIFICATION COLOCATION - PRODUCT SPECIFICATION 1 INTRODUCTION This document contains information on the Colocation service. If you require more detailed technical information, please contact your Account Manager.

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is  Written by Marc Grote Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management

More information

Security Annex for Firewalls Additional Terms for Firewall Service

Security Annex for Firewalls Additional Terms for Firewall Service CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between CDS Office Technologies

More information

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access

More information

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement)

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Effective Date: Document Owner: Cybersmart ISP Version Version Date Description Author 1.0.2 03-01-201 Service

More information

CERANET SERVICE LEVEL AGREEMENT

CERANET SERVICE LEVEL AGREEMENT Page 1 of 5 CERANET SERVICE LEVEL AGREEMENT This CeraNet Service Level Agreement ("SLA") applies to all dedicated servers and Co-location services. The Client agrees that CeraNet internal measurements

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

E FAX - PRODUCT SPECIFICATION

E FAX - PRODUCT SPECIFICATION E FAX - PRODUCT SPECIFICATION 1 INTRODUCTION This document contains information on the efax service. information, please contact your Account Manager. If you require more detailed technical Telecom will

More information

KUHN COMMUNICATIONS, INC BROADBAND INTERNET ACCESS SERVICE DISCLOSURES

KUHN COMMUNICATIONS, INC BROADBAND INTERNET ACCESS SERVICE DISCLOSURES KUHN COMMUNICATIONS, INC BROADBAND INTERNET ACCESS SERVICE DISCLOSURES Consistent with FCC regulations, 1 Kuhn Communications, Inc. referred to as Kuhn Communications, provides this information about our

More information

SLA. Service Level Agreement v1.0. Published: September 2014

SLA. Service Level Agreement v1.0. Published: September 2014 SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because

More information

NYMBLE INTERNET ACCESS SERVICE DISCLOSURES

NYMBLE INTERNET ACCESS SERVICE DISCLOSURES NYMBLE INTERNET ACCESS SERVICE DISCLOSURES Consistent with FCC regulations, Nymble Internet Service provides this information about our Internet access services ( Nymble or Nymble services ). We welcome

More information

Service Level Agreement (SLA) and Service Level Objectives (SLO)

Service Level Agreement (SLA) and Service Level Objectives (SLO) Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3

More information

COMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES

COMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES Updated December 2018 COMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 commzomm provides this information about our broadband Internet access services. We call our broadband

More information

MAILGUARD AND MICROSOFT EXCHANGE 2013

MAILGUARD AND MICROSOFT EXCHANGE 2013 MAILGUARD AND MICROSOFT EXCHANGE 2013 MailGuard Secure Email Filtering MailGuard: support@mailguard.com.au Phone: 1300 30 65 10 www.mailguard.com.au TABLE OF CONTENTS Introduction 3 Document and Naming

More information

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

SERVICE DESCRIPTION MANAGED FIREWALL/VPN Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...

More information

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification Service Description Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification The services described herein are governed by the terms and conditions of the agreement specified

More information

Symantec Security.cloud

Symantec  Security.cloud Data Sheet: Messaging Security filters unwanted messages and protects mailboxes from targeted attacks. The service has selflearning capabilities and Symantec intelligence to deliver highly effective and

More information

Cyber-Chiro: Websites That Work Application Form

Cyber-Chiro: Websites That Work Application Form Cyber-Chiro: Websites That Work Application Form In order for us to properly prepare for you, a real website that actually works, you must first fill this out this application in detail and with clarity.

More information

Clear Choice Communications BROADBAND INTERNET SERVICE DISCLOSURES

Clear Choice Communications BROADBAND INTERNET SERVICE DISCLOSURES Updated 12/20/2016 Clear Choice Communications BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 Clear Choice Communications provides this information about our broadband Internet

More information

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Block  Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable  protection SecureSMART Block Email Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable email protection SecureSMART protects your network from viruses, spam, advanced

More information

OUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB

OUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB CONTENTS Click on the section that you are interested in. 1 About the Mcafee endpoint protection Essential for SMB 2 2 Mcafee Endpoint Protection Essential for SMB applications 2 Eligibility 2 3 Charges

More information

Cloud Service SLA Declaration

Cloud Service SLA Declaration Cloud Service SLA Declaration Basic level of support for Cloud services (SLA 1) Table of Content: 1. Definitions 2. General terms 3. Level of service warranty service functioning 4. Provider`s liability

More information

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Desktop as a Service (DaaS)

Desktop as a Service (DaaS) Desktop as a Service (DaaS) Service Description Last Updated: May 18, 2018 The information in this document may not be reproduced in whole, or in part, nor may any of the information contained therein

More information

SECURE CROSS DOMAIN GUARD

SECURE CROSS DOMAIN GUARD SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this

More information

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

IBM Express Managed Security Services for  Security. Anti-Virus Administrator s Guide. Version 5.31 IBM Express Managed Security Services for Email Security Anti-Virus Administrator s Guide Version 5.31 Table of Contents 1. Service overview...3 1.1 Welcome... 3 1.2 Anti-Virus (AV) features... 3 1.3 How

More information

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo Exam : JK0-015 Title : CompTIA E2C Security+ (2008 Edition) Exam Version : Demo 1.Which of the following logical access control methods would a security administrator need to modify in order to control

More information

BT Assure Cloud Identity Annex to the General Service Schedule

BT Assure Cloud Identity Annex to the General Service Schedule 1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

Dell Service Level Agreement for Microsoft Online Services

Dell Service Level Agreement for Microsoft Online Services Dell Service Level Agreement for Microsoft Online Services 1. Introduction. This Dell Service Level Agreement for Microsoft Online Services (this SLA ) is made by DELL PRODUCTS L.P., A TEXAS LIMITED PARTNERSHIP,

More information

incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments

incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments Data Sheet incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments Why Hosted Spam? Reasons to Buy: Internal Anti-Spam solutions are inconvenient for businesses.

More information

KCOM Business Lightstream Packages

KCOM Business Lightstream Packages KCOM Business Lightstream Packages 1. Introduction & summary Based on fibre optic technology, Lightstream provides superfast and ultrafast internet access with a more reliable connection and faster speeds

More information

SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013

SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 ARTICLE 1: PURPOSE The purpose of these Special Conditions, which supplement the So You Start General Conditions

More information

Service Description. Swisscom Application Cloud Public

Service Description. Swisscom Application Cloud Public Service Description Table of contents 1 Service overview... 3 2 Definitions... 4 2.1 Service ccess Interface Point SIP... 4 2.2 Other service-specific definitions... 5 2.3 Time definitions... 5 3 Specification

More information

VOICE PRODUCT SPECIFICATION

VOICE PRODUCT SPECIFICATION VOICE PRODUCT SPECIFICATION Fixed Voice and Calling Version 1.1 February 2017 Spark Digital, a division of Spark New Zealand Trading Limited 2016 Spark Digital owns copyright and all other intellectual

More information

Securing trust in electronic supply chains

Securing trust in electronic supply chains Securing trust in electronic supply chains www.ukonlineforbusiness.gov.uk/supply Securing trust 1 Introduction: How issues of trust affect e-supply chains Introduction 1 Trust in each element of the supply

More information

3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts.

3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts. Web Email Hosting Agreement 1. General provisions 1. The delivery and the provision of hosting services by WWW INFOTECH is based on the general terms and conditions of WWW INFOTECH LLP and these terms

More information

Security Policy (EN) v1.3

Security Policy (EN) v1.3 Security Policy (EN) v1.3 Author: Erik Klein Langenhorst Date: Sept 21, 2017 Classificatie: 2 Intended for stakeholders only Security Policy (EN) v1.5 Pagina 1 van 9 Version History Version Date Name Changes

More information

JACKSON ENERGY AUTHORITY BROADBAND INTERNET SERVICE DISCLOSURES. Updated June 11, 2018

JACKSON ENERGY AUTHORITY BROADBAND INTERNET SERVICE DISCLOSURES. Updated June 11, 2018 JACKSON ENERGY AUTHORITY BROADBAND INTERNET SERVICE DISCLOSURES Updated June 11, 2018 Consistent with FCC regulations, 1 Jackson Energy Authority ( JEA ) provides this information about our broadband Internet

More information

KCOM Business Lightstream Packages

KCOM Business Lightstream Packages KCOM Business Lightstream Packages 1. Introduction & summary Based on fibre optic technology, Lightstream provides superfast and ultrafast internet access with a more reliable connection and faster speeds

More information

Service Description: Identity Services Engine Implementation-Subscription Service

Service Description: Identity Services Engine Implementation-Subscription Service Page 1 of 6 Service Description: Identity Services Engine Implementation-Subscription Service Services Summary This document describes the Identity Services Engine Implementation. Subscription Service.

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

TELECOMS TERMS & CONDITIONS

TELECOMS TERMS & CONDITIONS TELECOMS TERMS & CONDITIONS The Telecoms Terms and Conditions forms part of 360 Telecoms Ltd General Terms and Conditions which is located on the Website and by request. Should the Customer have any queries

More information

IBM App Connect Enterprise on IBM Cloud

IBM App Connect Enterprise on IBM Cloud Service Description IBM App Connect Enterprise on IBM Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and

More information

SMTP Scanner Creation

SMTP Scanner Creation SMTP Scanner Creation GWAVA4 Copyright 2009. GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com SMTP Scanner SMTP scanners allow the incoming and outgoing

More information

BUSINESS SERVICES. Business services Pricing: Business Broadband & Fibre PRICING DOCUMENTS BROADBAND AND FIBRE SERVICES

BUSINESS SERVICES. Business services Pricing: Business Broadband & Fibre PRICING DOCUMENTS BROADBAND AND FIBRE SERVICES BUSINESS SERVICES PRICING DOCUMENTS BROADBAND AND FIBRE SERVICES Content: A full price list covering the current monthly, one off and time related charges associated to our ADSL Broadband and FTTC Fibre

More information

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CompTIA E2C Security+ (2008 Edition) Exam Exam. CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.

More information

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES Thank you for choosing a PGTelco Internet as your internet service provider. PGTelco Internet is an affiliate of The Prairie Grove Telephone

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

Next Generation Firewalls For Your Network Security

Next Generation Firewalls For Your Network Security Our On-Premises Managed Firewall services go beyond perimeter protection; providing a new Web and Unified Threat Management (UTM) security feature. The solution combines the best-of-breed technologies.

More information

SD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview.

SD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview. SD-WAN Managed Services Expereo SD-WAN Managed Services Overview www.expereo.com/sd-wan Contents 1 SD-WAN MANAGED SERVICES DESCRIPTION... 3 1.1 Consult & Design... 4 1.2 Procurement & Logistics... 4 1.3

More information

Enterprise Protection for the Administrator

Enterprise Protection for the Administrator Enterprise Protection for the Administrator Overview The Proofpoint Protection course covers the protection tools that are available as part of the Proofpoint Suite, including our newest module, Targeted

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (February 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Service Level Agreement for Microsoft Online Services

Service Level Agreement for Microsoft Online Services Service Level Agreement for Microsoft Online Services Last updated on: January 1, 2015 1. Introduction. This Service Level Agreement for Microsoft Online Services (this SLA ) is made by Microsoft in connection

More information

NETWORK PRACTICES. Related documents and disclosures. Use of our Buckeye Express service is also governed by:

NETWORK PRACTICES. Related documents and disclosures. Use of our Buckeye Express service is also governed by: RESIDENTIAL BUCKEYE EXPRESS TM BROADBAND INTERNET ACCESS SERVICE DISCLOSURES Consistent with FCC regulations 1, Buckeye provides this information about our broadband Internet access services. We welcome

More information

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus

More information

50+ Incident Response Preparedness Checklist Items.

50+ Incident Response Preparedness Checklist Items. 50+ Incident Response Preparedness Checklist Items Brought to you by: Written by: Buzz Hillestad, Senior Information Security Consultant at SBS, LLC 1 and Blake Coe, Vice President, Network Security at

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (November 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Best Practices With IP Security.

Best Practices With IP Security. Best Practices With IP Security Presented by Stuart Strong Presented by Stuart Strong s.strong@fecinc.com What are the threats? Know your enemy Network telescope research Current measurement of network

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

Secure Managed Firewall

Secure Managed Firewall Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any

More information

Product Documentation SAP Business ByDesign February Marketing

Product Documentation SAP Business ByDesign February Marketing Product Documentation PUBLIC Marketing Table Of Contents 1 Marketing.... 5 2... 6 3 Business Background... 8 3.1 Target Groups and Campaign Management... 8 3.2 Lead Processing... 13 3.3 Opportunity Processing...

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information