Service Description Safecom Simple Mail Relay Version 3.5
|
|
- Rodney Booker
- 5 years ago
- Views:
Transcription
1 Service Description Safecom Simple Mail Relay Version Telecom NZ Ltd Commercial in Confidence
2 CONTENTS 1 INTRODUCTION SERVICE DEFINITION SERVICE OVERVIEW SERVICE FEATURES CUSTOMER RESPONSIBILITIES SERVICE IMPLEMENTATION STANDARD FEES AND INVOICING STANDARD SAFECOM SIMPLE MAIL RELAY OPTIONAL COMPONENTS EXCLUSIONS Telecom NZ Ltd Page 2 Commercial in Confidence
3 1 INTRODUCTION The purpose of this document is to provide a detailed service description for the Safecom Simple Mail Relay service, whereby the overarching Safecom Service Specification document applies and this document describes information specific to this service. If you require further technical information, please contact your account manager. 2 SERVICE DEFINITION 2.1 SERVICE OVERVIEW is a core application of most organisations whose risks have risen substantially over recent years including spam, viruses and employee abuse (chain mail or high volume personal use with large attachments). A mail relay is a system that transfers messages from servers (Post Offices) to other remote servers. The Safecom Simple Mail Relay service is designed for customers who have their own mail relay system, and need to connect to an upstream mail relay to send and receive from their internal mail systems to the Internet. This is typically used where customers are using other Safecom services, but require their own mail relay systems. The following diagram outlines the key components of the service and its boundaries: Customer s Mail System the customer provides their own mail server, mail scanning systems (such as virus control) and client software on the customer site which connect into the Safecom Simple Mail Relay service. Safecom Connectivity this is comprised of the Safecom Customer Connection service which links the Customer Network into the Gen-i Service Delivery Platform. Connectivity is required to enable communications between the customer s mail systems and the Safecom Simple Mail Relays through to the Internet. o Safecom Simple Mail Relay Systems - these systems act as a frontline proxy to transfer mail to and from the Internet. The Simple Mail Relay Service does not provide virus or content scanning and policy enforcement; if this is required the customer should ask their account manager for the Safecom Secure Mail Relay Service Description which describes the Safecom service that includes these additional security features. Third Party Mail Systems these are the mail servers external to the customer and Safecom that the customer s users send and receive Internet mail to/from. SECURITY SERVICE Network Interface Layer Firewall Systems IDS Firewall Systems SECURITY IDS SERVICE FIGURE 1: SAFECOM SIMPLE MAIL RELAY SERVICE 2006 Telecom NZ Ltd Page 3 Commercial in Confidence
4 The main security threats addressed by the Safecom Simple Mail Relay Service are: Attacks on customer s network devices and mail systems with this service, the only component visible to the Internet is the Safecom Simple Mail Relay system, which has been security hardened and is monitored 24 hours per day x 7 days per week. Customer pre-requisites for use of this service are: Safecom Connectivity the Safecom Customer Connection as detailed in the Safecom Customer Connection service description is required to be configured prior to implementation of the Safecom Simple Mail Relay service. Customer Mail System - as the Simple Mail Relay system does not provide any control or virus screening of messages or attachments, these functions should be implemented on the customers Mail Relay system. If this is not possible, then an alternative would be to upgrade to the Safecom Secure Mail Relay service which includes these features. 2.2 SERVICE FEATURES The Safecom Simple Mail Relay service includes the following features: Simple Mail Relays SMTP Relay Process customers using this service are provided with an SMTP mail relay process. This process allows the customers Mail relay servers to send and receive to/from the Internet. Internet Connectivity and Bandwidth. Firewall Filtering the Safecom firewalls restrict the traffic from the Internet to the Safecom simple mail systems, to specific protocols and addresses. Also, all traffic from the Simple Mail Relay to the customers mail relay systems is limited to specific addresses and protocols of the Safecom Simple Mail relay systems. This service does not provide: Exclusions Policy Enforcement the simple mail relay system does not provide any scanning of or attachment content including spam. It does not restrict based on objectionable content, size, time, or type of attachment. If this is function is required, it must either be implemented on the customers mail relay system or the customer must evaluate/upgrade to the Safecom Secure Mail Relay service.. Virus Scanning the simple mail relay system does not provide any scanning of or attachments for virus infection. If this function is required, it must either be implemented on the customers mail relay system or the customer must evaluate/upgrade to the Safecom Secure Mail Relay service. Reports or Breakdown of Usage Statistics this service does not provide any detailed reports. 2.3 CUSTOMER RESPONSIBILITIES As per the Safecom Service Specification and including the customer s mail system information detailed below. Customer s Mail System This service has been designed to work with customers mail relay systems. Therefore, it is important that customers have their own mail relay system, and ensure that it is kept up to date with security patches, virus and spam updates Telecom NZ Ltd Page 4 Commercial in Confidence
5 2.4 SERVICE IMPLEMENTATION This section of the service description provides information on the provisioning process for the Safecom Simple Mail Relay service, and the steps involved. The overarching Safecom Service Specification should be reviewed as this table is specific to the Safecom Simple Mail Relay service. The following is an outline of a typical implementation of this service: Implementation Team Responsibilities Customer Responsibilities Pre-requisite Configure the Safecom Customer Connection if not already configured for other services. As per the Safecom Customer Connection service description. Pre-Sales Scope pre-implementation work and estimate costs. Complete Design Proposal (if applicable). Provide accurate information for business and technical requirements, including identifying domains and customer mail relay addresses. Contract, Technical Specification & Statement of Work Design and Integration Engineer completes the Safecom Simple Mail Relay service section of the Technical Specification. Prepare Safecom Contract Variation (if applicable). Complete Statement of Work. Sign Safecom Contract Variation (if applicable) Develop a test plan to set the criteria for successful implementation of all functionality. Agree and signoff Statement of Work. Configure Firewalls and Relays The Safecom Implementation Engineer will configure the customer instance of the Simple Mail Relay service based on the customer s requirements i.e. configure firewalls, routing, domains etc and provide the customer with the Mail Relay address. Migration of Domain Hosting if required In cases where the customer chooses to migrate their domain hosting to Xtra, the customer is to arrange with the organisation providing existing domain hosting services to migrate them to Xtra. Cut over Outbound Mail and Test The Safecom Implementation Engineer will work with the customer to cut over outbound mail. Typically this is coordinated so that when the change is made to the customer s mail server, the Implementation Engineer is monitoring the messages out and can immediately identify problems if they occur. The customer s technical person will work with the Safecom Implementation Engineer to test the service outbound from the customer s site. Cut over Inbound Mail and Test This requires changes to the domain records held by the Internet Service Provider (ISP) where the domain is hosted. If this ISP is Xtra, the Safecom Implementation Engineer will coordinate this change. The Safecom Implementation Engineer will assist with testing DNS changes are successful and that mail communications from an external mail client to a customer recipient is successful. If the ISP is not Xtra, the customer s technical person will co-ordinate the domain record changes when given the go ahead from the Safecom Implementation Engineer. The customer s technical person will work with the Safecom Implementation Engineer to test the service inbound from the customer s site Telecom NZ Ltd Page 5 Commercial in Confidence
6 Integration Completion Work with customer to ensure all requirements in the Statement of Work are met. Sign off Safecom solution to acknowledge delivery of functionality as agreed. Handover to SOC (Security Operations Centre) Ensure customer is aware that the services are in production and are aware of SOC s problem management and change control processes. Ensure support processes are communicated to all relevant internal parties. Each of the above stages includes discussions between the Safecom Implementation Engineer and the customer technical contact, as well as testing and sign-off processes. SAFECOM DNS Safecom mail relay servers provide customers with name resolution for all Internet domains. Configuration Information 2006 Telecom NZ Ltd Page 6 Commercial in Confidence
7 3 STANDARD FEES AND INVOICING The actual costs for this service are detailed in the Safecom Price schedule. In addition to the Safecom Service Specification fee information, the following information pertains to the Safecom Simple Mail Relay service specifically. 3.1 STANDARD SAFECOM SIMPLE MAIL RELAY ONE-OFF INSTALLATION FEES Installation fees are invoiced in arrears and cover items such as: Creation of access controls from Safecom into the customer s network. Configuration of the mail relay systems for the customer instance. Initial test of the mail send and receive process in co-ordination with the customer s technical resource. Liaison with customer for service establishment, training and roll-out. FIXED MONTHLY FEES Monthly fees are invoiced one (1) month in advance and cover items such as: Maintenance and monitoring of the Simple Mail Relay process. VARIABLE MONTHLY FEES Usage fees are invoiced in arrears and cover items such as: Simple Mail Relay Internet Traffic Costs this is a cumulative amount of Internet traffic that is used by the customer through the Simple Mail Relay service. This is charged on a per-megabyte of data and includes traffic in both directions. Installations, moves, adds and changes are invoiced in arrears. For more information on these see the overarching Safecom Services Specification. 3.2 OPTIONAL COMPONENTS There are no optional components for this service 3.3 EXCLUSIONS Other Safecom services such as the Secure Customer Connection are detailed in separate service descriptions and pricing of each service can be obtained from the Safecom Price Schedule. Costs of separate services are not included in the pricing of the Safecom Simple Mail Relay service Telecom NZ Ltd Page 7 Commercial in Confidence
Service Description Safecom Customer Connection Version 3.5
Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationONE OFFICE LITE - PRODUCT SPECIFICATION
1. INTRODUCTION ONE OFFICE LITE - PRODUCT SPECIFICATION This document contains product information for the One Office Lite service. If you require more detailed technical information, please contact your
More informationMETRO LAN EXTENSION - PRODUCT SPECIFICATION
METRO LAN EXTENSION - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Metro LAN Extension service. If you require more detailed technical information, please contact your
More informationHOSTING SERVICES AGREEMENT
HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule
More informationTELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD GEN2 SERVICES Our cloud infrastructure solutions are made up of a combination
More informationIBM Managed Security Services for Security
Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus
More information1.1. Agreement means this document together with the Ignite General Terms and Conditions.
IGNITE SECUREMAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of this product
More informationIBM Managed Security Services (Cloud Computing) hosted and Web security - express managed security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed e-mail security Z125-8581-01 12-2010 Page 1 of 15 Table of Contents 1. Scope of Services... 3 2. Definitions...
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationConnecting to Mimecast
Page 1 of 5 0 KBID10577 Connecting to Mimecast Congratulations and welcome to Mimecast! Thank you for making the choice to move your email management to the cloud with the Mimecast Unified Email Management
More informationComendo mail- & spamfence
Upgrade Guide Resellers Comendo mail- & spamfence VERSION 10-05-2016 TABLE OF CONTENTS INTRODUCTION... 3 OVERVIEW... 4 1. Preparation... 4 2. Provisioning... 4 3. Upgrade... 4 4. Finalisation... 4 COMPARISON...
More informationAn atmail cloud licence is a single licence type that includes the following features: webmail; contacts; calendars; tasks and files.
FAQ: atmail cloud Last updated 27 November 2018 SALES How do I contact atmail Sales? Please complete the Contact Us form on our site. What does an atmail cloud licence include? An atmail cloud licence
More informationAn atmail cloud licence is a single licence type that includes the following features: webmail; contacts; and calendars.
FAQ: atmail cloud Last updated 31 October 2017 SALES How do I contact atmail Sales? Please complete the Contact Us form on our site. What does an atmail cloud licence include? An atmail cloud licence is
More informationIGNITE HOSTED PREMIUM MAIL TERMS AND CONDITIONS OF SERVICE. 1. Definitions. 2. Services
IGNITE HOSTED PREMIUM MAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of
More informationFRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES
FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC 1 regulations, Frankfort Plant Board (FPB) provides this information about our broadband Internet access
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationTELIA YHTEYS KOTIIN SERVICE DESCRIPTION
This service description tells you what your service contains. The service description is part of your Telia Yhteys kotiin agreement. The Telia Yhteys kotiin subscription (hereafter subscription ) is a
More informationSetting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationSERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement governs the use of the Services under the terms of the Master Service Agreement (the Agreement ) between CODEBLUE TECHNOLOGY
More informationManaged Operating System (OS)
Managed Operating System (OS) This CenturyLink Service Guide ( SG ) sets forth a description of Managed Operating System ( Service ) offering by CenturyLink, including technical details and additional
More informationEnterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE
VOLUME 1, SECTION 5.7: SECURE MANAGED EMAIL SERVICE 5.7 SECURE MANAGED EMAIL SERVICE (SMES) [C.2.10.8] The Level 3 Team s (SMES) will meet or exceed the Government s requirements for SMES, as defined in
More informationSecurity with FailSafe
Email Security with FailSafe Anti spam and anti virus protection and email continuity for your mail server Email Security provides comprehensive and highly effective virus, spam and content filtering of
More informationSchedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management
More informationSCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service
More informationYou can purchase directly through our online store.
atmail cloud FAQ Last updated 31 October 2017 QUESTION SALES How do I contact atmail Sales? What does an atmail cloud licence include? Please complete the Contact Us form on our site to contact our sales
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationProtection Service with Continuity
EveryCloud Email Protection Service Cloud Based Anti-Spam, Anti-Virus and Business Email Management. Block spam and email viruses in the cloud before they reach your network, whilst taking control of your
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationCOLOCATION - PRODUCT SPECIFICATION
COLOCATION - PRODUCT SPECIFICATION 1 INTRODUCTION This document contains information on the Colocation service. If you require more detailed technical information, please contact your Account Manager.
More informationOwner of the content within this article is Written by Marc Grote
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management
More informationSecurity Annex for Firewalls Additional Terms for Firewall Service
CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable
More informationSERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between CDS Office Technologies
More informationADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)
ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access
More informationService Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement)
Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Effective Date: Document Owner: Cybersmart ISP Version Version Date Description Author 1.0.2 03-01-201 Service
More informationCERANET SERVICE LEVEL AGREEMENT
Page 1 of 5 CERANET SERVICE LEVEL AGREEMENT This CeraNet Service Level Agreement ("SLA") applies to all dedicated servers and Co-location services. The Client agrees that CeraNet internal measurements
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationE FAX - PRODUCT SPECIFICATION
E FAX - PRODUCT SPECIFICATION 1 INTRODUCTION This document contains information on the efax service. information, please contact your Account Manager. If you require more detailed technical Telecom will
More informationKUHN COMMUNICATIONS, INC BROADBAND INTERNET ACCESS SERVICE DISCLOSURES
KUHN COMMUNICATIONS, INC BROADBAND INTERNET ACCESS SERVICE DISCLOSURES Consistent with FCC regulations, 1 Kuhn Communications, Inc. referred to as Kuhn Communications, provides this information about our
More informationSLA. Service Level Agreement v1.0. Published: September 2014
SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because
More informationNYMBLE INTERNET ACCESS SERVICE DISCLOSURES
NYMBLE INTERNET ACCESS SERVICE DISCLOSURES Consistent with FCC regulations, Nymble Internet Service provides this information about our Internet access services ( Nymble or Nymble services ). We welcome
More informationService Level Agreement (SLA) and Service Level Objectives (SLO)
Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3
More informationCOMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES
Updated December 2018 COMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 commzomm provides this information about our broadband Internet access services. We call our broadband
More informationMAILGUARD AND MICROSOFT EXCHANGE 2013
MAILGUARD AND MICROSOFT EXCHANGE 2013 MailGuard Secure Email Filtering MailGuard: support@mailguard.com.au Phone: 1300 30 65 10 www.mailguard.com.au TABLE OF CONTENTS Introduction 3 Document and Naming
More informationSERVICE DESCRIPTION MANAGED FIREWALL/VPN
Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...
More informationManaged Security Services - Automated Analysis, Threat Analyst Monitoring and Notification
Service Description Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification The services described herein are governed by the terms and conditions of the agreement specified
More informationSymantec Security.cloud
Data Sheet: Messaging Security filters unwanted messages and protects mailboxes from targeted attacks. The service has selflearning capabilities and Symantec intelligence to deliver highly effective and
More informationCyber-Chiro: Websites That Work Application Form
Cyber-Chiro: Websites That Work Application Form In order for us to properly prepare for you, a real website that actually works, you must first fill this out this application in detail and with clarity.
More informationClear Choice Communications BROADBAND INTERNET SERVICE DISCLOSURES
Updated 12/20/2016 Clear Choice Communications BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 Clear Choice Communications provides this information about our broadband Internet
More informationBlock Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection
SecureSMART Block Email Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable email protection SecureSMART protects your network from viruses, spam, advanced
More informationOUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB
CONTENTS Click on the section that you are interested in. 1 About the Mcafee endpoint protection Essential for SMB 2 2 Mcafee Endpoint Protection Essential for SMB applications 2 Eligibility 2 3 Charges
More informationCloud Service SLA Declaration
Cloud Service SLA Declaration Basic level of support for Cloud services (SLA 1) Table of Content: 1. Definitions 2. General terms 3. Level of service warranty service functioning 4. Provider`s liability
More informationSCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017
SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationDesktop as a Service (DaaS)
Desktop as a Service (DaaS) Service Description Last Updated: May 18, 2018 The information in this document may not be reproduced in whole, or in part, nor may any of the information contained therein
More informationSECURE CROSS DOMAIN GUARD
SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this
More informationIBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31
IBM Express Managed Security Services for Email Security Anti-Virus Administrator s Guide Version 5.31 Table of Contents 1. Service overview...3 1.1 Welcome... 3 1.2 Anti-Virus (AV) features... 3 1.3 How
More informationExam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo
Exam : JK0-015 Title : CompTIA E2C Security+ (2008 Edition) Exam Version : Demo 1.Which of the following logical access control methods would a security administrator need to modify in order to control
More informationBT Assure Cloud Identity Annex to the General Service Schedule
1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationThe Honest Advantage
The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationDell Service Level Agreement for Microsoft Online Services
Dell Service Level Agreement for Microsoft Online Services 1. Introduction. This Dell Service Level Agreement for Microsoft Online Services (this SLA ) is made by DELL PRODUCTS L.P., A TEXAS LIMITED PARTNERSHIP,
More informationincloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments
Data Sheet incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments Why Hosted Spam? Reasons to Buy: Internal Anti-Spam solutions are inconvenient for businesses.
More informationKCOM Business Lightstream Packages
KCOM Business Lightstream Packages 1. Introduction & summary Based on fibre optic technology, Lightstream provides superfast and ultrafast internet access with a more reliable connection and faster speeds
More informationSPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013
SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 ARTICLE 1: PURPOSE The purpose of these Special Conditions, which supplement the So You Start General Conditions
More informationService Description. Swisscom Application Cloud Public
Service Description Table of contents 1 Service overview... 3 2 Definitions... 4 2.1 Service ccess Interface Point SIP... 4 2.2 Other service-specific definitions... 5 2.3 Time definitions... 5 3 Specification
More informationVOICE PRODUCT SPECIFICATION
VOICE PRODUCT SPECIFICATION Fixed Voice and Calling Version 1.1 February 2017 Spark Digital, a division of Spark New Zealand Trading Limited 2016 Spark Digital owns copyright and all other intellectual
More informationSecuring trust in electronic supply chains
Securing trust in electronic supply chains www.ukonlineforbusiness.gov.uk/supply Securing trust 1 Introduction: How issues of trust affect e-supply chains Introduction 1 Trust in each element of the supply
More information3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts.
Web Email Hosting Agreement 1. General provisions 1. The delivery and the provision of hosting services by WWW INFOTECH is based on the general terms and conditions of WWW INFOTECH LLP and these terms
More informationSecurity Policy (EN) v1.3
Security Policy (EN) v1.3 Author: Erik Klein Langenhorst Date: Sept 21, 2017 Classificatie: 2 Intended for stakeholders only Security Policy (EN) v1.5 Pagina 1 van 9 Version History Version Date Name Changes
More informationJACKSON ENERGY AUTHORITY BROADBAND INTERNET SERVICE DISCLOSURES. Updated June 11, 2018
JACKSON ENERGY AUTHORITY BROADBAND INTERNET SERVICE DISCLOSURES Updated June 11, 2018 Consistent with FCC regulations, 1 Jackson Energy Authority ( JEA ) provides this information about our broadband Internet
More informationKCOM Business Lightstream Packages
KCOM Business Lightstream Packages 1. Introduction & summary Based on fibre optic technology, Lightstream provides superfast and ultrafast internet access with a more reliable connection and faster speeds
More informationService Description: Identity Services Engine Implementation-Subscription Service
Page 1 of 6 Service Description: Identity Services Engine Implementation-Subscription Service Services Summary This document describes the Identity Services Engine Implementation. Subscription Service.
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationTELECOMS TERMS & CONDITIONS
TELECOMS TERMS & CONDITIONS The Telecoms Terms and Conditions forms part of 360 Telecoms Ltd General Terms and Conditions which is located on the Website and by request. Should the Customer have any queries
More informationIBM App Connect Enterprise on IBM Cloud
Service Description IBM App Connect Enterprise on IBM Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and
More informationSMTP Scanner Creation
SMTP Scanner Creation GWAVA4 Copyright 2009. GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com SMTP Scanner SMTP scanners allow the incoming and outgoing
More informationBUSINESS SERVICES. Business services Pricing: Business Broadband & Fibre PRICING DOCUMENTS BROADBAND AND FIBRE SERVICES
BUSINESS SERVICES PRICING DOCUMENTS BROADBAND AND FIBRE SERVICES Content: A full price list covering the current monthly, one off and time related charges associated to our ADSL Broadband and FTTC Fibre
More informationCompTIA E2C Security+ (2008 Edition) Exam Exam.
CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.
More informationPGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES
PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES Thank you for choosing a PGTelco Internet as your internet service provider. PGTelco Internet is an affiliate of The Prairie Grove Telephone
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define
More informationNext Generation Firewalls For Your Network Security
Our On-Premises Managed Firewall services go beyond perimeter protection; providing a new Web and Unified Threat Management (UTM) security feature. The solution combines the best-of-breed technologies.
More informationSD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview.
SD-WAN Managed Services Expereo SD-WAN Managed Services Overview www.expereo.com/sd-wan Contents 1 SD-WAN MANAGED SERVICES DESCRIPTION... 3 1.1 Consult & Design... 4 1.2 Procurement & Logistics... 4 1.3
More informationEnterprise Protection for the Administrator
Enterprise Protection for the Administrator Overview The Proofpoint Protection course covers the protection tools that are available as part of the Proofpoint Suite, including our newest module, Targeted
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (February 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationService Level Agreement for Microsoft Online Services
Service Level Agreement for Microsoft Online Services Last updated on: January 1, 2015 1. Introduction. This Service Level Agreement for Microsoft Online Services (this SLA ) is made by Microsoft in connection
More informationNETWORK PRACTICES. Related documents and disclosures. Use of our Buckeye Express service is also governed by:
RESIDENTIAL BUCKEYE EXPRESS TM BROADBAND INTERNET ACCESS SERVICE DISCLOSURES Consistent with FCC regulations 1, Buckeye provides this information about our broadband Internet access services. We welcome
More informationCERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES
CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus
More information50+ Incident Response Preparedness Checklist Items.
50+ Incident Response Preparedness Checklist Items Brought to you by: Written by: Buzz Hillestad, Senior Information Security Consultant at SBS, LLC 1 and Blake Coe, Vice President, Network Security at
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (November 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationBest Practices With IP Security.
Best Practices With IP Security Presented by Stuart Strong Presented by Stuart Strong s.strong@fecinc.com What are the threats? Know your enemy Network telescope research Current measurement of network
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationSecure Managed Firewall
Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any
More informationProduct Documentation SAP Business ByDesign February Marketing
Product Documentation PUBLIC Marketing Table Of Contents 1 Marketing.... 5 2... 6 3 Business Background... 8 3.1 Target Groups and Campaign Management... 8 3.2 Lead Processing... 13 3.3 Opportunity Processing...
More informationTELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More information