Critical Questions to Ask Before Outsourcing IT Management

Size: px
Start display at page:

Download "Critical Questions to Ask Before Outsourcing IT Management"

Transcription

1 Critical Questions to Ask Before Outsourcing IT Management Maury Weinstein President x 4319 mweinste@syssrc.com Celebrating 35 years under continuous ownership in Baltimore

2 We Hope You are Enjoying Your Pizza!! If it hasn t arrived by 12:15 Please double check with your receptionist Then call / Tracey Maranto: tmaranto@syssrc.com OR x4355 (we are recording the webinar so don t think twice about stepping away for a few minutes to go pick it up at your front desk!

3

4 Critical Questions to Ask Before Outsourcing IT Management Am I outsourcing the right portion of IT? Help me understand services scope to prevent budget surprises? How will you help me mature my IT? How do you measure success? How are support requests handled? What is done proactively to lower organizational risks? What will management see? Do you have the people, process and tools to manage my IT? How does the team share information about my IT environment? Are your clients satisfied? How will you train me on industry trends?

5 Run, Grow and Transform: Assigning Responsibilities

6 Outsource Run To Grow & Transform Transform Run Grow

7 We Hope You are Enjoying Your Pizza!! If it hasn t arrived by 12:15 Please double check with your receptionist Then call / Tracey Maranto: tmaranto@syssrc.com OR x4355 (we are recording the webinar so don t think twice about stepping away for a few minutes to go pick it up at your front desk!

8 Managed Services Definition Full or partial IT services delivered: Including IT management With a service level agreement (SLA) At a fixed price for easy budgeting With technology for remote management

9 Easy Services Scope Definition Broadly - include management and services of an inhouse IT department User adds, moves and change allowance for out of scope requests Must be definable and easily articulated

10 In Scope Services Help desk People, process and tools Mobile management (optional) On-site support Network administration Standardization Seamless project and support coordination Backup configuration and completion checks Business reviews Printer management (pay for consumables only) System restoration Hardware maintenance (pay for out of warranty parts only) Satisfaction surveys Blacklist monitoring Training classes SQL maintenance plans Security controls Monitoring APC UPSs Licensing audits Level 4 consultants 90 step onboarding Network documentation Presentation Systems Maintenance (opt.) Seamless between onpremises and cloud Adds, moves and change allowance

11 Out of scope: Watch Other s Scope Projects, such as..ms SQL support, >2 single file restores per month, server restores and disaster recovery services The cost of 3rd party support or incident fees of any kind Support for special circumstances (e.g. establishment of a VPN connection for a new office) Service for copiers, scanners and multi-function printers

12 People IT Maturity Model Survival Awareness Committed Proactive Service Aligned No focus on IT infrastructure or operations Technologycentric organization for IT infrastructure and operations Technologycentric organization; investment in IT service desk Processcentric organization Customer and business focused IT service and delivery organization Business Partnership Business optimization and entrepreneurial culture Process No formal process for IT infrastructure and operations Ad hoc but aware processes are necessary Defined processes for IT service, support and project management Repeatable and automated; focus on IT service delivery processes Integrated, automated; focus on service and business management processes Dynamic optimization of IT services; implement processes fostering innovation Tools No formal strategy or execution on investments Basic management tools; no formal hardware and software standards IT support and project management tools; desktop hardware and software standards; begin infrastructure rationalization Formal infrastructure standards and policies; management tools; virtualized infrastructure Formal IT management process/tools architecture, shared services, aggregated capacity management Proactively promoting new technologies to impact business Support Method Reactive Time & Materials Recurring Scheduled Hours (Professional Affordable IT) Managed Services

13 Goal: Increasing User Productivity Ticket Count Per User/Per Business Day % Avoiding 40% of tickets at $25/pp/hour average downtime cost = $120/pp/year for 1 hour/ticket total tickets per user/business day 3 per. Mov. Avg. (total tickets per user/business day)

14 Ticket Causes by Number of Tickets

15 Measurements Can Increase Satisfaction or Reduce It

16 Resolution Path Requests from ticket system, phone or Assign to appropriate engineer Users receive ticket updates automatically Ticket held open a day after close to ensure resolution Single question satisfaction survey sent

17 Recovery Time and Point Objectives for Lower Downtime Costs Cost = labor to restore transactions lost $100/pp/day average cost at 50% productivity loss

18 Security Risk Reduction Actionable reporting Research based recommendations Verizon Data Breach Investigation Gartner Reports Security Quick Wins from SANS Highest level of confidentiality

19 Actionable Security Reports 1. User accounts with escalated administrative privileges 2. User accounts not logged in within last 90 days 3. Computers not connected to domain in >90 days 4. Computers with outdated OSs (Server 2003/08 and XP) 5. Proofpoint spam filtering and spooling report 6. Symantec Enterprise Protection risk report 7. Report showing passwords not changed in 90 days 8. Password policy 9. Log retention policy settings 10. Account lockout monitoring 11. Bad password attempt monitoring 12. Office 365 security score 13. Screen lock settings

20 Prioritize Security Purchases

21 Proactivity Drives Productivity and Risk Reduction I know which computer has a virus!

22 Performance Reports Address Risk Network Health Score Patch Score 91%* 1/4 OS Score 96%* 1/4 Disk Score 90%* 1/4 Server Uptime Score 100%* 1/4 94% CDP-MIB/CDP- S S S S S S S Client A SonicWall CDP RESTON SonicWall CDP / Acronis M-F Full Backup (xxxfile1) xxxfile01 S S S S S M-F Full Backup (xdc1) xxxdc1 S S S S S $100/pp/day average downtime cost at 50% productivity loss

23 Business Reviews Add best practices Review technology recommendations with ROI Evaluate futures Budgeting Satisfaction survey feedback Ticket analysis Prioritize needs Quick glance best practices dashboard Contribute in non-it ways

24 client server 1 client server 2 client server 3 client server 4 client server 5 client server 6 Site Specific Initial Check <Date> <Client Name> Best Practices Quick Glance RTO by site RPO by site Backup retention off-site Backup retention on-site Backup selection and type Backup software Backup - GRT and Object based Backup capacity Active Directory security scans Server age Warranty coverage Patch policy Password policy Bandwidth suitability Anti-Virus standard Wireless Access Network drawing UPS run time during power outage Phishing mitigation Office 365 license review 7 x 24 Client Readiness Remote server management Redundant internet connections with auto-failover 7x24 service repair contracts Off-hour, local backup media availability Quick server restoration Quick workstation builds/restoration 7x24 support contracts for line of business software Legend System Source Standards Client Selects Short (hours), Medium (>1 day), Long (multiple days) Client Selects Short (hours), Medium (>1 day), Long (multiple days) Backup Standard Backup Standard Backup Standard Backup Standard Backup Standard As recommended by Managed Services Client answers questions raised during last period's Active Directory scans Replacement standard is 3-5 years. Base warranty hardware coverage at minimum Patch Standard checked annually Password Standard checked annually Two paths via different vendors and suitable speed Using supported version of Symantec Enterprise Protection Wireless Standard Network drawing reviewed annually Client annually selects UPS run time in the event of a power outage Not accepting from your domain via external systems Office 365 licensing reviewed annually to match user count and licenses purchased HP ILO or DELL DRAC cards in all critical servers for off-site out of band management Cisco/Sonicwall Failover or Ecessa Load Balanced Standard 7x24 guaranteed call to repair service contracts Backup Standard Virtualized or imaged servers for quick restores Image ready for workstation restore 7x24 support contracts for line of business software Meets or Exceeds Standard Caution Unknown, Needs Discussion or does not Meet Standard Not Applicable

25 Office 365 Exchange versus On-Premise ROI SAVINGS Initial Cloud Investment Year 1 Cloud Savings Year 2 Cloud Savings Year 3 Cloud Savings Year 4 Cloud Savings Year 5 Cloud Savings Year 6 Cloud Savings $ (11,386) $ 46,506 $ (360) $ (360) $ 46,506 $ (360) $ (36 Savings Through Year X $ 35,120 $ 34,760 $ 34,400 $ 80,906 $ 80,546 $ 80,186 ANALYSIS Year 1 Year 2 Year 3 Year 4 Year 5 Year 6 Traditional On-Premise Deployment Hardware (Including Server Licensing) Exchange Server Hardware $ 8,934 $ 8,934 SharePoint Server Hardware $ 13,152 $ 13,152 Lync Server Hardware $ - $ - Licensing Exchange CALs $ 4,080 $ 4,080 SharePoint Standard CALs $ 5,700 $ 5,700 Lync CALs $ - $ - ecal $ - $ - Office Pro Plus $ - $ - Support Exchange User Support $ 5,004 $ 5,004 $ 5,004 $ 5,004 $ 5,004 $ 5,00 SharePoint User Support $ 5,004 $ 5,004 $ 5,004 $ 5,004 $ 5,004 $ 5,00 Full Suite Support $ - $ - $ - $ - $ - $ - Consulting and Migration Exchange Migration Costs $ 7,500 $ 7,500 SharePoint Migration Costs $ 7,500 $ 7,500 Office Migration Costs* Administration Exchange Administration $ 4,500 $ 4,500 $ 4,500 $ 4,500 $ 4,500 $ 4,50 SharePoint Administration $ 4,500 $ 4,500 $ 4,500 $ 4,500 $ 4,500 $ 4,50 Lync Administration $ - $ - $ - $ - $ - $ - Total $ 65,874 $ 19,008 $ 19,008 $ 65,874 $ 19,008 $ 19,008 Cloud Based Deployment Microsoft O365 Fees $ 5,760 $ 5,760 $ 5,760 $ 5,760 $ 5,760 $ 5,76 O365 Enhanced User Support $ 10,008 $ 10,008 $ 10,008 $ 10,008 $ 10,008 $ 10,00 Enhanced Server Support $ 3,600 $ 3,600 $ 3,600 $ 3,600 $ 3,600 $ 3,60 One-time Migration Costs- Exchange $ 3,886 One-time Migration Costs- SharePoint $ 7,500 One-time Migration Costs- Lync $ - Total $ 19,368 $ 19,368 $ 19,368 $ 19,368 $ 19,368 $ 19,368 $ (11,386) 46,506 (360) (360) 46,506 (360) (36 User Count 60

26 The People, Process and Tools to Deliver Organizational Benefits

27 Competent Staff Pre-hire testing including background Lots of certifications 17 years of IT experience for engineers Project consultants for tough questions Average tenure 22 years with System Source Single point of contact

28 Process Produces More Uptime

29 Staff Entrance and Exit Detailed procedures onboard/exit new staff efficiently Employee Exit Checklist Employee Name Phone Location Standard service level agreement is 2 business hours after form submission (w/o PC handling) Exit Terms Termination Resignation Exit Date/Time Network access: File Retention Mailbox Handling Time: Remove user from all non-primary groups, hide from the global access list and: Change network password Requested Password: Delete network account effective (Deletes Mailbox in 30 days after deletion) Disable network account effective Delete Network Account on Click here to enter a date. Retain Personal Network Directory Give access to the Personal Network Directory to: Retain local My Documents folder Move My Documents folder to: Give access to the My Documents folder to Retain existing mailbox (available only if account is not deleted) Allow Inbox to receive Give mailbox proxy rights to: Forward new to: Create out of office reply to alert senders with the following message: Use Default (messages will be forwarded for one year from departure): Your has been forwarded to for attention. For immediate assistance please contact at or . Thanks Alternate message: Save the mailbox as a static file (.pst) to

30 Manufacturer Model User Name Password Enable Password ISP Name IP (Labeled on Device) Support Account Name - Account User Account Password Location Support Contract Vendor Serial Number Contract Type Contract Number Last Backup Date Backup Location Managed Services Data Collection Device Type Firewall SonicWall TZ (W AN) (LAN) ISP Router TrendNet Switch SMC N/A Switch SMC N/A Switch SMC N/A Switch SMC N/A Device NetGear ProSafe Dua lwan VPN GB Firewall admin Server Room

31 Client Satisfaction Results Problem was fixed before I knew there was a problem. He was as cool as the other side of the pillow.

32 Customer Satisfaction Results Managed Service Satisfaction Scores 100% 96% 95% 94% 94% 93% 94% 95% 95% 90% 94% 92% 92% 91% 93% 94% 95% 97% 93% 94% 94% 95% 96% 94% 97% 95% 95% 80% 70% 60% 50% 40% Based on > 4000 responses annually 30% 20% 10% Mar-15 May-15 Jul-15 Sep-15 Nov-15 Jan-16 Mar-16 May-16 Jul-16 Sep-16 Nov-16 Jan-17 Mar-17

33 Our Management Seminar Series Learning from our 145,000 Completed IT Support Tickets and 13,750 Satisfaction Surveys Security Lessons from Verizon's Analysis of 79,790 Security Incidents Reducing Your IT Costs Evaluating Managed IT Services Cloud Strategy Building a Cost Effective and Crisis Free IT Team 6 Security Questions to Ask IT

34 Ask About IT Phone Lines Now Open! (please mute if you are not speaking! Thanks!)

Welcome. Actionable Ideas for Improving IT Operations Maury Weinstein,

Welcome. Actionable Ideas for Improving IT Operations Maury Weinstein, Welcome Actionable Ideas for Improving IT Operations Maury Weinstein, mweinste@syssrc.com What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenter will review the

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Welcome. Security: First Line of Defense. Chris Riley Director x4331

Welcome.  Security: First Line of Defense. Chris Riley Director x4331 Welcome Email Security: First Line of Defense Chris Riley Director criley@syssrc.com 410-771-5544 x4331 We Hope You are Enjoying Your Pizza!! If it hasn t arrived by 12:15 Please double check with your

More information

NetCare LITE. NetCare LAN. NetCare SERVER. NetCare WORKSTATION. NetCare MOBILE. NetCare ON-SITE. NetCare 365

NetCare LITE. NetCare LAN. NetCare SERVER. NetCare WORKSTATION. NetCare MOBILE. NetCare ON-SITE. NetCare 365 Summary of IT Support Services Unit 12 Epsom Business Park Kiln Lane Epsom Surrey KT17 1JF Tel: 0844 770 7000 sales@intralan.co.uk www.intralan.co.uk This datasheet sets out a summary of all IT services

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

Welcome! Considering a Warm Disaster Recovery Site?

Welcome! Considering a Warm Disaster Recovery Site? Welcome! Considering a Warm Disaster Recovery Site? Today s Moderator: Chris Riley Director 410-771-5544 x4331 criley@syssrc.com Today s Presenter: Rich Glenn Director 410-771-5544 x4420 rglenn@syssrc.com

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

ConRes IaaS Management Services for Microsoft Azure

ConRes IaaS Management Services for Microsoft Azure ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...

More information

IT SUPPORT ANNUAL MAINTENANCE CONTRACT GET AN WITH US & RELAX ROUND THE CLOCK +971 (6) Server Setup. IT Services.

IT SUPPORT ANNUAL MAINTENANCE CONTRACT GET AN WITH US & RELAX ROUND THE CLOCK +971 (6) Server Setup. IT Services. +971 (6) 544 7890 CALL US Server Setup ROUND THE CLOCK IT SUPPORT IT Services Hardware Maintenance Contract GET AN ANNUAL MAINTENANCE CONTRACT WITH US & RELAX Structured Cabling CCTV System Time Attendance

More information

Mehmet.Gonullu@Veeam.com Veeam Portfolio - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable - Storage agnostic High-speed Recovery instant VM recovery

More information

One Hospital s Cybersecurity Journey

One Hospital s Cybersecurity Journey MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

SLA. Service Level Agreement v1.0. Published: September 2014

SLA. Service Level Agreement v1.0. Published: September 2014 SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because

More information

Windows Server 2012/R2 Overview

Windows Server 2012/R2 Overview END OF LICENSE Windows Server 2012/R2 Overview December 31 st, 2017 Agenda Understanding the opportunity Win with Windows Server 2016 Next steps Understanding the opportunity Windows Server 2012/R2 End

More information

Network Performance, Security and Reliability Assessment

Network Performance, Security and Reliability Assessment Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD

More information

SUMMARY OF SERVICES PROVIDED

SUMMARY OF SERVICES PROVIDED SUMMARY OF SERVICES PROVIDED Desktop Desktop Included Anti-Virus Software license for all PC s Anti-Spyware License for all PC s Automated managed distribution of monthly Windows updates Unlimited Remote

More information

Knowall Cloud. Performance Hosting Delivered

Knowall Cloud. Performance Hosting Delivered Knowall Cloud Performance Hosting Delivered Connect with Knowall s Secure Private Cloud Solution The objective is to deliver a simple to use, centrally hosted IT and phone system, accessible by all users

More information

PTS Customer Protection Agreement

PTS Customer Protection Agreement PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone

More information

Senior Technical Consultant

Senior Technical Consultant Senior Technical Consultant Department Service Department Reporting to Service Manager Our Company Wanstor is an IT Solutions Company celebrating their 16 th year in business. The company has grown year

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

Kaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3

Kaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3 Kaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3 Kaseya is dedicated to perfecting the IT Service experience through continuous technology innovation and the highest standards of Service.

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Simplify Backups. Dell PowerVault DL2000 Family

Simplify Backups. Dell PowerVault DL2000 Family Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

NSA s Enterprise Level Zoom Subscription FAQ

NSA s Enterprise Level Zoom Subscription FAQ 1. What does plus more mean in terms of features? With the NSA package members receive: 1 Meeting License ($14.99 if bought individually) 1 Webinar 500 License ($140 if bought individually) Unlimited Cloud

More information

MICROSOFT APPLICATIONS

MICROSOFT APPLICATIONS MICROSOFT APPLICATIONS MICROSOFT SOFTWARE SOLUTIONS THE EFFECTIVE WAY TO DELIVER MICROSOFT APPLICATIONS The Microsoft Office suite of applications are a business essential; one that is used each and every

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

Ensure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards

Ensure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards Job description and person specification Senior ICT Officer Reports to: ICT Manager Purpose This role supports the provision of a high quality and measurable ICT infrastructure support service whilst delivering

More information

ITSM SERVICES. Delivering Technology Solutions With Passion

ITSM SERVICES. Delivering Technology Solutions With Passion ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past

More information

CONTENTS OF THIS REPORT

CONTENTS OF THIS REPORT CONTENTS OF THIS REPORT Site Overview Executive Summary Network Health Overview Network Assessment Manage Devices by Operating System Remote Control Usage Select report by clicking on the title, the report

More information

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer

More information

3.30pm. A sneak peek at Veeam 2018 releases Veeam for VMware Cloud on AWS technical deep dive Veeam Availability Console Update pm. 2.

3.30pm. A sneak peek at Veeam 2018 releases Veeam for VMware Cloud on AWS technical deep dive Veeam Availability Console Update pm. 2. 1.30pm 2.00pm 2.30pm 3.00pm 3.30pm 4.00pm 4.30pm 5.00pm Business Breakout Veeam Backup for Microsoft Office 365 - It's Your Data! Management products: The OTHER side of Veeam Panel: Business Compliance

More information

Welcome! Ready To Secure Access to Your Microsoft Applications?

Welcome! Ready To Secure Access to Your Microsoft Applications? Welcome! Ready To Secure Access to Your Microsoft Applications? During the Webinar Audio In presentation mode until end Control Panel View webinar in full screen mode Feel Free to submit written questions

More information

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

Disaster Recovery Webinar August 11, 2015

Disaster Recovery Webinar August 11, 2015 Disaster Recovery Webinar August 11, 2015 SPEAKERS Marcelo Oliveira, Product Director, Cable & Wireless Marcelo has several years of experience in Information Technology, having worked with organizations

More information

CERANET SERVICE LEVEL AGREEMENT

CERANET SERVICE LEVEL AGREEMENT Page 1 of 5 CERANET SERVICE LEVEL AGREEMENT This CeraNet Service Level Agreement ("SLA") applies to all dedicated servers and Co-location services. The Client agrees that CeraNet internal measurements

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what

More information

Managed Service Proposal

Managed Service Proposal Managed Service Proposal We offer a unique approach to how your network will be managed. With our complete offering, we can bring optimal network infrastructure to your environment at the best competitive

More information

Disaster Recovery and Mitigation: Is your business prepared when disaster hits?

Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since

More information

On-Premise, Cloud, Or Managed Service. Making The Most Of Information Management Technology & People

On-Premise, Cloud, Or Managed Service. Making The Most Of Information Management Technology & People On-Premise, Cloud, Or Managed Service Making The Most Of Information Management Technology & People Steffen Low Vice President, Symantec Business Critical Services Matthew Edwards President & Global CTO,

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

Intermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership

Intermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership CX-E Cloud Hosting Provider Intermedia Introduction AVST has selected Intermedia as the cloud provider for our hosted CX-E Cloud offering. Intermedia delivers an enterprise-grade cloud infrastructure that

More information

RFP # QUESTIONS AND ANSWERS Posted: February 5, 2016

RFP # QUESTIONS AND ANSWERS Posted: February 5, 2016 RFP # 2016-02 QUESTIONS AND ANSWERS Posted: February 5, 2016 REQUEST FOR PROPOSAL RFP # 2016-02 Q: Who currently manages your IT services today? A: Inspired Technologies. Q: Are you satisfied with their

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME

IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME For: CLIENT NAME HERE CLIENT ADDRESS HERE 1. Current

More information

CLOUD DISASTER RECOVERY. A Panel Discussion

CLOUD DISASTER RECOVERY. A Panel Discussion CLOUD DISASTER RECOVERY A Panel Discussion SPEAKERS Michael Kemps Founder & CEO Innovative Computing Systems, Inc. Mike Paul CTO Innovative Computing Systems, Inc. Sonny Sheth Senior Systems Engineer Innovative

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

Company X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report.

Company X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report. Company X Outsourced Information Technology Services for Desktop and LAN Services Version Status Editor Creation Date Release Date Managed Services Monthly Management Report May 20xx 1 EXECUTIVE SUMMARY...

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Cisco Secure Ops Solution

Cisco Secure Ops Solution Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,

More information

NC Education Cloud Feasibility Report

NC Education Cloud Feasibility Report 1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

Audit4 Installation Requirements

Audit4 Installation Requirements S4S Pty Ltd ABN: 26 104 845 909 Phone: 1300 133 308 Web: http://www.s4s.com.au Audit4 Installation Requirements Audit4 version 14+ Copyright 2012 S4S Pty Ltd The following table provides details on the

More information

Technical Consultant. Job Title Technical Consultant. Department Service Department. Reporting to Service Manager

Technical Consultant. Job Title Technical Consultant. Department Service Department. Reporting to Service Manager Technical Consultant Job Title Technical Consultant Department Service Department Reporting to Service Manager Our Company Wanstor is an IT Solutions Company celebrating their 16 th year in business. The

More information

Innovation IT Services Price List

Innovation IT Services Price List Innovation IT Services Price List 2016-2017 Tel: 0330 330 8956 email: itsales@innoit.co.uk How to complete the Keep My Number porting form - v1.1 st Effective Date: 31 June 2014 Contents: 3/4: Microsoft

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

On a continuous mission for sustaining companies in order to exploit the benefits of IT technology

On a continuous mission for sustaining companies in order to exploit the benefits of IT technology On a continuous mission for sustaining companies in order to exploit the benefits of IT technology Who are we? With us by your side, your business exploits the benefits of modern technology for accelerated

More information

A guide for assembling your Jira Data Center team

A guide for assembling your Jira Data Center team A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

Determining Best Fit for ITIL Implementation

Determining Best Fit for ITIL Implementation Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

Tieto s itap Offering

Tieto s itap Offering Tieto s itap Offering say goodbye to worries related to managing Servers & IT infrastructure Jimi Inge Lead Service Architect MZZ Managed Services and Transformation jimi.inge@tieto.com itap An Overview

More information

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved. Security Bob Shantz Director of Infrastructure & Cloud Services 2016 Computer Guidance Corporation. All Rights Reserved. CPE Credits To receive your CPE Credits:. Complete a survey for each session attended.

More information

Improve productivity with modernized PCs and Windows 10. Christopher Choong, DTM Field Marketing Manager

Improve productivity with modernized PCs and Windows 10. Christopher Choong, DTM Field Marketing Manager Improve productivity with modernized PCs and Windows 10 Christopher Choong, DTM Field Marketing Manager Impressive innovation. Inside and out. 3 4 It s an important time to refresh Design Every product

More information

Credential Awarding Body Timing Before, During or After Apprenticeship. hardware vendors

Credential Awarding Body Timing Before, During or After Apprenticeship. hardware vendors Occupation: Information Technology Generalist ONET Code 15-1151.00 RAPIDS Code 1059 OCCUPATIONAL OVERVIEW Potential Job Titles: IT Generalist, Network Manager, Network Support Technician, Network Administrator,

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

Office 365 Business The Microsoft Office you know, powered by the cloud.

Office 365 Business The Microsoft Office you know, powered by the cloud. Office 365 Business The Microsoft Office you know, powered by the cloud. Power your business with the best-in-class productivity tools from Microsoft the applications you know, always up-to-date and accessible

More information

SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS

SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS How RDP SaaS deployment reduces costs, time to market and barriers to entry while improving security, performance and the UX Independent Software Vendors (ISVs)

More information

BYOD Policy. Table of Contents

BYOD Policy. Table of Contents Version 1.6 Table of Contents Bring Your Own Device (BYOD) Access and Use Policy... 3 Overview... 3 Components of the BYOD Strategy and Basics for BYOD Policy... 4 Device Choices... 4 User Experience and

More information

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering

More information

IT Service Upgrades Announcement

IT Service Upgrades Announcement IT Service Upgrades Announcement Beginning in late 2008, AgriLife Information Technology under the direction of the Office of the Vice Chancellor and Dean of Agriculture and Life Sciences conducted a study

More information

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

CAPABILITY STATEMENT

CAPABILITY STATEMENT CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our

More information

ERS IT Portfolio Report

ERS IT Portfolio Report Administration and Operations Committee ERS IT Portfolio Report January 21 st, 2014 1 Agenda Information Technology Projects Summary 2013 End of Year Metrics Project Management Office CMERS Website Applications

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

EX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101

EX0-101_ITIL V3.  Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101 EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic

More information

BREITKOM Network Sdn Bhd Corporate Profile

BREITKOM Network Sdn Bhd Corporate Profile BREITKOM Network Sdn Bhd Corporate Profile ICT Connectivity, Solutions and Provision 1 AGENDA BREITKOM Network Sdn Bhd Corporate Overview Our Products & Services Telco Products & Solutions Our Services

More information

Five Key Considerations for Selecting Cloud Recovery Services

Five Key Considerations for Selecting Cloud Recovery Services Five Key Considerations for Selecting Cloud Recovery Services Looking for a cloud-based solution for backup and recovery? Here are some important things to keep in mind when interviewing providers. By

More information

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING

More information

NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director

NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments Hunter Downey, Cloud Solution Director Why Organizations are investing in the Cloud Pressure on IT and business

More information

Diverse Connect. Guaranteed connectivity for all your critical applications

Diverse Connect. Guaranteed connectivity for all your critical applications Diverse Connect Guaranteed connectivity for all your critical applications 1 Your business can t afford outages 2 As you migrate more applications and business communications to the cloud, network outages

More information

DISASTER RECOVERY PRIMER

DISASTER RECOVERY PRIMER DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data

More information

Why Microsoft s head is in the clouds and what it means to you.

Why Microsoft s head is in the clouds and what it means to you. Why Microsoft s head is in the clouds and what it means to you http://www.windowsitpro.com/blogcontent/tony-redmonds-exchange-unwashed-50 Agenda Where next for Exchange Office 365 Cloud deployments Where

More information

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations FFIEC Cyber Security Assessment Tool Overview and Key Considerations Overview of FFIEC Cybersecurity Assessment Tool Agenda Overview of assessment tool Review inherent risk profile categories Review domain

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

MUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions

MUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions Q: What are the pain points being experienced with the current IT setup? A: Age of the equipment, reliability of service, no redundancy for internet service. Q: How is technology managed today? A: Outsourced

More information

Symantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1

Symantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1 Symantec Hosted Services Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1 Agenda What is SaaS The SaaS Shift SaaS Key Objections Symantec Hosted Services Portfolio SaaS as an SLA Insurance service

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Acronis Backup. Acronis, All rights reserved. Dual headquarters in Switzerland and Singapore. Dual headquarters in Switzerland and Singapore

Acronis Backup. Acronis, All rights reserved. Dual headquarters in Switzerland and Singapore. Dual headquarters in Switzerland and Singapore Acronis Backup 1 Acronis Backup Guards Against Modern Threats Cybercrimes will cost $6 trillion per year worldwide by 2021 50% of hard drives die within 5 years Keeps Business Running Data is growing 33

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

IT Service Level Agreement

IT Service Level Agreement The Glasgow School of Art IT Service Level Agreement September 2016 Policy Control Title IT Service Level Agreement Date Approved Sep 2016 Approving Bodies Executive Group Implementation Date September

More information

HOSTING SERVICES AGREEMENT

HOSTING SERVICES AGREEMENT HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information

UCLA AUDIT & ADVISORY SERVICES

UCLA AUDIT & ADVISORY SERVICES UCLA AUDIT & ADVISORY SERVICES Edwin D. Pierce, CPA, CFE Director September 4, 2015 10920 Wilshire Boulevard, Suite 700 Los Angeles, California 90024-1366 310 794-6110 Fax: 310 794-8536 SENIOR VICE PRESIDENT/CHIEF

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information