Critical Questions to Ask Before Outsourcing IT Management
|
|
- Dayna Perkins
- 5 years ago
- Views:
Transcription
1 Critical Questions to Ask Before Outsourcing IT Management Maury Weinstein President x 4319 mweinste@syssrc.com Celebrating 35 years under continuous ownership in Baltimore
2 We Hope You are Enjoying Your Pizza!! If it hasn t arrived by 12:15 Please double check with your receptionist Then call / Tracey Maranto: tmaranto@syssrc.com OR x4355 (we are recording the webinar so don t think twice about stepping away for a few minutes to go pick it up at your front desk!
3
4 Critical Questions to Ask Before Outsourcing IT Management Am I outsourcing the right portion of IT? Help me understand services scope to prevent budget surprises? How will you help me mature my IT? How do you measure success? How are support requests handled? What is done proactively to lower organizational risks? What will management see? Do you have the people, process and tools to manage my IT? How does the team share information about my IT environment? Are your clients satisfied? How will you train me on industry trends?
5 Run, Grow and Transform: Assigning Responsibilities
6 Outsource Run To Grow & Transform Transform Run Grow
7 We Hope You are Enjoying Your Pizza!! If it hasn t arrived by 12:15 Please double check with your receptionist Then call / Tracey Maranto: tmaranto@syssrc.com OR x4355 (we are recording the webinar so don t think twice about stepping away for a few minutes to go pick it up at your front desk!
8 Managed Services Definition Full or partial IT services delivered: Including IT management With a service level agreement (SLA) At a fixed price for easy budgeting With technology for remote management
9 Easy Services Scope Definition Broadly - include management and services of an inhouse IT department User adds, moves and change allowance for out of scope requests Must be definable and easily articulated
10 In Scope Services Help desk People, process and tools Mobile management (optional) On-site support Network administration Standardization Seamless project and support coordination Backup configuration and completion checks Business reviews Printer management (pay for consumables only) System restoration Hardware maintenance (pay for out of warranty parts only) Satisfaction surveys Blacklist monitoring Training classes SQL maintenance plans Security controls Monitoring APC UPSs Licensing audits Level 4 consultants 90 step onboarding Network documentation Presentation Systems Maintenance (opt.) Seamless between onpremises and cloud Adds, moves and change allowance
11 Out of scope: Watch Other s Scope Projects, such as..ms SQL support, >2 single file restores per month, server restores and disaster recovery services The cost of 3rd party support or incident fees of any kind Support for special circumstances (e.g. establishment of a VPN connection for a new office) Service for copiers, scanners and multi-function printers
12 People IT Maturity Model Survival Awareness Committed Proactive Service Aligned No focus on IT infrastructure or operations Technologycentric organization for IT infrastructure and operations Technologycentric organization; investment in IT service desk Processcentric organization Customer and business focused IT service and delivery organization Business Partnership Business optimization and entrepreneurial culture Process No formal process for IT infrastructure and operations Ad hoc but aware processes are necessary Defined processes for IT service, support and project management Repeatable and automated; focus on IT service delivery processes Integrated, automated; focus on service and business management processes Dynamic optimization of IT services; implement processes fostering innovation Tools No formal strategy or execution on investments Basic management tools; no formal hardware and software standards IT support and project management tools; desktop hardware and software standards; begin infrastructure rationalization Formal infrastructure standards and policies; management tools; virtualized infrastructure Formal IT management process/tools architecture, shared services, aggregated capacity management Proactively promoting new technologies to impact business Support Method Reactive Time & Materials Recurring Scheduled Hours (Professional Affordable IT) Managed Services
13 Goal: Increasing User Productivity Ticket Count Per User/Per Business Day % Avoiding 40% of tickets at $25/pp/hour average downtime cost = $120/pp/year for 1 hour/ticket total tickets per user/business day 3 per. Mov. Avg. (total tickets per user/business day)
14 Ticket Causes by Number of Tickets
15 Measurements Can Increase Satisfaction or Reduce It
16 Resolution Path Requests from ticket system, phone or Assign to appropriate engineer Users receive ticket updates automatically Ticket held open a day after close to ensure resolution Single question satisfaction survey sent
17 Recovery Time and Point Objectives for Lower Downtime Costs Cost = labor to restore transactions lost $100/pp/day average cost at 50% productivity loss
18 Security Risk Reduction Actionable reporting Research based recommendations Verizon Data Breach Investigation Gartner Reports Security Quick Wins from SANS Highest level of confidentiality
19 Actionable Security Reports 1. User accounts with escalated administrative privileges 2. User accounts not logged in within last 90 days 3. Computers not connected to domain in >90 days 4. Computers with outdated OSs (Server 2003/08 and XP) 5. Proofpoint spam filtering and spooling report 6. Symantec Enterprise Protection risk report 7. Report showing passwords not changed in 90 days 8. Password policy 9. Log retention policy settings 10. Account lockout monitoring 11. Bad password attempt monitoring 12. Office 365 security score 13. Screen lock settings
20 Prioritize Security Purchases
21 Proactivity Drives Productivity and Risk Reduction I know which computer has a virus!
22 Performance Reports Address Risk Network Health Score Patch Score 91%* 1/4 OS Score 96%* 1/4 Disk Score 90%* 1/4 Server Uptime Score 100%* 1/4 94% CDP-MIB/CDP- S S S S S S S Client A SonicWall CDP RESTON SonicWall CDP / Acronis M-F Full Backup (xxxfile1) xxxfile01 S S S S S M-F Full Backup (xdc1) xxxdc1 S S S S S $100/pp/day average downtime cost at 50% productivity loss
23 Business Reviews Add best practices Review technology recommendations with ROI Evaluate futures Budgeting Satisfaction survey feedback Ticket analysis Prioritize needs Quick glance best practices dashboard Contribute in non-it ways
24 client server 1 client server 2 client server 3 client server 4 client server 5 client server 6 Site Specific Initial Check <Date> <Client Name> Best Practices Quick Glance RTO by site RPO by site Backup retention off-site Backup retention on-site Backup selection and type Backup software Backup - GRT and Object based Backup capacity Active Directory security scans Server age Warranty coverage Patch policy Password policy Bandwidth suitability Anti-Virus standard Wireless Access Network drawing UPS run time during power outage Phishing mitigation Office 365 license review 7 x 24 Client Readiness Remote server management Redundant internet connections with auto-failover 7x24 service repair contracts Off-hour, local backup media availability Quick server restoration Quick workstation builds/restoration 7x24 support contracts for line of business software Legend System Source Standards Client Selects Short (hours), Medium (>1 day), Long (multiple days) Client Selects Short (hours), Medium (>1 day), Long (multiple days) Backup Standard Backup Standard Backup Standard Backup Standard Backup Standard As recommended by Managed Services Client answers questions raised during last period's Active Directory scans Replacement standard is 3-5 years. Base warranty hardware coverage at minimum Patch Standard checked annually Password Standard checked annually Two paths via different vendors and suitable speed Using supported version of Symantec Enterprise Protection Wireless Standard Network drawing reviewed annually Client annually selects UPS run time in the event of a power outage Not accepting from your domain via external systems Office 365 licensing reviewed annually to match user count and licenses purchased HP ILO or DELL DRAC cards in all critical servers for off-site out of band management Cisco/Sonicwall Failover or Ecessa Load Balanced Standard 7x24 guaranteed call to repair service contracts Backup Standard Virtualized or imaged servers for quick restores Image ready for workstation restore 7x24 support contracts for line of business software Meets or Exceeds Standard Caution Unknown, Needs Discussion or does not Meet Standard Not Applicable
25 Office 365 Exchange versus On-Premise ROI SAVINGS Initial Cloud Investment Year 1 Cloud Savings Year 2 Cloud Savings Year 3 Cloud Savings Year 4 Cloud Savings Year 5 Cloud Savings Year 6 Cloud Savings $ (11,386) $ 46,506 $ (360) $ (360) $ 46,506 $ (360) $ (36 Savings Through Year X $ 35,120 $ 34,760 $ 34,400 $ 80,906 $ 80,546 $ 80,186 ANALYSIS Year 1 Year 2 Year 3 Year 4 Year 5 Year 6 Traditional On-Premise Deployment Hardware (Including Server Licensing) Exchange Server Hardware $ 8,934 $ 8,934 SharePoint Server Hardware $ 13,152 $ 13,152 Lync Server Hardware $ - $ - Licensing Exchange CALs $ 4,080 $ 4,080 SharePoint Standard CALs $ 5,700 $ 5,700 Lync CALs $ - $ - ecal $ - $ - Office Pro Plus $ - $ - Support Exchange User Support $ 5,004 $ 5,004 $ 5,004 $ 5,004 $ 5,004 $ 5,00 SharePoint User Support $ 5,004 $ 5,004 $ 5,004 $ 5,004 $ 5,004 $ 5,00 Full Suite Support $ - $ - $ - $ - $ - $ - Consulting and Migration Exchange Migration Costs $ 7,500 $ 7,500 SharePoint Migration Costs $ 7,500 $ 7,500 Office Migration Costs* Administration Exchange Administration $ 4,500 $ 4,500 $ 4,500 $ 4,500 $ 4,500 $ 4,50 SharePoint Administration $ 4,500 $ 4,500 $ 4,500 $ 4,500 $ 4,500 $ 4,50 Lync Administration $ - $ - $ - $ - $ - $ - Total $ 65,874 $ 19,008 $ 19,008 $ 65,874 $ 19,008 $ 19,008 Cloud Based Deployment Microsoft O365 Fees $ 5,760 $ 5,760 $ 5,760 $ 5,760 $ 5,760 $ 5,76 O365 Enhanced User Support $ 10,008 $ 10,008 $ 10,008 $ 10,008 $ 10,008 $ 10,00 Enhanced Server Support $ 3,600 $ 3,600 $ 3,600 $ 3,600 $ 3,600 $ 3,60 One-time Migration Costs- Exchange $ 3,886 One-time Migration Costs- SharePoint $ 7,500 One-time Migration Costs- Lync $ - Total $ 19,368 $ 19,368 $ 19,368 $ 19,368 $ 19,368 $ 19,368 $ (11,386) 46,506 (360) (360) 46,506 (360) (36 User Count 60
26 The People, Process and Tools to Deliver Organizational Benefits
27 Competent Staff Pre-hire testing including background Lots of certifications 17 years of IT experience for engineers Project consultants for tough questions Average tenure 22 years with System Source Single point of contact
28 Process Produces More Uptime
29 Staff Entrance and Exit Detailed procedures onboard/exit new staff efficiently Employee Exit Checklist Employee Name Phone Location Standard service level agreement is 2 business hours after form submission (w/o PC handling) Exit Terms Termination Resignation Exit Date/Time Network access: File Retention Mailbox Handling Time: Remove user from all non-primary groups, hide from the global access list and: Change network password Requested Password: Delete network account effective (Deletes Mailbox in 30 days after deletion) Disable network account effective Delete Network Account on Click here to enter a date. Retain Personal Network Directory Give access to the Personal Network Directory to: Retain local My Documents folder Move My Documents folder to: Give access to the My Documents folder to Retain existing mailbox (available only if account is not deleted) Allow Inbox to receive Give mailbox proxy rights to: Forward new to: Create out of office reply to alert senders with the following message: Use Default (messages will be forwarded for one year from departure): Your has been forwarded to for attention. For immediate assistance please contact at or . Thanks Alternate message: Save the mailbox as a static file (.pst) to
30 Manufacturer Model User Name Password Enable Password ISP Name IP (Labeled on Device) Support Account Name - Account User Account Password Location Support Contract Vendor Serial Number Contract Type Contract Number Last Backup Date Backup Location Managed Services Data Collection Device Type Firewall SonicWall TZ (W AN) (LAN) ISP Router TrendNet Switch SMC N/A Switch SMC N/A Switch SMC N/A Switch SMC N/A Device NetGear ProSafe Dua lwan VPN GB Firewall admin Server Room
31 Client Satisfaction Results Problem was fixed before I knew there was a problem. He was as cool as the other side of the pillow.
32 Customer Satisfaction Results Managed Service Satisfaction Scores 100% 96% 95% 94% 94% 93% 94% 95% 95% 90% 94% 92% 92% 91% 93% 94% 95% 97% 93% 94% 94% 95% 96% 94% 97% 95% 95% 80% 70% 60% 50% 40% Based on > 4000 responses annually 30% 20% 10% Mar-15 May-15 Jul-15 Sep-15 Nov-15 Jan-16 Mar-16 May-16 Jul-16 Sep-16 Nov-16 Jan-17 Mar-17
33 Our Management Seminar Series Learning from our 145,000 Completed IT Support Tickets and 13,750 Satisfaction Surveys Security Lessons from Verizon's Analysis of 79,790 Security Incidents Reducing Your IT Costs Evaluating Managed IT Services Cloud Strategy Building a Cost Effective and Crisis Free IT Team 6 Security Questions to Ask IT
34 Ask About IT Phone Lines Now Open! (please mute if you are not speaking! Thanks!)
Welcome. Actionable Ideas for Improving IT Operations Maury Weinstein,
Welcome Actionable Ideas for Improving IT Operations Maury Weinstein, mweinste@syssrc.com What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenter will review the
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationWelcome. Security: First Line of Defense. Chris Riley Director x4331
Welcome Email Security: First Line of Defense Chris Riley Director criley@syssrc.com 410-771-5544 x4331 We Hope You are Enjoying Your Pizza!! If it hasn t arrived by 12:15 Please double check with your
More informationNetCare LITE. NetCare LAN. NetCare SERVER. NetCare WORKSTATION. NetCare MOBILE. NetCare ON-SITE. NetCare 365
Summary of IT Support Services Unit 12 Epsom Business Park Kiln Lane Epsom Surrey KT17 1JF Tel: 0844 770 7000 sales@intralan.co.uk www.intralan.co.uk This datasheet sets out a summary of all IT services
More informationFlorida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government
Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology
More informationWelcome! Considering a Warm Disaster Recovery Site?
Welcome! Considering a Warm Disaster Recovery Site? Today s Moderator: Chris Riley Director 410-771-5544 x4331 criley@syssrc.com Today s Presenter: Rich Glenn Director 410-771-5544 x4420 rglenn@syssrc.com
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationConRes IaaS Management Services for Microsoft Azure
ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...
More informationIT SUPPORT ANNUAL MAINTENANCE CONTRACT GET AN WITH US & RELAX ROUND THE CLOCK +971 (6) Server Setup. IT Services.
+971 (6) 544 7890 CALL US Server Setup ROUND THE CLOCK IT SUPPORT IT Services Hardware Maintenance Contract GET AN ANNUAL MAINTENANCE CONTRACT WITH US & RELAX Structured Cabling CCTV System Time Attendance
More informationMehmet.Gonullu@Veeam.com Veeam Portfolio - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable - Storage agnostic High-speed Recovery instant VM recovery
More informationOne Hospital s Cybersecurity Journey
MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationSLA. Service Level Agreement v1.0. Published: September 2014
SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because
More informationWindows Server 2012/R2 Overview
END OF LICENSE Windows Server 2012/R2 Overview December 31 st, 2017 Agenda Understanding the opportunity Win with Windows Server 2016 Next steps Understanding the opportunity Windows Server 2012/R2 End
More informationNetwork Performance, Security and Reliability Assessment
Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD
More informationSUMMARY OF SERVICES PROVIDED
SUMMARY OF SERVICES PROVIDED Desktop Desktop Included Anti-Virus Software license for all PC s Anti-Spyware License for all PC s Automated managed distribution of monthly Windows updates Unlimited Remote
More informationKnowall Cloud. Performance Hosting Delivered
Knowall Cloud Performance Hosting Delivered Connect with Knowall s Secure Private Cloud Solution The objective is to deliver a simple to use, centrally hosted IT and phone system, accessible by all users
More informationPTS Customer Protection Agreement
PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone
More informationSenior Technical Consultant
Senior Technical Consultant Department Service Department Reporting to Service Manager Our Company Wanstor is an IT Solutions Company celebrating their 16 th year in business. The company has grown year
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationKaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3
Kaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3 Kaseya is dedicated to perfecting the IT Service experience through continuous technology innovation and the highest standards of Service.
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationSimplify Backups. Dell PowerVault DL2000 Family
Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can
More informationIT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I
Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program
More informationNSA s Enterprise Level Zoom Subscription FAQ
1. What does plus more mean in terms of features? With the NSA package members receive: 1 Meeting License ($14.99 if bought individually) 1 Webinar 500 License ($140 if bought individually) Unlimited Cloud
More informationMICROSOFT APPLICATIONS
MICROSOFT APPLICATIONS MICROSOFT SOFTWARE SOLUTIONS THE EFFECTIVE WAY TO DELIVER MICROSOFT APPLICATIONS The Microsoft Office suite of applications are a business essential; one that is used each and every
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationEnsure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards
Job description and person specification Senior ICT Officer Reports to: ICT Manager Purpose This role supports the provision of a high quality and measurable ICT infrastructure support service whilst delivering
More informationITSM SERVICES. Delivering Technology Solutions With Passion
ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past
More informationCONTENTS OF THIS REPORT
CONTENTS OF THIS REPORT Site Overview Executive Summary Network Health Overview Network Assessment Manage Devices by Operating System Remote Control Usage Select report by clicking on the title, the report
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More information3.30pm. A sneak peek at Veeam 2018 releases Veeam for VMware Cloud on AWS technical deep dive Veeam Availability Console Update pm. 2.
1.30pm 2.00pm 2.30pm 3.00pm 3.30pm 4.00pm 4.30pm 5.00pm Business Breakout Veeam Backup for Microsoft Office 365 - It's Your Data! Management products: The OTHER side of Veeam Panel: Business Compliance
More informationWelcome! Ready To Secure Access to Your Microsoft Applications?
Welcome! Ready To Secure Access to Your Microsoft Applications? During the Webinar Audio In presentation mode until end Control Panel View webinar in full screen mode Feel Free to submit written questions
More informationHCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY
PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationDisaster Recovery Webinar August 11, 2015
Disaster Recovery Webinar August 11, 2015 SPEAKERS Marcelo Oliveira, Product Director, Cable & Wireless Marcelo has several years of experience in Information Technology, having worked with organizations
More informationCERANET SERVICE LEVEL AGREEMENT
Page 1 of 5 CERANET SERVICE LEVEL AGREEMENT This CeraNet Service Level Agreement ("SLA") applies to all dedicated servers and Co-location services. The Client agrees that CeraNet internal measurements
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES
ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what
More informationManaged Service Proposal
Managed Service Proposal We offer a unique approach to how your network will be managed. With our complete offering, we can bring optimal network infrastructure to your environment at the best competitive
More informationDisaster Recovery and Mitigation: Is your business prepared when disaster hits?
1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since
More informationOn-Premise, Cloud, Or Managed Service. Making The Most Of Information Management Technology & People
On-Premise, Cloud, Or Managed Service Making The Most Of Information Management Technology & People Steffen Low Vice President, Symantec Business Critical Services Matthew Edwards President & Global CTO,
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationIntermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership
CX-E Cloud Hosting Provider Intermedia Introduction AVST has selected Intermedia as the cloud provider for our hosted CX-E Cloud offering. Intermedia delivers an enterprise-grade cloud infrastructure that
More informationRFP # QUESTIONS AND ANSWERS Posted: February 5, 2016
RFP # 2016-02 QUESTIONS AND ANSWERS Posted: February 5, 2016 REQUEST FOR PROPOSAL RFP # 2016-02 Q: Who currently manages your IT services today? A: Inspired Technologies. Q: Are you satisfied with their
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationIT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME
IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME For: CLIENT NAME HERE CLIENT ADDRESS HERE 1. Current
More informationCLOUD DISASTER RECOVERY. A Panel Discussion
CLOUD DISASTER RECOVERY A Panel Discussion SPEAKERS Michael Kemps Founder & CEO Innovative Computing Systems, Inc. Mike Paul CTO Innovative Computing Systems, Inc. Sonny Sheth Senior Systems Engineer Innovative
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationCompany X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report.
Company X Outsourced Information Technology Services for Desktop and LAN Services Version Status Editor Creation Date Release Date Managed Services Monthly Management Report May 20xx 1 EXECUTIVE SUMMARY...
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationCisco Secure Ops Solution
Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,
More informationNC Education Cloud Feasibility Report
1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most
More informationWhat you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered
What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged
More informationAudit4 Installation Requirements
S4S Pty Ltd ABN: 26 104 845 909 Phone: 1300 133 308 Web: http://www.s4s.com.au Audit4 Installation Requirements Audit4 version 14+ Copyright 2012 S4S Pty Ltd The following table provides details on the
More informationTechnical Consultant. Job Title Technical Consultant. Department Service Department. Reporting to Service Manager
Technical Consultant Job Title Technical Consultant Department Service Department Reporting to Service Manager Our Company Wanstor is an IT Solutions Company celebrating their 16 th year in business. The
More informationInnovation IT Services Price List
Innovation IT Services Price List 2016-2017 Tel: 0330 330 8956 email: itsales@innoit.co.uk How to complete the Keep My Number porting form - v1.1 st Effective Date: 31 June 2014 Contents: 3/4: Microsoft
More informationApplication Lifecycle Management on Softwareas-a-Service
Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application
More informationOn a continuous mission for sustaining companies in order to exploit the benefits of IT technology
On a continuous mission for sustaining companies in order to exploit the benefits of IT technology Who are we? With us by your side, your business exploits the benefits of modern technology for accelerated
More informationA guide for assembling your Jira Data Center team
A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationDetermining Best Fit for ITIL Implementation
Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationTieto s itap Offering
Tieto s itap Offering say goodbye to worries related to managing Servers & IT infrastructure Jimi Inge Lead Service Architect MZZ Managed Services and Transformation jimi.inge@tieto.com itap An Overview
More informationSecurity. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.
Security Bob Shantz Director of Infrastructure & Cloud Services 2016 Computer Guidance Corporation. All Rights Reserved. CPE Credits To receive your CPE Credits:. Complete a survey for each session attended.
More informationImprove productivity with modernized PCs and Windows 10. Christopher Choong, DTM Field Marketing Manager
Improve productivity with modernized PCs and Windows 10 Christopher Choong, DTM Field Marketing Manager Impressive innovation. Inside and out. 3 4 It s an important time to refresh Design Every product
More informationCredential Awarding Body Timing Before, During or After Apprenticeship. hardware vendors
Occupation: Information Technology Generalist ONET Code 15-1151.00 RAPIDS Code 1059 OCCUPATIONAL OVERVIEW Potential Job Titles: IT Generalist, Network Manager, Network Support Technician, Network Administrator,
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationOffice 365 Business The Microsoft Office you know, powered by the cloud.
Office 365 Business The Microsoft Office you know, powered by the cloud. Power your business with the best-in-class productivity tools from Microsoft the applications you know, always up-to-date and accessible
More informationSAAS: THE RDP ADVANTAGE FOR ISVS AND USERS
SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS How RDP SaaS deployment reduces costs, time to market and barriers to entry while improving security, performance and the UX Independent Software Vendors (ISVs)
More informationBYOD Policy. Table of Contents
Version 1.6 Table of Contents Bring Your Own Device (BYOD) Access and Use Policy... 3 Overview... 3 Components of the BYOD Strategy and Basics for BYOD Policy... 4 Device Choices... 4 User Experience and
More informationA Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist
A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering
More informationIT Service Upgrades Announcement
IT Service Upgrades Announcement Beginning in late 2008, AgriLife Information Technology under the direction of the Office of the Vice Chancellor and Dean of Agriculture and Life Sciences conducted a study
More informationIT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.
Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationCAPABILITY STATEMENT
CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our
More informationERS IT Portfolio Report
Administration and Operations Committee ERS IT Portfolio Report January 21 st, 2014 1 Agenda Information Technology Projects Summary 2013 End of Year Metrics Project Management Office CMERS Website Applications
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationEX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101
EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic
More informationBREITKOM Network Sdn Bhd Corporate Profile
BREITKOM Network Sdn Bhd Corporate Profile ICT Connectivity, Solutions and Provision 1 AGENDA BREITKOM Network Sdn Bhd Corporate Overview Our Products & Services Telco Products & Solutions Our Services
More informationFive Key Considerations for Selecting Cloud Recovery Services
Five Key Considerations for Selecting Cloud Recovery Services Looking for a cloud-based solution for backup and recovery? Here are some important things to keep in mind when interviewing providers. By
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationNS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director
NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments Hunter Downey, Cloud Solution Director Why Organizations are investing in the Cloud Pressure on IT and business
More informationDiverse Connect. Guaranteed connectivity for all your critical applications
Diverse Connect Guaranteed connectivity for all your critical applications 1 Your business can t afford outages 2 As you migrate more applications and business communications to the cloud, network outages
More informationDISASTER RECOVERY PRIMER
DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data
More informationWhy Microsoft s head is in the clouds and what it means to you.
Why Microsoft s head is in the clouds and what it means to you http://www.windowsitpro.com/blogcontent/tony-redmonds-exchange-unwashed-50 Agenda Where next for Exchange Office 365 Cloud deployments Where
More informationFFIEC Cyber Security Assessment Tool. Overview and Key Considerations
FFIEC Cyber Security Assessment Tool Overview and Key Considerations Overview of FFIEC Cybersecurity Assessment Tool Agenda Overview of assessment tool Review inherent risk profile categories Review domain
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationMUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions
Q: What are the pain points being experienced with the current IT setup? A: Age of the equipment, reliability of service, no redundancy for internet service. Q: How is technology managed today? A: Outsourced
More informationSymantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1
Symantec Hosted Services Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1 Agenda What is SaaS The SaaS Shift SaaS Key Objections Symantec Hosted Services Portfolio SaaS as an SLA Insurance service
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationAcronis Backup. Acronis, All rights reserved. Dual headquarters in Switzerland and Singapore. Dual headquarters in Switzerland and Singapore
Acronis Backup 1 Acronis Backup Guards Against Modern Threats Cybercrimes will cost $6 trillion per year worldwide by 2021 50% of hard drives die within 5 years Keeps Business Running Data is growing 33
More informationTechnology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited
Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry
More informationIT Service Level Agreement
The Glasgow School of Art IT Service Level Agreement September 2016 Policy Control Title IT Service Level Agreement Date Approved Sep 2016 Approving Bodies Executive Group Implementation Date September
More informationHOSTING SERVICES AGREEMENT
HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule
More information: Administration of Symantec Endpoint Protection 14 Exam
250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks
More informationUCLA AUDIT & ADVISORY SERVICES
UCLA AUDIT & ADVISORY SERVICES Edwin D. Pierce, CPA, CFE Director September 4, 2015 10920 Wilshire Boulevard, Suite 700 Los Angeles, California 90024-1366 310 794-6110 Fax: 310 794-8536 SENIOR VICE PRESIDENT/CHIEF
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More information