Implementation Plan Source Collector
|
|
- Shona Wheeler
- 5 years ago
- Views:
Transcription
1 Implementation Plan Source Collector Last Modified: :09 AM Version: 11.0 Page 1 of 10
2 Table of Contents 1. Introduction Purpose System Overview Assumptions and Constraints System Architecture Management Overview Description of Implementation Points-of-Contact Major Tasks Implementation Support Acceptance Criteria Appendix B: References... 9 Page 2 of 10
3 1. Introduction 1.1. Purpose This implementation plan outline the strategy and activities required to successfully complete the implementation of Varibill Source Collectors System Overview Varibill is a billing system which is offered as an on-premise or Cloud based Software-as-a-Service solution. Varibill is equipped to cater for both recurring and usage-based billing and integrates with your accounting system for the purpose of invoice processing. Varibill is able to automatically collect data from heterogeneous source systems to bill according to the quantities of products and services consumed by clients. This requires a once-off setup and possible integration into various source systems. Once this initial setup is complete, the integration settings can be managed via Varibill. This provides the client with the flexibility to integrate with as many source systems as required and eliminates any manual intervention during billing processing Assumptions and Constraints Assumptions Constraints A Varibill account is setup and accessible. Source Systems track usage of products and services. The Source System has an API or other method of communication (SSH, Database, etc.) available to extract read-only data. Implementation may be affected by employees normal work load which may prevent them from completing the initial setup, training with and using the new application. Page 3 of 10
4 System Architecture Page 4 of 10
5 Minimum Hardware and Software Requirements 1. The actual hardware and software requirements will depend on the size and scale of the Customers requirements. The design decision regarding hardware and software falls outside of the scope of this implementation, but needs to conform to the best practices as defined by Microsoft for Microsoft 2012 R2 Standard, or higher, to ensure the optimal performance, availability and redundancy as required by the client. 2. All third party software, except where specifically noted, must be installed, configured and maintained by the client and falls outside of the scope of this implementation. 3. The client will be responsible for licencing of all 3rd party software required. 4. All third party software must be on a version supported by the vendor. 5. All third party software with which Varibill must integrate must have a vendor provided API available. 6. The client is also responsible for the license, setup and monitoring of business continuity and disaster recovery. 7. Varibill requires SMTP functionality, and as such will implement an SMTP server for the delivery of . The client can elect to have the Varibill SMTP server directly deliver the to the destinations, with consideration given to SPF, DKIM and the requisite firewall policies to ensure the proper flow of s. The client can also elect to have the Varibill SMTP server relay the s to a smart host, over an unauthenticated, port 25 connection. In this case the client is responsible to ensure that the proper IP filtering, relay permissions and firewall rules are implemented for the smart host relaying to work properly. Varibill prefers to directly deliver s, for simplicity. 8. Varibill recommendeds a stand-alone machine (best practice), virtual or physical, that meets the minimum requirements of the selected operating system. 9. The Source Collector server must have access to the applicable source system hosts. 10. The selected operating system must support the latest JDK (Java Development Kit). It can be downloaded here. 11. Ensure that port 80 (http) and 443 (https) are open to the Varibill API (The cloud based API is api.varibill.com) 12. Connectivity should be available to all source systems from the Source Collector machine. 13. Ensure the source system hostname and port are accessible from the Source Collector server. 2. Management Overview 2.1. Description of Implementation Project Scope 1. Consultation to understand the requirements of the Source Collector, including the products/services that should be collected as well as the method of billing for these products/services. Page 5 of 10
6 2. Development of the Source Collector. 3. Testing of Source Collector. 4. Sample data extract using the Source Collector. 5. Implementation of the Source Collector. 6. Training, if required. Approach Varibill follows an instant-on implementation methodology. Once project scope items 1 have been completed the Source Collector will start importing billing data at the scheduled time. The date of Production implementation is dependent on the type of information imported by the Source Collector. Billing data will be imported into Pre-Production (if available) up to the point that the Source Collector is implemented in Production Points-of-Contact This section of the Implementation Plan identifies the stakeholders involved in and who serve as points of contact for the system implementation. Role Name Contact Number Varibill Implementation Consultant Varibill Client Business Sponsor Project/Program Manager Client Client Implementation Representative Page 6 of 10
7 2.3. Major Tasks [Microsoft Project Implementation Template] Product & Billing methodology Source Analysis Task Description Responsible Resource Review products to be collected per source. Appendix B: References / Product Source Analysis Sheet Varibill / Client Provision Source Collector Server Source Collector Server. (Preferred if required) Client Provide Remote Access Install additional Software required JDK (if applicable) Setup Source Collector on Varibill Design and Develop the Source Collector Extract sample data Ensure the Varibill API is reachable via the API URL. Ensure Source System hostname and port is accessible from the Source Collector server. Varibill requires relay permission via an SMTP server. Configure your SMTP settings to allow system notifications to be sent from Varibill. This SMTP server should allow anonymous connections on port 25 and should not require SSL or TLS. The SMTP server should allow message relay from the Varibill host server. The required allowances should be made for SPF, DKIM and other protection mechanisms. Provide the Varibill technical team with remote access, including a read-only username and non-expiring password, in order to complete the required setup. Download and install the latest version of the Java Development Kit on the Source Collector server. (Available here) Create a Source Collector on Varibill. Design and develop the Source Collector. Client sign-off on extract of subset data collected using the developed Source Collector Client Client Client Client Client Varibill / Client Varibill / Client Varibill / Client Page 7 of 10
8 Implement Source Collector Schedule Source Collector Pre-Production Dry run Production Implementation Import Historic Data Task Description Responsible Resource Implement the Source Collector. Schedule the execution of the Source Collector according to requirements. Confirm that all the billing data is imported correctly. Terminate contract services, if required. Update product codes, if required. Configure the Source Collector to import billing data into the Production environment. (Optional) Varibill / Client Varibill / Client Client / Client Implementation Representative Client Implementation Representative Client Implementation Representative Varibill / Client Client / Client Implementation Representative Documentation Document the Source Collector and related processes Varibill Training Train the customer on Source Collector and related processes Varibill / Client Page 8 of 10
9 3. Implementation Support Varibill has user guides that the implementation team can make use of. Alternatively the implementation team can contact the appropriate person as listed in 2.2 (points-of-contact). 4. Acceptance Criteria A successful implementation can be seen as one where: 1. A Source Collector has been configured and accurately imports data into a Pre-Production / Production environment. 2. Authorised users can configure Source Collectors via Varibill. 3. Authorised users can view imported billing data using Varibill. Page 9 of 10
10 5. Appendix B: References The following table summarizes the documents referenced in this document. Document Name Product Source Analysis Sheet Billing Data Template Implementation Plan Source Collectors Implementation Checklist Source Collectors Source Collector Setup Process Description Used to map products to source systems and determine the details to be imported. Used to import the data for which invoices must be generated. The Source Collector must be configured to import data in the same format. Describes the implementation project, resources required, duration and start date. Used to ensure all activities during the Source Collector implementation is completed. To describe the various activities to be performed and the order in which it should be done. Page 10 of 10
Service Description VMware Horizon Cloud Service on Microsoft Azure
VMware Horizon Cloud Service on Microsoft Azure Effective: October 12, 2017 The product described in this Service Description is protected by U.S. and international copyright and intellectual property
More informationContents. 1 General Terms. Page 1 of 8
Page 1 of 8 Service Description: Advanced Services --- Fixed Price Secure Agile Exchange Advise and Implement (Quick Start) (ASF-CORE-SAI-QS) This document describes Cisco s Secure Agile Exchange Advise
More informationService Description VMware Horizon Cloud Service on Microsoft Azure
VMware Horizon Cloud Service on Microsoft Azure Last Updated: 15 October 2018 The product described in this is protected by U.S. and international copyright and intellectual property laws, and is covered
More informationGateway File Provider Setup Guide
Gateway File Provider Setup Guide Version 17 April 2018 Contents Overview... 9 Setting Up the Integration Environment... 11 Managing Personally Identifiable Information... 11 Setting Up the Integration
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationCPM. Quick Start Guide V2.4.0
CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...
More informationUsing Trustwave SEG Cloud with Exchange Online
.trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave
More informationFUJITSU Cloud Service S5 Setup and Configuration of the FTP Service under Windows 2008/2012 Server
FUJITSU Cloud Service S5 Setup and Configuration of the FTP Service under Windows 2008/2012 Server This guide details steps required to install and configure a basic FTP server on a Windows 2008/2012 VM
More informationUsing Trustwave SEG Cloud with Cloud-Based Solutions
.trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS
More informationStorage Made Easy Cloud Appliance installation Guide
dev.storagemadeeasy.com Storage Made Easy Cloud Appliance installation Guide 4 min read original Configuring the SME Appliance The configuration server allows you to configure - Static IP address - Domain
More informationGateway File Provider Setup Guide
Gateway File Provider Setup Guide Version 18 August 2018 Contents Overview... 9 Setting Up the Integration Environment... 11 Managing Personally Identifiable Information... 11 Setting Up the Integration
More informationSage 300 People & Web Self Service Technical Information & System Requirements
Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing
More informationService Description Safecom Customer Connection Version 3.5
Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationSharePoint 2019: Highly-integrated hybrid solutions.
Technology SharePoint 2019: Highly-integrated hybrid solutions. Microsoft is true to its word: With the new version of SharePoint 2019, the software installed in the organization s own computer center
More informationUploaded files are stored for 6 months, after which time we remove them. Please note the SIFT Server is for the transfer of Chorus information only.
SIFT User guide Our secure internet file transfer (SIFT) server is a secure mechanism that allows you to receive e-bills, invoices, CDRs, price books, NGA schedule availability and other sensitive information
More informationProject Requirements Document v2
Project Requirements Document v2 Project Title : Automated 3 Way Match (tentative) Team Name : $-flow Members : Email : Millan Batra [Lead] millanbatra@umail.ucsb.edu Yoon Lee [Scribe] yoonlee@ucsb.edu
More informationCustomer Portal User Guide
Customer Portal User Guide COPYRIGHT NOTICE ViaWest Customer Portal User Guide is published and copyrighted 2012 by ViaWest Inc. All rights reserved. No part of this manual may be reproduced in any form,
More informationPDS Detailed User Guide
PDS Detailed User Guide The Planwell PDS login page can be accessed from a link provided on your Reprographer s website. Enter in the username and password created for your account. The PDS homepage will
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationBarracuda NextGen Report Creator
The creates customized reports using statistics and logs collected on Barracuda NextGen F-Series Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates,
More informationIBM WebSphere Cast Iron Live
IBM Terms of Use SaaS Specific Offering Terms IBM WebSphere Cast Iron Live The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms )
More informationPDS Detailed User Guide
PDS Detailed User Guide The Planwell PDS login page can be accessed from a link provided on your Reprographer s website. Enter in the username and password created for your account. The PDS homepage will
More informationbuilding an effective action plan for the Department of Homeland Security
Customer Guide building an effective action plan for the Department of Homeland Security Binding The recently issued directive from the Department of Homeland Security (DHS), Binding Operational Directive
More informationApplication Notes for Virsae Service Management for Unified Communications with Avaya Aura System Manager - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Virsae Service Management for Unified Communications with Avaya Aura System Manager - Issue 1.0 Abstract These Application Notes describe
More informationServices Summary. Deliverables. Location of Services. Services Assumptions & Exclusions. General Project Management
Page 1 of 1 SERVICE DESCRIPTION: CISCO DNA CENTER ADVISE AND IMPLEMENT QUICK START ASF-EN1-G-DNAC-QS Services Summary Digital Network Architecture (DNA) Center Advise and Implement Quick Start assists
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More information<PROJECT NAME> IMPLEMENTATION PLAN
IMPLEMENTATION PLAN Version VERSION HISTORY [Provide information on how the development and distribution of the Project Implementation Plan was controlled and tracked.
More informationSECURITY DOCUMENT. 550archi
SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or
More informationCAMPAIGNER MAGENTO EXTENSION SETUP GUIDE
CAMPAIGNER MAGENTO EXTENSION SETUP GUIDE This setup guide will help you integrate Magento with your Campaigner account. A API Settings API username/password You must enter the API credentials for your
More informationE-Way Bill System User Manual for API Interface (Site-to-Site integration)
2017 E-Way Bill System User Manual for API Interface (Site-to-Site integration) National Informatics Centre New Delhi No part of this document shall be reproduced without prior permission of National Informatics
More informationCitrix XenApp 6.5 Administration
Citrix XenApp 6.5 Administration CXA206; 5 Days, Instructor-led Course Description Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize
More informationCourse CXA-206: Citrix XenApp 6.5 Administration
Course CXA-206: Citrix XenApp 6.5 Administration Course Length: 5 days Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco
More informationBUSINESS CONTINUITY. Topics covered in this checklist include: General Planning
BUSINESS CONTINUITY Natural and manmade disasters are happening with alarming regularity. If your organization doesn t have a great business continuity plan the repercussions will range from guaranteed
More informationvcloud Usage Meter 3.6 User's Guide vcloud Usage Meter 3.6
vcloud Usage Meter 3.6 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates. If you
More informationCounterPath Partner Ordering Portal. Administrator Guide
CounterPath Corporation Suite 300, Bentall One Centre 505 Burrard Street, Box 95 Vancouver, BC V7X 1M3 Canada Telephone: +1.604.320.3344 www.counterpath.com CounterPath Partner Ordering Portal Administrator
More informationAWS Service Delivery Program AWS Database Migration Service (DMS) Consulting Partner Validation Checklist
AWS Service Delivery Program AWS Database Migration Service (DMS) May 2018 Version 1.0 AWS Service Delivery: v1.0 pg. 1 AWS DMS - Service Delivery Table of Contents Introduction... 3 Expectations of Parties...
More informationServeRestore Service Description
ServeRestore Service Description... 2 ServeRestore Service Options... 2 ServeRestore Service Limitations... 2 ServeRestore Implementation Plan and Timeline... 4 ServeRestore Disaster Recovery Process...
More informationWay2mint SMS Mobile Terminate (MT) API Guide for HTTP / HTTPS
Way2mint SMS Mobile Terminate (MT) API Guide for HTTP / HTTPS 10/1/2009 Way2mint Services Prepared by: Mohit Jaswani Copyright Way2mint Services The content of this document are copyright and remain the
More informationDeploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2
Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationCustomer Progress s Enhancement
Dealer Business Management Software for Contract Furniture Dealers Customer Progress Emails Enhancement Version 2.0 / January 2014 17.05.00 or higher This module and all associated changes throughout the
More informationA Federal Agency Guide to Complying with Binding Operational Directive (BOD) 18-01
Table of Contents Introduction... 2 Required Actions Overview... 2 Required Actions Email Security... 3 Required Actions Web Security... 9 Status of Implementation... 11 Roles and Responsibilities... 11
More informationBME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationIBM Managed Security Services for X-Force Hosted Threat Analysis Service
IBM Managed Security Services for X-Force Hosted Threat Analysis Service Z125-8483-00 05-2010 Page 1 of 5 Table of Contents 1. Scope of Services... 3 1.1 Licensing... 3 1.1.1 Individual... 3 1.1.2 Distribution...
More informationAT&T Global Smart Messaging Suite
RSA SMS HTTP Plug-In Implementation Guide Partner Information Last Modified: April 30, 2012 Product Information Partner Name Web Site Product Name Product Description AT&T www.att.com/smartmessagingsuite
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, 2017 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationMail Assure. Quick Start Guide
Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up
More informationDetector Service Delivery System (SDS) Version 3.0
Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview
More informationCisco Unity Connection uses separate databases to store the system configuration and the information in voic s.
, on page 1 Overview Cisco Unity Connection uses separate databases to store the system configuration and the information in voicemails. About Mailbox Stores Consider the following points to understand
More informationSystem Administration
Most of SocialMiner system administration is performed using the panel. This section describes the parts of the panel as well as other administrative procedures including backup and restore, managing certificates,
More informationCOURSE OUTLINE IT TRAINING
CMB-207-1I Citrix XenApp and XenDesktop Fast Track Duration: 5 days Overview: This fast-paced course covers select content from training courses CXA-206 and CXD- 202 and provides the foundation necessary
More informationApplication Notes for Virsae Service Management for Unified Communications with Avaya Session Border Controller for Enterprise - Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Virsae Service Management for Unified Communications with Avaya Session Border Controller for Enterprise - Issue 1.0 Abstract These Application
More informationInsight II Data Collection Application for Windows (DCA)
Insight II Data Collection Application for Windows (DCA) Installation Guide (Version 7.20.1.64 and above) Notices Copyright Notice The material presented in this document is copyright-protected by EKM4
More informationDeploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3
Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationScan-to- . Copytech s guide to setting up Scan-to- on Konica Minolta M FDs
Scan-to-Email Copytech s guide to setting up Scan-to- Email on Konica Minolta MFDs Time required for set up: Approximately 20 minutes Engineer required: No Copytech s guide to setting up Scan-to-Email
More informationApplication Notes for Virsae Service Management for Unified Communications with Avaya Aura Session Manager - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Virsae Service Management for Unified Communications with Avaya Aura Session Manager - Issue 1.0 Abstract These Application Notes describe
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationEffective 1 January 2016
BATS Chi-X Europe Market Data Policy Effective 1 January 2016 Published October 2015 Copyright BATS Trading Limited. No part of this material may be copied, photocopied, duplicated or published in any
More informationPTS Customer Protection Agreement
PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationUser Guide. 3CX Enhanced Billing Codes. Version
User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2017" Information in this document is subject to change without notice. No part of this document may be reproduced or
More informationUpgrading the Server Software
APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.5.0, page B-2 Obtaining
More informationForeScout Extended Module for ArcSight
Version 2.8 Table of Contents About the ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to ArcSight... 5 SmartConnector Health and Compliance
More informationAppendix 5 Operational Support Systems Verification Test Plan
Appendix 5 Operational Support Systems Verification Test Plan DRAFT December 13, 2006 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A5-1 RFP: TQC-JTB-05-0001
More informationMSU Authorized User Campus Access Procedure, Campus VPN
MSU Authorized User Campus Access Procedure, Campus VPN This document provides the requirements and procedures for access to the Campus Network for MSU Authorized Users. Access to the Campus Network is
More informationVMware vsphere 6.5/6.0 Ultimate Bootcamp
VMware vsphere 6.5/6.0 Ultimate Bootcamp Class Duration 5 Days Introduction This fast paced, high energy, hands-on course provides not only the foundation needed for a top performing software defined datacenter
More informationService Description Safecom Simple Mail Relay Version 3.5
Service Description Safecom Simple Mail Relay Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION... 3 2 SERVICE DEFINITION... 3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationSERVICE DESCRIPTION MANAGED FIREWALL/VPN
Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...
More informationNubo on premise POC requirements for VMWare ESXi
for VMWare ESXi Version 1 Date October, 2015 page 1 Table of Contents 1. About this document 2. Nubo POC Architecture Diagram 3. Hardware Requirements 4. Software Requirements 5. Network & Settings Requirements
More informationGEORGIA LOTTERY CORPORATION
GEORGIA LOTTERY CORPORATION Responses to all written questions and requests for clarification submitted by prospective firms under the Request for Proposal (RFP) for a Digital Signature Solution issued
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationCONNX SECURITY OVERVIEW
CONNX SECURITY OVERVIEW ConnX is a web-based application which can be installed in a variety of technical environments. This purpose of this document is to advise you on the security aspects that are provided
More informationFUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.
FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU
More informationCXA Citrix XenApp 6.5 Administration
1800 ULEARN (853 276) www.ddls.com.au CXA-206-1 Citrix XenApp 6.5 Administration Length 5 days Price $5500.00 (inc GST) Citrix XenApp 6.5 Administration training course provides the foundation necessary
More informationMicrosoft Unified Access Gateway 2010
RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 26, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Microsoft www.microsoft.com
More informationWorkshare Protect Server 3.9 on Microsoft Azure. Admin Guide
Workshare Protect Server 3.9 on Microsoft Azure Admin Guide October 2017 Table of Contents Introducing Protect Server on Azure... 3 Spam prevention software... 3 Deployment Overview... 4 Endpoints... 5
More informationQUICK START GUIDE Cisco Physical Access Manager Quick Start Guide, Release 1.4.1
QUICK START GUIDE Cisco Physical Access Manager Quick Start Guide, Release 1.4.1 1 Before You Begin 2 Installing the Appliance 3 Logging In to the Cisco Physical Access Manager 4 Entering the Initial Configuration
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 4 Cisco ISE Policy Service Node Ports, page 5 Cisco ISE pxgrid Service Ports, page 10
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationForeScout Extended Module for HPE ArcSight
ForeScout Extended Module for HPE ArcSight Version 2.7.1 Table of Contents About the HPE ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to
More informationCaseWare Working Papers. How to download install and register CaseWare from the cloud installer
CaseWare Working Papers How to download install and register CaseWare from the cloud installer Index 1. Introduction... 3 2. Watch this quick video on how to install CaseWare Working Papers... 3 3. Prerequisites...
More informationContents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9
Gateway Upgrade Guide for On-Premises Version 17 August 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Upgrading Primavera Gateway... 7 Prerequisites... 7 Upgrading Existing Gateway Database...
More informationGuest Service Changes
Service Changes The Services administration is now much simplified. The configuration is centralized in the Admin portal under the Access menu. There are several changes in Cisco ISE Web Portals between
More informationUCLA Box Service Getting Started with Box. BruinTech Talk February 4, 2015
UCLA Box Service Getting Started with Box BruinTech Talk February 4, 2015 Today s Talk Box Overview Box for Individuals Box for Projects Box for Units & Departments How to Get Started 5 Frequently Asked
More informationMail Assure Quick Start Guide
Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4
More informationTECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper
TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....
More informationSecurity Guide Release 4.0
[1]Oracle Communications Session Monitor Security Guide Release 4.0 E89197-01 November 2017 Oracle Communications Session Monitor Security Guide, Release 4.0 E89197-01 Copyright 2017, Oracle and/or its
More informationEMC Implementation for vsphere Data Protection Practitioner s Guide
EMC Corporation Technology Solutions Kit EMC Implementation for vsphere Data Protection Practitioner s Guide Date: April 13, 2015 EMC Corporation 176 South Street Hopkinton, MA 01748 Q114 EMC Implementation
More informationPrivileged Remote Access Failover Configuration
Privileged Remote Access Failover Configuration 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of
More informationPerceptive Reflect. Installation and Setup Guide. Version: 2.3.x
Perceptive Reflect Installation and Setup Guide Version: 2.3.x Written by: Product Documentation, R&D Date: September 2016 2012 Lexmark International Technology SA. All rights reserved Perceptive Reflect
More informationUSER GUIDE. June 2012 VERSION 1.0. Supplier Portal. Kimberly-Clark. E-sourcing
USER GUIDE June 2012 VERSION 1.0 Supplier Portal Kimberly-Clark E-sourcing Copyright 2005, Kimberly-Clark Worldwide, Inc. All rights reserved. This document and its associated training materials are proprietary
More informationForeScout Extended Module for IBM BigFix
Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,
More informationManually Check Smtp Server Status In Java
Manually Check Smtp Server Status In Java Definitely check your firewall (make sure the SMTP port is open between your.port25.com/how-to-check-an-smtp-connection-with-a-manual-telnet-session-2/. simplejava-mail
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationSimplot Order Gateway (SOG) User Instructions
Simplot Order Gateway (SOG) User Instructions April 6, 2011 The Simplot Order Gateway (SOG) can be found by clicking the following link or by typing it into your web browser address bar. https://sec03.simplot.com/fos/
More informationAccount Customer Portal Manual
Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP
More informationSailPoint IdentityIQ 6.4
RSA Ready Implementation Guide for Administrative Interoperability Partner Information Last Modified: May 13, 2015 Product Information Partner Name SailPoint Web Site www.sailpoint.com Product Name IdentityIQ
More informationAppPulse Point of Presence (POP)
AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time
More information