Secure Managed Firewall
|
|
- Kelley Parrish
- 5 years ago
- Views:
Transcription
1 Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any portion of this document without Spark s permission.
2 Product overview Secure Managed Firewall service (the Service ) provides access control, inspection and filtering services between the customer and the internet, branch networks, partner networks and hosted applications. The Service is a managed service. Based on industry-leading security technologies, it protects the customer s organisation from the threat landscape. The Service is available in two modes. It can be a virtual firewall delivered from a Spark Service Node or a physical device at the customer s premises. Spark can also provide the Service as a management-only option, operating on customer-supplied firewall equipment. The Service includes service management and 24x7 firewall infrastructure management, with qualified security professionals performing scheduled checks and maintenance activities. Spark provides an online portal that gives customers visibility of their service. The diagram below provides an overview of the key Secure Managed Firewall features: This product is designed to work with other Spark products to deliver end-toend protection. These products include Secure Internet connectivity, Secure Application Publishing, WAN connectivity and Revera IaaS services. Commercial in Confidence Secure Managed Firewall product specification page 2 of 10
3 Functional Specification Secure Managed Firewall is available in three deployment models (Virtual Service, Onsite Physical service, Managed Customer Firewall), and three service variants (Standard, Plus, Premium). These options are outlined in the tables below. Deployment models Deployment Model Virtual Service Onsite Physical Service Managed Customer Firewall Attribute Equipment location Spark security nodes Customer premises Customer premises Technology selection Spark-defined Spark-defined Customerdefined (from Spark Approved Technology List) Equipment supply Included Included Customerprovided Capacity Predefined Small Predefined Small Equipmentdependent Medium Large Medium Large High Availability Capability Optional Uplifts Included Optional Equipmentdependent Equipment & licensing, procurement maintenance procurement Service Variants Firewall Service Variant Features Standard Plus Premium Layer 3 and 4 Firewall protection Site to site VPN support Protocol inspection Next Generation Firewall Application visibility Intrusion Detection Service (IDS) Commercial in Confidence Secure Managed Firewall product specification page 3 of 10
4 Intrusion Prevention Service (IPS) Identity integration Web filtering Advanced threat defence Physical high availability (Onsite deployments only) The sections below define each of these components: Layer 3 and 4 Firewall protection Layer 3 and 4 Firewalls allow filtering of traffic based on source/destination IP, port and protocol. They also provide the ability to track active network connections and sessions. It is then possible to allow or deny traffic based on the state of those sessions. Site to Site VPN A site-to-site VPN allows sites in multiple fixed locations to establish secure connections with each other. Protocol Inspection Protocol Inspection provides the capability to check traffic traversing the firewall for conformance with standard published protocols. This is required for services that embed IP addressing information in the user data packet. Services that open secondary channels on dynamically assigned ports also require it. Next Generation Firewall Next Generation Firewall provides IPS/IDS and application visibility (see below) over and above Layer 3 and 4 Firewall protection. Application Visibility Application-level visibility allows the setting of policies based on specific application profiles. Intrusion Detection Service An intrusion detection service (IDS) policy is a means for identifying malicious activity or policy violations. The firewall matches traffic against a signature database. This service alerts only and does not prevent malicious traffic that it detects. Signature update downloads are automatic. IDS events are viewable via a portal or via a monthly report. To effect policy changes, service requests are required. Intrusion Prevention Service An Intrusion Prevention service (IPS) policy is a means of identifying malicious activity or policy violations. The firewall matches traffic against a signature database. This service sits in-line with a traffic flow and will drop malicious traffic for those signatures set to prevent mode. Signature update downloads are automatic. IPS events are viewable via a portal or via a monthly report. To effect policy changes, service requests are required. Commercial in Confidence Secure Managed Firewall product specification page 4 of 10
5 Identity Integration Identity Integration enables the firewall to integrate with a corporate directory service (Active Directory, LDAP). Thus, it identifies the user on a given connection rather than identifying an IP address. This approach gives organisations easier, more precise visibility over who can access the network and what they can access. URL Filtering Web Filtering provides the ability to restrict access to Web content according to specific categories. The firewall vendor dynamically updates categorisation, with some scope for the customer to request specific categorisation. Advanced Threat Defence Advanced threat defence provides global threat intelligence and sandboxing capabilities to discover malware. This works over supported network protocols and for supported file types. Physical High Availability A High Availability configuration allows for two physical firewalls to operate in failover mode. This preserves connectivity if a single hardware device fails. High Availability is a service uplift available for the Onsite Physical deployment model, and the Standard and Plus service variants. Sparks Virtual Service deployment model provides virtual infrastructure level redundancy by default. The Premium service variant includes High Availability by default. Commercial in Confidence Secure Managed Firewall product specification page 5 of 10
6 Service On- Demand Features The following on-demand features are non-recurring features that customers can request for the appropriate firewall subscription plan via Service Requests. The Service Request Category shown reflects the typical categorisation of the request. Spark will advise you prior to commencement if your request falls outside the expected categorisation. Features Log File Integration initial setup Log File Integration subsequent change Firewall audit Configure user VPN initial setup Configure user VPN subsequent change Policy development Policy migration Identity Aware Firewalling initial setup Configure user VPN subsequent change Customer-initiated platform upgrades Firewall policy changes Emergency change Site to site VPN Usual Service Request Category Simple Standard Simple Simple Simple/Standard Incident Non-Standard Log File Integration Makes log files available for forwarding to a customer syslog server. This may be a requirement for compliance and data retention. Firewall Rule Audit Provides a full review and audit of current policy. Spark recommends that every customer review their policies periodically to ensure that they are achieving the required level of security. Configure User VPN Allows users to connect with clients across different platforms to the customer s network and to access the customer s network securely Policy Development Ensures that organisations have a comprehensive security policy to manage their risks. This includes the development of specific product policy changes. These changes may be for a new build firewall or where the policy is significantly out of date or insufficient. Commercial in Confidence Secure Managed Firewall product specification page 6 of 10
7 Policy Migration Manages the migration of customer policies between different technology solutions. Develops processes to migrate policies from one Firewall platform to another, or physical to virtual. Identity Aware Firewalling Integrates existing directories to improve visibility of user activity. This is available for individual user access verification. It allows customers to apply security policies that align to users and groups rather than to IP addresses. This provides more precise control over who can access applications and what they can access. Customer Initiated Platform Upgrades Includes minor and critical upgrades. A customer can request a major system upgrade in addition to Spark s schedule. Firewall Policy Change Amends the operative security policy or firewall rules as required by the customer. This includes changes to application visibility, control configuration, IDS, IPS, advanced threat defence rules or policies and malware detection policies. Emergency Change Allows immediate blocking of all traffic originating from a particular host, as part of incident resolution. Site to Site VPN Adds, removes or modifies the site-to-site VPN between two sites. Commercial in Confidence Secure Managed Firewall product specification page 7 of 10
8 Service Limitations & Dependencies Physical Firewall Upgrades Upgrading between the different service plans on physical firewalls may require hardware replacement. In addition, upgrades may require planned service outages. The service availability calculation will not include these outages. Onsite Firewall Connectivity Management This Service does not include management connectivity to onsite firewalls under the Onsite Physical and Managed Customer Firewall service models. It is the customer s responsibility to provide suitable management connectivity from the onsite location back to Spark for service management. Physical Firewall Interfaces and Other Customisations If requested during presales, Spark will advise how many physical interfaces firewalls under the Onsite Physical Service model can have. Spark may from time to time update the technologies selected to deliver the defined services. A customer requiring additional interfaces will need to purchase a custom firewall under the Managed Customer Firewall service model. Only the previously identified features and uplift options are available for the Virtual Service and the Onsite Physical Service models. The Managed Customer Firewall service model allows customisation of currently available hardware from vendors on the Supported Technology List. An example of customisation is adding power supply redundancy. Web Filtering Web filtering at user and group levels requires integration into customer Active Directory (AD) and the definition of user groups. Supported Technology List In addition to this Product Definition, Spark maintains an updated Supported Technology List for the Managed Customer Firewall service models. This provides customers with a choice of key firewall technologies, in line with their share of the firewall market. The Supported Technology List details which firewall technologies can come under the Managed Customer Firewall service model. It also documents any differences in feature support, limitations and customer responsibilities relating to the chosen technology. Note: Under the outcome-based service models (Virtual Service and Onsite Physical Firewall service models), Spark will select technology that meets the defined service features and service levels. Identity Aware Firewalling Identity Aware Firewalling is available through LDAP and Microsoft Active Directory user directories integration. The Supported Technology List defines specific limitations and dependencies. A directory proxy may require enablement of integration between the customer directory and the firewall. This service does not provide server infrastructure (virtual or physical), monitoring or management on the customer s site for this directory proxy. Spark will support only the directory proxy software. Syslog Forwarding Where customers choose to retain a copy for analysis or archive, Spark will provide syslog forwarding of customers firewall logs. This service excludes Commercial in Confidence Secure Managed Firewall product specification page 8 of 10
9 customers log storage or suitable network connectivity to customers log storage. Customer Change Management Secure Managed Firewall pricing (including installation and service requests) excludes customer change management review and approval. If required, this work will come under Non-Standard Service Requests. Onsite Field Support The Service includes onsite field support for hardware failures and replacement of vendor equipment. It does not include field support costs for customerinitiated changes requiring field support (e.g. Data Centre changes). Customer Responsibilities Onsite Firewall Hosting The customer is responsible for the physical hosting, cabling and LAN infrastructure. The customer is also responsible for insuring the equipment on their premises or within a third-party provider s facility. Onsite Access The customer is responsible for approving and providing onsite access, if required by Spark, to manage and support onsite firewalls. Management Connectivity to Onsite Firewalls The customer is responsible for providing suitable management connectivity from their onsite premises back to Spark for service management. Management of Customer Firewalls When Spark is to take over management of customer-owned firewalls, the customer retains certain responsibilities. These include ensuring that firewalls are correctly licensed, in good working order and have current and suitable vendor maintenance agreements. This customer must also agree to continue relevant vendor maintenance. Support, Monitoring and Management Spark will support, monitor and manage the Service on a 24x7 basis. The service includes 14 days of centralised log retention in our Service Nodes for Spark troubleshooting and support purposes. Spark will provide notification of events and incidents via ITSM to the customer via the Service Desk and/or . Commercial in Confidence Secure Managed Firewall product specification page 9 of 10
10 Service Levels, Service Hours, Support Hours, and Service Targets Service Availability Service Level The following availability levels in service hours, as defined below, apply to each instance of the Service: Type of service Availability Virtual service 99.5% Onsite physical service and managed customer firewall 99% Onsite physical service high availability uplift 99.5% Service hours exclude: The planned maintenance window and any planned outages For the onsite physical service and managed customer firewall, the time required by a vendor to replace a faulty device. This exclusion applies where Spark has identified a hardware fault and referred it to the device vendor. Spark deems the Service to be unavailable when the access provided by the Service is not available to all users. Note: 99.5% availability equates to a maximum permitted downtime of 18 hours annually. For the Service Level Calculation and Standard Service Hours/Support Hours/Service Targets please refer to the Managed Security Services Levels Targets Specification. Commercial in Confidence Secure Managed Firewall product specification page 10 of 10
SERVICE DESCRIPTION MANAGED FIREWALL/VPN
Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationSchedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management
More informationSCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service
More informationABOUT THIS SECTION...
CONTENTS 1 ABOUT THIS SECTION... 2 2 MANAGED SECURITY SERVICES... 2 3 WHAT IS SECURITY MONITORING?... 3 4 WHAT ARE THE SECURITY MONITORING SERVICE LEVELS?... 6 5 WHAT IS SECURITY INTELLIGENCE?... 10 6
More informationIntrusion prevention systems are an important part of protecting any organisation from constantly developing threats.
Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationXO SITE SECURITY SERVICES
XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises
More informationNetworks
Networks +617 3222 2555 info@citec.com.au Queensland Government Network (QGN) Our Queensland Government Network (QGN) is central to the ICT services we provide. It is a government owned and managed network,
More informationService Description Safecom Customer Connection Version 3.5
Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationHOSTING SERVICES AGREEMENT
HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule
More informationSecurity Annex for Firewalls Additional Terms for Firewall Service
CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationAppPulse Point of Presence (POP)
AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationCOMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)
ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationIBM Content Manager OnDemand on Cloud
Service Description IBM Content Manager OnDemand on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationSecurity
Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from
More informationService Level Agreement (SLA) and Service Level Objectives (SLO)
Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3
More informationManaged Firewall 3.0. CenturyLink Technology Solutions Service Guide
Managed Firewall 3.0 This CenturyLink Service Guide ( SG ) sets forth a description of Utility Backup and Vaulting Services ( Service ) offerings by CenturyLink, including technical details and additional
More information2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.
Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationManaged Protection Service for Desktop Firewalls Standard
Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. Managed Protection Service for Desktop Firewalls Standard
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationSECURE SOURCE DISTRIBUTION (M) SDN BHD
SECURE SOURCE DISTRIBUTION (M) SDN BHD The Company Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. A Value-Added Distributor (VAD) with focus on end-to-end
More informationSECURE CROSS DOMAIN GUARD
SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this
More informationPlatform Availability Guarantee - EN
Availability Guarantee - EN This Availability Guarantee (the Guarantee ) is part of the Agreement and is subject to all of the clauses in that Agreement. 1. Definitions: For the purposes of this Guarantee:
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationDigital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model
Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model 1. Description of Services. 1.1 SIP Centralized IP Trunk with Field Trial Verizon will assist
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationService Description: Software Support
Page 1 of 6 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationSD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview.
SD-WAN Managed Services Expereo SD-WAN Managed Services Overview www.expereo.com/sd-wan Contents 1 SD-WAN MANAGED SERVICES DESCRIPTION... 3 1.1 Consult & Design... 4 1.2 Procurement & Logistics... 4 1.3
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationMANAGED WAN SERVICE GENERAL Service Definition Standard Service Features. Monitor and Notify Service Level Monitoring Notification
MANAGED WAN SERVICE 1. GENERAL 1.1 Service Definition 1.2 Standard Service Features 1.3 Optional Service Features 1.4 Customer Responsibilities 2. SUPPLEMENTAL TERMS 3. SERVICE LEVEL AGREEMENT 4. FINANCIAL
More informationJuniper Vendor Security Requirements
Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks
More informationITSM SERVICES. Delivering Technology Solutions With Passion
ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationPage 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES
002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission
More informationConRes IaaS Management Services for Microsoft Azure
ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationInfrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT
Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationMANAGING THE COMPLEXITY.
AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems
More informationSymantec Endpoint Protection 11.0
OVERVIEW Symantec Endpoint Protection replaces Symantec AntiVirus Corporate Edition, Symantec Client Security, Symantec Sygate Enterprise protection and Confidence Online for PCs. Symantec Endpoint Protection
More informationGDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd
GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document
More informationSCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017
SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels
More informationAltius IT Policy Collection
Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software
More informationSONICWALL SECURITY HEALTH CHECK PSO 2017
SONICWALL SECURITY HEALTH CHECK PSO 2017 Get help in fully utilizing your investment to protect your network Overview SonicWALL Security Health Check provides a customer with a comprehensive review of
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationApplication Lifecycle Management on Softwareas-a-Service
Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application
More informationDigital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model
Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist
More informationManaged NIDS Care Services
Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,
More informationINFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare
INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore
More informationNEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?
NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:
More informationWe re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.
COMPANY PROFILE We re Different Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. A Value-Added Distributor (VAD) with focus on end-to-end security product
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationVol. 1 Technical RFP No. QTA0015THA
General Services Administration (GSA) Enterprise Infrastructure Solutions (EIS) and/or Inter-Agency Government traffic will be identified and routed through a secure latest-generation Managed Trusted Internet
More informationExam: : VPN/Security. Ver :
Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationSERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open
SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material
More informationESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES
ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and
More informationSonicWALL TZ 170 Series Prepared by SonicWALL, Inc. 7/6/2004
SonicWALL TZ 170 Series Prepared by SonicWALL, Inc. 7/6/2004 Announcement Overview SonicWALL announces the newly-expanded TZ 170 Series which, in addition to the TZ 170, now includes the TZ 170 Wireless,
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of
More informationNetwork Security Platform Overview
Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and
More informationService Description Managed Protection Services for Networks - Standard
Service Description Managed Protection Services for Networks - Standard 1. Scope of Services IBM Managed Protection Services for Networks Standard (called MPS for Networks Standard ) is designed to provide
More informationNetwork Security Policy
Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationDigital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model
Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model 1. Description of Services. 1.1 SIP IP Trunk with Field Trial for Legacy PBX Verizon will assist
More informationENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION
ENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Equipment IP Telephony Service. If you require more detailed technical information, please contact
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationCisco IOS Inline Intrusion Prevention System (IPS)
Cisco IOS Inline Intrusion Prevention System (IPS) This data sheet provides an overview of the Cisco IOS Intrusion Prevention System (IPS) solution. Product Overview In today s business environment, network
More informationv February 2016
Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance
More informationOracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018
Oracle Managed Cloud Services for Software as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Cloud GxP Compliance for SaaS...3 Oracle Managed Cloud Helpdesk for SaaS...5
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationsecuring your network perimeter with SIEM
The basics of auditing and securing your network perimeter with SIEM Introduction To thwart network attacks, you first need to be on top of critical security events occurring in your network. While monitoring
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationLate Addition #1 EXECUTIVE DOCUMENT SUMMARY
EXECUTIVE DOCUMENT SUMMARY Department: Information Technology Contact Person: Ron Plamondon Telephone No.: Source Selection Method Bid Other: Submittal Dates Executive Board: 01/15/2019 Regular Session:
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationNetwork Intrusion Detection
Network Intrusion Detection This CenturyLink Service Guide ( SG ) sets forth a description of CenturyLink Network Intrusion Detection Services ( Service ) offerings including technical details and additional
More informationAttachment C Service Level Agreement for WAN and Internet
Attachment C Service Level Agreement for WAN and Internet Overview The Vendor SLA for Owner shall apply to all data transmission and reception on all Vendor provided Owner Wide Area Network (WAN) connectivity,
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationMANAGED COLOCATION SERVICES TERMS AND CONDITIONS
MANAGED COLOCATION SERVICES TERMS AND CONDITIONS In addition to the General Terms and Conditions, your use of the Managed Colocation Services is subject to the following additional terms and conditions:
More informationStandard: Event Monitoring
October 24, 2016 Page 1 Contents Revision History... 4 Executive Summary... 4 Introduction and Purpose... 5 Scope... 5 Standard... 5 Audit Log Standard: Nature of Information and Retention Period... 5
More information