Secure Managed Firewall

Size: px
Start display at page:

Download "Secure Managed Firewall"

Transcription

1 Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any portion of this document without Spark s permission.

2 Product overview Secure Managed Firewall service (the Service ) provides access control, inspection and filtering services between the customer and the internet, branch networks, partner networks and hosted applications. The Service is a managed service. Based on industry-leading security technologies, it protects the customer s organisation from the threat landscape. The Service is available in two modes. It can be a virtual firewall delivered from a Spark Service Node or a physical device at the customer s premises. Spark can also provide the Service as a management-only option, operating on customer-supplied firewall equipment. The Service includes service management and 24x7 firewall infrastructure management, with qualified security professionals performing scheduled checks and maintenance activities. Spark provides an online portal that gives customers visibility of their service. The diagram below provides an overview of the key Secure Managed Firewall features: This product is designed to work with other Spark products to deliver end-toend protection. These products include Secure Internet connectivity, Secure Application Publishing, WAN connectivity and Revera IaaS services. Commercial in Confidence Secure Managed Firewall product specification page 2 of 10

3 Functional Specification Secure Managed Firewall is available in three deployment models (Virtual Service, Onsite Physical service, Managed Customer Firewall), and three service variants (Standard, Plus, Premium). These options are outlined in the tables below. Deployment models Deployment Model Virtual Service Onsite Physical Service Managed Customer Firewall Attribute Equipment location Spark security nodes Customer premises Customer premises Technology selection Spark-defined Spark-defined Customerdefined (from Spark Approved Technology List) Equipment supply Included Included Customerprovided Capacity Predefined Small Predefined Small Equipmentdependent Medium Large Medium Large High Availability Capability Optional Uplifts Included Optional Equipmentdependent Equipment & licensing, procurement maintenance procurement Service Variants Firewall Service Variant Features Standard Plus Premium Layer 3 and 4 Firewall protection Site to site VPN support Protocol inspection Next Generation Firewall Application visibility Intrusion Detection Service (IDS) Commercial in Confidence Secure Managed Firewall product specification page 3 of 10

4 Intrusion Prevention Service (IPS) Identity integration Web filtering Advanced threat defence Physical high availability (Onsite deployments only) The sections below define each of these components: Layer 3 and 4 Firewall protection Layer 3 and 4 Firewalls allow filtering of traffic based on source/destination IP, port and protocol. They also provide the ability to track active network connections and sessions. It is then possible to allow or deny traffic based on the state of those sessions. Site to Site VPN A site-to-site VPN allows sites in multiple fixed locations to establish secure connections with each other. Protocol Inspection Protocol Inspection provides the capability to check traffic traversing the firewall for conformance with standard published protocols. This is required for services that embed IP addressing information in the user data packet. Services that open secondary channels on dynamically assigned ports also require it. Next Generation Firewall Next Generation Firewall provides IPS/IDS and application visibility (see below) over and above Layer 3 and 4 Firewall protection. Application Visibility Application-level visibility allows the setting of policies based on specific application profiles. Intrusion Detection Service An intrusion detection service (IDS) policy is a means for identifying malicious activity or policy violations. The firewall matches traffic against a signature database. This service alerts only and does not prevent malicious traffic that it detects. Signature update downloads are automatic. IDS events are viewable via a portal or via a monthly report. To effect policy changes, service requests are required. Intrusion Prevention Service An Intrusion Prevention service (IPS) policy is a means of identifying malicious activity or policy violations. The firewall matches traffic against a signature database. This service sits in-line with a traffic flow and will drop malicious traffic for those signatures set to prevent mode. Signature update downloads are automatic. IPS events are viewable via a portal or via a monthly report. To effect policy changes, service requests are required. Commercial in Confidence Secure Managed Firewall product specification page 4 of 10

5 Identity Integration Identity Integration enables the firewall to integrate with a corporate directory service (Active Directory, LDAP). Thus, it identifies the user on a given connection rather than identifying an IP address. This approach gives organisations easier, more precise visibility over who can access the network and what they can access. URL Filtering Web Filtering provides the ability to restrict access to Web content according to specific categories. The firewall vendor dynamically updates categorisation, with some scope for the customer to request specific categorisation. Advanced Threat Defence Advanced threat defence provides global threat intelligence and sandboxing capabilities to discover malware. This works over supported network protocols and for supported file types. Physical High Availability A High Availability configuration allows for two physical firewalls to operate in failover mode. This preserves connectivity if a single hardware device fails. High Availability is a service uplift available for the Onsite Physical deployment model, and the Standard and Plus service variants. Sparks Virtual Service deployment model provides virtual infrastructure level redundancy by default. The Premium service variant includes High Availability by default. Commercial in Confidence Secure Managed Firewall product specification page 5 of 10

6 Service On- Demand Features The following on-demand features are non-recurring features that customers can request for the appropriate firewall subscription plan via Service Requests. The Service Request Category shown reflects the typical categorisation of the request. Spark will advise you prior to commencement if your request falls outside the expected categorisation. Features Log File Integration initial setup Log File Integration subsequent change Firewall audit Configure user VPN initial setup Configure user VPN subsequent change Policy development Policy migration Identity Aware Firewalling initial setup Configure user VPN subsequent change Customer-initiated platform upgrades Firewall policy changes Emergency change Site to site VPN Usual Service Request Category Simple Standard Simple Simple Simple/Standard Incident Non-Standard Log File Integration Makes log files available for forwarding to a customer syslog server. This may be a requirement for compliance and data retention. Firewall Rule Audit Provides a full review and audit of current policy. Spark recommends that every customer review their policies periodically to ensure that they are achieving the required level of security. Configure User VPN Allows users to connect with clients across different platforms to the customer s network and to access the customer s network securely Policy Development Ensures that organisations have a comprehensive security policy to manage their risks. This includes the development of specific product policy changes. These changes may be for a new build firewall or where the policy is significantly out of date or insufficient. Commercial in Confidence Secure Managed Firewall product specification page 6 of 10

7 Policy Migration Manages the migration of customer policies between different technology solutions. Develops processes to migrate policies from one Firewall platform to another, or physical to virtual. Identity Aware Firewalling Integrates existing directories to improve visibility of user activity. This is available for individual user access verification. It allows customers to apply security policies that align to users and groups rather than to IP addresses. This provides more precise control over who can access applications and what they can access. Customer Initiated Platform Upgrades Includes minor and critical upgrades. A customer can request a major system upgrade in addition to Spark s schedule. Firewall Policy Change Amends the operative security policy or firewall rules as required by the customer. This includes changes to application visibility, control configuration, IDS, IPS, advanced threat defence rules or policies and malware detection policies. Emergency Change Allows immediate blocking of all traffic originating from a particular host, as part of incident resolution. Site to Site VPN Adds, removes or modifies the site-to-site VPN between two sites. Commercial in Confidence Secure Managed Firewall product specification page 7 of 10

8 Service Limitations & Dependencies Physical Firewall Upgrades Upgrading between the different service plans on physical firewalls may require hardware replacement. In addition, upgrades may require planned service outages. The service availability calculation will not include these outages. Onsite Firewall Connectivity Management This Service does not include management connectivity to onsite firewalls under the Onsite Physical and Managed Customer Firewall service models. It is the customer s responsibility to provide suitable management connectivity from the onsite location back to Spark for service management. Physical Firewall Interfaces and Other Customisations If requested during presales, Spark will advise how many physical interfaces firewalls under the Onsite Physical Service model can have. Spark may from time to time update the technologies selected to deliver the defined services. A customer requiring additional interfaces will need to purchase a custom firewall under the Managed Customer Firewall service model. Only the previously identified features and uplift options are available for the Virtual Service and the Onsite Physical Service models. The Managed Customer Firewall service model allows customisation of currently available hardware from vendors on the Supported Technology List. An example of customisation is adding power supply redundancy. Web Filtering Web filtering at user and group levels requires integration into customer Active Directory (AD) and the definition of user groups. Supported Technology List In addition to this Product Definition, Spark maintains an updated Supported Technology List for the Managed Customer Firewall service models. This provides customers with a choice of key firewall technologies, in line with their share of the firewall market. The Supported Technology List details which firewall technologies can come under the Managed Customer Firewall service model. It also documents any differences in feature support, limitations and customer responsibilities relating to the chosen technology. Note: Under the outcome-based service models (Virtual Service and Onsite Physical Firewall service models), Spark will select technology that meets the defined service features and service levels. Identity Aware Firewalling Identity Aware Firewalling is available through LDAP and Microsoft Active Directory user directories integration. The Supported Technology List defines specific limitations and dependencies. A directory proxy may require enablement of integration between the customer directory and the firewall. This service does not provide server infrastructure (virtual or physical), monitoring or management on the customer s site for this directory proxy. Spark will support only the directory proxy software. Syslog Forwarding Where customers choose to retain a copy for analysis or archive, Spark will provide syslog forwarding of customers firewall logs. This service excludes Commercial in Confidence Secure Managed Firewall product specification page 8 of 10

9 customers log storage or suitable network connectivity to customers log storage. Customer Change Management Secure Managed Firewall pricing (including installation and service requests) excludes customer change management review and approval. If required, this work will come under Non-Standard Service Requests. Onsite Field Support The Service includes onsite field support for hardware failures and replacement of vendor equipment. It does not include field support costs for customerinitiated changes requiring field support (e.g. Data Centre changes). Customer Responsibilities Onsite Firewall Hosting The customer is responsible for the physical hosting, cabling and LAN infrastructure. The customer is also responsible for insuring the equipment on their premises or within a third-party provider s facility. Onsite Access The customer is responsible for approving and providing onsite access, if required by Spark, to manage and support onsite firewalls. Management Connectivity to Onsite Firewalls The customer is responsible for providing suitable management connectivity from their onsite premises back to Spark for service management. Management of Customer Firewalls When Spark is to take over management of customer-owned firewalls, the customer retains certain responsibilities. These include ensuring that firewalls are correctly licensed, in good working order and have current and suitable vendor maintenance agreements. This customer must also agree to continue relevant vendor maintenance. Support, Monitoring and Management Spark will support, monitor and manage the Service on a 24x7 basis. The service includes 14 days of centralised log retention in our Service Nodes for Spark troubleshooting and support purposes. Spark will provide notification of events and incidents via ITSM to the customer via the Service Desk and/or . Commercial in Confidence Secure Managed Firewall product specification page 9 of 10

10 Service Levels, Service Hours, Support Hours, and Service Targets Service Availability Service Level The following availability levels in service hours, as defined below, apply to each instance of the Service: Type of service Availability Virtual service 99.5% Onsite physical service and managed customer firewall 99% Onsite physical service high availability uplift 99.5% Service hours exclude: The planned maintenance window and any planned outages For the onsite physical service and managed customer firewall, the time required by a vendor to replace a faulty device. This exclusion applies where Spark has identified a hardware fault and referred it to the device vendor. Spark deems the Service to be unavailable when the access provided by the Service is not available to all users. Note: 99.5% availability equates to a maximum permitted downtime of 18 hours annually. For the Service Level Calculation and Standard Service Hours/Support Hours/Service Targets please refer to the Managed Security Services Levels Targets Specification. Commercial in Confidence Secure Managed Firewall product specification page 10 of 10

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

SERVICE DESCRIPTION MANAGED FIREWALL/VPN Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management

More information

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service

More information

ABOUT THIS SECTION...

ABOUT THIS SECTION... CONTENTS 1 ABOUT THIS SECTION... 2 2 MANAGED SECURITY SERVICES... 2 3 WHAT IS SECURITY MONITORING?... 3 4 WHAT ARE THE SECURITY MONITORING SERVICE LEVELS?... 6 5 WHAT IS SECURITY INTELLIGENCE?... 10 6

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Cisco ISR G2 Management Overview

Cisco ISR G2 Management Overview Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and

More information

XO SITE SECURITY SERVICES

XO SITE SECURITY SERVICES XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises

More information

Networks

Networks Networks +617 3222 2555 info@citec.com.au Queensland Government Network (QGN) Our Queensland Government Network (QGN) is central to the ICT services we provide. It is a government owned and managed network,

More information

Service Description Safecom Customer Connection Version 3.5

Service Description Safecom Customer Connection Version 3.5 Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

HOSTING SERVICES AGREEMENT

HOSTING SERVICES AGREEMENT HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule

More information

Security Annex for Firewalls Additional Terms for Firewall Service

Security Annex for Firewalls Additional Terms for Firewall Service CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

AppPulse Point of Presence (POP)

AppPulse Point of Presence (POP) AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time

More information

Service Description: Software Support

Service Description: Software Support Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

IBM Content Manager OnDemand on Cloud

IBM Content Manager OnDemand on Cloud Service Description IBM Content Manager OnDemand on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

Security

Security Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from

More information

Service Level Agreement (SLA) and Service Level Objectives (SLO)

Service Level Agreement (SLA) and Service Level Objectives (SLO) Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3

More information

Managed Firewall 3.0. CenturyLink Technology Solutions Service Guide

Managed Firewall 3.0. CenturyLink Technology Solutions Service Guide Managed Firewall 3.0 This CenturyLink Service Guide ( SG ) sets forth a description of Utility Backup and Vaulting Services ( Service ) offerings by CenturyLink, including technical details and additional

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service

More information

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING

More information

Managed Protection Service for Desktop Firewalls Standard

Managed Protection Service for Desktop Firewalls Standard Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. Managed Protection Service for Desktop Firewalls Standard

More information

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Reviewer s guide. PureMessage for Windows/Exchange Product tour Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the

More information

SECURE SOURCE DISTRIBUTION (M) SDN BHD

SECURE SOURCE DISTRIBUTION (M) SDN BHD SECURE SOURCE DISTRIBUTION (M) SDN BHD The Company Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. A Value-Added Distributor (VAD) with focus on end-to-end

More information

SECURE CROSS DOMAIN GUARD

SECURE CROSS DOMAIN GUARD SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this

More information

Platform Availability Guarantee - EN

Platform Availability Guarantee - EN Availability Guarantee - EN This Availability Guarantee (the Guarantee ) is part of the Agreement and is subject to all of the clauses in that Agreement. 1. Definitions: For the purposes of this Guarantee:

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized

More information

Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model

Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model 1. Description of Services. 1.1 SIP Centralized IP Trunk with Field Trial Verizon will assist

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized

More information

Service Description: Software Support

Service Description: Software Support Page 1 of 6 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software

More information

SD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview.

SD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview. SD-WAN Managed Services Expereo SD-WAN Managed Services Overview www.expereo.com/sd-wan Contents 1 SD-WAN MANAGED SERVICES DESCRIPTION... 3 1.1 Consult & Design... 4 1.2 Procurement & Logistics... 4 1.3

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

MANAGED WAN SERVICE GENERAL Service Definition Standard Service Features. Monitor and Notify Service Level Monitoring Notification

MANAGED WAN SERVICE GENERAL Service Definition Standard Service Features. Monitor and Notify Service Level Monitoring Notification MANAGED WAN SERVICE 1. GENERAL 1.1 Service Definition 1.2 Standard Service Features 1.3 Optional Service Features 1.4 Customer Responsibilities 2. SUPPLEMENTAL TERMS 3. SERVICE LEVEL AGREEMENT 4. FINANCIAL

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

ITSM SERVICES. Delivering Technology Solutions With Passion

ITSM SERVICES. Delivering Technology Solutions With Passion ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

ConRes IaaS Management Services for Microsoft Azure

ConRes IaaS Management Services for Microsoft Azure ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

MANAGING THE COMPLEXITY.

MANAGING THE COMPLEXITY. AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems

More information

Symantec Endpoint Protection 11.0

Symantec Endpoint Protection 11.0 OVERVIEW Symantec Endpoint Protection replaces Symantec AntiVirus Corporate Edition, Symantec Client Security, Symantec Sygate Enterprise protection and Confidence Online for PCs. Symantec Endpoint Protection

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels

More information

Altius IT Policy Collection

Altius IT Policy Collection Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software

More information

SONICWALL SECURITY HEALTH CHECK PSO 2017

SONICWALL SECURITY HEALTH CHECK PSO 2017 SONICWALL SECURITY HEALTH CHECK PSO 2017 Get help in fully utilizing your investment to protect your network Overview SonicWALL Security Health Check provides a customer with a comprehensive review of

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist

More information

Managed NIDS Care Services

Managed NIDS Care Services Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

We re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.

We re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. COMPANY PROFILE We re Different Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. A Value-Added Distributor (VAD) with focus on end-to-end security product

More information

Microsoft Security Management

Microsoft Security Management Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their

More information

Vol. 1 Technical RFP No. QTA0015THA

Vol. 1 Technical RFP No. QTA0015THA General Services Administration (GSA) Enterprise Infrastructure Solutions (EIS) and/or Inter-Agency Government traffic will be identified and routed through a secure latest-generation Managed Trusted Internet

More information

Exam: : VPN/Security. Ver :

Exam: : VPN/Security. Ver : Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material

More information

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and

More information

SonicWALL TZ 170 Series Prepared by SonicWALL, Inc. 7/6/2004

SonicWALL TZ 170 Series Prepared by SonicWALL, Inc. 7/6/2004 SonicWALL TZ 170 Series Prepared by SonicWALL, Inc. 7/6/2004 Announcement Overview SonicWALL announces the newly-expanded TZ 170 Series which, in addition to the TZ 170, now includes the TZ 170 Wireless,

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

Network Security Platform Overview

Network Security Platform Overview Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and

More information

Service Description Managed Protection Services for Networks - Standard

Service Description Managed Protection Services for Networks - Standard Service Description Managed Protection Services for Networks - Standard 1. Scope of Services IBM Managed Protection Services for Networks Standard (called MPS for Networks Standard ) is designed to provide

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model

Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model 1. Description of Services. 1.1 SIP IP Trunk with Field Trial for Legacy PBX Verizon will assist

More information

ENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION

ENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION ENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Equipment IP Telephony Service. If you require more detailed technical information, please contact

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

Cisco IOS Inline Intrusion Prevention System (IPS)

Cisco IOS Inline Intrusion Prevention System (IPS) Cisco IOS Inline Intrusion Prevention System (IPS) This data sheet provides an overview of the Cisco IOS Intrusion Prevention System (IPS) solution. Product Overview In today s business environment, network

More information

v February 2016

v February 2016 Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance

More information

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018 Oracle Managed Cloud Services for Software as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Cloud GxP Compliance for SaaS...3 Oracle Managed Cloud Helpdesk for SaaS...5

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

securing your network perimeter with SIEM

securing your network perimeter with SIEM The basics of auditing and securing your network perimeter with SIEM Introduction To thwart network attacks, you first need to be on top of critical security events occurring in your network. While monitoring

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

Late Addition #1 EXECUTIVE DOCUMENT SUMMARY

Late Addition #1 EXECUTIVE DOCUMENT SUMMARY EXECUTIVE DOCUMENT SUMMARY Department: Information Technology Contact Person: Ron Plamondon Telephone No.: Source Selection Method Bid Other: Submittal Dates Executive Board: 01/15/2019 Regular Session:

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

Network Intrusion Detection

Network Intrusion Detection Network Intrusion Detection This CenturyLink Service Guide ( SG ) sets forth a description of CenturyLink Network Intrusion Detection Services ( Service ) offerings including technical details and additional

More information

Attachment C Service Level Agreement for WAN and Internet

Attachment C Service Level Agreement for WAN and Internet Attachment C Service Level Agreement for WAN and Internet Overview The Vendor SLA for Owner shall apply to all data transmission and reception on all Vendor provided Owner Wide Area Network (WAN) connectivity,

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

MANAGED COLOCATION SERVICES TERMS AND CONDITIONS

MANAGED COLOCATION SERVICES TERMS AND CONDITIONS MANAGED COLOCATION SERVICES TERMS AND CONDITIONS In addition to the General Terms and Conditions, your use of the Managed Colocation Services is subject to the following additional terms and conditions:

More information

Standard: Event Monitoring

Standard: Event Monitoring October 24, 2016 Page 1 Contents Revision History... 4 Executive Summary... 4 Introduction and Purpose... 5 Scope... 5 Standard... 5 Audit Log Standard: Nature of Information and Retention Period... 5

More information