SECURE CROSS DOMAIN GUARD
|
|
- Lee Cobb
- 5 years ago
- Views:
Transcription
1 SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open
2 Classification: Open ii MDS Technologies Ltd Other than for the sole purpose of evaluating this Response, no part of this material may be reproduced or transmitted in any form, or by any means, electronic, mechanical, photocopied, recorded or otherwise or stored in any retrieval system of any nature without the written permission of MDS Technologies Ltd. MDS Technologies Ltd, 2 Methuen Park, Chippenham, Wiltshire, SN14 0GX Telephone: , Fax: CONTENTS WHY MDS?... 3 SUMMARY OF SERVICE FEATURES... 3 PRODUCT OVERVIEW... 4 PRODUCT FEATURES... 5 BUSINESS BENEFITS... 6 TECHNICAL FEATURES... 6 EXAMPLE USE CASES... 8 INFORMATION ASSURANCE... 9 ON BOARDING AND OFF BOARDING PROCESSES... 9 PRICE MODEL SERVICE MANAGEMENT SERVICE CONSTRAINTS SERVICE LEVELS ORDERING AND INVOICE PROCESS SERVICE LEAD TIME TERMINATION COSTS BACKUP/RESTORE AND DISASTER RECOVERY DATA RESTORATION/SERVICE MIGRATION CUSTOMER RESPONSIBILITIES TECHNICAL REQUIREMENTS... 15
3 WHY MDS? A privately owned, UK sovereign company Connected to Internet, JANET, N3, PSN, RLI Public, community and private cloud available Security Cleared technical and customer service staff We are Agile, Flexible, Open, Honest and Transparent We deliver cost effective solutions on time and within budget We are your One-Stop-Shop for secure assured Cloud services A fully managed platform using our ITIL-aligned 24/7 Service Desk Experienced at delivering small, large and complex Cloud solutions We are an SME - large enough to deliver, small enough to care PROFESSIONAL, PERSONALISED SOLUTIONS SUMMARY OF SERVICE FEATURES Secure cross domain information sharing with customers, suppliers and partners Deal with less trusted organisations, without compromising your sensitive data Malware protection and data loss prevention reduces information security risk Enhanced security operations for remediation and response to attack/compromise Enhanced defence for your critical systems and sensitive information Demonstrable compliance with policy, standards and legislation Simple integration with existing capabilities improves efficiency Automatic AV signature updates minimises the vulnerability window for known attacks Users held to account for their information sharing actions and activities Policy definable at organisation, department, team and individual levels
4 PRODUCT OVERVIEW MDS can provide the Secure Cross Domain Guard Service which enables information to be shared in a safe manner. The service ensures that application level security is provided to prevent data loss and malware infection, within a security architecture, specifically developed to meet Government requirements for secure collaboration across security domains. The service is available to protect communications, web service communications, web browsing, file sharing and network management communications. The provided secure information sharing capability can be tailored to meet an organisation s specific business information sharing needs whilst addressing the threats faced in accordance with its security risk appetite. This puts the organisation in control of what its staff can share and with whom they can share it, maintaining the necessary log data to hold users to account for their decisions. The service supports the use of Government Security Classifications helping to protect users from inadvertently losing sensitive data. We provide optional utilities, for deployment on the service user s platforms, which facilitate automatic and manually controlled file sharing through the Guard service. This minimises integration activities and ensures consistent application of an organisation s information sharing policy. A 24/7 Service Desk enables the service user organisation to rapidly access product policy configuration and operation experts to allow a swift response to any Incidents impacting your organisation s business information sharing. The core service covers the following scope: Provision of a Deep-Secure content inspection Guard licence for the period of the service Provision of Solaris licence (where Bastion service is chosen) for the period of the service Deployment of the Guard software on customer or third party service infrastructure Integration of the Guard with High and Low side infrastructure Configuration of a standard templated Guard policy for permitted information exchanges Service test to ensure correct configuration and integration Service Helpdesk Guard software patch provision Guard software update provision The following additional service options may be chosen: Configuration of a tailored Guard policy for permitted information exchanges which meets the organisations specific information exchange needs Deployment of file sharing applications and/or utilities software on High and Low side customer or third party service infrastructure Integration of file sharing applications and/or utilities software on High and Low side customer or third party service infrastructure
5 Configuration of file sharing applications and/or utilities software File sharing applications and/or utilities software patch provision File sharing applications and/or utilities software update provision Guard policy, application and utility configuration and management training Sophos AV licence for the period of the service Sophos AV deployment on the Guard Day-to-day Guard administration tasks MDS is a reseller of this Deep Secure service. PRODUCT FEATURES Our Secure Cross Domain Guard Service has the following key features: Sharing of multiple business information types supported: Web services Web browsing Files Network management traffic Self-defending security architecture Suitable for protecting Tier 1, Tier 2 and Tier 3 information Fully supports use of Government Security Classifications for information sharing policy 24/7 Service Desk support Named Account Manager The following options may be purchased: Standard CentOS hosted Guard or Bastion hosted Guard for higher assurance deployments Automatic AV signature updates File transfer utilities and applications to simplify file transfer capabilities
6 BUSINESS BENEFITS The following business benefits may be achieved: Compliance with HMG Policy, Standards and Legislation More efficient secure cross domain information sharing with customers, suppliers and partners Interact with less trusted organisations efficiently and safely, without compromising your sensitive data Malware protection and data loss prevention reduces information security risk Enhanced security operations for remediation and response to attack/compromise Enhanced defence for your critical systems and sensitive information Demonstrable compliance with policy, standards and legislation Simple integration with existing capabilities improves efficiency Automatic AV signature updates minimises vulnerability window for known attacks Users held to account for their information sharing actions and activities Policy definable at organisation, department, team and individual levels Enhanced control over total cost of ownership TECHNICAL FEATURES The Secure Cross Domain Guard Service has the following technical features: Protocol Whitelisting: HTTP/HTTP(S) SMTP X400 SNMP SYSLOG Filetype whitelisting or blacklisting based on deep content inspection filetype identification: This includes optional blocking of filetypes if they contain macros Covers XML data including XML schema compliance validation Government Security Classification label support for both formal (i.e. Boldon-James or TITUS) and informal (e.g. header, footer, first line of text, subject field) security labels Asymmetric policies for inbound and outbound data Directory Services integration Fine grained policy rules (organisation, department, team, individual)
7 Lexical analysis for identification of sensitive text with configurable list(s) of dirty words XML schema validation Digital signature validation Redaction of network address data from the header and traffic fields for messages Redaction of whole attachments (for all attachments) Partial content redaction Handling of encrypted content to enable inspection Information protected in transit between the user and the service infrastructure utilising: TLS for HTTP(S) and SMTP(S) SNMP V3 encryption for network management SMIME for SMTP Action on policy conflict is configurable and can range from alerting the user to alerting (by ) security staff Logging is configurable for both successful and unsuccessful attempts to share data via the Secure Cross Domain Guard Service components This enables users to be held to account for their actions The following technical features are available depending on options purchased: CESG Common Criteria EAL4 Bastion host operating system Integrated Sophos AV checking with automated AV signature update File sharing web application Automated file sharing utilities
8 High Domain Secure Cross Domain Guard Services Low Domain EXAMPLE USE CASES Figure 1: Secure Cross Domain Guard Service This service supports the following information sharing use cases: Cross domain Inspection of message and any attached files to ensure policy compliance Cross domain file transfer Inspection of file transferred to ensure policy compliance Cross domain web services Inspection of web services traffic and any embedded information to ensure policy compliance and protect back end services and databases from malicious intervention Cross domain web browsing Browse-up Browse down Cross domain network management Enabling management of multiple networks and devices, operating at differing classifications, from a single management domain. Facilitates single end-to-end infrastructure view
9 External source (e.g. DVD, USB stick) file import/export Safely import from and export to removable media in accordance with organisational policy Control of access to OFFICIAL SENSITIVE data within and cross domain Use of shared filestores with the Guard, ensuring both what is accessed and what is input is aligned with access policy Validated XML schema based application information sharing XML schema validation to protect applications and services from malformed, or out of range, XML content Secure sharing policy compliance enforcement INFORMATION ASSURANCE The Secure Cross Domain Guard Service is suitable to meet the requirements for all sensitivity levels within the GSC Scheme subject to the considerations of accreditation best practice and specific use case considerations. Deep-Secure are ISO aligned for the Secure Cross Domain Guard Service and certified to CES/IASME. The service can be hosted within an assured Cloud platform, which is aligned to the CESG Cloud Security Principles and Pan Government Accredited at IL2 and IL3 (e.g. Skyscape s Self-managed Cross Domain Solution) or on an appropriately accredited customer platform. ON BOARDING AND OFF BOARDING PROCESSES On-boarding As part of on-boarding we will: Deploy the Guard software, and work with your organisation to set up and configure the service Test the service to ensure information exchange is correctly configured and that reports and alerts are working as expected We offer two methods of on-boarding, based on the service needs: A standard templated configuration based on a fixed application in line with the use cases outlined in the preceding section An optional tailored configuration of secure cross domain information sharing requirements which meet your specific risk profile We work with your organisation to determine your specific cross domain information exchange policy requirements as they differ from the standard templated configuration including any specific associated logging and compliance requirements All service on-boarding is delivered in line with the Deep-Secure ISO9001 Certified Quality Management System processes for the implementation of the Secure Cross Domain Guard Service product.
10 Order Acknowledgement QF17 Form Sales Order Form (approved and uploaded to CRM) Plan PSO Deployment Plan Product Delivery Engage Finance Training Dates Agreed dates with External Trainer and Customer Tailored Deployment Statement of Work Tailored policy specification Standard Deployment Agreed dates with Customer Invoice Schedule Training (QF12 issued) PSO (QF14 issued) Support (QF16 issued) Product (QF11 issued) Customer Review Order 3 rd party SW QF21 Purchase Request 3 rd Party SW Licences Customer Acceptance Document Allocate SW Licences & Create CD Perform Training Training Materials Presentations Deployment Activities & Test Licence Allocation QF20 Licence Number Register QF19 Licence Record Deployment CD Training Feedback QF12 External Training Feedback Form Completion Document QF14 Customer Feedback Questionnaire Deliver Product to Customer Delivery Documentation QF11 Delivery Note QF25 Certificate of Conformance (optional) Figure 2: Service deployment process Off-boarding As part of off-boarding we will: Provide you with access to the logs held within the service at the point of decommissioning, if required Decommission the Deep-Secure Guard software Delete all accounts and data Recover all licensed software We will charge a single day at our professional services rates (see Pricing) for off-boarding activities.
11 PRICE MODEL Our core Secure Cross Domain Guard Service is based on a monthly charge per Guard instance required by the customer. In addition, there is a service on-boarding charge that covers installation, configuration of the standard (templated) Guard policy and testing. Optional service elements include: Tailored service configuration to meet customer s specific risk profile Additional protocols for information exchange based on an on-boarding charge and a monthly charge per Guard instance required by the customer Sophos AV software based on a monthly charge File sharing utilities based on an on-boarding charge and a monthly charge File sharing applications based on an on-boarding charge and a monthly charge per 10 users enabled Training based on a charge per course per attendee Full details of pricing are contained in the service pricing document. Pricing excludes costs associated with the provision of compute and storage infrastructure required to host the Secure Cross Domain Guard Service. This will vary depending on the nature of the information exchange requirements that are part of a customer s specific solution. Pricing excludes day-to-day Guard administration tasks. This can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. SERVICE MANAGEMENT The Secure Cross Domain Guard Service includes full software maintenance and support for the sustainment of the deployed instances and the associated resources required. This excludes day-today Guard administration tasks. This can be provided at our professional services rates (see Pricing), or through third party service management offerings. The support offered is covered under a comprehensive service management pack as detailed in the subsequent sections. SERVICE CONSTRAINTS None. SERVICE LEVELS The Deep Secure Service Desk is available: Monday-Friday, , local UK time, excluding bank and public holidays. Outside of these hours MDS can provide a limited first and second line service. Support is provided by experienced Deep-Secure technical engineers who are specifically trained to perform in-depth diagnostic and troubleshooting activities in order to resolve product issues as quickly as possible along with carrying out any product execution tasks included within the Secure Cross Domain Guard Service.
12 All Customer interaction details will be recorded and a Case Reference Number (CRN) assigned. Engineers work in small flexible multi-skilled units. This facilitates a team approach to service provision and ensures that more than one engineer is aware and able to discuss and resolve your service requests. Service Request Categories The following table sets out the categories that will be assigned to each Service Request. Table SL1 Category Description 1 Total service failure of (operational) system or failure of a component of a critical process 2 Failure of one or more system functions making use of the system difficult (e.g. service still running and operational but not to full capacity) 3 Failure of a non-critical function having no significant effect on the system operation (e.g. failure of a sub-component such as a new version of an AV product) 4 Any incident having minimal impact on the system operation, requests for information or requests for enhancements. Service Levels The times indicated in table SL2 below are the target times for the Service Provider to respond to or provide a workaround for incidents as set forth in the Agreement. All periods of time commence from when the Service Provider first receives notification of a new incident. Table SL2 Response and Workaround Times Category Target Response Time Target Workaround Time 1 Less than 1 Working Hour Less than 1 Working Day 2 Less than 1 Working Hour Less than 3 Working Days 3 Less than 1 Working Hour Less than 10 Working Days 4 Less than 1 Working Hour As Appropriate
13 Escalation In the event that a Service Request is not provided within the relevant target time indicated in table SL3 above then the following escalation timings shall apply. For the purposes of this agreement, escalation shall mean the customer shall have the right to communicate with that person in relation to the provision of the Service Request. In the event that the identified individual is not available then the Service Provider shall use their reasonable endeavours to provide the customer with an alternate contact person. Table SL3 Category Service Delivery Manager Product Manager 1 Immediate Notification 1 Working Day 2 2 Working Days 5 Working Days 3 10 Working Days N/A 4 N/A N/A Security Flaws In the event that the Service Provider identifies security flaws in the software, the Service Provider shall categorise the security flaw in accordance with table SL4. Table SL4 Severity Description 1 Security vulnerability that allows Service Provider guard or administration system to be compromised (e.g. attacker gains control of the guard's host operating system). 2 Security vulnerability which means the Service Provider guard fails to block data that should be blocked according to the configured policy (e.g. data type configured to be blocked is allowed to pass). 3 Security vulnerability which means the guard fails to correctly identify the source or destination of data when applying policy (e.g. identity of originator of a signed message incorrectly identified resulting in loss of accountability). After categorising any emerging security flaw, the Service Provider shall follow the alerting and remediation process timings of table SL5. Alerting shall be to a customer nominated point of contact, using an agreed customer nominated communication means (e.g. secure address).
14 Table SL5 Alerting and Remediation Times Severity Target Alert Time Target Remediation Time 1 Less than 2 Working Days Less than 2 Working Days 2 Less than 2 Working Days Less than 5 Working Days 3 Less than 2 Working Days Less than 7 Working Days Should we fail to meet SLA terms within the defined timescales we will credit 1 days worth of Secure Cross Domain Guard Service charge. ORDERING AND INVOICE PROCESS Ordering can be carried out using the Framework Agreement Call Off Contract. Invoicing is monthly in arrears. Payment can be via the following methods: BACS or Cheque. SERVICE LEAD TIME We will initiate on-boarding on receipt of purchase order in line with the Service Deployment Process identified in the On-Boarding section of this Service Definition Document. Timescales for implementation of the service will vary, depending on the size and complexity of the service deployment. Once a Secure Cross Domain Guard Service platform has been deployed, configured and tested under the scope of the initial charge, the live service will commence under the recurring service charge model. The service is based on a one month initial implementation period followed into live service from month two onwards. TERMINATION COSTS We will charge a single day at our professional services rates (see Pricing) for off-boarding activities. Where a customer has purchased a Bastion hosted Secure Cross Domain Guard Service and terminates the service early an early termination charge of up to 1500 (fifteen hundred pounds) may be applied to cover the yearly Solaris licence fees. BACKUP/RESTORE AND DISASTER RECOVERY With the exception of held message queues, configuration and syslog data the Secure Cross Domain Guard Service is stateless. Back-up of configuration, held queues and syslog data is a consumer responsibility. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service.
15 DATA RESTORATION/SERVICE MIGRATION Data restoration is not included in the service. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. Service migration is not included in the service. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. CUSTOMER RESPONSIBILITIES The consumer is responsible for: Provision of compute and storage infrastructure required to host the Secure Cross Domain Guard Service Releasing messages held by the Guard service Responding to policy conflict alerts s raised by the Guard service Completion of the Sales Order Form in line with the G-Cloud procurement process For tailored policy configuration services: Approval of the Statement of Work and System Design Document Engaging with, and specifying requirements for, the detailed configuration of the information exchange policy and reports that are required Providing appropriate and empowered attendees for scoping and review meetings The control and management of access and responsibilities for end users Ensuring that only appropriate data in line with the GSC Scheme (e.g. OFFICIAL or OFFICIAL- SENSITIVE) is accessible and presented to the platform. Where the consumer chooses not to take up a third party day-to-day management service, or professional services management, they are also responsible for: Guard configuration back-up Syslog back-up Held queue back-up Recovery from back-up TECHNICAL REQUIREMENTS Where a Bastion Guard service is required the deployment platform provided by the customer or their service provider must be compatible with Oracle s Solaris 10 hardware compatibility list. Appropriately specified host server and client devices where required to include associated licence provision.
SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open
SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material
More informationAPPLICATION DELIVERY AS A SERVICE
SERVICE DEFINITION APPLICATION DELIVERY AS A SERVICE G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationUKCLOUD SECURE REMOTE ACCESS
SERVICE DEFINITION UKCLOUD SECURE REMOTE ACCESS G-CLOUD 10 Classification: Open Classification: Open ii MDS Technologies Ltd 2018. Other than for the sole purpose of evaluating this Response, no part of
More informationService Description Safecom Customer Connection Version 3.5
Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationInfrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT
Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...
More informationSchedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management
More informationSCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationSecure Managed Firewall
Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any
More informationCrises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.
Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility
More informationSimplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to.
Simplifying Information Sharing Across Security Boundaries Presentation to Deep-Secure Overview 12 th November 2013, Prague 10 October 2011 1 What we do Deep-Secure offer solutions that help organisations
More informationService Description: CNS Federal High Touch Technical Support
Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in
More informationCustomer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach
Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand
More informationBT Assure Cloud Identity Annex to the General Service Schedule
1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person
More informatione2e Managed Customer Cloud Infrastructure Service Service Definition Document
1 e2e Managed Customer Cloud Infrastructure Service Service Definition Document OVERVIEW A range of Cloud infrastructure managed services where the customer buys or already owns the Infrastructure but
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationGDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd
GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationCAPABILITY STATEMENT
CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationContents. 1 General Terms. Page 1 of 8
Page 1 of 8 Service Description: Advanced Services --- Fixed Price Secure Agile Exchange Advise and Implement (Quick Start) (ASF-CORE-SAI-QS) This document describes Cisco s Secure Agile Exchange Advise
More informationSERVICE DESCRIPTION MANAGED FIREWALL/VPN
Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...
More informationGDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ
GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation
More informationSECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE
SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE
More informationDatabase as a Service (DBaaS) EnterpriseDB
Database as a Service (DBaaS) EnterpriseDB Contents 1 Intro to Enterprise Database as a Service...2 2 Service Definition...3 2.1 Customer On-Boarding... 4 2.2 Event & Incident Management... 4 2.3 Request
More informationOracle Managed Cloud Services for Oracle Platform as a Service and Infrastructure as a Service - Service Descriptions
Oracle Managed Cloud Services for Oracle Platform as a Service and Infrastructure as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Applications Unlimited on Oracle Technology
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationASD CERTIFICATION REPORT
ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationService Level Agreement Domain Registration Services
Domain Registration Services 15 th March 2016 Not just another IT company Why? Because we think, react and deliver differently. Advise, Build, Support & Protect. It s what we do best, simple as that. We
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationOracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018
Oracle Managed Cloud Services for Software as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Cloud GxP Compliance for SaaS...3 Oracle Managed Cloud Helpdesk for SaaS...5
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationTIBCO Nimbus Cloud Service. Software Release November 2016
TIBCO Nimbus Software Release 10.0.0 November 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationTIBCO Nimbus Service
TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade
More informationRFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template
RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationCloud Services. Infrastructure-as-a-Service
Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationWHITE PAPER. Title. Managed Services for SAS Technology
WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive
More informationISO27001 Preparing your business with Snare
WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security
More informationService Description Safecom Simple Mail Relay Version 3.5
Service Description Safecom Simple Mail Relay Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION... 3 2 SERVICE DEFINITION... 3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationHPE File Data Migration Service
Data sheet HPE File Data Migration Service HPE Consulting and Integration Services File migration simplified Available in convenient packaged offerings, HPE File Data Migration Service is designed to help
More informationPEPPOL Transport Infrastructure Agreements Annex 3 Services and service levels
Table of contents 1. Scope for this document... 2 2. PEPPOL Services... 2 3. PEPPOL SML Service availability... 4 4. PEPPOL SMP and PEPPOL AP Service availability... 4 5. Performance, Capacity and Scalability...
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationService Level Agreement
General This document is a (SLA) setting out the indicative levels of services to be provided to you by Luminet. This document must be read in conjunction with our standard Terms and Conditions of Service
More informationService Description: Solution Support for Service Provider Software - Preferred This document
Page 1 of 5 Service Description: Solution Support for Service Provider Software - Preferred This document describes the Cisco Solution Support for Service Provider Software - Preferred. Related Documents:
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationCOMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)
ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable
More informationVirtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services
Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as
More informationProduct Definition: Backup-as-a-Service (BaaS)
Product Definition: Backup-as-a-Service (BaaS) Version: 1.0 Date: April 2018 ABOUT THIS DOCUMENT... 3 PRODUCT OVERVIEW... 4 PRODUCT FEATURES... 4 PRODUCT BENEFITS... 4 PRODUCT DETAILS... 5 PRODUCT OPTIONS...
More informationPartner Premier Service Program
SERVICE DESCRIPTION Partner Premier Service Program Polycom s Partner Premier Service Program provides Service Partners with technical telephone support, advance parts replacement, software upgrades &
More informationIMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE
Technical Note GLOBAL RESPONSE CENTRE INTRODUCTION IMPACT s Global Response (GRC) acts as the foremost cyber threat resource centre for the global. It provides emergency response to facilitate identification
More informationDHIS2 Hosting Proposal
www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and
More informationMilk Support Service Level Agreement
Milk Support Service Level Agreement Document Owner: Milk (Student Planner System) Service Level Agreement (SLA) for: (CUSTOMER NAME) Revision History Version Date Contributor Modifications 1.0 May 2018
More informationESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES
ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what
More informationABOUT THIS SECTION...
CONTENTS 1 ABOUT THIS SECTION... 2 2 MANAGED SECURITY SERVICES... 2 3 WHAT IS SECURITY MONITORING?... 3 4 WHAT ARE THE SECURITY MONITORING SERVICE LEVELS?... 6 5 WHAT IS SECURITY INTELLIGENCE?... 10 6
More informationOffice 365. Claranet Service Description
Claranet Service Description Office 365 Provides a highly configurable Email, Collaboration and Unified Communications platform, hosted by Microsoft, that can be deployed for a customer organisation to
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationSLA. Service Level Agreement v1.0. Published: September 2014
SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because
More informationGranted: The Cloud comes with security and continuity...
Granted: The Cloud comes with security and continuity... or, does it? Bogac Ozgen, MSc GyroFalco Ltd. http://www.gyrofalco.com Questions & Answers Do we still need security and continuity? YES Should I
More informationUpdated December 12, Chapter 10 Service Description IBM Cloud for Government
Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationMICROSOFT APPLICATIONS
MICROSOFT APPLICATIONS MICROSOFT SOFTWARE SOLUTIONS THE EFFECTIVE WAY TO DELIVER MICROSOFT APPLICATIONS The Microsoft Office suite of applications are a business essential; one that is used each and every
More informationCABINET PLANNING SYSTEM PROCUREMENT
Report No: 163/2017 PUBLIC REPORT CABINET 19 September 2017 PLANNING SYSTEM PROCUREMENT Report of the Director for Places (Development & Economy) Strategic Aim: Sustainable Growth Key Decision: Yes Exempt
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationEnd User Terminal Service
Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History
More informationWhat can the OnBase Cloud do for you? lbmctech.com
What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding
More informationTiscali Business Services Wholesale IPVPN Services Summary
Tiscali Services Wholesale IPVPN Services Summary Products covered: WIPVPN Standard WIPVPN WIPVPN Premium WIPVPN Premium WIPVPN May 2007 V.2.0 1 Table of Contents 1. Introduction... 3 2. Core product offering.
More informationTB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored
the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of
More informationMERAKI SERVICE DESCRIPTION
MERAKI SERVICE DESCRIPTION Document Control Purpose of this Document The purpose of this document is to provide clear guidance on what the Meraki service will deliver to the end client. Document Contributors
More informationUniversity of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationAxiell ALM Cloud Service - Service Level Agreement
Axiell ALM Cloud Service - Service Level Agreement 2017 This service level agreement (SLA) applies to the Axiell ALM Cloud services provided by Axiell ALM Netherlands BV ( Service Provider ), and includes
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationOverview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution.
Overview Cobweb s service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution. is an easy-to-use, cloud backup storage solution that enables companies to backup files, folders,
More informationWhat you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered
What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationServices Summary. Deliverables. Location of Services. Services Assumptions & Exclusions. General Project Management
Page 1 of 1 SERVICE DESCRIPTION: CISCO DNA CENTER ADVISE AND IMPLEMENT QUICK START ASF-EN1-G-DNAC-QS Services Summary Digital Network Architecture (DNA) Center Advise and Implement Quick Start assists
More informationJT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE
Jersey Application form and Service Description for JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE : Account no: Copies held by 1 (the "Customer") 2. JT Hosting Services Application for Service
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationService Description: Identity Services Engine Implementation-Subscription Service
Page 1 of 6 Service Description: Identity Services Engine Implementation-Subscription Service Services Summary This document describes the Identity Services Engine Implementation. Subscription Service.
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationXO SITE SECURITY SERVICES
XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises
More informationNational security is our priority. Critical services for a critical service
National security is our priority Critical services for a critical service National security is our priority Sensitive, specialist delivery of secure ICT Working with the defence community Like all government
More informationData Protection and GDPR
Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have
More information