SECURE CROSS DOMAIN GUARD

Size: px
Start display at page:

Download "SECURE CROSS DOMAIN GUARD"

Transcription

1 SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open

2 Classification: Open ii MDS Technologies Ltd Other than for the sole purpose of evaluating this Response, no part of this material may be reproduced or transmitted in any form, or by any means, electronic, mechanical, photocopied, recorded or otherwise or stored in any retrieval system of any nature without the written permission of MDS Technologies Ltd. MDS Technologies Ltd, 2 Methuen Park, Chippenham, Wiltshire, SN14 0GX Telephone: , Fax: CONTENTS WHY MDS?... 3 SUMMARY OF SERVICE FEATURES... 3 PRODUCT OVERVIEW... 4 PRODUCT FEATURES... 5 BUSINESS BENEFITS... 6 TECHNICAL FEATURES... 6 EXAMPLE USE CASES... 8 INFORMATION ASSURANCE... 9 ON BOARDING AND OFF BOARDING PROCESSES... 9 PRICE MODEL SERVICE MANAGEMENT SERVICE CONSTRAINTS SERVICE LEVELS ORDERING AND INVOICE PROCESS SERVICE LEAD TIME TERMINATION COSTS BACKUP/RESTORE AND DISASTER RECOVERY DATA RESTORATION/SERVICE MIGRATION CUSTOMER RESPONSIBILITIES TECHNICAL REQUIREMENTS... 15

3 WHY MDS? A privately owned, UK sovereign company Connected to Internet, JANET, N3, PSN, RLI Public, community and private cloud available Security Cleared technical and customer service staff We are Agile, Flexible, Open, Honest and Transparent We deliver cost effective solutions on time and within budget We are your One-Stop-Shop for secure assured Cloud services A fully managed platform using our ITIL-aligned 24/7 Service Desk Experienced at delivering small, large and complex Cloud solutions We are an SME - large enough to deliver, small enough to care PROFESSIONAL, PERSONALISED SOLUTIONS SUMMARY OF SERVICE FEATURES Secure cross domain information sharing with customers, suppliers and partners Deal with less trusted organisations, without compromising your sensitive data Malware protection and data loss prevention reduces information security risk Enhanced security operations for remediation and response to attack/compromise Enhanced defence for your critical systems and sensitive information Demonstrable compliance with policy, standards and legislation Simple integration with existing capabilities improves efficiency Automatic AV signature updates minimises the vulnerability window for known attacks Users held to account for their information sharing actions and activities Policy definable at organisation, department, team and individual levels

4 PRODUCT OVERVIEW MDS can provide the Secure Cross Domain Guard Service which enables information to be shared in a safe manner. The service ensures that application level security is provided to prevent data loss and malware infection, within a security architecture, specifically developed to meet Government requirements for secure collaboration across security domains. The service is available to protect communications, web service communications, web browsing, file sharing and network management communications. The provided secure information sharing capability can be tailored to meet an organisation s specific business information sharing needs whilst addressing the threats faced in accordance with its security risk appetite. This puts the organisation in control of what its staff can share and with whom they can share it, maintaining the necessary log data to hold users to account for their decisions. The service supports the use of Government Security Classifications helping to protect users from inadvertently losing sensitive data. We provide optional utilities, for deployment on the service user s platforms, which facilitate automatic and manually controlled file sharing through the Guard service. This minimises integration activities and ensures consistent application of an organisation s information sharing policy. A 24/7 Service Desk enables the service user organisation to rapidly access product policy configuration and operation experts to allow a swift response to any Incidents impacting your organisation s business information sharing. The core service covers the following scope: Provision of a Deep-Secure content inspection Guard licence for the period of the service Provision of Solaris licence (where Bastion service is chosen) for the period of the service Deployment of the Guard software on customer or third party service infrastructure Integration of the Guard with High and Low side infrastructure Configuration of a standard templated Guard policy for permitted information exchanges Service test to ensure correct configuration and integration Service Helpdesk Guard software patch provision Guard software update provision The following additional service options may be chosen: Configuration of a tailored Guard policy for permitted information exchanges which meets the organisations specific information exchange needs Deployment of file sharing applications and/or utilities software on High and Low side customer or third party service infrastructure Integration of file sharing applications and/or utilities software on High and Low side customer or third party service infrastructure

5 Configuration of file sharing applications and/or utilities software File sharing applications and/or utilities software patch provision File sharing applications and/or utilities software update provision Guard policy, application and utility configuration and management training Sophos AV licence for the period of the service Sophos AV deployment on the Guard Day-to-day Guard administration tasks MDS is a reseller of this Deep Secure service. PRODUCT FEATURES Our Secure Cross Domain Guard Service has the following key features: Sharing of multiple business information types supported: Web services Web browsing Files Network management traffic Self-defending security architecture Suitable for protecting Tier 1, Tier 2 and Tier 3 information Fully supports use of Government Security Classifications for information sharing policy 24/7 Service Desk support Named Account Manager The following options may be purchased: Standard CentOS hosted Guard or Bastion hosted Guard for higher assurance deployments Automatic AV signature updates File transfer utilities and applications to simplify file transfer capabilities

6 BUSINESS BENEFITS The following business benefits may be achieved: Compliance with HMG Policy, Standards and Legislation More efficient secure cross domain information sharing with customers, suppliers and partners Interact with less trusted organisations efficiently and safely, without compromising your sensitive data Malware protection and data loss prevention reduces information security risk Enhanced security operations for remediation and response to attack/compromise Enhanced defence for your critical systems and sensitive information Demonstrable compliance with policy, standards and legislation Simple integration with existing capabilities improves efficiency Automatic AV signature updates minimises vulnerability window for known attacks Users held to account for their information sharing actions and activities Policy definable at organisation, department, team and individual levels Enhanced control over total cost of ownership TECHNICAL FEATURES The Secure Cross Domain Guard Service has the following technical features: Protocol Whitelisting: HTTP/HTTP(S) SMTP X400 SNMP SYSLOG Filetype whitelisting or blacklisting based on deep content inspection filetype identification: This includes optional blocking of filetypes if they contain macros Covers XML data including XML schema compliance validation Government Security Classification label support for both formal (i.e. Boldon-James or TITUS) and informal (e.g. header, footer, first line of text, subject field) security labels Asymmetric policies for inbound and outbound data Directory Services integration Fine grained policy rules (organisation, department, team, individual)

7 Lexical analysis for identification of sensitive text with configurable list(s) of dirty words XML schema validation Digital signature validation Redaction of network address data from the header and traffic fields for messages Redaction of whole attachments (for all attachments) Partial content redaction Handling of encrypted content to enable inspection Information protected in transit between the user and the service infrastructure utilising: TLS for HTTP(S) and SMTP(S) SNMP V3 encryption for network management SMIME for SMTP Action on policy conflict is configurable and can range from alerting the user to alerting (by ) security staff Logging is configurable for both successful and unsuccessful attempts to share data via the Secure Cross Domain Guard Service components This enables users to be held to account for their actions The following technical features are available depending on options purchased: CESG Common Criteria EAL4 Bastion host operating system Integrated Sophos AV checking with automated AV signature update File sharing web application Automated file sharing utilities

8 High Domain Secure Cross Domain Guard Services Low Domain EXAMPLE USE CASES Figure 1: Secure Cross Domain Guard Service This service supports the following information sharing use cases: Cross domain Inspection of message and any attached files to ensure policy compliance Cross domain file transfer Inspection of file transferred to ensure policy compliance Cross domain web services Inspection of web services traffic and any embedded information to ensure policy compliance and protect back end services and databases from malicious intervention Cross domain web browsing Browse-up Browse down Cross domain network management Enabling management of multiple networks and devices, operating at differing classifications, from a single management domain. Facilitates single end-to-end infrastructure view

9 External source (e.g. DVD, USB stick) file import/export Safely import from and export to removable media in accordance with organisational policy Control of access to OFFICIAL SENSITIVE data within and cross domain Use of shared filestores with the Guard, ensuring both what is accessed and what is input is aligned with access policy Validated XML schema based application information sharing XML schema validation to protect applications and services from malformed, or out of range, XML content Secure sharing policy compliance enforcement INFORMATION ASSURANCE The Secure Cross Domain Guard Service is suitable to meet the requirements for all sensitivity levels within the GSC Scheme subject to the considerations of accreditation best practice and specific use case considerations. Deep-Secure are ISO aligned for the Secure Cross Domain Guard Service and certified to CES/IASME. The service can be hosted within an assured Cloud platform, which is aligned to the CESG Cloud Security Principles and Pan Government Accredited at IL2 and IL3 (e.g. Skyscape s Self-managed Cross Domain Solution) or on an appropriately accredited customer platform. ON BOARDING AND OFF BOARDING PROCESSES On-boarding As part of on-boarding we will: Deploy the Guard software, and work with your organisation to set up and configure the service Test the service to ensure information exchange is correctly configured and that reports and alerts are working as expected We offer two methods of on-boarding, based on the service needs: A standard templated configuration based on a fixed application in line with the use cases outlined in the preceding section An optional tailored configuration of secure cross domain information sharing requirements which meet your specific risk profile We work with your organisation to determine your specific cross domain information exchange policy requirements as they differ from the standard templated configuration including any specific associated logging and compliance requirements All service on-boarding is delivered in line with the Deep-Secure ISO9001 Certified Quality Management System processes for the implementation of the Secure Cross Domain Guard Service product.

10 Order Acknowledgement QF17 Form Sales Order Form (approved and uploaded to CRM) Plan PSO Deployment Plan Product Delivery Engage Finance Training Dates Agreed dates with External Trainer and Customer Tailored Deployment Statement of Work Tailored policy specification Standard Deployment Agreed dates with Customer Invoice Schedule Training (QF12 issued) PSO (QF14 issued) Support (QF16 issued) Product (QF11 issued) Customer Review Order 3 rd party SW QF21 Purchase Request 3 rd Party SW Licences Customer Acceptance Document Allocate SW Licences & Create CD Perform Training Training Materials Presentations Deployment Activities & Test Licence Allocation QF20 Licence Number Register QF19 Licence Record Deployment CD Training Feedback QF12 External Training Feedback Form Completion Document QF14 Customer Feedback Questionnaire Deliver Product to Customer Delivery Documentation QF11 Delivery Note QF25 Certificate of Conformance (optional) Figure 2: Service deployment process Off-boarding As part of off-boarding we will: Provide you with access to the logs held within the service at the point of decommissioning, if required Decommission the Deep-Secure Guard software Delete all accounts and data Recover all licensed software We will charge a single day at our professional services rates (see Pricing) for off-boarding activities.

11 PRICE MODEL Our core Secure Cross Domain Guard Service is based on a monthly charge per Guard instance required by the customer. In addition, there is a service on-boarding charge that covers installation, configuration of the standard (templated) Guard policy and testing. Optional service elements include: Tailored service configuration to meet customer s specific risk profile Additional protocols for information exchange based on an on-boarding charge and a monthly charge per Guard instance required by the customer Sophos AV software based on a monthly charge File sharing utilities based on an on-boarding charge and a monthly charge File sharing applications based on an on-boarding charge and a monthly charge per 10 users enabled Training based on a charge per course per attendee Full details of pricing are contained in the service pricing document. Pricing excludes costs associated with the provision of compute and storage infrastructure required to host the Secure Cross Domain Guard Service. This will vary depending on the nature of the information exchange requirements that are part of a customer s specific solution. Pricing excludes day-to-day Guard administration tasks. This can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. SERVICE MANAGEMENT The Secure Cross Domain Guard Service includes full software maintenance and support for the sustainment of the deployed instances and the associated resources required. This excludes day-today Guard administration tasks. This can be provided at our professional services rates (see Pricing), or through third party service management offerings. The support offered is covered under a comprehensive service management pack as detailed in the subsequent sections. SERVICE CONSTRAINTS None. SERVICE LEVELS The Deep Secure Service Desk is available: Monday-Friday, , local UK time, excluding bank and public holidays. Outside of these hours MDS can provide a limited first and second line service. Support is provided by experienced Deep-Secure technical engineers who are specifically trained to perform in-depth diagnostic and troubleshooting activities in order to resolve product issues as quickly as possible along with carrying out any product execution tasks included within the Secure Cross Domain Guard Service.

12 All Customer interaction details will be recorded and a Case Reference Number (CRN) assigned. Engineers work in small flexible multi-skilled units. This facilitates a team approach to service provision and ensures that more than one engineer is aware and able to discuss and resolve your service requests. Service Request Categories The following table sets out the categories that will be assigned to each Service Request. Table SL1 Category Description 1 Total service failure of (operational) system or failure of a component of a critical process 2 Failure of one or more system functions making use of the system difficult (e.g. service still running and operational but not to full capacity) 3 Failure of a non-critical function having no significant effect on the system operation (e.g. failure of a sub-component such as a new version of an AV product) 4 Any incident having minimal impact on the system operation, requests for information or requests for enhancements. Service Levels The times indicated in table SL2 below are the target times for the Service Provider to respond to or provide a workaround for incidents as set forth in the Agreement. All periods of time commence from when the Service Provider first receives notification of a new incident. Table SL2 Response and Workaround Times Category Target Response Time Target Workaround Time 1 Less than 1 Working Hour Less than 1 Working Day 2 Less than 1 Working Hour Less than 3 Working Days 3 Less than 1 Working Hour Less than 10 Working Days 4 Less than 1 Working Hour As Appropriate

13 Escalation In the event that a Service Request is not provided within the relevant target time indicated in table SL3 above then the following escalation timings shall apply. For the purposes of this agreement, escalation shall mean the customer shall have the right to communicate with that person in relation to the provision of the Service Request. In the event that the identified individual is not available then the Service Provider shall use their reasonable endeavours to provide the customer with an alternate contact person. Table SL3 Category Service Delivery Manager Product Manager 1 Immediate Notification 1 Working Day 2 2 Working Days 5 Working Days 3 10 Working Days N/A 4 N/A N/A Security Flaws In the event that the Service Provider identifies security flaws in the software, the Service Provider shall categorise the security flaw in accordance with table SL4. Table SL4 Severity Description 1 Security vulnerability that allows Service Provider guard or administration system to be compromised (e.g. attacker gains control of the guard's host operating system). 2 Security vulnerability which means the Service Provider guard fails to block data that should be blocked according to the configured policy (e.g. data type configured to be blocked is allowed to pass). 3 Security vulnerability which means the guard fails to correctly identify the source or destination of data when applying policy (e.g. identity of originator of a signed message incorrectly identified resulting in loss of accountability). After categorising any emerging security flaw, the Service Provider shall follow the alerting and remediation process timings of table SL5. Alerting shall be to a customer nominated point of contact, using an agreed customer nominated communication means (e.g. secure address).

14 Table SL5 Alerting and Remediation Times Severity Target Alert Time Target Remediation Time 1 Less than 2 Working Days Less than 2 Working Days 2 Less than 2 Working Days Less than 5 Working Days 3 Less than 2 Working Days Less than 7 Working Days Should we fail to meet SLA terms within the defined timescales we will credit 1 days worth of Secure Cross Domain Guard Service charge. ORDERING AND INVOICE PROCESS Ordering can be carried out using the Framework Agreement Call Off Contract. Invoicing is monthly in arrears. Payment can be via the following methods: BACS or Cheque. SERVICE LEAD TIME We will initiate on-boarding on receipt of purchase order in line with the Service Deployment Process identified in the On-Boarding section of this Service Definition Document. Timescales for implementation of the service will vary, depending on the size and complexity of the service deployment. Once a Secure Cross Domain Guard Service platform has been deployed, configured and tested under the scope of the initial charge, the live service will commence under the recurring service charge model. The service is based on a one month initial implementation period followed into live service from month two onwards. TERMINATION COSTS We will charge a single day at our professional services rates (see Pricing) for off-boarding activities. Where a customer has purchased a Bastion hosted Secure Cross Domain Guard Service and terminates the service early an early termination charge of up to 1500 (fifteen hundred pounds) may be applied to cover the yearly Solaris licence fees. BACKUP/RESTORE AND DISASTER RECOVERY With the exception of held message queues, configuration and syslog data the Secure Cross Domain Guard Service is stateless. Back-up of configuration, held queues and syslog data is a consumer responsibility. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service.

15 DATA RESTORATION/SERVICE MIGRATION Data restoration is not included in the service. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. Service migration is not included in the service. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. CUSTOMER RESPONSIBILITIES The consumer is responsible for: Provision of compute and storage infrastructure required to host the Secure Cross Domain Guard Service Releasing messages held by the Guard service Responding to policy conflict alerts s raised by the Guard service Completion of the Sales Order Form in line with the G-Cloud procurement process For tailored policy configuration services: Approval of the Statement of Work and System Design Document Engaging with, and specifying requirements for, the detailed configuration of the information exchange policy and reports that are required Providing appropriate and empowered attendees for scoping and review meetings The control and management of access and responsibilities for end users Ensuring that only appropriate data in line with the GSC Scheme (e.g. OFFICIAL or OFFICIAL- SENSITIVE) is accessible and presented to the platform. Where the consumer chooses not to take up a third party day-to-day management service, or professional services management, they are also responsible for: Guard configuration back-up Syslog back-up Held queue back-up Recovery from back-up TECHNICAL REQUIREMENTS Where a Bastion Guard service is required the deployment platform provided by the customer or their service provider must be compatible with Oracle s Solaris 10 hardware compatibility list. Appropriately specified host server and client devices where required to include associated licence provision.

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material

More information

APPLICATION DELIVERY AS A SERVICE

APPLICATION DELIVERY AS A SERVICE SERVICE DEFINITION APPLICATION DELIVERY AS A SERVICE G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

UKCLOUD SECURE REMOTE ACCESS

UKCLOUD SECURE REMOTE ACCESS SERVICE DEFINITION UKCLOUD SECURE REMOTE ACCESS G-CLOUD 10 Classification: Open Classification: Open ii MDS Technologies Ltd 2018. Other than for the sole purpose of evaluating this Response, no part of

More information

Service Description Safecom Customer Connection Version 3.5

Service Description Safecom Customer Connection Version 3.5 Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...

More information

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management

More information

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

Secure Managed Firewall

Secure Managed Firewall Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

Simplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to.

Simplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to. Simplifying Information Sharing Across Security Boundaries Presentation to Deep-Secure Overview 12 th November 2013, Prague 10 October 2011 1 What we do Deep-Secure offer solutions that help organisations

More information

Service Description: CNS Federal High Touch Technical Support

Service Description: CNS Federal High Touch Technical Support Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in

More information

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand

More information

BT Assure Cloud Identity Annex to the General Service Schedule

BT Assure Cloud Identity Annex to the General Service Schedule 1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person

More information

e2e Managed Customer Cloud Infrastructure Service Service Definition Document

e2e Managed Customer Cloud Infrastructure Service Service Definition Document 1 e2e Managed Customer Cloud Infrastructure Service Service Definition Document OVERVIEW A range of Cloud infrastructure managed services where the customer buys or already owns the Infrastructure but

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

CAPABILITY STATEMENT

CAPABILITY STATEMENT CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

Contents. 1 General Terms. Page 1 of 8

Contents. 1 General Terms. Page 1 of 8 Page 1 of 8 Service Description: Advanced Services --- Fixed Price Secure Agile Exchange Advise and Implement (Quick Start) (ASF-CORE-SAI-QS) This document describes Cisco s Secure Agile Exchange Advise

More information

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

SERVICE DESCRIPTION MANAGED FIREWALL/VPN Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...

More information

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation

More information

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE

More information

Database as a Service (DBaaS) EnterpriseDB

Database as a Service (DBaaS) EnterpriseDB Database as a Service (DBaaS) EnterpriseDB Contents 1 Intro to Enterprise Database as a Service...2 2 Service Definition...3 2.1 Customer On-Boarding... 4 2.2 Event & Incident Management... 4 2.3 Request

More information

Oracle Managed Cloud Services for Oracle Platform as a Service and Infrastructure as a Service - Service Descriptions

Oracle Managed Cloud Services for Oracle Platform as a Service and Infrastructure as a Service - Service Descriptions Oracle Managed Cloud Services for Oracle Platform as a Service and Infrastructure as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Applications Unlimited on Oracle Technology

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

ASD CERTIFICATION REPORT

ASD CERTIFICATION REPORT ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon

More information

Service Description: Software Support

Service Description: Software Support Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

Service Level Agreement Domain Registration Services

Service Level Agreement Domain Registration Services Domain Registration Services 15 th March 2016 Not just another IT company Why? Because we think, react and deliver differently. Advise, Build, Support & Protect. It s what we do best, simple as that. We

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018 Oracle Managed Cloud Services for Software as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Cloud GxP Compliance for SaaS...3 Oracle Managed Cloud Helpdesk for SaaS...5

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

TIBCO Nimbus Cloud Service. Software Release November 2016

TIBCO Nimbus Cloud Service. Software Release November 2016 TIBCO Nimbus Software Release 10.0.0 November 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

TIBCO Nimbus Service

TIBCO Nimbus Service TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade

More information

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Cloud Services. Infrastructure-as-a-Service

Cloud Services. Infrastructure-as-a-Service Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

WHITE PAPER. Title. Managed Services for SAS Technology

WHITE PAPER. Title. Managed Services for SAS Technology WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Service Description Safecom Simple Mail Relay Version 3.5

Service Description Safecom Simple Mail Relay Version 3.5 Service Description Safecom Simple Mail Relay Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION... 3 2 SERVICE DEFINITION... 3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

HPE File Data Migration Service

HPE File Data Migration Service Data sheet HPE File Data Migration Service HPE Consulting and Integration Services File migration simplified Available in convenient packaged offerings, HPE File Data Migration Service is designed to help

More information

PEPPOL Transport Infrastructure Agreements Annex 3 Services and service levels

PEPPOL Transport Infrastructure Agreements Annex 3 Services and service levels Table of contents 1. Scope for this document... 2 2. PEPPOL Services... 2 3. PEPPOL SML Service availability... 4 4. PEPPOL SMP and PEPPOL AP Service availability... 4 5. Performance, Capacity and Scalability...

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

Service Level Agreement

Service Level Agreement General This document is a (SLA) setting out the indicative levels of services to be provided to you by Luminet. This document must be read in conjunction with our standard Terms and Conditions of Service

More information

Service Description: Solution Support for Service Provider Software - Preferred This document

Service Description: Solution Support for Service Provider Software - Preferred This document Page 1 of 5 Service Description: Solution Support for Service Provider Software - Preferred This document describes the Cisco Solution Support for Service Provider Software - Preferred. Related Documents:

More information

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable

More information

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as

More information

Product Definition: Backup-as-a-Service (BaaS)

Product Definition: Backup-as-a-Service (BaaS) Product Definition: Backup-as-a-Service (BaaS) Version: 1.0 Date: April 2018 ABOUT THIS DOCUMENT... 3 PRODUCT OVERVIEW... 4 PRODUCT FEATURES... 4 PRODUCT BENEFITS... 4 PRODUCT DETAILS... 5 PRODUCT OPTIONS...

More information

Partner Premier Service Program

Partner Premier Service Program SERVICE DESCRIPTION Partner Premier Service Program Polycom s Partner Premier Service Program provides Service Partners with technical telephone support, advance parts replacement, software upgrades &

More information

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE Technical Note GLOBAL RESPONSE CENTRE INTRODUCTION IMPACT s Global Response (GRC) acts as the foremost cyber threat resource centre for the global. It provides emergency response to facilitate identification

More information

DHIS2 Hosting Proposal

DHIS2 Hosting Proposal www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and

More information

Milk Support Service Level Agreement

Milk Support Service Level Agreement Milk Support Service Level Agreement Document Owner: Milk (Student Planner System) Service Level Agreement (SLA) for: (CUSTOMER NAME) Revision History Version Date Contributor Modifications 1.0 May 2018

More information

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what

More information

ABOUT THIS SECTION...

ABOUT THIS SECTION... CONTENTS 1 ABOUT THIS SECTION... 2 2 MANAGED SECURITY SERVICES... 2 3 WHAT IS SECURITY MONITORING?... 3 4 WHAT ARE THE SECURITY MONITORING SERVICE LEVELS?... 6 5 WHAT IS SECURITY INTELLIGENCE?... 10 6

More information

Office 365. Claranet Service Description

Office 365. Claranet Service Description Claranet Service Description Office 365 Provides a highly configurable Email, Collaboration and Unified Communications platform, hosted by Microsoft, that can be deployed for a customer organisation to

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized

More information

SLA. Service Level Agreement v1.0. Published: September 2014

SLA. Service Level Agreement v1.0. Published: September 2014 SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because

More information

Granted: The Cloud comes with security and continuity...

Granted: The Cloud comes with security and continuity... Granted: The Cloud comes with security and continuity... or, does it? Bogac Ozgen, MSc GyroFalco Ltd. http://www.gyrofalco.com Questions & Answers Do we still need security and continuity? YES Should I

More information

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

Updated December 12, Chapter 10 Service Description IBM Cloud for Government Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

MICROSOFT APPLICATIONS

MICROSOFT APPLICATIONS MICROSOFT APPLICATIONS MICROSOFT SOFTWARE SOLUTIONS THE EFFECTIVE WAY TO DELIVER MICROSOFT APPLICATIONS The Microsoft Office suite of applications are a business essential; one that is used each and every

More information

CABINET PLANNING SYSTEM PROCUREMENT

CABINET PLANNING SYSTEM PROCUREMENT Report No: 163/2017 PUBLIC REPORT CABINET 19 September 2017 PLANNING SYSTEM PROCUREMENT Report of the Director for Places (Development & Economy) Strategic Aim: Sustainable Growth Key Decision: Yes Exempt

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

End User Terminal Service

End User Terminal Service Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History

More information

What can the OnBase Cloud do for you? lbmctech.com

What can the OnBase Cloud do for you? lbmctech.com What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding

More information

Tiscali Business Services Wholesale IPVPN Services Summary

Tiscali Business Services Wholesale IPVPN Services Summary Tiscali Services Wholesale IPVPN Services Summary Products covered: WIPVPN Standard WIPVPN WIPVPN Premium WIPVPN Premium WIPVPN May 2007 V.2.0 1 Table of Contents 1. Introduction... 3 2. Core product offering.

More information

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of

More information

MERAKI SERVICE DESCRIPTION

MERAKI SERVICE DESCRIPTION MERAKI SERVICE DESCRIPTION Document Control Purpose of this Document The purpose of this document is to provide clear guidance on what the Meraki service will deliver to the end client. Document Contributors

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

Axiell ALM Cloud Service - Service Level Agreement

Axiell ALM Cloud Service - Service Level Agreement Axiell ALM Cloud Service - Service Level Agreement 2017 This service level agreement (SLA) applies to the Axiell ALM Cloud services provided by Axiell ALM Netherlands BV ( Service Provider ), and includes

More information

MyCloud Computing Business computing in the cloud, ready to go in minutes

MyCloud Computing Business computing in the cloud, ready to go in minutes MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing

More information

Overview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution.

Overview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution. Overview Cobweb s service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution. is an easy-to-use, cloud backup storage solution that enables companies to backup files, folders,

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Services Summary. Deliverables. Location of Services. Services Assumptions & Exclusions. General Project Management

Services Summary. Deliverables. Location of Services. Services Assumptions & Exclusions. General Project Management Page 1 of 1 SERVICE DESCRIPTION: CISCO DNA CENTER ADVISE AND IMPLEMENT QUICK START ASF-EN1-G-DNAC-QS Services Summary Digital Network Architecture (DNA) Center Advise and Implement Quick Start assists

More information

JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE

JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE Jersey Application form and Service Description for JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE : Account no: Copies held by 1 (the "Customer") 2. JT Hosting Services Application for Service

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

Service Description: Identity Services Engine Implementation-Subscription Service

Service Description: Identity Services Engine Implementation-Subscription Service Page 1 of 6 Service Description: Identity Services Engine Implementation-Subscription Service Services Summary This document describes the Identity Services Engine Implementation. Subscription Service.

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

XO SITE SECURITY SERVICES

XO SITE SECURITY SERVICES XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises

More information

National security is our priority. Critical services for a critical service

National security is our priority. Critical services for a critical service National security is our priority Critical services for a critical service National security is our priority Sensitive, specialist delivery of secure ICT Working with the defence community Like all government

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information