TDC DoS Protection Service Description and Special Terms

Size: px
Start display at page:

Download "TDC DoS Protection Service Description and Special Terms"

Transcription

1 TDC DoS Protection Service Description and Special Terms

2 Table of contents 1 Purpose of this Product-Specific Appendix Service description Attack detection Managed Objects Misuse anomaly detection Attack mitigation Mitigation initiating process TDC Scrubbing Center Ending mitigation Technical service description Value-added services Additional Managed Objects Pre-defined mitigation templates Auto-mitigation Service reporting Pricing Delivery Service limitations Customer responsibilities Service changes and ordering additional services Special terms... 9 Service Description and Special Terms, DK2.6 2 (10)

3 1 Purpose of this Product-Specific Appendix This Product-Specific Appendix includes a service description for the TDC DoS Protection service (hereinafter referred to as the service) supplied by TDC and the special terms of the service. This Product-Specific Appendix is attached to and incorporated into the Delivery Agreement between TDC and the customer. 2 Service description TDC DoS (Denial of Service) Protection service is provided as a network-based service and consists of traffic monitoring, attack detection and mitigation as well as the reporting services. The DoS attack detection takes place by monitoring and analysing the customer s internet traffic at the edge of the TDC internet domain. The mitigation is performed in TDC s core network to eliminate the negative impact of the illegitimate traffic before it reaches the customer s internet access line and site. 2.1 Attack detection Managed Objects The service protects the customer s network resources, which in the system are grouped into Managed Objects (MO). One MO can contain either IP address ranges and/or individual IP addresses covering the network resources. One MO cannot contain both IPv4 and IPv6 network resources. The network resources defined in the same MO must have a similar traffic profile and similar load capacity. The service monitors the traffic and detects traffic anomalies targeted towards each of the customer s IP-addresses defined in the child MOs. An alarm is generated for the relevant MO when a traffic anomaly is detected. One of the MOs, called the Parent Managed Object, should cover all of the customer s network resources that should be protected. The Parent Managed Object should be complemented with more granular child MOs, which are the customer s selected strategic network resources like web or DNS services. The basic service includes one (1) Parent Managed Object and four (4) more specific child MOs. If the customer has one (1) or more child IPv6 MOs, a dedicated IPv6 parent MO is required. In such case the basic service covers two (2) Parent Managed Objects (one IPv4 and one IPv6 parent MO) and three (3) more specific child MOs (divided into IPv4 and IPv6). The configuration of the MOs is agreed between the customer and TDC during the service delivery phase Misuse anomaly detection The service is able to detect traffic anomalies which may cause the protected network resources to be either totally inaccessible or periodically disrupted for legitimate usage. The misuse anomaly detection mechanism measures IP, ICMP, TCP, UDP and total traffic to each of the protected network resources in order to identify protocol anomalies and exceptional traffic peaks. Each MO has pre-set anomaly-specific threshold values. The threshold values are defined in packets or bits per second. The anomaly-specific threshold values are agreed for each MO between TDC and the customer during the service setup phase. The threshold values should be tuned during the operational phase in case false positives occur or the MO traffic profile changes as described in chapter The misuse anomaly detection is able to detect known anomalies used in a specific set of attack methods, including: ICMP Anomaly TCP NULL Flag Anomaly Service Description and Special Terms, DK2.6 3 (10)

4 TCP SYN Flag Anomaly TCP RST Flag Anomaly IP NULL (Proto 0) Anomaly IP Fragmentation Anomaly IP Private Address Space Anomaly DNS (TCP and UDP port 53) Anomaly UDP Misuse Detection Total traffic 2.2 Attack mitigation Mitigation initiating process The service generates an alarm when any of the MO-specific threshold values are exceeded. The alarm is detected by the TDC Network Operation Center (NOC), which contacts the customer for consultation on whether or not the mitigation should be started. In case the customer agrees that mitigation should be started, the NOC creates a service ticket and forwards the ticket to the TDC Security Operations Center (SOC). TDC SOC reroutes the traffic targeting the attacked network resources via the TDC Scrubbing Center and starts analysing the attack. TDC SOC starts a mitigation best suited for the attack characteristics, severity and source. During the mitigation TDC SOC monitors the attack constantly and tunes the mitigation accuracy and granularity in dialog with the customer. When the traffic profile returns to normal level and the attack is assumed to be over, TDC SOC and the customer agree on when to stop the mitigation (see section 2.2.3). In case the customer detects the DoS attack before any of the pre-set service threshold values are exceeded, the customer can contact TDC NOC directly to start the investigation of the suspected attack. In such case TDC NOC creates a service ticket and forwards the service ticket to TDC SOC for analysis and, if necessary, mitigation TDC Scrubbing Center When an attack against one or more of the customer s protected network resources is detected, the traffic to the attacked resources is rerouted via the TDC Scrubbing Center for analysis and, if necessary, mitigation. The target of the mitigation is to block the malicious traffic and forward the legitimate traffic to the network resource. The rerouting affects the traffic targeting the attacked network resource only. The traffic originating from the attacked network resources is routed normally through the TDC internet domain. The scrubber functionality for IPv4 includes advanced mitigation technologies, including: Filtering based on source IP address or country of origin Zombie detection ICMP protection TCP protection UDP protection DNS protection HTTP protection The scrubber functionality for IPv6 includes advanced mitigation technologies, including: Source IP address Black/white list (e.g. tcp / udp / port number) Zombie TCP Syn Payload Service Description and Special Terms, DK2.6 4 (10)

5 The scrubbing center is physically located in TDC s core network equipment room. The equipment room has been designed for telecommunications equipment, and it complies with high quality standards for information security and availability. The room is also equipped with high capacity, secured telecommunications connections and power supplies Ending mitigation During the mitigation TDC SOC is in close co-operation with the customer, and the status is updated within agreed time slots. When TDC detects that the attack is over, and the traffic profile is back to normal level, TDC SOC will contact the customer and propose ceasing the mitigation. In case the customer acknowledges the cessation, TDC will start the decommissioning of the activated mitigation tasks, and the customer's internet traffic is routed normally again. The customer may be able to modify the infrastructure or configuration in such a way that the attack will no longer have a severe impact on the customer s network resources. In such case the customer may contact the TDC Network Operation Center (NOC) or local TDC customer services to request the cessation of the mitigation. TDC SOC will give its own understanding to the customer, and in case the customer requests the cessation, TDC will start decommissioning the mitigation activities. The mitigation period is considered to have begun when mitigation, agreed between the customer and TDC SOC, is activated in the TDC Scrubbing Center. The mitigation period is considered to be over when, agreed between the customer and TDC SOC, the mitigation is deactivated in the TDC Scrubbing Center. After the mitigation the customer will get a report covering the attack (type, length, impact etc.) and the mitigation, including the mitigation start and stop times and the different technologies used to mitigate the attack. 2.3 Technical service description TDC performs sampled traffic flow monitoring at each of its internet peering connections. These traffic samples are sent to the TDC DoS Protection service where they are automatically analysed and compared to the set MO-specific threshold values. An alarm is generated in case one of the set threshold values is exceeded. While further traffic analysis or mitigation is needed, the traffic targeting the attacked network resource is routed via the TDC Scrubbing Center. The standard dynamic routing protocol is used to off-ramp the wanted traffic to the TDC Scrubbing Center. TDC will select the used scrubbing center case by case based on the scrubbing center s geographical location and available capacity. From the moment of the off-ramp triggering, the traffic is routed via the defined scrubbing center within 30 seconds. After the clean traffic has passed the scrubber, it is on-ramped to follow the normal routing again. During the mitigation phase the malicious traffic is blocked. The granularity of the mitigation can be finetuned during the mitigation as soon as the attack analysis gives more detailed information about the malicious traffic. In addition to scrubbing, black-hole routing can be done in TDC peering routers to complement the attack mitigation. All the service components have a redundant configuration, and they are geographically dispersed in separate TDC equipment rooms. Service Description and Special Terms, DK2.6 5 (10)

6 2.4 Value-added services Additional Managed Objects The basic service includes five (5) Managed Objects. One of these MOs is defined as IPv4 Parent Managed Object, and optionally one of them can be defined as IPv6 Parent Managed Object. Additional MOs are sold in bundles of five (5). A one-off charge (installation charge) and a recurring service charge (monthly charge) are applied to each bundle of five (5) additional Managed Objects. The recurring service charge is applied after the first MO from the additional bundle of five has been delivered and the baseline period has started. This means that the fees are applied although the customer would utilise only one (1) additional MO. The recurring service fee remains the same until all five additional MOs have been brought into use. The one-off charge is applied every time a new MO delivery process is run to add new MOs even though this would happen within the already ordered bundle of five. After the whole bundle of five MOs has been brought into use, a new one-off charge and a new recurring service charge are applied when an additional MO is added to the service. The additional MOs are delivered as described in chapter Pre-defined mitigation templates All customers have their own specific traffic patterns. TDC provides customised mitigation templates based on the customer s specific traffic patterns and needs. The benefit of using customised mitigation templates is that the customers get mitigation filters that are adjusted to their business and traffic pattern, which will allow an improved impact on mitigation as the most effective mitigation technique can be achieved faster than normal, given that TDC has a more detailed knowledge of the service. TDC provides one (1) customised mitigation template per Managed Object. TDC recommends that the template is tested and TDC will allocate two (2) hour within normal operating hours to this purpose. In case of an attack, TDC will contact the customer to get a confirmation that an attack is ongoing and thereafter apply the customised mitigation template agreed and accepted by the customer and start the mitigation process. A one-off charge (installation charge) is applied per five (5) mitigation template Auto-mitigation DDoS attacks may be very different from each other. Some attacks last for a long period of time, while others come and go. For businesses where high availability on the internet is a must, e.g. online shops and betting sites, a fast mitigation response time is vital. Therefore, TDC offers an auto-mitigation process which reduces the attack response and mitigation start time to less than one (1) minute. A prerequisite for auto-mitigation are mitigation templates customised on the basis of the customer-specific traffic patterns. The auto-mitigation process is based on mitigation starting automatically when TDC receives an alarm based on increased traffic levels. The TDC Scrubbing Center then automatically applies the customised mitigation template and mitigation is agreed and accepted by the customer. (If the customer requests a change in the auto mitigation during the attack, normal mitigation fee will apply) A one-off charge (installation charge) and a monthly charge (MRC) are applied per five (5) mitigation templates. 2.5 Service reporting The service includes a monthly service report for the customer. The report covers the traffic profile at MO level and a list of all detected attacks, even low-level attacks which have not triggered an alarm. The Service Description and Special Terms, DK2.6 6 (10)

7 report is sent via to the named customer contacts within seven (7) working days after end of month. TDC also submits a separate report on all performed customer-specific mitigation activities to the customer within five (5) working days after the cessation of the mitigation. 2.6 Pricing A one-off charge (installation charge) and a recurring service charge (monthly charge) are applied to the TDC DoS Protection service s monitoring and detection part. The recurring charge is applied after the first MO from the bundle of five (5) has been implemented, as mitigation is possible from this time although the baseline period has not been completed. Invoicing of the service will start when the initial setup of the customer is finished (ready for mitigation service RMS) or no later than two (2) weeks after TDC s request for IP addresses (see timeline below in section 2.7). In addition a separate one-off charge is applied to each mitigation case. The mitigation fee is applied per day, and the daily fee depends on the mitigation duration of the attack. In case the mitigation lasts twenty four (24) hours or less, a daily fee is applied. In case the mitigation takes more than twenty four (24) hours, a lower mitigation fee for the following days is applied. In cases where the customer will discuss the attack with the TDC SOC but not start a mitigation of the attack. TDC will invoice the customer a one-off charge per 30 min. at senior consultant rate. Unless otherwise agreed in writing, the TDC list prices are applied to the service fees. The charging of mitigation starts when a mitigation, agreed between the customer and TDC SOC, is activated in the TDC Scrubbing Center. The mitigation period is considered to be over when, agreed between the customer and TDC SOC, the mitigation is deactivated in the TDC Scrubbing Center. 2.7 Delivery As indicated on the timeline below, setup of the service consists of two phases: 1) Service delivery. TDC SOC contacts ( ) the customer in order to get information regarding which IP addresses to protect. The customer has the responsibility to provide TDC SOC with this IP address information. TDC SOC will do the initial definition of the customer s IP addresses in the TDC centralised monitoring system. The service delivery will finish with a documentation sent to the customer of the setup of the MOs. 2) Baseline. A baseline period starts after the service delivery. During the baseline period MOspecific service characteristics and traffic patterns are collected. After an approximately two (2)- week baseline period, a technical meeting (conference call) is held between TDC SOC and the customer. At the technical meeting the customer is responsible for providing TDC SOC with a. Information about the maximum load that the network resources can handle b. An overview of the customer s infrastructure (firewall, load balancer, etc.). TDC SOC requires this information in order to define the MO-specific threshold values for actual alarm detection. The time for the technical meeting is agreed during the service delivery phase. The baseline period ends with a setup fine-tuning period, where TDC SOC in cooperation with the customer can adjust the MO configuration and threshold values. In the baseline period the service is not fully configured, which means that traffic to protected network resources is not proactively monitored, but mitigation of DoS attacks can be done if the customer calls TDC NOC. After the baseline period the service is in full-blown operation and is able to detect and mitigate DoS attacks. The time needed by TDC SOC for the basic configuration is one (1) week. The baseline period is five (5) weeks, two (2) weeks for traffic analysis, one (1) week for threshold configuration and two (2) weeks for setup fine-tuning. Service Description and Special Terms, DK2.6 7 (10)

8 In case the customer provides TDC SOC with the required IP address information within two (2) days after they have received the Welcome mail, the service setup time will be seven (7) weeks. Product ordered Welcome mail sent to customer IP address info received Ready for Mitigation Service (RMS) Invocing starting Technical meeting concerning threshold values Ready for Full-blown Operation (RFO) Basic configuration Traffic analysis Threshold configuration Setup fine tuning Service delivery Baseline Service setup Full-blown operation 2.8 Service limitations TDC performs attack detection and mitigation only for the customer s agreed network resources which are predefined in the service and grouped into Managed Objects. During the baseline period the service is not able to detect attacks targeted at the network resources. When a new MO is added, the service is still able to detect and mitigate attacks targeted at the existing network resources. When an existing MO is modified in such a way that the expected traffic pattern will change, a new baseline period is applied to the modified MO. TDC is able to detect and mitigate only the malicious traffic that is routed via the TDC internet domain. The capacity of the legitimate traffic passed through the TDC Scrubbing Center must not exceed the capacity of the customer internet access capacity provided by TDC. The TDC DoS Protection service does not remove the need for other security infrastructure services such as firewall and/or intrusion detection. As part of the service TDC, may need to limit the customer s network routing advertisement. The service causes extra delay to the internet traffic when traffic is routed via the TDC Scrubbing Center. However, this is done only when attack analysis and mitigation are activated and concerns only the traffic arriving from the internet towards the customer s network resources under attack. The service is only able to monitor the traffic originating outside of the TDC internet domain. The service is only able to detect and mitigate the attacks originating outside of the TDC internet domain. All network resources defined in the same MO have common threshold values. The service may not be able to detect attacks on all the MO s network resources equally in case their traffic profiles differ remarkably. 2.9 Customer responsibilities All customers are responsible for their own information security, including connections to the internet, internal network, hosts and applications. The customer is also responsible for ensuring that the service definitions follow the company s information security policy and are in accordance with the purpose of use intended for external connections. Service Description and Special Terms, DK2.6 8 (10)

9 The customer is responsible for informing TDC about which network resources to protect and providing the relevant information about these network resources to set-up threshold values. The customer is responsible for informing TDC about expected seasonal traffic volume growth and peaks to avoid so-called false positive alarms. For the sake of clarity, it is stated that all customer-approved mitigation cases, including a false positive case, will be charged in accordance with chapter 2.6. The customer is responsible for following the traffic volume trends and to propose adapting the threshold values to the changed internet traffic volume. The customer is responsible for notifying TDC of any changes to the network configuration or IP addresses that might influence the configuration of MOs and threshold values. The customer is responsible for nominating a designated person or entity who TDC will contact in the service delivery phase to discuss the protected MO s service characteristics. The customer is responsible for nominating the designated persons or entities who TDC will contact in case of attack detection. This contact information is kept in TDC NOC, and the customer is responsible for updating the contact information by contacting TDC SOC Service changes and ordering additional services A delivery contract is signed between the customer and TDC for the service changes and additional service orders having an impact on the monthly recurring service charge. Changes and additional services are delivered according to the TDC delivery process and invoiced according to the TDC DoS Protection service price list. The customer is eligible to place one (1) threshold value change order once in a calendar month free of charge. The monthly threshold value change order can cover several threshold value changes. More threshold value change orders are invoiced according to the TDC DoS Protection service price list. When the customer orders a new MO or a change to an existing MO which requires a new baseline period, the change is invoiced according to the TDC DoS Protection service price list. 3 Special terms TDC has the right, granted by the customer, to take samples and analyse the customer s internet traffic using the automated computer applications and also to filter the agreed predetermined traffic characterised as malicious by the service. The service may also filter legitimate traffic. TDC does not grant the flawless function of the service and is not liable for possible communication delays, harm, failures or damage caused by the service for legitimate traffic, including the cases known as false positives. The mitigation may increase the delay of the customer s internet traffic during the mitigation. TDC is not liable for such delay. TDC is not liable for damage to the customer that is directly or indirectly related to the malicious traffic targeted at the customer s network, hosts or internet services. TDC is also not liable to the customer to clarify the origin of the malicious traffic. TDC is not liable for damage or costs caused by the direct or indirect errors in software applications or hardware used in the service. The service is connected and shares information with the equipment manufacturer s centralised database. The database is intended for internet threat analysis within the internet community. The database offers Service Description and Special Terms, DK2.6 9 (10)

10 new up-to-date attack fingerprints for the TDC DoS Protection service. The database does not screen, store or share personal sensitive information. The customer s internet access service level may be degraded due to the TDC DoS Protection. The customer is not entitled to compensation if TDC fails to meet the internet access Service Availability levels due to DoS/DDoS attacks or countermeasures. The TDC DoS Protection service routes traffic to TDC Scrubbing Centers unencrypted. While routed via scrubbing centers the traffic may cross the borders of the independent states within the TDC internet domain. Each independent state follows telecommunications traffic in their area in different ways, and the traffic may end up in the knowledge of different states authorities. Service Description and Special Terms, DK (10)

Security Annex for DDoS Additional Terms for DDoS Protection

Security Annex for DDoS Additional Terms for DDoS Protection CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Installation and Service Provision... 2 2.2 Cleaning and Mitigation... 3 2.3 Mitigation Limitations... 3 2.4 DDoS Attack Monitoring...

More information

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels

More information

DDoS Protection in Backbone Networks

DDoS Protection in Backbone Networks DDoS Protection in Backbone Networks The Czech Way Pavel Minarik, Chief Technology Officer Holland Strikes Back, 3 rd Oct 2017 Backbone DDoS protection Backbone protection is specific High number of up-links,

More information

DDoS Mitigation & Case Study Ministry of Finance

DDoS Mitigation & Case Study Ministry of Finance DDoS Mitigation Service @Belnet & Case Study Ministry of Finance Julien Dandoy, FODFin Technical Architect Grégory Degueldre, Belnet Network Architect Agenda DDoS : Definition and types DDoS Mitigation

More information

LinchPin. Managed Service For IP VPN Networks. Web Site Telephone

LinchPin. Managed Service For IP VPN Networks. Web Site   Telephone LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 1 1ST QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2017 4 DDoS

More information

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 11 Date 2018-05-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Corrigendum 3. Tender Number: 10/ dated

Corrigendum 3. Tender Number: 10/ dated (A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial

More information

BT Managed DDoS Security UK Annex to the Internet Connect UK Schedule

BT Managed DDoS Security UK Annex to the Internet Connect UK Schedule BT Managed DDoS Security UK Annex to the Internet Connect UK Schedule Contents A note on you... 2 Application of this Annex... 2 Part A The Service... 2 1 Service Summary... 2 2 Service Standard Components...

More information

Anti-DDoS. User Guide. Issue 05 Date

Anti-DDoS. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Functions... 1 1.2 Application Scenarios...1 1.3 Accessing and Using Anti-DDoS... 2 1.3.1 How to Access Anti-DDoS...2 1.3.2 How to Use

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 4 4TH QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q4 2017 4 DDoS

More information

SPECIFIC TERMS METRO ETHERNET SERVICE

SPECIFIC TERMS METRO ETHERNET SERVICE SPECIFIC TERMS METRO ETHERNET SERVICE This Specific Terms form the Agreement between you and SP Telecommunications Pte Ltd (Reg No. 199700517K) and may be amended by the Application Form. It is agreed

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 3 3RD QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q3 2017 4 DDoS

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification Service Description Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification The services described herein are governed by the terms and conditions of the agreement specified

More information

A10 DDOS PROTECTION CLOUD

A10 DDOS PROTECTION CLOUD DATA SHEET A10 DDOS PROTECTION CLOUD A10 Networks provides full spectrum DDoS defenses. This includes multi-vector protection from attacks of any type to ensure the availability of enterprise business

More information

Service Level Agreement

Service Level Agreement This ( ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply all Managed Services to Customer. The Master Agreement entered into between LightEdge

More information

Attachment C Service Level Agreement for WAN and Internet

Attachment C Service Level Agreement for WAN and Internet Attachment C Service Level Agreement for WAN and Internet Overview The Vendor SLA for Owner shall apply to all data transmission and reception on all Vendor provided Owner Wide Area Network (WAN) connectivity,

More information

Verizon Spark Hosted Calling Service Level Agreement ( SLA )

Verizon Spark Hosted Calling Service Level Agreement ( SLA ) Verizon Service Level Agreement ( SLA ) 1. Overview. This SLA provides performance metrics and provisions for. is designed for Cisco Unified Communications Manager, Unified Presence Server and Unity Connections

More information

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT ETHERNET DEDICATED INTERNET SERVICES

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT ETHERNET DEDICATED INTERNET SERVICES COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT ETHERNET DEDICATED INTERNET SERVICES ATTACHMENT IDENTIFIER: Ethernet Dedicated Internet, Version 1.8 The following additional terms and conditions

More information

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Cloud Service SLA Declaration

Cloud Service SLA Declaration Cloud Service SLA Declaration Basic level of support for Cloud services (SLA 1) Table of Content: 1. Definitions 2. General terms 3. Level of service warranty service functioning 4. Provider`s liability

More information

Verizon Unified Communications and Collaboration as a Service Service Level Agreement ( SLA )

Verizon Unified Communications and Collaboration as a Service Service Level Agreement ( SLA ) Verizon Unified Communications and Collaboration as a Service Service Level Agreement ( SLA ) 1. Overview. This SLA provides performance metrics and provisions for Unified Communications and Collaboration

More information

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection Snoc DDoS Protection Fast Secure Cost effective sales@.co.th www..co.th securenoc Introduction Snoc 3.0 Snoc DDoS Protection provides organizations with comprehensive protection against the most challenging

More information

VERIZON SELECT SERVICES INC. Page 1. SECTION 13 - EXHIBIT M - Network-Based IP VPN SERVICE

VERIZON SELECT SERVICES INC. Page 1. SECTION 13 - EXHIBIT M - Network-Based IP VPN SERVICE VERIZON SELECT SERVICES INC. Page 1 Quote Number or CBS/CNE Tracking Number: 1) Description of Service. Internet Protocol-Virtual Private Network (IP VPN) Service (Service) is a packet-based advanced data

More information

Managed NIDS Care Services

Managed NIDS Care Services Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,

More information

Service Level Agreement (SLA)

Service Level Agreement (SLA) Service Level Agreement (SLA) of PlusServer GmbH, Hohenzollernring 72, 50672 Cologne, Germany hereinafter referred to as the Provider. Version: 04.09.2015 V1.1 PlusServer GmbH Contacts Registered office

More information

Service Level Agreement (SLA) and Service Level Objectives (SLO)

Service Level Agreement (SLA) and Service Level Objectives (SLO) Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3

More information

Service Description Safecom Customer Connection Version 3.5

Service Description Safecom Customer Connection Version 3.5 Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

IBM Watson Campaign Automation SMS

IBM Watson Campaign Automation SMS Service Description IBM Watson Campaign Automation SMS This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients

More information

Cloud Service Level Agreement

Cloud Service Level Agreement Cloud Service Level Agreement This Cloud Service Level Agreement is part of your Cloud Terms of Service. 1. DEFINITIONS The following definitions shall apply for purposes of this Cloud Service Level Agreement:

More information

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security Pavel Minařík, Chief Technology Officer Neutral Peering Days 2018, The Hague Your customers depend on your

More information

Pioneer Communications Internet Services Disclosure

Pioneer Communications Internet Services Disclosure Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes

More information

GARR customer triggered blackholing

GARR customer triggered blackholing GARR customer triggered blackholing Silvia d Ambrosio, Nino Ciurleo Introduction From discussions with the GARR working group on "contrast to DDoS", we understood the importance of a collaboration between

More information

HOSTING SERVICES AGREEMENT

HOSTING SERVICES AGREEMENT HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule

More information

Network Services BT Internet Connect

Network Services BT Internet Connect Contents 1. 2. Network Services Customer responsibilities 3. Network Services General 4. Domain Name Registration 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects

More information

Protection Against Distributed Denial of Service Attacks

Protection Against Distributed Denial of Service Attacks Protection Against Distributed Denial of Service Attacks The Protection Against Distributed Denial of Service Attacks feature provides protection from Denial of Service (DoS) attacks at the global level

More information

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 zone-based firewalls support the Protection of Distributed Denial of Service Attacks and the Firewall

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

Cloud Service Level Agreement

Cloud Service Level Agreement Cloud Service Level Agreement This Cloud Service Level Agreement is part of your Cloud Terms of Service. 1. DEFINITIONS The following definitions shall apply for purposes of this Cloud Service Level Agreement:

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

SERVICE DESCRIPTION MANAGED FIREWALL/VPN Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

Chapter 10: Denial-of-Services

Chapter 10: Denial-of-Services Chapter 10: Denial-of-Services Technology Brief This chapter, "Denial-of-Service" is focused on DoS and Distributed Denial-of-Service (DDOS) attacks. This chapter will cover understanding of different

More information

Check Point DDoS Protector Introduction

Check Point DDoS Protector Introduction Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized

More information

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 Table of Contents 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 i 1 Intrusion Detection Statistics Overview Intrusion detection is an important network

More information

SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013

SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 ARTICLE 1: PURPOSE The purpose of these Special Conditions, which supplement the So You Start General Conditions

More information

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management

More information

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service

More information

IBM Silverpop Engage SMS

IBM Silverpop Engage SMS Service Description IBM Silverpop Engage SMS This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

IBM IoT Connected Vehicle Insights

IBM IoT Connected Vehicle Insights Service Description IBM IoT Connected Vehicle Insights This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients

More information

Service Schedule BT Web Manager

Service Schedule BT Web Manager 1. SERVICE DESCRIPTION Service Overview 1.1 The Service includes the construction and hosting of a business website as further described in this Service Schedule. It does not include the provision of any

More information

Content and assumptions The following standard prices apply to FRI+ Business. All prices and amounts are stated in DKK ex. VAT.

Content and assumptions The following standard prices apply to FRI+ Business. All prices and amounts are stated in DKK ex. VAT. Prices Content and assumptions The following standard prices apply to FRI+ Business. All prices and amounts are stated in DKK ex. VAT. FRI+ Business Commit ment Subscription fee Calls and sms* Extra Included

More information

Security Annex for Firewalls Additional Terms for Firewall Service

Security Annex for Firewalls Additional Terms for Firewall Service CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable

More information

IBM App Connect Professional

IBM App Connect Professional Service Description IBM App Connect Professional This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

Schedule to Data Products Service Appendix Service Level Agreement

Schedule to Data Products Service Appendix Service Level Agreement Schedule to Data Products Service Appendix Service Level Agreement This Service Level Agreement (SLA) is a Schedule to the itel Networks Service Appendix (Appendices) for Data Services and is incorporated

More information

DDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (www.trenka.ch)

DDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (www.trenka.ch) DDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (www.trenka.ch) Pavel Minarik, Chief Technology Officer SwiNOG meeting, 9 th Nov 2017 Backbone DDoS protection Backbone protection

More information

SPECIFIC SERVICE TERMS FOR GLOBAL CROSSING ENTERPRISE VoIP TOLL-FREE SERVICES

SPECIFIC SERVICE TERMS FOR GLOBAL CROSSING ENTERPRISE VoIP TOLL-FREE SERVICES SPECIFIC SERVICE TERMS FOR GLOBAL CROSSING ENTERPRISE VoIP TOLL-FREE SERVICES Global Crossing Enterprise VoIP Toll-Free Service These are the specific service terms for Global Crossing s Enterprise VoIP

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Clean Pipe Solution 2.0

Clean Pipe Solution 2.0 Clean Pipes 2.0 1 Clean Pipe Solution 2.0 Executive Summary...3 Best Current Practices...5 Network Infrastructure BCPs...5 Host Based BCPs...5 Dedicated DDoS BCPs...6 Cisco Clean Pipes Solution Overview...6

More information

Cyber War Chronicles Stories from the Virtual Trenches

Cyber War Chronicles Stories from the Virtual Trenches Cyber War Chronicles Stories from the Virtual Trenches Ron Winward Security Evangelist Radware, Inc. March 17, 2016 Background on the Radware Report Key Cyber Attack Trends for 2015-2016 Case Study: Look

More information

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges

More information

PROTECTING INFORMATION ASSETS NETWORK SECURITY

PROTECTING INFORMATION ASSETS NETWORK SECURITY PROTECTING INFORMATION ASSETS NETWORK SECURITY PAUL SMITH 20 years of IT experience (desktop, servers, networks, firewalls.) 17 years of engineering in enterprise scaled networks 10+ years in Network Security

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

Level 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management

Level 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management Level 3 SM Enhanced Management - FAQs Frequently Asked Questions for Level 3 Enhanced Management 2015 Level 3 Communications, LLC. All rights reserved. 1 LAYER 3: CONVERGED SERVICES 5 Where can I find

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 1 1ST QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2018 4 DDoS

More information

AT&T NetBond Service Activation Onboarding Guide

AT&T NetBond Service Activation Onboarding Guide AT&T NetBond Service Activation Onboarding Guide For VMWare Publication Date: 09/28/2015 Revision: 1.0 Legal Disclaimer Copyright AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and

More information

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

IBM Managed Security Services for Security Event and Log Management

IBM Managed Security Services for Security Event and Log Management Service Description IBM Managed Security Services for Security Event and Log Management 1. Scope of Services IBM Managed Security Services for Security Event and Log Management (called MSS for Security

More information

Securing Online Businesses Against SSL-based DDoS Attacks. Whitepaper

Securing Online Businesses Against SSL-based DDoS Attacks. Whitepaper Securing Online Businesses Against SSL-based DDoS Attacks Whitepaper Table of Contents Introduction......3 Encrypted DoS Attacks...3 Out-of-path Deployment ( Private Scrubbing Centers)...4 In-line Deployment...6

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

IBM Commerce Insights

IBM Commerce Insights Service Description IBM Commerce Insights This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

RIGHTMOVE PRODUCT GUIDELINES New Homes. Core Membership means the basic Services to which You are entitled in return for your Core Membership Fee.

RIGHTMOVE PRODUCT GUIDELINES New Homes. Core Membership means the basic Services to which You are entitled in return for your Core Membership Fee. RIGHTMOVE PRODUCT GUIDELINES New Homes DEFINITIONS Core Membership means the basic Services to which You are entitled in return for your Core Membership Fee. Additional Products means the additional Services

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

Service Activation for AT&T NetBond For AT&T Control Center

Service Activation for AT&T NetBond For AT&T Control Center Service Activation for AT&T NetBond For AT&T Control Center Revision: 1.0 2016 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo, Mobilizing Your World, DIRECTV and other marks are

More information

Service Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition

Service Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition Service Description IBM Aspera Files This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER Overview DDoS Evolution Typical Reactive/Proactive Mitigation Challenges and Obstacles BGP Flowspec Automated Flowspec Mitigation 2 DDoS Evolution

More information

.BIZ Agreement Appendix 10 Service Level Agreement (SLA) (22 August 2013)

.BIZ Agreement Appendix 10 Service Level Agreement (SLA) (22 August 2013) .BIZ Agreement Appendix 10 Service Level Agreement (SLA) (22 August 2013) Registry Operator and ICANN agree to engage in good faith negotiations to replace this Appendix 10 with a Service Level Agreement

More information

Managed Protection Service for Desktop Firewalls Standard

Managed Protection Service for Desktop Firewalls Standard Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. Managed Protection Service for Desktop Firewalls Standard

More information

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

Updated December 12, Chapter 10 Service Description IBM Cloud for Government Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal

More information

MANAGED COLOCATION SERVICES TERMS AND CONDITIONS

MANAGED COLOCATION SERVICES TERMS AND CONDITIONS MANAGED COLOCATION SERVICES TERMS AND CONDITIONS In addition to the General Terms and Conditions, your use of the Managed Colocation Services is subject to the following additional terms and conditions:

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD GEN2 SERVICES Our cloud infrastructure solutions are made up of a combination

More information

IBM Silverpop Engage SMS

IBM Silverpop Engage SMS IBM Terms of Use SaaS Specific Offering Terms IBM Silverpop Engage SMS The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and

More information

Service Level Agreement

Service Level Agreement Service Level Agreement Version 2018.1 Copyright 2018 Aldridge PO Box 56506, Houston, TX 77256-6506 713.403.9150 http://aldridge.com Contents Contents... 2 Agreement... 3 The Aggregate Set of Agreements

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

CHAPTER A. DEFINITIONS

CHAPTER A. DEFINITIONS This Support and Service Level Schedule sets out the performance metrics such as applicable service levels, response times, service windows and availability of the Services. In addition, this Support and

More information

Managed Security Services Premises Premium Service Level Agreement

Managed Security Services Premises Premium Service Level Agreement Managed Security Services Premises Premium Service Level Agreement 1. Key Performance Indicators. This SLA defines the service metrics for which Customer has the right to receive credits (Service Credits)

More information

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection Document ID: 98705 Contents Introduction Prerequisites Requirements Components Used Conventions

More information

Arbor Solution Brief Arbor Cloud for Enterprises

Arbor Solution Brief Arbor Cloud for Enterprises Arbor Solution Brief Arbor Cloud for Enterprises Integrated DDoS Protection from the Enterprise to the Cloud About Arbor Networks Arbor Networks Inc., the cyber security division of NETSCOUT, helps secure

More information

URL NETWORKS CORPORATE INTERNET

URL NETWORKS CORPORATE INTERNET URL NETWORKS CORPORATE INTERNET SERVICE LEVEL AGREEMENT APRIL 2016 1. INTRODUCTION 1.1 This SLA covers services including (unless otherwise notified by URL Networks) Data Services, Voice Services, Dark

More information