SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open
|
|
- Amice Cross
- 5 years ago
- Views:
Transcription
1 SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open
2 Classification: Open ii MDS Technologies Ltd Other than for the sole purpose of evaluating this Response, no part of this material may be reproduced or transmitted in any form, or by any means, electronic, mechanical, photocopied, recorded or otherwise or stored in any retrieval system of any nature without the written permission of MDS Technologies Ltd. MDS Technologies Ltd, 2 Methuen Park, Chippenham, Wiltshire, SN14 0GX Telephone: , Fax: CONTENTS WHY MDS?... 3 SUMMARY OF SERVICE FEATURES... 3 PRODUCT OVERVIEW... 4 PRODUCT FEATURES... 5 BUSINESS BENEFITS... 5 TECHNICAL FEATURES... 6 EXAMPLE USE CASES... 7 INFORMATION ASSURANCE... 8 ON BOARDING AND OFF BOARDING PROCESSES... 8 PRICE MODEL SERVICE MANAGEMENT SERVICE CONSTRAINTS SERVICE LEVELS ORDERING AND INVOICE PROCESS SERVICE LEAD TIME TERMINATION COSTS BACKUP/RESTORE AND DISASTER RECOVERY DATA RESTORATION/SERVICE MIGRATION CUSTOMER RESPONSIBILITIES TECHNICAL REQUIREMENTS... 14
3 WHY MDS? A privately owned, UK sovereign company Connected to Internet, JANET, N3, PSN, RLI Public, community and private cloud available Security Cleared technical and customer service staff We are Agile, Flexible, Open, Honest and Transparent We deliver cost effective solutions on time and within budget We are your One-Stop-Shop for secure assured Cloud services A fully managed platform using our ITIL-aligned 24/7 Service Desk Experienced at delivering small, large and complex Cloud solutions We are an SME - large enough to deliver, small enough to care PROFESSIONAL, PERSONALISED SOLUTIONS SUMMARY OF SERVICE FEATURES Secure cross domain information sharing with customers, suppliers and partners Interact with less trusted organisations without compromising your sensitive data Resilient secure zone gateway provides breach avoidance Content transformation technology protects against zero day attacks Complies with CESG s cross domain sharing architecture patterns AP4/AP14 Enhanced security operations for remediation and response to attack/compromise Enhanced defence for your critical systems and sensitive information Demonstrable compliance with policy, standards and legislation Simple integration with existing capabilities improves efficiency Users held to account for their information sharing activities
4 PRODUCT OVERVIEW MDS provide a Secure Zone Gateway Service which provides information exchange control when data is moved between security domains. The service simplifies the ability to ensure files are safely transferred, whilst limiting the risk of data inappropriately flowing back in the opposite direction. The service is available to protect a range of file transfer use cases. The service can be tailored to meet an organisation s specific file sharing needs and the associated security accreditation requirements in accordance with its security risk appetite. This puts the organisation in control of what its staff can share and with whom they can share it, maintaining the necessary log data to hold users to account for their decisions/actions. The service also provides a range of optional utilities which facilitate automatic and manually controlled file sharing, through the service. This minimises integration activities and ensures consistent application of an organisation s information sharing policy. A service helpdesk enables the service user organisation to rapidly access policy configuration and operation experts to allow a swift response to any Incidents impacting your organisation s business information sharing. The core service covers the following scope: Provision of a Deep-Secure ix Guard licence for the period of the service Deployment of the software on customer or third party service infrastructure Integration of the Guard with High and Low side infrastructure Configuration of a standard templated Guard policy for permitted information exchanges Service test to ensure correct configuration and integration Service Helpdesk Guard software patch provision Guard software update provision The following additional service options may be chosen: Configuration of a tailored Guard policy for permitted information exchanges which meets the organisations specific information exchange needs Deployment of file sharing applications and/or utilities software on High and Low side customer or third party service infrastructure Integration of file sharing applications and/or utilities software on High and Low side customer or third party service infrastructure Configuration of file sharing applications and/or utilities software File sharing applications and/or utilities software patch provision File sharing applications and/or utilities software update provision
5 Guard policy, application and utility configuration and management training Day-to-day Guard administration tasks MDS is a reseller of this Deep Secure service. PRODUCT FEATURES Our Secure Zone Gateway Service has the following key features: A robust security architecture which complies with CESG architecture patterns AP4 and AP14 Content threat removal renders traffic safe using content transformation Two-way configurations for request/response or pull/push exchanges as required Sharing of multiple business information types supported Files with attachments XML data XMPP Chat SNMP and SYSLOG management information Self-defending security architecture Suitable for protecting Tier 1, Tier 2 and Tier 3 information Fully supports use of Government Security Classifications for information sharing policy Service helpdesk support Named Account Manager The following options may be purchased: File transfer utilities and applications to simplify file transfer capabilities BUSINESS BENEFITS The following business benefits may be achieved: Compliance with HMG Policy, Standards and Legislation Secure cross domain information sharing with customers, suppliers and partners Interact with less trusted organisations without compromising your sensitive data Resilient secure zone gateway provides breach avoidance Content transformation technology protects against zero day attacks Complies with CESG s cross domain sharing architecture patterns AP4 and AP14
6 Enhanced security operations for remediation and response to attack/compromise Enhanced defence for your critical systems and sensitive information Demonstrable compliance with policy, standards and legislation Simple integration with existing capabilities improves efficiency Users held to account for their information sharing actions TECHNICAL FEATURES The Secure Zone Gateway Service has the following technical features: Protocol Whitelisting HTTP/HTTP(S) SMTP SFTP SYSLOG SNMP XMPP Two way configuration with asymmetric policies for inbound and outbound data for bidirectional application exchanges Integrated data transformation to enhance assurance where file content control is required XML schema validation Handling of encrypted content to enable controlled flow where required e.g. HTTP(S) Information protected in transit between the user and the service infrastructure utilising: TLS for HTTP(S) SNMP V3 encryption for network management Government Security Classification label support for informal (e.g. header, footer, first line of text, XML field) security labels Logging is configurable for both successful and unsuccessful attempts to move data across the Secure Zone Gateway Service The following technical features are available depending on options purchased: File sharing web application Automated file sharing utilities
7 Figure 1: Secure Zone Gateway Service showing ix Guard EXAMPLE USE CASES This service supports the following information sharing use cases: Controlled flows for asymmetric two-way transfers Tightly flow controlled configurations to support pull/push, request/response or get/set application exchanges where each directional flow is separately configured Cross domain Verification of message and any attached files to ensure policy compliance TransGap Personal Quarantine provides repository for original messages on Low side of Gateway Cross domain file transfer Verification of files transferred to ensure policy compliance to include highly assurable data transformation Cross domain Chat services Inspection of simple XMPP-based chat traffic to ensure policy compliance Validated XML schema based application information sharing XML schema validation to protect applications and services from malformed or out of range XML content File import utilising Personal Exchange (PX) Web Service Holding users to account for what they import or export Windows Server Update Services (WSUS) transfer Securing the ability to update Windows platforms within sensitive systems Sophos AV signature update transfer
8 Securing the ability to update AV signatures for Sophos AV checkers within sensitive systems Controlling software updates Securing the ability to update platforms within sensitive systems with software updates from untrusted domains Secure sharing policy compliance enforcement INFORMATION ASSURANCE The Secure Zone Gateway Service is suitable to meet the requirements for all sensitivity levels within the GSC Scheme subject to the considerations of accreditation best practice and specific use case considerations. Deep-Secure are ISO aligned for the Secure Zone Gateway Service and certified to CES/IASME. The service can be hosted within an assured Cloud platform, which is aligned to the CESG Cloud Security Principles and Pan Government Accredited at IL2 and IL3 (e.g. Skyscape s Self-managed Cross Domain Solution) or on an appropriately accredited customer platform. ON BOARDING AND OFF BOARDING PROCESSES On-boarding As part of on-boarding we will: Deploy the Guard software, and work with your organisation to set up and configure the service Test the service to ensure information exchange is correctly configured and that reports and alerts are working as expected We offer two methods of on-boarding, based on the service needs: A standard templated configuration based on a fixed application in line with the use cases outlined in the preceding section An optional tailored configuration of file sharing requirements which meet your specific risk profile We work with your organisation to determine your specific cross domain information exchange policy requirements as they differ from the standard templated configuration including any specific associated logging and compliance requirements All service on-boarding is delivered in line with the Deep-Secure ISO9001 Certified Quality Management System processes for the implementation of the Secure Zone Gateway Service product.
9 Order Acknowledgement QF17 Form Sales Order Form (approved and uploaded to CRM) Plan PSO Deployment Plan Product Delivery Engage Finance Training Dates Agreed dates with External Trainer and Customer Tailored Deployment Statement of Work Tailored policy specification Standard Deployment Agreed dates with Customer Invoice Schedule Training (QF12 issued) PSO (QF14 issued) Support (QF16 issued) Product (QF11 issued) Customer Review Order 3 rd party SW QF21 Purchase Request 3 rd Party SW Licences Customer Acceptance Document Allocate SW Licences & Create CD Perform Training Training Materials Presentations Deployment Activities & Test Licence Allocation QF20 Licence Number Register QF19 Licence Record Deployment CD Training Feedback QF12 External Training Feedback Form Completion Document QF14 Customer Feedback Questionnaire Deliver Product to Customer Delivery Documentation QF11 Delivery Note QF25 Certificate of Conformance (optional) Figure 2: Service deployment process Off-boarding As part of off-boarding we will: Provide you with access to the logs held within the service at the point of decommissioning, if required Decommission the Deep-Secure Guard software Delete all accounts and data Recover all licensed software
10 We will charge a single day at our professional services rates (see Pricing) for off-boarding activities. PRICE MODEL Our core Secure Zone Gateway Service is based on a monthly charge per Guard instance required by the customer. In addition, there is a service on-boarding charge that covers installation, configuration of the standard (templated) Guard policy and testing. Optional service elements include: File sharing utilities based on an on-boarding charge and a monthly charge File sharing applications based on an on-boarding charge and a monthly charge per 10 users enabled Training based on a charge per course per attendee Full details of pricing are contained in the service pricing document. Pricing excludes costs associated with the provision of compute and storage infrastructure required to host the Secure Zone Gateway Service. This will vary depending on the nature of the information exchange requirements that are part of a customer s specific solution. Pricing excludes day-to-day Guard administration tasks. This can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. SERVICE MANAGEMENT The Secure Zone Gateway Service includes full software maintenance and support for the sustainment of the deployed instances and the associated resources required. This excludes day to day administration tasks. This can be provided at our professional services rates (see Pricing), or through third party service management offerings. The support offered is covered under a comprehensive service management pack as detailed in the subsequent sections. SERVICE CONSTRAINTS None. SERVICE LEVELS The service support desk is available: Monday-Friday, , local UK time, excluding bank & public holidays. Support is provided by experienced Deep-Secure technical engineers who are specifically trained to perform in-depth diagnostic and troubleshooting activities in order to resolve product issues as quickly as possible along with carrying out any product execution tasks included within the Secure Zone Gateway Service. All Customer interaction details will be recorded and a Case Reference Number (CRN) assigned. Engineers work in small flexible multi-skilled units. This facilitates a team approach to service provision and ensures that more than one engineer is aware and able to discuss and resolve your service requests.
11 Service Request Categories The following table sets out the categories that will be assigned to each Service Request. Table SL1 Category Description 1 Total service failure of (operational) system or failure of a component of a critical process 2 Failure of one or more system functions making use of the system difficult (e.g. service still running and operational but not to full capacity) 3 Failure of a non-critical function having no significant effect on the system operation (e.g. failure of a sub-component such as a new version of an AV product) 4 Any incident having minimal impact on the system operation, requests for information or requests for enhancements. Service Levels The times indicated in table SL2 below are the target times for the Service Provider to respond to or provide a workaround for incidents as set forth in the Agreement. All periods of time commence from when the Service Provider first receives notification of a new incident. Table SL2 Response and Workaround Times Category Target Response Time Target Workaround Time 1 Less than 1 Working Hour Less than 1 Working Day 2 Less than 1 Working Hour Less than 3 Working Days 3 Less than 1 Working Hour Less than 10 Working Days 4 Less than 1 Working Hour As Appropriate Escalation In the event that a Service Request is not provided within the relevant target time indicated in table SL3 above then the following escalation timings shall apply. For the purposes of this agreement, escalation shall mean the customer shall have the right to communicate with that person in relation to the provision of the Service Request. In the event that the identified individual is not available then the Service Provider shall use their reasonable endeavours to provide the customer with an alternate contact person.
12 Table SL3 Category Service Delivery Manager Product Manager 1 Immediate Notification 1 Working Day 2 2 Working Days 5 Working Days 3 10 Working Days N/A 4 N/A N/A Security Flaws In the event that the Service Provider identifies security flaws in the software, the Service Provider shall categorise the security flaw in accordance with table SL4. Table SL4 Severity Description 1 Security vulnerability that allows Service Provider guard or administration system to be compromised (e.g. attacker gains control of the guard's host operating system). 2 Security vulnerability which means the Service Provider guard fails to block data that should be blocked according to the configured policy (e.g. data type configured to be blocked is allowed to pass). 3 Security vulnerability which means the guard fails to correctly identify the source or destination of data when applying policy (e.g. identity of originator of a signed message incorrectly identified resulting in loss of accountability). After categorising any emerging security flaw, the Service Provider shall follow the alerting and remediation process timings of table SL5. Alerting shall be to a customer nominated point of contact, using an agreed customer nominated communication means (e.g. secure address). Table SL5 Alerting and Remediation Times Severity Target Alert Time Target Remediation Time 1 Less than 2 Working Days Less than 2 Working Days 2 Less than 2 Working Days Less than 5 Working Days
13 3 Less than 2 Working Days Less than 7 Working Days Should we fail to meet SLA terms within the defined timescales we will credit 1 days worth of Secure Cross Domain Guard Service charge. ORDERING AND INVOICE PROCESS Ordering can be carried out using the Framework Agreement Call Off Contract. Invoicing is monthly in arrears. Payment can be via the following methods: BACS or Cheque. SERVICE LEAD TIME We will initiate on-boarding on receipt of purchase order in line with the Service Deployment Process identified in the On-Boarding section of this Service Definition Document. Timescales for implementation of the service will vary, depending on the size and complexity of the service deployment. Once a Secure Zone Gateway Service platform has been deployed, configured and tested under the scope of the initial charge, the live service will commence under the recurring service charge model. The service is based on a one month initial implementation period followed into live service from month 2 onwards. TERMINATION COSTS We will charge a single day at our professional services rates (see Pricing) for off-boarding activities. BACKUP/RESTORE AND DISASTER RECOVERY With the exception of configuration and syslog data the Secure Zone Gateway Service is stateless. Back-up of configuration and syslog data is a consumer responsibility. If required this can be provided at our professional services rates (see Pricing) or through third party service management offerings. DATA RESTORATION/SERVICE MIGRATION Data restoration is not included in the service. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. Service migration is not included in the service. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. CUSTOMER RESPONSIBILITIES The consumer is responsible for: Provision of compute and storage infrastructure required to host the Secure Zone Gateway Service Responding to policy conflict alerts raised by the Guard service and considering if the set policy is correctly aligned to the business needs Completion of the Sales Order Form in line with the G-Cloud procurement process
14 For tailored policy configuration services: Approval of the Statement of Work and System Design Document Engaging with, and specifying requirements for, the detailed configuration of the information exchange policy and reports that are required Providing appropriate and empowered attendees for scoping and review meetings The control and management of access and responsibilities for end users Ensuring that only appropriate data in line with the GSC Scheme (e.g. OFFICIAL or OFFICIAL- SENSITIVE) is accessible and presented to the platform. Where the consumer chooses not to take up a third party day-to-day management service, or professional services management, they are also responsible for: Guard configuration back-up Syslog back-up Recovery from back-up TECHNICAL REQUIREMENTS Appropriately specified host server and client devices where required to include associated licence provision.
SECURE CROSS DOMAIN GUARD
SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this
More informationAPPLICATION DELIVERY AS A SERVICE
SERVICE DEFINITION APPLICATION DELIVERY AS A SERVICE G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationSimplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to.
Simplifying Information Sharing Across Security Boundaries Presentation to Deep-Secure Overview 12 th November 2013, Prague 10 October 2011 1 What we do Deep-Secure offer solutions that help organisations
More informationInfrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT
Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...
More informationUKCLOUD SECURE REMOTE ACCESS
SERVICE DEFINITION UKCLOUD SECURE REMOTE ACCESS G-CLOUD 10 Classification: Open Classification: Open ii MDS Technologies Ltd 2018. Other than for the sole purpose of evaluating this Response, no part of
More informationService Description Safecom Customer Connection Version 3.5
Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationSchedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management
More informationSCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationGDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd
GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationDatabase as a Service (DBaaS) EnterpriseDB
Database as a Service (DBaaS) EnterpriseDB Contents 1 Intro to Enterprise Database as a Service...2 2 Service Definition...3 2.1 Customer On-Boarding... 4 2.2 Event & Incident Management... 4 2.3 Request
More informationService Level Agreement Domain Registration Services
Domain Registration Services 15 th March 2016 Not just another IT company Why? Because we think, react and deliver differently. Advise, Build, Support & Protect. It s what we do best, simple as that. We
More informationCustomer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach
Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand
More informationPEPPOL Transport Infrastructure Agreements Annex 3 Services and service levels
Table of contents 1. Scope for this document... 2 2. PEPPOL Services... 2 3. PEPPOL SML Service availability... 4 4. PEPPOL SMP and PEPPOL AP Service availability... 4 5. Performance, Capacity and Scalability...
More informatione2e Managed Customer Cloud Infrastructure Service Service Definition Document
1 e2e Managed Customer Cloud Infrastructure Service Service Definition Document OVERVIEW A range of Cloud infrastructure managed services where the customer buys or already owns the Infrastructure but
More informationSecure Managed Firewall
Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationSERVICE DESCRIPTION MANAGED FIREWALL/VPN
Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...
More informationCrises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.
Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility
More informationBT Assure Cloud Identity Annex to the General Service Schedule
1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationData Protection and GDPR
Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationCAPABILITY STATEMENT
CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our
More informationASD CERTIFICATION REPORT
ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationMERAKI SERVICE DESCRIPTION
MERAKI SERVICE DESCRIPTION Document Control Purpose of this Document The purpose of this document is to provide clear guidance on what the Meraki service will deliver to the end client. Document Contributors
More informationDHIS2 Hosting Proposal
www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationCloud Services. Infrastructure-as-a-Service
Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability
More informationCOMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)
ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable
More informationService Description: CNS Federal High Touch Technical Support
Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in
More informationGDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ
GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationSERVICE SCHEDULE MANAGED DATABASE
SERVICE SCHEDULE MANAGED DATABASE This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationTIBCO Nimbus Cloud Service. Software Release November 2016
TIBCO Nimbus Software Release 10.0.0 November 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationWHITE PAPER. Title. Managed Services for SAS Technology
WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive
More informationTIBCO Nimbus Service
TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade
More informationContents. 1 General Terms. Page 1 of 8
Page 1 of 8 Service Description: Advanced Services --- Fixed Price Secure Agile Exchange Advise and Implement (Quick Start) (ASF-CORE-SAI-QS) This document describes Cisco s Secure Agile Exchange Advise
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationVirtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services
Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as
More informationBT One Cloud Cisco UK Schedule to the General Terms
BT One Cloud Cisco UK Schedule to the General Terms Contents A note on you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 2 4 Service Management Boundary... 3 5 Associated
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationHPE File Data Migration Service
Data sheet HPE File Data Migration Service HPE Consulting and Integration Services File migration simplified Available in convenient packaged offerings, HPE File Data Migration Service is designed to help
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationUpdated December 12, Chapter 10 Service Description IBM Cloud for Government
Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal
More informationBT One Mobile Secure Devices (MobileIron) Schedule to the General Terms
BT One Mobile Secure Devices (MobileIron) Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms and Schedule... 2 Part A The BT One Mobile Secure Devices (MobileIron)
More informationOracle Managed Cloud Services for Oracle Platform as a Service and Infrastructure as a Service - Service Descriptions
Oracle Managed Cloud Services for Oracle Platform as a Service and Infrastructure as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Applications Unlimited on Oracle Technology
More informationWAN/MPLS SLA Fault Reporting
WAN/MPLS SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option 5 Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationTiscali Business Services Wholesale IPVPN Services Summary
Tiscali Services Wholesale IPVPN Services Summary Products covered: WIPVPN Standard WIPVPN WIPVPN Premium WIPVPN Premium WIPVPN May 2007 V.2.0 1 Table of Contents 1. Introduction... 3 2. Core product offering.
More informationService Description: Solution Support for Service Provider Software - Preferred This document
Page 1 of 5 Service Description: Solution Support for Service Provider Software - Preferred This document describes the Cisco Solution Support for Service Provider Software - Preferred. Related Documents:
More informationPartner Premier Service Program
SERVICE DESCRIPTION Partner Premier Service Program Polycom s Partner Premier Service Program provides Service Partners with technical telephone support, advance parts replacement, software upgrades &
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationServices Summary. Deliverables. Location of Services. Services Assumptions & Exclusions. General Project Management
Page 1 of 1 SERVICE DESCRIPTION: CISCO DNA CENTER ADVISE AND IMPLEMENT QUICK START ASF-EN1-G-DNAC-QS Services Summary Digital Network Architecture (DNA) Center Advise and Implement Quick Start assists
More informationSECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE
SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE
More informationOverview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution.
Overview Cobweb s service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution. is an easy-to-use, cloud backup storage solution that enables companies to backup files, folders,
More informationSecurity Annex for Firewalls Additional Terms for Firewall Service
CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationOffice 365. Claranet Service Description
Claranet Service Description Office 365 Provides a highly configurable Email, Collaboration and Unified Communications platform, hosted by Microsoft, that can be deployed for a customer organisation to
More informationService Description: Identity Services Engine Implementation-Subscription Service
Page 1 of 6 Service Description: Identity Services Engine Implementation-Subscription Service Services Summary This document describes the Identity Services Engine Implementation. Subscription Service.
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationA s c e r t i a S u p p o r t S e r v i c e s G u i d e
A s c e r t i a S u p p o r t S e r v i c e s G u i d e A S C E R T I A LTD J A N U A R Y 2 0 1 7 D O C U M E N T V E R S I O N - 5.1 Copyright Ascertia Ltd, 2017 Commercial-in-Confidence 1 Ascertia Support
More informationJT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE
Jersey Application form and Service Description for JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE : Account no: Copies held by 1 (the "Customer") 2. JT Hosting Services Application for Service
More informationISO27001 Preparing your business with Snare
WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationWhat can the OnBase Cloud do for you? lbmctech.com
What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationTB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored
the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of
More informationEnd User Terminal Service
Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History
More information2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.
Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationABOUT THIS SECTION...
CONTENTS 1 ABOUT THIS SECTION... 2 2 MANAGED SECURITY SERVICES... 2 3 WHAT IS SECURITY MONITORING?... 3 4 WHAT ARE THE SECURITY MONITORING SERVICE LEVELS?... 6 5 WHAT IS SECURITY INTELLIGENCE?... 10 6
More informationSLA. Service Level Agreement v1.0. Published: September 2014
SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because
More informationIBM Emptoris Managed Cloud Delivery
Service Description IBM Emptoris Managed Cloud Delivery This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of
More informationINFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare
INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationEX107OFC Application for permission to prepare a transcript or report from a recording made other than by the court
EX107OFC Application for permission to prepare a transcript or report from a recording made other than by the court This form gives limited permission to prepare a transcript or report from a recording
More informationInternet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi
Internet of Things The Digital Oilfield: Security in SCADA and Process Control Mahyar Khosravi makhosra@cisco.com Critical infrastructures worldwide not ready to battle cyber attacks, claims new study.
More informationEthernet DIA SLA Fault Reporting
Ethernet DIA SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name
More informationHPE Proactive 24 Service
Data sheet HPE Proactive 24 Service Support Services HPE Proactive 24 Service is an integrated hardware and software support solution that combines technical assistance with proactive account services
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationMaintel SIP Trunking Service Description
Maintel SIP Trunking Service Description November 2016 Brian Mackow-McGuire 2016 Maintel maintel.co.uk Maintel SIP Trunking Service Description_1216 1 Contents 1. SIP Service Overview 4 1.1. What is Maintel's
More information