Managed Security Services - Event Collector Implementation, Configuration and Management
|
|
- Roy Smith
- 5 years ago
- Views:
Transcription
1 Service Description Managed Security Services - Event Collector Implementation, Configuration and Management The services described herein are governed by the terms and conditions of the agreement specified in the Order Document for IBM Security Services ( Order Document ). If there is a conflict between the terms in the documents, the terms of the Order Document prevail over those of this document, and the terms of this document prevail over those of the agreement specified in the Order Document ("the Agreement"). Capitalized terms not otherwise defined in this document are defined in the Agreement or any other referenced document, and have the same meaning in this document as ascribed to them therein. This document describes the Services and incorporates by reference the following contract document(s). The terms and conditions contained in the incorporated document(s) are in addition to the terms and conditions contained herein. Contract Document(s) Document # Managed Security Services General Provisions I MSS Portal, Security Services Contacts and Security Reporting I Standard Services Deployment and Activation I Out-of-Band Access I The document(s) identified above are located at: From this security services contract documents portal, Client selects the applicable country to access the above documents. If any documents are not accessible, please request a copy from Client's IBM sales contact. 1.1 Event Collector Implementation, Configuration and Management During Event Collector Implementation, Configuration and Management, IBM will work with Client to deploy a new Event Collector Agent or begin management of an existing Event Collector Agent. Note: Implementation activities are performed one time during the performance of the services. If Client chooses to replace, upgrade, or move Client's Event Collector during the Services contract, IBM may require that such Event Collector be redeployed and reactivated (called Redeployment ). Such Redeployments will be provided at an additional charge as specified in an applicable Order Document. Implementation services are performed remotely, Client may contract separately for IBM to provide physical installation and configuration services. The Event Collector is a required device that Client provides. Such device is deployed at Client's location or designated Cloud hosting provider and managed and monitored by IBM MSS for an additional charge, as specified in the Order Document. IBM strongly encourages Out-of-Band ( OOB ) access to the Event Collector, as described in the section of this Services Description entitled Out-of-Band Access. The basic functions of the Event Collector are to: a. compile or otherwise combine the security events and log data; b. parse and normalize unknown, text-based system activity log formats for submission to the IBM MSS infrastructure; c. compress and encrypt the security events and log data; and d. transmit the security events and log data to the IBM MSS infrastructure. Core features of the Event Collector are to: e. perform local spooling by queuing the events locally when a connection to the IBM MSS infrastructure is not available; f. perform unidirectional log transmission. Event Collector communication is performed via outbound SSL/TCP-443 connections; I EN Page 1 of 5
2 g. perform message throttling. This limits the bandwidth from the Event Collector to the IBM MSS infrastructure based on selected Events per Second (EPS) as specified in the order document to preserve bandwidth; and h. provide transmit windows, if configured. The transmit windows enable/disable event transmission to the IBM MSS infrastructure during the timeframe specified Install and Configure the Event Collector a. provide live support, via phone and , and will assist Client with the location of applicable vendor documents detailing the installation and configuration procedures for the Event Collector operating system and IBM provided Event Collector software. Such support must be scheduled in advance to ensure availability of an IBM deployment specialist; b. provide Client with hardware specifications for the Event Collector platform; c. provide Client with Event Collector software and configuration settings; d. at Client's request, and for an additional charge specified in the Order Document, provide software installation services; e. for existing platforms: (1) assess existing hardware configurations to ensure they meet IBM s specification; and (2) identify required hardware upgrades to be provided and installed by Client. f. remotely configure the Event Collector to include registration of the Event Collector with the IBM MSS infrastructure and begin the deployment and management takeover process of the Event Collector; and g. confirm the IBM MSS infrastructure is receiving communication from the Event Collector. a. to provide the hardware for the Event Collector platform, based on IBM s recommended specifications and requirements; b. to maintain current licensing, and support and maintenance contracts for the hardware the Event Collector is installed upon; c. to install the IBM-provided Event Collector software on Client's provided hardware, under the guidance of IBM; d. to configure an external IP address and associated settings on the Event Collector; e. to provide IBM with the Event Collector IP address, hostname, machine platform, application version, and time zone; f. to be responsible for physical installation and cabling of the Event Collector; and g. to schedule live support with an IBM deployment specialist. 1.2 Device Support Module (DSM) Configuration The purpose of this activity is to provide Client with access to the DSM configuration guide, and the deployment of such DSMs to the Event Collector. a. provide Client with access to the DSM configuration guide; and b. provide live support during the configuration of the DSMs and Log Sources. I EN Page 2 of 5
3 a. to download the DSM configuration guide; b. to enable logging and auditing on Log Sources subscribing to the Services as described in the DSM configuration guide; c. to configure the DSM with appropriate settings (including: service level, site, platform, operating system, and time zone); d. to verify and confirm connectivity between the Log Source and the Event Collector; e. to log into the MSS Portal to confirm the Log Source is available and the Service is receiving logs within three business days of DSM installation and configuration; and f. acknowledges that Client is solely responsible for all DSM configuration tasks. 1.3 Windows Log Collection Implementation The purpose of this activity is to facilitate log collection from Windows devices using the WinCollect agent. a. provide Client with access to the WinCollect installation guide and the WinCollect agent software; b. provide Client with instructions on how to configure a WinCollect agent; and c. provide live support during the installation, distribution and configuration of the WinCollect agents. a. to download the WinCollect agents from the IBM provided link; b. to distribute and install the WinCollect agents to enable logging and auditing on Windows devices subscribing to the Services; c. to configure the WinCollect agents with appropriate configuration settings (including: headless mode, one to one or one to many configurations); d. to verify and confirm connectivity between the Windows device and the Event Collector; e. to log into the MSS Portal to confirm the Windows devices are available and the Service is receiving logs within three business days of WinCollect installation and configuration; and f. and acknowledges that Client is solely responsible for all WinCollect installation, configuration and maintenance tasks. 1.4 Event Collector Health Monitoring The purpose of this activity is to monitor the health and performance of the Event Collector. a. install monitoring software on the Event Collector; and b. analyze and respond to key metrics, which may include: (1) hard disk capacity; (2) CPU utilization; (3) memory utilization; (4) process availability; and (5) respond to alerts generated by the monitoring software. I EN Page 3 of 5
4 Client has no additional responsibilities required for this activity. 1.5 Event Collector Management The purpose of this activity is to provide ongoing management for the Event Collector. As determined by IBM, a. be the sole provider of software-level management for the Event Collector; b. maintain system status awareness; c. install new application and security content updates on the Event Collector, as they become available; d. install patches and software updates in order to improve performance, enable additional functionality, or resolve an application problem; e. declare a maintenance window in advance of Event Collector updates that may require platform downtime or Client's assistance to complete; and f. clearly state, within the maintenance window notification, the expected impacts of a scheduled maintenance on the Event Collector and any specific requirements needed from Client. a. to perform IBM-specified hardware upgrades to support the current software and firmware; b. to work with IBM to perform Event Collector updates (as required), and ensure Event Collectors are online during maintenance windows; c. to be responsible for all charges associated with hardware upgrades; d. to maintain current licensing, and support and maintenance contracts; e. to ensure appropriate consents are in place with Client's vendors to allow IBM to leverage existing support and maintenance contracts on Client's behalf. If such agreements are not in place, IBM will not be able to contact the vendor directly to resolve support issues; and f. and acknowledges that: (1) all updates are transmitted and applied via the Internet; (2) if vendor consents are not obtained or are revoked at any point during the contract period, Services and/or SLAs may be suspended by IBM; (3) noncompliance with IBM-required software or hardware upgrades may result in suspension of Services delivery and/or SLAs; and (4) devices offline or otherwise unavailable during software upgrades may become out of sync with IBM infrastructure, and may result in suspension of Services delivery and/or SLAs. 1.6 Notification The purpose of this activity is to notify Client if the Event Collector becomes unreachable through standard in-band means. a. notify Client if the Event Collector becomes unreachable through standard in-band means. Such notification will be via telephone using a predetermined notification procedure; b. begin investigation of problems related to the configuration or functionality of the Event Collector, following initiation of telephone notification and creation of an outage ticket in the MSS Portal; and c. display Event Collector health and outage tickets in the MSS Portal. I EN Page 4 of 5
5 a. to provide notification paths and contact information for Client's organization; b. to update IBM within three calendar days when Client's contact information changes; and c. to ensure an Authorized Security Contact or Designated Services Contact is available 24 hours/day, 7 days/week Troubleshooting The purpose of this activity is to perform research and investigation if the Event Collector does not perform as expected or a potential Event Collector health issue is identified. a. create a trouble ticket in the event of an Event Collector performance problem or potential Event Collector health issue; b. begin research and investigation of the documented issue; c. if the Event Collector is identified as the potential source of a network-related problem, examine the Event Collector configuration and functionality for potential issues; and d. display the Event Collector health and outage ticket in the MSS Portal. a. to participate in troubleshooting sessions with IBM (as required); b. to be responsible for providing all remote configuration and troubleshooting; and c. and acknowledges that if the Event Collector is eliminated as the source of a given problem, no further troubleshooting is required to be performed by IBM. I EN Page 5 of 5
IBM Managed Security Services (Cloud Computing) - Hosted Security Event and Log Management - Standard
IBM Managed Security Services (Cloud Computing) - Hosted Security Event and Log Management - Standard INTC-8477-01 Nordic 2011-02 (INTC-8477-01 11-2010) Page 1 of 19 Table of Contents 1. Scope of Services...3
More informationIBM Application Security Services Secure Web Gateway Management - Premium
IBM Application Security Services Secure Web Gateway Management - Premium Z125-8482-01 01-2011 Page 1 of 22 Table of Contents 1. Scope of Services... 4 2. Definitions... 4 3. Services... 4 3.1 Security
More informationIBM Managed Security Services General Provisions Services Description
IBM Managed Security Services General Provisions Services Description I126-8484-EN-04 03-2016 Page 1 of 32 Table of Contents 1. Scope of Services...4 2. Definitions...4 3. Services...4 3.1 MSS Portal...4
More informationIBM Infrastructure Security Services firewall management - managed VPN concentrator
IBM Infrastructure Security Services firewall management - managed VPN concentrator INTC-8605-01 Nordic 2011-02 (INTC-8605-01 01-2011) Page 1 of 23 Table of Contents 1. Scope of Services...3 2. Definitions...3
More informationIBM Infrastructure Security Services Managed Network Security Services Service description
IBM Infrastructure Security Services Managed Network Security Services Service description Z126-5942-GR-3 11-2013 Page 1 of 37 Table of Contents IBM Managed Network Security Services...4 1.Managed Network
More informationZ DK-1 01/2013 Page 1 of 38
IBM Infrastructure Security Services Managed Network Security Services for Firewall Management Intrusion Detection and Prevention Management Unified Threat Management Secure Web Gateway Management Service
More informationIBM Infrastructure Security Services - Firewall Management - Standard
IBM Infrastructure Security Services - Firewall Management - Standard Z125-8470-00 05-2010 Page 1 of 24 Table of Contents 1. Scope of Services... 4 2. Definitions... 4 3. Services... 4 3.1 Security Operations
More informationServices Description IBM Application Security Services - Secure Web Gateway Management - Select
IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) Services Description IBM Application Security Services - Secure
More informationIBM Infrastructure Security Services firewall management - managed VPN concentrator
IBM Infrastructure Security Services firewall management - managed VPN concentrator INTC-8605-01 01-2011 Page 1 of 26 Table of Contents 1. Scope of Services...4 2. Definitions...4 3. Services...4 3.1 Security
More informationIBM Infrastructure Security Services - Managed Protection Services for Servers - Select
IBM Infrastructure Security Services - Managed Protection Services for Servers - Select INTC-8474-00 Nordic 2011-02 (INTC-8474-00 05-2010) Page 1 of 23 Table of Contents 1. Scope of Services...4 2. Definitions...4
More informationIBM Infrastructure Security Services - Firewall Management - Select
IBM Infrastructure Security Services - Firewall Management - Select BELUX-8471-01 10-2010 Page 1 of 26 Table of Contents 1. Scope of Services...4 2. Definitions...4 3. Services...4 3.1 Security Operations
More informationServices Description IBM Infrastructure Security Services - Firewall Management - Standard
IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) Services Description IBM Infrastructure Security Services -
More informationIBM Infrastructure Security Services - Managed Protection Services for Networks - Standard
IBM Infrastructure Security Services - Managed Protection Services for Networks - Standard Z125-8464-01 10-2010 Page 1 of 28 Table of Contents 1. Scope of Services... 4 2. Definitions... 4 3. Services...
More informationServices Description IBM Infrastructure Security Services - Firewall Management - Select
IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) Services Description IBM Infrastructure Security Services -
More informationManaged Security Services - Automated Analysis, Threat Analyst Monitoring and Notification
Service Description Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification The services described herein are governed by the terms and conditions of the agreement specified
More informationIBM Managed Security Services for Network Intrusion Detection and Intrusion Prevention Systems - Standard
IBM Managed Security Services for Network Intrusion Detection and Intrusion Prevention Systems - Standard NO-7805-05-ENG 2010-03 (INTC-7805-05 10-2009)Page 1 of 27 Table of Contents 1. Scope of Services...4
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationIBM Managed Security Services - Vulnerability Scanning
Service Description IBM Managed Security Services - Vulnerability Scanning This Service Description describes the Service IBM provides to Client. 1.1 Service IBM Managed Security Services - Vulnerability
More informationIBM Managed Security Services for Network Firewalls - Standard
IBM Managed Security Services for Network Firewalls - Standard DK-7799-07-ENG 2010-03 (INTC-7799-07 10-2009) Page 1 of 27 Table of Contents 1. Scope of Services...4 2. Definitions...4 3. MSS for Network
More informationIBM Managed Security Services for Security Event and Log Management
Service Description IBM Managed Security Services for Security Event and Log Management 1. Scope of Services IBM Managed Security Services for Security Event and Log Management (called MSS for Security
More informationManaged Protection Service for Desktop Firewalls Standard
Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. Managed Protection Service for Desktop Firewalls Standard
More informationIBM Vulnerability Management Service
Service Description 1. Service Overview IBM Vulnerability Management Service IBM Vulnerability Management Service (called VMS or Service ) is designed to provide a comprehensive, Web-driven vulnerability
More informationIBM Managed Security Services for Security Event and Log Management
Service Description IBM Managed Security Services for Security Event and Log Management 1. Scope of Services IBM Managed Security Services for Security Event and Log Management (called MSS for Security
More informationIBM Managed Security Services for Security
Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationService Description: Software Support
Page 1 of 6 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationIBM Managed Security Services for Security Event and Log Management
Service Description IBM Managed Security Services for Security Event and Log Management 1. Scope of Services IBM Managed Security Services for Security Event and Log Management (called MSS for SELM ) is
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationIBM Hosted Application Security Services - Pre-Production Application Scanning
IBM Hosted Application Security Services - Pre-Production Application Scanning FR_INTC-8839-02 2-2012 Page 1 of 21 Table of Contents IBM Hosted Application Security Services -...1 Pre-Production Application
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationIBM Managed Security Services for X-Force Hosted Threat Analysis Service
IBM Managed Security Services for X-Force Hosted Threat Analysis Service Z125-8483-00 05-2010 Page 1 of 5 Table of Contents 1. Scope of Services... 3 1.1 Licensing... 3 1.1.1 Individual... 3 1.1.2 Distribution...
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationService Description Managed Protection Services for Networks - Standard
Service Description Managed Protection Services for Networks - Standard 1. Scope of Services IBM Managed Protection Services for Networks Standard (called MPS for Networks Standard ) is designed to provide
More informationCOMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)
ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable
More informationService Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3)
Page 1 of 8 Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3) This document describes Cisco Technical Services Advantage support services. Related Documents: This document
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationImplementing and Supporting Windows Intune
Implementing and Supporting Windows Intune Module 1: Windows Intune Overview Module Overview Challenges in Managing Business PCs Introducing Windows Intune Managing and Securing PCs in Any Location by
More informationManaged NIDS Care Services
Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,
More informationCloud Service Level Agreement
Cloud Service Level Agreement This Cloud Service Level Agreement is part of your Cloud Terms of Service. 1. DEFINITIONS The following definitions shall apply for purposes of this Cloud Service Level Agreement:
More informationSERVICE SCHEDULE MANAGED DATABASE
SERVICE SCHEDULE MANAGED DATABASE This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationv February 2016
Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance
More informationIBM Managed Security Services (Cloud Computing) hosted and Web security - express managed security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed e-mail security Z125-8581-01 12-2010 Page 1 of 15 Table of Contents 1. Scope of Services... 3 2. Definitions...
More information1 SAP HANA Remote Monitoring
Page 1 of 5 Service Description: Cisco Managed for Data Center: SAP HANA Technology Addendum to Cisco Managed for Enterprise Common Service Description This document referred to as a Technology Addendum
More informationIBM Hosted Application Security Services - Website Scanning Platform
IBM Hosted Application Security Services - Website Scanning Platform Z126-5886-US-1 09-2012 Page 1 of 13 Table of Contents IBM Hosted Application Security Services -... 1 Website Scanning Platform... 1
More informationUpdated December 12, Chapter 10 Service Description IBM Cloud for Government
Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationCloud Service Level Agreement
Cloud Service Level Agreement This Cloud Service Level Agreement is part of your Cloud Terms of Service. 1. DEFINITIONS The following definitions shall apply for purposes of this Cloud Service Level Agreement:
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationIBM Sterling B2B Services File Transfer Service
Service Description IBM Sterling B2B Services File Transfer Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients
More informationSERVICE DESCRIPTION MANAGED FIREWALL/VPN
Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...
More informationHPE Proactive 24 Service
Data sheet HPE Proactive 24 Service Support Services HPE Proactive 24 Service is an integrated hardware and software support solution that combines technical assistance with proactive account services
More informationMANAGED WAN OPTIMIZATION SERVICE
MANAGED WAN OPTIMIZATION SERVICE 1. GENERAL 1.1 Service Definition 1.2 Standard Service Features 1.3 Optional Service Features 1.4 Customer Responsibilities 2. SUPPLEMENTAL TERMS 2.1 Reports 2.2 WAN Accelerator
More informationService Level Agreement
This ( ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply all Managed Services to Customer. The Master Agreement entered into between LightEdge
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationORACLE PRODUCT SPECIFIC TERMS AND CONDITIONS FOR DYN DELIVERY SERVICES
FOR DYN EMAIL DELIVERY SERVICES 1. INTRODUCTION. These Oracle Product Specific Terms and Conditions for Dyn Email Delivery Services are entered into by and between Oracle and Client, and are incorporated
More informationIBM Content Manager OnDemand on Cloud
Service Description IBM Content Manager OnDemand on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of
More informationSchedule to Data Products Service Appendix Service Level Agreement
Schedule to Data Products Service Appendix Service Level Agreement This Service Level Agreement (SLA) is a Schedule to the itel Networks Service Appendix (Appendices) for Data Services and is incorporated
More informationService Description: Solution Support for Service Provider Software - Preferred This document
Page 1 of 5 Service Description: Solution Support for Service Provider Software - Preferred This document describes the Cisco Solution Support for Service Provider Software - Preferred. Related Documents:
More informationManaged LAN Service Level Agreement
1. Overview Managed LAN offers certain service level agreements as shown below. Capitalized terms that are not defined in Appendix B: Terms and Definitions are defined pursuant to Customer s Agreement
More informationIBM App Connect Enterprise on IBM Cloud
Service Description IBM App Connect Enterprise on IBM Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and
More informationTECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT
TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationHPE 3PAR Performance and Capacity Trending Service
Data sheet HPE 3PAR Performance and Capacity Trending Service HPE Lifecycle Event Services HPE 3PAR Performance and Capacity Trending Service provides data collection, analysis, and reports with key performance
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationAppPulse Point of Presence (POP)
AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time
More informationPUBLICATION 1 SERVICE DESCRIPTION FOR NETWORK INTERACTIVE VOICE RESPONSE SERVICE
PUBLICATION 1 SERVICE DESCRIPTION FOR NETWORK INTERACTIVE VOICE RESPONSE SERVICE 1.1 Service Overview The Network Interactive Voice Response Service ("NIVR Service") provides fully managed network-based
More informationService Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition
Service Description IBM Aspera Files This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationHP StorageWorks MSA/P2000 Family Disk Array Installation and Startup Service
HP StorageWorks MSA/P2000 Family Disk Array Installation and Startup Service HP Services Technical data The HP StorageWorks MSA/P2000 Family Disk Array Installation and Startup Service provides the necessary
More informationDell Service Description
Dell Service Description Dell Managed Services for Microsoft Azure Backup Introduction Dell is pleased to provide Dell Managed Services for Microsoft Azure Backup (the Service(s) ) in accordance with this
More informationHPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family
Data sheet HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family HPE Lifecycle Event Services HPE Data Replication Solution Service provides implementation of the HPE
More informationHPE 3PAR Remote Copy Extension Software Suite Implementation Service
Data sheet HPE 3PAR Remote Copy Extension Software Suite Implementation Service HPE Lifecycle Event Services HPE 3PAR Remote Copy Extension Software Suite Implementation Service provides customized deployment
More informationHUTCHISON GLOBAL COMMUNICATIONS LIMITED IBIZCLOUD SERVICE SERVICE LEVEL AGREEMENT (SLA)
HUTCHISON GLOBAL COMMUNICATIONS LIMITED IBIZCLOUD SERVICE SERVICE LEVEL AGREEMENT (SLA) This SERVICE LEVEL AGREEMENT (SLA) is entered into between Hutchison Global Communications Limited (HGC) and (Customer)
More informationHP 3PAR Storage System Installation and Startup Service
HP 3PAR Storage System Installation and Startup Service HP Care Pack Services Technical data For smooth startup, the HP 3PAR Storage System Installation and Startup Service provides deployment of your
More informationSLA. Service Level Agreement v1.0. Published: September 2014
SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because
More informationJUNIPER OPTIMUM CARE SERVICE
SERVICE DESCRIPTION JUNIPER OPTIMUM CARE SERVICE Contents 1. Introduction...1 2. Eligibility and Purchasing....1 3. Service Features and Deliverable Description...1 4. End User Responsibilities...3 5.
More informationHPE Aruba Airwave Installation and Startup Service
Data sheet HPE Aruba Airwave Installation and Startup Service Support Services HPE Installation and Startup Service for select Aruba Airwave products coordinates installation, configuration, and verification
More informationApplication Lifecycle Management on Softwareas-a-Service
Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application
More informationHP MSA Family Installation and Startup Service
Technical data HP MSA Family Installation and HP Services Service benefits Allows your IT resources to stay focused on their core tasks and priorities Reduces implementation time, impact, and risk to your
More informationOracle Mission Critical Support Platform. General. Installation. Troubleshooting. Inventory and Discovery. Frequently Asked Questions Release 2.
Oracle Mission Critical Support Platform Frequently Asked Questions Release 2.3 E23199-01 May 2011 General What is Oracle Mission Critical Support Platform? Is Oracle Mission Critical Support Platform
More informationManaged WAN SLA. Contents
Managed WAN SLA Contents Terminology... 2 Service Description... 2 Service Offerings... 2 Private Network Services... 2 Ethernet Connectivity... 2 T-1 Connectivity... 3 Other Connectivity... 3 Internet
More informationService Description: Advanced Services- Fixed Price: Cisco UCCE Branch Advise and Implement Services (ASF-CX-G-REBPB-CE)
Page 1 of 1 Service Description: Advanced Services- Fixed Price: Cisco UCCE Branch Advise and Implement Services (ASF-CX-G-REBPB-CE) This document describes Advanced Services Fixed Price: Cisco UCCE Branch
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationIBM WebSphere Cast Iron Live
IBM Terms of Use SaaS Specific Offering Terms IBM WebSphere Cast Iron Live The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms )
More informationSERVICE CATALOG. NOC and HELP DESK
THESE REQUIREMENTS HAVE BEEN INCORPORATED BY REFERENCE INTO, AND FORM A PART OF, THE PARTNER AGREEMENT BETWEEN VENDOR AND COMPANY (THE AGREEMENT ). Capitalized terms not otherwise defined herein have the
More informationSecurity Correlation Server System Deployment and Planning Guide
CorreLog Security Correlation Server System Deployment and Planning Guide The CorreLog Server provides a method of collecting security information contained in log messages generated by network devices
More informationSERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between CDS Office Technologies
More informationService Description: CNS Federal High Touch Technical Support
Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in
More informationIBM Internet Security Systems Proventia Management SiteProtector
Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and
More informationJuniper Secure Analytics Patch Release Notes
Juniper Secure Analytics Patch Release Notes 7.3.0 January 2018 7.3.0.20171205025101 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Administrator Notes..................................................
More informationCisco ServiceGrid Deployment Service Ecosystem Manager Managed B2B Connection (ASF-SGA-EM-MNC)
Page 1 of 1 Service Description: Advanced Services Fixed Price Cisco ServiceGrid Deployment Service Ecosystem Manager Managed B2B Connection (ASF-SGA-EM-MNC) This document describes Advanced Services Fixed
More informationService Level Agreement
Service Level Agreement Version 2017.V1 Copyright 2017 ASTOUNDZ 3831 Golf Dr., Houston, TX 77018 713.904.5001 ASTOUNDZ.com Table of Contents Service Level Agreement... 3 Guarantee and Service Level Agreement...
More informationSERVICE DESCRIPTION DEDICATED SERVER
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationPartner Premier Service Program
SERVICE DESCRIPTION Partner Premier Service Program Polycom s Partner Premier Service Program provides Service Partners with technical telephone support, advance parts replacement, software upgrades &
More informationXO SITE SECURITY SERVICES
XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises
More informationMANAGED WAN SERVICE GENERAL Service Definition Standard Service Features. Monitor and Notify Service Level Monitoring Notification
MANAGED WAN SERVICE 1. GENERAL 1.1 Service Definition 1.2 Standard Service Features 1.3 Optional Service Features 1.4 Customer Responsibilities 2. SUPPLEMENTAL TERMS 3. SERVICE LEVEL AGREEMENT 4. FINANCIAL
More informationManaged Security Services Premises Premium Service Level Agreement
Managed Security Services Premises Premium Service Level Agreement 1. Key Performance Indicators. This SLA defines the service metrics for which Customer has the right to receive credits (Service Credits)
More information