Service Description Safecom Customer Connection Version 3.5

Size: px
Start display at page:

Download "Service Description Safecom Customer Connection Version 3.5"

Transcription

1 Service Description Safecom Customer Connection Version Telecom NZ Ltd Commercial in Confidence

2 CONTENTS 1 INTRODUCTION SERVICE DEFINITION SERVICE OVERVIEW SERVICE FEATURES SERVICE OPTIONS SERVICE IMPLEMENTATION STANDARD FEES AND INVOICING STANDARD CUSTOMER CONNECTION OPTIONAL COMPONENTS EXCLUSIONS Telecom NZ Ltd Page 2 Commercial in Confidence

3 1 INTRODUCTION This document forms part of the Safecom Service Specification which defines the Safecom suite of services and principles. The purpose of this document is to provide a detailed service description for the Safecom Customer Connection service, whereby the overarching Safecom Service Specification document applies and this document describes information specific to this service. If you require further technical information, please contact your account manager. 2 SERVICE DEFINITION 2.1 SERVICE OVERVIEW To enable customers to use Safecom services, there needs to be a secure connection between the internal Customer Network and Gen-i s Service Delivery Platform. The service that provides this is the Customer Connection Service which is a pre-requisite service for all other Safecom services. Safecom requires customers to use IP (Internet Protocol) as defined by the IETF (Internet Engineering Task Force) RFC 791. This standard defines the method of communication between host systems using IP, the standard for communication across the Internet. The following diagram outlines the key components of the service and its boundaries: Safecom Connectivity this is the Telecom connection, address translation and routes which are required to link the Customer Network into the Gen-i Service Delivery Platform for access to Safecom Services. Security Infrastructure these comprise multiple layers of firewalls providing specific and appropriate security levels and policies for each layer. By default, all application traffic to and from the Customer Network is blocked until additional Safecom services are provisioned. Intrusion Detection Systems (IDS) detect real-time attacks by hostile users and alert the Safecom Security Operations Centre (SOC). Safecom Base Infrastructure the base infrastructure for Safecom services provides administrative tools for selfadministration of users, services and reporting and maps into the SOC for management, monitoring and helpdesk support. CUSTOMERS INTERNAL NETWORK Customer Network SERVICE BOUNDARY SECURITY BOUNDARY Telecom Network Private Connection Safecom Connectivity Gen-i SERVICE DOMAIN Network Interface Layer Firewall Systems IDS Gen-i Service Delivery Platform Safecom Base Infrastructure Security Operations Centre Managemt & Monitoring Helpdesk Security Infrastructure Safecom Services BLOCKED IDS Firewall Systems SERVICE SECURITY BOUNDARY BOUNDARY External Networks: Remote Branches Partners Internet External Networks Public Users Remote VPN Users Customer Premises Equipment Terminates network connection Boundary between customer's internal network and Telecom network Network Connection High speed IP connection Dedicated or integrated with existing IP-VPN solution Safecom Services Centralised security services 24x7 Security Operations Centre Strong Protection from external threats Safecom Customer Connection Service Internet: Global IP network Hostile - high threat environment Transport for communications from External Networks and Remote Users FIGURE 1: SAFECOM CUSTOMER CONNECTION SERVICE 2006 Telecom NZ Ltd Page 3 Commercial in Confidence

4 The main security threats addressed by the Safecom Customer Connection service are: Attacks on Customer Network computer systems from the Internet devices within the Customer Network are not visible from the Internet, therefore, are difficult to attack directly. Addresses of devices will be translated, and all access controlled by the Safecom Firewall Systems. Users hosting hidden web sites on the internal Customer Network as Safecom does not provide direct inbound access from the Internet, it is not possible for a user to host a hidden website on the customer s network. 2.2 SERVICE FEATURES This Safecom Customer Connection service includes the following features: Safecom Connectivity Termination of the Telecom Network Circuit each customer will require a Telecom network connection to Safecom. It typically includes Customer Premises Equipment (CPE) such as a router at the customer site, network access connection and Virtual Circuit or connection to Safecom. This is terminated within Safecom at the Network Interface Layer. Network Address Translation Management (NAT) as customers often utilise private IP addressing within their internal networks, it is necessary to implement network address translation. This ensures that there are no conflicts of addressing within Safecom. The allocation of NAT address ranges is managed by the Safecom implementation team. Firewall and Intrusion Detection Systems These systems define the secure interface between the Customer Network and the Security Infrastructure including: Firewall Port a firewall port is dedicated to each customer and is used to enforce firewall policies to control all traffic that passes in and out of the port. Segmentation and security is maintained between the customer and other Safecom customers. The bandwidth of this port will be limited to the capacity purchased by the customer. Multi-layer Protection the Customer Network and all interfaces to Safecom are protected by firewalls, which provide a very high level of control and monitoring. Safecom provides multiple layers of Security Infrastructure, with each layer including firewall and intrusion detection systems. All layers are monitored to detect suspicious activity and alert where action is required. Intrusion Detection in Safecom, IDS are used in various locations to detect and alert on suspicious activity. The IDS alerts are managed by the Safecom Management Systems, which escalate alerts to the Security Operations Centre (SOC). Safecom Base Infrastructure Firewall Policies the default security policy blocks all direct inbound and outbound traffic to and from the Internet or external networks. When additional Safecom services are implemented, these policies are modified to allow specific communication between the Customer Network and the selected service. Safecom User Database the Safecom user database is central to the Safecom security model. This database holds profiles for each user, defining the Safecom services the user is authorised to access. While there are no users for the Safecom Customer Connection service itself, the user database container for this service includes a customer administrative user who is able to provision users for any implemented Safecom services using the Safecom Administration system. Safecom Administration system this web portal provides the ability for customers to administer their own users profiles in the Safecom user database. Users with administrative permissions are able to access the restricted website, add user accounts, delete users or modify user profiles. Reporting the Safecom Online Reporting system provides information on the traffic patterns through the customer connection for some core and optional services. This includes the data sent and received for those services as well as total throughout each day. Overall Security Infrastructure and monitoring all of the Safecom services are provided on hardened systems, managed and monitored 24 hours x 7 days per week, 365 days per year. Helpdesk Safecom support is provided by the Security Operations Centre (SOC), who is available to provide 2nd and 3rd level assistance to customer helpdesks as required. This includes testing and monitoring access through the Safecom systems Telecom NZ Ltd Page 4 Commercial in Confidence

5 Exclusions This service does not provide: Other Safecom Services Safecom provides a suite of services such as Secure Internet Browsing and Secure Mail Relay which function over the Safecom Customer Connection service. Where the customer requires applications which fall outside of the available service standards, the Restricted Inbound/Outbound services can be considered. Examples of this include outbound FTP, virus pattern updates, DNS forwarding or certificate authority services. Direct Communication from the Internet to the Customer Network this includes applications and protocols such as real audio, streaming video and chat which can open security risks and are not supported by Safecom. 2.3 SERVICE OPTIONS The following option exists for the Safecom Connectivity component: IPsec Encryption - this option allows for encryption over the connection from the Customer Network to Safecom. Safecom IPSEC Encryption is the provision of IPSEC (3DES encryption) across the Customer Connection specifically from the CPE (router) to the Safecom network interface termination point. To enable this functionality, the connecting router at the edge of the Customer Network is required to comply with Safecom IPSEC connectivity software with appropriate memory as defined by the router supplier Telecom NZ Ltd Page 5 Commercial in Confidence

6 2.4 SERVICE IMPLEMENTATION This section of the service description provides information on the provisioning process for the Safecom Customer Connection, and the steps involved. The overarching Safecom Service Specification should be reviewed as this table is specific to the Customer Connection service. As this service provides the interface between the customer s network and Safecom, it is required to be provisioned before any other Safecom service is provisioned. The Safecom implementation team will manage the provisioning process, and work with customer technical staff until the Safecom services are available and working for end users. Following is an outline of a typical implementation of this service: Implementation Team Responsibilities Customer Responsibilities Pre-Sales Scope pre-implementation work and estimate costs. Complete Design Proposal (if applicable) Provide accurate information for business and technical requirements. Contract, Technical Specification & Statement of Work Prepare Safecom Contract. Design Engineer completes the Safecom Customer Connection service section of the Technical Specification. Complete Statement of Work. Sign Safecom Contract. Develop a test plan to set the criteria for successful implementation of all functionality. Agree and signoff Statement of Work. Establish Connection to Safecom This involves provisioning a network connection between the Customer Network and Safecom. The Safecom Implementation team will work with the Telecom Network implementation group to coordinate the provisioning of these components. This usually includes the following components: Ensure skilled technical expertise is available to assist the Safecom engineer during the integration phases. Customer Premises Equipment this is the router which terminates the network connection from Safecom to the customer network. This is typically the demarcation point between the customer s internal network and Safecom. Telecom Access Connection the capacity of this connection will vary depending on customer requirements. Virtual Circuit such as a Frame Relay PVC or MPLS VLAN connection between the customer premises equipment and Safecom. Configure Safecom Network Interface This involves terminating the PVC and establishing the routing configuration to establish the connection to the Safecom Firewall port. Configure Routes and End-User Devices To establish routes for Safecom addresses, the customer s internal network should be configured to direct all end-user devices traffic destined for the Safecom servers ( x) to the router (CPE) terminating the connection to Safecom. In most cases this is done by configuring specific routes for each server on the CPE. Configure Safecom Firewall Port This involves setting up the Safecom Firewall infrastructure to allow communication between the customer s internal network and the Safecom Secure Infrastructure Telecom NZ Ltd Page 6 Commercial in Confidence

7 Test This involves testing communication from within the Customer Network to the Safecom Infrastructure. As setup of any additional Safecom Services is completed, testing to the Internet is conducted. The Safecom Implementation Engineer will assist the customer s technical person with configuration of a workstation and remote testing issues. The customer s technical person will work with the Safecom Implementation Engineer to test the service from the customer s site. This includes: Providing skills to diagnose integration issues that arise within the customer s environment. Testing all services according to test plan. Integration Completion Work with customer to ensure all requirements in the Statement of Work are met. Sign off Safecom solution to acknowledge delivery of functionality as agreed. Handover to SOC (Security Operations Centre) Ensure customer is aware that the services are in production and are aware of SOC s problem management and change control processes. Ensure support processes are communicated to all relevant internal parties. Each of the above stages includes discussions between the Safecom Implementation Engineer and the customer technical contact, as well as testing and sign-off processes. Safecom DNS As most Safecom Services provide name resolution for Internet domain names, the DNS systems in Safecom are not usually provided as a service to customers Telecom NZ Ltd Page 7 Commercial in Confidence

8 3 STANDARD FEES AND INVOICING The actual costs for the services provided in Safecom are detailed in the Safecom Price Schedule. In addition to the Safecom Service Specification fee information provided, the following information pertains to the Safecom Customer Connection service specifically. 3.1 STANDARD CUSTOMER CONNECTION ONE-OFF INSTALLATION FEES Installation fees include the cost of the initial configuration of Safecom Connectivity, Firewall and Intrusion Detection Systems and the Safecom Base Infrastructure components to allow customers to access additional Safecom services. This also includes liaising with customers regarding configuration of the Customer Network to connect to Safecom and testing. FIXED MONTHLY FEES The monthly fees cover the on-going use of Customer Connection service: Firewall port fees will vary per customer depending on the bandwidth required, starting at 512KBps up to 10MBps. Firewall port bandwidths are defined as the committed rate that will be provided. Firewall port speed chosen should match the committed information rate of the connection between the Customer Network and Safecom. Firewall ports will allow burst above the bandwidth, any burst over the committed bandwidth is dependant on current capacity. 3.2 OPTIONAL COMPONENTS The Safecom IPSEC Encryption option is priced separately to the standard Customer Connection service price. ONE-OFF INSTALLATION FEES This includes the initial configuration of IPSEC on the customer connection and testing with the customers. FIXED MONTHLY FEES: This includes the ongoing fee for providing this service option. 3.3 EXCLUSIONS The fees for other Safecom services such as Secure Internet Browsing, Secure Mail Relay and Secure Remote Access are detailed in separate service descriptions. Currently the Safecom Customer Connection fee does not include: Telecom Lanlink Network Charges such as: o o o Customer Premises Equipment (CPE) this is typically a managed router service provided by Lanlink. Access Circuit this is the connection between the CPE and the Telecom network at the customer site. Connection this is connection between the customer premises router and Safecom Telecom NZ Ltd Page 8 Commercial in Confidence

Service Description Safecom Simple Mail Relay Version 3.5

Service Description Safecom Simple Mail Relay Version 3.5 Service Description Safecom Simple Mail Relay Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION... 3 2 SERVICE DEFINITION... 3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

Schedule 2g(b) additional terms for VPN Branch service 1. SERVICE DESCRIPTION

Schedule 2g(b) additional terms for VPN Branch service 1. SERVICE DESCRIPTION 1. SERVICE DESCRIPTION Interoute s VPN Branch service (hereinafter the Service ) is a Fully Managed IPSec access service allowing connection to the Customer s VPN Branch and/or any IP VPN Sites provided

More information

ONE OFFICE LITE - PRODUCT SPECIFICATION

ONE OFFICE LITE - PRODUCT SPECIFICATION 1. INTRODUCTION ONE OFFICE LITE - PRODUCT SPECIFICATION This document contains product information for the One Office Lite service. If you require more detailed technical information, please contact your

More information

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

SERVICE DESCRIPTION MANAGED FIREWALL/VPN Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...

More information

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access

More information

METRO LAN EXTENSION - PRODUCT SPECIFICATION

METRO LAN EXTENSION - PRODUCT SPECIFICATION METRO LAN EXTENSION - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Metro LAN Extension service. If you require more detailed technical information, please contact your

More information

Tiscali Business Services Wholesale IPVPN Services Summary

Tiscali Business Services Wholesale IPVPN Services Summary Tiscali Services Wholesale IPVPN Services Summary Products covered: WIPVPN Standard WIPVPN WIPVPN Premium WIPVPN Premium WIPVPN May 2007 V.2.0 1 Table of Contents 1. Introduction... 3 2. Core product offering.

More information

LinchPin. Managed Service For IP VPN Networks. Web Site Telephone

LinchPin. Managed Service For IP VPN Networks. Web Site   Telephone LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks

More information

BT One Cloud Cisco UK Schedule to the General Terms

BT One Cloud Cisco UK Schedule to the General Terms BT One Cloud Cisco UK Schedule to the General Terms Contents A note on you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 2 4 Service Management Boundary... 3 5 Associated

More information

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services 1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking

More information

BT Ethernet Connect Global Service Annex to the General Service Schedule (Doc Ref: 13.1 July 2013)

BT Ethernet Connect Global Service Annex to the General Service Schedule (Doc Ref: 13.1 July 2013) 1 Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General s Schedule. ATD means BT s supplier s Access Terminating Device. BT NTE means a device

More information

AT&T NetBond User Guide

AT&T NetBond User Guide AT&T NetBond User Guide AWS GovCloud Publication Date: 2/04/2016 Revision: 1.0 2016 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

Who We Are.. ideras Features. Benefits

Who We Are.. ideras Features. Benefits :: Protecting your infrastructure :: Who We Are.. ideras Features Benefits Q&A Infosys Gateway Sdn Bhd. Incorporated in 2007 Bumiputra owned Company MSC Status Company Registered with Ministry of Finance

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- IP ENABLED PVC ATTACHMENT Last Revised 2/1/2017

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- IP ENABLED PVC ATTACHMENT Last Revised 2/1/2017 PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- IP ENABLED PVC ATTACHMENT Last Revised 2/1/2017 1. Private Mobile Connection IP Enabled PVC. Pursuant to the terms and conditions

More information

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- MPLS INTERCONNECT ATTACHMENT Last Revised 12/20/17

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- MPLS INTERCONNECT ATTACHMENT Last Revised 12/20/17 PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- MPLS INTERCONNECT ATTACHMENT Last Revised 12/20/17 1. Private Mobile Connection MPLS Interconnect. Pursuant to the terms and

More information

AppPulse Point of Presence (POP)

AppPulse Point of Presence (POP) AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time

More information

MANAGED WAN SERVICE GENERAL Service Definition Standard Service Features. Monitor and Notify Service Level Monitoring Notification

MANAGED WAN SERVICE GENERAL Service Definition Standard Service Features. Monitor and Notify Service Level Monitoring Notification MANAGED WAN SERVICE 1. GENERAL 1.1 Service Definition 1.2 Standard Service Features 1.3 Optional Service Features 1.4 Customer Responsibilities 2. SUPPLEMENTAL TERMS 3. SERVICE LEVEL AGREEMENT 4. FINANCIAL

More information

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD GEN2 SERVICES Our cloud infrastructure solutions are made up of a combination

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection AT&T VPN Access. Pursuant to the terms and conditions

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT Last Revised: 2/1/2017 1. Private Mobile Connection AT&T VPN Access. Pursuant to the terms and conditions

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

NEOBROADBAND LTE SERVICE SCHEDULE

NEOBROADBAND LTE SERVICE SCHEDULE Liquid Telecommunications South Africa (Pty) Ltd 401 Old Pretoria Main Road Halfway House, Midrand 1685 South Africa T +27 11 585 0000 NEOBROADBAND LTE SERVICE SCHEDULE Liquid Telecom Offices Mauritius

More information

Http://www.passcert.com Exam : 642-889 Title : Implementing Cisco Service Provider Next-Generation Egde Network Services Version : DEMO 1 / 6 1.Which type of VPN requires a full mesh of virtual circuits

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

SD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview.

SD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview. SD-WAN Managed Services Expereo SD-WAN Managed Services Overview www.expereo.com/sd-wan Contents 1 SD-WAN MANAGED SERVICES DESCRIPTION... 3 1.1 Consult & Design... 4 1.2 Procurement & Logistics... 4 1.3

More information

Service Activation of AT&T NetBond

Service Activation of AT&T NetBond Service Activation of AT&T NetBond For SunGard Availability Services TM (AS) and AT&T Enterprise Recovery Services (ERS) Publication Date: 11/16/2015 Revision: 1.0 Legal Disclaimer Copyright AT&T Intellectual

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Network Service Description

Network Service Description Network Service Description Applies to: Office 365 Dedicated Topic Last Modified: 2015-09-03 Contents... 1 Network Architecture... 2 Customer Connectivity to Services... 5 Customer-Owned Private Network

More information

Schedule 2e. Schedule 2E Additional Terms for Carrier Ethernet Services Eng Lang v page 1 of 11

Schedule 2e. Schedule 2E Additional Terms for Carrier Ethernet Services Eng Lang v page 1 of 11 1. SERVICE DESCRIPTION The Interoute E-CERTUS and E-AGILIS Services offer Carrier Ethernet Services between Interoute Demarcation Points on the Interoute Network and/ or on the Customer s Premises. The

More information

XO SITE SECURITY SERVICES

XO SITE SECURITY SERVICES XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises

More information

Service Activation for AT&T NetBond For AT&T Control Center

Service Activation for AT&T NetBond For AT&T Control Center Service Activation for AT&T NetBond For AT&T Control Center Revision: 1.0 2016 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo, Mobilizing Your World, DIRECTV and other marks are

More information

BT Assure Cloud Identity Annex to the General Service Schedule

BT Assure Cloud Identity Annex to the General Service Schedule 1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person

More information

Managed Internet Service (MIS) gives you these features:

Managed Internet Service (MIS) gives you these features: Product Description Managed Internet Service (MIS) is an Internet access service that combines a symmetrical, dedicated connection with consolidated application management. MIS includes proactive, 24x7

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

GÉANT L3VPN Service Description. Multi-point, VPN services for NRENs

GÉANT L3VPN Service Description. Multi-point, VPN services for NRENs GÉANT L3VPN Service Description Multi-point, VPN services for NRENs Issue Date: 1 November 2017 GÉANT L3VPN Overview The GÉANT L3VPN service offers the National Research and Education Networks (NRENs)

More information

Security Annex for Firewalls Additional Terms for Firewall Service

Security Annex for Firewalls Additional Terms for Firewall Service CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

OUR CUSTOMER TERMS M2M VPN SOLUTION

OUR CUSTOMER TERMS M2M VPN SOLUTION CONTENTS Click on the section that you are interested in. 1... 2 What is the M2M VPN Solution?... 2 Availability... 2 Minimum commitment... 2 Your responsibilities... 2 Use of M2M VPN Solution and Suspending

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Connection Requirements Specification. GEC Hub

Connection Requirements Specification. GEC Hub Connection Requirements Specification Connection Requirements Specification... 1 GEC HUB... 1 1. General... 4 1.1 INTRODUCTION... 4 1.1.1 ANX Connectivity Method... 4 1.1.2 VAN Connectivity Method... 4

More information

AT&T NetBond Service Activation Onboarding Guide

AT&T NetBond Service Activation Onboarding Guide AT&T NetBond Service Activation Onboarding Guide For VMWare Publication Date: 09/28/2015 Revision: 1.0 Legal Disclaimer Copyright AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and

More information

Secure Managed Firewall

Secure Managed Firewall Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Managed Services Rely on us to manage your business services

Managed Services Rely on us to manage your business services Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these

More information

C L O U D V O I C E Y E A L I N K S I P - C P 8 6 0

C L O U D V O I C E Y E A L I N K S I P - C P 8 6 0 C L O U D V O I C E Y E A L I N K S I P - C P 8 6 0 I P P H O N E C O N F I G U R A T I ON G U I D E V E R S I O N 2. 0 Contents Introduction... 3 Overview... 3 Audience... 3 Supported Devices... 4 Network,

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT Last Revised 2/1/2017 1. Private Mobile Connection Frame Relay. Pursuant to the terms and conditions of

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT 1. Private Mobile Connection Frame Relay. Pursuant to the terms and conditions of the Agreement and this

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Choosing a WAN Solution IP VPN vs. Frame Relay or ATM

Choosing a WAN Solution IP VPN vs. Frame Relay or ATM W H I T E P A P E R Choosing a WAN Solution IP VPN vs. Frame Relay or ATM 555 Anton Boulevard, Suite 200 Costa Mesa, CA 92626 877.634.2728 Introduction At MegaPath, we are committed to providing the right

More information

Deployments and Network Topologies

Deployments and Network Topologies TECHNICAL GUIDE Deployments and Network Topologies A technical guide to deploying Family Zone School in different network topologies. Contents Introduction...........................................3 Transparent

More information

MyCloud Computing Business computing in the cloud, ready to go in minutes

MyCloud Computing Business computing in the cloud, ready to go in minutes MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing

More information

VERIZON SELECT SERVICES INC. Page 1. SECTION 13 - EXHIBIT M - Network-Based IP VPN SERVICE

VERIZON SELECT SERVICES INC. Page 1. SECTION 13 - EXHIBIT M - Network-Based IP VPN SERVICE VERIZON SELECT SERVICES INC. Page 1 Quote Number or CBS/CNE Tracking Number: 1) Description of Service. Internet Protocol-Virtual Private Network (IP VPN) Service (Service) is a packet-based advanced data

More information

Network Services BT Internet Connect

Network Services BT Internet Connect Contents 1. 2. Network Services Customer responsibilities 3. Network Services General 4. Domain Name Registration 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects

More information

Thomson Reuters. FCN Services

Thomson Reuters. FCN Services Thomson Reuters FCN Services Zajil International Telecom is one of the primary FCN Service providers in the MENA region designated and certified by Thomson Reuters as an approved solutions provider for

More information

E FAX - PRODUCT SPECIFICATION

E FAX - PRODUCT SPECIFICATION E FAX - PRODUCT SPECIFICATION 1 INTRODUCTION This document contains information on the efax service. information, please contact your Account Manager. If you require more detailed technical Telecom will

More information

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material

More information

AT&T NetBond User Guide

AT&T NetBond User Guide AT&T NetBond User Guide For HPE Rapid Connect Publication Date: 11/1/2015 Revision: 1.0 Legal Disclaimer Copyright AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T

More information

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201 Paperspace Security Primer & Architecture Overview Copyright 2017 Paperspace, Co. All Rights Reserved - 1 - Business Whitepaper Paperspace www.paperspace.com Paperspace Virtual Desktops: A foundation for

More information

End User Terminal Service

End User Terminal Service Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

NSG100 Nebula Cloud Managed Security Gateway

NSG100 Nebula Cloud Managed Security Gateway Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive

More information

So Your Customer Wants a VPN. Howard C. Berkowitz

So Your Customer Wants a VPN. Howard C. Berkowitz NANOG 16 -- May 1999 -- Eugene, OR So Your Customer Wants a VPN Howard C. Berkowitz Gett Communications hcb@clark.net (703)998-5819 1 Issues Understanding Requirements Managing Expectations Defining your

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

CLOUD GATEWAY USER GUIDE

CLOUD GATEWAY USER GUIDE CLOUD GATEWAY USER GUIDE PAGE 1/42 DRAFT [SECURITY CLASSIFICATION] WHAT S INSIDE OVERVIEW... 5 COMPATIBLE CLOUD PROVIDERS... 6 USING THIS GUIDE... 6 PURCHASING A CLOUD GATEWAY... 7 REGISTERING FOR CLOUD

More information

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management

More information

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service

More information

ABOUT THIS SECTION...

ABOUT THIS SECTION... CONTENTS 1 ABOUT THIS SECTION... 2 2 MANAGED SECURITY SERVICES... 2 3 WHAT IS SECURITY MONITORING?... 3 4 WHAT ARE THE SECURITY MONITORING SERVICE LEVELS?... 6 5 WHAT IS SECURITY INTELLIGENCE?... 10 6

More information

SoftLayer Security and Compliance:

SoftLayer Security and Compliance: SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers

More information

ADVANCED CUSTOMER SERVICES ORACLE TRANSITION SERVICE EXHIBIT

ADVANCED CUSTOMER SERVICES ORACLE TRANSITION SERVICE EXHIBIT ADVANCED CUSTOMER SERVICES ORACLE TRANSITION SERVICE EXHIBIT This exhibit incorporates by reference the terms of the order for Oracle Transition Service. A. Description of Services. i. If Your order contains

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

BT IP Connect Global Schedule to the General Terms

BT IP Connect Global Schedule to the General Terms BT IP Connect Global Schedule to the General Terms Contents A note on we and you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 5 4 Service Management Boundary... 11

More information

Reaping the Full Benefits of a Hybrid Network

Reaping the Full Benefits of a Hybrid Network Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) PERMANENT VIRTUAL CIRCUIT ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) PERMANENT VIRTUAL CIRCUIT ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) PERMANENT VIRTUAL CIRCUIT ATTACHMENT Last Revised 12/20/17 1. Private Mobile Connection Permanent Virtual Circuit. Pursuant to

More information

AT&T NetBond for SoftLayer

AT&T NetBond for SoftLayer NetBond for Service Activation Overview 2016 Intellectual Property. All rights reserved., Globe logo and other marks are trademarks and service marks of Intellectual Property and/or affiliated companies.

More information

Xrio UBM Quick Start Guide

Xrio UBM Quick Start Guide XRIO UBM QUICK START GUIDE V.2.0 Updated September 2009 Xrio UBM Quick Start Guide Page 1 of 35 UBM QUICK START GUIDE CONTENTS 1.0 Getting Started Page 04 1.1 Connecting to Your UBM Appliance Page 05 1.2

More information

zsah Cloud Offering Security FAQ In partnership with Clearswift

zsah Cloud Offering Security FAQ In partnership with Clearswift zsah Cloud Offering Security FAQ In partnership with Clearswift zsah s Cloud Offering Overview zsah Main office and Data Centres Our main office is located in central London with support staff available

More information

Network Services BT MPLS (Marketed as IP Connect Global)

Network Services BT MPLS (Marketed as IP Connect Global) Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects Service as detailed in

More information

BT IP Connect Global Schedule to the General Terms

BT IP Connect Global Schedule to the General Terms BT IP Connect Global Schedule to the General Terms Contents A note on you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 5 4 Service Management Boundary... 10 5 Service

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

J Detail Billing File Services Type Telecommunications Services Communications Transport IP Based Optical. Circuit Switched Data.

J Detail Billing File Services Type Telecommunications Services Communications Transport IP Based Optical. Circuit Switched Data. Voice Circuit Switched Data Toll-Free Combined Private Line Frame Relay Asynchronous Transfer Mode Ethernet Premises-Based IP VPN Network-Based IP VPN Voice over IP Transport Content Delivery Network Converged

More information

Network Services Enterprise Broadband

Network Services Enterprise Broadband Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects

More information

SERVICE DESCRIPTION DEDICATED SERVER

SERVICE DESCRIPTION DEDICATED SERVER Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation

More information

Spectrum Enterprise SIP Trunking Service Vertical TM Wave IP500TM / Wave IP2500 TM Release 4.0, 4.5 IP PBX Configuration Guide

Spectrum Enterprise SIP Trunking Service Vertical TM Wave IP500TM / Wave IP2500 TM Release 4.0, 4.5 IP PBX Configuration Guide Spectrum Enterprise SIP Trunking Service Vertical TM Wave IP500TM / Wave IP2500 TM Release 4.0, 4.5 IP PBX Configuration Guide About Spectrum Enterprise: Spectrum Enterprise is a division of Charter Communications

More information

V I R G I N M E D I A B U S I N E S S C L O U D V O I C E

V I R G I N M E D I A B U S I N E S S C L O U D V O I C E V I R G I N M E D I A B U S I N E S S C L O U D V O I C E P H O N E C O N F I G U R A T I O N G U I D E P O L Y C O M S O U N D P O I N T / S O U N D S T A T I O N V E R S I O N 2 Contents Introduction...

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls

More information

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration [ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a

More information

Reliable, fast data connectivity

Reliable, fast data connectivity Data Reliable, fast data connectivity Discover business-grade, high speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity services connects your

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Module Overview. works Identify NAP enforcement options Identify scenarios for NAP usage

Module Overview. works Identify NAP enforcement options Identify scenarios for NAP usage Module 6: Network Policies and Access Protection Module Overview Describe how Network Policies Access Protection (NAP) works Identify NAP enforcement options Identify scenarios for NAP usage Describe Routing

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 2/1/2017 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

Security

Security Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from

More information