Technical Architecture. Section 1. System Infrastructure & Scalability. Yes No Comments

Size: px
Start display at page:

Download "Technical Architecture. Section 1. System Infrastructure & Scalability. Yes No Comments"

Transcription

1 Technical Architecture Section 1. System Infrastructure & Scalability Requirement 1) Hardware configuration operates on industry standard Intel servers such as IBM or HP. 2) Operating system environment supports, the following minimum system requirements, Microsoft Windows 2000/XP Professional and Microsoft Windows 2003 Server. 3) System can be configured with complete redundancy with no single point of failure as well as Active-Passive set-up where both nodes will be handling different types. 4) Use clustering software to load balance and demonstrate quick, automatic failover across all servers. 5) Support a web-based interface. 6) Support Citrix. 7) Recommended hardware platform provides capability for hot swappable, mirrored/raided disk drives. 8) Support the ability to conduct routine backup procedures without the users having to be off the system. 9) Support a variety of point of care and input devices, specifically: Signature Capture Hand held/portable - Radio Frequency Laptops Touch Screen Pen Voice Recognition Keyboard/Mouse Page 1

2 PDA Requirement 10) System is based on a relational database management system. 11) Delivery options for in-house environment (ICO) as well as a host-based environment (SaaS). 12) System has "master files" where universal information can be entered once and accessed by other applications. 13) Data elements can be viewed, printed, interfaced, updated, reported on and/or listed as needed. 14) Required fields are user-definable. 15) Provide Common Reporting Tools and Analytics that are compatible with recognized, industry standard reporting tools such as Microsoft SQL, Crystal Reporting. 16) Vendor provides load testing tools and load testing as part of their implementation. 17) System is scalable to accommodate additional utilization, users, transactions and/or additional local/remote sites. 18) Support multiple environments including test, production and training. 19) Provide a data dictionary. 20) Database tools are provided to allow enduser access for queries and extraction or output of data into other file formats. 21) Allow for server virtualization. 22) Management of client/pc software is centrally managed. 23) Application can be monitored via common enterprise monitoring systems. 24) Application provides an alerting and monitoring utility. 25) Application exposes data via Web Services. 1. Does your solution employ a true Service Oriented Architecture (SOA)? Explain Page 2

3 2. In the context of a true SOA, explain how your data and service modeling is done and what advantages it provides to the customer. 3. Describe the vendor s approach to data integrity and redundancy. 4. Describe the vendor s approach and tools for backup, recovery and SAN/NAS recommendations. 5. Detail the number of environments that are recommended for implementation and their purposes, ex. Test, Development, QA, Production? 6. Describe the process of environment management and migrating from one environment to another. 7. What is the source code for the application written in? 8. How many application releases per year does the vendor provide? 9. How are minor and major releases communicated and provided to the client? 10. Detail the printing process for the application. Page 3

4 Section 2. Network Capabilities Requirement 1) Each server must have an appropriate Network Interface Card (NIC) to connect to the Local Area Network. 2) In Ethernet environments, all servers should be placed on dedicated 100 Mbps Full-Duplex switch ports for maximum throughput and performance. 3) System can be integrated into a wireless environment 4) Wireless protocols such as a, b, or g should be used. 5) The recommended WAN connection should be a Frame Relay or ATM network. A fractional-t1, T1 or greater network of appropriate bandwidth must be installed. 6) Critical data (security/authentication data) is passed between various layers using 128 bit encryption. The browser/server communication can also be set using standard SSL based authentication. 7) Capable of using IP and the standard network protocol. 8) Support secure TCP/IP remote access for users (e.g., PPTP, SSL, Kerberos, etc.). 9) Required network devices can be managed from a central location. 10) Support Network Load Balancing to offer higher throughput for increased user load. 11) Support Layer 3 switching 1. Please describe your LAN/WAN network requirements. 2. On the Wide Area Network, what is the minimum bandwidth requirement? 3. Describe in detail the remote access methods you currently support for your application and how you would support devices at remote locations. 4. What cellular protocols does the system support? Page 4

5 5. What are the throughput response time requirements? Section 3. Security Requirement 1) Support Role Based Access. 2) Support task-based and object-based user authorization profiles. 3) Provide an audit trail that can be used to identify transactions or data accesses that have been performed by: Function Terminal Patient User 4) Provide audit log reporting features. 5) Log all unsuccessful logons and lock out users after a certain number of unsuccessful attempts as defined by the customer. 6) Provide a time out feature that automatically signs off a user if a workstation has been left unattended for a user-defined time period. 7) Support Active Directory and/or LDAP. 8) Report on access levels by patient, user, and location. 9) Provide functions to restrict access to specific patient records for individual users. 10) Support electronic signature. 11) Authenticate user based upon a minimum of one-factor authentication utilizing one or more of the following in combination with a User ID: Page 5

6 Password Requirement Biometric Identification Proximity Controls (RFID) Token (e.g., Secure ID) 12) Provide interoperability with patient context (CCOW). 13) Permit creation of temporary user accounts with specific expiration timeframes. 14) Permit the security administrator to specify that User IDs and passwords must contain a combination of alphabetic, numeric, and special characters. 15) Permit the security administrator to specify that passwords must adhere to strong password guidelines. 16) Permit the security administrator to specify a minimum password length that will be enforced by the system. 17) Force a user to select a password at initial sign-on and when the password has been reset. 18) Prohibit the reuse of User IDs and passwords per user based upon security administrator controllable setting. 19) Support the encryption of the password file and password information. 20) Permit the security administrator to set events that are considered security violations as well as provide real-time notification of any violations. 1. Discuss the system s ability to define and control user and role profiles within and across facilities. 2. Describe the system user name and password structure and the ability to enforce it. 3. Discuss the authentication process including encryption and wireless devices. 4. How does your system support single sign-on? Page 6

7 5. Does the system provide audit logs/error logs to detect unauthorized access or activity? 6. Describe the system components in place that support a user/ client s adherence to the HIPAA security regulations. Page 7

8 Section 4. Interoperability Requirement 1) Support the use of industry standard interface engines. 2) Provide pre-defined interfaces that expedite interface development time and automatic wizards that can be used to implement model definitions. 3) Support standard HL7 interfaces. 4) Support industry standards such as DICOM and XML. 5) Interface with legacy systems, departmental systems, repository systems, foreign systems, modalities and devices. 6) Software logic is parameterized or table driven for convenient modification by EPT, tables, and external database query. 7) Users can view a display of archived transactions and audit file as well as the transactions as they are being processed. 8) Includes flexible table features that enable a user to build tables for the translation of data. 9) Support the ability to conditionally map data and the ability to compare and group condition tests. 10) Provide a custom adapter development kit such as COM or API, making it possible for a user to create utilities and applications that can communicate directly. 11) The generation of alert messages can be configured by the time of day and day of week, for each interface via user-defined peak, off-peak and scheduled downtimes. 12) Alert messages can be sent to any device including, pagers and printers as well as to other interfaces. Alerts can also be configured based on change of interface status, idle time and excessive transaction backlog. Page 8

9 Requirement 13) Support data mapping and conditional routing. 14) The following data types are supported: ASCII, BLOB, EBCDIC, hex16, hex32, printable, raw, signed binary and unsigned binary. 15) Error Monitoring provides an alert subsystem which generates alert messages that are stored and viewable online and can be routed via various mechanisms such as and pagers. 16) Include a variety of monitoring and troubleshooting tools that allow for the immediate identification and correction of any problem you may encounter. These intuitive tools are easy to access via point and click or drag and drop features. 17) A field can easily be setup such that some values are translated and others are passed through without translation. 18) Templates exist for various protocol, connections types and interface ports. 19) Holds message waiting to be processed in memory and writes them to disk. Each message is flagged with a status that indicates whether it has been processed and received by the destination system. 20) Provide templates that allow users to assign attributes to a particular definition then copy these attributes for other similar builds are provided. 21) Support for IHE 1. Provide your definition and vision of interoperability and how you are incorporating interoperability within your solutions. 2. Describe your method for establishing HL7 connectivity as well as the version you support. 3. Describe your overall design approach to developing, testing, implementing and upgrading system interfaces. 4. Describe how you support systems without standard interfaces. 5. What tools does your system provide to allow monitoring and guaranteed delivery of your interfaces? Page 9

10 6. What interface engines have your existing clients used? 7. Describe the auditing capabilities to verify the counts of records sent or received by your system. Section 5. Software as a Service (SaaS) OVERVIEW Software as a Service (SaaS), also know as Cloud Computing, provides application software to customers as an on-demand service. SaaS vendors deliver software over the Internet by hosting the software themselves or through a third party Application Service Provider (ASP). While SaaS solutions include many costs, they are generally less expensive than traditional solutions hosted at your own facilities. For example, a SaaS solution minimizes upfront capital costs for hardware and ongoing costs for hardware and software support and maintenance. Because SaaS offers an attractive delivery approach, it is rapidly becoming available, and in some cases, vendors only offer this option. This non-traditional approach requires adding some new items to your RFP and removing others than are no longer applicable. A SaaS agreement should also include some specific contract provisions. Here are some examples of non-contract items to include in a SaaS RFP: Architecture Use of Rich Internet Application (RIA) technology. RIA features allow the SaaS application to execute functions locally on user workstations rather than via an Internet-based web server. This reduces connection time and delays communicating between your computer and the SaaS application. An application configured by the vendor to comply with your organization s web accessibility and presentation standards. Ownership of your data. Provision of a suitable method for retrieving your data in a format you can use with other applications or tools, should you terminate your relationship with the SaaS vendor. Automated load-testing tools as part of the vendor implementation. Examples of information SaaS RFPs do not include are as follows: Requirements for the proposed hardware platform, e.g., hardware model, system software or database software. Separately itemized hardware or system software costs. Separately itemized requirements for ongoing hardware platform maintenance and associated staffing and costs. Limited desktop configuration requirements, e.g., web browser support. Performance Reliability Page 10

11 Detail your performance metrics for Service Level Agreements (SLAs) for measuring application availability, performance, and network connectivity. Detail any tools offered to measure application availability offered to report on realtime or historical performance information (uptime, outages, degradations). Disclose any use of 3 rd party server hosting companies. How are sudden demand surges managed without adversely affecting system use? How is planned growth in demand managed without adversely affecting system use? Where are your data centers located? How are application and server upgrades conducted, scheduled, and communicated to the customer? Is off-line data access available in the event of a loss of connectivity? Detail your high availability capabilities. Attach a copy of your disaster recovery plan. Describe your backup and recovery capabilities that ensure prompt and complete data recovery. Security Detail how your organization would respond to a data security breach. Detail the number and roles of your data security personnel. Vendor maintains a well-document security infrastructure. Detail the level of auditing that is available and what access the customer has to audit logs. Describe any use of incident protection and detection software. encrypted data storage and transmission while compensating for performance implications. Vendor maintains infrastructure standards certification like International Standards Organization/International Electrical Commission (ISO/IEC 27002). An estimated response time from vendor support personnel when contacted regarding security issues. Can the customer s data be moved among multiple data centers? If so, how is the customer notified? Will you allow for the storage of a customer s data outside the United States of America? Do you provide for the delegation of user provisioning administration to the customer? What physical controls exist to manage the ingress/egress of the software production/delivery facility? Will the software code be placed in escrow and buyer assumption of hosting responsibilities if your company stops offering the application due to bankruptcy, etc.? If not, detail the situation for customers in the event that your company can no longer continue operations. Page 11

12 Page 12

Atmosphere Fax Network Architecture Whitepaper

Atmosphere Fax Network Architecture Whitepaper Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

Concord Fax Network Architecture. White Paper

Concord Fax Network Architecture. White Paper Concord Fax Network Architecture White Paper Page 2 Table of Contents Introduction 3 The 99.99% Uptime Fax Network 4 Reliability and High Availability 5 Security 9 Delivery 14 Network Monitoring 19 About

More information

HIPAA Controls. Powered by Auditor Mapping.

HIPAA Controls. Powered by Auditor Mapping. HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

CMB-207-1I Citrix Desktop Virtualization Fast Track

CMB-207-1I Citrix Desktop Virtualization Fast Track Page1 CMB-207-1I Citrix Desktop Virtualization Fast Track This fast-paced course covers select content from training courses CXA-206: Citrix XenApp 6.5 Administration and CXD-202: Citrix XenDesktop 5 Administration

More information

Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH

Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH Technical Brief 1 SupportPoint Cloud is a SaaS solution that makes it easy for people to get the information and guidance they need to navigate through complex business processes. SupportPoint Cloud Client

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Networks - Technical specifications of the current networks features used vs. those available in new networks.

Networks - Technical specifications of the current networks features used vs. those available in new networks. APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description

More information

DHIS2 Hosting Proposal

DHIS2 Hosting Proposal www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

System Overview. Security

System Overview. Security ImageSilo is an ultra-secure, on-demand Enterprise Content Management (ECM) system. As the largest on-demand installation of PaperVision Enterprise, it offers all the same features and functionality. ImageSilo

More information

InterCall Virtual Environments and Webcasting

InterCall Virtual Environments and Webcasting InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

Integrated Cloud Environment Security White Paper

Integrated Cloud Environment Security White Paper Integrated Cloud Environment Security White Paper 2012-2016 Ricoh Americas Corporation R i c o h A m e r i c a s C o r p o r a t i o n R i c o h A m e r i c a s C o r p o r a t i o n It is the reader's

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

SECURITY DOCUMENT. 550archi

SECURITY DOCUMENT. 550archi SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or

More information

COURSE OUTLINE IT TRAINING

COURSE OUTLINE IT TRAINING CMB-207-1I Citrix XenApp and XenDesktop Fast Track Duration: 5 days Overview: This fast-paced course covers select content from training courses CXA-206 and CXD- 202 and provides the foundation necessary

More information

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice

More information

Technical and Functional Standards for Digital Court Recording

Technical and Functional Standards for Digital Court Recording Technical and Functional Standards for Digital Court Recording As of February 2015 Overview This document provides detailed specifications for Digital Court Recording (DCR) systems which meet the court

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

IBM Proventia Management SiteProtector Installation Guide

IBM Proventia Management SiteProtector Installation Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Installation Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports, read the information in

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

Xceedium Xio Framework: Securing Remote Out-of-band Access

Xceedium Xio Framework: Securing Remote Out-of-band Access Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many

More information

Managed WAN SLA. Contents

Managed WAN SLA. Contents Managed WAN SLA Contents Terminology... 2 Service Description... 2 Service Offerings... 2 Private Network Services... 2 Ethernet Connectivity... 2 T-1 Connectivity... 3 Other Connectivity... 3 Internet

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17,

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17, TO 8-06: Regional Real-Time Transit Architecture Design, Procurement and Technical Assistance Real-Time Transit Information System System Requirements VERSION 2.5 Prepared for: Metropolitan Transportation

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

The power of centralized computing at your fingertips

The power of centralized computing at your fingertips Pinnacle 3 Professional The power of centralized computing at your fingertips Philips Pinnacle 3 Professional specifications The power of centralized computing in a scalable offering for mid-size clinics

More information

ATTACHMENT 1 Vendor Compliance Matrix Request for Proposal 3093 CCAC Infrastructure Upgrade Phase 1: Campus Core Switch Upgrade Project

ATTACHMENT 1 Vendor Compliance Matrix Request for Proposal 3093 CCAC Infrastructure Upgrade Phase 1: Campus Core Switch Upgrade Project Vendor must indicate at what level its proposed solution will the College s requirements as delineated in the referenced sections of the RFP: 2.3 Solution Vision 2.3 Solution Vision The vendor of the selected

More information

SCLIntra Enterprise Product Summary

SCLIntra Enterprise Product Summary SCLIntra Enterprise Product Summary SCLIntra uses barcoding technology to monitor and control the flow of tangible objects mail, parcels, property, files or people as they enter and move through a facility.

More information

On line Thermal Performance Monitoring System. Annexure B1. IEC IT Compliance & Cyber Security Requirements

On line Thermal Performance Monitoring System. Annexure B1. IEC IT Compliance & Cyber Security Requirements POWER & ENERGY GROUP GENERATION DEVISION MONITOR & DIAGNOSTICS CENTER On line Thermal Performance Monitoring System Annexure B1 IT Compliance & Cyber Security Requirements Approved by: Name / Signature

More information

Sub Meter Data Import & Storage Platform RFP Questions/Answers

Sub Meter Data Import & Storage Platform RFP Questions/Answers Sub Meter Data Import & Storage Platform RFP Questions/Answers ADDED 10/12/2015 Q: The latter sections of the RFP indicate that you are looking for dashboarding features. Will VEIC accept a proposal that

More information

IBM Content Manager OnDemand on Cloud

IBM Content Manager OnDemand on Cloud Service Description IBM Content Manager OnDemand on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Managed WAN SLA. Contents

Managed WAN SLA. Contents Managed WAN SLA Contents Terminology... 2 Service Description... 2 General... 2 Levels and Offerings... 2 Private Network Services... 2 Features... 2 Internet Access... 3 Features... 3 Service Level Metrics...

More information

Pinnacle3 Professional

Pinnacle3 Professional Pinnacle3 Professional Pinnacle3 Professional centralized computing platform X6-2 specifications sheet A fast and flexible server solution for demanding small to mid-size clinics Compact and powerful,

More information

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Table of Contents. Page 1 of 6 (Last updated 27 April 2017) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...

More information

IBM System Storage DS5020 Express

IBM System Storage DS5020 Express IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (FC/iSCSI) enables SAN tiering Balanced performance well-suited for

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer

Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer 2007 SoundBite Communications, Inc. All Rights Reserved. Agenda Scalability Capacity

More information

for Windows 2000 Servers. Application server software for enterprises to compete in the digital economy.

for Windows 2000 Servers. Application server software for enterprises to compete in the digital economy. Citrix MetaFrame for Windows 2000 Servers. Application server software for enterprises to compete in the digital economy. Citrix is the world leader in application server software and services that provide

More information

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform Deploy Your step-by-step guide to successfully deploy an app with FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements, and

More information

Citrix XenApp 6.5 Administration

Citrix XenApp 6.5 Administration Citrix XenApp 6.5 Administration CXA206; 5 Days, Instructor-led Course Description Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize

More information

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

Course CXA-206: Citrix XenApp 6.5 Administration

Course CXA-206: Citrix XenApp 6.5 Administration Course CXA-206: Citrix XenApp 6.5 Administration Course Length: 5 days Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description Do you have a comprehensive, written information security program ( WISP ) WISP) applicable to all records containing personal information about a resident of the Commonwealth of Massachusetts ( PI )?

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

HIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards

HIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards HIPAA Compliance HIPAA and 164.308(a)(7)(ii) Administrative Safeguards FileGenius is compliant with all of the below. First, our data center locations (DataPipe) are fully HIPAA compliant, in the context

More information

VMware vcloud Air SOC 1 Control Matrix

VMware vcloud Air SOC 1 Control Matrix VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a

More information

TABLE OF CONTENTS. Page 1 of 59

TABLE OF CONTENTS. Page 1 of 59 Page 1 of 59 TABLE OF CONTENTS Introduction... 3 Features... 4 General Features... 4 IBackup Professional lets you view the log files of backup, restore, scheduled backup and the details of files and folders

More information

Sage 300 People & Web Self Service Technical Information & System Requirements

Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services. Beyond virtualization

Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services. Beyond virtualization Beyond virtualization Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services The power of many servers, the simplicity of one Efficiently manage infrastructure

More information

90 % of WAN decision makers cite their

90 % of WAN decision makers cite their WHITEPAPER So many ways to WAN How the most essential technology for distributed enterprises has evolved and where it s headed One of the most critical components to the success of any growth-oriented

More information

NextGen Patient Portal. User Guide.

NextGen Patient Portal. User Guide. 2.4.3 NextGen Patient Portal User Guide www.nextgen.com Copyright 2014-2017 QSI Management, LLC. All Rights Reserved. The registered trademarks listed at http://www.qsii.com/legal_notices.shtml are the

More information

enicq 6 Installation Guide

enicq 6 Installation Guide Vermont Oxford Network enicq 6 Documentation enicq 6 Installation Guide Release 1.4 Published January 2018 2018 Vermont Oxford Network. All Rights Reserved. enicq 6 Installation Guide Introduction Welcome

More information

ALERT LOGIC LOG MANAGER & LOG REVIEW

ALERT LOGIC LOG MANAGER & LOG REVIEW SOLUTION OVERVIEW: ALERT LOGIC LOG MANAGER & LOG REVIEW CLOUD-POWERED LOG MANAGEMENT AS A SERVICE Simplify Security and Compliance Across All Your IT Assets. Log management is an essential infrastructure

More information

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds EXECUTIVE BRIEF SHAREBASE BY HYLAND Automate sharing. Empower users. Retain control. With ShareBase by Hyland, empower users with enterprise file sync and share (EFSS) technology and retain control over

More information

Access Control Procedure

Access Control Procedure HIPAA Security Procedure # Last Revised: 3/15/2006 Approved: Scope of Procedure The scope of this Policy covers the unique user identification and password, emergency access, automatic logoff, encryption

More information

Metasys System Extended Architecture Overview

Metasys System Extended Architecture Overview Technical Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture Overview Metasys System Extended Architecture Overview...2 Introduction... 2 Key Concepts... 4 Metasys System Extended

More information

Document Number: rev D Intuitive Surgical, Inc. OnSite Overview. for the da Vinci Xi and da Vinci Si Surgical System.

Document Number: rev D Intuitive Surgical, Inc. OnSite Overview. for the da Vinci Xi and da Vinci Si Surgical System. OnSite Overview for the da Vinci Xi and da Vinci Si Surgical System Page 1 Table of Contents 1. OnSite for the da Vinci Xi and Si System Overview... 3 2. Requirements... 5 3. Detailed Hardware, Software

More information

RSA Authentication Manager 7.1 Administrator s Guide

RSA Authentication Manager 7.1 Administrator s Guide RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA

More information

System Requirements. v7.5. May 10, For the most recent version of this document, visit kcura's Documentation Site.

System Requirements. v7.5. May 10, For the most recent version of this document, visit kcura's Documentation Site. System Requirements v7.5 May 10, 2013 For the most recent version of this document, visit kcura's Documentation Site. Table of Contents 1 System requirements overview 3 1.1 Scalable infrastructure example

More information

2010 Product Line Catalog

2010 Product Line Catalog 2010 Product Line Catalog emerge Embedded Software Systems w Part of Access SySTEM From enterprise-wide security management to small and mid-size access control, Linear s IEI brand has a choice of, giving

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

CLOUD DISASTER RECOVERY. A Panel Discussion

CLOUD DISASTER RECOVERY. A Panel Discussion CLOUD DISASTER RECOVERY A Panel Discussion SPEAKERS Michael Kemps Founder & CEO Innovative Computing Systems, Inc. Mike Paul CTO Innovative Computing Systems, Inc. Sonny Sheth Senior Systems Engineer Innovative

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

Course AZ-100T01-A: Manage Subscriptions and Resources

Course AZ-100T01-A: Manage Subscriptions and Resources Course AZ-100T01-A: Manage Subscriptions and Resources Module 1: Managing Azure Subscriptions In this module, you ll learn about the components that make up an Azure subscription and how management groups

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

TRACKVIA SECURITY OVERVIEW

TRACKVIA SECURITY OVERVIEW TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times

More information

Due Diligence March 2018 Page 1 of 6. Company

Due Diligence March 2018 Page 1 of 6. Company Page 1 of 6 Company Company details Services offered Selectapension Limited, Selectapension House, Eridge Road, Crowborough, East Sussex, TN6 2SL, 01892 669494, www.selectapension.com. Registered in England

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

Mobile Data Security Essentials for Your Changing, Growing Workforce

Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity

More information