Managed Services OVERVIEW
|
|
- Philip Melvyn Marshall
- 5 years ago
- Views:
Transcription
1 Managed Services OVERVIEW
2 overview 24/7 Support Services Tailored for large and small businesses MANAGED SERVICES 3 MONITORING AND ALERTING SERVICE 4 SUMMARY 4 DESCRIPTION 4 MONITORING 4 ALERTING 4 RESPONSIBILITY MATRIX 4 EXTENDED HELPDESK 5 SUMMARY 5 DESCRIPTION 5 RESPONSIBILITY MATRIX 5 SERVER PATCHING 6 SUMMARY 6 DESCRIPTION 6 NETWORK MANAGEMENT 7 SUMMARY 7 DESCRIPTION 7 RESPONSIBILITY MATRIX 7 COMBINING THESE SERVICES 8 Proactive response prevents service issues Ensure compliance with server patching Reduce internal effort on mundance tasks Improve user productivity QMS DOC REF: QMS REC 76, VERSION NUMBER: 1.0, PUBLISH DATE: 09/02/2016. info@ 2
3 managed services This document provides details of the managed services that Calligo provide. These have been designed to complement our existing Helpdesk service. They are as suitable for small organisations that have no internal IT staff as they are for large organisations. This document describes the following services: Monitoring. 24/7 monitoring of devices, networks and services. Includes options for alerting, escalation and management of incidents. Extended Helpdesk. Extends the existing Helpdesk service so that it becomes the one-stop service for all your staff and all products and services even if they are not provided by Calligo. Server patching. Monthly patching of all your Windows & Linux servers. Ensures that your whole infrastructure is protected from vulnerabilities. Network management. Configuration management and software patching for your network devices. These services are additional to the following services that are provided within other Calligo offerings: Web proxy support. Using Trend Micro s web security product we defend your organisation by restricting your staff s access to malicious sites. You can restrict and/or log access to non-business sites. Anti-malware. An optional service to apply Trend Micro s Deep Security to your hosted servers. Includes monitoring, updating, quarantining and release. Please refer to our website for further information on these services. info@
4 monitoring and alerting service SUMMARY Using our 24/7 network operations centre we can monitor the availability and performance of your network, servers and other devices. There are two variants of the service. Within the Standard service we monitor and inform you when we see an alert condition. With the Enhanced service we investigate the alert, will raise a ticket on the appropriate supplier and manage the incident to closure. DESCRIPTION Calligo s cloud services are extensively monitored as standard. We monitor the physical infrastructure, the virtual environment that deliver our cloud services and all of the hosted services that we provide such as CloudDesk and CloudMail. These optional services build on Calligo s standard monitoring service and extend these to cover the client s operating environment. Examples of devices that can be monitored are virtual servers including websites and underlying services, network devices (physical or virtual) and communication circuits. MONITORING Calligo s service is a fully managed offering that extends monitoring into the client s domain. It uses world class, third party, tools such as PRTG & Xangati that can be customised to provide a bespoke service that precisely meets the demands of the organisation. Multiple sensor types are available that can monitor the most extensive range of services: Over 200 sensor types for all common network services including: HTTP, Ping, Port and SNMP Bandwidth monitoring; Cisco, IPFIX, jflow, Netflow, Packet sniffer and more Web services; Apache, download time, IIS performance, transaction monitoring and more Windows WMI; including IIS, AD, Exchange, SharePoint, SQL Server and more Linux, Unix and OS X Virtual servers (outside of Calligo s cloud); AWS, Citrix, Hyper-V, VMware and more Mail services including Exchange services Database services; MS SQL, MySQL, Oracle and more. Having identified the root cause Calligo will raise a ticket with the appropriate third party supplier in this case that could be a Telco or Cisco. Calligo will manage the ticket to resolution providing the Client with updates throughout. In order to use the Enhanced service the Client must maintain up to date maintenance and support services with their third party suppliers and Calligo must have a catalogue of those and delegated authority to raise and manage tickets on behalf of the Client. During the setup of this service a service catalogue is created with details of all of the Client s suppliers, contact details, maintenance contracts and SLA targets. RESPONSIBILITY MATRIX Calligo/ Standard Calligo/ Enhanced Client Definition of services to be monitored Standard threshold alerting Define and customise thresholds and alerts Configuration and setup of monitors Advise client of alert condition. Warning condition by . Error by text and/or . Calligo to investigate alert and escalate to client and/or third party supplier using Client supplied process Advise client of alert condition. Warning condition by . Error by text, and/or phone. Manage incident to closure Remediation of incident is client, or their third party supplier, responsibility Remote probe hosting ALERTING The monitoring service provides automated alerts. These are configured to give warning messages as well as alarms when a service is not operating. For example, if the utilization of a disk volume is being monitored the service may give a warning alert at 80% utilization and an error alert at 90% utilization. The Good, Warning and Error values are pre-defined in the Standard service but can be customised within the Enhanced service. In the Standard service the Client receives automated alerts via text or . It is the Client s responsibility to respond to the alerts. In the Enhanced service Calligo will respond to the alert and follow a pre-agreed set of steps. For example, if a failure of a network connection is identified by the monitoring then Calligo s support team will investigate to identify the root cause. That could be a number of factors such as a circuit failure or a network device (e.g. a switch or router) malfunctioning. info@ 4
5 extended helpdesk SUMMARY Designed for Calligo clients that use CloudDesk. Provides a service that is typically delivered by an in-house IT Helpdesk. This includes the ability of every one of the Client s staff to contact the Helpdesk which will then handle all IT related queries. DESCRIPTION Calligo s Extended Helpdesk operates 24/7. Any client staff member can raise a ticket either by telephoning or on-line. The regular Helpdesk service is available to selected users and only handles incidents that are directly related to Calligo s services. But the Extended Helpdesk will support all IT issues and take calls from all users in the client organisation. The Helpdesk will investigate the ticket, which could be an incident or a service request. Where possible they will resolve the issue but if necessary they will raise a support call with a third party supplier such as a network operator or printer supplier. They will manage the ticket to closure including following any escalation procedures that have been agreed between the client and their supplier. The Extended Helpdesk service gives every CloudDesk user access to a high quality support service that is available around the clock to help with any IT issue. It is a requirement of the Extended Helpdesk that Calligo s Standard Monitoring service is also used. This means that the Helpdesk will have visibility of the Client s infrastructure and services which is essential to allow investigation of an incident. RESPONSIBILITY MATRIX Calligo/ Standard Helpdesk Calligo / Enhanced Helpdesk Client Named users only can call Helpdesk All users can call Helpdesk Helpdesk handles issues with Calligo services Helpdesk can handle all IT issues Helpdesk available 24/7 Helpdesk to investigate and manage 3rd party incidents Client to use Standard Monitoring service Client to maintain service contracts with 3rd parties and delegate invocation rights to Calligo info@ 5
6 server patching SUMMARY Provides regular updating of Windows and Linux servers. Ensures that the client s virtual server environment is protected and compliant. DESCRIPTION Even in the largest of organisations the patching of servers is often overlooked, or undertaken in an unstructured manner. Typically, this can be because of lack of internal IT resource, the challenge of patching services outside of operational hours and the demands of more urgent work. This Calligo service ensures that the supplier s monthly patches are installed in a timely fashion. As well as being best practice as it protects the IT environment from malicious attack it is, in many organisations, a compliance requirement. Calligo will apply regular updates on a monthly cycle and emergency patches as defined by the operating system supplier; Microsoft, Red Hat, etc. A typical update cycle will be to apply the patches to non-production servers first, e.g. test, development, etc. After successful client testing the patches are then applied in production. The timetable is always agreed in advance with the client and updates can be applied at times to suit operational requirements including weekends & evenings. Calligo Client Definition of patching requirements. Agree schedule including use of Group Policy Application of scheduled patches Testing of business applications and other services One off or emergency patches Installation & configuration of software tools to control patching (WSUS, etc.) Provision of server(s), etc for above info@ 6
7 network management SUMMARY This is an additive service to the monitoring and alerting service. In addition to monitoring the health of a network, circuits and devices, Calligo will manage the devices. This includes configuration management, change management and software/firmware patching. DESCRIPTION A reliable network underpins every modern IT system. This service ensures that the health of your network is maintained. When changes are required they are documented, planned and tested. Calligo will support Cisco & Arista devices. We can monitor other manufacturer s equipment but because of the specialist knowledge needed we only offer this fully managed service for these two leading suppliers. RESPONSIBILITY MATRIX Monitoring of network and devices (Calligo s Standard Monitoring Service) Investigate alerts and faults Invoke support from 3rd parties, e.g. Cisco support, telco engineering, etc. Support contracts with 3rd parties, e.g. Cisco, telco, etc. Delegated rights for Calligo to invoke 3rd party support. Configuration of changes Network change management managed through Calligo s change board Software/firmware patching for critical security updates Calligo Client info@ 7
8 combining these services The graphics below shows how the services can be combined. In most cases the services are independent but in a few cases one service is dependent on another or they are mutually exclusive. For example, Standard Monitoring is a subset of Enhanced Monitoring and the two services cannot be combined. Or, the Extended Helpdesk requires the Standard Monitoring service. The combination of these two services provide features similar to the Enhanced Monitoring service which means that the Extended Helpdesk and Enhanced Monitoring service cannot be combined. STANDARD MONITORING ENHANCED MONITORING Extended Helpdesk Server Patching Network Management Standard Monitoring Extended Helpdesk Server Patching Network Management EXTENDED HELPDESK SERVER PATCHING NETWORK MANAGEMENT Enhanced Monitoring Server Patching Network Management Standard Monitoring Enhanced Monitoring Extended Helpdesk Network Management Enhanced Monitoring Extended Helpdesk Server Patching * Standard Monitoring package required * Standard Monitoring package required info@ 8
SERVICE SCHEDULE MANAGED DATABASE
SERVICE SCHEDULE MANAGED DATABASE This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
More informationSUMMARY OF SERVICES PROVIDED
SUMMARY OF SERVICES PROVIDED Desktop Desktop Included Anti-Virus Software license for all PC s Anti-Spyware License for all PC s Automated managed distribution of monthly Windows updates Unlimited Remote
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationConRes IaaS Management Services for Microsoft Azure
ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...
More informationService Level Agreement Domain Registration Services
Domain Registration Services 15 th March 2016 Not just another IT company Why? Because we think, react and deliver differently. Advise, Build, Support & Protect. It s what we do best, simple as that. We
More informationSERVICE CATALOG. NOC and HELP DESK
THESE REQUIREMENTS HAVE BEEN INCORPORATED BY REFERENCE INTO, AND FORM A PART OF, THE PARTNER AGREEMENT BETWEEN VENDOR AND COMPANY (THE AGREEMENT ). Capitalized terms not otherwise defined herein have the
More informationUnified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System
2115 YM Unified Networks Administration & Monitoring System 1. مواصفات نظام ادارة ومراقبة الشبكات الموحد: BOQ of Unified Networks Administration and Monitoring System: N 1 2 3 4 Item Main Network Monitoring
More informationCHOOSING A RACKSPACE HOSTING PLATFORM
SERVICE OVERVIEW CHOOSING A RACKSPACE HOSTING PLATFORM AN OVERVIEW OF RACKSPACE SERVICE OFFERINGS April 19, 2018 TABLE OF CONTENTS Rackspace has amassed nearly two decades of hosting experience, and along
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationUptime and Proactive Support Services
Uptime and Proactive Support Services We ll accelerate your journey to sustainable IT optimisation and ensure that your technology is delivering all that it can. We ll keep your IT infrastructure up and
More informationA s c e r t i a S u p p o r t S e r v i c e s G u i d e
A s c e r t i a S u p p o r t S e r v i c e s G u i d e A S C E R T I A LTD J A N U A R Y 2 0 1 7 D O C U M E N T V E R S I O N - 5.1 Copyright Ascertia Ltd, 2017 Commercial-in-Confidence 1 Ascertia Support
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationNOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect
NOTHING IS WHAT IT SIEMs: COVER PAGE Simpler Way to Effective Threat Management TEMPLATE Dan Pitman Principal Security Architect Cybersecurity is harder than it should be 2 SIEM can be harder than it should
More informationSupport and Management for AWS
Support and Management for AWS Free your valuable resource to focus on delivering new projects, letting Proact manage your cloud environment 24x7 02 Optimal performance from your AWS infrastructure Support
More informationCLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS
CLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS SERVICE LEVEL AGREEMENT CLASSIC VPS 05 MARCH 2018 FINAL/V1.0 2 / 18 CLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS DOCUMENT TYPE SERVICE LEVEL AGREEMENT CLASSIC
More informationEMC Storage Resource Management Suite
EMC Storage Resource Management Suite Optimizing storage today and in the software defined datacenter of tomorrow EMC Advanced Software Division Alex Reiniger EMC² Advance Software Division Senior Systems
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More information@sec the information security provider
Security Monitor Automated Security Management - Possibilities and Limitations Chris Wahl; atsec information security GmbH 1 for Gesellschaft für Informatik e.v., Fachgruppe SECMGT Workshop: Managed Security
More informationSCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017
SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More information1 SAP HANA Remote Monitoring
Page 1 of 5 Service Description: Cisco Managed for Data Center: SAP HANA Technology Addendum to Cisco Managed for Enterprise Common Service Description This document referred to as a Technology Addendum
More informationCrises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.
Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility
More informationEMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security
EMERGING THREATS & STRATEGIES FOR DEFENSE Paul Fletcher Cyber Security Evangelist @_PaulFletcher Threats by Customer Environment Cloud Environment On Premise Environment 1.96% 0.13% 0.02% application-attack
More informationCAPABILITY STATEMENT
CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our
More informationRHM Client Support Plan
RHM Client Support Plan Issue 1 February 2017 Quick Contact Reference: We want to make contacting RHM as easy as possible for our customers therefore you may get your message across via a-few different
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationService Level Agreement
Service Level Agreement General This document is a Service Level Agreement (SLA) setting out the levels of services to be provided to you by Luminet. This document must be read in conjunction with our
More informationThe trend to virtualisation
The trend to virtualisation Key concepts Desktop virtualisation describes the process of separating or abstracting a personal desktop environment (including its operating system, applications, user profile
More informationISO27001 Preparing your business with Snare
WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security
More informationService Description CloudCore
CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationOrchestrating and Automating Trend Micro TippingPoint and IBM QRadar
Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar Response Automation SOCAutomation is an information security automation and orchestration platform that transforms incident response.
More informationService Level Agreement
General This document is a (SLA) setting out the indicative levels of services to be provided to you by Luminet. This document must be read in conjunction with our standard Terms and Conditions of Service
More informationITIL Event Management in the Cloud
ITIL Event Management in the Cloud An AWS Cloud Adoption Framework Addendum January 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
More informationReliable, fast data connectivity
Data Reliable, fast data connectivity Discover business-grade, high speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity services connects your
More informationMonitoring Applications and Services with Network Monitoring
Monitoring Applications and Services with Network Monitoring White Paper Author: Daniel Zobel, Head of Software Development Paessler AG Last Update: June 2015 PAGE 1 OF 8 Contents Introduction: Avoiding
More informationClient Health Key Features Datasheet. Client Health Key Features Datasheet
Client Health Key Features Datasheet Client Health Key Features Datasheet Introducing the fastest way to manage endpoint health and security at scale Are you spending countless hours trying to find and
More informationNETWORK AND SD-VPN. Meshing legacy and Cloud Service Providers
NETWORK AND SD-VPN NETWORK AND SD-VPN Reduced network overheads and complexity, and an agile approach to Network Transformation. Cloud Gateway lets you reduce appliance sprawl and network aggregation points
More informationSOLARWINDS PARTNER SALES CARDS
SOLARWINDS PARTNER SALES CARDS WHY SHOULD CUSTOMERS CHOOSE SOLARWINDS? ADAPTS WITH YOU Modular Licensing Start where it matters, grow over time Tiered Licensing Start small. Expand over time. QUALITIES
More informationPrivate Cloud Management Manage and Operate Applications
Private Cloud Management Manage and Operate Applications Introduction Manage and Operate Applications PRODUCTIVE INFRASTRUCTURE PREDICTABLE APPLICATIONS YOUR CLOUD Heterogeneous support Process automation
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationWAN/MPLS SLA Fault Reporting
WAN/MPLS SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option 5 Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name
More informationEvaluation of technologies that will improve the UEL IT infrastructure, recommending and advising on strategic improvements
JOB DESCRIPTION Job Title: Grade: School/Service: Campus: Responsible to: Responsible for whom: Liaison with: Infrastructure Solutions Architect H IT Services Docklands Head of Infrastructure All Schools
More informationIntrusion prevention systems are an important part of protecting any organisation from constantly developing threats.
Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis
More informationLinchPin. Managed Service For IP VPN Networks. Web Site Telephone
LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks
More informationICS Security Monitoring
ICS Security Monitoring INFRASTRUCTURE MINING & METALS NUCLEAR, SECURITY & ENVIRONMENTAL OIL, GAS & CHEMICALS Moses Schwartz Security Engineer Computer Incident Response Team Bechtel Corporation State
More informationRegistration Data Incident Management Policy
Registration Data Incident Management Policy Author: DCC Operational Policy Draft Version 1 Date: 1 st May 2014 Page 1 of 23 Contents 1 Document History 4 1.1 Document Location 4 1.2 Review Dates 4 1.3
More informationAppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide
AppDefense Appendix Cb Defense Integration Configuration Guide Table of Contents Overview 3 Requirements 3 Provision API Key for Cb Defense Integration 3 Figure 1 Integration Type 4 Figure 2 API Key Provisioning
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationRemote Operation Services
CHAPTER 7 Cisco Management Appliance Urban Security solutions require a mission-critical -centric network to be in place and functioning properly at all times. The network is made up of multiple pieces
More informationCyber Security in the time of Austerity. Shannon Simpson, CCO CNS Group
Cyber Security in the time of Austerity Shannon Simpson, CCO CNS Group The Austerity Agenda 1. Budgets are being cut. 2. Budgets are harder to compete for. 3. Cyber Security ROI is often hard to demonstrate
More informationService Level Agreement (SLA)
Service Level Agreement (SLA) of PlusServer GmbH, Hohenzollernring 72, 50672 Cologne, Germany hereinafter referred to as the Provider. Version: 04.09.2015 V1.1 PlusServer GmbH Contacts Registered office
More informationITIL overview Service Delivery. Jaroslav Procházka
ITIL overview Service Delivery Jaroslav Procházka Content Service Delivery processes Service Level Management IT Financial Management Capacity Management Availability Management IT Service Continuity Management
More informationNovember 1, 2018, RP Provision of Managed Security Services on an Annual Contract ADDENDUM #2
November 1, 2018, RP029-18 Provision of Managed Security Services on an Annual Contract ADDENDUM #2 Please see the below summation of the technical questions and answers that have been received regarding
More informationGlobal Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009
Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access
More informationCONTENTS OF THIS REPORT
CONTENTS OF THIS REPORT Site Overview Executive Summary Network Health Overview Network Assessment Manage Devices by Operating System Remote Control Usage Select report by clicking on the title, the report
More informationBT Managed DDoS Security UK Annex to the Internet Connect UK Schedule
BT Managed DDoS Security UK Annex to the Internet Connect UK Schedule Contents A note on you... 2 Application of this Annex... 2 Part A The Service... 2 1 Service Summary... 2 2 Service Standard Components...
More informationIBM services and technology solutions for supporting GDPR program
IBM services and technology solutions for supporting GDPR program 1 IBM technology solutions as key enablers - Privacy GDPR Program Work-stream IBM software 2.1 Privacy Risk Assessment and Risk Treatment
More informationSenior Manager Information Technology (India) Duration of job
Role Profile Job Title Senior Manager Information Technology (India) Directorate or Region South Asia Department/Country Business Support Services, India Location of post Gurgaon Pay Band 6 / Grade G Assistant
More informationSERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open
SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material
More informationIMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP
Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release 3. Software Distribution
More informationSD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview.
SD-WAN Managed Services Expereo SD-WAN Managed Services Overview www.expereo.com/sd-wan Contents 1 SD-WAN MANAGED SERVICES DESCRIPTION... 3 1.1 Consult & Design... 4 1.2 Procurement & Logistics... 4 1.3
More informationCenterity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15
Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15 2 Contents About This Guide... 4 End-User License Agreement (EULA)... 4 Before You Begin... 4 Audience... 4 Related Documentation... 4 Technical
More informationSECURE CROSS DOMAIN GUARD
SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this
More informationITSM SERVICES. Delivering Technology Solutions With Passion
ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past
More informationAll Events. One Platform.
All Events. One Platform. Industry s first IT ops platform that truly correlates the metric, flow and log events and turns them into actionable insights. Correlate Integrate Analyze www.motadata.com Motadata
More informationCopyright 2014, Oracle and/or its affiliates. All rights reserved.
1 Enterprise Manager 12c Compliance Management Part 1 Overview 2 3 Agenda Compliance Overview Understanding Compliance Results Understanding Compliance Score Calculation Compliance Related Roles and Privileges
More informationNational Cyber Security Operations Center (N-CSOC) Stakeholders' Conference
National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks
More informationTransforming the Cisco WAN with Network Intelligence
Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using
More informationProactive Performance Monitoring for Citrix XenApp & XenDesktop
Proactive Performance Monitoring for Citrix XenApp & XenDesktop TECHNOLOGY OVERVIEW In approximately one week, support tickets dropped by 25% Our customers were complaining about persistent slowness with
More informationQUICKLINE PREMIUM CLASS SERVICE LEVEL AGREEMENT Includes the non-financially backed Premium Class and Premium Plus SLA
QUICKLINE PREMIUM CLASS SERVICE LEVEL AGREEMENT Includes the non-financially backed Premium Class and Premium Plus SLA Rev SLAQPC06052016SJ Please Note: This may not be the newest version of this document;
More informationTrend Micro Global Technical Support Guide for Business Customers
Trend Micro Global Technical Support Guide for Business Customers * Includes global regions except Japan, Greater China, Taiwan, Hong Kong and Korea Page 1 Contents Scope... 3 Common Trend Micro Support
More informationNetwork Service Assurance
Service Assurance Embedded 'Always-On' Ethernet Devices for Circuit 'Turn-Up' Testing & In-Service Assurance for Layer- 2 and Layer-3 infrastructures Ethernet (L-2) - Typical Scenario HQ & Operations Centre
More informationBUILDING AND MAINTAINING SOC
BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:
More informationHPE Proactive 24 Service
Data sheet HPE Proactive 24 Service Support Services HPE Proactive 24 Service is an integrated hardware and software support solution that combines technical assistance with proactive account services
More informationVMware vrealize Operations. Management Pack for. PostgreSQL
VMware for PostgreSQL How Blue Medora Complements vrealize VMware provides best-ofbreed management for Virtualization / Cloud vsphere via vrealize Operations How Blue Medora Complements vrealize Applications
More informationData Services. Reliable, high-speed data connectivity. Group Ltd
Data Services Reliable, high-speed data connectivity Group Ltd Discover businessgrade, high-speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity
More informationCisco Secure Ops Solution
Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,
More informationAutomated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend
SAI3314BES Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend Micro #VMworld #SAI3314BES Automated Security
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationConfiguration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity?
ITIL Foundation mock exam 3 1. Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? A) The Asset Register B) The Service Knowledge
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationDigital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS
Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS Digital Forensics Readiness: PREPARE BEFORE AN INCIDENT HAPPENS 2 Digital Forensics Readiness The idea that all networks can be compromised
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationEthernet DIA SLA Fault Reporting
Ethernet DIA SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name
More informationPretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance
PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively
More informationQUICK INSTALLATION GUIDE Minder 4.2
QUICK INSTALLATION GUIDE Minder 4.2 1 Minder 4.2 Contents 1. Introducing MindArray Minder... 4 1.1 Gain Visibility into Server, Application, Virtualization and Network Infrastructure... 4 1.2. Why Minder?...
More informationMonitoring and Operating a Private Cloud with System Center 2012
Monitoring and Operating a Private Cloud with System Center 2012 Course 10750 - Five days - Instructor-led - Hands-on Introduction This course describes how to monitor and operate a private cloud with
More informationService Description Safecom Customer Connection Version 3.5
Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationService Description Server Patching
Server Patching TITLE: DESCRIPTION: Service Description Server Patching DOCUMENT REF NO: Service description for the Server Patching service. QMS REC132 OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE:
More informationManaged Security Services - Automated Analysis, Threat Analyst Monitoring and Notification
Service Description Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification The services described herein are governed by the terms and conditions of the agreement specified
More informationServices Consulting Our cloud consulting services will help you identify which of your applications needs to be moved to cloud and the best fit technology for it. We also help choose the right platform
More informationMaster Services Agreement:
This Service Schedule for Hosted Virtual Server Services v8.0.0 (the Service ) replaces all previously signed / incorporated version(s) of the Service Schedule for Hosted Hyper-V Services and/or Hosted
More informationOperations in the GNA-Compliant Network
GNA Global Network Architecture Web: http://gna-re.net/ Document name: Author(s): Contributor(s): Date: January 2017 Version: v1.0 Operations in the GNA-Compliant Network Infrastructure Alexander van den
More informationSchedule Document. Managed Firewall Services. Public. Node4 Limited 10/12/2010
Schedule Document Managed Firewall Services Public Node Limited 0//00 Node Limited Millennium Way Pride Park Derby DE 8HZ Tel: 08 3 fax: 08 3 info@node.co.uk www.node.co.uk SCHEDULE Additional terms, Service
More informationMaximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope
Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer Lancope Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NetFlow in Action h Network Operations
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known
More information