Managed Services OVERVIEW

Size: px
Start display at page:

Download "Managed Services OVERVIEW"

Transcription

1 Managed Services OVERVIEW

2 overview 24/7 Support Services Tailored for large and small businesses MANAGED SERVICES 3 MONITORING AND ALERTING SERVICE 4 SUMMARY 4 DESCRIPTION 4 MONITORING 4 ALERTING 4 RESPONSIBILITY MATRIX 4 EXTENDED HELPDESK 5 SUMMARY 5 DESCRIPTION 5 RESPONSIBILITY MATRIX 5 SERVER PATCHING 6 SUMMARY 6 DESCRIPTION 6 NETWORK MANAGEMENT 7 SUMMARY 7 DESCRIPTION 7 RESPONSIBILITY MATRIX 7 COMBINING THESE SERVICES 8 Proactive response prevents service issues Ensure compliance with server patching Reduce internal effort on mundance tasks Improve user productivity QMS DOC REF: QMS REC 76, VERSION NUMBER: 1.0, PUBLISH DATE: 09/02/2016. info@ 2

3 managed services This document provides details of the managed services that Calligo provide. These have been designed to complement our existing Helpdesk service. They are as suitable for small organisations that have no internal IT staff as they are for large organisations. This document describes the following services: Monitoring. 24/7 monitoring of devices, networks and services. Includes options for alerting, escalation and management of incidents. Extended Helpdesk. Extends the existing Helpdesk service so that it becomes the one-stop service for all your staff and all products and services even if they are not provided by Calligo. Server patching. Monthly patching of all your Windows & Linux servers. Ensures that your whole infrastructure is protected from vulnerabilities. Network management. Configuration management and software patching for your network devices. These services are additional to the following services that are provided within other Calligo offerings: Web proxy support. Using Trend Micro s web security product we defend your organisation by restricting your staff s access to malicious sites. You can restrict and/or log access to non-business sites. Anti-malware. An optional service to apply Trend Micro s Deep Security to your hosted servers. Includes monitoring, updating, quarantining and release. Please refer to our website for further information on these services. info@

4 monitoring and alerting service SUMMARY Using our 24/7 network operations centre we can monitor the availability and performance of your network, servers and other devices. There are two variants of the service. Within the Standard service we monitor and inform you when we see an alert condition. With the Enhanced service we investigate the alert, will raise a ticket on the appropriate supplier and manage the incident to closure. DESCRIPTION Calligo s cloud services are extensively monitored as standard. We monitor the physical infrastructure, the virtual environment that deliver our cloud services and all of the hosted services that we provide such as CloudDesk and CloudMail. These optional services build on Calligo s standard monitoring service and extend these to cover the client s operating environment. Examples of devices that can be monitored are virtual servers including websites and underlying services, network devices (physical or virtual) and communication circuits. MONITORING Calligo s service is a fully managed offering that extends monitoring into the client s domain. It uses world class, third party, tools such as PRTG & Xangati that can be customised to provide a bespoke service that precisely meets the demands of the organisation. Multiple sensor types are available that can monitor the most extensive range of services: Over 200 sensor types for all common network services including: HTTP, Ping, Port and SNMP Bandwidth monitoring; Cisco, IPFIX, jflow, Netflow, Packet sniffer and more Web services; Apache, download time, IIS performance, transaction monitoring and more Windows WMI; including IIS, AD, Exchange, SharePoint, SQL Server and more Linux, Unix and OS X Virtual servers (outside of Calligo s cloud); AWS, Citrix, Hyper-V, VMware and more Mail services including Exchange services Database services; MS SQL, MySQL, Oracle and more. Having identified the root cause Calligo will raise a ticket with the appropriate third party supplier in this case that could be a Telco or Cisco. Calligo will manage the ticket to resolution providing the Client with updates throughout. In order to use the Enhanced service the Client must maintain up to date maintenance and support services with their third party suppliers and Calligo must have a catalogue of those and delegated authority to raise and manage tickets on behalf of the Client. During the setup of this service a service catalogue is created with details of all of the Client s suppliers, contact details, maintenance contracts and SLA targets. RESPONSIBILITY MATRIX Calligo/ Standard Calligo/ Enhanced Client Definition of services to be monitored Standard threshold alerting Define and customise thresholds and alerts Configuration and setup of monitors Advise client of alert condition. Warning condition by . Error by text and/or . Calligo to investigate alert and escalate to client and/or third party supplier using Client supplied process Advise client of alert condition. Warning condition by . Error by text, and/or phone. Manage incident to closure Remediation of incident is client, or their third party supplier, responsibility Remote probe hosting ALERTING The monitoring service provides automated alerts. These are configured to give warning messages as well as alarms when a service is not operating. For example, if the utilization of a disk volume is being monitored the service may give a warning alert at 80% utilization and an error alert at 90% utilization. The Good, Warning and Error values are pre-defined in the Standard service but can be customised within the Enhanced service. In the Standard service the Client receives automated alerts via text or . It is the Client s responsibility to respond to the alerts. In the Enhanced service Calligo will respond to the alert and follow a pre-agreed set of steps. For example, if a failure of a network connection is identified by the monitoring then Calligo s support team will investigate to identify the root cause. That could be a number of factors such as a circuit failure or a network device (e.g. a switch or router) malfunctioning. info@ 4

5 extended helpdesk SUMMARY Designed for Calligo clients that use CloudDesk. Provides a service that is typically delivered by an in-house IT Helpdesk. This includes the ability of every one of the Client s staff to contact the Helpdesk which will then handle all IT related queries. DESCRIPTION Calligo s Extended Helpdesk operates 24/7. Any client staff member can raise a ticket either by telephoning or on-line. The regular Helpdesk service is available to selected users and only handles incidents that are directly related to Calligo s services. But the Extended Helpdesk will support all IT issues and take calls from all users in the client organisation. The Helpdesk will investigate the ticket, which could be an incident or a service request. Where possible they will resolve the issue but if necessary they will raise a support call with a third party supplier such as a network operator or printer supplier. They will manage the ticket to closure including following any escalation procedures that have been agreed between the client and their supplier. The Extended Helpdesk service gives every CloudDesk user access to a high quality support service that is available around the clock to help with any IT issue. It is a requirement of the Extended Helpdesk that Calligo s Standard Monitoring service is also used. This means that the Helpdesk will have visibility of the Client s infrastructure and services which is essential to allow investigation of an incident. RESPONSIBILITY MATRIX Calligo/ Standard Helpdesk Calligo / Enhanced Helpdesk Client Named users only can call Helpdesk All users can call Helpdesk Helpdesk handles issues with Calligo services Helpdesk can handle all IT issues Helpdesk available 24/7 Helpdesk to investigate and manage 3rd party incidents Client to use Standard Monitoring service Client to maintain service contracts with 3rd parties and delegate invocation rights to Calligo info@ 5

6 server patching SUMMARY Provides regular updating of Windows and Linux servers. Ensures that the client s virtual server environment is protected and compliant. DESCRIPTION Even in the largest of organisations the patching of servers is often overlooked, or undertaken in an unstructured manner. Typically, this can be because of lack of internal IT resource, the challenge of patching services outside of operational hours and the demands of more urgent work. This Calligo service ensures that the supplier s monthly patches are installed in a timely fashion. As well as being best practice as it protects the IT environment from malicious attack it is, in many organisations, a compliance requirement. Calligo will apply regular updates on a monthly cycle and emergency patches as defined by the operating system supplier; Microsoft, Red Hat, etc. A typical update cycle will be to apply the patches to non-production servers first, e.g. test, development, etc. After successful client testing the patches are then applied in production. The timetable is always agreed in advance with the client and updates can be applied at times to suit operational requirements including weekends & evenings. Calligo Client Definition of patching requirements. Agree schedule including use of Group Policy Application of scheduled patches Testing of business applications and other services One off or emergency patches Installation & configuration of software tools to control patching (WSUS, etc.) Provision of server(s), etc for above info@ 6

7 network management SUMMARY This is an additive service to the monitoring and alerting service. In addition to monitoring the health of a network, circuits and devices, Calligo will manage the devices. This includes configuration management, change management and software/firmware patching. DESCRIPTION A reliable network underpins every modern IT system. This service ensures that the health of your network is maintained. When changes are required they are documented, planned and tested. Calligo will support Cisco & Arista devices. We can monitor other manufacturer s equipment but because of the specialist knowledge needed we only offer this fully managed service for these two leading suppliers. RESPONSIBILITY MATRIX Monitoring of network and devices (Calligo s Standard Monitoring Service) Investigate alerts and faults Invoke support from 3rd parties, e.g. Cisco support, telco engineering, etc. Support contracts with 3rd parties, e.g. Cisco, telco, etc. Delegated rights for Calligo to invoke 3rd party support. Configuration of changes Network change management managed through Calligo s change board Software/firmware patching for critical security updates Calligo Client info@ 7

8 combining these services The graphics below shows how the services can be combined. In most cases the services are independent but in a few cases one service is dependent on another or they are mutually exclusive. For example, Standard Monitoring is a subset of Enhanced Monitoring and the two services cannot be combined. Or, the Extended Helpdesk requires the Standard Monitoring service. The combination of these two services provide features similar to the Enhanced Monitoring service which means that the Extended Helpdesk and Enhanced Monitoring service cannot be combined. STANDARD MONITORING ENHANCED MONITORING Extended Helpdesk Server Patching Network Management Standard Monitoring Extended Helpdesk Server Patching Network Management EXTENDED HELPDESK SERVER PATCHING NETWORK MANAGEMENT Enhanced Monitoring Server Patching Network Management Standard Monitoring Enhanced Monitoring Extended Helpdesk Network Management Enhanced Monitoring Extended Helpdesk Server Patching * Standard Monitoring package required * Standard Monitoring package required info@ 8

SERVICE SCHEDULE MANAGED DATABASE

SERVICE SCHEDULE MANAGED DATABASE SERVICE SCHEDULE MANAGED DATABASE This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

SUMMARY OF SERVICES PROVIDED

SUMMARY OF SERVICES PROVIDED SUMMARY OF SERVICES PROVIDED Desktop Desktop Included Anti-Virus Software license for all PC s Anti-Spyware License for all PC s Automated managed distribution of monthly Windows updates Unlimited Remote

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

ConRes IaaS Management Services for Microsoft Azure

ConRes IaaS Management Services for Microsoft Azure ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...

More information

Service Level Agreement Domain Registration Services

Service Level Agreement Domain Registration Services Domain Registration Services 15 th March 2016 Not just another IT company Why? Because we think, react and deliver differently. Advise, Build, Support & Protect. It s what we do best, simple as that. We

More information

SERVICE CATALOG. NOC and HELP DESK

SERVICE CATALOG. NOC and HELP DESK THESE REQUIREMENTS HAVE BEEN INCORPORATED BY REFERENCE INTO, AND FORM A PART OF, THE PARTNER AGREEMENT BETWEEN VENDOR AND COMPANY (THE AGREEMENT ). Capitalized terms not otherwise defined herein have the

More information

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System 2115 YM Unified Networks Administration & Monitoring System 1. مواصفات نظام ادارة ومراقبة الشبكات الموحد: BOQ of Unified Networks Administration and Monitoring System: N 1 2 3 4 Item Main Network Monitoring

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM SERVICE OVERVIEW CHOOSING A RACKSPACE HOSTING PLATFORM AN OVERVIEW OF RACKSPACE SERVICE OFFERINGS April 19, 2018 TABLE OF CONTENTS Rackspace has amassed nearly two decades of hosting experience, and along

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

Uptime and Proactive Support Services

Uptime and Proactive Support Services Uptime and Proactive Support Services We ll accelerate your journey to sustainable IT optimisation and ensure that your technology is delivering all that it can. We ll keep your IT infrastructure up and

More information

A s c e r t i a S u p p o r t S e r v i c e s G u i d e

A s c e r t i a S u p p o r t S e r v i c e s G u i d e A s c e r t i a S u p p o r t S e r v i c e s G u i d e A S C E R T I A LTD J A N U A R Y 2 0 1 7 D O C U M E N T V E R S I O N - 5.1 Copyright Ascertia Ltd, 2017 Commercial-in-Confidence 1 Ascertia Support

More information

MyCloud Computing Business computing in the cloud, ready to go in minutes

MyCloud Computing Business computing in the cloud, ready to go in minutes MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing

More information

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect NOTHING IS WHAT IT SIEMs: COVER PAGE Simpler Way to Effective Threat Management TEMPLATE Dan Pitman Principal Security Architect Cybersecurity is harder than it should be 2 SIEM can be harder than it should

More information

Support and Management for AWS

Support and Management for AWS Support and Management for AWS Free your valuable resource to focus on delivering new projects, letting Proact manage your cloud environment 24x7 02 Optimal performance from your AWS infrastructure Support

More information

CLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS

CLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS CLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS SERVICE LEVEL AGREEMENT CLASSIC VPS 05 MARCH 2018 FINAL/V1.0 2 / 18 CLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS DOCUMENT TYPE SERVICE LEVEL AGREEMENT CLASSIC

More information

EMC Storage Resource Management Suite

EMC Storage Resource Management Suite EMC Storage Resource Management Suite Optimizing storage today and in the software defined datacenter of tomorrow EMC Advanced Software Division Alex Reiniger EMC² Advance Software Division Senior Systems

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

@sec the information security provider

@sec the information security provider Security Monitor Automated Security Management - Possibilities and Limitations Chris Wahl; atsec information security GmbH 1 for Gesellschaft für Informatik e.v., Fachgruppe SECMGT Workshop: Managed Security

More information

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

1 SAP HANA Remote Monitoring

1 SAP HANA Remote Monitoring Page 1 of 5 Service Description: Cisco Managed for Data Center: SAP HANA Technology Addendum to Cisco Managed for Enterprise Common Service Description This document referred to as a Technology Addendum

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security EMERGING THREATS & STRATEGIES FOR DEFENSE Paul Fletcher Cyber Security Evangelist @_PaulFletcher Threats by Customer Environment Cloud Environment On Premise Environment 1.96% 0.13% 0.02% application-attack

More information

CAPABILITY STATEMENT

CAPABILITY STATEMENT CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our

More information

RHM Client Support Plan

RHM Client Support Plan RHM Client Support Plan Issue 1 February 2017 Quick Contact Reference: We want to make contacting RHM as easy as possible for our customers therefore you may get your message across via a-few different

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

Service Level Agreement

Service Level Agreement Service Level Agreement General This document is a Service Level Agreement (SLA) setting out the levels of services to be provided to you by Luminet. This document must be read in conjunction with our

More information

The trend to virtualisation

The trend to virtualisation The trend to virtualisation Key concepts Desktop virtualisation describes the process of separating or abstracting a personal desktop environment (including its operating system, applications, user profile

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Service Description CloudCore

Service Description CloudCore CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar Response Automation SOCAutomation is an information security automation and orchestration platform that transforms incident response.

More information

Service Level Agreement

Service Level Agreement General This document is a (SLA) setting out the indicative levels of services to be provided to you by Luminet. This document must be read in conjunction with our standard Terms and Conditions of Service

More information

ITIL Event Management in the Cloud

ITIL Event Management in the Cloud ITIL Event Management in the Cloud An AWS Cloud Adoption Framework Addendum January 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational

More information

Reliable, fast data connectivity

Reliable, fast data connectivity Data Reliable, fast data connectivity Discover business-grade, high speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity services connects your

More information

Monitoring Applications and Services with Network Monitoring

Monitoring Applications and Services with Network Monitoring Monitoring Applications and Services with Network Monitoring White Paper Author: Daniel Zobel, Head of Software Development Paessler AG Last Update: June 2015 PAGE 1 OF 8 Contents Introduction: Avoiding

More information

Client Health Key Features Datasheet. Client Health Key Features Datasheet

Client Health Key Features Datasheet. Client Health Key Features Datasheet Client Health Key Features Datasheet Client Health Key Features Datasheet Introducing the fastest way to manage endpoint health and security at scale Are you spending countless hours trying to find and

More information

NETWORK AND SD-VPN. Meshing legacy and Cloud Service Providers

NETWORK AND SD-VPN. Meshing legacy and Cloud Service Providers NETWORK AND SD-VPN NETWORK AND SD-VPN Reduced network overheads and complexity, and an agile approach to Network Transformation. Cloud Gateway lets you reduce appliance sprawl and network aggregation points

More information

SOLARWINDS PARTNER SALES CARDS

SOLARWINDS PARTNER SALES CARDS SOLARWINDS PARTNER SALES CARDS WHY SHOULD CUSTOMERS CHOOSE SOLARWINDS? ADAPTS WITH YOU Modular Licensing Start where it matters, grow over time Tiered Licensing Start small. Expand over time. QUALITIES

More information

Private Cloud Management Manage and Operate Applications

Private Cloud Management Manage and Operate Applications Private Cloud Management Manage and Operate Applications Introduction Manage and Operate Applications PRODUCTIVE INFRASTRUCTURE PREDICTABLE APPLICATIONS YOUR CLOUD Heterogeneous support Process automation

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

WAN/MPLS SLA Fault Reporting

WAN/MPLS SLA Fault Reporting WAN/MPLS SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option 5 Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name

More information

Evaluation of technologies that will improve the UEL IT infrastructure, recommending and advising on strategic improvements

Evaluation of technologies that will improve the UEL IT infrastructure, recommending and advising on strategic improvements JOB DESCRIPTION Job Title: Grade: School/Service: Campus: Responsible to: Responsible for whom: Liaison with: Infrastructure Solutions Architect H IT Services Docklands Head of Infrastructure All Schools

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

LinchPin. Managed Service For IP VPN Networks. Web Site Telephone

LinchPin. Managed Service For IP VPN Networks. Web Site   Telephone LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks

More information

ICS Security Monitoring

ICS Security Monitoring ICS Security Monitoring INFRASTRUCTURE MINING & METALS NUCLEAR, SECURITY & ENVIRONMENTAL OIL, GAS & CHEMICALS Moses Schwartz Security Engineer Computer Incident Response Team Bechtel Corporation State

More information

Registration Data Incident Management Policy

Registration Data Incident Management Policy Registration Data Incident Management Policy Author: DCC Operational Policy Draft Version 1 Date: 1 st May 2014 Page 1 of 23 Contents 1 Document History 4 1.1 Document Location 4 1.2 Review Dates 4 1.3

More information

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide AppDefense Appendix Cb Defense Integration Configuration Guide Table of Contents Overview 3 Requirements 3 Provision API Key for Cb Defense Integration 3 Figure 1 Integration Type 4 Figure 2 API Key Provisioning

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

Remote Operation Services

Remote Operation Services CHAPTER 7 Cisco Management Appliance Urban Security solutions require a mission-critical -centric network to be in place and functioning properly at all times. The network is made up of multiple pieces

More information

Cyber Security in the time of Austerity. Shannon Simpson, CCO CNS Group

Cyber Security in the time of Austerity. Shannon Simpson, CCO CNS Group Cyber Security in the time of Austerity Shannon Simpson, CCO CNS Group The Austerity Agenda 1. Budgets are being cut. 2. Budgets are harder to compete for. 3. Cyber Security ROI is often hard to demonstrate

More information

Service Level Agreement (SLA)

Service Level Agreement (SLA) Service Level Agreement (SLA) of PlusServer GmbH, Hohenzollernring 72, 50672 Cologne, Germany hereinafter referred to as the Provider. Version: 04.09.2015 V1.1 PlusServer GmbH Contacts Registered office

More information

ITIL overview Service Delivery. Jaroslav Procházka

ITIL overview Service Delivery. Jaroslav Procházka ITIL overview Service Delivery Jaroslav Procházka Content Service Delivery processes Service Level Management IT Financial Management Capacity Management Availability Management IT Service Continuity Management

More information

November 1, 2018, RP Provision of Managed Security Services on an Annual Contract ADDENDUM #2

November 1, 2018, RP Provision of Managed Security Services on an Annual Contract ADDENDUM #2 November 1, 2018, RP029-18 Provision of Managed Security Services on an Annual Contract ADDENDUM #2 Please see the below summation of the technical questions and answers that have been received regarding

More information

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access

More information

CONTENTS OF THIS REPORT

CONTENTS OF THIS REPORT CONTENTS OF THIS REPORT Site Overview Executive Summary Network Health Overview Network Assessment Manage Devices by Operating System Remote Control Usage Select report by clicking on the title, the report

More information

BT Managed DDoS Security UK Annex to the Internet Connect UK Schedule

BT Managed DDoS Security UK Annex to the Internet Connect UK Schedule BT Managed DDoS Security UK Annex to the Internet Connect UK Schedule Contents A note on you... 2 Application of this Annex... 2 Part A The Service... 2 1 Service Summary... 2 2 Service Standard Components...

More information

IBM services and technology solutions for supporting GDPR program

IBM services and technology solutions for supporting GDPR program IBM services and technology solutions for supporting GDPR program 1 IBM technology solutions as key enablers - Privacy GDPR Program Work-stream IBM software 2.1 Privacy Risk Assessment and Risk Treatment

More information

Senior Manager Information Technology (India) Duration of job

Senior Manager Information Technology (India) Duration of job Role Profile Job Title Senior Manager Information Technology (India) Directorate or Region South Asia Department/Country Business Support Services, India Location of post Gurgaon Pay Band 6 / Grade G Assistant

More information

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material

More information

IMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP

IMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release 3. Software Distribution

More information

SD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview.

SD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview. SD-WAN Managed Services Expereo SD-WAN Managed Services Overview www.expereo.com/sd-wan Contents 1 SD-WAN MANAGED SERVICES DESCRIPTION... 3 1.1 Consult & Design... 4 1.2 Procurement & Logistics... 4 1.3

More information

Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15

Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15 Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15 2 Contents About This Guide... 4 End-User License Agreement (EULA)... 4 Before You Begin... 4 Audience... 4 Related Documentation... 4 Technical

More information

SECURE CROSS DOMAIN GUARD

SECURE CROSS DOMAIN GUARD SERVICE DEFINITION SECURE CROSS DOMAIN GUARD G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this

More information

ITSM SERVICES. Delivering Technology Solutions With Passion

ITSM SERVICES. Delivering Technology Solutions With Passion ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past

More information

All Events. One Platform.

All Events. One Platform. All Events. One Platform. Industry s first IT ops platform that truly correlates the metric, flow and log events and turns them into actionable insights. Correlate Integrate Analyze www.motadata.com Motadata

More information

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Copyright 2014, Oracle and/or its affiliates. All rights reserved. 1 Enterprise Manager 12c Compliance Management Part 1 Overview 2 3 Agenda Compliance Overview Understanding Compliance Results Understanding Compliance Score Calculation Compliance Related Roles and Privileges

More information

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks

More information

Transforming the Cisco WAN with Network Intelligence

Transforming the Cisco WAN with Network Intelligence Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using

More information

Proactive Performance Monitoring for Citrix XenApp & XenDesktop

Proactive Performance Monitoring for Citrix XenApp & XenDesktop Proactive Performance Monitoring for Citrix XenApp & XenDesktop TECHNOLOGY OVERVIEW In approximately one week, support tickets dropped by 25% Our customers were complaining about persistent slowness with

More information

QUICKLINE PREMIUM CLASS SERVICE LEVEL AGREEMENT Includes the non-financially backed Premium Class and Premium Plus SLA

QUICKLINE PREMIUM CLASS SERVICE LEVEL AGREEMENT Includes the non-financially backed Premium Class and Premium Plus SLA QUICKLINE PREMIUM CLASS SERVICE LEVEL AGREEMENT Includes the non-financially backed Premium Class and Premium Plus SLA Rev SLAQPC06052016SJ Please Note: This may not be the newest version of this document;

More information

Trend Micro Global Technical Support Guide for Business Customers

Trend Micro Global Technical Support Guide for Business Customers Trend Micro Global Technical Support Guide for Business Customers * Includes global regions except Japan, Greater China, Taiwan, Hong Kong and Korea Page 1 Contents Scope... 3 Common Trend Micro Support

More information

Network Service Assurance

Network Service Assurance Service Assurance Embedded 'Always-On' Ethernet Devices for Circuit 'Turn-Up' Testing & In-Service Assurance for Layer- 2 and Layer-3 infrastructures Ethernet (L-2) - Typical Scenario HQ & Operations Centre

More information

BUILDING AND MAINTAINING SOC

BUILDING AND MAINTAINING SOC BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:

More information

HPE Proactive 24 Service

HPE Proactive 24 Service Data sheet HPE Proactive 24 Service Support Services HPE Proactive 24 Service is an integrated hardware and software support solution that combines technical assistance with proactive account services

More information

VMware vrealize Operations. Management Pack for. PostgreSQL

VMware vrealize Operations. Management Pack for. PostgreSQL VMware for PostgreSQL How Blue Medora Complements vrealize VMware provides best-ofbreed management for Virtualization / Cloud vsphere via vrealize Operations How Blue Medora Complements vrealize Applications

More information

Data Services. Reliable, high-speed data connectivity. Group Ltd

Data Services. Reliable, high-speed data connectivity. Group Ltd Data Services Reliable, high-speed data connectivity Group Ltd Discover businessgrade, high-speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity

More information

Cisco Secure Ops Solution

Cisco Secure Ops Solution Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,

More information

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend SAI3314BES Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend Micro #VMworld #SAI3314BES Automated Security

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Service Description: Software Support

Service Description: Software Support Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software

More information

Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity?

Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? ITIL Foundation mock exam 3 1. Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? A) The Asset Register B) The Service Knowledge

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS Digital Forensics Readiness: PREPARE BEFORE AN INCIDENT HAPPENS 2 Digital Forensics Readiness The idea that all networks can be compromised

More information

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service

More information

Ethernet DIA SLA Fault Reporting

Ethernet DIA SLA Fault Reporting Ethernet DIA SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name

More information

PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance

PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively

More information

QUICK INSTALLATION GUIDE Minder 4.2

QUICK INSTALLATION GUIDE Minder 4.2 QUICK INSTALLATION GUIDE Minder 4.2 1 Minder 4.2 Contents 1. Introducing MindArray Minder... 4 1.1 Gain Visibility into Server, Application, Virtualization and Network Infrastructure... 4 1.2. Why Minder?...

More information

Monitoring and Operating a Private Cloud with System Center 2012

Monitoring and Operating a Private Cloud with System Center 2012 Monitoring and Operating a Private Cloud with System Center 2012 Course 10750 - Five days - Instructor-led - Hands-on Introduction This course describes how to monitor and operate a private cloud with

More information

Service Description Safecom Customer Connection Version 3.5

Service Description Safecom Customer Connection Version 3.5 Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

Service Description Server Patching

Service Description Server Patching Server Patching TITLE: DESCRIPTION: Service Description Server Patching DOCUMENT REF NO: Service description for the Server Patching service. QMS REC132 OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE:

More information

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification Service Description Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification The services described herein are governed by the terms and conditions of the agreement specified

More information

Services Consulting Our cloud consulting services will help you identify which of your applications needs to be moved to cloud and the best fit technology for it. We also help choose the right platform

More information

Master Services Agreement:

Master Services Agreement: This Service Schedule for Hosted Virtual Server Services v8.0.0 (the Service ) replaces all previously signed / incorporated version(s) of the Service Schedule for Hosted Hyper-V Services and/or Hosted

More information

Operations in the GNA-Compliant Network

Operations in the GNA-Compliant Network GNA Global Network Architecture Web: http://gna-re.net/ Document name: Author(s): Contributor(s): Date: January 2017 Version: v1.0 Operations in the GNA-Compliant Network Infrastructure Alexander van den

More information

Schedule Document. Managed Firewall Services. Public. Node4 Limited 10/12/2010

Schedule Document. Managed Firewall Services. Public. Node4 Limited 10/12/2010 Schedule Document Managed Firewall Services Public Node Limited 0//00 Node Limited Millennium Way Pride Park Derby DE 8HZ Tel: 08 3 fax: 08 3 info@node.co.uk www.node.co.uk SCHEDULE Additional terms, Service

More information

Maximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope

Maximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer Lancope Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NetFlow in Action h Network Operations

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information