My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
FULL PACKET_2017-12-19
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2017
>
12/19/2017
>
FULL PACKET_2017-12-19
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/18/2017 8:59:44 AM
Creation date
12/18/2017 7:25:02 AM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Clerk of the Council
Date
12/19/2017
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
1122
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
GGRAN I C U S RFP NO.: 17-107 Automated Agenda Workflow <br />Program and Meeting Video Streaming/Archiving <br />SECURITY OVERVIEW <br />Data Center Security <br />Having a robust and secure data center implementation is a necessity, not an option. <br />Granicus Data Centers are designed for reliability and redundancy. Our data centers <br />are guided by a "defense -in-depth" security strategy to ensure reliable access of <br />government data. With a 99.97. uptime, we are confident that customer data are <br />always available. <br />Data Center Requirements Granicus Server Locations <br />• Secure - SSAE-16 Accreditation • Primary Data Center in Ashburn, VA <br />• Reliable Network • Backup Data Center in San Francisco, CA <br />• Data Availability: 99.98% Uptime <br />• Redundant Backups <br />Architecture & Data Center Redundancy <br />The Granicus Primary Data Center is architected with redundant systems to ensure that <br />there is no single point of failure and disruptions have no impact on the availability of <br />Granicus applications. <br />Robust Security Layers <br />Granicus implements a series of protective layers so that no single solution is relied upon <br />to provide security, including: <br />• Hosting facilities that meet or exceed Tier III standards that are engineered to <br />ensure application and data availability and security <br />• Edge -to -edge security, visibility, and carrier -class threat management and <br />remediation. We utilize industry-leading tools to compare real-time network <br />traffic and flag any anomalies such as: Denial of Service (DoS) and Distributed <br />Denial of Service (DDoS) attacks, worms or botnets. <br />• Network issues: traffic and routing instability, equipment failures, or <br />misconfigurations <br />• Hardened, stateful inspection firewall technology <br />• An Intrusion Detection System (IDS) utilizing signature-, protocol-, and anomaly - <br />based inspection methods <br />• 24x7x365 firewall, VPN, and IDS support and maintenance <br />• Security policies and procedures that are constantly maintained, tested, and <br />updated <br />A Security Incident Response team/SSAE-16 accreditation ensures all customer data is <br />secure from any tampering. <br />granicus.com I info@granicus.com <br />25A-82 <br />page 49 <br />
The URL can be used to link to this page
Your browser does not support the video tag.