TITLE

Negotiating Managed Network Contracts

AUTHOR(S)
Boehling, Deb; Lo, Bonnie
PUB. DATE
November 2004
SOURCE
Business Communications Review;Nov2004, Vol. 34 Issue 11, p22
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article is intended to help users navigate the complexities of a managed network contract. Managed network contracts run the gamut in terms of what is within the "scope of services." At one end, they may include only the vendor's equipment and management of vendor-provided transport. At the other, they can include on-site staff to maintain and manage the customer's entire network, solicit and evaluate proposals for new services, engineer changes and optimize network usage and performance. Ideally, a managed network contract would scale up and down seamlessly as needs changed. Information security is also of great concern in managed network deals, especially where the vendor controls technical security measures. At the highest level, the vendor should abide by customer's information security guidelines, not its own. The vendor should also cooperate with and assist in vulnerability assessments and security audits and should share information about the effectiveness of its security policies.
ACCESSION #
15056718

 

Related Articles

  • Symantec O3: Focuses on the Cloud. Rashid, Fahmida Y. // eWeek;11/7/2011, Vol. 28 Issue 18, p29 

    cloud is a big part of Symantec's business model, as the company provides many of its core capabilities -- message filtering, data loss prevention, backup, recovery and encryption -- as cloud-based services. Since it acquired VeriSign's security business, Symantec has offered a hosted...

  • Computer Monitoring and Surveillance. Wakefield, Robin L. // CPA Journal;Jul2004, Vol. 74 Issue 7, p52 

    Discusses several factors to be considered in protecting and maintaining information security systems. Components of content security; Elements of prevention; Steps in investigating a potential security violation.

  • A security Swiss Army knife. Halota, Stacey // SC Magazine: For IT Security Professionals (15476693);Apr2010, Vol. 21 Issue 4, p18 

    The article explores how network behavior analysis (NBA) can serve as an important computer information security tool for companies. NBA uses passive monitoring sensors, network flow data, and other sources to track and monitor network traffic and to establish a baseline for normal network...

  • Feds making plans for security clearinghouse. Fisher, Dennis // eWeek;4/26/2004, Vol. 21 Issue 17, p9 

    The U.S. government is developing plans for a secure network operations center for all security information flowing to and from the government. The security operations center would be separate from other such facilities at federal agencies and would not necessarily be concerned with monitoring...

  • Network security testing course aims to set a benchmark. Gomm, Karen // Computer Weekly;4/5/2005, p31 

    The article presents information on a new security training course aimed at creating a benchmark in the computer software industry in Great Britain. The Open Source Security Testing Methodology Manual (OSSTMM) claims to be the first comprehensive standard for testing the security of Internet...

  • Based on the research of WSN in information security technology. Ke Zhao; LongFei Xiao; YaLong Hu; Zhong Wang // Applied Mechanics & Materials;2014, Issue 556-562, p5976 

    With the advance of technology, people is more and more nervous to security threats posed by wireless sensor. Therefore, Based on security technology, this paper puts forward a suitable for the safety management unit used in wireless sensor network, And the provisions of its agreement,...

  • ISA 2004 breaks new ground. Garcia, Andrew // eWeek;7/19/2004, Vol. 21 Issue 29, p48 

    Microsoft Corp.'s Internet Security and Acceleration Server (ISA) 2004's includes major improvements over its predecessor, significantly easing policy management processes, supporting multiple types of network configuration and offering improved integration with third-party VPN products for...

  • FIND YOUR PERFECT PARTNER. Millman, RenĂ© // SC Magazine: For IT Security Professionals (UK Edition);Nov2005, p40 

    This article looks at how to get the best from computer security outsourcing. Industry sectors that outsource other functions tend to be more open to farming out their security. Loren Rudd, information communications technology research analyst at Frost & Sullivan, notes that manufacturing...

  • ICI wants systems scanned ready for network deperimeterisation. Goodwin, Bill // Computer Weekly;5/4/2004, p6 

    ICI, has asked IT security companies to devise a system capable of scanning hundreds of thousands of devices on its worldwide networks for security vulnerabilities. The move comes as the chemicals company gears up to open its corporate systems to business partners and customers. The company aims...

Share

Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics