TERREMARK FEDERAL GROUP, INC 2 S BISCAYNE BLVD Suite 2900 MIAMI

Document Sample
TERREMARK FEDERAL GROUP, INC 2 S BISCAYNE BLVD Suite 2900 MIAMI Powered By Docstoc
					                                 TERREMARK FEDERAL GROUP, INC
                                     2 S. BISCAYNE BLVD. Suite 2900
                                            MIAMI, FL 33131


Locations:
460 Springpark Place, Suite 1000, Herndon, VA
50 NE 9th Street, Miami, FL
One Biscayne Tower, 2 S. Biscayne Blvd. Suite 2900, Miami, FL
3030 Corvin Drive, Santa Clara, CA
18155 Technology Drive, Culpeper, VA
1223 Alma Road, Richardson, TX




                                                   1
                                                                                  Table of Contents

1     Introduction to Terremark Federal Group ................................................................................................................................3
    1.1      Managed IT infrastructure services:........................................................................................................................................... 3
    1.2      Qualified Service Personnel ........................................................................................................................................................ 3
2     Capabilities Overview ................................................................................................................................................................ 4
    2.1      Private Integrated Networks ...................................................................................................................................................... 4
    2.2      Secure Network/Satellite Operations Centers ............................................................................................................................ 5
3     Managed Router Services .......................................................................................................................................................... 6
4     Program Management ............................................................................................................................................................... 6
    4.1      TFG Program Management Process .......................................................................................................................................... 7
    4.2      TFG’s Program Management Methodology .............................................................................................................................. 7
5     Sensitive Compartmented Information Facility (SCIF) Standards ...............................................................................................8
6     Specialized Projects ................................................................................................................................................................... 9
7     Data Center Floor Colocation ..................................................................................................................................................... 9
8     Professional Services ............................................................................................................................................................... 10
    8.1      Customer Premises Engineering, Design and Implementation ................................................................................................ 10
    8.2      Data Center Installation ........................................................................................................................................................... 11
    8.3      RemoteHands and SmartHands Services ................................................................................................................................. 11
    8.4      Bandwidth Procurement Services............................................................................................................................................. 12
    8.5      Information Assurance/Computer Network Defense ............................................................................................................... 13
      8.5.1         Vulnerability Assessments and Penetration Tests ........................................................................................................... 13
      8.5.2         Secure Systems Design and Implementation ................................................................................................................... 13
      8.5.3         Information Security Policy and Procedure Development and Review ........................................................................... 13
      8.5.4         Information Assurance Certification and Accreditation................................................................................................... 14
      8.5.5         Incident Preparation and Response ................................................................................................................................. 14
      8.5.6         Network Intrusion Prevention (NIPS: IDS/IPS) ................................................................................................................. 14
      8.5.7         Log Aggregation and Security Information Management ................................................................................................ 14
      8.5.8         Security Event Logging Best Practices Review ................................................................................................................. 14
      8.5.9         External Network Vulnerability Assessment .................................................................................................................... 15
      8.5.10        Application Vulnerability Assessment .............................................................................................................................. 15
      8.5.11        Application Firewall Management ................................................................................................................................... 15
    8.6      COOP/DR .................................................................................................................................................................................. 15
    8.7      Server Migration ...................................................................................................................................................................... 16
    8.8      Data Migration......................................................................................................................................................................... 16
    8.9      COOP/DR .................................................................................................................................................................................. 16
9     Hosting Services ....................................................................................................................................................................... 16
    9.1      Data Center .............................................................................................................................................................................. 16
    9.2      Infinistructure™ ........................................................................................................................................................................ 17
    9.3      Managed Hosting..................................................................................................................................................................... 18
    9.4      Highly Managed Hosting.......................................................................................................................................................... 19
    9.5      Custom Managed Hosting........................................................................................................................................................ 19
    9.6      Infinistructure Managed Storage ............................................................................................................................................. 20
    9.7      Infinistructure Managed Backup .............................................................................................................................................. 20
    9.8      Enterprise Cloud ....................................................................................................................................................................... 20




                                                                                                   2
1     INTRODUCTION TO TERREMARK FEDERAL GROUP
Terremark Federal Group (“TFG”), is a wholly owned subsidiary of Terremark Worldwide, Inc.
(NASDAQ:TMRK) and is a leading global provider of IT infrastructure services delivered on the industry's
most robust and advanced operations platform. Leveraging purpose-built datacenters in the United States,
Europe and Latin America and access to massive and diverse network connectivity from more than 160 global
carriers, Terremark delivers government, enterprise and Web 2.0 customers a comprehensive suite of managed
solutions including managed hosting, co-location, network and security services. Terremark is a member of the
U.S. Environmental Protection Agency’s Green Power Partnership and is a fully participating member of the
Green Grid Consortium.

1.1   MANAGED IT INFRASTRUCTURE SERVICES:
       Private Integrated Networks – a private acquisition of networks with carrier-grade network management.
       Secure Network/Satellite Operations Centers – central command point for the deployment of projects and day-to-day
       operations of global network management and satellite networks and infrastructure.
       Managed Router Services – combine several network providers into a single connection, and/or provided in a redundant
       configuration, providing greater Internet access reliability.
       Program Management – PMI-based program management and project planning process delivering projects world-wide.
       SCIF Facilities SecurityPlus offers colocation in the form of an individual cabinet, cage environments, and Sensitive
       Compartmented Information Facilities (SCIF) Facilities built to the Federal government’s Physical Security Standards.
       SecurityPlus managed areservices available in Miami, FL; Herndon, VA; Santa Clara, CA; and Culpeper, VA – and meet
       JAFAN 6/9, DCID 6/9, DCID 1/21, and DIA Manual 50-3 compliance.
       Data Center Floor Colocation – a controlled and managed space with multiple connectivity options to place computing,
       storage, telecom and application server equipment.
       Professional Services includes: Design and Implementation, Data Center Installation, Remote Hands/Smart Hands,
       Bandwidth Procurement Services, and Information Assurance/Computer Network Defense.
       COOP/DR – design and implementation of business continuity services from full site failover in 24 hours to zero/loss/zero
       connectivity loss failover.
       Server Migration – a dedicated Infinistructure™ environment using utility computing and virtualization to mirror the
       existing environment’s capabilities.
       Data Migration – analysis, design, project planning and execution services for successful data migration projects.
       Managed Hosting Services – combines premium engineering and support services for two levels of hosting. Both Managed
       Hosting One (MHOne) and Highly Managed Hosting (HMH) offer either virtualized or dedicated servers; MHOne provides
       management to a web server layer while HMH is managed all the way to the application layer.
       Managed Storage Services – provides on-demand storage capacity, monitoring and management services for disk, backup,
       restore, and archive infrastructures in a security-rich environment
       Managed Backup Services – a utility-enabled, metered usage model over gigabit Ethernet connections in increments of 100,
       500, and 1,000 gigabytes.
       The Enterprise Cloud - Cloud Computing/Infrastructure as a Service (IaaS) from secure datacenters with precise, dynamic
       allocation of computing resources with the scale, performance and security to handle enterprise-wide applications. Features
       include multi-user capacity, dedicated resource pool architecture and role-based security model as well as private network
       connectivity and physical device integration.

1.2   QUALIFIED SERVICE PERSONNEL
TFG’s Operations Team has a broad-based industry background, with experience that includes:
       Network design of secured networks, network management, network monitoring and problem resolution
       using crypto devices
       Core network design and upgrades, peering, and transit
                                                                3
      Industry experts on HP, Juniper, Cisco, Foundry, Riverstone, Extreme, Cabletron, IBM, Nortel, Sun,
      Agilent, Marconi and more
      Managing multiple network providers performance on secured networks
      Protocols and technologies such as BGP, TCP/IP, IPX, X.25/Frame Relay, SNMP, etc.
      Reviewing, approving/declining, scheduling and tracking change management requests
      Designing and implementing large scale, highly secure networks for enterprise and service providers
      using technologies such as MPLS, ATM, VOIP, Frame Relay, DSL and Ethernet
      Implementation of an all digital nationwide network
      Deployment of cable modems and cable phone service outside of the U.S.
      Certifications such as CCIE, CCDP, Certified Information Systems Security Professional (CISSP) and
      CCNP, Cisco and Sun Microsystems
      Control systems engineering
      Large project organization, design, change transformation, business process/operations management and
      strategic planning
      PL/SQL, Unix Administration, NT/Windows, TCP/IP Administration and Configuration, Oracle DBA,
      and DB Backup and Recovery.
Our employees have certifications or experience in:
         Global Information Assurance Certification          Foundry Hardware
         (GIAC)                                              HP Hardware
         Cisco IOS
         Cisco hardware                                      Nortel
         Catalyst IOS                                        Bay Networks OS
         Catalyst Hardware                                   Remedy Ticketing System
         SUN OS                                              Other Ticketing Systems
         SUN Hardware                                        HPOV
         UNIX OS (HP, AIX)                                   TDM Devices
         SQL Database Admin                                  Crypto Devices
         Oracle Database Admin                               Auto CAD or Similar Product
         Microsoft Windows OS (NT, 2000 Server, etc.)        ATM Circuits
         Microsoft Office Products (Word, Excel, etc.)       ATM Switches
         Juniper IOS                                         Optical Circuits OC-3/OC-192
         Juniper Hardware
         Foundry OS
In addition, TFG employees meet Top Secret SCI/DOD and Top Secret/State Department needs.
2     CAPABILITIES OVERVIEW

2.1   PRIVATE INTEGRATED NETWORKS
TFG is not a carrier – TFG designs, builds, operates and maintains networks, monitoring them though a best-in-
class secure network operations center (SECNOC) for our end customers, that incorporate the best routes,
features and functionalities of networks and fiber providers worldwide with Optical technology and stringent
customized SLAs.
The TFG Solution
TFG delivers private acquisition of networks with the benefit of carrier-grade network management expertise.
The TFG Solution includes stringent customized SLAs and Quality of Service (“QoS”) commitments using
Optical technology as the foundation for our services throughout the world; TFG leverages its expertise in
network routes, ownership and cable systems to execute redundant paths, providers and delivery.
                                                      4
       Network Design: TFG is not a carrier and does not own any networks. We follow industry best practices
       and leverage core Network Access Points (NAPs) for network design and technical architecture to
       deliver customized SLAs based on the application for the private network.
       International Deployment and Program Management: Deployment of a private network requires on-
       site coordination and program management for roll-out of sensitive equipment, TFG has program
       management personnel with appropriate clearances to ensure that all implementations are delivered on-
       time and meet all agreed-upon SLAs.
       Network Monitoring and Management: TFG’s SECNOC monitors and manages all network
       environments down to the individual element.

2.2   SECURE NETWORK/SATELLITE OPERATIONS CENTERS
TFG’s Secure NOC (SECNOC) and Secure Satellite Network Operations Center (SATNOC) at the NAP of the
Americas serve as the central command points for the deployment of projects and the day-to-day operations of
global network management and satellite networks and infrastructure, meeting security requirements of TS SCI
and above. The SECNOC is staffed 24 hours per day, 7 days a week with personnel possessing Government-
issued security clearances. This “round the clock” staffing is instrumental in supporting international projects
and customers. These centers serve as a single point of contact for critical communications, provides real-time
monitoring of key internal and customer resources necessary to implement project-based and day-to-day
management of networks and infrastructure. The SECNOC works with the SATNOC and network operations
staff to provide comprehensive, end-to-end monitoring and management of all circuits, whether these involve
landline or satellite transmission. One of the most important functions provided by these centers is the
availability of senior level Service Matter Experts (“SMEs”) in all aspects of network engineering and
operations. The SMEs are responsible for final configuration and testing of the network equipment, and
firewalls that provide the primary layer of security for the NAP of the Americas’ network management
platform. The centers offer enhanced physical security as well, including secure rooms with no-key electronic
combination locks; access restrictions that adhere to our customers’ policies, and secure media in and out of the
secure space.
Services available at via the SECNOC:
               Implementation project plan                      Ongoing configuration
               Secure NOC location                              management
               Logical connectivity installation                Change control management
               Initial set-up and testing                       Preventative maintenance
               Network Monitoring: ICMP;                        Operational run book
               SNMP & Agent-Based                               management
               Notification: e-mail and pager;                  Trouble and fault resolution
               escalation                                       Patch notification and installation
               24 x 7 x 365 cleared support                     Automated reporting on access to
               personnel                                        space
               Support: Levels 1, 2 and 3                       Dedicated staff of 24x7, cleared
               Network capacity planning                        personnel dedicated
               Network reporting -                              Logical separation of network
               comprehensive                                    management tools
               Correlation and root cause                       Seamless coordination with
               identification                                   TFG’s SATNOC


Services available at via the SATNOC (in addition to those above):
               Satellite Network Monitoring: ICMP;               Initial set-up and testing
                                                       5
               SNMP & Agent-Based
               24 x 7 x 365 cleared support personnel             Notification: e-mail and pager; escalation
               Satellite Network capacity planning                Support: Levels 1, 2 and 3
               Seamless coordination with TFG’s                   Satellite Network reporting –
               SECNOC                                             comprehensive
3   MANAGED ROUTER SERVICES
Terremark's Managed Routing Service (MRS) leverages the massive global network connectivity provided by
the world's largest telecommunications companies located within our carrier-neutral facilities. With direct
access to the backbones of the world's leading carriers, we connect directly to the heart of the Internet,
consistently delivering the quality of service required for Streaming Multimedia, Voice over IP and other
demanding applications. Our secure and reliable facilities are complete with redundant systems and
infrastructure. Our Network Management staff proactively monitors services, 24x7x365. In addition, our high-
performance Network Analysis Modules (NAMs) offer proactive monitoring and quick troubleshooting that
provides our engineers with visibility into all layers of the network. This enables us to analyze traffic flows for
applications, hosts, conversations and network-based services such as Quality of Service (QoS) and Voice over
IP (VoIP). Our Managed Routing Service provides you with optimal access to the Internet without purchasing
or managing your own Internet router. This cost-effective outsourced solution helps you avoid maintaining your
own in-house staff for router management, as well as avoiding capital expenditures and maintenance expenses.
MRS condenses the worldwide reach of several network providers into one single connection. By connecting to
MRS, the customer immediately receives a complete package of benefits, including:
       Direct access to the world’s leading Tier-1 carrier backbones
       No Local Loop charges
       Redundant Cat6 Ethernet connections or fiber connection to core switch
       /28 Block of IP addresses provided, with additional addresses available
       Reverse DNS available
       Primary and secondary DNS included for one domain name
       BGP4 and Carrier Management, Transit provided outside of the network
       Committed and Peak Internet Access available in 1 Mbps increments up to 10 Gbps
       Monitored 24x7x365 by our world-class SECNOC
       Industry-Leading SLA for Internet Connectivity Uptime

MRS can also be provided in a redundant configuration, providing even greater overall Internet access
reliability.
Connections to the MRS platform are offered from 1 Mb to 1 Gb bandwidth connections providing the
opportunity for an entry-level connection that can be upgraded as traffic demands warrant. For larger traffic
loads, multiple 1 Gb/s connections can be implemented to form a “super trunk” offering superior network
performance and reliability.
4    PROGRAM MANAGEMENT
TFG’s hands-on Program Management delivery approach is comprehensive yet flexible, efficiently adapting to
your needs Project Management Institute (PMI) methods and procedures. TFG can expand personnel and
resources around the world to manage development programs of any size, delivering metrics-based results with
specialized personnel.
                                                        6
4.1   TFG PROGRAM MANAGEMENT PROCESS
TFG has developed a PMI-based program management and project planning process that serves as the basis for
each engagement to successfully and consistently deliver on each project.
       Phase I – Initiation: Begins with project planning and project kickoff activities to align project scope
       and expectations, establish communications and reporting, and coordination of activities between the
       TFG and interested parties. The project requirements gathered during this phase include the overall
       project strategy, approach, and concurrence on expected deliverables.
       Phase II – Assessment: Focuses on gathering the business and functional requirements of the proposed
       solution, analyzing in detail the exact requirements set forth by the customer. TFG then produces a final
       requirements document for the project, which details the basis of design.
       Phase III – Specification: The specification phase consists of the approved final requirements into
       measurements and deliverables.
       Phase IV – Logistics and Material Management: The logistics and materials management phase of the
       project is intended to ensure that all hardware/software components are properly purchased, inventoried,
       tested and tracked from the vendor to staging and to ultimate destination.
       Phase V – Deployment: Using the detailed deployment plan, TFG installs the project elements, verifies
       service availability and performs other end-to-end testing on each project subsystem for a metrics based
       delivery.

4.2   TFG’S PROGRAM MANAGEMENT METHODOLOGY
TFG’s project management methodology focuses on efficient staffing, timely reports, change control
procedures, quality assurance and measurable acceptance criteria.
       Staffing: TFG has cleared and experienced resources that are qualified and technically certified to
       accomplish the agreed-upon technical and management tasks. Based on the expertise required by a
       project, TFG assembles a project team in the specific disciplines.
       Project Status Reports: Written reports include status information obtained from the TFG and Customer
       members of the overall project team. Status reports are prepared by the TFG’s Program Management
       Office and can be distributed weekly. Each report contains the following sections:
          Assessment of project progress (summary)
          Key project issues and resolutions
          Key accomplishments this period
          Activities in progress
          Planned activities for the next period
          Updated project schedule
          Continuous Improvement process.
       Scope and Change Control Procedure: TFG establishes procedures for denoting and authorizing
       project scope changes at the beginning of a project, which it follows throughout. Our experience has
       shown that this approach enables clear communication and understanding while helping manage
       expectations. Either party may request changes to the Project Scope; however, because a change could


                                                       7
       affect the cost, schedule or other terms of this Project Scope, TFG and the Customer POC must approve
       each change before amending the Project Scope.
       Quality Assurance: The role of quality assurance for the project is to:
           Establish proper reviews and audits to ensure that all requirements are being designed into the
           project.
           Ensure that the system is in place to effectively review and approve deliverables.
           Ensure that nonconformities are identified and corrected in the most expedient and effective manner.
           Maintain quality assurance records, which include a non-conformity log and audit records.
           Assist the project managers to identify risks on the project.
           Audit the project management and configuration management process to ensure compliance.
           Track formal action items as a result of quality assurance audits.
           Document corrective actions to ensure that problems are permanently resolved.
           Recommend changes and improvements to the quality assurance process.
           Define acceptance criteria for the project that objectively verifiable and measurable by both parties.
5   SENSITIVE COMPARTMENTED INFORMATION FACILITY (SCIF) STANDARDS
For government solutions that require a higher level of security, Terremark Federal Group offers SecurityPlus
services. SecurityPlus includes the design and construction of space that meets Secure Compartmented
Information Facilities (SCIF) accreditation and other unique accreditation requirements TFG has designed and
implemented SCIF space for several Federal customers.
Space meeting SCIF requirements can be provided at the following U.S. locations:
       Miami (NAP of the Americas)
       Herndon (Herndon Technical Center)
       Santa Clara (NAP West)
       Culpeper (NAP of the Capital Region)
In addition to the TFG owned and operated facilities, TFG has the capabilities to design, construct, deliver and
operate SCIF space in customer provided locations or other leased space.
       SCIF Design: The TFG SCIF design process begins with gathering and documenting customer
       requirements. Details such as the required size of the space, intended use, security systems and
       operational parameters are gathered and documented in a SCIF Design Specification document.
       Standards Compliance: Our Sensitive Compartmented Information Facilities (SCIF) projects meet the
       requirements of JAFAN 6/9, DCID 6/9, DCID 1/21, and DIA Manual 50-3.
       Total Turnkey Solutions: The TFG solution provides a “one stop shop” for customers who need SCIF
       space developed and delivered on a turnkey, fast track, managed services basis. The TFG program
       management process insures that all your requirements are met, and the project is delivered on time to
       meet critical mission schedules.




                                                         8
6   SPECIALIZED PROJECTS
As a result of TFG management’s diverse experience, we have access to a wide variety of skilled, cleared
personnel that can be assigned to oversee our customers’ mission critical deployments around the world. TFG
will help you identify the skill sets necessary for your specific program and will resource the personnel
necessary to meet your objectives.
7   DATA CENTER FLOOR COLOCATION
TFG Colocation Service offers customers a controlled and managed space with multiple connectivity options to
place computing, storage, telecom and application server equipment. Depending on customer requirements,
open racks, cabinets, or customized caged floor spaces are available in a hardened and secure facility designed
to withstand major environmental incidents. By making use of TFG Colocation Service, customers eliminate the
capital and operational expense required to build and maintain a world-class facility to house mission-critical
systems. Customers also benefit from the services provided by a 24x7 operation manned by highly trained staff.
Client Caged Space
     Customized, locked caged area starting from 100 square feet
     Any configuration of equipment mounting not to exceed 10’ 10’’ in height
     AC and DC power.
TFG Cabinets
       7’ TFG provisioned 23-inch wide by 27½-inch (inside/mounting space) deep enclosed cabinet
       10’ TFG provisioned 23-inch wide by 27½-inch (inside/mounting space) deep enclosed cabinet
       AC and DC power
Building Security and Operations
        24x7 manned Secure and Satellite Network Operations Center (SECNOC and SATNOC), monitoring all
        essential systems, including humidity, temperature, water, fuel sensors and all related environmental
        systems
        24x7 guarded keycard-access entrances to the building
        Cameras throughout the facility
        Keycard access for entry to elevators, floors and roof area
        Security Guards at designated stations at critical access points throughout the facility, with additional
        roving security personnel
Facilities Infrastructure
      Raised floor: 20 (36” in NCR) inches above the concrete flooring
      Raised floor loading: 180 lbs. per square foot, featuring increased lateral load dispersion capabilities
      Loading docks, each with a load leveler providing up to 20,000 pounds of capacity
Power Management
      Fully redundant commercial power feeds
      Increments of power using National Electrical Code rated increments of UPS protected AC
      (120volt/208V/208V 3PHASE) and DC (-48Volt)
      DC branch power circuits from 20-AMP to 100-AMP, -48V
      DC bulk branch circuits from 200, 400, and 600-AMP, -48V
      Backup power provided by continuous power systems
Environmental Controls and Fire Suppression
                                                        9
       Five reciprocating chillers, provide redundant chilled water to the facility
       Programmable, addressable electronic detection system of individual detectors connected to central
       control panel
       Smoke detectors provided on the colocation floor, communication equipment rooms, mechanical and
       electrical rooms
Access to External Network Connection
       Multiple wide-area network connectivity options available in the meet point rooms with a total of 64,200
       cross-connects available per room
       Fiber available from most major land and undersea network service providers
       Perimeter rooftop area in Miami to house customer rooftop-mounted antennas
Service Level Guarantees for Power, Temperature and Humidity:
       SLAs for Power and HVAC guarantee 100% availability, with no exceptions for maintenance or
       otherwise. Copies of the SLAs are available upon request.
8     PROFESSIONAL SERVICES

8.1   CUSTOMER PREMISES ENGINEERING, DESIGN AND IMPLEMENTATION
From planning to network architecture to implementation management, Terremark engineers assist customers,
both at Terremark facilities and at customer locations around the world. Our engineering capabilities span the
entire spectrum of telecom networks. Engineers are available on an hourly or project basis. Customers can
initiate service requests with Engineering Services professionals detailing their specific needs on a case-by-case
basis. Due to the wide variety of requirements and the different variables of each project, Engineering Services
are quoted on an individual case basis only. Terremark gives customers access to world-class engineering talent
and project management services. The service provides for timely and efficient implementation of projects,
while reducing or eliminating the cost of having a permanent skilled staff. Services available from Engineering
Services are:
Needs Assessments                                                  Building connectivity management
     Existing IT assets                                            Satellite and antenna installation
     Data processing/computing                                     Design planning for building tenants
     Resources/staffing/organization
     assessments                                             Network and Systems Implementation
     Network assessments/network audits                            Staging and configuration
Equipment Engineering Services                                     Product preparation
       Turnkey network and infrastructure                          Site surveys/site preparation
       planning and consulting                                     Management of the integration process
       Site selection/site survey                            Migration Planning
       Cable management design                                     Risk and contingency management and
       Layout design                                               assessment
       Network infrastructure design                               Platform consolidation/migration
       Power distribution design                                   Network consolidation/migration
       Connectivity assessment                                     Server consolidation/migration
       Support Services                                            Staff transition
       Fiber and conduit entrance management                       Staff/skills augmentation
                                                        10
      Application and data conversion                              Vendor neutral
Product Procurement                                                Contract negotiation services
     Strategic alliances
Equipment Handling                                                Labeling & Inventory
      Receiving                                                   Equipment labeling
      Staging                                                     Cables labeling
      Unpacking                                                   Equipment inventory with digital pictures
      Mounting                                              Rack Assembly
      Warehousing                                                  Rack Installation
Cable Management                                                   Equipment positioning within a rack
       Equipment cabling                                           Installing security appliances in a rack
       Cable management & IFC
8.2   DATA CENTER INSTALLATION
Installation engineers assist customers in the provisioning process by providing basic installation of customer
equipment at Terremark facilities. Our installation engineers receive stage, unpack, mount, and cable equipment
according to approved specifications, preparing rack environments for either Terremark or customer technical
personnel to configure and test the equipment. If customers have more extensive needs other than basic rack
assembly, equipment mounting and cabling (e.g., configuration, testing, implementation, integration, etc.) those
customer requirements will be referred to solutions engineers for a complete solution. Due to the wide variety of
needs and the different variables of each installation, installation services are custom quoted and accompanied
by design documents developed on an individual case basis.

8.3   REMOTEHANDS AND SMARTHANDS SERVICES
TFG RemoteHands and SmartHands services assist customers that need remote access to their equipment for
performing simple trouble-shooting or maintenance tasks. Our 24x7 on-duty staff can perform basic tasks that
do not require the use of tools or equipment. TFG RemoteHands and SmartHands services are available on
demand or by subscription in 8-hour blocks per month. On demand customers can expect a 1-hour response
time to their requests billed in one-hour increments. Subscription customers can expect a 15-minute response
time Service Level Agreement (SLA) providing them with a dependable resource for maintaining maximum
uptime. Subscription services are billed in 30-minute increments at a significant savings over on demand hourly
rates.
Customers can remotely manage their operations from anywhere in the world and maximize operational uptime
by using TFG RemoteHands and SmartHands. This remote service, performed by our staff, reduces costs by
eliminating the need for the customer to dispatch technical personnel to the data center site to perform simple
tasks. Leveraging the round-the-clock availability of TFG RemoteHands and SmartHands helps customers
increase the uptime of their mission-critical systems.
TFG RemoteHands Services include:
       24x7 coverage
       Power Cycling (turning equipment on and off)
       Toggling a switch or pushing buttons
       Securing cabling to connections


                                                       11
       Observing, describing or reporting on indicators or display information on equipment or consoles; and
       basic observation and reporting on the environment in the data center
TFG RemoteHands service does not include any service requiring a tool or diagnostic equipment, opening
equipment or movement of connected equipment. Those are services provided by our Engineering Team on a
case-by-case basis.
TFG SmartHands Service includes:
       24x7 coverage
       Management of Equipment Components (e.g., cards, drives, memory)
       Installing, replacing or removing
       Troubleshooting
       Media Management
       Supply management
       Inventory and archiving
       Complex cable configurations
       Loop-back and signal testing
       RMA and shipping of replaced equipment
       Equipment testing and troubleshooting
       Circuit testing
       Trouble ticket management

8.4   BANDWIDTH PROCUREMENT SERVICES
Because of our unique business model, Terremark serves both as a trusted service and infrastructure provider
and a customer to many bandwidth providers, allowing us to develop multilevel relationships with carriers
around the world. These strategic relationships, coupled with our carrier-neutrality, allow us to provide our
enterprise and government customers access to highly competitive bandwidth procurement services. Our
bandwidth procurement staff can provide best routes, pricing and providers to any location worldwide, on a
retainer basis.
In addition, we can provide the following services on a project-by-project basis:
       Develop customized bid and proposal documents
       Manage the response, analysis and award of competitive bids for our customers
       Develop metrics and processes for customized SLAs between carriers, customers and end users
       Assist customers with the bandwidth contracting and procurement process
       Coordinate service activation, including availability dates, as part of a customer’s overall project.

Bandwidth Procurement Assistance is available on a monthly retainer and subject to customized service level
agreements designed to meet our customers’ response time requirements.
TFG’s Bandwidth Procurement Assistance Service can be delivered in one of two methods, at the customer’s
choosing. Using a direct contract approach, TFG provides all interfaces between the chosen carrier and TFG’s
customer, including placing the bandwidth contract in Terremark’s name in order to provide a truly “turnkey”
and fully integrated and managed service offering. Alternatively, using a customer contracted approach, TFG
can act as the customer’s agent to provide all of the services referenced above, but the final contract review and
negotiations, as well as the direct contractual relationship, will be between the carrier and TFG’s customer. On a

                                                        12
customized basis, to expedite bandwidth procurement or for other reasons, TFG follows a hybrid approach
where it contracts directly, but negotiates a provision in the bandwidth contract that allows Terremark’s
customer or another designated agent to assume the bandwidth contract at any time, at its option.

8.5     INFORMATION ASSURANCE/COMPUTER NETWORK DEFENSE

8.5.1   Vulnerability Assessments and Penetration Tests

Terremark’s Secure Information Services Team offers external and internal Vulnerability Assessments to
evaluate systems, applications, and processes for known vulnerabilities using a combination of automated and
manual tools and techniques.

Penetration Tests often follow a Vulnerability Assessment, attempting to use any identified vulnerabilities to
compromise a system or network, essentially proof that vulnerability can actually be used to breach your
organization’s security.

Benefits
        Provide fresh set of eyes for your own IT or security groups
        Expert view of your current security environment (i.e., want to find the holes before the bad guys do)
        Security policy or framework requirements (ISO 17799 or COSO, SAS 70)
        Prepare for a regulatory audit such as Sarbanes Oxley, GLBA, PCI, and SAS 70.

Tasks include:
        Scan external address ranges and web URL’s using multiple refined tools and utilities
        Analyze and identify all Operating Systems and Services
        Scan outward-facing applications using such attacks as SQL injection and Cross-site scripting
        Research vulnerabilities based on results
        Confirm vulnerability in non-disruptive manner
        Analyze and verify external network design and perimeter defenses
        Attack simulation: Duplicates an attacker’s attempt to penetrate applications. Provide detailed reports
        and briefings to staff.

8.5.2   Secure Systems Design and Implementation
        The design and deployment of Secure Information Systems, including intrusion detection/prevention
        systems, log aggregation and security event management systems, system hardening procedures, and
        wireless networks
        Supplement your in-house skill sets to design and deploy mission critical systems in a secure manner
        Terremark’s team has designed and deployed secure network infrastructure for many Federal
        Government customers in such areas as DOD and Intelligence communities

8.5.3   Information Security Policy and Procedure Development and Review
        Develop effective information security policies and procedures for an organization’s staff to help to
        ensure a solid security footprint
        Terremark’s international reach enables our security staff to stay current on security threats in CONUS
        as well as OCONUS


                                                        13
        Help establish strong information security policies and procedures appropriate for today’s security
        environment using best practices as well as various applicable standards and frameworks such as ISO,
        Basel II, and COSO

8.5.4   Information Assurance Certification and Accreditation
Terremark assists Federal organizations prepare and undergo the IA certifications and accreditations such as
DIACAP, NIST and FIPS. Services include:
      Mapping systems into an enclave and preparing for validation.
      Working with validation team to ensure controls sets are met.
      Conducting assessments and audits to ensure standards are met.
      Working with internal security and IT team to accept policy for standards.

8.5.5   Incident Preparation and Response

Terremark’s Security Team helps a customer’s IT staff with the following.

        Train and prepare IT staff to recognize and handle a Cyber attack.
        Develop process and procedures when an attack comes.
        Conduct Red team exercise to prep an internal team to defend the network.
        Assess internal team to their effectiveness of dealing with an attack.
        Respond rapidly to a customer’s incident with years of devolved expertise in IR.
        Assist in any investigation that may ensue from a potential breach.

8.5.6   Network Intrusion Prevention (NIPS: IDS/IPS)
Terremark offers managed IDS/IPS security functions that can be installed seamlessly at the network edge or as
an IPS solution deployed at the network core to protect critical business applications from external as well as
internal originating attacks. Terremark offers antivirus, antispam, web filtering, VPN and Stateful Firewall
management. Also, Terremark offers application firewall management.

8.5.7   Log Aggregation and Security Information Management
Terremark’s Security Center tool set is a high-quality security event management (SEIM) solution that collects,
normalizes and analyzes data from virtually any security device from any vendor such as Firewalls, IDS, IPS,
Syslog, SNMP, Vulnerability Assessment, Antivirus, Routers, Switches, VPN’s, Windows Event Logs, and
more. Our SOC supplies you with detailed security alerts, and vital reports. This service enables you to archive,
analyze, correlate and trend security and network events, while managing your response and remediation
workflow.

8.5.8   Security Event Logging Best Practices Review
A large portion of security investigations depends on availability of system logs. Many organizations do not
follow general best practice for dealing with the large amount of logs that get generated by the systems.
Terremark’s SIS Team reviews current log aggregation deployments and map it to best practice to deal with
large volumes of system logs. This review provides a clear picture of how to process and retain system logs.




                                                       14
8.5.9     External Network Vulnerability Assessment
The proposed security assessment identifies any vulnerability on your external network. The assessment
includes controlled, technical penetration testing using “white box” and “black box” techniques with varying
levels of tester knowledge.
Terremark uses a unique variety of approved, automated COTS utilities, and custom tools for performing
probes, scans and manual discovery to locate potential vulnerabilities on systems and devices from external
vantage points. Once identified, these potential vulnerabilities are manually investigated to determine their
threat level and potential impact.
Network vulnerability testing consists of a remote scanning procedure which tests, analyzes and reports on
security weaknesses exposed to the Internet via the client’s website and public-network access points. Exposed
vulnerabilities and treatment options are included in the final report.

8.5.10 Application Vulnerability Assessment
Network security tools, such as firewalls and intrusion detection systems (IDS), must be augmented by strong
Web intrusion protection mechanisms. Terremark’s Application Vulnerability Assessment identifies the
following:
          Security architecture and policy review
          Penetration test of perimeter systems
          Wireless security review
          Best practices sharing
          Security patch strategies
          Discovery and recommendations report

8.5.11 Application Firewall Management
Our service consists of tuning, reporting, integrating logs and ensuring the efficient operation and management
of this important security layer.
      •   Managing and monitoring the Netscaler® Based Web Application Firewall from Citrix
      •   Enabling businesses to efficiently maintain control over critical data stored in SQL databases, while
          transparently protecting Web applications
      •   Developing policy and automate maintenance and endeavor to eliminate the need for manual
          configuration and tuning
      •   Using the learning and tuning features during the deployment that do not require any changes to the
          Web application or network
      •   Ensuring that this transparent inspection technology delivers high performance, sub-millisecond latency,
          and multiple high availability options
      •   Building a comprehensive model of legitimate application usage so that security policy is generated
          automatically
      •   Modeling changes to applications, usage patterns and data structures over time

8.6       COOP/DR
Terremark provides the expertise to design and implement solutions for business continuity across a broad
range of requirements, for customers who can tolerate full site failover in 24 hours to customers who require
zero data loss/zero connectivity loss failover, for individual applications to entire datacenters.Terremark offers
the flexibility to choose from our full slate of services offerings, including local and wide area networking,
                                                         15
network security, data storage systems, remote access technologies, email and database, archiving solutions.
The experience of our industry-leading professional services groups with these critical resources allows us to
consider the diverse threats that each must protect against, and design a comprehensive solution that provides
true high availability.

8.7     SERVER MIGRATION
Terremark’s approach builds a dedicated Infinistructure™ environment using utility computing and
virtualization to mirror the existing environment’s capabilities. After performing an evaluation on the current
environment, Terremark recommends how many of the physical servers will remain physical and how many can
be migrated over to a virtual platform. Owing to the eventual migration from an actual physical environment to
a virtual server environment, Terremark usually sees a compression ratio of about 8 to 1.

8.8     DATA MIGRATION
Terremark’s data storage systems experts offer a variety of approaches to data migration projects, tailored to
meet a variety of availability requirements. Our team evaluates your environment, determines what type of data
is being migrated, how and when it is being accessed, how and when it is changing, and design cost-appropriate
solutions that meets the availability requirements. We provide complete analysis, design, project planning and
execution services for successful data migration project.

8.9     COOP/DR
Terremark delivers the expertise to design and implement solutions for business continuity across a broad range
of requirements, for customers who can tolerate full site failover in 24 hours to customers who require zero data
loss/zero connectivity loss failover, for individual applications to entire datacenters. Our services offerings
include local and wide area networking, network security, data storage systems, remote access technologies,
email and database, and archiving solutions. Our industry-leading professional services groups consider the
diverse threats that each must protect against, and design a comprehensive solution that provides true high
availability. The security of our facilities and access to global networks ensures that there is no better place to
put your infrastructure.
9     HOSTING SERVICES
Terremark's Highly Managed Hosting service provides complete support for business-critical applications with
service level agreements structured at the application level.

9.1     DATA CENTER
      Our facilities, NAP of the Americas in Miami, FL, our new NAP of the Capital Region (NCR) in Culpeper,
      VA, or any of our other facilities in the continental United States, provide environmental and physical
      security support. We provide 24/7 physical security, manned by personnel with a combination of military,
      corrections and police experience. Our Service Desk actively monitors all temperature and power to prevent
      any service interruptions.
          Network
      Terremark provides 24/7 network monitoring through its Network Operations Center (NOC). The NOC is
      staffed by skilled engineers with clearance levels appropriate to the environment. All NOC personnel follow
      standardized processes for Incident Management as outlined by ITIL best practices. In addition, Terremark
      provides bandwidth provisioning to assist with your changing capacity requirements.
         Security

                                                        16
      The FBI estimates business loss at $6.7 billion per year from cybercrime. The Terremark security solutions
      make use of firewalls, intrusion detection and management, anti-virus and anti-spam software.
          Server/Storage Platform
      Terremark hosting solutions provide both dedicated and virtual servers. Our dedicated server solution
      supports HP Proliant DL class and Sun Servers configured according to Terremark’s minimum server
      standards. Terremark’s Virtual Server platform, Infinistructure™, is built on a 250-core 64-bit processing
      array, gigabit networking with hardware load-balancing features, and a total capacity of 35 terabytes of
      high-performance fiber-attached storage with dynamic provisioning and superior disk performance to
      server-based storage.
          Backup
      Terremark provides its hosting customers configuration, management and maintenance of all data backup,
      archival and restore functions. Our engineers will work with you to implement the backup functions that
      meet your specific requirements.
          Storage
      Terremark's iSCSI SAN is a cost effective solution ideal for mid-range applications that are not latency
      dependent. Our page-based volume management enables automatic movement of data while it is in use.
      This technology provides the foundation for online expansion, automatic configuration, performance
      optimization, and advanced software functionality – all with continuous access to data. That means no
      downtime for increasing capacity and most management tasks are handled by the array, not the
      administrator. As a result, Terremark makes enterprise-class shared-block storage practical for all servers
      and applications.
         Operating Systems
      Terremark’s hosting solutions support Windows 2003/2008 Standard and Enterprise editions, Solaris
      x86/SPARC and Red Hat Linux 4&5 ES & AS operating systems.
          Web Server Platforms
      Web Servers are supported via ISS and Apache platforms, giving our customers the flexibility to use
      whichever platform best suits their environment. In addition, Oracle, SQL, and MySQL are supported as
      database server platforms.
         Application Server Platforms
      For your application servers, Terremark supports Microsoft Server products (Exchange, BizTalk, etc.) and
      J2EE Server Products (Weblogic, JBOSS, etc.)
          Dedicated Resources
      At Terremark, all of our managed hosting customers have resources dedicated to their account. A Service
      Management Team, including a Program Manager, DBA, and application engineer are available to provide
      a personal, mission focused level of support for your custom built solution.

9.2     INFINISTRUCTURE™
      Infinistructure™ is built on enterprise-class HP ProLiant and Cisco infrastructure, providing a 200 core 64-
      bit AMD Opteron processor grid, fully redundant gigabit networking and a total capacity of 35 terabytes of
      available enterprise-class storage. Complete server isolation and PCI-compliant firewalls ensure a secure
      environment. The system is managed and administered with Terremark’s industry-leading digitalOps
      enterprise management platform. Infinistructure™ is multi-platform compatible, supporting Windows
      Server and Red Hat Linux, with forthcoming support for Sun Solaris.

                                                         17
Infinistructure™ eliminates the requirement to purchase physical servers. Pay for what you need, when you
need it. Servers and storage are available on-demand, allowing customers to switch on capacity according to
your business needs. Infinistructure™ Infiniservers are not "shared" servers but dedicated virtual machines.

9.3   MANAGED HOSTING
Our MHOne is a full-service, utility enabled hosting solution allowing us to manage most complex applications
on the Internet while remaining free of economic and logistical constraints of dedicated servers.
       Powered By Infinistructure.
       MHOne is powered by Infinistructure in either virtual or dedicated server models and represents
       Terremark's next-generation utility computing solution. Working together with strategic technology
       partners including VMWare, Cisco and HP, we've designed a managed infrastructure that offers
       flexibility and scalability. When using our Virtual Server offerings, clients get the advanced
       virtualization technology allowing for processing, memory and storage on demand. You can purchase
       capacity as required for event-driven needs, optimize systems utilization and precisely align your
       infrastructure to your business needs. For those clients in the need for a more dedicated solution, we can
       design, deploy and manage a dedicated solution, making use of the same Infinistructure industry leading
       technology.
       Managed With digitalOps.
       We have developed digitalOps, the industry's first and most comprehensive service delivery platform,
       providing enterprise workflow, task automation and a unified management infrastructure. Our
       digitalOps Command Center extends this functionality to managed hosting clients, providing a live
       control center including service ticketing, systems configuration data, performance trending and
       reporting tools and a comprehensive monitoring and availability interface.
       Supported By Terremark.
       Our service delivery team is organized and operates according to IT Infrastructure Library (ITIL)
       standards and practices. We hold certifications including SAS 70 Type II, VISA CISP and Safe Harbor

                                                       18
       that help our clients meet critical regulatory and security requirements, including Sarbanes-Oxley,
       GLBA and HIPAA.

9.4   HIGHLY MANAGED HOSTING
Terremark's Highly Managed Hosting (HMH) service provides the highest levels of support and availability in
the industry, built around an application-centric philosophy, with application-level deep monitoring, return-to-
service and code troubleshooting services. We include full support for leading database and application
platforms and back our service up with meaningful service level agreements structured around custom monitors.
Our HMH service provides:




       Business Alignment.
       We provide business-focused client managers to help ensure our services are aligned with your strategic
       business goals, along with technical account managers to manage day-to-day operational execution.
       Custom Code Support.
       Custom multi-tier transaction monitors audit your application from the standpoint of an end-user or
       critical business process to ensure application availability. If there's an issue, our team provides a
       comprehensive root-cause analysis. We run debugging tools, analyze logs, resolve inter-application
       conflicts and work with your development team to pinpoint failures and recommend solutions.
       World-Class Operations Platform.
       Our systems architects will design an application infrastructure on enterprise-class server and storage
       systems from the industry's leading providers, leveraging our Infinistructure utility computing platform.
       Our state-of-the-art advanced datacenters offer the highest levels of logical and physical security,
       environmental control systems and fault-tolerant power. With access to massive and diverse network
       connectivity from more than 160 network carriers, you're free to select the networks strategically
       relevant to your application, your customers and your business.

9.5   CUSTOM MANAGED HOSTING
Terremark provides its hosting customers configuration, management and maintenance of all data backup,
archival and restore functions. Our engineers work with you to implement the backup functions that meet your
specific requirements.


                                                       19
9.6     INFINISTRUCTURE MANAGED STORAGE
Available in iSCSI and Fibre Channel configurations, Infinistructure Managed Storage delivers the benefits of
high-performance mass storage as a managed service, providing fast and efficient storage management and
eliminating capital investment in storage systems and labor-intensive systems management. Infinistructure's
utility-enabled architecture provides storage on demand, allowing you to precisely align your infrastructure with
your business needs.


          iSCSI
      Terremark's iSCSI SAN is a cost effective solution ideal for mid-range applications that are not latency
      dependant. Our page-based volume management enables automatic movement of data while it is in use.
      This technology provides the foundation for online expansion, automatic configuration, performance
      optimization, and advanced software functionalities – all with continuous access to data. That means no
      downtime for increasing capacity and most management tasks are handled by the array, not the
      administrator. As a result, Terremark makes enterprise-class shared-block storage practical for all servers
      and applications.

          Fibre Channel
      Terremark's FC SAN is designed for high performance/high transaction applications that simply cannot
      afford any downtime or tolerate any data loss. It provides a bullet-proof platform with complete hardware
      redundancy, hot-swappable components and non-disruptive upgrades online. Tightly integrated clustering
      solutions, along with disaster recovery support, enable complete business continuity.

9.7     INFINISTRUCTURE MANAGED BACKUP
Terremark's Infinistructure Managed Backup service extends the power and flexibility of our Infinistructure
utility computing platform to clients requiring a centralized, managed utility backup solution. Leveraging
technologies from leading backup providers including HP, Quantum and CommVault along with Terremark's
digitalOps service delivery platform and more than a decade of managed backup experience managing
thousands of backup jobs per day, Infinistructure Managed Backup provides a utility-enabled, metered usage
model over gigabit Ethernet connections offered in increments of 100, 500 and 1,000 gigabytes.
The standard service includes offsite tape archival by information protection experts Iron Mountain, with
custom tape retention programs available. A dedicated backup network keeps traffic from interfering with
application performance while optimizing efficiency for backup jobs.

9.8     ENTERPRISE CLOUD

The Enterprise Cloud™ gives you the power to provision computing resources for your mission-critical
applications in minutes, not days. Instead of buying costly, cumbersome servers, Enterprise Cloud services lets
you control a resource pool of processing, storage and networking and allows you to deploy server capacity on
demand. Services are typically rendered within five (5) business days after the execution of the Master
Agreement, without modification, and provided all materials and information are supplied to Terremark in a
timely fashion. The Enterprise Cloud™ provides:

          Unprecedented control and flexibility
      Because it’s based on resources, not large and inflexible server units, The Enterprise Cloud allows for
      precise and dynamic allocation of computing resources when and where they’re needed. And, because it’s
                                                          20
based on Terremark’s proven Infinistructure™ utility computing platform, massive and diverse network
connectivity and top-tier data centers, The Enterprise Cloud has the scale, performance and security to meet
all your enterprise’s needs.

    Dynamic provisioning in minutes
At the heart of The Enterprise Cloud is the powerful new Infinicenter web portal, an application that allows
you to dynamically provision servers from a pre-allocated pool of dedicated computer resources. In minutes
you can configure and provision a virtual server, group and organize your servers according to role and
dynamically extend them according to utilization. Preconfigured server templates are available across
Microsoft Windows, Linux, and Sun Solaris operating systems. Plug-and-play bandwidth is available from
160 carriers, and a full reporting interface allows instant insight into resource utilization and application
performance.

    Managed by Experts
Terremark has years of experience managing complex, mission critical infrastructures and applications for
leading companies around the world. The company has been placed in the Leaders Quadrant of the Gartner
Magic Quadrant for North American Web Hosting, 2008 and offers customers the expertise of an ITIL
certified and organized support team




                                                    21

				
DOCUMENT INFO
Shared By:
Stats:
views:57
posted:4/7/2011
language:English
pages:21