My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
GRANICUS INC. (2) - 2017
Clerk
>
Contracts / Agreements
>
G
>
GRANICUS INC. (2) - 2017
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/13/2023 5:01:04 PM
Creation date
12/28/2017 10:33:59 AM
Metadata
Fields
Template:
Contracts
Company Name
GRANICUS INC.
Contract #
A-2017-345
Agency
Clerk of the Council
Council Approval Date
12/19/2017
Expiration Date
1/1/2021
Destruction Year
2026
Link Groups
Link
1:
GRANICUS INC. (2) - 2017
Last modified:
3/13/2023 5:01:04 PM
Path:
\Contracts / Agreements\G
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
110
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
G R A N I C U S RFP NO.: 17-107 Automated Agenda Workflow <br />Program and Meeting Video Streaming/Archiving <br />SECURITY OVERVIEW <br />Data Center Security <br />Having a robust and secure data center implementation is a necessity, not an option. <br />Granicus Data Centers are designed for reliability and redundancy. Our data centers <br />are guided by a "defense -in-depth" security strategy to ensure reliable access of <br />government data. With a 99.9% uptime, we are confident that customer data are <br />always available. <br />Data Center Requirements Granicus Server Locations <br />• Secure - SSAE-16 Accreditation • Primary Data Center in Ashburn, VA <br />• Reliable Network • Backup Data Center in San Francisco, CA <br />• Data Availability: 99.98% Uptime <br />• Redundant Backups <br />Architecture & Data Center Redundancy <br />The Granicus Primary Data Center is architected with redundant systems to ensure that <br />there is no single point of failure and disruptions have no impact on the availability of <br />Granicus applications. <br />Robust Security Layers <br />Granicus implements a series of protective layers so that no single solution is relied upon <br />to provide security, including: <br />• Hosting facilities that meet or exceed Tier III standards that are engineered to <br />ensure application and data availability and security <br />• Edge -to -edge security, visibility, and carrier -class threat management and <br />remediation. We utilize industry -leading tools to compare real-time network <br />traffic and flag any anomalies such as: Denial of Service (DoS) and Distributed <br />Denial of Service (DDoS) attacks, worms or botnets. <br />• Network issues: traffic and routing instability, equipment failures, or <br />misconfigurations <br />• Hardened, stateful inspection firewall technology <br />• An Intrusion Detection System (IDS) utilizing signature-, protocol-, and anomaly - <br />based inspection methods <br />• 24x7x365 firewall, VPN, and IDS support and maintenance <br />• Security policies and procedures that are constantly maintained, tested, and <br />updated <br />A Security Incident Response team/SSAE-16 accreditation ensures all customer data is <br />secure from any tampering. <br />granicus.com I info@granicus.com page 49 <br />
The URL can be used to link to this page
Your browser does not support the video tag.