Availability % | Level | Downtime per Month | VMsources Remediation/Credit | Big Cloud Remediation/Credit |
Below 95% | One Nine | Greater than 432 minutes | 100% of monthly charges | 30% of monthly charges |
Below 99.9% | Two Nines | Greater than 43.83 minutes | 100% of monthly charges | 10% of monthly charges |
99.9% | Three Nines | 43.83 minutes | 50% of monthly charges | 10% of monthly charges |
99.95% | Three Nines + | 21.92 minutes | 25% of monthly charges | 10% of monthly charges |
99.99% | Four Nines | 4.38 minutes | 10% of monthly charges | No Credit |
99.999% | Five Nines | 26.30 seconds | Goal |
VMsources Secure Cloud SLA applies to (scope) outages related to cloud infrastructure including Compute, Storage and Network components of your Secure Cloud. Reasonable maintenance to be performed during mutually-agreed upon maintenance windows and outside of production hours, will not be factored into downtime calculations and will not result in remediation.
Downtime that is the result of client-initiated Change Management, where that Change Management request was correctly implemented by VMsources will not be factored into Downtime.
Services provided by vendors outside the scope of the Secure Cloud SLA, such as ISP and Hosting facility, are covered directly by those vendors SLA, and remediation/credit will be provided as a direct pass-through from the vendor where and when justified.
VMsources bills in advance for Secure Cloud, and any remediation/credit due will be automatically applied to the next months invoice. If you think that you are due remediation/credit for outages that are on your invoice, please call for an adjustment.
3-2-1 Rule
Antivirus
Auditing and Compliance
Backup
Backup Copy
Backup Repository
Best Effort
CDP
Cloud Computing
Compute Resources
The resources required by the active state of a computing system while it is powered on (CPU and RAM).
CPU
Central Processing Unit (CPU) provides logic, controls I/O and performs all calculations based on information stored in RAM.
Datacenter
Disk/vDisk/HDD
computer Disk (AKA: vDisk, Virtual Disk, Hard Disk, HDD, SSD) is a non-volatile, random-access storage system on which data is stored.
DR
DRaaS
DR Plan
DR Test
Endpoint Protection
Endpoint Protection differs from Antivirus in that it looks for specific behaviors which represent suspicious activity on protected systems. When discovered, Endpoint Protection will isolate (“quarantine”) systems until reviewed by an authorized administrator.
Failover
Full Backup
Grandfather-Son (GFS) Backup
Hardened / Immutable Repository
Hypervisor
Incremental Backup
MFA
Multifactor Authentication (MFA) is a process which requires external validation, in addition to the username/password combination. The most common form of MFA is 2FA (2 Factor Authentication) which sends a “push” notification or uses a hardware hey in addition to the username/password combination to validate users.
Offsite
Onsite
Pool
Shared resources, such as IP addresses, CPU, RAM and Disk which are assigned Best Effort.
RAM
Random Access Memory (RAM) stores volatile data which can be accessed and changed frequently while a computer system is powered on.
Replication / Replica
Restore
Restore Points
A Restore Point is the state protected by a Backup Job each time it runs.
Retention Policy
Retention Policy is the number of Restore Points which will be kept.
RPO
RTO
S3 Object Storage
Secure Cloud
Server
A dedicated Compute resource, either physical or virtual, which provides resources or services to users to access remotely.
Server Room
A dedicated area where Servers and other Compute resources are housed. The primary difference between a Server Room and Datacenter is that the Server Room has not been Audited against standards (Such as AICPA, NIST, ISO) whereas the Datacenter is Audited and in compliance with those standards
VM
Virtual Machine (VM) any form of Compute resource which runs on a Hypervisor.
Worm
A Write Once Read Many (WORM) refers to media which cannot be changed after creation for purposes of auditing and/or protection from Ransomware.
PLEASE NOTE
Can you rely on your vendors to honor their Service-Level Agreements to the letter? Or do you often encounter resistance and hedging when initiating an SLA claim?
We think SLAs should be easy to understand, and even easier to remediate. That's why we offer an unparalleled SLA, which we guarantee is more client-centric than any other SLA offered by any Cloud Compute provider--including the Big Cloud!
With most providers, Four Nines is the goal and you only achieve real remediation at Two Nines (AKA: 99% or 1.68 hours downtime) and even when it's obvious, you still have to apply for service credits, which require you document the outages to the never-fulfillable satisfaction of the provider!.
We set our standards higher! For all your vCloud Compute and DRaaS workloads Five nines is our goal, and you will receive automatic remediation credit for your next month billing cycle for any availability less than that!Availability % | Level | Downtime per Month | VMsources Remediation/Credit | Big Cloud Remediation/Credit |
Below 95% | One Nine | Greater than 432 minutes | 100% of monthly charges | 30% of monthly charges |
Below 99.9% | Two Nines | Greater than 43.83 minutes | 100% of monthly charges | 10% of monthly charges |
99.9% | Three Nines | 43.83 minutes | 50% of monthly charges | 10% of monthly charges |
99.95% | Three Nines + | 21.92 minutes | 25% of monthly charges | 10% of monthly charges |
99.99% | Four Nines | 4.38 minutes | 10% of monthly charges | No Credit |
99.999% | Five Nines | 26.30 seconds | Goal |
Our Secure Cloud SLA applies to (scope) outages related to cloud infrastructure including Compute, Storage and Network components of your vCloud. Reasonable maintenance to be performed during mutually-agreed upon maintenance windows and outside of production hours, will not be factored into downtime calculations and will not result in remediation.
NOTE: Downtime that is the result of client-initiated Change Management, where that Change Management request was correctly implemented by VMsources will not be factored into Downtime.
NOTE: Services provided by vendors outside the scope of the vCloud SLA, such as ISP and Hosting facility, are covered directly by those vendors SLA, and remediation/credit will be provided as a direct pass-through from the vendor where and when justified.
Organizations need to enjoy complete trust with their vendors. We are so confident in the quality of our services that we are making a bold offer: 90 Days Free! Simply contact us for a quote and we'll get you set-up with 2160 hours of free services, including all of the Concierge support and assistance from the VMsources Team that we include for all of our clients.
Free DRaaS:Cloud Security relies on order, but that order must come from the intelligent application of principles and standards, as opposed to the endless creation of highly specific rules.
Let our team will assist your team in understanding the principals of ITSM Cloud Security and Vulnerability Management at a fundamental level.
Download our Intellegent Security PDF: View PDF
What we do to protect Secure Cloud | What we do to protect our Clients |
|
|