27 there are elements of the managed security

Info icon This preview shows pages 2–4. Sign up to view the full content.

View Full Document Right Arrow Icon
2.7 There are elements of the Managed Security Services that we can only provide if you have certain devices, applications or services. If you don’t have the minimum requirements needed for the service you want to acquire, we can’t provide that service to you. We’ll tell you the minimum requirements on request. 2.8 The Managed Security Services aren’t available to Telstra wholesale customers or for resale. 3 WHAT IS SECURITY MONITORING? 3.1 The Security Monitoring service comprises the following three bundled services: TELSTRA CORPORATION LIMITED (ABN 33 051 775 556) | Managed Security Services Section was last changed on 24 August 2017 | TELSTRA UNRESTRICTED PAGE 2 OF 36
Image of page 2

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
OUR CUSTOMER TERMS MANAGED SECURITY SERVICES SECTION (a) logging – this service stores the log and event data we receive from you; (b) event monitoring, correlation and classification – this service monitors logs and events for Incidents; and (c) Incident notification – this service provides notification of Incidents and may include rating of these Incidents. How we provide Security Monitoring and what you must do 3.2 We provide the Security Monitoring service: (a) using shared infrastructure and the public cloud, unless we otherwise think it’s appropriate to use dedicated infrastructure; and (b) through a method between your infrastructure and our infrastructure that we will confirm to you on request. 3.3 To receive the Security Monitoring service, you must at your own cost: (a) separately obtain an appropriate carriage service from us; (b) ensure the term of that carriage service does not end before the term of your Security Monitoring service; and (c) complete changes to your network and resources as we require from time to time to allow log and event data to be passed to us from your infrastructure to our infrastructure using a means that we require. 3.4 Each element of the Security Monitoring service comprises one or more stages, depending on the service: (a) the first stage is provided on a once-off basis at the start of your service; (b) the second stage is provided on an ongoing basis during the term, once the first stage is completed; and (c) the third stage is provided periodically during the term as we think necessary. Service First stage Second stage Third stage Logging Design the network connectivity to our infrastructure. Configure our infrastructure and create the required VPN tunnel to your infrastructure. Capture your logs and events, often in near real time where we think necessary. Store your log data in a secure environment. Provide access to your log data via the Telstra Security Portal. N/A Event monitoring, correlation and classification On-board the platform to accept your log and event data. Correlate and classify your Security Events.
Image of page 3
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern