End Point Backup:
Backup for end point products are usually intended for end users
The process of reverting back from disaster state
Disaster Recovery Center
A software enabling multiple operating systems on the same hardware, Hypervisor enables to set up multiple operating systems on the physical server.
A management system developed to systematically reduce the environmental damages that are being or will be inflicted by the companies and eliminate these damages where possible.
Indicates the requirements for preparing, applying, operating, monitoring, reviewing, maintaining, protecting the necessary plans; getting prepared for reducing risks, and developing a documented method for recovering from catastrophic events for companies to enable business continuity.
Information Security Management System; it is a management system that is supported by the senior management, and it covers people, processes and information systems to ensure corporate information security. Designed to ensure sufficient and proportionate security checks and protects information assets and provides reliability to relevant parties. ISO 27001 Information Security Management System includes the corporate structure, policies, planning, liabilities, applications, procedures, processes and resources.
ISO/IEC 27031 is a standard specified in ISO 27001 Information Security Management and a guide for information and information technologies management and providing business continuity. It is aimed to sustain the service continuity over the information and communication infrastructure provided to the Business Units by the IT department tasked with the management of information and communication at standard private and government institutions.
Quality Management System: It is a world-wide accepted quality management system set out for increasing the customer satisfaction by fulfilling the customer expectations, needs and regulation requirements.
It is Information Technology Infrastructure Library utilized to ensure application of IT Service Management.
Level 2 Support:
Support level that provides solutions by analyzing the problems
It is the server that is built on the location where the current systems are. It maintains and routes the data before transferring to another location.
Managed Backup Program
Managed Disaster Recovery Program
Managed Infrastructure Program
Managed Network (Communication Infrastructure) Program
Managed Security Program
Before the data on the current environment are replicated to another environment, they are temporarily stored on a different server that is located where the data are being kept. This server sends the data to the destination location based on the bandwidth.
Official and exclusive legislations for IT Systems
The return point in backup and replication processes.
Recovery Point Objective
Recovery Time Objective
SAS 70 Type II:
It is a third party audit, report and verification standard prepared by American Institute of Certified Public Accountants (AICPA) for service organizations.
Attacks on the information technology systems of the companies, Internet activities of Companies/Individuals over the Internet with an intent to destroy and/or seize Personal/corporate data.
SLA Service Level Agreement:
An agreement defining the issues such as the quality, amount and delivery period of the services provided to the company by the Service Provider and issues such as delivery time, intervention and problem solving periods.
SAS 70 Standard is revised on June 15th, 2011 and became SSAE 16 standard.
Advanced Encryption Standard
SSL (Secure Sockets Layer):
SSL is a communication protocol developed in 1994. It allows encrypted sensitive data transfer between two computers over the Internet by using 128 or 256 bit encryption based on the utilized version.