Overview
Last updated: 01 June 2024
At Katana IT, we work hard to build what we call our “Recommended Technology Platform”.
We know that using products across this platform will give you a great platform to operate your business from and its essential for our SLA guarantees. We practice what we preach and use ALL of the services below to run our own networks.
Our engineers are trained in and keep up to date with technology across this core set of products to make sure that we can quickly, efficiently and expertly assist you with working with those products.
We also maintain a strong connection with these vendors so that we can call on their specific expertise when needed.
There are some Hardware and Software requirements that You need to have in place in order for Us to meet Our Service obligations. We will update this list from time to time as certain technologies age and other technologies are released and tested by us. If an item requiring support does not meet our Minimum Standards, it will be at our sole discretion whether we charge You for any time incurred for supporting that Item.
Endpoints
An Endpoint is any device that connects to your network that your staff uses, this includes but is not limited to Desktops, Laptops, Tablets, Mobile Phones, Printers, DVRs, etc.
- Windows 10 or 11 Professional
- Malwarebytes Enterprise Anti-Virus
- Vendor Supported Warranty or Care Pack
- HP or Lenovo Business grade Desktops or Laptops
All endpoints need to be running current, vendor supported software.
As some examples (Current as of June 2024):
- Windows 10 Professional Build 1903 and Above
- Android 8 and Above
- iOS 14 and Above
The hardware that the supported software also need to be supported by the vendor either by warranty (For example, laptops and desktops)or security patches (mobile devices, tablets).
The software needs to be correctly licensed and unmodified (I.e Rooting, Custom Firmware). The use of VPN software (Except for connecting to corporate assets OR required by vendors (example of Cisco VPN’s for working with the ATO) is not supported.
Any endpoints that are supported by us need to run adequate anti-malware systems, these systems are not to be modified by the end user and will be supplied by Katana IT. Endpoints will also run our Remote Management and Monitoring software to ensure adequate monitoring and patching.
Endpoints that are configured to access corporate file shares, should store all data their – local data is not included in any backups and file restoration is not guaranteed under any circumstances.
Networks
Your network includes your ISP, Network equipment and remote access configuration.
- Business Grade internet connection
- 4G Failover internet connection
- Dedicated Wireless Access points
- Watchguard Firewall
Each location we managed needs to be connected using a suitable ISP with a business grade connection, with a secondary 4G Failover connection. The connections will be managed by a Business grade Firewall device.
Wireless access will be managed by dedicated wireless access points. Any guest access required, will be done via a secured Guest wireless network that will be segregated from the rest of the network.
Infrustructure
Infrastructure includes your servers, UPS’, etc
- HP Proliant Servers
- Vendor Supported Warranty or Care Pack
- Windows Server 2016 or newer
All network equipment and servers are to be protected by a suitably sized UPS, the UPS needs to be either replaced or refurbished when the warranty expires to ensure maximum uptime in the event of a power outage and protection in the event of a power surge.
Servers require vendor warranty at all times to ensure fast service times in the event of a hardware failure. Servers and core network equipment need to be setup in a network cabinet, in a temperature controlled area to ensure hardware longevity.
Security
Security posture refers to an organization’s overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats.
Credentials to Workstations, Email accounts and other IT Service need to be random generated credentials (Credentials are not be re-used) and need to be stored in an encrypted medium. All systems capable of Two-Factor Authentication, need to be configured and used.
Workstations are to be password protected.
Users are to undergo security training to ensure that their security skills are kept up to date.
Contact Us
If you have any questions about these Terms, please contact us