Digital Forensics G-Cloud Service Definition

Size: px
Start display at page:

Download "Digital Forensics G-Cloud Service Definition"

Transcription

1 Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights

2 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology (GDIT) Limited Team s Digital Forensics services leverage our UK-based, accredited facilities, advanced technologies and court-certified expert witnesses to deliver a rapid IT incident response capability for any organisation. The GDIT Team has extensive experience supporting police, investigative agencies and Public Sector organisations. We continually update our tools, expertise and techniques to adapt to the evolving technological landscape. We can rapidly detect and limit the impacts of security breaches, whilst providing expert analysis and detailed recommendations that assist organisations in assuring systems, applications, information and cloud based operations are more effectively guarded from future theft, loss or misuse. Surrey Police Authority Leicestershire Trading Standards Service Includes The GDIT Team supplies ISO 9001, PRINCE2, ISO and ISO registered companies with experienced, accredited digital forensic staff. We provide a comprehensive range of digital forensic services, including analysis and investigation of computers, smart phones, tablets, satellite navigation units and other digital devices. Our IT forensic services include: Police Service of Northern Ireland US Federal Bureau of Investigation US Department of Homeland Security Seizing evidence in accordance with legal guidelines and in the most effective manner to maintain evidential weight and minimise disruption to the business Deploying specialist equipment to detect and prevent attempted system intrusions, breaches and unauthorised activity Analysing system information for evidence of breaches of security policy or laws Forensic readiness planning and reviews of organisational IT infrastructure to support forensic incident response Analysing software for malicious intent (malware) Reviewing, updating or drafting new incident handling standards or guidance Developing new forensic techniques and finding new applications for existing techniques Acting as an expert witness, where required Producing reports, metrics and dashboards Providing digital forensics and incident response service desk Data handling and validation Digital Forensics Services in conjunction with GDIT s Integrated Security Services provide a 360 view of threats and vulnerabilities through all facets of security. Please see our Integrated Security Services Catalogue entry for additional information.

3 2 Key Features and Benefits 3.9 million annual investment in staff professional development programmes delivers expert knowledge on the latest technological and cyber security trends to permit customers to better defend against attacks Formally trained forensic staff and accredited expert witnesses, certified in the latest tools and techniques for evidence gathering, to assure thorough, court-admissible digital forensic investigative results GDIT s Director of Cyber Security applies over 30 years of comprehensive Government security expertise to assure the quality and proficiency of our cyber security services Fully accredited, UK-based, security vetted (up to IL5-List X) facilities that rely on proven processes and an automated case management system to provide customers with a cost-efficient, completely secure and highly effective digital forensics service delivery model Court-accepted forensic tools and practices, along with our unique ability to develop bespoke tools that adhere to court-accepted processes, assure success even with new and emerging technologies Pricing Computer Forensic Analyst / Technician 700/ day Senior Forensic Analyst 930/ day Principal Forensic Expert 1,400/ day Our Principal Forensic Expert is an industry-recognised leader in their field capable of providing full advisory and consultancy services for the most challenging digital forensics problems. For the vast majority of customer incident response requirements, the services of the Senior Forensic Analyst and/or Computer Forensic Analyst/Technician deliver comprehensive, accurate results meeting all evidentiary requirements. For More information g-cloud@gdit.com +44 (0) General Dynamics is a 20 Billion/year, publicly listed corporation with almost 100,000 employees. We have been nominated to Forbes List of Best Managed Companies every year since the list s inception in We currently provide cyber security support to some of the largest, most sensitive and complex ICT environments in the world. Our status as a leader in the cyber security market allows us to attract and retain the best and brightest professionals in the field.

4 3 The GDIT Team offers a range of suitable pricing options, including: Fixed pricing per media type to be analysed Capped pricing per media type to be analysed Day rates that are pre-authorised using a forensic strategy process that provides an estimate of effort required to achieve the desired goals Our approach to forensic readiness planning is consultant led and includes the development of a forensic readiness plan that meets all the requirements for any organisation operating systems at Impact Level 2 or above. Our forensic readiness planning service prices start at just 2,900 based on our day rates. The GDIT Team also offers on-call digital forensic support that can be arranged with retainers from 290 per month to provide guaranteed service levels and rapid response support based on our day rates. This involves working with a client on a retained basis to provide forensic readiness consultancy as part of an overall approach to IT security incident management. The customer benefits from a guaranteed level of service and guaranteed availability of our expert services to respond to security incidents as they occur. Volume Discount- Volume discounts are available for longer-term engagements, retained services, customers seeking a recurring service on a regular basis, or large-scale efforts involving multiple consultants and will be discussed with potential customers on a case-by-case basis. Service Management The GDIT Team uses a proven service management approach that is specifically designed to fit our digital forensics market space. For each customer, we assign a dedicated Customer Relationship Manager who acts as the principle liaison between clients and our Service Delivery team, acting as the voice of the customer internally and the focal point for service reviews, meetings, and customer inquiries. The Customer Relationship Manager delivers an appropriate level of seniority and expertise for the size and complexity of the contract with the client. The GDIT Team builds customer coordination channels into the service support agreement as part of our on-boarding process and routinely maintains close coordination with our customers to ensure smooth service delivery throughout the term of the contract. These include designated communications and coordination processes for different types of incidents and forensic findings as well as for less specific customer discussions. The GDIT Team uses a comprehensive, integrated digital forensics case management system. This mature, thoroughly tested system enables efficient, comprehensive management of each submission in accordance with our standard operating procedures. We maintain a full record of each case on the system that integrates access to all exhibit details, chain of custody records, contemporaneous activity notes and interactions with exhibits right through to dispatch of exhibits and archiving of materials. The system is fully compliant with ISO and ISO standards and ensures all cases and digital forensic examinations are properly handled and tracked throughout the entire digital forensics service lifecycle.

5 4 Service Constraints The GDIT Service Delivery Model must ensure that proper legal authority exists for all work that we undertake. All services must comply with data protection, privacy, regulatory and statutory constraints within applicable jurisdictions for the incident under investigation. Service Levels The GDIT Team tailors the specifics of each Service Level Agreement (SLA) based on the specifics of each customer engagement. We can provide a range of appropriate service levels depending upon the client s requirements, logistical constraints and the technical feasibility of the requirements. Standard features of our SLAs include: Staffing: We warranty that all services will be performed by appropriately qualified and experienced staff. All staff are supervised by experienced and highly qualified seniors and managers, and all work is reviewed in line with our ISO 9001 standard operating procedures. Staff are tested for competence in each function they perform in line with the requirements for ISO We use only properly trained and certified staff with the proper technical knowledge of the technologies being examined and the tools being used. Service Hours: Our main laboratory operating hours are from 08:00 until 18:00 each weekday. We have the ability to provide 24/7 service using an emergency on-call, fully trained forensic analyst. Service Levels: For volume forensic analysis contracts, we typically provide service completion levels of 7, 14, 21 and 28 days for forensic analysis services, measured from the date of evidence collection. We can also provide more urgent services as required, including a 24 hour and 48 hour turnaround service. Financial Recompense Model for Not Meeting Service Levels The GDIT Team has assisted many organisations with large volumes of case work, operating to the most demanding timescales. We have handled over 3,000 cases, involving many thousands of digital forensic examinations and have never failed to meet our service level targets with any contractual clients. Performance is measured against defined service level warranties which are included in the SLAs. The GDIT Team s sole and exclusive obligation and Customer sole and exclusive remedy for failure to meet the specified service levels shall be limited to the payment of Service Credit(s). The definition and payable amount of a Service Credit is also contained in the SLA. Specific recompense models can be negotiated during the initial customer engagement and formalised as part of our on-boarding process. Ordering and Invoice Process GDIT will require an authorised Call-Off Agreement or work order from the customer covering the full value of the services required. GDIT will invoice as agreed in the Call-Off Agreement. This may be on the achievement of key deliverables, at regular intervals or stages in the service or upon completion of the service to be determined with the customer on a service by service basis. All invoices will be issued in electronic or paper format to the address designated by the customer. Payment of invoices must be made within 30 days of issue and by BACS.

6 5 Termination Terms Termination clauses and terms exist for all of our services and are fully described in the Supplier Terms for Digital Forensics. pdf document. These include termination fees where the customer terminates services for their convenience prior to the end of the complete term of the contract. There is no cost for normal termination of services at the end of the contracted period. Any normal activities associated with termination as part of our standard off-boarding process do not incur any additional fees. Customer Responsibilities Customers are responsible for proper evidence handling and preservation techniques when an incident is first discovered. This is essential in order to permit digital forensics experts to properly gather and extract that evidence in line with ACPO and other guidelines where digital forensics are required to support criminal or civil actions. Optional training is available on proper IT forensic evidence collection and handling techniques that may assist organisations in enhancing their incident handling, investigative and response processes. Data Storage and Processing Locations All our digital forensics facilities are located within the United Kingdom and are court-approved for evidence handling and storage. All evidence processing is done using appropriately vetted and experienced UK citizens.

7 Cottons Centre Cottons Lane London, SE1 2QG Tel. +44 (0)

Email Router and Vetting G-Cloud Service Definition

Email Router and Vetting G-Cloud Service Definition Email Router and Vetting G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved 1 In partnership with Government and industry-leading technology partners, General

More information

Cyber Security Solutions

Cyber Security Solutions Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS

SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS Cyber Security Overview About FDM Management Structure Relating to this Offering Your Responsibilities Other Key Points Relating to this Offering SFIA

More information

ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: 0207 444 4080 Email: G-Cloud@esynergy-solutions.co.

ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: 0207 444 4080 Email: G-Cloud@esynergy-solutions.co. ediscovery G-Cloud V Service Definition Lot 4 SCS Tender Validity Period: 120 days from 10/04/14 Contact us: Danielle Pratt Email: G-Cloud@esynergy-solutions.co.uk Contents About... 1 Specialist Cloud

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

IPL Service Definition - Data Recovery, Conversion and Migration

IPL Service Definition - Data Recovery, Conversion and Migration IPL Proposal IPL Service Definition - Data Recovery, Conversion and Migration Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 10 IPL Information Processing Limited

More information

Growth Through Excellence

Growth Through Excellence Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...

More information

Bespoke Cloud Software and Web Application Development

Bespoke Cloud Software and Web Application Development G-Cloud: Special Cloud Services (Lot 4) Service Definition Bespoke Cloud Software and Web Application Development 17 th September 2013 Version 1 Contact: John Wiseman STCS Limited Gear House Saltmeadows

More information

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to support

More information

CASSIDIAN CYBERSECURITY

CASSIDIAN CYBERSECURITY CASSIDIAN CYBERSECURITY ADVANCED PERSISTENT THREAT (APT) SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something no organisation can afford

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

PSN Protective Monitoring. Service Definition

PSN Protective Monitoring. Service Definition PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating

More information

Deloitte Service Code: D-G6-L4-543 December 2014

Deloitte Service Code: D-G6-L4-543 December 2014 Managed Cyber Security Cyber Intelligence Centre Deloitte LLP Service Deloitte Service Code: D-G6-L4-543 December 2014 Contents 1 Service Overview 1 2 Detailed Service Definition 2 3 Pricing 6 4 Ordering

More information

Email as a Service - Microsoft Exchange G-Cloud Service Definition

Email as a Service - Microsoft Exchange G-Cloud Service Definition Email as a Service - Microsoft Exchange G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved In partnership with Government, General Dynamics Information Technology

More information

Security Consultants / Security Managed Services

Security Consultants / Security Managed Services Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING

More information

Data Warehousing, Systems Integration and Data Migrations (Lot 3)

Data Warehousing, Systems Integration and Data Migrations (Lot 3) Data Warehousing, Systems Integration and Data Migrations (Lot 3) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 2 2. SERVICE OVERVIEW... 3 3. SERVICE FEATURES... 4 4. ON-BOARDING AND SERVICE

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open Cloud Enablement Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part

More information

Firewall Administration and Management

Firewall Administration and Management Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall

More information

D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV

D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 4 3 Commercials 8 4 Our

More information

SmartImpact MS Dynamics CRM. Support Service Definition

SmartImpact MS Dynamics CRM. Support Service Definition SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: info@smartimpact.co.uk http://www.smartimpact.co.uk/

More information

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014 KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition

More information

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our

More information

Customer Relationship Management Software Package G-Cloud Service Definition

Customer Relationship Management Software Package G-Cloud Service Definition Customer Relationship Management Software Package G-Cloud Service Definition 2014 General Dynamics Information Technology. All rights reserved 1 Delivering consistent multi-channel (telephony, e-mail,

More information

BOARD OF GOVERNORS MEETING JUNE 25, 2014

BOARD OF GOVERNORS MEETING JUNE 25, 2014 CYBER RISK UPDATE BOARD OF GOVERNORS MEETING JUNE 25, 2014 EXECUTIVE SUMMARY Cyber risk has become a major threat to organizations around the world, as highlighted in several well-publicized data breaches

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open Cloud Enablement Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no part of this

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Log and Refer Service Desk IL0. September 2013

Log and Refer Service Desk IL0. September 2013 Log and Refer Service Desk IL0 September 2013 TABLE OF CONTENTS 1 Service Overview... 3 2 Why Capgemini?... 5 3 The Capgemini Proposition... 6 3.1 Approach... 7 4 Benefits... 9 4.1 Summary of Proposition...

More information

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015 OCTOBER 3, 2015 MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 607 Milton Keynes Business Centre Hayley Court, Linford Wood, Milton Keynes. MK14 6gD Table of Contents 1 Introduction 4 1.1 Executive

More information

G Cloud 6. Service Definition: Platform as a Service (PaaS)

G Cloud 6. Service Definition: Platform as a Service (PaaS) G Cloud 6 Service Definition: Platform as a Service (PaaS) Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing

More information

Informed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition

Informed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition Informed Solutions InformedINSIGHT Big Data V1.0.0 **PROTECT COMMERCIAL** London 11 Old Queen Street, Westminster, London, SW1H 9JA, UK Tel: +44(0)20 3042 2000 Fax: +44(0)20 3042 2015 www.informed.com

More information

IBM G-Cloud Application Systems Management as a Service

IBM G-Cloud Application Systems Management as a Service IBM G-Cloud Application Systems Management as a Service Service Definition 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Systems Management

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services G-Cloud Service Definition Atos SI Oracle CRM and CX Services Atos SI Oracle CRM and CX Services SCS Atos provides a range of expert Customer Relationship Management (CRM) and Customer Experience (CX)

More information

Lima Law Enforcement Edition

Lima Law Enforcement Edition Lima Law Enforcement Edition A Complete Working Environment for any Forensic Organization The Lima Modules The Lima Law Enforcement software solution consists of a number of modules allowing full case

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

INFORMATION SECURITY TESTING

INFORMATION SECURITY TESTING INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.

More information

Spyders Managed Security Services

Spyders Managed Security Services Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built

More information

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1 Cloud Brokerage G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service management

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services Service Management and ICT Monitoring and Reporting Advisory and Implementation Services G-Cloud Service 1 1. An overview of the G-Cloud Service Arcus can assist you with a review and advice on the effectiveness

More information

PTS Service Definition Document. G-Cloud 7. IT Service Continuity Management

PTS Service Definition Document. G-Cloud 7. IT Service Continuity Management PTS Service Definition Document G-Cloud 7 IT Service Continuity Management PTS Consulting Partners LLP 2015 The contents of this document must not be reproduced (wholly or in part) used or disclosed without

More information

Audit Management. service definition document

Audit Management. service definition document Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service

More information

Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.

Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes. Security Overview A guide to data security at AIMES Data Centres www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.net Page 1 of 10 Contents I. Protecting our clients data...2 II. Information

More information

Big Data Analytics Service Definition G-Cloud 7

Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated

More information

CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi

CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi CenturyLink IT Consulting Services G-Cloud 6 - SCS REFERENCE NUMBER RM1557vi Overview of the Service (functional and non-functional) IT Consulting Services CenturyLink's Solutions Consulting delivers customised

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

G-Cloud Service Definition. Atos Call Centre Services SCS

G-Cloud Service Definition. Atos Call Centre Services SCS G-Cloud Service Definition Atos Call Centre Services SCS Atos Call Centre Services SCS Summary Atos SIAM Service Desk is designed to provide a core part of the SIAM Tower model for ICT delivery. This service

More information

G-Cloud Service Definition. Atos SharePoint Development Service

G-Cloud Service Definition. Atos SharePoint Development Service G-Cloud Service Definition Atos SharePoint Development Service SharePoint Development Services SCS A comprehensive electronic document and records management, collaboration or web content management solution

More information

The Cadence Partnership Service Definition

The Cadence Partnership Service Definition The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues

More information

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Vodafone Private Cloud

Vodafone Private Cloud Vodafone Private Cloud Overview Vodafone Private Cloud is our dedicated public sector cloud service that connects you to your own private IL2/IL3 network and / or core government networks, including the

More information

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition GPS G-Cloud Lot 4: Contents 1 Introduction... 3 2 Service... 4 2.1 Cloud Consultancy Overview... 4 2.2 Information assurance... 5 2.3 Backup/Restore and Disaster Recovery... 6 2.4 On-boarding and Off-boarding...

More information

FM & SECURITY SOLUTIONS. SSS Managed Services. Impartial, innovative, involved

FM & SECURITY SOLUTIONS. SSS Managed Services. Impartial, innovative, involved FM & SECURITY SOLUTIONS SSS Managed Services Impartial, innovative, involved SSS MANAGED SERVICES INTRODUCTION SSS Managed Services provides a range of flexible, scalable and service-led solutions for

More information

IPL Service Definition - Data Quality

IPL Service Definition - Data Quality IPL Proposal V1 April 2014 Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 11 IPL Information Processing Limited 2014 Contents 1. Service - Data Quality 3 1.1.

More information

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes

More information

Our consultancy team will provide guidance throughout the process helping you to produce the necessary documentation and raise staff awareness.

Our consultancy team will provide guidance throughout the process helping you to produce the necessary documentation and raise staff awareness. Service Definition Business Continuity Plan Overview of Service Sapphire provides a bespoke service, working with your organisation to develop a comprehensive Business Continuity Plan (BCP) designed to

More information

Information Security Incident Management Policy and Procedure

Information Security Incident Management Policy and Procedure Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

STL Microsoft SharePoint Consulting and Support Services

STL Microsoft SharePoint Consulting and Support Services STL Microsoft SharePoint Consulting and Support Services STL Technologies Equis House Eastern Way Bury St Edmunds Suffolk IP32 7AB Service Description and Pricing Specialist Cloud Services www.stl.co.uk

More information

Applications and Solutions Architecture Cloud Services

Applications and Solutions Architecture Cloud Services Applications and Solutions Architecture Cloud Services G-Cloud IV Service Definition Lot 4 - SCS Contact us: Danielle Pratt Email: G-Cloud@esynergy-solutions.co.uk About is a leading provider of IT Consultancy

More information

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Commercial in Confidence 1 G-CLOUD III FRAMEWORK SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Capita Division / Supplier: Capita Business Services Ltd powered by SkyScape Service Name: Document

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

G Cloud III Framework Lot 4 (SCS) Project Management

G Cloud III Framework Lot 4 (SCS) Project Management G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT

More information

The Challenge with Innovative Learning. Recognising the Challenge. Partnership self directed learning communication learning support

The Challenge with Innovative Learning. Recognising the Challenge. Partnership self directed learning communication learning support Learning Services Our Learning Services team works in close partnership with our clients. We combine our expertise in instructional design, learning technologies and project management to analyse learner

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS is powered

More information

IPL Service Definition - Master Data Management for Cloud Related Services

IPL Service Definition - Master Data Management for Cloud Related Services IPL Proposal April 2014 IPL Service Definition - Master Data Management for Cloud Related Services Project: Date: 10 April 2014 Issue Number: Customer: Crown Commercial Service Page 1 of 11 IPL Information

More information

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification G-Cloud Service Description Atos: Cloud Professional Services: Requirements Specification Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Contents Service Definition... 3 An overview of the Remote Backup as a Service... 3 Key Service Attributes... 4 Information assurance... 5 Details of the level

More information

End-User Remote Support and Helpdesk Services

End-User Remote Support and Helpdesk Services End-User Remote Support and Helpdesk Services A single contact point for support needs G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Contacting the Service Desk... 3 Management Reports...

More information

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2. Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments

More information

THE WORLD IS MOVING FAST, SECURITY FASTER.

THE WORLD IS MOVING FAST, SECURITY FASTER. THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview Description C Service Overview G- Cloud Specialist Cloud Services Security and Penetration Testing This document provides a description of TVS s Security and Penetration Testing Service offered under the

More information

G-Cloud Service Definition. Atos Oracle Database Upgrade

G-Cloud Service Definition. Atos Oracle Database Upgrade G-Cloud Service Definition Atos Oracle Database Upgrade Database Upgrade for SCS While providing a technical database upgrade facility, Atos also assist organisations in maximising the benefits from the

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

Overview. Service Description: BCP & DR Strategy (L6)

Overview. Service Description: BCP & DR Strategy (L6) Service Description: BCP & DR Strategy (L6) Government Enterprise Architecture Specialists T: 07966 457 571 E: peter@vision-ist.net Overview Visionist will help your organisation develop a Business Continuity

More information

Information Security Management System (ISMS) Policy

Information Security Management System (ISMS) Policy Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

UoD IT Job Description

UoD IT Job Description UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management

More information

GCloud Application Development Service Definition. Application Development

GCloud Application Development Service Definition. Application Development GCloud Service Definition GCloud Service Definition Contents 1.... 3 1.1. Overview... 3 1.2. Information Assurance... 6 1.3. Backup / Restore / Disaster Recovery... 6 1.4. On-boarding and Off-boarding

More information