COMPANY PROFILE. About Cox & Kings Global

Size: px
Start display at page:

Download "COMPANY PROFILE. About Cox & Kings Global"

Transcription

1 assion or xcellence

2 PASSION FOR

3 COMPANY PROFILE About Cox & Kings Global Cox & Kings Global Services (formerly known as Quoprro Global Services) was incorporated in 2008 & is a 100% subsidiary of the Cox & Kings Group. Cox & Kings Ltd (CKL) was established in 1758 & is the oldest travel company in the world. CKL is a public limited company with an annual turnover of USD 900 million. Cox & Kings Global Service (CKGS) is a specialist business process outsource agency which focuses on serving consular section of diplomatic missions. We render services by providing administrative support & managing non-judgmental tasks related to the entire lifecycle of a Visa, Passport & Consular application process, hence enabling missions to focus on the key tasks of adjudication. As a core business, the organization is extremely well placed to address the need of the Diplomatic missions Worldwide & focuses on addressing the concerns regarding security, integrity, speed & efficacy on the outsourced solution of the business. CKGS has its corporate office in Mumbai (India) with regional offices in Beijing, Dubai, London, Lagos & New Delhi & is in the process of establishing its offices in Washington DC & Moscow. Cox & Kings is lead by an experienced management group that has worked & has been associated with the outsourcing industry for many years & possess skill sets, expertise & vision to continue to expand the business through innovation. We value the skills, strengths & perspectives of our diverse team which holds high level domain expertise & IT literacy in the business of outsourcing. We believe training is an important tool for innovation, learning new concepts, motivation & retention. Training is physically, socially, intellectually & mentally an essential component in facilitating not only the level of productivity but also the development of personnel in our organization. Our recruitment is carried out through stringent background checks which include employment reference, character reference, gap in employment history, identity & address verification, criminal history report & medical, mental & physiological evaluation. EXCELLENCE

4 OUR SERVICES Dissemination of Information Pre Scrutiny of application Acceptance of application Data Management Biometric Enrollment Data Management Scheduling of Interviews / Appointments Document Tracking Return of Document Dissemination of Information We understand the importance of disseminating essential & accurate information to the applicants. Hence we provide information through: Dedicated multilingual website for missions Personal Assistance across counter Dedicated Contact Centre Live Chat PASSION FOR

5 EXCELLENCE

6 PASSION FOR

7 Pre Scrutiny of application CKGS conducts a thorough scrutiny of applications & documents before accepting. The documents are scrutinized by our well trained customer service officers. Our officers check the documents as per the checklist provided by the mission & strictly adhere to the CKGS standard operating procedures. Acceptance of Application at Our Service Centres We provide dedicated service centres & option for joint service centres to our client missions. Our centres are easily accessible to general public & are friendly to differently able people. We possess the expertise of collecting the applications over the counter, online & via post or through CKGS kiosks. CKGS follows a transparent process of collection of application, hence we provide a copy of the check list mentioning the documents collected to the applicants. Fee Handling CKGS collects the fee on behalf of the mission & issues clear, detail & bar-coded receipt to the applicants. We also offer various channels of payment, such as debit card, electronic fund transfer, banker s cheque, bank collection etc depending on the geographical location. Clear audit trail reports are sent to the mission on daily basis. We offer missions to customize & view the reports online through dedicated CKGS web portal. Biomentric Enrollment CKGS possess the capability of providing biometric solution to the missions. Digital photographs & finger prints are captured in accordance with the international standards set by International Civil Aviation Organisation. The fingerprints are collected digitally in the order of No biometric data regarding visa applicants of any nature is retained on any local electronic media. The entire process of collecting biometric data is monitored & recorded on CCTV cameras. The mission can view the live video of the centres through IP enabled cameras. The footage from all the cameras is stored for 3 months & then archived. The biometric data which is captured is transferred real time, subject to approved method of data transfer in accordance to the local laws. EXCELLENCE

8 Data Management service We understand the importance of data integrity & security, therefore we provide customized data management solution to diplomatic missions. We offer digitization of data & electronic storage for future reference & retrieval. Our data management service is driven by a well-developed suite of disciplined, structured - quantity processes - all wrapped within a strong data privacy & security envelope. Scheduling of Interviews / Appointments A smart web based Interviews / appointment scheduling software has been designed to help better utilization of time & to exert minimum effort. Through this integrated flexible module based on assessment criteria provided by missions, scheduling of interview / appointment can be done online & offline with measures to alert for duplication. The interview / appointment scheduling module designed to facilitate the mission to create / amend queues, visa categories, time band, weekly offs & public holidays. The appointment scheduling module is designed to be implemented as a standalone system as per the requisite of the mission. Document Tracking CKGS provides complete document tracking solutions through web based passport tracking module. Each movement of passport is tracked & traced through unique barcode system through this module. We are in the process of integrating the RFID technology with our system, which will ensure faster & accurate tracking of information through process lifecycle. Return of Documents CKGS collects the processed documents in a secured & safe manner from the mission as per the agreed schedule. All documents / passports are returned to the applicants in sealed envelopes provided by CKGS. As an option applicants can also choose to have documents / passports delivered to them through courier or it can be collected across the counter. CKGS possess the capabilities of providing the same day return of passports subject to the requirements & guidelines provided by the missions. PASSION FOR

9 EXCELLENCE

10 PASSION FOR

11 TECHNOLOGY CKGS has adopted state of the art technology to implement cutting-edge process to render seamless services to diplomatic missions. Thus enabling us to fill the imperative need to extend our scope through specific technological solutions. We are extremely sensitive to our clients concerns of security & protection of data. As our core competency, we are well placed to address the need of information security & data protection while focusing & addressing the concerns regarding security, integrity, seamless processes & efficacy of the outsourced solution of the business. The foundation of our strength is built on competitive telecommunication, well-developed technology & a team with high level of IT proficiency. The wide span of our expertise across myriad technologies & platforms enable us to handle all kind of IT requirement in present & future environments. We possess excellent domain knowledge & experience in providing technical solutions to diplomatic missions. Our level 1 technical support leverages benefits of our robust infrastructure & our technical and IT expertise. Our application consists of a comprehensive Base System that can be quickly configured as per the unique & customized requirement of the mission. Therefore, obviating the need to develop a new system from scratch whenever any mission outsources services to CKGS. Each mission in the country of deployment will include individual hardware and database servers to host & access the application & the data generated there off, thus ensuring complete data security. We have a 24 X 7 held desk that provides complete customized support solutions including, Multi-channel support solution: voice, , chat, web Enabling tools: CRM, Knowledge base, Remote diagnostics EXCELLENCE

12 BIOMETRICS Being patrons of the technology ourselves, we possess the capability to cover both the behavioral & physical aspects of biometrics. Our biometric solution covers various types of biometric techniques being deployed. CKGS biometric data capture process uses fingerprints & photograph as primary biometric identifiers. This is in addition to alphanumeric data on the visa application & identification of visa applicants. The system is designed to facilitate visa issuing procedure. Our Management information system & its performance such as analysis of risks involved, audit reporting, operational compliance reporting, vulnerability identification, ability to carry out manual data inspection, security surveillance systems & investigation workflow. We offer to perform biometric data captures strictly under prescribed format which involves installing the biometric scanners, still camera for biometric pictures, biometric sensor, appropriate background, minimum threshold quality of 99.6%. Biometric services is managed by a trained & dedicated team, at highly secured biometric booths with transfer data on real time basis & security surveillance recording for every applicant. PASSION FOR

13 EXCELLENCE

14 PASSION FOR

15 QUALITY We believe that evolution of operational procedures is a continuous process; hence, as a policy we conduct regular internal audits to ensure adherence, corrections & evaluate possible enhancements. We are a Quality Management system ISO 9001:2008 certified organization. Hence, we follow strict operational & quality control procedures of international standards. CKGS Quality Frame Work Undefined processess & scattered information Best Practice Templates Sigma Flow Toolkit Replicate proven projects & processes Define Improve Adopt Process Maps (Current) To-Be Process Maps (Improved) Proposed Changes Communicate & Collaborate Sustain Replicate Measure & Control EXCELLENCE

16 INFORMATION SECURITY CKGS has a zero tolerance policy to any incident related to breach of information security. Our prime focus is to secure information, for which we have invested in people & technology & have formulated secure policies & processes. These policies & processes are followed strictly & audited regularly. PROTECTING SYSTEMS DATA People Control Training for staff Security Awareness for staff Regular alerts Via PREVENTING UNAUTHORIZED ACCESS MALICIOUS ATTACKS Process Control Policies, Procedures & Guidelines Audits Risk Assessment SOPs Technology Control Fire Wall Restriction Virtual Private Networks Application & data Security Tiered Architecture Centralised Anti Virus solution Disaster Recovery (DR) CKGS has developed detailed policies & processes to manage disaster recovery. We have put in place control measures which enable prevent, detect & restore events respectively. As a strategy we have implemented certain measures such as deploying SAN (storage area network) technology. Therefore, enabling replication of data to an off-site location, which overcomes the need to restore the data (only the systems then need to be restored or synchronized). High availability systems which keep both the data & systems replicated off- site, enabling continuous access to systems & data. We use an outsourced disaster recovery provider to provide a stand-by site & systems rather than using our own remote facilities. CKGS has implemented precautionary measures which include local mirrors of systems, surge protection, deployment of uninterrupted power supply equipments, fire prevention measures & anti-virus software etc. PASSION FOR

17 EXCELLENCE

18 OUR CUSTOMER Missions We Serve Country of Operation Indian High Commission Singapore The Consulate General of India Hong Kong The Embassy of India Greece The Embassy / Consulate General of India Germany Dubai Visa India High Commission of Malaysia India High Commission of Singapore India PASSION FOR

19 EXCELLENCE

20 Corporate Office: Cox & Kings Global Services 504, 5th Floor, Antariksh Thakur House, Marol Makawana Road, Andheri (East), Mumbai , India. Tel: Fax:

System Security. Your data security is always our top priority

System Security. Your data security is always our top priority Your data security is always our top priority Data security is an important factor for every client, our continued investment in the latest technology methods and world class data centres show our commitment

More information

<cloud> Secure Hosting Services

<cloud> Secure Hosting Services Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for

More information

Privacy + Security + Integrity

Privacy + Security + Integrity Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

CampusXone. Campus Placement. Redefined. www.campusxone.com

CampusXone. Campus Placement. Redefined. www.campusxone.com Campus Placement. Redefined. Campus Placement. Redefined. Managing Campus placements online is the new trend in HR practices gaining considerable ground across different organizations. Finding an extended

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

An Approach to Records Management Audit

An Approach to Records Management Audit An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION

More information

Enterprise Storage Solutions and Services

Enterprise Storage Solutions and Services making IT happen Information Management Made Simple Enterprise Storage Solutions and Services NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka

More information

SAS 70 Type II Audits

SAS 70 Type II Audits Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

Company Overview. Enterprise Cloud Solutions

Company Overview. Enterprise Cloud Solutions 2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing

More information

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Loveurope Online Operating Platform (LOOP)

Loveurope Online Operating Platform (LOOP) Loveurope Online Operating Platform (LOOP) The Loveurope Online Operating Platform (LOOP) is our central client MIS portal. Standard functionality and features are offered to all contracted clients as

More information

Corporate Presentation

Corporate Presentation Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

RESEARCH SUMMARY: Security and Data Privacy Best Practices in Offshoring By neoit

RESEARCH SUMMARY: Security and Data Privacy Best Practices in Offshoring By neoit Offshore Insights White Paper www.neoit.com September 2003 Issue 12 RESEARCH SUMMARY: By neoit How can you mitigate security risks while offshoring? How will a third party security organization help in

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Pay As You Go, File System Archiving and Storage

Pay As You Go, File System Archiving and Storage Pay-as-you-go ILM Service Pay-as-you-go email & file system data archiving for business Secure business data through automated backup and restore Pay-as-you-go ILM Service Take control of your data don

More information

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Biometric Systems Biometrics

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Managed Desktop Support Services

Managed Desktop Support Services managed enterprise technologies Managed Desktop Support Services MET Managed Desktop Support Service Most organisations spend lots of time and money trying to manage complex desktop environments and worrying

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

AVANTGARD Hosting and Managed Services

AVANTGARD Hosting and Managed Services AVANTGARD Hosting and Managed Services AVANTGARD HOSTING AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and industry leading

More information

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests. THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

GREAT EASTERN TECHNOLOGY BPO / ITES

GREAT EASTERN TECHNOLOGY BPO / ITES GREAT EASTERN TECHNOLOGY BPO / ITES BPO/ITES About Great Eastern Technology 1 IT Enabled Services 2 Outsourcing to Great Eastern Technology 3 Core Values & Differen ators 4 BPO Por olio 5 Physical & Data

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Evaluation of Technical Bids- Grading companies giving marks

Evaluation of Technical Bids- Grading companies giving marks Evaluation of Technical Bids- Grading companies giving marks Annexure E Note for evaluation of the Technical Bids i) The detailed evaluation proforma is to ensure that the RFP has been fully responded

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Disaster Recovery Plan (Business Continuity) Template

Disaster Recovery Plan (Business Continuity) Template Brochure More information from http://www.researchandmarkets.com/reports/2786932/ Disaster Recovery Plan (Business Continuity) Template Description: The Disaster Planning Template is over 200 pages and

More information

Document control for sensitive company information and large complex projects.

Document control for sensitive company information and large complex projects. Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive

More information

TOGETHER WE CAN DO MORE

TOGETHER WE CAN DO MORE B3System S.A. is a leading provider of IT system and service management solutions ensuring optimized IT infrastructure performance, availability and security within businesses. The company has been operating

More information

REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM

REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM On a Mission to Transform Talent REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM Table of Contents Module 1: Introduction to Hardware and Networking (Duration: 1.5 Weeks)...1 Module 2: Windows XP Professional

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

AVANTGARD Private Cloud and Managed Services

AVANTGARD Private Cloud and Managed Services AVANTGARD Private Cloud and Managed Services AVANTGARD PRIVATE CLOUD AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Security and Data Center Overview

Security and Data Center Overview Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Data Centre Services. Secure management of business critical data and systems

Data Centre Services. Secure management of business critical data and systems Data Centre Services Secure management of business critical data and systems DATA CE Many businesses house their valuable and sensitive IT infrastructure within expensive and inadequate floor space where

More information

Datacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk

Datacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. At we own and manage 30,000 square feet of highly available, geographically diverse

More information

Technology applied to the most innovative and demanding sectors of the market.

Technology applied to the most innovative and demanding sectors of the market. STE is an Italian medium sized private Systems Integration Company leader in Information and Communication Technology applied to the most innovative and demanding sectors of the market. Established on

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Readymade SharePoint Apps

Readymade SharePoint Apps www.adapt-india.com Adapt will help you discover the ultimate value behind your SharePoint investment, which is, how it can work with your existing environment and beyond. Adapt brings a unique blend of

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

Cloud-Based Project Information Management from Aconex: A Guide for IT Professionals

Cloud-Based Project Information Management from Aconex: A Guide for IT Professionals Cloud-Based Project Information Management from Aconex: A Guide for IT Professionals Adopting an Aconex SaaS Solution It s the job of CIOs and IT managers to ensure that their organizations adopt secure

More information

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation Scalable Solutions for a Shared IT Infrastructure Global and domestic competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building

More information

Your Infrastructure. Our Responsibility.

Your Infrastructure. Our Responsibility. Know Us The SRM group is four decades old multi-million dollar business house currently operational in 15 cities worldwide. SRM group has made its presence felt in education, training, Electronics, Technology,

More information

In this Profile. USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: marketing.citi@cominfosys.com

In this Profile. USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: marketing.citi@cominfosys.com In this Profile USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: marketing.citi@cominfosys.com Israel Tel: +972-3-766-4119 Fax: +972-3-766-4747 E-mail: marketing@icominfosys.com About Comverse Infosys

More information

The imanager Appliance is a voice trading platform for SME trading groups. Simian Display - Orangutan

The imanager Appliance is a voice trading platform for SME trading groups. Simian Display - Orangutan The imanager Appliance is a voice trading platform for SME trading groups Simian Display - Orangutan Growing firms need the right tools to accomplish their goals. The imanager appliances support these

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Tata Communications Data Protection Services. Fully integrated and comprehensive solution for agile, efficient future-proof businesses

Tata Communications Data Protection Services. Fully integrated and comprehensive solution for agile, efficient future-proof businesses Data Protection Services Fully integrated and comprehensive solution for agile, efficient future-proof businesses www.tatacommunications.com/enterprise/datacenter The loss of critical data puts businesses

More information

WORLD-CLASS SECURITY, MANAGEMENT & EXPERTISE

WORLD-CLASS SECURITY, MANAGEMENT & EXPERTISE WORLD-CLASS SECURITY, MANAGEMENT & EXPERTISE Christie s Fine Art Storage Services (CFASS) is the world s premier provider of climate-controlled high-security storage for fine art, antiques and collectibles.

More information

BSNL IDC Hosted Firewall Service. Total Network Security

BSNL IDC Hosted Firewall Service. Total Network Security Total Network Security Advantage BSNL IDC India s first Uptime Institute Certified Tier-III data centres with combined connectivity and IT services availability from BSNL Low latency Internet Data Centres

More information

NetSuite Data Center Fact Sheet

NetSuite Data Center Fact Sheet NetSuite Data Center Fact Sheet Enterprise-Class Data Management, Security, Performance and Availability NetSuite is the world s largest cloud ERP vendor, supporting over 20,000 organizations, processing

More information

Bartech Data Systems Pvt. Ltd. www.bartechdata.net

Bartech Data Systems Pvt. Ltd. www.bartechdata.net Bartech Data Systems Pvt. Ltd. www.bartechdata.net Introduces - Complete Global Barcode Track & Trace Solutions [Version XII] Bartech s O R B I S, is an advanced Software Technology, for harmonizing all

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

JOB DESCRIPTION CONTRACTUAL POSITION

JOB DESCRIPTION CONTRACTUAL POSITION Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical

More information

The imanager Appliance is a voice trading platform for SME trading groups. Simian Display - Orangutan

The imanager Appliance is a voice trading platform for SME trading groups. Simian Display - Orangutan The imanager Appliance is a voice trading platform for SME trading groups Simian Display - Orangutan The imanager S920 Appliance provides a full iseries trading platform on a single server, including the

More information

Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC)

Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Department of Information Technology, Govt. of India, Electronics Niketan, New Delhi 110 003. 1.0 Preamble 1.1

More information

About Injazat Data Systems

About Injazat Data Systems About Injazat Data Systems Injazat Data Systems is an industry-recognized market leader in the region for secure and business-aligned IT services. Injazat serves a diverse variety of industry sectors,

More information

Disaster Recovery Business Continuity Premium Edition

Disaster Recovery Business Continuity Premium Edition Brochure More information from http://www.researchandmarkets.com/reports/2787481/ Disaster Recovery Business Continuity Premium Edition Description: The Disaster Recovery Plan (DRP) Template PREMIUM Edition

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

Recruitment forecasting. Employer branding. Sourcing strategies. Selection processes. Assessment methodologies. On boarding of new hires

Recruitment forecasting. Employer branding. Sourcing strategies. Selection processes. Assessment methodologies. On boarding of new hires hudson RPO ASIA pacific Recruitment Process Outsourcing Hudson RPO Asia Pacific is proud to be the winner of a number of industry rated awards including: HRO Today s Global Baker s Dozen List, 2010, 2011

More information

SUCCESSFUL SHAREPOINT IMPLEMENTATIONS. Maximize Application Availability and Protect Your Mission Critical Assets

SUCCESSFUL SHAREPOINT IMPLEMENTATIONS. Maximize Application Availability and Protect Your Mission Critical Assets SUCCESSFUL SHAREPOINT IMPLEMENTATIONS Maximize Application Availability and Protect Your Mission Critical Assets Brought to You By 5090 Richmond Avenue Suite #336 3 Second Street, Suite # 202 Houston,

More information

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

A Strategic Approach to Enterprise Key Management

A Strategic Approach to Enterprise Key Management Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

iworks healthcare Managed IT services

iworks healthcare Managed IT services iworks healthcare Managed IT services SunGard s iworks HEALTHCARE: Managed IT Services Organizations around the globe face an array of critical issues in today s business environment. Economic conditions

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

COMPANY PROFILE Contact Details

COMPANY PROFILE Contact Details Company's Name: Software's Name: C2L BIZ Solutions Pvt. Ltd. MicroSys Previous RFI ITEMS CHOICE LISTS FREE ANSWERS / DESCRIPTIONS / COMMENTS Contact information of the person who fills the questionnaire:

More information

Invitation to tender Outsourcing of tasks related to receipt of Schengen visa applications in Egypt

Invitation to tender Outsourcing of tasks related to receipt of Schengen visa applications in Egypt Invitation to tender Outsourcing of tasks related to receipt of Schengen visa applications in Egypt General Information The Ministry of Foreign Affairs and Trade of Hungary aims to continuously improve

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Business Service Innovation from CA Technologies. The Center of Service Provider Transformation Hans-Peter Müller, Alliances Director MSP

Business Service Innovation from CA Technologies. The Center of Service Provider Transformation Hans-Peter Müller, Alliances Director MSP Business Service Innovation from CA Technologies The Center of Service Provider Transformation Hans-Peter Müller, Alliances Director MSP Customers are turning to Cloud & Managed Services to help them deal

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Microsoft Services Premier Support. Security Services Catalogue

Microsoft Services Premier Support. Security Services Catalogue Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

HEC Security & Compliance

HEC Security & Compliance HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information

More information

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas

More information

Electronic Healthcare Maturity Model (ehmm)

Electronic Healthcare Maturity Model (ehmm) Quintegra Solutions Limited Electronic Healthcare Maturity Model (ehmm) A White Paper by Balaji Sharma Head, Healthcare Practice June 2008 168, Eldams Road, Teynampet, Chennai - 600018, Tamilnadu, India

More information

Document Version. January 2013

Document Version. January 2013 Service and Technical Description Vendor Access Network Providers (VAN) January 2013 Contents Vendor Access Network Providers (VAN)... 1 Contents... 2 Document Version... 3 1. Introduction... 4 1.1. Purpose

More information