G-CLOUD FRAMEWORK SERVICE DEFINITION. Envault Data Protection Service Suite - Cloud Data Storage Protection

Size: px
Start display at page:

Download "G-CLOUD FRAMEWORK SERVICE DEFINITION. Envault Data Protection Service Suite - Cloud Data Storage Protection"

Transcription

1 G-CLOUD FRAMEWORK SERVICE DEFINITION Envault Data Protection Service Suite - Cloud Data Storage Protection ISSUE 1 23 rd August 2013

2 Table of Contents 1 SERVICE OVERVIEW & SOLUTION Envault Data Protection Suite Benefits of EnDaPS to Your Business Key differentiators of Envault solutions Envault Cloud Storage Protection Features and Benefits of Envault Internal Media Protection Envault Internal Media Protection Service Delivery INFORMATION ASSURANCE BACKUP/RESTORE AND DISASTER RECOVERY PROVISION ON-BOARDING AND OFF-BOARDING PROCESSES On-Boarding Off-Boarding EnVault SECURITY Secure Encrypted Connection from the Client to the Application SERVICE MANAGEMENT DETAILS Technical Boundary Support Boundary User Authorization and Roles General Support details SERVICE CONSTRAINTS Planned Maintenance Emergency Maintenance SERVICE LEVELS Award of Service Credits: Payment of Service Credits: Financial recompense TRAINING INVOICING PROCESS TERMINATION TERMS DATA EXTRACTION /REMOVAL CRITERIA Data standards in use Consumer generated data Data extraction Price of extraction Purge & destroy DATA PROCESSING AND STORAGE LOCATION(S) DATA RESTORATION / SERVICE MIGRATION... 14

3 16 CUSTOMER RESPONSIBILITIES TECHNICAL REQUIREMENTS BROWSERS DETAILS OF ANY TRIAL SERVICE AVAILABLE... 15

4 1 SERVICE OVERVIEW & SOLUTION 1.1 Envault Data Protection Suite Envault Data Protection Suite (EnDaPS) set of services offer Military grade data protection for Businesses & Government organizations. These services minimise the risks of data leaks due to human error and attempted theft across and between business operations and communications. EnDaPS offers protection for different data storages including: o Internal Media, o removable mass storage media o Cloud storage across and between organisations. o s and Mail attachments including protection against data leaks and theft. Fig1. Envault s Data Protection Suite (EnDaPs) With its powerful and non-intrusive approach, developed on patented technology (Core technology Patent# EP ), EnDaPS enables roll out of data protection easily whilst maintaining control, and without compromising or impacting the effectiveness of existing business operations In addition to data protection, EnDaPS empowers administrators and managers with audit data on how data and documents are being handled across entities, without intruding on the user privacy. This enables organisations to take proactive actions to mitigate data threats. Envault services are complementary to existing infrastructure and threat management systems such as Anti-virus & Anti-malware services that may already exist on your IT network.

5 1.2 Benefits of EnDaPS to Your Business Ensure the security of your own data as well as your customers and partners data. Eliminate the costs and related consequences of potential loss or theft of sensitive data Increase the confidence and speed in your business operations and partner collaboration. Enables more employees to work-from-home Enables secure mobile working. Keeps you informed on the patterns of file usage relating to sensitive data. 1.3 Key differentiators of Envault solutions Unbreakable protection through innovative-patented technology. We take a tiny fragment away from your file and store it at a different location during encrypting. Active protection and control. EnDaPs services not only encrypt but also maintain an audit trail for every operation on protected documents. Roll out protection at different levels such as Internal disks, External removable media, s and importantly Cloud storage. Highly transparent to your employees. They don t need to remember passwords. Offered as software as a service (SaaS). No additional IT infrastructure to manage at your end. Complements the existing anti-virus and anti-malware solutions as well as services such as bit-locker. 1.4 Envault Cloud Storage Protection Envault s Cloud Storage Protection is one of the core services that form part of Envault Data Protection Suite (EnDaPS). This service helps you to protect the data that your employees store on your company s private cloud or the popular public clouds. All the data transferred to the cloud storage space, from the protected computers is encrypted. Your employees can create shared workspaces on the cloud and share the stored data with external persons using a passphrase. Unauthorised persons would not be able to make use of the data, even if they can break into the cloud storage. This is due to our patented technology that removes a tiny fragment of the stored document and stores it elsewhere, in EnDAPS servers. In addition, Your IT department can centrally track and maintain an audit trail on data transferred to and accessed from the cloud storage. Using centralized policies, IT teams can control who can copy files to cloud storage and who cannot. Roll out Cloud storage protection automatically, across all the corporate machines. It works silently in the background and your employees continue to work as before. They do not need to remember any passwords, except of course when sharing the documents with external partners.

6 1.5 Features and Benefits of Envault Cloud Protection Fig. 2. Envault Cloud Protection Protection for public cloud storages such as Amazon, Dropbox, Skydrive, icloud as well as Private enterprise clouds. Built for collaboration with internal and external partners. Workspaces allow you to securely share the data you re your partners. Powerful insights into the usage of cloud storage across the company Use Audit trail reports to provide confidence to your customers & partners, on the security of their data. Freedom from worry and consequences of compromised cloud security and resulting loss and theft of data. You can deny access to any previously shared data with a single click. Take advantage of Envault s patented technology that provides multiple layers of unbreakable protection for the data, without any hassles to your employees. No mandatory passwords Employees can use passphrase while sharing with external partners / Customers. For intra-company usage, this is not required. No new systems to manage - Easily roll out and use the service through our Software as a Service (SaaS) model of service delivery. Very little user training required while rolling out this powerful protection. 1.6 Envault Cloud Protection Service Delivery All EnDaPS Services are offered as Hosted SaaS services. We host EnDaPS services in Tier3 class Data centres in UK and deliver the service to you in typical Software as a Service (SaaS) model.

7 We partner with UKFast as our Datacentre partner in UK. The service is hosted in UK datacentres and managed jointly by Envault and UKFast. The service is purchased as an SaaS l subscription. Licencing is by volume of identifiable devices and/or users. 2 INFORMATION ASSURANCE Envault complies with relevant information security legislations including but not limited to Data Protection Act 1998, Computer Misuse Act 1990, and Electronic Communications Act As described in section 1.3, Envault Internal Media protection service is delivered to you from Envault s partner data centres. Our contracted service arrangement with UKFast benefits from the following security certifications: ISO 27001:2005 certification for Information Security Management System as well as ISO 9001:2008 certifications for Quality Management System, PCI Data Security Standard (DSS), ISO 14001:2004 (Environmental Management), PAS 2060:2010 (The Publically Available Sepcification for carbon Neutrality). For a full description of these certifications our service is contracted to deliver please refer to the following link: This allows Envault to provide the following infrastructure security: Critical exterior perimeter is constructed of materials that provide UL Standard #752, Level V Ballistic Protection Monitored/Recorded 24x7 CCTV surveillance, with physical access strictly limited to authorised personnel Integrated Card Access and Biometric control systems to restricted areas N+1 Network Resilience and Access Performance N+1 Redundant heating, ventilation and air conditioning systems N+1 Dedicated UPS and Stand-by Emergency Power (Generator) VESDA smoke detection with Hi-fog zoned fire suppression systems In addition, the network connections to our data centre from your IT network is secured with two-way authentication with SSLv3 certificates and TLSv1 protocol encryption. Envault Client software has been designed such that, it does not interact /interfere with other software on the computers. Also, the computer users cannot bypass the service or tamper with it. Accessed via the internet the target accreditation for this service is IL2. 3 BACKUP/RESTORE AND DISASTER RECOVERY PROVISION Our service through our contracted hosting partner s data centres, offer robust disaster recovery infrastructure to ensure back up and restoration of critical data. Our SLA s with the data centre providers ensure 99.95% availability and security of the EnDaPS services delivered from these data centres. Our service is designed to be fault tolerant assuring integrity of data and mitigation of data loss through any service interruptions. The innovative protection technology used by EnDaPs, stores tiny fragments of every protected document, in an encrypted form, anonymously on EnDaPs servers. Our servers

8 have the capability to carry out automatic back up at regular intervals, to ensure the availability and integrity of this fragment data. In addition, EnDaPs services also store management and historical data such as the usage statistics. This data is automatically backed up by our service and restored in the event of a service outage that impacts the integrity of this data set. Audit data is maintained on a rolling two year basis. 4 ON-BOARDING AND OFF-BOARDING PROCESSES 4.1 On-Boarding Our services can be provisioned within 1 week of procuring our services, including rolling out the protection to all the computers registered on your corporate network. Our agile approach to on-boarding enables us to quickly: Consult: confirm existing technical infrastructure, and service connections to data centre. Deploy: configure clients for envault service. (Client software installation is carried out as a background task for each of the protected devices using the MSI installer packages which can be configured to roll out approved upgrades to client machines.) Evaluate: review/test operational deployment and confirm service integrity. (As best practice, an agile approach to installation is recommended with an initial set of machines updated on a pilot basis. After an initial observation period, the rest of the landscape should be upgraded). Maintain: Continuous monitoring and review of operational stability of deployed service including training and support services. (Envault helps you in creating the required communication and training material for the employees. This material is in the form of PDF documents and Screencast video files. We also provide the required documentation and training to your IT administration team). 4.2 Off-Boarding When you decide to stop using this service, it can be rolled back easily without leaving any traces on the PCs/Laptops. The client software can be uninstalled from a centralized location using the uninstall scripts that are included. No other traces such as registry entries, preferences etc. are left after the service is uninstalled. The uninstallation process is transparent to the end users and does not affect any of their data or activities. All previously protected documents and storage devices can be unencrypted using Envault provided software tools 5 EnVault SECURITY Envault is cognoscente of and seeks to comply with relevant information security legislations including but not limited to Data Protection Act 1998, Computer Misuse Act 1990, and Electronic Communications Act Finnish Communication Regulatory authority is in last phase of granting NCSA (National Communication Security Authority) certificate for EnDaPs solutions. National Approval of the information encryption products to be used for protecting international level classified information. EnDaPS services store a tiny fragment of each of protected document on the server side. The original file is first encrypted using AES-256 encryption alchorithm. The fragment is then

9 extracted and stored in EnDaPS servers. This fragment is mandatory for opening original file.. This fragment consists of random bits from the original document and cannot be used for any meaningful interpretation. All the usage data collected by the EnDaPS services, for the purpose of audit trail, are, in general, anonymised for normal users. Only the users with special authorizations can see the info on identification of the user or the names of the files being protected. All others see only the statistical information. EnDaPS services do not back up the original documents being protected. For secure User Authentication, Windows AD login/password combination and Kerberos authentication is used. Authentication in transport (SSL) is based on industry-standard PKI mechanisms. 5.1 Secure Encrypted Connection from the Client to the Application All the connections from EnDaPS servers in the Datacentres and the user machines are secured with two-way authentication with SSLv3 certificates and TLSv1 protocol, mitigating unauthorised access or Man-in-Middle attacks. 6 SERVICE MANAGEMENT DETAILS 6.1 Technical Boundary This service comprises of the EnDaPS server application, tiny encrypted fragments of the protected documents, document operations data. In addition, the service also consists of the client software installed on the protected computers. These clients do not interact with any local or remote software, other than the EnDaPs server.

10 Fig. 3. High level Technical Architecture of EnDaPS The technical boundary of the service All aspects of it that are running are within our datacenter, The Disaster Recovery datacentre, which contains a full copy of the environment and the secure copying procedure between the two datacentres. The client software that is installed and runs on the protected computers of your company. In addition, designated people from within your corporate network can access the usage reports using any HTTP browser. Functioning of EnDaPS services requires a secure network connection between the client software and EnDaPS servers. The client software stores usage and fragment data locally on the protected machines, until they get access to the EnDaPs server. 6.2 Support Boundary Envault Support includes issues resulting from any faults within the technical boundary of the systems, in addition to help and support to IT admins and end users on the usage of service and troubleshooting. However, some specific aspects such as the network connection between the client and Server may have to be handled by your IT administration team. These are typically the issues relating to firewall configurations, connectivity issues. Envault takes care of Roll out, Roll back and Operations of the service. Our support services are available to IT Admin teams as required. Our Level 1 (L1), Level 2 (L2) support is provided in the UK. Level 3 (L3) support is offered from our RnD offices in Espoo, Finland. More details on the Support please refer to our SLA provided as supporting documentation. 6.3 User Authorization and Roles EnDaPS services provide three different types of Admin roles and one End User role. The main roles being: 1. User Admin: Access to all user data. In this case, the data relating to documents and users is not anonymised. User Admins can see the details of the users and the operations that they are carrying out. User Admins do not have rights to modify the service configuration or enterprise protection policies.

11 2. End users: End users mainly use the service. The service usage is transparent to the end users, except is use-cases such as where users can share an encrypted document to other users. Other roles and configurations are possible and subject to further discussion with Envault at time of configuration. Company Active Directory s Windows passwords are used as passwords for this service. 6.4 General Support details Envault offers L1, L2 and L3 service on 8x5 basis, in UK time zone. Envault would request for a Single Point of Contact from your side for coordinating support activities. Envault will nominate a designated contact from our end, along with an escalation chain. While L1 and L2 support is offered from UK, L3 support is offered from our facilities in Espoo. Envault releases service updates from time to time. Such updates are provided free of charge to customers with active license and support plans.. 7 SERVICE CONSTRAINTS 7.1 Planned Maintenance EnDaPS services may require a planned maintenance. This may be OS level patches, security upgrades or application updates. Such maintenance would be planned at least seven calendar days in advance. It will be scheduled at the lowest traffic such as holidays / non-working hours. 7.2 Emergency Maintenance Where Emergency Maintenance is necessary and is likely to affect the Service, we would inform your team as soon as possible and with the intent of a minimum of one hour s notice prior to the start of the Emergency Maintenance unless such an issue requires immediate attention. 8 SERVICE LEVELS Envault provides a 99.95% availability assurance service to Customers, excluding Planned maintenances. The service performance is measured quarterly. Error & Failure Classifications Envault commits to respond to the error reports / notifications according to the following data: A Critical Errors and situations which have severe impact on the functions and operability of the Envault s Data Protection System and require immediate solving/repairing. Such as acute missing / drop down of the protection (e.g. driver does not protect data saved to external memory device without notifying this to the end-user) or saved data is corrupted and become un-repairable. B Important Errors and situations which have severe impact on the functions and operability of the Envault s Data Protection System affecting to single end-user. Such as un-able to use protected device, folder etc due missing network connection or problems caused by the operating system, or drop-down of the system s capability to serve the end-user etc. C Minor

12 Other conditions and error situations which do not have significant effect on the fucntions of the system. Response times for the reported Errors Table below defines the response times for the above mentioned error classes. Calssification Acknowledged Fix or work-around Final solution ready and delivered A Critical max 60 minutes max 1 working days max 10 working days B Major max 60 minutes max 2 working days max 20 working days C Minor max 60 minutes max 10 working days max 40 working days For any interruptions, beyond the agreed SLA s Envault would offer service credits to the customers. 8.1 Award of Service Credits: At Envault s discretion the maximum amount of compensation for agreed service disruption 125% of Envault's support fee for the affected licenses during the three months preceding the Service performance period. Service Availability Service Credits e.g % to 99% 75% e.g.98.99% to 98% 100% e.g.97.99% or less 125% 8.2 Payment of Service Credits: The compensation will be paid to the Customer's service account in the form of subscription fee credits and shall not be exchanged for cash or other forms of payment. 9 Financial recompense There are no further financial recompense. Any and all recompense is subject to service credits as defined above and as included in Envault s T s & C s associated with this service. 10 TRAINING Before service set up, we conduct a planning cum training session for configuring the network accesses etc. In addition, usage training along user manuals are provided to the IT Admins and Key users. Also, Screencast video tutorials are available for easier understanding of the procedures, for the broader teams. Specific training requirements are to be discussed at the time of engagement and will be subject to the SFIA rate card.

13 11 INVOICING PROCESS Envault invoices you on a quarterly basis, at the beginning of every quarter. All support costs are included in this price. Alternative involicing periods may be considered and subject to further discussion at engagement. Envault invoices the customer directly; all sums invoiced are due within 14 days of the date of Envault s invoice. 12 TERMINATION TERMS The following are highlights from the specific terms & Conditions associated with this service. Please refer to the Terms & Conditions for the full set of details.. The customer acknowledges that it has purchased the Services for the Minimum Period and any Renewal Term(s)), as defined in the Certificate or Order Summary. Customers are expected to commit to the service for a period of 12 months. Envault is happy to discuss other arrangements. Please refer to the documents titled Envault Terms & Conditions for a complete description of terms applicable to this service. An extract from the related T&C is included here for convenience as follows: Either party may terminate this Agreement in its entirety, or in part with respect to an Order for Services, at any time upon thirty (30) days prior written notice, if the other party materially fails to comply with any of the terms and conditions of this Agreement and such failure is not cured by the end of such thirty (30)-day period. Licensor may terminate this Agreement immediately if Customer materially fails to comply with Sections 2, 3, 4, 5 or 6 of this Agreement. (b) Unless otherwise specified by the parties in writing, either party may terminate this Agreement in part with respect to the delivery by Licensor of any of the Services upon thirty (30) days advance written notice. Upon any such partial termination, Licensor shall advise Customer of the extent to which performance of a terminated Service has been completed through such date. Licensor shall be paid for all work performed and expenses with respect to such Service through the date of termination. 13 DATA EXTRACTION /REMOVAL CRITERIA 13.1 Data standards in use Envault as a principle uses OpenStandards whenever and wherever possible such as use of ASCII, XML, HTML4.0, CSV and SQL compatible database, data formats. We also use certain message formats ( using ASCII data type) for handling the data within our software. Envault defines specific data standards for commissioning of data, reporting of data, publication of data, transference/migration. Consistency in defining these standards allows quicker, validated and efficient importing & processing of data in a structured form. Where no standards currently exist Envault is able to propose standards based on those it has already defined and is using to facilitate data collection by working with it s customers to define appropriate data standards Consumer generated data We commit to returning all consumer generated data (e.g. content, metadata, structure, configuration etc.) and a list of the data that will be available for extraction. Where there is a

14 risk of confusion, data that will not be available for later extraction will also be published Data extraction The formats/standards into which data will be able to be extracted include but are not limited to CSV and Text. Other common services/technologies to which an export/import mechanism could be developed Web Services, BI tools (e.g. Crystal Reports) Price of extraction All the data generated while using this service is owned by you. Envault does not use it for any other purpose. However, A price for the extraction of the data or the migration to another service provider s service will be the subject of further discussion depending upon delivery mechanism, volume of data, and any specific requirement to provide an extraction format not in the list above Purge & destroy Envault commits that it will purge and destroy (as defined in security accreditation for different ILs) any consumer data from any computers, storage devices and storage media that are to be retained by us or our partners after the end of the subscription period and the subsequent extraction of consumer data (if requested by the consumer). 14 DATA PROCESSING AND STORAGE LOCATION(S) Access to services is restricted by configuration of services during the enrolment process; processing of all data takes place in England, with storage facilities maintained in England. 15 DATA RESTORATION / SERVICE MIGRATION Should Envault be advised or discover a material degradation in the data supporting the service it will follow planned/emergency procedures as defined in the Planned/Emergency maintenance section in the Service Constraints section in this document. Service migration requirements will be handled through the process described in the On-Boarding section of this document. 16 CUSTOMER RESPONSIBILITIES Customer responsibilities will be agreed at the initiation phase of the project and included in a Project Initiation Document. Typically these will include providing a main point of contact, provision of working facilities, making staff available for interviews and workshops and project meetings, and timely approval and acceptance of all key deliverables. 17 TECHNICAL REQUIREMENTS The EnDaPs clients can be installed on Windows family Operating systems. (Windows Vista and Windows 7 & Windows 8). The EnDaPS servers can be installed on Linux family of operating systems as well as Windows servers. 18 BROWSERS Admin users use browser to view the reports on usage of removable media. These reports can be accessed from all the popular Internet browsers. The service has been tested accessed using the following browsers: -Internet Explorer 6 or higher [including IE9] - Firefox 3.6 or higher [including FF4}

15 - Safari or higher - Chrome 8 or higher 19 DETAILS OF ANY TRIAL SERVICE AVAILABLE Limited trials may be available subject to negotiation. Any trial will be limited in functionality and serviceability. Such trials will be at the discretion of Envault. Please note no service credits are offered during any free/trial periods.

G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements

G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements 1 G-Cloud Framework Document for Service Definition Audit management System In response to G Cloud 6 Requirements 1 2 Table of Content Audit Management System Minimize the Risk 1.The Audit management System.........

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Microsoft Cloud Business Applications

G-CLOUD FRAMEWORK SERVICE DEFINITION. Microsoft Cloud Business Applications G-CLOUD FRAMEWORK SERVICE DEFINITION Microsoft Cloud Business Applications Table of Contents 1 Cloudhub360... 3 2 SERVICE OVERVIEW & SOLUTION... 3 3 INFORMATION ASSURANCE... 4 4 BACKUP/RESTORE AND DISASTER

More information

Software as a Service (SaaS) Online HR

Software as a Service (SaaS) Online HR Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore

More information

Marval Software Limited. G Cloud iii Framework Service Definition

Marval Software Limited. G Cloud iii Framework Service Definition 1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

G-Cloud iv brightsolid Hosting and Management Services. Service Definition Document

G-Cloud iv brightsolid Hosting and Management Services. Service Definition Document G-Cloud iv brightsolid Service Definition Document Sept 2013 Contents 1 Introduction... 3 2 An overview of the G-Cloud Service... 3 3 Information assurance... 3 4 Backup and Disaster Recovery... 3 5 Monitoring...

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1 G-CLOUD FRAMEWORK SERVICE DEFINITION Kofax Model Office Bundle Proposal ISSUE 1 Sept 2013 Table of Contents 1 SERVICE OVERVIEW & SOLUTION... 2 2 INFORMATION ASSURANCE... 3 3 BACKUP/RESTORE AND DISASTER

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

Vodafone secure mail services

Vodafone secure mail services Vodafone secure mail services Overview The G-Cloud Mail service is a business-class email system based on Microsoft Exchange. It provides a secure and robust email service, and includes an inbox, calendar,

More information

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Contents Service Definition... 3 An overview of the Remote Backup as a Service... 3 Key Service Attributes... 4 Information assurance... 5 Details of the level

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

How To Run A Cloud Service For A Large Business

How To Run A Cloud Service For A Large Business Lot: 4 Specialist Cloud Services Service 25: Digital Continuity - ediscovery Solutions An overview of the G-Cloud Service (functional, non functional) Discover Information based on content, metadata and

More information

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected

More information

Vodafone Private Cloud

Vodafone Private Cloud Vodafone Private Cloud Overview Vodafone Private Cloud is our dedicated public sector cloud service that connects you to your own private IL2/IL3 network and / or core government networks, including the

More information

Service description RFL Virtual Data Centre

Service description RFL Virtual Data Centre Service description RFL Virtual Data Centre IaaS G-Cloud 6 1 Contents Overview... 3 Highlights... 3 Description... 3 Use cases... 3 Use cases... 5 Use cases... 5 Pricing... 5 Information assurance... 5

More information

Amazon Relational Database Service (RDS)

Amazon Relational Database Service (RDS) Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

Methods - EpheSoft Intelligent Document Scanning Cloud Consulting Services Ixxus

Methods - EpheSoft Intelligent Document Scanning Cloud Consulting Services Ixxus Methods - EpheSoft Intelligent Document Scanning Cloud Consulting Services Ixxus SERVICE DEFINITION An overview of the G- Cloud Service (functional, non functional); Ephesoft is an Open Source document

More information

2. Consultancy and Support

2. Consultancy and Support G-Cloud Services 4 Service Definition Grant Management Services Lot 3 1. CC Grant Tracker 2. Consultancy and Support Submitted By: Dave Allan CC Technology Ltd 375 West George St Glasgow G2 4LW dave.allan@cctechnology.com

More information

G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS

G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS Capita Division / Supplier: Service Name: Capita Business Services Ltd SIMS OVERVIEW OF THE SERVICE The hosted service for SIMS

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

UDiMan. Introduction. Benefits: Name: UDiMan Identity Management service. Service Type: Software as a Service (SaaS Lot 3)

UDiMan. Introduction. Benefits: Name: UDiMan Identity Management service. Service Type: Software as a Service (SaaS Lot 3) UDiMan Name: UDiMan Identity Management service Service Type: Software as a Service (SaaS Lot 3) Introduction UDiMan is an Enterprise Identity Management solution supporting mission critical authentication

More information

USER EXPERIENCE MONITORING Service Definition

USER EXPERIENCE MONITORING Service Definition About Littlefish Established in Nottingham in 2003, Littlefish (UK) Ltd has an innovative, stable and successful history in Managed IT Services and has grown continuously over the last ten years. Through

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO) Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PROFESSIONAL STORAGE (PRO) 5NINES 5NINES Data Centre Services Service Offered 5DRIVE PERSONAL CLOUD STORAGE with remote

More information

G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service

G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service 1 of 19 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W: www.dcggroup.com Data Continuity Group Limited, Bridge

More information

Hosted Desktop as a Service

Hosted Desktop as a Service Hosted Desktop as a Service Contents 1 Introduction to Hosted Desktop Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Administration... 4 2.3 Access Methods... 4 2.4 Service

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Commercial in Confidence 1 G-CLOUD III FRAMEWORK SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Capita Division / Supplier: Capita Business Services Ltd powered by SkyScape Service Name: Document

More information

Service Definition The following section provides a summary overview of the hosted Microsoft Exchange solution.

Service Definition The following section provides a summary overview of the hosted Microsoft Exchange solution. Microsoft Exchange Service Definition Service Description Hosted Exchange 2010 is a secure business-class email messaging and collaboration service designed to make it possible for you and your employees

More information

IBM Web Server as a Service

IBM Web Server as a Service IBM Web Server as a Service Service Definition IBM G-Cloud Web Server as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Web Server

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Big Data Analytics Service Definition G-Cloud 7

Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated

More information

THOMSON REUTERS C-TRACK E-FILING SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6

THOMSON REUTERS C-TRACK E-FILING SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 THOMSON REUTERS C-TRACK E-FILING SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track E-Filing is a stand-alone component of the C-Track product suite which can easily integrate with the C-Track

More information

G-Cloud 6 SERVICE DEFINITION

G-Cloud 6 SERVICE DEFINITION ORACLE CORPORATION UK LTD ( Oracle ) G-Cloud 6 SERVICE DEFINITION Date: [ 29 / 11] 2014 v. 1 This is Oracle s G-Cloud 6 Service Definition for the following service(s): Oracle Business Intelligence Cloud

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

Service Description for Hosted Server

Service Description for Hosted Server Service Overview tolomy has created its Hosted Server environment using VMware ESXi which provides the foundation for building and managing a virtualised IT infrastructure. These market leading, production-proven

More information

Carers Assessment. SaaS Product

Carers Assessment. SaaS Product Carers Assessment SaaS Product Contact: Mark Sinclair Tel: 01844 203660 Email: mark@quickheart.com 1 P a g e Quickheart s Carer Assessments for Young Carer OR Carer - evaluates the key factors important

More information

Vodafone Primary Storage NAS

Vodafone Primary Storage NAS G-Cloud 6 Primary Storage NAS Service Definition Vodafone Primary Storage NAS Overview Vodafone Primary Storage Network Attached Storage (NAS) gives you a flexible way to provide file storage for your

More information

Security Consultants / Security Managed Services

Security Consultants / Security Managed Services Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

SFW CRM for Stakeholders - MS Dynamics CRM

SFW CRM for Stakeholders - MS Dynamics CRM SFW CRM for Stakeholders MS Dynamics CRM Service Definition SFW Reference: Version: 5.0 Date 03/04/14 SFW Limited Southern House Station Approach Woking GU22 7UY www.sfwltd.co.uk Page 1 of 13 1 Service

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

Neocol E-Discovery Consulting Services

Neocol E-Discovery Consulting Services Neocol E-Discovery Consulting Services Service Definition Neocol Reference: 1.0 Version: 1.0 Date: 1 March 2013 1. Service Definition 1.1. Service Overview The E-Discovery Consulting Services address needs

More information

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) Service Definition 6th October 2015 TABLE OF CONTENTS VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) 3 SERVICE SUMMARY

More information

Desktop as a Service Service Definition

Desktop as a Service Service Definition Desktop as a Service Service Definition 2 Table of Contents Purpose of Document... 4 Desktops as a Service (DaaS) Service Description... 4 Technology... 5 Deliver Uncompromised End User Experience... 5

More information

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS Registered Office at: St James House Oldbury Bracknell RG12 8TH Company No: 03676297 BMI MSA Hybrid Cloud

More information

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS)

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) Video Conferencing Endpoint Services September 2013 RTS G-Cloud Service Definition Page 1 CONTENTS 1. Executive Summary

More information

Spektrix Service Definition

Spektrix Service Definition Spektrix Service Definition An overview of the G-Cloud Service Spektrix is a cloud-based ticketing and marketing software package provided as Software as a Service. It is designed for arts and entertainment

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

System Security. Your data security is always our top priority

System Security. Your data security is always our top priority Your data security is always our top priority Data security is an important factor for every client, our continued investment in the latest technology methods and world class data centres show our commitment

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

Tactical Cost Reduction

Tactical Cost Reduction Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Vodafone Cloud Storage

Vodafone Cloud Storage Vodafone Cloud Storage Overview Vodafone Cloud Storage gives you another, more flexible way to store data. It s available on G-Cloud and it s: Flexible you can decide how and where to store your data Fast

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS powered

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

DataCentred Cloud Storage

DataCentred Cloud Storage Service Description DataCentred Michigan Park Michigan Avenue Salford Quays M50 2GY United Kingdom Tel: 0161 870 3981 enquiries@datacentred.co.uk www.datacentred.co.uk Contents Service Description... 2

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Impact Level HootSuite does not yet have an Impact Level accreditation, however if we were to apply we believe we would be at the IL3 level.

Impact Level HootSuite does not yet have an Impact Level accreditation, however if we were to apply we believe we would be at the IL3 level. Overview G Cloud 4: Service Definition HootSuite is a social media monitoring and listening platform for businesses and organisations to collaboratively execute social media strategies across multiple

More information

Execview Outsourced Services Management

Execview Outsourced Services Management EXECVIEW for G-Cloud Framework Users Execview Outsourced Services Management Service Definition for G-Cloud iv G-Cloud iv Service Description An overview of the G-Cloud Service (functional, non-functional)

More information

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS)

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) Video Conferencing Single Screen Service September 2013 RTS G-Cloud Service Definition Page 1 CONTENTS 1. Executive

More information

Amazon Compute - EC2 and Related Services

Amazon Compute - EC2 and Related Services Amazon Compute - EC2 and Related Services G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

FMCS SECURE HOSTING GUIDE

FMCS SECURE HOSTING GUIDE FMCS SECURE HOSTING GUIDE October 2015 SHG-MNL-v3.0 CONTENTS INTRODUCTION...4 HOSTING SERVICES...4 Corporate Secure Hosting... 4 Hosting Partner... 4 Hosting Location... 4 Physical Security... 4 Risk and

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Email Router and Vetting G-Cloud Service Definition

Email Router and Vetting G-Cloud Service Definition Email Router and Vetting G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved 1 In partnership with Government and industry-leading technology partners, General

More information

Online Backup Service Definition

Online Backup Service Definition Online Backup Service Definition 2 Table of Contents Purpose of Document... 3 Online Backup Service... 3 Accreditations... 5 Target Service Levels for Online Backup... 5 Service Credits Rules and Claims...

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

Business process efficiency is improved with task management, alerts, notifications and automated process workflows.

Business process efficiency is improved with task management, alerts, notifications and automated process workflows. UNCLASSIFIED 23/02/2015 v3.3 Cobweb Hosted SharePoint 3.0 Service Description Cobweb Hosted SharePoint is a web-based document collaboration tool that helps you maximise productivity in a truly flexible,

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Azeus Convene Paperless Board and EXECUTIVE Meetings

Azeus Convene Paperless Board and EXECUTIVE Meetings Service Definition Azeus Convene Paperless Board and EXECUTIVE Meetings 1. An Overview of the G- Cloud Service (functional, non functional) Azeus Convene replaces meeting papers with a user-friendly mobile

More information

service description Document Management in the Cloud Software as a Service

service description Document Management in the Cloud Software as a Service easy to adopt, easy to use, easy to leave service description Document Management in the Cloud Software as a Service version 4.0 Contents Overview... 3 Example use cases... 3 Pricing... 4 Trial service...

More information

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you Webrecs IT infrastructure The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you Sunday, April 21, 2013 Contents Introduction... 3 Data storage... 3 Data Centres...

More information

How To Use Egnyte

How To Use Egnyte INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

G Cloud Services Definition Document. Compliance Service. Invigilatis Limited. Contents. Pages. Invigilatis Applications 1.

G Cloud Services Definition Document. Compliance Service. Invigilatis Limited. Contents. Pages. Invigilatis Applications 1. G Cloud Services Definition Document Compliance Service Invigilatis Limited Contents Pages Invigilatis Applications 1 Modules 2 Business Intelligence 3 Service Definition 4-6 Service Levels Access Upgrades

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

1 ForestSafe SaaS Service details Service Description Functional Non Functional

1 ForestSafe SaaS Service details Service Description Functional Non Functional 1 ForestSafe SaaS Service details 1.1 Service Description ForestSafe is a privileged identity management system used today to manage the Administrator passwords of 65,000 computers by the UK largest bank.

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message

More information

MANAGED CLOUD INFRASTRUCTURE www.easynet.com. Bronze Disaster Recovery Services

MANAGED CLOUD INFRASTRUCTURE www.easynet.com. Bronze Disaster Recovery Services MANAGED CLOUD INFRASTRUCTURE www.easynet.com Bronze Disaster Recovery Services G-Cloud Service Definition September 2013 Company Information Easynet Global Services Limited registered office Chancellor

More information

GCloud Application Development Service Definition. Application Development

GCloud Application Development Service Definition. Application Development GCloud Service Definition GCloud Service Definition Contents 1.... 3 1.1. Overview... 3 1.2. Information Assurance... 6 1.3. Backup / Restore / Disaster Recovery... 6 1.4. On-boarding and Off-boarding

More information

OpenStack Private Cloud Hosting in an Tier 3 Data Centre. G-Cloud Lot 1 IaaS

OpenStack Private Cloud Hosting in an Tier 3 Data Centre. G-Cloud Lot 1 IaaS OpenStack Private Cloud Hosting in an Tier 3 Data Centre This is service provides a dedicated private cloud environment built on the open source technology, OpenStack. This is service provides a dedicated

More information

Documentum Document Management in the Cloud Service Definition

Documentum Document Management in the Cloud Service Definition Documentum Document Management in the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Documentum Document

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

G Cloud Service Description Premier SIP Trunk Software as a Service October 2015

G Cloud Service Description Premier SIP Trunk Software as a Service October 2015 G Cloud Service Description Premier SIP Trunk Software as a Service October 2015 Premier Choice Telecom has been a trusted provider of communications solutions for businesses for over 15 years. Our clients

More information

SaaS architecture security

SaaS architecture security Introduction i2o solutions utilise the software as a service (or SaaS) model because it enables us to provide our customers with a robust, easy to use software platform that facilitates the rapid deployment

More information

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

SERVICE DEFINITION G-CLOUD 7 CLOUD BACKUP. Classification: Open

SERVICE DEFINITION G-CLOUD 7 CLOUD BACKUP. Classification: Open SERVICE DEFINITION G-CLOUD 7 CLOUD BACKUP Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this material may

More information

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed. Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security

More information

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd. Service Definition The name of the Service is: WebFOCUS Cloud Express An overview of WebFOCUS Cloud Express The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Email as a Service - Microsoft Exchange G-Cloud Service Definition

Email as a Service - Microsoft Exchange G-Cloud Service Definition Email as a Service - Microsoft Exchange G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved In partnership with Government, General Dynamics Information Technology

More information

Platform as a Service

Platform as a Service Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation

More information

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS G-Cloud Service Definition Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS Canopy Unmanaged Enterprise Private Cloud IaaS Canopy Unmanaged Enterprise Private Cloud delivers the efficiencies,

More information

G-Cloud Framework Service Definition. Information Distribution Service

G-Cloud Framework Service Definition. Information Distribution Service G-Cloud Framework Service Definition Version: 1.2 Copyright: Acuma Solutions Ltd Acuma Solutions Ltd Waterside Court 1 Crewe Road Manchester M23 9BE Tel: 0870 789 4321 Fax: 0870 789 4250 E-mail: information@acuma.co.uk

More information